Authmen: Next Generation Trusted Blockchain Storage

Authmen is a trusted blockchain storage protocol. It is a new storage scheme based on the distributed idea of blockchain. It mainly solves the problems of data storage and data flow. Using trusted blockchain technology distributed high availability, open and transparent, tamper proof, information security and other technical characteristics, to build information security tamper proof and traceability system.

Because the distributed storage mainly depends on the decentralized node structure, the storage proof consensus algorithm is needed for spatial consensus. If the consensus algorithm is missing, other nodes can not be trusted, and the problems such as whether the space for a node is enough to store data, whether the stored files or copies, have been lost can not be solved.

At present, most of the blockchains with storage characteristics in the market only recognize the storage capacity of blockchain nodes subjectively. They can not achieve a trusted node from the mathematical and computer algorithms, and can not achieve safe and reliable trust for the stored data, which violates the original intention of the blockchain to build trusted data and nodes.

Authmen is a middleware to solve all kinds of confusion and problems of distributed storage protocol.

What are the characteristics of Authmen trusted storage protocol?

1. More Efficient And Secure Storage

The design is exquisite and has stronger performance. It can realize the fast blockchain storage and traceability scheme corresponding to the key information system, and carry out the storage and transmission based on the blockchain in the process of data sharing.

2. Real Tamper Proof Technology

In a real sense, it can help users to achieve tamper proof function, instead of storage that users can’t control like arweave. In addition, the key data of malicious tampering can be found in time, and the false data and illegally tampered malicious data can be found in the use process, and can be repaired in time.

3. Wider Application Scenarios

It can provide efficient and convenient blockchain services for enterprises and institutions, and directly manage data through front-end pages. It can provide users with localized deployment of blockchain system, with the help of its own anti tamper, traceability, strong disaster recovery and other features, it can save energy and improve efficiency for enterprise data management.

4. Trusted Storage Node

With the combination of the security technology of Trias trusted basic chain and Byzantine consensus algorithm after blockchain optimization, it innovatively increases the weight consensus proportion factor of reputation system, greatly reduces the consensus computing cost of blockchain node information, and accelerates the transmission speed of data on the blockchain. By introducing the mechanism of trusted computing, the storage nodes are given credit system factors, which greatly reduces the consensus complexity of consensus nodes, and improves the execution time of existing distributed storage blockchain by more than 10 times.

Authmen adopts the three-layer computing power system based on Leviatom in Trias architecture, and the combination of TEE trusted computing and zero knowledge proof technology to complete the right confirmation and security protection of distributed storage data.
The trusted network constructed by Levitom layer of Trias maintains a unique white list for each storage node, which can prevent the loading of abnormal programs and effectively block network security attacks. At the same time, HCGraph is a trusted computing technology based on heterogeneous TEE. With the help of gossip protocol, a “trusted acquaintance” network is constructed between consensus nodes using different TEE technologies, and a “conspiracy default” model of global nodes is constructed to locate trusted nodes efficiently, which makes consensus more efficient and cost-effective.

At the same time, the TEE technology of Trias does not rely on a single category of hardware, so it has stronger compatibility. Using TEE technology can verify and protect the whole life cycle of the computer operating environment based on the -1 layer of the hardware root. At the same time, under the TEE security defense model of Trias, it has become a new incentive oriented security model, allowing defenders to actively contribute to the defense nodes and computing power of TEE. According to the defense contribution provided by the Trias security network, the corresponding advantages of economic incentives can be obtained. Through the trusted computing of Trias, multi-party, remote and heterogeneous data storage, sharing and computing can be realized under the premise of maintaining data ownership and privacy.

In addition, the data leakage of trusted hardware and trusted program based on Trias ensures that information or data are not leaked in trusted programs, and ZK-sNARKs are used to ensure the privacy of data.

Through trusted computing, Authmen enables different TEE protocols to collect the latest status of neighboring nodes, check and record historical information, and propagate the results among other nodes through gossip protocol, and form a reputation network. It repeatedly selects “the most difficult point to lie” as its repeated function contract presentation, forming a robust and efficient running environment, and building a trusted computing based environment based on the blockchain distributed storage security network.

A trusted blockchain storage protocol