Hands-on Trainings

Delivered by the Factory, the main goal of the hands-on trainings is for partners to better understand and integrate the libraries offered by the C4DT.

Drynx

When doing statistical analysis of data between multiple stakeholders, it is sometimes difficult to get access to the data itself that should be included in the data. This can be because of legislation, such as GDPR, privacy concerns, or for other reasons. Drynx solves this problem by keeping the data encrypted at all times, in particular when performing computation. Only the final result is decrypted.

This procedure is called homomorphic encryption, and up to recently, it has been synonymous with slow calculations. Drynx uses a novel approach that is much faster. It prevents malicious stakeholders to modify the statistics by manipulating the raw data. It also proves that all operations have been done correctly.

Drynx is currently evaluated using medical data, where the privacy constraints are very high. C4DT is preparing a demonstrator that shows how it can be applied to data used in the re-insurance business where different stakeholders cannot share data in plain text because of legal reasons.

Calypso & DARCs

As soon as different data owners who don’t trust each other want to share data, a blockchain can bring the necessary trust between the different partners. However, first generation blockchains couldn’t handle sensitive data, as every node has the full view of all data. The OmniLedger / Calypso blockchain from Prof. Bryan Ford’s lab at EPFL enables data owners to share their data in an encrypted way and to maintain control over who has access to which data. Using a blockchain means that there is no single point of failure which would allow to access the documents in a fraudulent manner.

Another challenge when sharing data is who has access to which data. In practice this means who manages the access rights to your data. At all times you will be able to trace who accessed the data. As the access to your data is based on blockchain technology, the audit trail is immutable, so that misbehaving users can be held accountable.

The challenge with decryption is that one compromised keypair can lead to the decryption of all stored data. This is why Calypso uses multiple decentralized keypairs to secure the data. An attacker must get access to all keypairs before he can fraudulently decrypt the data. At C4DT we run a public installation of the OmniLedger blockchain and use it for access control to our website and chat system.

Related news

Nov 27, 2018News
A growing number of wearable devices are becoming available. By their ability to measure physical activity and physiological characteristics such as heart rate, blood pressure, sleep patterns, etc., they constitute a cornerstone for the quantified self and personalized health. Yet, unavoidably, they bring a number of challenges in terms of security and privacy. This workshop will be held on Thursday, 6 December from 10:15-13:00, in room BC 410 at the EPFL.

Nov 2, 2018News
The founding General Assembly of C4DT was held on Friday, 2 November, in presence of the President of EPFL, Martin Vetterli, and of 50 guests. The 12 partners of the Center said they are keen to apply research to their business needs and regulatory requirements, at a time when digitalization is affecting their mission. EPFL professors then underlined the potential for improvements in digital protection and security.

Mar 2, 2018News
A group of lawyers and policy workers from the International Red Cross (ICRC) and other organizations concluded a computing and digital trust awareness-raising training at EPFL.The week-long course in collaboration with C4DT is intended to equip them with the tools to evaluate the impact of information systems on their humanitarian activities. The course starts from computing basics and touches cloud computing, information security and privacy preservation.

Next courses

No upcoming courses