Skip to content

Overview

Within Confidential Computing, the deployment process differs based on an organization's role in the system. This article defines these roles and provides guidance on selecting the appropriate deployment instructions, and includes diagrams illustrating which components each role must deploy and how they handle communication between organizations.

Roles

Organizations in Confidential Computing can assume three roles:

A single organization may participate in multiple roles simultaneously.

Data Provider

Data providers own the data used by the system. This data is securely transmitted to node operators through the data runway.

To deploy Confidential Computing as a data provider:

  1. Follow the data provider instructions in the getting started guide to set up your system.
  2. Refer to the data provider guide to deploy the required components.

The following diagram shows which are the necessary components in a data provider deployment and the network relations between them:

Data Provider Deployment Diagram

Analyst

Analysts perform statistical analysis on the available data. Their deployment process is similar to that of data providers, with minor variations.

To deploy Confidential Computing as an analyst:

  1. Follow the analyst instructions in the getting started guide to set up your system.
  2. Refer to the analyst guide to deploy the required components.

The following diagram shows which are the necessary components in an analyst deployment and the network relations between them:

Analyst Deployment Diagram

Node Operator

Node operators maintain the blockchain infrastructure necessary for executing confidential analysis. To deploy Confidential Computing as a node operator:

  1. Follow the node operator in the getting started guide to set up your system.
  2. Refer to the node operator to deploy the required components.

The following diagram shows the components that make up a node operator deployments. In addition, we include a data provider and an analyst deployment to highlight the network connections to the node operator.

Full Deployment Diagram

Browser

The Browser is a component that indexes the blockchain and provides a graphical user interface for inspecting smart contracts, blockchain accounts, and transactions. Any organization can deploy the Browser, but it is not required for the system to function. However, it is recommended as it simplifies interaction with and inspection of the blockchain.