Skip to content

Protected Data

Protected Data refers to any data encrypted using the iExec Data Protector tool. This Turnkey Privacy encryption solution enables users to protect, manage and monetize their data within the Web3 ecosystem effortlessly.

Unlike standard datasets, Protected Data exposes its data types on-chain (indicating types like email addresses or photos). This lets anyone identify entries with matching types.

Key Concepts

Data Governance

You own your data: The original data never leaves your control
Granular permissions: Decide who can access and use your data
Revocable access: Grant and revoke permissions at any time

Privacy-preserving Computation

Encrypted Processing: Maintains a complete chain of trust.
TEE (Trusted Execution Environment): Secure enclaves protect data during processing
Secret storage: iExec's protocol secrets in a TEE database.

Monetization

Data marketplaces: Sell access to your protected data
Usage tracking: Monitor how your data is being used
Fair compensation: Get paid for data usage

How it Works

1.
Protect: Encrypt and register your data on the iExec network
2.
Share: Authorize specific users and applications to access your data
3.
Monitor: Track usage and maintain control
4.
Monetize: Earn from your data while keeping it private
5.
Compute: Authorized users can compute on your data with authorized iApp

Use Cases

Personal Data

  • Health records
  • Financial data
  • Personal preferences

Business Intelligence

  • Market research
  • Customer analytics
  • Proprietary datasets

AI Training

  • Training models without exposing sensitive data
  • Federated learning
  • Privacy-preserving ML

Research

  • Collaborative research with privacy guarantees
  • Cross-institutional studies
  • Clinical trial data

Ready to protect your data? Start with our DataProtector guides. Learn how to secure sensitive information while unlocking its value.

Next Steps