{"id":33922,"date":"2018-02-22T09:59:04","date_gmt":"2018-02-22T08:59:04","guid":{"rendered":"http:\/\/e3mag.com\/?p=33922"},"modified":"2024-12-12T11:44:06","modified_gmt":"2024-12-12T10:44:06","slug":"blockchain-privacy-problem","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/das-datenschutzproblem\/","title":{"rendered":"The Privacy Problem with Blockchain"},"content":{"rendered":"<p>Data in a blockchain network is first of all never private but can be read by other members of the network. This fundamental problem can, however, be overcome with Trusted Computing Appliances.<\/p>\n\n\n\n<p>There are use cases where trustworthy processing of private data is not possible with current blockchains. This is very problematic especially when intellectual property needs to be protected at the same time as accelerating existing manual processes involving experts and legal advisors. Examples of such processes are the communication of regulated food additives in the consumer goods industry or substance control within the framework of drug approval. But why can blockchains not be used for trustworthy processing of private data today? After all, \u201ctrustworthiness\u201d tops the list of this technology\u2019s advantages. The crux of the matter concerns the nature of \u201cprivate\u201d in the data to be processed.<\/p><div id=\"great-2491804691\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>In a classical sense, data in a blockchain is never private, i.e. it can always be read by other members in the network. If data is encrypted before being transmitted to a blockchain, it cannot then be processed by means of smart contracts unless the smart contract in turn decoded it. But then of course the necessary decoding key would be visible to all members. The Hyperledger technology is attempting to solve the visibility problem using so-called \u201cchannels\u201d that certain members of a blockchain network can share. Depending on the complexity of the network of relationships, this approach can, however, very quickly become unmanageable and uneconomical. And it is precisely in manufacturing industries that very heavily protected intellectual property is to be found that may never leave the corporate network\u2014and certainly not towards a decentralized system over which the owner doesn\u2019t have complete control. Camelot ITLab\u2019s Trusted Computing Appliances offers one possible solution to the privacy problem.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2018\/02\/Grafik-Camelot-1803.jpg\"><img decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2018\/02\/Grafik-Camelot-1803.jpg\" alt=\"Graphic Camelot 1803\" class=\"wp-image-33923\"\/><\/a><figcaption class=\"wp-element-caption\">Camelot Trusted Computing Appliance: Trusted processing of private data in connection with a blockchain network.<\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Additional services Trusted Computing Appliances<\/h3>\n\n\n\n<p>The concept works as follows: an owner\u2019s private data is saved only locally but registered via hash value on the blockchain. This eliminates the possibility of the owner ever manipulating the data in his own favor at any time. All the parties agree on an algorithm (program) that is allowed to process the private data, for example a simple cross-check between two lists as well as the return of the intersection. Ideally, the distribution of the program between the parties connected to the network is also done via blockchain mechanisms. After executing the program, the returning value (intersection) may be distributed via the blockchain to the corresponding remote nodes. But this approach has the following drawback: Since the program runs on the infrastructure\u2014the PC or server\u2014of the data owner, this person could manipulate the data himself and thus falsify or distort in his own favor the returning value reaching the blockchain. This is where Trusted Computing comes into play.<\/p>\n\n\n\n<p>Using measures firmly anchored in the processor, it prevents manipulation of local programs as well as any interference in the running processes of this program. The Trusted Computing Appliance thus facilitates the operation of \u201cOff-Chain Smart Contracts\u201d which although local, still run in a trustworthy environment. Camelot calls these above-mentioned programs, which all members of the network agree on, \u201ctrustlets\u201d; the trustworthy environment in the current service version is Intel SGX (Software Guard Extension). The biggest challenge when developing the Trusted Computing Services was to render secure the unsecured area between the blockchain and the trustlets. This was achieved with the aid of a coherent concept that describes onboarding mechanisms which function using voting machines and data integrity achieved through digital signatures, the blockchain to be used being in principle freely selectable. Camelot\u2019s reference implementation uses Hyperledger Fabric in the SAP Cloud Platform Blockchain Service.<\/p>\n\n\n\n<p>Besides processing protected data, the technical use cases also comprise for example what is known as the inter-blockchain transfer of data, i.e. safe transfer of transactions from one blockchain technology to another as well as inserting data from secure data sources into a blockchain network. Trustlets relate exclusively to code compiled by Camelot. However, also script language interpreters are planned for the next version of Trusted Computing so that the algorithms can be distributed in real time. This shows that this field still has a high optimization and development potential badly needed in the marketplace.<\/p>\n\n\n\n<p>To the partner entry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/e3mag.com\/partners\/camelot-itlab-gmbh\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"189\" height=\"33\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/01\/camelot-3.jpg\" alt=\"Camelot ITLab GmbH\" class=\"wp-image-7755\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/01\/camelot-3.jpg 189w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/01\/camelot-3-100x17.jpg 100w\" sizes=\"auto, (max-width: 189px) 100vw, 189px\" \/><\/a><\/figure>\n\n\n\n<p>\u00a0PDF Download in English:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/E-3_1804_CamelotITLab_Spotlight_Blockchain.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"125\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125.jpg\" alt=\"\" class=\"wp-image-147290\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/11\/banner_1000x125-600x75.jpg 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Blockchains are generally incompatible with trustworthy processing of private data. While \"trustworthy\" is one of blockchain's central features, as far as the attribute \"private\" is concerned, the technology must by definition surrender.<\/p>","protected":false},"author":1407,"featured_media":36746,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[20708,20719],"tags":[886],"coauthors":[21850],"class_list":["post-33922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coverstory-1803","category-mag-1803","tag-blockchain","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",400,198,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-768x381.jpg",768,381,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-100x50.jpg",100,50,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-480x238.jpg",480,238,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-640x317.jpg",640,317,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-720x357.jpg",720,357,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-960x476.jpg",960,476,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",1000,496,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",600,298,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448.jpg",600,298,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/04\/shutterstock_170443448-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Blockchains lassen sich grunds\u00e4tzlich nicht f\u00fcr die vertrauensw\u00fcrdige Verarbeitung privater Daten nutzen. Zwar ist \u201evertrauensw\u00fcrdig\u201c eines der zentralen Blockchain-Attribute. Doch bei der Eigenschaft \u201eprivat\u201c muss die Technologie per Definition kapitulieren.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/coverstorys\/coverstory-1803\/\" rel=\"category tag\">Coverstory 18-03<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1803\/\" rel=\"category tag\">MAG 18-03<\/a>","author_info_v2":{"name":"Andreas Goebel, Camelot","url":"https:\/\/e3mag.com\/en\/author\/andreas-goebel\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/33922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=33922"}],"version-history":[{"count":4,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/33922\/revisions"}],"predecessor-version":[{"id":147795,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/33922\/revisions\/147795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/36746"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=33922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=33922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=33922"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=33922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}