DeLong Protocol ๐งฌ โ
1. Overview ๐ โ
DeLong is a trustless, privacy-preserving computation protocol tailored for longevity and biomedical research. It combines blockchain-based governance with secure TEE (Trusted Execution Environment) computation to enable researchers to analyze sensitive bio-data without compromising privacy. By leveraging decentralized governance and hardware-enforced confidentiality, DeLong allows scientists to perform complex analyses on encrypted datasets contributed by users, all while ensuring data providers retain full privacy and control. This DeLong Protocol is currently deployed on the Phala Network, integrating its large-scale TEE infrastructure with on-chain DAO governance for algorithm approval.
GitHub Repository: https://github.com/AvinasiLabs/delong
2. System Architecture ๐๏ธ โ
2.1 Core Components โ
- Blockchain Smart Contracts ๐: Handle governance and logging
- TEE Secure Computing Nodes ๐: Execute privacy-preserving computations
- Decentralized Storage ๐พ: Securely store encrypted data
- DAO Governance System ๐๏ธ: Community-driven algorithm approval mechanism
2.2 Technology Stack โ
- Blockchain Technology: For governance and verification
- TEE Technology: For secure computation
- Encryption Technology: For data protection
- Phala Network: Provides underlying TEE infrastructure
3. System Workflow โ๏ธ โ
3.1 Data Contribution Process โ
Data Encryption ๐
- Users encrypt sensitive biodata using the TEE node's public key
- Encrypted data packages are submitted to the DeLong Protocol
- Data is stored in TEE secure storage or distributed storage
Data Access Control ๐ก๏ธ
- Data owners can customize access policies
- Encrypted data can only be decrypted within authorized TEEs
- Ownership and access are recorded on the blockchain
3.2 Algorithm Execution โ
Algorithm Submission and Approval ๐
- Researchers submit algorithm code
- Community DAO reviews and approves
- Algorithm versions and changes are recorded on-chain
Secure Computation Process ๐ป
- Data and algorithms are decrypted inside TEE
- Computation is executed securely
- Only results are returned to authorized recipients
4. Key Features ๐ โ
4.1 Privacy Guarantees โ
- End-to-End Encryption ๐: Data remains encrypted from source to processing
- Zero-Knowledge Proofs ๐ก๏ธ: Verify computation results without accessing raw data
- Privacy Auditing ๐: All data access is recorded on the blockchain
4.2 Trustless Architecture โ
- Hardware Trusted Execution Environment ๐ช: Leverages modern CPU security features
- Remote Attestation โ : Verifies authenticity and integrity of computing nodes
- Open-Source Code Verification ๐๏ธ: All components are open-source for auditing
4.3 Application Scenarios โ
- Genomic data analysis
- Clinical trial data sharing
- Health record analytics
- Drug discovery research
- Personalized medicine solutions
5. Technical Implementation Details โก โ
5.1 TEE Implementation โ
Using Intel SGX ๐ฅ๏ธ
- Hardware-based memory encryption
- Code integrity verification
- Data isolation protection
Storage and Computation Separation ๐
- Encrypted data stored in distributed systems
- Computation performed only in verified TEEs
- Results re-encrypted for transmission
5.2 Blockchain Integration โ
Phala Network Integration ๐
- Utilizes Phala's TEE worker network
- On-chain TEE attestation mechanisms
- Secure messaging system
Smart Contract Governance ๐
- Automated algorithm approval process
- Data access permission management
- Computation request validation and authorization
6. User Value ๐ โ
6.1 Value for Researchers โ
- Access to larger-scale datasets
- No need to handle complex data privacy issues
- Accelerated research progress and breakthroughs
- Reduced research compliance costs
6.2 Value for Data Contributors โ
- Complete control over personal data permissions
- Support scientific progress while protecting privacy
- Track data usage
- Participate in governance decisions
7. Open Source Commitment ๐ โ
All components of the DeLong Protocolโfrom smart contracts to enclave code and client librariesโare released as open-source software. This open-source commitment serves several vital purposes:
- Transparency and Trust: Anyone can inspect how DeLong works
- Reproducibility and Scientific Rigor: Others can reproduce and build upon our work
- Community-Driven Development: Contributors from around the world can help enhance the DeLong Protocol
- Ethical Alignment: As the DeLong Protocol handles sensitive personal data, integrity and openness are essential
The complete source code is available in our GitHub repository.
8. Vision and Future ๐ฎ โ
DeLong aims to become a cornerstone of privacy-preserving scientific computing that accelerates discoveries in longevity and broader biomedical research. We envision a future where sensitive medical and biological data from around the worldโgenomic sequences, clinical trial data, health recordsโcan be pooled virtually without compromising individual privacy.
Future development directions include:
- Expanding support for more biomedical research fields
- Integrating federated learning technologies
- Exploring diverse TEE hardware support
- Enhancing community governance mechanisms
9. Join Us ๐ค โ
We invite scientists, developers, and forward-thinking institutions to join our journey:
- For Researchers: Consider leveraging DeLong for your studies
- For Data Contributors/Patient Advocates: Learn how your data can safely fuel discoveries
- For Developers/Security Experts: Contribute to the codebase or perform audits
By working together, we can build the DeLong Protocol that not only advances longevity science but also sets a new standard for ethical, secure, and decentralized computation.
Get Involved: Explore our GitHub repository to learn more about the project and find ways to contribute.