不能实现区块链数据隐私保护的方法,不属于区块链隐私保护方案
区块链隐私保护是一个非常重要的话题,许多组织和个人都在努力探索如何有效地保护区块链数据的隐私。然而,有一些方法是不能用来实现区块链数据隐私保护的,下面我们就来看看这三种方法:
加密技术加密技术是一种常用的数据安全技术,它可以有效地保护数据的安全性,但是不能用来实现区块链数据隐私保护。加密技术只能保护数据的安全性,但是不能保护数据的隐私,因为即使是加密后的数据,也可以被恶意的第三方获取。
数据屏蔽技术数据屏蔽技术是一种将数据隐藏的技术,它可以有效地将数据隐藏起来,但是并不能用来实现区块链数据隐私保护。数据屏蔽技术只能将数据隐藏起来,但是它不能阻止恶意的第三方获取数据,因此也不能用来实现区块链数据隐私保护。
数据混淆技术数据混淆技术是一种将数据混淆的技术,它可以有效地将数据混淆,从而使数据更难被破解,但是也不能用来实现区块链数据隐私保护。数据混淆技术只能将数据混淆,但是不能阻止恶意的第三方获取数据,因此也不能用来实现区块链数据隐私保护。
以上就是不能用来实现区块链数据隐私保护的三种方法:加密技术、数据屏蔽技术和数据混淆技术。虽然这些技术可以有效地保护数据的安全性,但是却不能保护数据的隐私,因此不能用来实现区块链数据隐私保护。
请查看相关英文文档
1. How does blockchain prevent data tampering
Blockchain is a new application of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. model.
Different from traditional distributed storage, the uniqueness of blockchain distributed storage is mainly reflected in two aspects: First, each node of the blockchain Complete data is stored according to the block chain structure. Traditional distributed storage generally divides the data into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure the consistency of storage, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.
No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.
The transaction information stored on the blockchain is public, but the account identity information is highly encrypted and can only be accessed with the authorization of the data owner, thus ensuring the security and personalization of the data. privacy.
Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.
Based on the above characteristics, this data storage technology can perfectly prevent the possibility of data tampering. In reality, it can also be applied to many fields. It is better than our electronic certificate storage technology in electronic contract signing. provides a safer and more reliable guarantee.
2. The blockchain industry is ushering in a new trend in the market. What are the bottlenecks in the development of the blockchain industry?
Blockchain technology is a new distributed foundation Architecture and computing paradigm that enable the sharing, replication and authorization of distributed ledgers. It has the characteristics of multi-point consensus and is difficult to tamper with. It solves the problem of how to enable cross-institutional trust transactions in business networks, connecting all parties involved in financial services, and brings challenges of breaking down data silos and improving data quality. It has the potential advantages of security and lower transaction costs. Enhance risk control capabilities and have broad application prospects in the financial field. The blockchain industry is ushering in a new market trend, and there are some bottlenecks in the development of the blockchain industry. Only by breaking through these bottlenecks can we usher in the spring of blockchain. bring better development.
Finally, the development of blockchain technology will bring certain network security issues. We must pay attention to and solve information security and network security issues. Blockchain technology is not inherently secure. Any software system inevitably has defects and vulnerabilities, and will face attacks from the Internet. Poorly designed and poorly managed blockchain systems can be vulnerable to attacks. In applications in the financial industry, data is an asset, so we should have a comprehensive understanding of the security of blockchain, first put security design and self-control first to avoid the occurrence of Bitcoin theft.
3. How to solve blockchain security issues
One of the characteristics of blockchain projects (especially public chains) is open source. Open source code improves the credibility of the project and allows more people to participate. But the openness of source code also makes it easier for attackers to attack the blockchain system. There have been many hacker attacks in the past two years. Recently, the anonymous currency Verge (XVG) has been attacked again. The attacker has locked a vulnerability in the XVG code, which allows malicious miners to add false times to blocks. After stamping, new blocks were quickly mined, and nearly US$1.75 million worth of digital currency was obtained in just a few hours. Although the attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future.
Of course, blockchain developers can also take some measures
The first is to use professional code audit services,
The second is to understand safe coding standards and nip problems in the bud.
Security of cryptographic algorithms
The development of quantum computers will bring major security threats to the cryptographic systems currently used. Blockchain mainly relies on the elliptic curve public key encryption algorithm to generate digital signatures for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. cannot withstand quantum attacks in theory, and there will be greater risks. More and more Researchers are beginning to focus on cryptographic algorithms that are resistant to quantum attacks.
Of course, in addition to changing the algorithm, there is another way to improve security:
Refer to Bitcoin's handling of public key addresses to reduce the potential risks caused by public key leaks. As a user, especially a Bitcoin user, the balance after each transaction is stored in a new address to ensure that the public key of the address where Bitcoin funds are stored is not leaked.
Security of consensus mechanism
The current consensus mechanisms include Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS). , Practical Byzantine Fault Tolerance (PBFT), etc.
PoW faces 51% attack problem. Since PoW relies on computing power, when an attacker has a computing power advantage, the probability of finding a new block will be greater than that of other nodes. At this time, it has the ability to undo transactions that have already occurred. It should be noted that even in this case, the attacker can only modify his own transactions and not the transactions of other users (the attacker does not have the private keys of other users).
In PoS, an attacker can successfully attack only when he holds more than 51% of the tokens, which is compared to 51% in PoW.In terms of strength, it is even more difficult.
In PBFT, the system is safe when the malicious nodes are less than 1/3 of the total nodes. In general, any consensus mechanism has its conditions for establishment. As an attacker, you also need to consider that once the attack is successful, the value of the system will be reduced to zero. At this time, the attacker has nothing to do except destroy it. Get other valuable rewards.
For designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to choose an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scenario.
Security of smart contracts
Smart contracts have the advantages of low running costs and low risks of human intervention. However, if there are problems with the design of smart contracts, it may cause greater losses. In June 2016, The DAO, Ethereum's most crowdfunded project, was attacked. Hackers obtained more than 3.5 million Ethereum coins, which later caused Ethereum to fork into ETH and ETC.
The measures proposed in this regard have two aspects:
The first is to conduct security audits of smart contracts,
The second is to follow the principles of safe development of smart contracts.
The security development principles of smart contracts include: be prepared for possible errors and ensure that the code can correctly handle bugs and vulnerabilities; release smart contracts with caution, do functional testing and security testing, and fully consider boundaries; maintain The simplicity of smart contracts; pay attention to blockchain threat intelligence and check for updates in a timely manner; be clear about the characteristics of blockchain, such as cautiously calling external contracts, etc.
Security of digital wallets
Digital wallets mainly have three security risks: First, design flaws. At the end of 2014, a serious random number problem (duplication of R values) caused users to lose hundreds of digital assets in a certain lottery. Second, digital wallets contain malicious code. Third, lost assets caused by loss or damage of computers and mobile phones.
There are four main countermeasures:
The first is to ensure the randomness of the private key;
The second is to verify the hash value before installing the software to ensure that the digital wallet software has not been tampered with ;
The third is to use a cold wallet;
The fourth is to back up the private key.
4. How blockchain technology protects the privacy and rights of information subjects
Privacy protection methods can be divided into three categories:
First, the privacy protection of transaction information; Privacy protection for senders, transaction recipients and transaction amounts, including currency mixing, ring signatures and confidential transactions.
The second is privacy protection for smart contracts, and protection solutions for contract data, including zero-knowledge proof, multi-party secure calculation, homomorphic encryption, etc.
The third is the privacy protection of data on the chain, which mainly includes solutions such as ledger isolation, private data and data encryption authorized access.
Extended information:
1. Blockchain encryption algorithm isolates identity information and transaction data
1. Transaction data on the blockchain, including transaction address, amount, transactionTime, etc., are all open and transparent and can be inquired. However, the identity of the user corresponding to the transaction address is anonymous. Through the blockchain encryption algorithm, the separation of user identity and user transaction data is achieved. Before the data is saved to the blockchain, the user's identity information can be hashed, and the resulting hash value is used as the user's unique identifier. The user's hash value is stored on the chain instead of the real identity data information. Transaction data is bundled with hash values rather than user identity information.
2. Therefore, the data generated by users is real. When using these data for research and analysis, due to the irreversibility of the blockchain, no one can restore the name, phone number, and email address of registered users through hash values. and other private data, playing a role in protecting privacy.
2. Blockchain "Encrypted Storage + Distributed Storage"
Encrypted storage means that a private key must be provided to access data. Compared with ordinary passwords, private keys are more secure and almost impossible to be cracked by violence. . Distributed storage and decentralized features reduce the risk of all data being leaked to a certain extent. However, with centralized database storage, once the database is attacked by hackers, all data can easily be stolen. Through "encrypted storage + distributed storage", users' data privacy can be better protected.
3. Blockchain consensus mechanism prevents individual risks
The consensus mechanism is a mechanism for blockchain nodes to reach a consensus on block information across the entire network, which can ensure that the latest blocks are accurately added to the blockchain and node storage The blockchain information is consistent and unforked, which can resist malicious attacks. One of the values of the blockchain lies in the consensus governance of data, that is, all users have equal management rights to the data on the chain. Therefore, the risk of individual mistakes is first eliminated from the operation. Data decentralization is solved through the network-wide consensus of the blockchain, and zero-knowledge proofs can be used to solve verification problems and realize the scenario of using user privacy data in a public decentralized system. While meeting the needs of the Internet platform, it also So that part of the data is still only in the hands of the user.
4. Blockchain Zero-Knowledge Proof
Zero-knowledge proof means that the prover can make the verifier believe that a certain assertion is correct without providing any useful information to the verifier, that is, proof The investor can fully prove that he is the legal owner of certain rights and interests without leaking relevant information, that is, the "knowledge" to the outside world is "zero". By applying zero-knowledge proof technology, data correlation verification can be achieved in the context of ciphertext, and data sharing can be achieved while ensuring data privacy.
5. What are the advantages of blockchain?
Decentralized, non-tamperable, convenient and efficient.
Blockchain is a distributed ledger technology that has the following advantages:
1. Decentralization: Blockchain is a distributed system that does not rely on any central organization or individual. This makes the blockchain more secure and stable, making it less likely to be destroyed or attacked.
2. Non-tamperable: Blockchain uses cryptography technology to ensure the security and reliability of data. Once the data is writtenOnce entered into the blockchain, it cannot be tampered with. This makes blockchain very suitable for recording important transaction records or other data.
3. High efficiency: The distributed architecture of the blockchain enables it to quickly process a large number of transactions without relying on any centralized agency coordination. This makes blockchain very suitable for large-scale financial transactions or other data processing tasks.
4. Privacy protection: Blockchain can use anonymous accounts or other technologies to protect users' privacy, so that users do not need to worry about the leakage of their personal information when using the blockchain.
In general, blockchain has the advantages of decentralization, non-tampering, high efficiency, and privacy protection, so it has been widely used in finance, logistics, medical and other fields.
6. Is the combination of blockchain and privacy computing an inevitable trend?
Is the combination of blockchain and privacy computing an inevitable trend?
Our current thinking framework on this issue is: if it is not combined with privacy computing technology, will the application of blockchain technology be limited and unable to develop forward; if it is not combined with blockchain technology, privacy will Are computing technologies limited and unable to move forward? If both are necessary for each other, then the trend of their combination is inevitable.
The following is our thinking on this issue:
1. Is the application of privacy computing technology a rigid need for blockchain technology?
Blockchain technology has huge Advantages, but without privacy computing technology, the application of blockchain technology will be greatly limited, because the privacy protection problem of data on the chain cannot be solved, which makes a large number of scenarios involving sensitive data reluctant to apply blockchain technology, such as finance and medical fields.
(1) Limitations of blockchain technology
First, the data on the chain is open and transparent, and the compliance processing and privacy protection capabilities of data are insufficient. Blockchain serves as a distributed ledger. Although the openness and transparency of the system and data are conducive to evidence storage and tamper-proofing, there is also the risk that the data can be easily copied and personal privacy leaked. The blockchain requires different nodes on the public chain to verify and maintain transactions and transaction status to form a consensus, so each participant can have a complete data backup and all transaction data is open and transparent. If you know a participant's account, it is easy to obtain each transaction record and thereby infer his social identity, property status, etc. Taking the consumption scenario as an example, there are barriers to competition between platforms, and users also want to retain consumer privacy. Therefore, the blockchain lacks the ability to protect user flow, logistics information, marketing information and other data related to corporate and personal privacy, which often results in data The owner is unwilling to let the data enter circulation. Transactions in the on-chain system are no longer controlled by the central ledger. Users use a unique private key to conduct transactions. The transaction process is encrypted and the data before encryption is difficult to restore. Only using the private key as a transaction voucher makes transactions within the blockchain become more anonymous and lessControllable. On a distributed ledger system, all transfers are made in the form of addresses. Once financial crimes such as fraud or money laundering occur, even if the address can be publicly queried, it is extremely difficult to track the funds, and the private key is difficult to prove as a transaction voucher. Because of the identity of the user, many companies and individuals conduct illegal transactions such as money laundering through the blockchain, which is not conducive to the compliance processing and legal sharing of data.
Second, insufficient data processing capabilities restrict the further implementation and commercial expansion of the technology. On-chain computing is limited by the performance of network consensus, making it difficult for on-chain transactions to be real-time and efficient. Blockchain The computing power of smart contracts needs to be expanded. Taking Bitcoin, the largest encrypted payment system, as an example, it can only process about 3 to 7 transactions per second5, and the validity of the currently generated transactions is affected by network transmission. It often takes about 10 minutes of accounting cycle to process. Nodes on the network collectively know the contents of the transaction. In addition, if there are two or more nodes on the chain competing for the accounting rights at the same time, you still need to wait for the next accounting cycle to confirm the accuracy of the transaction. In the end, the chain with the longest block and the most accounting content will complete the confirmation. .
The fully decentralized system has insufficient compatibility with most existing systems in reality, and lacks systems and functions for on-chain and off-chain collaboration and multi-business development, which restricts the further implementation of blockchain technology. In the process of blockchain technology implementation, first of all, each industry itself has a mature system, and the completely decentralized form of blockchain may not be suitable for all fields and industries; secondly, the platform design and actual operating costs of blockchain Huge, its low efficiency and delayed transaction flaws are very obvious. Whether it can make up for the loss of the replacement of the original system requires a certain amount of actuarial calculation and comparison; in addition, using blockchain to store data requires sorting out the original data format. When it comes to sensitive data in the fields of government affairs and justice, it is even more necessary to establish a trusted channel linking online and offline data to prevent data entry errors, which brings high human and material costs.
(2) The help of privacy computing technology to blockchain technology
Privacy computing technology ensures that data is generated, perceived, released, and disseminated to storage, processing, use, and destruction. Privacy in the life cycle process complements the privacy protection capabilities of blockchain technology and makes data "available and invisible". By introducing privacy computing technology, the user's income and expenditure information, address information and other personal data are presented in the form of cipher text. During the data sharing process on the platform, it can not only prevent data leakage, but also ensure the security of the user's personal privacy. It is conducive to further breaking the data island effect and promoting multi-party data collaboration on a larger scale. Privacy computing technology can form a technology combination with blockchain technology to improve data processing capabilities and expand the scope of applications. By standardizing data processing, private computing technology can improve the efficiency of data processing and data sharing, and improve the data processing capabilities of the blockchain. In addition, the privacy computing technology + areaThe technology combination of blockchain technology can be applied to cooperation fields that lack centralized systems but have strong demand for sensitive data sharing, expanding the application scenarios of blockchain technology.
Is the application of blockchain technology an urgent need for privacy computing technology?
(1) Limitations of privacy computing technology
First, there is a lack of security inspection for data sharing. , restricting the credibility of data circulation
The entire process of data sharing involves multiple processes such as collection, transmission, storage, analysis, release, and accounting. Privacy computing mainly solves the problem of "availability or inconvenience" of data throughout the process. visible" problem, but it is difficult to ensure that the data source and calculation process are trustworthy.
From the perspective of trustworthy data sources, in the data collection process, the data content itself may be incomplete, and there may be errors in data entry; in the data transmission process, the data transmission may be Other client-side attacks lead to data leakage during the transmission process; during the data storage process, the party storing the data may tamper with the data or copy the data and resell it to the black market, which will not be recorded by privacy computing technology. If the identities of all parties involved in data sharing cannot be guaranteed to be “credibly verified,” it may lead to data privacy being “unworthy of its name.” From the perspective of trustworthiness of the calculation process, during the data analysis and release process, the data sharing party may privately tamper with the data operation results and release content, and falsify the final data processing results. Therefore, once the information is verified and added to the privacy computing environment, it is difficult to find whether the data has been tampered with or leaked, and it is difficult to prevent data falsification at different points in time. This is especially true when it comes to finance, government affairs, medical care, and charity. In other key areas, if the data is incorrect, a series of legal issues will be difficult to pursue.
Second, the overall level of business levels is uneven, which restricts the expansion of technology platforms
Currently, the technical implementation paths of privacy computing are mainly divided into three types: multi-party secure computing, federated learning, TEE Trusted Execution Environment. The three technical paths have their own application flaws and problems. Due to the limited technology mastery and R&D capabilities of different companies in the industry, the actual application scope of the technology platform is limited and the scalability is insufficient.
Although multi-party secure computing has complex and high-standard cryptographic knowledge, its computing performance has the disadvantage of low efficiency in the actual application process. As the scale of applications expands, adopting appropriate computing solutions to ensure linear changes in computing latency and the number of participants is a major challenge currently faced by technology manufacturers. Although multi-party secure computing can ensure the privacy and security of multiple parties during data fusion calculation, other technical means still need to be matched to prevent data leakage and tampering in data access, control, transmission and other aspects.
The current applications of federated learning technology in the industry usually use third-party platforms as the basic model, and perform hidden learning on top of the basic model.Private computing, such a basic model itself has the hidden danger of viruses being implanted by developers. In addition, the federated learning mechanism defaults to all participants being trusted parties and cannot prevent a certain participant from maliciously providing false data or even corrupted data, thereby causing irreversible harm to the final training model. Since federated learning requires each participating node to perform calculations, the computing power and network connection status of the nodes will limit the communication efficiency of federated learning.
The core hardware technology of TEE Trusted Execution Environment in China is currently controlled by a few foreign core suppliers such as Intel, Qualcomm, and ARM. If purchased from abroad in key areas, there will be very high security risks and applications. risk. Third, data sharing lacks an authority confirmation mechanism. Applied privacy computing that restricts data circulation uses data from multiple parties to jointly calculate and produce results. However, in the actual cooperation process, due to the different business levels and data quality of each data sharing party, It is difficult to achieve reasonable confirmation of ownership in every aspect of data processing.
According to the conventional profit distribution mechanism, data owners with high-quality data and high achievement contribution rates should obtain more profits from it. However, privacy calculations only take into account the "availability and invisibility" of the data. It is difficult for the sharing party to judge from the final result whose data has contributed the most to the results, resulting in unfair distribution of benefits. If there is a lack of reasonable achievement contribution evaluation mechanism and benefit distribution mechanism, it will be difficult to motivate data owners and other data holders to cooperate. Especially in the scenario of distrustful multi-party cooperation, the trust cost of cooperation will be further increased, making multi-party collaboration difficult to achieve and restricting the practical application of data circulation.
(2) The help of blockchain technology to privacy computing technology
Blockchain technology records all aspects of data circulation and all participants to realize the data sharing process. Clearly defined powers and responsibilities enhance the credibility of data circulation. In the data transmission process, the blockchain records the data provider and confirms the authenticity and validity of the data provider's identity, which is conducive to the confirmation of data rights and provides a reference for a fair and feasible benefit distribution mechanism; in the data storage process, the district Blockchain ensures that every modification of data is traceable and prevents malicious tampering of data. Blockchain technology can be used as the underlying platform of privacy computing technology, ensuring the true validity of the encrypted data itself, improving the credibility of data circulation in the privacy computing platform, and expanding the application scope of privacy computing technology.
3. Conclusion
The integration of privacy computing technology and blockchain technology is an inevitable trend. For the circulation of data assets, without privacy computing, the security and privacy protection issues of the data itself cannot be solved; without blockchain, the issue of data confirmation and data network collaboration on a larger scale cannot be solved. Combining blockchain and privacy computing to build a large-scale data circulation network has become a consensus exploration in current practice.Search direction.
What will change when the combination of blockchain and privacy computing changes?
1. Formation of a large-scale data circulation network and data element market
Currently, there are three problems in data circulation: data protection and data confirmation of data owners are difficult to achieve; different sources The cost of data integration and processing is too high and there is a lack of unified standards; the distribution mechanism of data benefits is imperfect.
As mentioned above, the combination of blockchain and privacy computing technology can solve the problem of privacy protection on the one hand, and the problem of data confirmation and multi-party collaboration on the other hand, thereby establishing a large-scale data circulation network.
On the basis of the establishment of a large-scale data circulation network, a real data factor market can be formed, and the value of data as a production factor can be fully explored.
2. Promote the development of data assetization
The so-called assets refer to those formed by past transactions or events of an enterprise, owned or controlled by the enterprise, and expected to bring consequences to the enterprise resources of economic benefit.
The capitalization of data is to allow data to find value in the market, which can create new economic benefits for enterprises.
The formation of large-scale data circulation networks and data element markets will greatly promote the discovery of data value and the development of data assetization.
From the perspective of the enterprise, the data accumulated in the enterprise's production and operation activities will become valuable assets. On the one hand, the analysis and application of these data will push companies to improve their own business; on the other hand, sharing data with external organizations can promote greater value from the data, and the company itself will gain more benefits from it. . This will in turn further promote the digital transformation of enterprises and the management of data assets. In the future, the inventory of data assets may become the company's "fourth statement" in addition to the balance sheet, cash flow statement, and income statement.
The development of data assetization will also promote the formation of a new service system around data value mining. This includes data confirmation, pricing, transactions and other aspects. Ding Botao, deputy director of the Institute of Information of the Shanghai Academy of Social Sciences, divides institutions in the future data asset service system into four categories:
The first category provides intermediary services, including data brokers and data agents.
The second category provides data assessment. Due to information asymmetry or information confusion in the data market, it is necessary to provide compliance assessment, data quality and data price assessment.
The third category is consulting service companies that provide price consulting, such as legal and economic consulting or listing guidance.
The fourth category provides professional technical services, including data development, data processing services, data delivery services, etc. The development of data assetization will bring about the improvement of people's cognition, improvement of production efficiency, reorganization of production factors, and innovation.The emergence, economic development and improvement of the overall welfare of the whole society.
3. Changes to existing business formats
The combination of blockchain and privacy computing will increase the enthusiasm of enterprises and individuals to share and utilize data, and further promote the breaking of "data silos" ". Its changes to the existing business format are mainly reflected in the following aspects:
First, it will bring new data and technological changes.
First of all, this will promote the arrival of the era of data density. The core of the era of dense data is a huge change in the way data is circulated and used. Data will flow and be calculated between subjects in a dense form, significantly reducing the risk of data leakage and supporting the development of various forms of business under the premise of compliance. Previously, data was encrypted and could only be used for transmission or storage, but in the future, data can be calculated in an encrypted state. This will bring about a series of new problems and challenges, triggering chain reactions in many related technical fields.
Second, this will reshape the big data industry. As data circulation becomes more secure, previously sensitive data areas are gradually opening up. Taking government data as an example, privacy computing makes it possible to model and analyze data from multiple parties such as governments, enterprises, and banks, further releasing the value of data applications and creating diverse application opportunities.
Third, the artificial intelligence industry will receive a new round of development. Data, algorithms and computing power are the three elements for the development of artificial intelligence. In recent years, the development of artificial intelligence has encountered a bottleneck due to a lack of available data. In the future, the development of 5G and the Internet of Things will make everything interconnected and the amount of data will increase significantly. The application of blockchain + privacy computing technology can enable artificial intelligence to use massive data to optimize models and truly move towards "intelligence". Fourth, this will bring new opportunities for the development of the blockchain industry. The combination of blockchain and privacy computing will expand the number of nodes in the alliance chain, thereby further expanding the scope of data resources that can be used collaboratively.
Second, based on technological changes, the combination of blockchain and privacy computing will bring changes to many traditional industries.
In the field of government affairs, on the one hand, interconnection and data sharing between different government departments can be achieved, thereby promoting collaboration between different government departments, improving government efficiency and decision-making quality, and promoting the construction of smart cities; On the other hand, it can promote the two-way opening of government data and private data. Government data is open to society and can be used by businesses or academia to release more value. Opening private data sources to the government can improve the efficiency of government decision-making and government affairs processes.
In the financial field, various fields such as payment, credit reporting, credit, and securities asset management will undergo changes as a result. Overall, it mainly affects the two aspects of financial risk control and marketing. The combination of blockchain and privacy computing technology can expand data sources while complying with legal regulations and not leaking the original data of all parties.sources, including the use of Internet data outside the financial system to achieve multi-party data sharing and joint modeling, thereby effectively identifying credit ratings, reducing risks such as long credit and fraud, and also contributing to the accurate pricing of financial products such as credit and insurance; similarly, internal The sharing and integration of external multi-party data can also help improve the anti-money laundering screening capabilities of financial institutions.
In the medical field, in the future, in many fields such as disease treatment, drug research, and medical insurance, blockchain and privacy computing can promote the construction of medical informatization and bring about huge changes. In terms of disease treatment and drug research, the combination of blockchain and private computing can promote more medical data to be combined for analysis and research, thereby bringing new breakthroughs in the treatment of many diseases. In terms of medical insurance, the combination of blockchain and privacy computing technology can mainly allow insurance companies to apply more data, improve the design, pricing, and marketing of insurance products, and even promote insurance companies' health management of customers.
The combination of blockchain and privacy computing technology is currently mainly used in government affairs, finance, and medical fields. However, in the future, its application will not only be limited to these three fields, but will also be used in more fields. Play a role.
Third, data rights and interests will be redistributed.
This may be the most core and profound change brought about by the combination of blockchain and privacy computing technology, and is closely related to everyone’s vital interests.
First of all, this involves the redistribution of interests among different links in each industrial chain.
Take the aforementioned application in the field of advertising and marketing as an example. Previously, the distribution of interests in advertising and marketing was mainly between advertisers and channel providers. However, in the future, the application of blockchain and privacy computing technology will enable data collaboration on a larger scale. This will require solving the problem of multi-party data collaboration among advertisers, multiple channels, and consumers, which involves multiple parties. division of powers and responsibilities and redistribution of interests.
Secondly, this also involves the redistribution of interests between enterprises and individuals.
One of the important rights and interests of users involved in the EU's GDPR, the US's CCPA and other bills is "portability". That is to say, third-party applications cannot block personal data. Once an individual requests to download, the APP needs to provide a convenient API to facilitate individuals to copy data. American companies have gradually provided APIs to users. If there is a lack of functionality in this area, individual customers can file lawsuits, and the company will also face huge fines. China's "Personal Information Protection Law" also has relevant provisions. Article 45 of the "Personal Information Protection Law" stipulates that "individuals have the right to access and copy their personal information from personal information processors" and "if individuals request to access or copy their personal information, the personal information processor shall provide it in a timely manner. Individuals Request the transfer of personal information to their designated personal information processor, if the conditions specified by the national cybersecurity and informatization department are met, the personal information processor shall provide a means of transfer. ”
At present, Chinese companies’ blockchain + privacy computing exploration is mainly concentrated in the To B service field, but blockchain is a global business. If such a model has emerged in the United States, China will most likely not will not be affected at all. With the improvement of consumer-level software and hardware technology capabilities, the combination of blockchain and privacy computing technology will gradually revolutionize data services between individuals and institutions. For individual users, there will be opportunities to obtain Have complete control over their own private data, and obtain stronger technical guarantees for the data privacy requirements involved in the data business process. Currently, the domestic industry is still discussing issues related to To C services.
Why has the application of blockchain + privacy computing not yet become popular on a large scale?
First, the practical application of blockchain + privacy computing mainly involves situations that require multi-party data collaboration, and the actual demand has not yet exploded. .
From the perspective of the development of privacy computing technology, privacy computing is still in the early stages of implementation. It mainly solves the problem of data collaboration between two parties. There are not many scenarios involving multiple parties, so there are many At that time, we had not yet realized the need for blockchain + privacy computing applications.
From the perspective of blockchain technology development, the application of blockchain technology in many fields is not strictly needed at present. Many problems It can be solved using blockchain, but it can be solved without using blockchain technology, and the cost of applying blockchain technology to solve it is higher. Therefore, the current construction of blockchain projects is mainly driven by government departments and large enterprises, because the government From the perspective of long-term development of large enterprises, forward-looking investment construction and technology layout can be made, but most commercial organizations need to measure input and output.
Combination of blockchain technology and privacy computing technology , mainly used to deal with data collaboration issues. From the perspective of data governance, most organizations are currently dealing with their own internal data governance issues. After the internal data system is sorted out, data collaboration with external parties is involved. Therefore, It still takes time.
Second, the implementation of blockchain + privacy computing is more complicated and involves the creation of new business models, the redistribution of rights, responsibilities, and interests, so it will take longer. < /p>
Take the implementation of applications in the field of advertising and marketing as an example. Most of the current applications are only implemented on the privacy computing platform. They mainly involve data collaboration between two parties, directly apply privacy computing technology, and continue previous commercial applications. However, if blockchain technology is introduced, the problem of multi-party data collaboration among advertisers, channels, and consumers must be solved, which may involve the division of rights and responsibilities among multiple parties, the redistribution of interests, and the development of new business models. It takes time to explore the formation.
The large-scale popularization of applications also needs to solveWhat problems should be solved?
Before the application of blockchain + privacy computing can be rolled out on a large scale, three conditions need to be met:
First, from the perspective of the external environment, it requires the whole society as a whole The improvement of digitalization level. For example, blockchain + privacy computing will form a highway for data circulation in the future, but there must be enough cars on the road. At present, the digitalization of the whole society is advancing rapidly. Most institutions are carrying out their own internal data governance. They need to process their own data first before they can have more needs for collaboration with external data. This will take time. .
Second, from the perspective of technological development, investment is still needed to mature the technology. The application of blockchain + privacy computing technology actually sacrifices the efficiency of data circulation and improves security. However, the efficiency of data circulation is also very important. In the future, a certain balance needs to be formed between efficiency and security. Security It must be guaranteed and sufficient efficiency must be met, which involves the research and development of many technologies, the formulation of industry standards, the development and improvement of technology productization, and the further reduction of technology costs, which will take time.
Third, the improvement of relevant laws and regulations and the formation of data transaction business models are also needed. However, compared with the first two conditions, this condition is relatively less important at present. Because as demand explodes and technology improves, relevant laws, regulations, and business models will be formed. This condition is not the most critical factor limiting the application of blockchain and privacy computing technology at this stage.
What other trends are hidden in the application of blockchain + privacy computing?
1. The trend of localization
The application of blockchain + privacy computing involves network security and data security, and will become an important part of new infrastructure in the future. This is an important aspect related to cyberspace sovereignty, national security and future development interests, so localization in this field is the future trend.
In the localization of blockchain + privacy computing technology applications, the localization of software is relatively easy to achieve. The difficulty lies in the localization of hardware, and the most difficult part is the localization of chips.
The development of this part is related to the development of the information and innovation field. Xinchuang, the information technology application innovation industry, is the foundation of data security and network security, and is also an important part of new infrastructure. The industries involved in Xinchuang include IT infrastructure: CPU chips, servers, storage, switches, routers, various clouds and related services; basic software: databases, operating systems, middleware; application software: OA, ERP, office software , government affairs applications, streaming version signing software; information security: border security products, terminal security products, etc.
In the field of blockchain + privacy computing, some companies are already trying to localize their products. For example, as mentioned earlier, antsThe chain has self-developed password cards, privacy computing hardware and self-developed trusted chain chips, and also launched the Moss privacy computing all-in-one machine. Startup companies such as Nebula Clustar and Rongshu Lianzhi are also conducting research and development of related localized hardware products.
2. The trend of combining software and hardware technologies and integrating more technologies
At present, in the practice of combining blockchain and privacy computing technology, software and The trend of combining hardware technology and integrating more technologies. This is mainly due to several needs:
First, it is the need to strengthen data security.
Privacy computing mainly solves the problem of data not being leaked during the calculation process. Blockchain mainly solves the problem of certificate storage. The combination of the two can only solve part of the problem of data security. From generation to calculation to death, data will involve multiple links such as collection, transmission, storage, calculation, and destruction. Its life cycle may last for decades. To truly ensure data security, a more comprehensive system is needed. A standardized solution so that each link has a corresponding technical system to ensure data security. In the data collection stage, the device trust architecture needs to be carefully designed, in the network transmission stage, security protocols need to be rationally used, and in the storage stage, both encryption and performance need to be taken into consideration. , In the data calculation stage, it is necessary to flexibly choose trusted execution environments and dense state operations. In addition, the trustworthiness and security of the computing environment are also crucial in building defense in depth. The technical map of these security assurance capabilities will involve trusted computing, software and hardware supply chain security, isolation technology, transparent encryption of network and storage, key management, trusted execution environment, etc. Each of these technical points has room for the combination of software and hardware and the integration of multiple technologies.
Second, there is the need to improve computing performance.
The performance of privacy computing is currently relatively low, and it exists at three levels: stand-alone computers, between stand-alone computers, and between computer clusters.
On a single computer, privacy computing uses cryptography technology, and the calculation process involves many steps of encryption and decryption, which increases the amount of calculation geometrically. Taking the fully homomorphic algorithm as an example, the speed of ciphertext operations on general-purpose chips is 100,000 times slower than plaintext operations. This means that if you use a fully homomorphic algorithm to perform the same operation on Intel's latest Icelake processor, the result will be equivalent to Intel's first-generation 8086 processor, which is a setback of several decades. This makes fully homomorphic encryption unusable in real situations. Computational power issues are also the fundamental reason why fully homomorphic algorithms have not been widely used.
Between stand-alone computers and between computer clusters, communication efficiency issues between stand-alone computers and between clusters will be involved. On the one hand, mainstream privacy computing technology, whether it is federated learning or multi-party secure computing, has communication problems. Ciphertext expansion, transmission timesData expansion will cause network transmission efficiency between single machines to become one of the bottlenecks in privacy computing. On the other hand, since most private computing scenarios span multiple parties, and multiple parties need to communicate through the public network, there is currently a huge gap in the bandwidth and latency of the public network.
Performance problems will become more and more serious as time goes by. In 2021, the implementation of privacy computing is still in a very early stage. It is mainly applied within some institutions or between two or three parties. The amount of data processed is small, and this problem is not yet obvious. However, in the future, the arrival of multi-party data exchange requirements and the rapid increase in data volume brought about by the development of 5G and the Internet of Things will ultimately lead to explosive growth in data volume, which requires a large amount of computing power.
By then, the performance of privacy computing will face huge challenges. We are now in a golden age of architecture in terms of hardware innovation. This is because the rapid development of mobile Internet has led to the rapid development of application scenarios and the rapid development of upper-layer software. This has caused the hardware and even chips that support the bottom layer of the computer to need to be changed accordingly, entering a new round of innovation cycle. .
From the perspective of the long-term development of the combination of blockchain and privacy computing, the combination of software and hardware and the integration of multiple technologies can improve performance, security and computing effects for privacy computing; for blockchain In other words, it can encourage more institutions to join the alliance chain at low cost and expand the application scope of the alliance chain.
END
Editor | Lingluyuan
Source | Zero One Finance "Blockchain + Privacy Computing Frontline Practice Report (2022)"
< /p>