SlideShare a Scribd company logo
1 of 19
Download to read offline
Privacy and Neutrality in Data Era
Cho Jang Sa
as Enigma Collective
Challenge in this presentation
1. Persuade necessity of privacy and neutrality
2. Wrap up the technical components in Enigma
network
3. Reveal the value which Enigma Protocol brings
もくじ
◦ Problems amongst Privacy and Neutrality
◦ Privacy-Preserving Computation Infrastructure
"Enigma"
◦ Enigma's Future
もくじ
◦ Problems amongst Privacy and Neutrality
◦ Privacy-Preserving Computation Infrastructure
"Enigma"
◦ Enigma's Future
<Privacy Problem>
People are losing control over their own data
Kept with lawfulness,
fairness and
transparency?
Utilized within limited
purpose?
Data collection is
minimised?
Updated at proper
moments and strictly
correct?
Freed after storage
time limit?
Stored under secured
environment?
◦ To get back control over what you’ve share ...
<The Nature of Privacy Problem>
Different from physical stuffs, sharing data is irreversible action
How to prove
non-compromised?
How to prove
deletion?
Pass and...
Just ask to give back
Pass and...
Incaseofphysical
stuffs
Incaseofdata
Almost impossible to prove what
is going on behind the system
◦ To achieve something commercially or politically, service providers
might get rid of data that is inconvenient to them.
◦ E.g.
▫ Recommendation Engine
▫ Script about:
■ History
■ Process
■ Definition
▫ Price signals
◦ As more people depend on
data service like AI, its impact
increases.
<Neutrality Problem>
No chance to know what’re the ingredients of the service
Hence exposed to information bias
To achieve fairness is difficult.
Even companies can’t eat bitter veges
like boys.
Index
◦ Problems amongst Privacy and Neutrality
◦ Privacy-Preserving Computation
Infrastructure "Enigma"
◦ Enigma's Future
★Enigma in sMPC mode
<Enigma’s natural value>
Enigma keeps data provider’s control over their own data while letting
the data be utilized
Enigma Network
許可 許可
Secret contract brings
transparency of process
Raw Data
Data fragments are
distributed to multiple
nodes evenly (SSS)
Can’t reconstruct raw data w/o
each data provider’s private key
Contract can’t do
computation on data w/o
permission
★Additive/Multiplicative Homomorphism = Functional Completeness
<Enigma’s feature>
Raw data never appears on any node during computation even once.
Combination of SSS and SHE computation breaks this contradiction.
Computation on Enigma in sMPC mode
E.g. plain amounting
Result can be
reconstructed in
plain text
★Reliability of Trusted Execution Environment(TEE) is depending on
sanity of CPU’s vendor, much better performance than sMPC though.
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Attest Genuine
Intel CPU + DH
Key Exchange
SGX module is
anti-tampering
★Reliability of Trusted Execution Environment(TEE) is depending on
sanity of CPU’s vendor, much better performance than sMPC though.
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Special memory allocation (enclave)
that can be read only by SGX module.
Encrypted by common key
that is exchanged through DH
★ Secret contract execution with data  and
Other’s data stored
in Enclave
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Attest Genuine
Intel CPU + DH
Key Exchange
★ Secret contract execution with data  and
Dec
Dec
Re-re-encrypted
data in Enclave
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Re-encrypted by common key
that is exchanged through DH
★ Secret contract execution with data  and
Dec & Run
<Enigma's computation mode varieties>
Enigma has Hardware-based Computation mode (TEE) other than
sMPC. A kind of trade-off between decentralization and performance
Result
もくじ
◦ Problems amongst Privacy and Neutrality
◦ Privacy-Preserving Computation Infrastructure
"Enigma"
◦ Enigma's Future
Improve conventional schemes [ 1 to 10 ] Brand new schemes < 0 to 1 >
Replace conventional schemes and keep
privacy and neutrality safe
Schemes that were infeasible before Enigma
era
<Enigma’s solutions>
[ 1 to 10 ] and [ 0 to 1 ] by Enigma
Voting, Auction
Credit scoring, ID
Hedge fund,
Price signals
………
Information bank infrastructure
* Infrastucture for conventional personal data
exchange and data brokers where incentive
system is add-on by default
See the next slide
★Payment condition can be defined by contracts.
E.g. paid by each usage of built service to which data has contributed
Contribute
Re-usable result might be
sold as well
E.g. Index, Folded value,
Transfer leaning model,
Clustered data, e.t.c
Same class
data providers
<Enigma Data Marketplace (Infrastructure of Data Bank>
Data provision might be a new pipeline of income for general people.
Incentivization might gather more quantity and variety of data
Contract distributes
reward to each data
provider from deposit
< Enigma’s issues >
Enigma holds foreseeable issues.
Research might be required to solve them.
Technical issues Political issues
1. Few can read secret contract
Conversion from secret contract to natural
language expression might be helpful to bring
equity amongst people.
2. Some expression in contract must be
banned
Because sMPC’s result is plain text.
3. Performance problem with sMPC
Especially multiplication (inconstant)
1. Loss of methods to detect anti-social
organization
Without central administrator, government
can’t pull out anti-social organization’s data
forcibly. I suggest ERC792 might be a way to
solve this. Voting on whether reveal a specific
data or not amongst node runners.
2. Strongly depending on marketing
technologies already
At the sacrifice of privacy, modern marketing
tools have developed and web business
depends on it strongly.
To catch up this scene, tools on Enigma must
do an extra effort.
trans

More Related Content

Similar to Privacy and Neutrality v0.1.0

A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...asambhavishya
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
The Quest for Enterprise Blockchain Solutions.
The Quest for Enterprise Blockchain Solutions.The Quest for Enterprise Blockchain Solutions.
The Quest for Enterprise Blockchain Solutions.Fran Strajnar
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themMuhammedYaseen39
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...ieeepondy
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 BlockchainHub Graz
 

Similar to Privacy and Neutrality v0.1.0 (20)

A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
2
22
2
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
The Quest for Enterprise Blockchain Solutions.
The Quest for Enterprise Blockchain Solutions.The Quest for Enterprise Blockchain Solutions.
The Quest for Enterprise Blockchain Solutions.
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing them
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5
 

Recently uploaded

9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 

Recently uploaded (20)

9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 

Privacy and Neutrality v0.1.0

  • 1. Privacy and Neutrality in Data Era Cho Jang Sa as Enigma Collective
  • 2. Challenge in this presentation 1. Persuade necessity of privacy and neutrality 2. Wrap up the technical components in Enigma network 3. Reveal the value which Enigma Protocol brings
  • 3. もくじ ◦ Problems amongst Privacy and Neutrality ◦ Privacy-Preserving Computation Infrastructure "Enigma" ◦ Enigma's Future
  • 4. もくじ ◦ Problems amongst Privacy and Neutrality ◦ Privacy-Preserving Computation Infrastructure "Enigma" ◦ Enigma's Future
  • 5. <Privacy Problem> People are losing control over their own data Kept with lawfulness, fairness and transparency? Utilized within limited purpose? Data collection is minimised? Updated at proper moments and strictly correct? Freed after storage time limit? Stored under secured environment?
  • 6. ◦ To get back control over what you’ve share ... <The Nature of Privacy Problem> Different from physical stuffs, sharing data is irreversible action How to prove non-compromised? How to prove deletion? Pass and... Just ask to give back Pass and... Incaseofphysical stuffs Incaseofdata Almost impossible to prove what is going on behind the system
  • 7. ◦ To achieve something commercially or politically, service providers might get rid of data that is inconvenient to them. ◦ E.g. ▫ Recommendation Engine ▫ Script about: ■ History ■ Process ■ Definition ▫ Price signals ◦ As more people depend on data service like AI, its impact increases. <Neutrality Problem> No chance to know what’re the ingredients of the service Hence exposed to information bias To achieve fairness is difficult. Even companies can’t eat bitter veges like boys.
  • 8. Index ◦ Problems amongst Privacy and Neutrality ◦ Privacy-Preserving Computation Infrastructure "Enigma" ◦ Enigma's Future
  • 9. ★Enigma in sMPC mode <Enigma’s natural value> Enigma keeps data provider’s control over their own data while letting the data be utilized Enigma Network 許可 許可 Secret contract brings transparency of process Raw Data Data fragments are distributed to multiple nodes evenly (SSS) Can’t reconstruct raw data w/o each data provider’s private key Contract can’t do computation on data w/o permission
  • 10. ★Additive/Multiplicative Homomorphism = Functional Completeness <Enigma’s feature> Raw data never appears on any node during computation even once. Combination of SSS and SHE computation breaks this contradiction. Computation on Enigma in sMPC mode E.g. plain amounting Result can be reconstructed in plain text
  • 11. ★Reliability of Trusted Execution Environment(TEE) is depending on sanity of CPU’s vendor, much better performance than sMPC though. <Enigma's computation mode varieties> Enigma has Hardware-based Computation mode (TEE) other than sMPC. A kind of trade-off between decentralization and performance Attest Genuine Intel CPU + DH Key Exchange SGX module is anti-tampering
  • 12. ★Reliability of Trusted Execution Environment(TEE) is depending on sanity of CPU’s vendor, much better performance than sMPC though. <Enigma's computation mode varieties> Enigma has Hardware-based Computation mode (TEE) other than sMPC. A kind of trade-off between decentralization and performance Special memory allocation (enclave) that can be read only by SGX module. Encrypted by common key that is exchanged through DH
  • 13. ★ Secret contract execution with data  and Other’s data stored in Enclave <Enigma's computation mode varieties> Enigma has Hardware-based Computation mode (TEE) other than sMPC. A kind of trade-off between decentralization and performance Attest Genuine Intel CPU + DH Key Exchange
  • 14. ★ Secret contract execution with data  and Dec Dec Re-re-encrypted data in Enclave <Enigma's computation mode varieties> Enigma has Hardware-based Computation mode (TEE) other than sMPC. A kind of trade-off between decentralization and performance Re-encrypted by common key that is exchanged through DH
  • 15. ★ Secret contract execution with data  and Dec & Run <Enigma's computation mode varieties> Enigma has Hardware-based Computation mode (TEE) other than sMPC. A kind of trade-off between decentralization and performance Result
  • 16. もくじ ◦ Problems amongst Privacy and Neutrality ◦ Privacy-Preserving Computation Infrastructure "Enigma" ◦ Enigma's Future
  • 17. Improve conventional schemes [ 1 to 10 ] Brand new schemes < 0 to 1 > Replace conventional schemes and keep privacy and neutrality safe Schemes that were infeasible before Enigma era <Enigma’s solutions> [ 1 to 10 ] and [ 0 to 1 ] by Enigma Voting, Auction Credit scoring, ID Hedge fund, Price signals ……… Information bank infrastructure * Infrastucture for conventional personal data exchange and data brokers where incentive system is add-on by default See the next slide
  • 18. ★Payment condition can be defined by contracts. E.g. paid by each usage of built service to which data has contributed Contribute Re-usable result might be sold as well E.g. Index, Folded value, Transfer leaning model, Clustered data, e.t.c Same class data providers <Enigma Data Marketplace (Infrastructure of Data Bank> Data provision might be a new pipeline of income for general people. Incentivization might gather more quantity and variety of data Contract distributes reward to each data provider from deposit
  • 19. < Enigma’s issues > Enigma holds foreseeable issues. Research might be required to solve them. Technical issues Political issues 1. Few can read secret contract Conversion from secret contract to natural language expression might be helpful to bring equity amongst people. 2. Some expression in contract must be banned Because sMPC’s result is plain text. 3. Performance problem with sMPC Especially multiplication (inconstant) 1. Loss of methods to detect anti-social organization Without central administrator, government can’t pull out anti-social organization’s data forcibly. I suggest ERC792 might be a way to solve this. Voting on whether reveal a specific data or not amongst node runners. 2. Strongly depending on marketing technologies already At the sacrifice of privacy, modern marketing tools have developed and web business depends on it strongly. To catch up this scene, tools on Enigma must do an extra effort. trans