How will blockchain + privacy computing change the world?

“Many of the companies entering privacy computing are companies with a blockchain background.” One Think Tank discovered such a phenomenon when researching the development trend of privacy computing.

Since the end of 2017, blockchain has exploded and is considered to be a technology that changes the world. Although subsequent development has proved that a considerable part of the explosion of the blockchain is a bubble, since 2017, the blockchain has still achieved considerable development. At the same time, privacy computing is developing rapidly. As the only technical solution that can realize data “available and invisible” at present, privacy computing can balance the contradiction between data utilization and data protection, and is considered to be the infrastructure of the future digital society.

Why are these two technologies that are supposed to change the future? What will the combination of the two change?

On April 25, 2022, the release and seminar of “Ecological Remodeling: Blockchain + Privacy Computing Front-line Practice Report” sponsored by “Lujiazui” magazine and 01 Finance and 01 Think Tank was successfully held online.

At the seminar, Wenquan, a senior analyst at Zero One Think Tank, released the “Ecological Remodeling: Blockchain + Privacy Computing Frontline Practice Report” and explained and shared it. Zhang Xuanpu, head of product line, Xia Jianshu, senior solution expert of Ant Group’s digital technology line, Liu Xin, product leader of privacy computing product of QuChain Technology, Liu Jiang, product leader of blockchain privacy computing product of Tencent Cloud, and other guests focused on blockchain and privacy computing. He shared his views from multiple dimensions such as technology and application.

Zero One Think Tank released “Ecological Remodeling: Blockchain + Privacy Computing Front-line Practice Report”

Spring One, a senior analyst at Zero One Think Tank, said, “Ecological Remodeling: Blockchain + Privacy Computing Front-line Practice Report” was jointly released by Zero One Finance, Zero One Think Tank and “Lujiazui” magazine, with research support provided by Ant Chain and Eight Components. . Through in-depth interviews with more than 10 representative companies at home and abroad, the report studies the current history, current situation and future trends of the combination of blockchain and privacy computing.

The report believes that the combination of blockchain and privacy computing is inevitable, and the two are just in need of each other. Without privacy computing, blockchain cannot solve the problem of privacy protection, and cannot provide services for more data sources; without blockchain, privacy computing cannot solve the problems of data rights confirmation and benefit distribution, and multi-party data collaboration is difficult to achieve.

Hot Spring said that there are currently five representative exploration directions for the application of blockchain and privacy computing: 1. Solving single-point practical problems; 2. Expanding the application scope of alliance chains; 3. Providing network security-related services; 4. Establish a blockchain + privacy computing basic platform that provides services for enterprises; 5. Establish a blockchain + privacy computing basic platform that provides services for enterprises and individuals at the same time.

How will blockchain + privacy computing change the world?

The combination of blockchain and privacy computing will form a large-scale data circulation network in the future and promote the development of data assetization. At the same time, it will make the whole society redefine data rights and responsibilities and benefit distribution mechanism.

At present, the combination of blockchain and privacy computing technology has not been widely promoted. The report believes that this is mainly caused by two reasons: on the one hand, because the combination of the two is mainly to solve the problem of multi-party data collaboration, and the actual demand has not yet erupted; on the other hand, because the combination of the two involves the formation of new business models , The redistribution of powers and responsibilities and interests will require more time.

Hot Spring said that in the future, the application of the combination of blockchain and privacy computing needs three prerequisites: first, the improvement of the digitalization of the whole society; second, the further maturity of technology; third, the improvement of laws and regulations and data transaction business pattern formation. Among them, the first two conditions are more critical.

Finally, Wenquan pointed out that there are two important trends in the combination of blockchain and privacy computing technology:

First, the application of blockchain + privacy computing involves network security and data security, and will become an important part of new infrastructure in the future. This is an important aspect related to cyberspace sovereignty, national security and future development interests, so localization in this field is a future trend.

Second, at present, in the practice of combining blockchain and privacy computing technology, there is also a trend of combining software and hardware technologies and developing more technologies.

From the perspective of technology and value, “blockchain + privacy computing”

  • Privacy computing + blockchain solves the problem of data credibility and security sharing

At the seminar, Zhang Xuanpu, head of the privacy computing and cross-chain big data platform product line of Eight Component Information Technology Co., Ltd., delivered a keynote speech entitled “Research on a New Paradigm of Data Security Sharing for Privacy Computing Platforms”.

In practical applications, the first practical case shared by Zhang Xuanpu is the application of integrating blockchain and factor computing to verify multi-party data and improve data reliability. He cited the example of overseas shopping. In the process of overseas shopping, there is a large amount of data on product descriptions, merchant waybills, and supermarket purchase records, but these data are very easy to forge, and users cannot verify their authenticity. At the same time, there is also a key problem in the verification process. The upstream and downstream information of the data is generally the core data of the upstream and downstream enterprises, and these data cannot be sent to the demander for inspection.

Zhang Xuanpu proposed a solution: check whether the core data of the supply chain is credible through blockchain and privacy calculations in the upstream and downstream of the industry supply chain, and after the inspection, use the blockchain to make the data of false information non-repudiation. Faced with separate data such as contract flow, invoice flow, logistics, and capital flow, as well as data stored in a decentralized manner, a trusted basic chain of privacy computing is introduced to complete trusted analysis, and measure data credibility through mutual trust enhancement between data.

The second practical application is to solve the problem of secure sharing of data. Following the idea of ​​building a unified national market, Eight Components provides a data sharing platform serving various industries and regions. The biggest feature of this platform is the ability to publish and search data based on blockchain. In practical applications, under the guidance of the industry association, each member unit in the industry imports the data that they can circulate into the privacy computing node of the enterprise, and the data sharing platform does the corresponding sorting, including the original data of the data elements, from which some data names are obtained. , data content, data start date, update cycle, etc., and configure accordingly.

The third application is not only the application of blockchain privacy computing, but also the technology of trusted computing in practice. For example, it provides enterprise operation monitoring for a state ministry and commission, calculates enterprise operation index evaluation, and supports the integration of third-party data during the evaluation process. In the project, the data party is most concerned about how to ensure data security in the data storage phase, how to ensure that data is not leaked in the data fusion phase, and any operation in the data life cycle can be strongly audited and traced to the source.

  • Privacy Computing + Blockchain: A New Generation of Data Circulation

Liu Xin, head of privacy computing products at FunChain Technology, delivered a keynote speech entitled “Blockchain + Privacy Computing: A New Generation of Data Circulation”. Liu Xin said that due to the characteristics of data decentralization, timeliness, non-exclusivity, unlimited supply and what you see is what you get, problems such as data theft and leakage are likely to occur. Privacy computing can only solve some of the above problems. Real-time dynamic pricing of data, separation of use rights and ownership rights need to be solved by blockchain technology.

Liu Xin believes that when multiple parties cannot directly share data, there is a need for privacy computing, and when multiple parties do not trust each other, blockchain is a very good tool to reduce the cost of system trust.

To build a distributed data transaction platform with private computing and blockchain as the core, firstly, a trusted alliance can be built through the blockchain, and then private computing nodes can be introduced to record the computing process on the blockchain. Finally, according to the records Data is used for the settlement of assets and transactions, and blockchain technology acts as a third party to ensure that data asset transactions within the entire alliance are more fair and just. FunChain Technology has opened up the above technologies and launched BitXMesh, a data collaboration platform based on “blockchain + privacy computing”.

In terms of data transaction scenarios, it mainly includes joint marketing, anti-fraud, corporate credit investigation and new drug research and development. Taking the typical business of Qulian Technology as an example, Liu Xin mainly introduced the application of its technology in corporate joint financing credit reporting scenarios, financial risk data collaborative analysis platform and medical research collaboration platform. BitXMesh, the data collaboration platform of FunChain Technology, can protect the data security and privacy security of all parties, solve the problem of data credibility of all parties, and ensure fair and just sharing of data among all parties.

  • Blockchain + privacy computing to help realize data value

In his keynote speech “How Blockchain Privacy Computing Realizes the ‘Beauty’ of Data Value”, Liu Jiang, head of Tencent Cloud’s blockchain privacy computing product, said that blockchain + privacy computing can better achieve data collaboration.

Liu Jiang believes that in the process of developing the digital economy, data itself is an important definition of enterprise value. Using computing power and algorithms as a production engine to maximize the value of auxiliary data, combined with data as production materials, the value of data can be exerted in various scenarios or industries. On this basis, data can be combined with other traditional production factors (such as land, capital, labor, etc.) to double the value of data, optimize resources, and drive the development of related factors.

When using data, it will also face the following problems and challenges: how to protect the data property rights of data assets, how to protect the privacy of users involved in the process of data collaboration, how to use effective technical means to match data between supply and demand parties, and Data as a special asset has risks and regulatory issues in terms of security, privacy, sharing.

Based on this, Liu Jiang said that blockchain + privacy computing can better achieve data collaboration. Privacy and secure computing is the best technical implementation of data privacy protection at present. It truly does not share data but can share data value, while blockchain can be used to realize data sharing collaborative process scheduling and process auditability, which can be based on blockchain. Synchronize the task status and execution in the process of privacy computing collaboration to achieve task process scheduling in the entire privacy computing process. Therefore, based on blockchain and privacy computing, Liu Jiang mentioned four security and trustworthiness, namely: ensuring data security and availability. Trust, model security and trustworthiness, and externally provided data applications are secure and trustworthy, and the most important core is to ensure computing security and trustworthiness.

Liu Jiang finally said that the data value brought by the flow of data elements is becoming more and more important, and a large amount of data information has been cleaned and turned into data resources. By capitalizing or capitalizing data, the value of data will be maximized, and blockchain + privacy computing technology is one of the best ways to maximize the value of data.

  • A single technology cannot solve the problem, and it is necessary to build a fusion technology base

Xia Jianshu, a senior solution expert of Ant Group’s digital technology line, gave a keynote speech at the meeting on “Building a Fusion Technology Base to Help Data Value Creation”. Xia Jianshu believes that in the past, the industry focused more on the full life cycle of data, but in fact we have entered the next stage – looking at product, market and customer needs from the full life cycle of data commercialization and marketization.

Under the trend of marketization, including public data, commercial data and trading platform data, controllable and manageable data is the premise of all business. Xia Jianshu pointed out that some customers cannot see the value brought by privacy computing. Behind this problem, there are data islands, data business processes, and a large number of data scattered, which makes it difficult to do a good job of data assets at the beginning of the business. collection and processing.

Faced with these problems, it is difficult to solve with a privacy computing platform or a single technology, but needs to be processed in the whole life cycle in a market-oriented context.

For example, for commercial data assets, what we need to do is not only from collection to transmission to storage to consumption, but also to see that the collection needs to be standardized, and the exchange needs to have an open ecosystem. Problems in data circulation, interconnection, integration and other aspects need to be solved, and what is needed is the overall plan and idea of ​​the integration of blockchain and privacy computing.

Xia Jianshu believes that we need to find a balance between different data types, management compliance requirements, and customer business scenarios. To this end, he provided an idea: from the data source to the final data use, the first thing to do is to collect, collect and process the data, and then to classify and grade the data, and to share, approve, authorize, Key generation to deal with different strategies.

Application exploration: What kind of “blockchain + privacy computing” products does the market need?

Xia Jianshu, senior solution expert of Ant Group’s digital technology line , said that many customers bought a separate platform but did not fully use it. The reason is that the scene is not penetrated or the data is not ready, so the product should establish a complete “data security + privacy computing” system In the face of more and more data assets, data scenarios, and online and offline businesses in the future, it is necessary to further extend and expand privacy computing capabilities and data security capabilities based on the bottom line of compliance.

Liu Jiang, head of Tencent Cloud blockchain privacy computing products , said that the company’s cooperative enterprises pay more attention to the core capabilities of privacy computing products in the following three aspects: 1) In terms of security, data privacy and security are the first; 2) In the Internet field In terms of data sharing and collaboration, in the case of a large amount of data, a large number of samples and latitudes, etc., the performance of data sharing and collaboration processing is the key point of concern for enterprises, such as processing requirements and real-time performance; 3) The completeness of privacy computing product functions .

Liu Jiang said that based on the above three concerns, we must follow three core principles when making privacy computing products: First, set a dynamic and agile demand model based on actual needs, and integrate multiple technologies to form complementary advantages. The second is to select the optimal security assumption model under the premise of balancing business needs, prove product security and business practice security, integrate security defense capabilities, and immediately suspend calculation execution after security problems are discovered to achieve risk isolation. The third is to improve performance from multiple dimensions such as hardware, algorithms, communication, and computing methods. Performance cannot be improved by sacrificing security.

Posted by:CoinYuppie,Reprinted with attribution to:
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.

Like (0)
Donate Buy me a coffee Buy me a coffee
Previous 2022-04-29 22:04
Next 2022-04-29 22:09

Related articles