Protected Data
Protected Data refers to any data encrypted using the iExec Data Protector tool. This Turnkey Privacy encryption solution enables users to protect, manage and monetize their data within the Web3 ecosystem effortlessly.
Unlike standard datasets, Protected Data exposes its data types on-chain (indicating types like email addresses or photos). This lets anyone identify entries with matching types.
Key Concepts
Data Governance
•
You own your data: The original data never leaves your control
•
Granular permissions: Decide who can access and use your data
•
Revocable access: Grant and revoke permissions at any time
Privacy-preserving Computation
•
Encrypted Processing: Maintains a complete chain of trust.
•
TEE (Trusted Execution Environment): Secure enclaves protect data during processing
•
Secret storage: iExec's protocol secrets in a TEE database.
Monetization
•
Data marketplaces: Sell access to your protected data
•
Usage tracking: Monitor how your data is being used
•
Fair compensation: Get paid for data usage
How it Works
1.
Protect: Encrypt and register your data on the iExec network
2.
Share: Authorize specific users and applications to access your data
3.
Monitor: Track usage and maintain control
4.
Monetize: Earn from your data while keeping it private
5.
Compute: Authorized users can compute on your data with authorized iApp
Use Cases
Personal Data
- Health records
- Financial data
- Personal preferences
Business Intelligence
- Market research
- Customer analytics
- Proprietary datasets
AI Training
- Training models without exposing sensitive data
- Federated learning
- Privacy-preserving ML
Research
- Collaborative research with privacy guarantees
- Cross-institutional studies
- Clinical trial data
Ready to protect your data? Start with our DataProtector guides. Learn how to secure sensitive information while unlocking its value.
Next Steps
Learn More: Complete DataProtector Documentation
Getting Started: DataProtector Quick Start Guide