Data Privacy
SOLUAI uses blockchain transparency and advanced cryptography to protect user data during input and output.
Data Privacy in SOLUAI
SoluAI leverages the transparency of blockchain technology while employing sophisticated cryptographic methods to safeguard user data during input and output phases.
Miners’s asset
Every miner (also referred to as a model host) within the network generates a distinct pair of public and private keys.
Miners disclose their public keys for user access.
Users' Data Encryption
Users can create a symmetrical encryption key that guarantees secure encryption of input data that will be used for machine learning model inference.
The symmetrical key is encrypted using the public key of each chosen miner in a secure manner. If a user decides to go with N miners, the encryption process will be replicated N times using the public key of each miner.
The user assembles the encrypted input data, the collection of encrypted symmetrical keys, and their public key into a submission. This submission is then shared across the network.
Data Management by Miner
When a user's submission is received, a miner decrypts the symmetrical key using its private key.
The miner decrypts the user's original input data using the symmetrical key.
The miner efficiently handles the model inference task using the decrypted input data.
After finishing the task, the miner secures the final result by encrypting it with the user's public key.
Only the user who initially encrypted it using their private key is able to access the encrypted output on the network.
Security Measures
Symmetrical encryption protects input data from anyone except the miner with its private key.
Encrypting output data guarantees that only authorized users may access model results.
This encryption approach keeps user data safe during the procedure.
With the public key infrastructure (PKI) architecture, only the intended receivers may decode encrypted communications, maintaining data security throughout.
Last updated