Log Hashes of Accessed Dataset Chunks During Training
Log Hashes During Data Access:
During training, every time the model accesses a dataset chunk, the node logs the hash of that chunk.
This logging is done in real-time and saved as a secure log on chain that the model owner can review after training.
Randomized Hash Sampling:
To reduce overhead, the model owner may specify randomized intervals for hash logging (e.g., every Nth data access). This still provides integrity verification without requiring constant logging.
Secure Storage of the Hash Log:
The hash log is stored on chain, preventing tampering. After training, this log will be shared with the model owner for verification.
PreviousConstruct the Merkle Tree and Commit to the Merkle RootNextTransmission of Model Updates, Merkle Proofs, and Hash Log to the Model Owner
Last updated