All data is client-side encrypted and will only be encrypted by the owner if he agrees to participate in a remotely triggered data collection.
Queries for data are processed on demand, therefore the data stays encrypted until the user agrees to publish the requested data. After approval, the data get’s decrypted by the user and will be transferred via a secured channel to a secured environment where the data will be processed. After processing took place all data sets will be deleted from the environment so that the risk of unwanted data breaches within the system will be minimized.
Only the result of the analysis is forwarded to the data analysis requesting instance. Composing described architecture a protective layer emerges, which protects the data producers privacy, while simultaneously incentives to release it for analysis by a compensation model.