SlideShare a Scribd company logo
1 of 34
Download to read offline
© Hitachi, Ltd. 2021. All rights reserved.
June 10th, 2021
Hitachi, Ltd., Research and Development Group
Koshi Ikegawa, and Nao Nishijima
Trust Data Sharing and Utilization Infrastructure
for Sensitive Data using Hyperledger Avalon
Hyperledger Global Forum 2021 Virtual 2 / ●Business
© Hitachi, Ltd. 2021. All rights reserved.
Contents
1. Introduction
2. Design and Approach
3. Work in Progress
4. Summary
1
© Hitachi, Ltd. 2021. All rights reserved.
Contents
1. Introduction
2. Design and Approach
3. Work in Progress
4. Summary
2
© Hitachi, Ltd. 2021. All rights reserved.
Increasing demand for trust data sharing & utilization
Market
3
Data Free Flow with Trust (DFFT) is advocated by the World Economic Forum (2019)
❚ Focus on cross border data flows
u Blockchain is needed
❚ There are many types of data to share
u Open data: map, news, disaster info, etc...
u Sensitive data: healthcare, government, personal, etc...
© Hitachi, Ltd. 2021. All rights reserved.
In our use case, we created an infrastructure to manage and utilize genome data
in multiple organizations and has confirmed PoC [1]
Background
4
1. Koshi Ikegawa, Nao Nishijima, Yoji Ozawa, Katsuhiro Fukunaka, Hironori Emaru, Masaru Hisada, Akihito Kaneko, Eiichi Araki, Ai Okada and Yuichi Shiraishi. Secure and Traceable System for Genomic Data Sharing Using Hyperledger
Fabric Blockchain (in Japanese). IIBMP2020, September 2020.
❚ Multiple organizations are participating in a blockchain network for genome data sharing
❚ Raw genome data must not be passed on to other organizations because the data is sensitive data
❚ Analyze the data on the processor of the data owner org and pass only the results to other orgs
Org A
Org C
Org D
Org B
Patients
Genome Data Storage
Data Processer
Doctor
Doctor Result
Request Load store
© Hitachi, Ltd. 2021. All rights reserved.
Org A
Org C
Org D
Org B
Motivation
5
❚ Personal data, such as genome data needs to be handled with particular care in accordance with
the law
❚ Focus on the following three to realize the infrastructure
Realize Trust Data Sharing and Utilization Infrastructure for Sensitive Data
Genome Data Storage
Data Processer
Doctor
Doctor
1. Trust Encryption 2. Trust Processing 3. Trust Data Load
© Hitachi, Ltd. 2021. All rights reserved.
Org A
Org C
Org D
Org B
Motivation
6
❚ Personal data, such as genomic information needs to be handled with particular care in accordance
with the law
❚ Focus on the following three to realize the infrastructure
Realize Trust Data Sharing and Utilization Infrastructure for Sensitive Data
Genome Data Storage
Data Processer
Doctor
Doctor
3. Trust Data Load
1. Trust Encryption 2. Trust Processing
Hyperledger Avalon Enable to Trust Encryption and Processing
© Hitachi, Ltd. 2021. All rights reserved.
Org A
Doctor
What is Hyperledger Avalon
7
Avalon is a Hyperledger project to realize Off-chain Trusted Computing
❚ Avalon is the first and only implementation of EEAʼs1 Off-Chain Trusted Compute Specification
❚ Avalon guarantees a trust execution of a program in the protected area by CPU native
secure function (Trusted Execution Environment)
Org B
Trusted Execution Environment
Result
Request Peer Avalon
Blockchain
Connector
Avalon
Client
Peer
encrypt
decrypt
encrypt
decrypt
Chaincode
Simplified Hyperledger Avalon Architectural Diagram
Guarantee trust of processing
© Hitachi, Ltd. 2021. All rights reserved.
What is Trusted Execution Environment (TEE)
8
Trusted Execution Environment is CPU Security Technology
❚ TEE is a CPU security function that generates a protected area called enclave in memory and loads
programs and data into the area, enabling programs to be executed while protecting sensitive data
u Provided by CPU vendors such as Intel Software Guard Extensions (SGX), ARM TrustZone, AMD Secure
Encrypted Virtualization (SEV), etc.
❚ In Hyperledger Avalon, Intel SGX is being used for implementation.
u In Intel SGX, the encrypted area in memory is called Enclave.
© Hitachi, Ltd. 2021. All rights reserved.
Org A
Org C
Org D
Org B
Focus Point in This Session
9
Enable to Trust Data Load
Genome Data Storage
Data Processer
Doctor
Doctor
1. Trust Encryption 2. Trust Processing 3. Trust Data Load
© Hitachi, Ltd. 2021. All rights reserved.
Contents
1. Introduction
2. Design and Approach
3. Work in Progress
4. Summary
10
© Hitachi, Ltd. 2021. All rights reserved.
Unable to verify the correctness of data on private storage
Issue
11
Org A
Org C
Org D
Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Load
Really correct data was loaded?
© Hitachi, Ltd. 2021. All rights reserved.
Unable to verify the correctness of data on private storage
Design Idea
12
Org A
Org C
Org D
Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Load
Really correct data was loaded?
Data Verify
Verifying loaded data in Avalon Protected Area
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 1: store raw genome data & metadata
13
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
store raw genome data
invoke: genome metadata
Chaincode
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 2: Access control
14
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
invoke: request access right
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A
Chaincode
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 2: Access control
15
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
invoke: accept access right
invoke: request access right
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
Chaincode
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
16
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
invoke: analyze task
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
17
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
invoke: analyze task
check access right
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
18
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task
Genome Data 001 Org A xxxxxxxx
write task request
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
19
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task
Genome Data 001 Org A xxxxxxxx
query: task
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
20
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task
Genome Data 001 Org A xxxxxxxx
Load
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
21
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task
Genome Data 001 Org A xxxxxxxx
Load
calculate hash value from loaded data
Calculated Hash
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
22
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task
Genome Data 001 Org A xxxxxxxx
Load
query: hash value
calculate hash value from loaded data
Calculated Hash
Managed Hash
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
23
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task
Genome Data 001 Org A xxxxxxxx
Calculated Hash
Managed Hash
Verify hash value
© Hitachi, Ltd. 2021. All rights reserved.
Approach | Step 3: Analyze Task Request
24
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task Result
Genome Data 001 Org A xxxxxxxx yyyyyyy
Analyze
Return results
© Hitachi, Ltd. 2021. All rights reserved.
Org A
Org C
Org D
Org B
Realize trust infrastructure
25
By using Avalon and implementing our approach, we can realize a trustworthy
data utilization infrastructure.
Genome Data Storage
Data Processer
Doctor
Doctor
3. Trust Data Load
1. Trust Encryption 2. Trust Processing
Our approach
© Hitachi, Ltd. 2021. All rights reserved.
Contents
1. Introduction
2. Design and Approach
3. Work in Progress
4. Summary
26
© Hitachi, Ltd. 2021. All rights reserved.
Further improvements
27
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
We can improve our infrastructure even further
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task Result
Genome Data 001 Org A xxx yyy
Encrypted using Avalon
Not encrypted
(because processing in on-chain is required)
© Hitachi, Ltd. 2021. All rights reserved.
Further improvements
28
Org A Org B
Genome Data Storage
Avalon Protected Area
Doctor
Doctor
Peer Peer
Chaincode
We can improve our infrastructure even further
State DB: Metadata Management
Data name Owner Hash Value
Genome Data 001 Org B Doctor 00aa11bb22cc...
State DB: Access Management
Data name Access Request Access Approval
Genome Data 001 Org A Org A
State DB: Analyze Task Management (Avalon)
Data name Requester Task Result
Genome Data 001 Org A xxx yyy
No need for encryption
(Metadata is shared info)
Should be encrypted
(Information about who requested
access should be kept confidential)
© Hitachi, Ltd. 2021. All rights reserved.
Work in Progress
We are trying to use Hyperledger Fabric Private Chaincode!
❚ Hyperledger Fabric Private Chaincode (FPC) enables the execution of chaincodes using Trusted
Execution Environment
❚ The combination of Avalon and Fabric Private Chaincode can make both On-chain and Off-
chain trustworthy
❚ We have started
u try to use FPC
u contact FPC community
u contribute to FPC
© Hitachi, Ltd. 2021. All rights reserved.
Contents
1. Introduction
2. Design and Approach
3. Work in Progress
4. Summary
30
© Hitachi, Ltd. 2021. All rights reserved.
Summary
31
Org A
Org C
Org D
Org B
Genome Data Storage
Data Processer
Doctor
Doctor
3. Trust Data Load
1. Trust Encryption 2. Trust Processing
Our approach
❚ We introduced one of implementation to realize a trusted infrastructure for sharing & utilizing
sensitive data
❚ With Avalon and our approach, we have made the following three points into a trust
❚ We are trying to use Hyperledger Fabric Private Chaincode for make both On-chain and Off-chain
more trustworthy
© Hitachi, Ltd. 2021. All rights reserved.
Thursday, June 10th, 2021
Hitachi, Ltd., Research and Development Group
Koshi Ikegawa, and Nao Nishijima
Trust Data Sharing and Utilization Infrastructure
for Sensitive Data using Hyperledger Avalon
Hyperledger Global Forum 2021 Virtual 2 / ●Business

More Related Content

What's hot

Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 
Challenges of applying Blockchain to enterprise systems in NTTDATA
Challenges of applying Blockchain to enterprise systems in NTTDATAChallenges of applying Blockchain to enterprise systems in NTTDATA
Challenges of applying Blockchain to enterprise systems in NTTDATAHyperleger Tokyo Meetup
 
Blockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every ThingBlockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every ThingRids Vazi
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Enhance security, reliability & efficiency with blockchain technology
Enhance security, reliability & efficiency with blockchain technologyEnhance security, reliability & efficiency with blockchain technology
Enhance security, reliability & efficiency with blockchain technologyArpitGautam20
 
1 croreprojects dotnet ppt
1 croreprojects dotnet ppt1 croreprojects dotnet ppt
1 croreprojects dotnet pptKumar Dlk
 
Distributed Ledgers and IoT
Distributed Ledgers and IoTDistributed Ledgers and IoT
Distributed Ledgers and IoTTiE Bangalore
 
bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)sandhibhide
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologiesdsapps
 
Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...Real-Time Innovations (RTI)
 
Introduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoTIntroduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoTAltoros
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CityPeter Waher
 
Vortex Tutorial -- Part I
Vortex Tutorial -- Part IVortex Tutorial -- Part I
Vortex Tutorial -- Part IAngelo Corsaro
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesBart Jonkers
 
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsVortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsAngelo Corsaro
 
Bilski: Effect on patentability of Software and Business Method patent applic...
Bilski: Effect on patentability of Software and Business Method patent applic...Bilski: Effect on patentability of Software and Business Method patent applic...
Bilski: Effect on patentability of Software and Business Method patent applic...Arun Narasani
 

What's hot (20)

Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Challenges of applying Blockchain to enterprise systems in NTTDATA
Challenges of applying Blockchain to enterprise systems in NTTDATAChallenges of applying Blockchain to enterprise systems in NTTDATA
Challenges of applying Blockchain to enterprise systems in NTTDATA
 
Blockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every ThingBlockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every Thing
 
Top Benefits of ITIL Certification
Top Benefits of ITIL CertificationTop Benefits of ITIL Certification
Top Benefits of ITIL Certification
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Enhance security, reliability & efficiency with blockchain technology
Enhance security, reliability & efficiency with blockchain technologyEnhance security, reliability & efficiency with blockchain technology
Enhance security, reliability & efficiency with blockchain technology
 
1 croreprojects dotnet ppt
1 croreprojects dotnet ppt1 croreprojects dotnet ppt
1 croreprojects dotnet ppt
 
Distributed Ledgers and IoT
Distributed Ledgers and IoTDistributed Ledgers and IoT
Distributed Ledgers and IoT
 
bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologies
 
Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...
 
Introduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoTIntroduction to Microsoft Azure IoT
Introduction to Microsoft Azure IoT
 
Smart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart CitySmart City Lecture 3 - An Open And/Or Secure Smart City
Smart City Lecture 3 - An Open And/Or Secure Smart City
 
Vortex Tutorial -- Part I
Vortex Tutorial -- Part IVortex Tutorial -- Part I
Vortex Tutorial -- Part I
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approaches
 
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsVortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
 
Bilski: Effect on patentability of Software and Business Method patent applic...
Bilski: Effect on patentability of Software and Business Method patent applic...Bilski: Effect on patentability of Software and Business Method patent applic...
Bilski: Effect on patentability of Software and Business Method patent applic...
 

Similar to Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hyperledger Avalon

Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...
Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...
Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...Koshi Ikegawa
 
Apache Kafka and the Data Mesh | Michael Noll, Confluent
Apache Kafka and the Data Mesh | Michael Noll, ConfluentApache Kafka and the Data Mesh | Michael Noll, Confluent
Apache Kafka and the Data Mesh | Michael Noll, ConfluentHostedbyConfluent
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
The Flow of Data - Managing Data from Ingestion Through Trial
The Flow of Data - Managing Data from Ingestion Through TrialThe Flow of Data - Managing Data from Ingestion Through Trial
The Flow of Data - Managing Data from Ingestion Through TrialIpro Tech
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data GovLoop
 
Big data, data science & fast data
Big data, data science & fast dataBig data, data science & fast data
Big data, data science & fast dataKunal Joshi
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...CTI Group
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesPistoia Alliance
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
 
DataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDATAVERSITY
 
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleLeveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleDatabricks
 
Breakout: Hadoop and the Operational Data Store
Breakout: Hadoop and the Operational Data StoreBreakout: Hadoop and the Operational Data Store
Breakout: Hadoop and the Operational Data StoreCloudera, Inc.
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docpraveena06
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023VictoriaMeisel
 
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Denodo
 
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...Big Data Value Association
 
ESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXCatalogic Software
 

Similar to Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hyperledger Avalon (20)

Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...
Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...
Demo: Infrastructure for Managing, Sharing, and Utilizing Sensitive Data usin...
 
Apache Kafka and the Data Mesh | Michael Noll, Confluent
Apache Kafka and the Data Mesh | Michael Noll, ConfluentApache Kafka and the Data Mesh | Michael Noll, Confluent
Apache Kafka and the Data Mesh | Michael Noll, Confluent
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
The Flow of Data - Managing Data from Ingestion Through Trial
The Flow of Data - Managing Data from Ingestion Through TrialThe Flow of Data - Managing Data from Ingestion Through Trial
The Flow of Data - Managing Data from Ingestion Through Trial
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
Big data, data science & fast data
Big data, data science & fast dataBig data, data science & fast data
Big data, data science & fast data
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Database
 
DataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data Architecture
 
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleLeveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
 
Breakout: Hadoop and the Operational Data Store
Breakout: Hadoop and the Operational Data StoreBreakout: Hadoop and the Operational Data Store
Breakout: Hadoop and the Operational Data Store
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.doc
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
 
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
 
Unit 2
Unit 2Unit 2
Unit 2
 
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
 
ESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPX
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hyperledger Avalon

  • 1. © Hitachi, Ltd. 2021. All rights reserved. June 10th, 2021 Hitachi, Ltd., Research and Development Group Koshi Ikegawa, and Nao Nishijima Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hyperledger Avalon Hyperledger Global Forum 2021 Virtual 2 / ●Business
  • 2. © Hitachi, Ltd. 2021. All rights reserved. Contents 1. Introduction 2. Design and Approach 3. Work in Progress 4. Summary 1
  • 3. © Hitachi, Ltd. 2021. All rights reserved. Contents 1. Introduction 2. Design and Approach 3. Work in Progress 4. Summary 2
  • 4. © Hitachi, Ltd. 2021. All rights reserved. Increasing demand for trust data sharing & utilization Market 3 Data Free Flow with Trust (DFFT) is advocated by the World Economic Forum (2019) ❚ Focus on cross border data flows u Blockchain is needed ❚ There are many types of data to share u Open data: map, news, disaster info, etc... u Sensitive data: healthcare, government, personal, etc...
  • 5. © Hitachi, Ltd. 2021. All rights reserved. In our use case, we created an infrastructure to manage and utilize genome data in multiple organizations and has confirmed PoC [1] Background 4 1. Koshi Ikegawa, Nao Nishijima, Yoji Ozawa, Katsuhiro Fukunaka, Hironori Emaru, Masaru Hisada, Akihito Kaneko, Eiichi Araki, Ai Okada and Yuichi Shiraishi. Secure and Traceable System for Genomic Data Sharing Using Hyperledger Fabric Blockchain (in Japanese). IIBMP2020, September 2020. ❚ Multiple organizations are participating in a blockchain network for genome data sharing ❚ Raw genome data must not be passed on to other organizations because the data is sensitive data ❚ Analyze the data on the processor of the data owner org and pass only the results to other orgs Org A Org C Org D Org B Patients Genome Data Storage Data Processer Doctor Doctor Result Request Load store
  • 6. © Hitachi, Ltd. 2021. All rights reserved. Org A Org C Org D Org B Motivation 5 ❚ Personal data, such as genome data needs to be handled with particular care in accordance with the law ❚ Focus on the following three to realize the infrastructure Realize Trust Data Sharing and Utilization Infrastructure for Sensitive Data Genome Data Storage Data Processer Doctor Doctor 1. Trust Encryption 2. Trust Processing 3. Trust Data Load
  • 7. © Hitachi, Ltd. 2021. All rights reserved. Org A Org C Org D Org B Motivation 6 ❚ Personal data, such as genomic information needs to be handled with particular care in accordance with the law ❚ Focus on the following three to realize the infrastructure Realize Trust Data Sharing and Utilization Infrastructure for Sensitive Data Genome Data Storage Data Processer Doctor Doctor 3. Trust Data Load 1. Trust Encryption 2. Trust Processing Hyperledger Avalon Enable to Trust Encryption and Processing
  • 8. © Hitachi, Ltd. 2021. All rights reserved. Org A Doctor What is Hyperledger Avalon 7 Avalon is a Hyperledger project to realize Off-chain Trusted Computing ❚ Avalon is the first and only implementation of EEAʼs1 Off-Chain Trusted Compute Specification ❚ Avalon guarantees a trust execution of a program in the protected area by CPU native secure function (Trusted Execution Environment) Org B Trusted Execution Environment Result Request Peer Avalon Blockchain Connector Avalon Client Peer encrypt decrypt encrypt decrypt Chaincode Simplified Hyperledger Avalon Architectural Diagram Guarantee trust of processing
  • 9. © Hitachi, Ltd. 2021. All rights reserved. What is Trusted Execution Environment (TEE) 8 Trusted Execution Environment is CPU Security Technology ❚ TEE is a CPU security function that generates a protected area called enclave in memory and loads programs and data into the area, enabling programs to be executed while protecting sensitive data u Provided by CPU vendors such as Intel Software Guard Extensions (SGX), ARM TrustZone, AMD Secure Encrypted Virtualization (SEV), etc. ❚ In Hyperledger Avalon, Intel SGX is being used for implementation. u In Intel SGX, the encrypted area in memory is called Enclave.
  • 10. © Hitachi, Ltd. 2021. All rights reserved. Org A Org C Org D Org B Focus Point in This Session 9 Enable to Trust Data Load Genome Data Storage Data Processer Doctor Doctor 1. Trust Encryption 2. Trust Processing 3. Trust Data Load
  • 11. © Hitachi, Ltd. 2021. All rights reserved. Contents 1. Introduction 2. Design and Approach 3. Work in Progress 4. Summary 10
  • 12. © Hitachi, Ltd. 2021. All rights reserved. Unable to verify the correctness of data on private storage Issue 11 Org A Org C Org D Org B Genome Data Storage Avalon Protected Area Doctor Doctor Load Really correct data was loaded?
  • 13. © Hitachi, Ltd. 2021. All rights reserved. Unable to verify the correctness of data on private storage Design Idea 12 Org A Org C Org D Org B Genome Data Storage Avalon Protected Area Doctor Doctor Load Really correct data was loaded? Data Verify Verifying loaded data in Avalon Protected Area
  • 14. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 1: store raw genome data & metadata 13 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer store raw genome data invoke: genome metadata Chaincode
  • 15. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 2: Access control 14 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer invoke: request access right State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Chaincode
  • 16. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 2: Access control 15 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer invoke: accept access right invoke: request access right State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A Chaincode
  • 17. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 16 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A invoke: analyze task
  • 18. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 17 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A invoke: analyze task check access right
  • 19. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 18 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Genome Data 001 Org A xxxxxxxx write task request
  • 20. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 19 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Genome Data 001 Org A xxxxxxxx query: task
  • 21. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 20 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Genome Data 001 Org A xxxxxxxx Load
  • 22. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 21 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Genome Data 001 Org A xxxxxxxx Load calculate hash value from loaded data Calculated Hash
  • 23. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 22 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Genome Data 001 Org A xxxxxxxx Load query: hash value calculate hash value from loaded data Calculated Hash Managed Hash
  • 24. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 23 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Genome Data 001 Org A xxxxxxxx Calculated Hash Managed Hash Verify hash value
  • 25. © Hitachi, Ltd. 2021. All rights reserved. Approach | Step 3: Analyze Task Request 24 State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Result Genome Data 001 Org A xxxxxxxx yyyyyyy Analyze Return results
  • 26. © Hitachi, Ltd. 2021. All rights reserved. Org A Org C Org D Org B Realize trust infrastructure 25 By using Avalon and implementing our approach, we can realize a trustworthy data utilization infrastructure. Genome Data Storage Data Processer Doctor Doctor 3. Trust Data Load 1. Trust Encryption 2. Trust Processing Our approach
  • 27. © Hitachi, Ltd. 2021. All rights reserved. Contents 1. Introduction 2. Design and Approach 3. Work in Progress 4. Summary 26
  • 28. © Hitachi, Ltd. 2021. All rights reserved. Further improvements 27 Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode We can improve our infrastructure even further State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Result Genome Data 001 Org A xxx yyy Encrypted using Avalon Not encrypted (because processing in on-chain is required)
  • 29. © Hitachi, Ltd. 2021. All rights reserved. Further improvements 28 Org A Org B Genome Data Storage Avalon Protected Area Doctor Doctor Peer Peer Chaincode We can improve our infrastructure even further State DB: Metadata Management Data name Owner Hash Value Genome Data 001 Org B Doctor 00aa11bb22cc... State DB: Access Management Data name Access Request Access Approval Genome Data 001 Org A Org A State DB: Analyze Task Management (Avalon) Data name Requester Task Result Genome Data 001 Org A xxx yyy No need for encryption (Metadata is shared info) Should be encrypted (Information about who requested access should be kept confidential)
  • 30. © Hitachi, Ltd. 2021. All rights reserved. Work in Progress We are trying to use Hyperledger Fabric Private Chaincode! ❚ Hyperledger Fabric Private Chaincode (FPC) enables the execution of chaincodes using Trusted Execution Environment ❚ The combination of Avalon and Fabric Private Chaincode can make both On-chain and Off- chain trustworthy ❚ We have started u try to use FPC u contact FPC community u contribute to FPC
  • 31. © Hitachi, Ltd. 2021. All rights reserved. Contents 1. Introduction 2. Design and Approach 3. Work in Progress 4. Summary 30
  • 32. © Hitachi, Ltd. 2021. All rights reserved. Summary 31 Org A Org C Org D Org B Genome Data Storage Data Processer Doctor Doctor 3. Trust Data Load 1. Trust Encryption 2. Trust Processing Our approach ❚ We introduced one of implementation to realize a trusted infrastructure for sharing & utilizing sensitive data ❚ With Avalon and our approach, we have made the following three points into a trust ❚ We are trying to use Hyperledger Fabric Private Chaincode for make both On-chain and Off-chain more trustworthy
  • 33.
  • 34. © Hitachi, Ltd. 2021. All rights reserved. Thursday, June 10th, 2021 Hitachi, Ltd., Research and Development Group Koshi Ikegawa, and Nao Nishijima Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hyperledger Avalon Hyperledger Global Forum 2021 Virtual 2 / ●Business