Sample data sharing mode
Product Description
As a third-party sample library, close data interaction and sharing with the sample source organization will become a normal work. The traditional data sharing mode may bring a series of problems, and the results and data ownership will be controversial or full to some extent, such as the difficulty of privacy protection, data confirmation, and no incentive mechanism. In view of these problems, in-depth exploration will be carried out in the following three aspects in the future:
(1) Relying on the big data platform of the information center for centralized sharing, information sharing will be centralized on the big data platform of the information center, and data retrieval, viewing, analysis, mining and other work will be completed on the big data platform: control data access rights, track data usage, and protect the rights of data owners through the authorization mechanism; For confidential information, the question and answer method can be used to ensure the privacy of data while sharing information.
(2) Rely on mature terminal security system to realize sharing. Use existing mature terminal security system to encrypt shared information and allow automatic document decryption in authorized environment. The encryption methods include: authorize the specified machine, and only allow the specific machine to open and view the information; Limit the viewing period, opening times, opening password, copying, editing, printing and other permissions of the document; Perform permission authentication through USBkey.
(3) Exploring the use of blockchain technology to realize shared blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. By introducing the four characteristics of blockchain technology (distributed ledger, cryptography technology, end-user authorization mechanism, smart contract and incentive mechanism), a new model of data sharing can be realized, and the problem of multi-organization sample data sharing can be solved pertinently: the distributed ledger technology solves the dispute over the dominance of the sample database system; Cryptography technology realizes data privacy protection; End user authorization mechanism; Zero knowledge proof; Integral incentive mechanism based on smart contract.
(1) Relying on the big data platform of the information center for centralized sharing, information sharing will be centralized on the big data platform of the information center, and data retrieval, viewing, analysis, mining and other work will be completed on the big data platform: control data access rights, track data usage, and protect the rights of data owners through the authorization mechanism; For confidential information, the question and answer method can be used to ensure the privacy of data while sharing information.
(2) Rely on mature terminal security system to realize sharing. Use existing mature terminal security system to encrypt shared information and allow automatic document decryption in authorized environment. The encryption methods include: authorize the specified machine, and only allow the specific machine to open and view the information; Limit the viewing period, opening times, opening password, copying, editing, printing and other permissions of the document; Perform permission authentication through USBkey.
(3) Exploring the use of blockchain technology to realize shared blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. By introducing the four characteristics of blockchain technology (distributed ledger, cryptography technology, end-user authorization mechanism, smart contract and incentive mechanism), a new model of data sharing can be realized, and the problem of multi-organization sample data sharing can be solved pertinently: the distributed ledger technology solves the dispute over the dominance of the sample database system; Cryptography technology realizes data privacy protection; End user authorization mechanism; Zero knowledge proof; Integral incentive mechanism based on smart contract.