How To Build a Data Privacy-Preserving App (in Under an Hour)

iExec is a decentralized infrastructure for cloud computing resources, with a complete solution to run privacy-preserving executions of any application. Developers and enterprises can use the iExec tools to monetize data, and make it accessible for only a select list of purposes.

Curious to know how you can build super-secret applications of your own?

Well, that’s the whole purpose of this guide. Let’s dive under the hood!

The Problem of ‘Sharing’ Data

Huge amounts of data are left unused. This is because enterprises are extremely afraid of data leaks and exploits. But if they could harness the valuable pools of data at their fingertips, they could unlock a new wave of innovations and business models, as well as collaborations between entities that don’t trust each other by default.

We’ve all heard people and enterprises say:

We’d love to share data with third parties,

… but always under our control,

… if I agree with the objective,

… and if I can authorize the beneficiary on a case-by-case basis.

At iExec, we’re all-in to advance and democratize confidential computing. Making a developer’s journey as delightful as possible when interacting with our marketplace is at the core of what we do.

We’d like to show you a simple solution to build applications that make use of digital assets while protecting these with the highest level of security. We’ve hidden the complexity of blockchain and hardware enclaves, which are the backbone of our solution, to make it super simple to use.

Preserving data privacy and ownership during all of the data’s life cycle is not an easy process. We protect data in all of its stages: at rest, in transit and while it is being used. On the one hand, protecting data at rest and in transit have well-established solutions with file encryption (e.g. RSA, DES) and secure communication channels with TLS protocol.

On the other hand, Trusted Execution Environments (TEE) is an emerging solution to secure data during its processing and solves the trust issue of data sharing. Blockchain allows to ensure strict data ownership and strict control on its usage. The data never gets revealed to the purchasing parties. Thanks to the technology, governance rules are enforced by smart contracts, and data transactions can be audited by any involved party.

What privacy-preserving apps can you build?

           
  • You can monetize your AI trained model or protect its intellectual property rights. Your model will be encrypted in a dataset that will only be processed in enclaves (TEE) under your strict control. Explore this use case.
  •        
  • In the context of smart cities, iExec solves the trust issue between agents. Our tools can be the backbone of an infrastructure that supports machine-to-machine transactions and autonomous services. Such infrastructure can allow participants to order services, certifies that these services have been correctly executed by machines at the edge, ensures that governance rules are perfectly respected, and provides proof on the blockchain of all the orders and payments. Explore this use case.

Tutorial: How to keep your algorithm private

To dive into this tutorial, no advanced development skills are required, the tooling we propose is quite simple.

iExec SDK is a clear and simple tool enhancing all interactions with Ethereum blockchain.

Building an SGX-based application is also a seamless process.

The solution is based on the SCONE framework, provided by Scontain. This framework enables the secure execution of containers and programs using Intel® SGX. Developers will build their applications adding layers on top of existing enclave-ready docker images.

The app we showcase is coded in Python, but other languages are supported, such as Javascript, C, C++, widen the field of possibilities.

The iExec Explorer tracks and displays all transactions going through the iExec platform.

Very basic programming knowledge in Python and common cloud services are required.

The tutorial showcases how to build your application that monetizes an algorithm you want to keep secret.

how to build your application that monetizes an algorithm you want to keep secret

You will discover step by step how to create a confidential computing application and get familiar with the core features of the iExec:

           
  • how to create a confidential dataset.
  •        
  • how to create an enclave-ready application.
  •        
  • how to manage orders and control the usage of your asset, give authorization to third parties or a beneficiary.
  •        
  • how to run a confidential computing application on the decentralized infrastructure.

Ok, let’s get into it!

Disclaimer: The tutorial can be completed in around an hour, only if you are extremely and exclusively focused on it. Don’t hesitate to take your time.

iExec - Cloud Interface Demo

Free demo, no crypto or technical requirements needed, Just log in with your Google Account !developers.iex.ec

➡️ https://developers.iex.ec/goal

Video: iExec Completes Whitepaper and Presents New Adoption Roadmap