Replies: 0 comments 15 replies
-
Thank you for sharing this! Some comments/questions from my side:
Does this make sense? |
Beta Was this translation helpful? Give feedback.
-
Thanks @ma3u! Here are some comments/questions in addition to @gbrost.
|
Beta Was this translation helpful? Give feedback.
-
We discussed and reworked the diagram, so I am fine with that. This potentially relates to the trust discussion: |
Beta Was this translation helpful? Give feedback.
-
Thans @ma3u for writing this down. Here are my comments:
|
Beta Was this translation helpful? Give feedback.
-
the issue I see here is that there is not going to be the one implementation of TEE to satisfy all the needs. There will be a multitude of different TEE implementations, depending on the needs of the specific dataspace/participant needs. |
Beta Was this translation helpful? Give feedback.
-
I stored the UML definition files in my private GitHub repo temporality: |
Beta Was this translation helpful? Give feedback.
-
Thank you for the short discussion about the Simple Scenario. After a second look, I'm not sure if |
Beta Was this translation helpful? Give feedback.
-
The functional requirement specification of the IDSA describes mandatory foundation and optional components for other data collaboration scenarios:
Optional function for Processing Services
Many projects like SafeFBDC, AgriGaia, Gaia-X4KI, Catena-X want to provide secure execution environments, so the data never leave the trusted premise environment of the data provider. There are various options:
1. Code-To-Data (C2D) between trusted partners
If partners trust each other the application can be transferred from the app provider to the app consumer. The app consumer hold the data. The data won't leave the data provider.
2. Confidential Compute between untrusted partners
If the partners do not trust each other, a 3rd party can ensure the calculation through confidential computation. Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. The technology protects data in use by performing computations in a hardware-based trusted execution environment (TEE).[3] Confidential data is released to the TEE only once it is assessed to be trustworthy. Different types of confidential computing define the level of data isolation used, whether virtual machine, application, or function, and the technology can be deployed in on-premise data centers, edge locations, or the public cloud.
A similar approach is the concept of data clean rooms. The concept of a data clean room is intended to be a data-focused equivalent to a physical clean room, with the goal of having a pristine environment where technology can't be contaminated by outside influence. Instead of being concerned with contamination by physical elements, the primary concern of a data clean room is keeping user data isolated and private.
This is just one of many possible scenarios how you can create a Trusted Execution Environment with Confidential Compute and the EDC:
See also related discussion thread edc provisioning
Beta Was this translation helpful? Give feedback.
All reactions