Journal of Agricultural Big Data ›› 2024, Vol. 6 ›› Issue (2): 241-252.doi: 10.19788/j.issn.2096-6369.000026

Previous Articles     Next Articles

Application Analysis of Blockchain and Confidential Computing Technology in Material Database Platform

GONG HaiYan1,2(), MA FuQiang3,4, ZHANG DaWei1,2,*(), LI XiaoGang1,2   

  1. 1. National Materials Corrosion and Protection Data Center, University of Science and Technology Beijing, Beijing 100083, China
    2. Shunde Innovation School, University of Science and Technology Beijing, Foshan 528399, Guangdong, China
    3. Inspur (Beijing) Electronic Information Industry Co., Ltd, Beijing 100085, China
    4. Inspur Group Co. Ltd., Jinan 250101, China
  • Received:2024-01-31 Accepted:2024-04-16 Online:2024-06-26 Published:2024-07-03
  • Contact: ZHANG DaWei

Abstract:

With the rise of data-driven material design driven by artificial intelligence and materials science, material science data has become a focal point of production factors, national strategic resources, and international competition. However, as material data sharing increases, data security issues become increasingly important. Issues such as data leakage, misuse, and tampering threaten the competitiveness of enterprises. We first review mainstream data security protection technologies, including access control and encryption technologies, which constitute the traditional data security protection model, ensuring security during data transmission and storage. Next, the development of blockchain technology is introduced. Blockchain technology can achieve confidentiality, integrity, and availability during data transmission and storage, but these mechanisms still cannot address privacy issues during data usage, nor can they protect the confidentiality and integrity of data during usage. Then, the advantages of confidential computing technology are analyzed. By executing calculations in a hardware-based trusted execution environment, confidential computing technology minimizes the trusted computing base, providing comprehensive data protection and adhering to the concept of "data usability without visibility" to protect data during usage, thereby constructing end-to-end lifecycle data security. Finally, we combine the advantages of blockchain and confidential computing technology to propose a trustworthy infrastructure solution for material data based on blockchain and confidential computing, to achieve security throughout the data lifecycle and provide strong support for the secure application of material data.

Key words: confidential calculations, blockchain, material data, data security, data sharing