Error message

  • Deprecated function: Array and string offset access syntax with curly braces is deprecated in include_once() (line 20 of /var/www/vhosts/atmosphere-eubrazil.eu/includes/file.phar.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /var/www/vhosts/atmosphere-eubrazil.eu/includes/common.inc).

Overview: 

The system enables a dataset and a learning algorithm to be encrypted and upload to cloud storage. Then, the training code can access the dataset in a trusted environment that keeps code and data confidential, generating a model that can be used without ever disclosing the original data. Finally, the access to the data and code are logged into the blockchain so that future uses of the model can be traced back to the original information and code.

The goal: 

Show that data could be used in a confidential and transparent fashion to train models.

The challenge: 

Confidential data being used to train models and the tracking of the data used to generate the models. This tracking enables both provenance and data protection features, such as the right to be forgotten.

The Impact: 

Sensitive data can be used to train models with transparency and confidentiality guarantees.

Without atmosphere: 

There was no approach to enforce this due to the possibility of breaking the integrity of the tracking process, consequence of the lack of trusted environments.

With atmosphere: 

The trusted execution environments enable the enforcement of the tracking and the confidentiality of source data.

WHO BENEFITS & HOW?

Application developer

Can use models (e.g., for classification) that use sensitive data, providing provenance and transparency.

Data scientist

Can protect the IP of his code or get access to sensitive data, which would not be provided to him otherwise.

Application manager

Has less pressure to secure his environment, since trusted execution environments reduce the need for the base infrastructure to be secure.

System administrator

The same as the application manager.

Data owner

Has guarantees that his data will be kept confidential, that he will track its usage, and that he can revoke consent.

Literature: 

More info soon

Contacts: 

More info soon