Trias — Authmen

Trias — Authmen

After the preliminary evaluation of the Hackathon expert group, the first project of Trias 2020 Trusted Computing Hackathon to be shortlisted in the superior team has been produced. It is the trusted storage protocol – Authmen. At the same time, as an award to the superior team, Authmen will receive the investment and incubation opportunities from Trias Foundation and its alliance partners.

About Authmen

Authmen is a trusted blockchain storage protocol which is based on the distributed idea of blockchain. It mainly solves the problems of data storage and data flow. More concretely, it aims to provide distributed trust feature of the underlying blockchain technology, high availability, openness and transparency, tamper proof, security and privacy-preserving kinds of technical characteristics building a tamper-proof and a traceability system.

Because the distributed storage mainly depends on the decentralized node structure, the storage proof consensus algorithm is needed for spatial consensus. If the consensus algorithm is missing, other nodes can not be trusted, and the problems such as whether the space for a node is enough to store data, whether the stored files or copies have been lost, can not be solved.

At present, most of the blockchains with storage characteristics in the market only recognize the storage capacity of blockchain nodes subjectively. They can’t confirm the trusted nodes from mathematics and computer algorithms, and can’t achieve safe and reliable trust for the stored data, which goes against the original intention of building trusted data and nodes of blockchain.

Authmen is a middleware to solve all kinds of confusion and problems of distributed storage protocol.

1. More Efficient And Secure Storage

The design is exquisite and has stronger performance. It can realize the fast blockchain storage and traceability scheme corresponding to the key information system, and carry out the storage and transmission based on the blockchain in the process of data sharing.

2. Real Tamper Proof Technology

In a real sense, it can help users to achieve tamper proof function, instead of storage that users can’t control like arweave. In addition, the key data of malicious tampering can be found in time, and the false data and illegally tampered malicious data can be found in the use process, and can be repaired in time.

3. Wider Application Scenarios

It can provide efficient and convenient blockchain services for enterprises and institutions, and directly manage data through front-end pages. It can provide users with localized deployment of blockchain system, with the help of its own anti tamper, traceability, strong disaster recovery and other features, it can save energy and improve efficiency for enterprise data management.

4. Trusted Storage Node

With the combination of the security technology of Trias trusted basic chain and Byzantine consensus algorithm after blockchain optimization, it innovatively increases the weight consensus proportion factor of reputation system, greatly reduces the consensus computing cost of blockchain node information, and accelerates the transmission speed of data on the blockchain. By introducing the mechanism of trusted computing, the storage nodes are given credit system factors, which greatly reduces the consensus complexity of consensus nodes, and improves the execution time of existing distributed storage blockchain by more than 10 times.

Technology Ecology of Authmen

Authmen adopts the three-layer computing power system based on leviatom in Trias architecture, and the combination of TEE trusted computing and zero knowledge proof technology to complete the right confirmation and security protection of distributed storage data.

The trusted network constructed by levitom layer of Trias maintains a unique white list for each storage node, which can prevent the loading of abnormal programs and effectively block network security attacks. At the same time, HCGgraph is a trusted computing technology based on heterogeneous TEE. With the help of Gossip protocol, a “trusted acquaintance” network is constructed between consensus nodes using different TEE technologies, and a “conspiracy default” model of global nodes is constructed to locate trusted nodes efficiently, which makes consensus more efficient and cost-effective.

At the same time, the TEE technology of Trias does not rely on a single category of hardware, so it has stronger compatibility. The use of TEE technology can verify and protect the whole life cycle of the computer running environment on the basis of the – 1 layer of the hardware root. At the same time, under the TEE security defense model of Trias, it becomes a new incentive oriented security model, which allows the defender to actively contribute the defense nodes and computing power of TEE, and get the corresponding advantage economic stimulation according to the defense contribution provided in the Trias security network. Through the trusted computing of Trias, multi-party, remote and heterogeneous data storage, sharing and computing can be realized under the premise of maintaining data ownership and privacy.

In addition, the data of trusted hardware and program based on Trias can ensure that the information or data will not be disclosed in the trusted program, and ZK snarks are used to ensure the privacy of the data.

Through trusted computing, Authmen enables different tee protocols to collect the latest status of neighboring nodes, check and record historical information, and propagate the results among other nodes through gossip protocol, and form a reputation network. It repeatedly selects “the most difficult point to lie” as its repeated function contract presentation, forming a robust and efficient running environment, and building a trusted computing based environment Based on the blockchain distributed storage security network.

In addition, the time of 2020 Trusted Computing Hackathon has been extended to December 31. The participating teams can submit their entries within this time. According to the rolling basis mechanism, the quota of 10 superior teams will be on a first come, first served basis. Developers who are interested in participating in the competition should not miss it.

Leave a Reply

Your email address will not be published. Required fields are marked *