Story Unveils Confidential Data Rails for Secure On-Chain Control of Sensitive Data
Summary
- Story (IP) said it had introduced Confidential Data Rails (CDR) on its testnet, creating infrastructure that allows sensitive data to be used securely on the blockchain.
- CDR uses encrypted data, distributed key management, and smart contract-based access permissions to reduce the privacy and access-control limits of traditional blockchains.
- Story said CDR could provide a secure foundation for the use of sensitive data such as artificial intelligence (AI) training data, bio information, and API keys.
Forecast Trend Report by Period



Story, the blockchain project focused on intellectual property and associated with the IP token, said April 13 that it had introduced Confidential Data Rails, or CDR, on its testnet.
CDR is infrastructure that lets protocols use sensitive data securely on-chain. It controls encrypted data through on-chain logic and automatically delivers it when preset conditions are met.
Traditional blockchains are strong on transparency and verification, but have been limited in data privacy and access control. Web2-based systems, by contrast, are easier to manage but depend on centralized trust.
CDR is designed to narrow that gap. Data is stored in encrypted form in external storage, while decryption keys are managed in a distributed manner. Access permissions are defined through smart contracts. Only users who meet specified conditions can view the data.
For example, users who purchase a content license automatically receive access rights without a separate delivery process. That removes off-chain steps such as email or file transfers.
At the core is the concept of programmable data. Beyond simple viewing rights, conditions such as usage periods, license ownership and specific execution environments, including trusted execution environments, or TEEs, can be set on-chain. The structure embeds those conditions into the data itself.
A Story representative said the system could provide a foundation for the secure use of sensitive data such as artificial intelligence training data, bio information and API keys.

YM Lee
20min@bloomingbit.ioCrypto Chatterbox_ tlg@Bloomingbit_YMLEE





