Nulink
Last updated
Last updated
In this exploration, we delve into the core mission of NuLink, uncovering how it harnesses cutting-edge technology to transform the landscape of data privacy and protection. Let’s dive in.
At the heart of NuLink's mission is the commitment to safeguarding personal data privacy. NuLink aims to ensure that individuals' personal information remains secure. This objective focuses on addressing data availability, which encompasses two critical aspects:
Firstly, empowering consumers to verify a seller's data availability before making a request is pivotal. This measure ensures that individuals can confirm whether a seller possesses the specific data they need, fostering transparency and trust between sellers and consumers.
Secondly, the emphasis is placed on establishing a reliable method to verify the authenticity of encrypted data. Encryption plays a vital role in safeguarding sensitive information, yet it poses challenges in ensuring data accuracy and integrity. To overcome this hurdle, NuLink employs a technique known as Zero-Knowledge Proof.
Zero-Knowledge Proof is an advanced approach that ensures the verification of data processing and computation operations across all functional nodes within the NuLink network, including storage, computation, and proxy nodes. It ensures that these network components can fulfill their roles with transparency and accountability.
Additionally, an extra layer of security is incorporated into the approach. Before granting access to encrypted data, the data owner must provide a zero-knowledge proof. This proof acts as verification that the encrypted data matches its original plaintext form, regardless of the specific encryption scheme used.
Data Sharing A significant concern is maintaining data security when sharing with external parties. It's essential to ensure that the data remains intact and uncompromised throughout the transmission process and that access is restricted to those authorized by the data owner.
To address this challenge, NuLink employs advanced techniques such as:
Proxy re-encryption,
Identity-based encryption (IBE),
Attribute-based encryption (ABE).
The process begins with data encryption on the user's side, adding an additional layer of protection. Access to the encrypted data is then granted to authorized parties using PRE, IBE, or ABE algorithms.
Through these encryption methods, authorized recipients can decrypt the data using their private key, depending on the specific encryption scheme employed. This ensures that only the data owner and authorized parties can access the original data.
NuLink also tackles the privacy concerns associated with data computing. In scenarios, especially those involving edge computing or machine learning, data owners may hesitate to grant full access to their datasets. Instead, they may prefer to allow computing on a specific model, enabling the authorized party to receive only the computed result without accessing the original dataset.
To accommodate this concern, NuLink will utilize Fully Homomorphic Encryption (FHE) technology to facilitate confidential data computing. FHE is a powerful encryption technique that allows computations on encrypted text, ensuring that the data remains encrypted throughout the computation process.
Here’s how it works: initially, the dataset is encrypted and securely transmitted to designated computing providers. These providers, in turn, perform the desired computation, such as running a machine learning prediction model, without ever accessing the data in plaintext. The computation result is then encrypted and returned to the authorized party for decryption, ensuring data confidentiality throughout the computation process.
By leveraging FHE technology, NuLink enables data owners to maintain control over their sensitive information while benefiting from data computing power. This approach strikes a balance between privacy and utility.