How Trusted Computing Solves Blockchain Issues?
There have been many major security incidents during the development of the blockchain. The ransomware of the previous period caused huge losses. We must pay more attention to blockchain security, and make blockchain safe from classified protection. Only trusted computing can solve the security of blockchain.
How to do it?
Trusted computing may provide a solution. Everyone often hears ‘security and trustworthy.’ First, we need to distinguish between security and trustworthy. The trustworthy we are talking about here is a basic concept in trusted computing. If the behavior of the entity matches the expected behavior for a particular purpose, then the entity is said to be authentic for this purpose. But what we say ‘trustworthy’ does not mean that its behavior must be safe. For example, a computer system sometimes fails, and sometimes it is attacked. If this phenomenon occurs within our expectations, the system is still believable, but it is not necessarily safe. Therefore, credibility emphasizes whether the behavior of the entity matches the expected behavior.
Trias, a trustworthy and reliable intelligent autonomous systems, is to build a decentralized common platform for trusted computing to achieve a trusted software execution environment; and a set of decentralized auditable and traceable trusted software development operations and maintenance systems ensure that the software’s own behavior can be verified and traced. In the end, the correct all-platform hardware environment is guaranteed to implement the correct native application, achieving the security strength of Blockchain smart contract. Further, using the pass-through economic model, Trias drives the computing power and the software to operate in an ecologically healthy, orderly and safe manner, realizing the orderly scheduling of trusted software in the trusted execution environment, and finally achieving the trustworthy and reliable all-platform programming.
Trias blockchain fundamentally reduces and optimizes the consensus process and the node cost by using the heterogeneous consensus algorithm of trusted computing and improves the consensus speed. Through the combination of trusted computing and DevSecOps, starting from the software source phase, each time the changed behavior is based on the traceable chain analysis and deposit verification. With the trusted computing technology, the access and data access of the external chain device is based on the traditional mining software or wallet access method, and the entire users’ operating environment performs metrics and verification of trusted computing to ensure the verification of the state of the user’s operating environment in 7*24 hours. Even if there is a 1-byte non-whitelist change, the non-trusted outer chain can be found. The behavior and nodes solve the problem of the low cost of access destruction of existing blockchain technologies. With a range of technical features of trusted computing technology, Trias is able to support a wider and more versatile application scenario. For example, trusted software traceability and threat intelligence platform, intelligent manufacturing and logistics supply chain, financial big data platform, medical big data platform, entertainment video content compliance computing platform, automatic driving AI training computing platform, etc.
Trias aims to define a new-generation all-platform-supported public chain system. Trustworthy and Reliable Intelligent Autonomous Systems make people trust in machines.
Trias Core Technologies
1. Unique trusted mechanism
The core of the Leviatom network is a set of Heterogeneous Consensus Graph algorithms (HCGraph) based on trusted technology. HCGraph is a combination of trusted computing technology based on heterogeneous TEE (Trusted Execution Environment) and graph computing technology based on small world network. HCGraph makes use of the transitivity of trust and uses the gossip protocol to realize the trusted relationship between consensus nodes using different TEE technologies.
2. Remote authentication between nodes
Leviatom uses the idea of TEE trusted computing to establish the trust of consensus terminal platform, then establishes the trust between platforms through remote attestation, and finally extends the trust to the whole consensus network. Remote attestation is a comprehensive integrity check and identity authentication process, which provides a trusted platform status report to the verifier.
3. Continuous trusted state
All nodes in Leviatom will run a game called “God’s roll of dice”. The purpose is to randomly request some nodes in the network to initiate their own trusted attestation challenge according to the current working state of the network on the chain. On the one hand, you can confirm whether you meet the environmental requirements of joining the Leviatom work node. On the other hand, you can constantly prove your TEE status, and show the real-time credibility of your work to the full consensus network, so as to ensure that the working state of 7×24 hours from the beginning of joining the chain is in a trusted state.
4. Efficient consensus
Based on the trusted dependency relationship, HCGraph further constructs the “collusion default” model of global nodes, which realizes the efficient and accurate location of extremely difficult “lying” nodes, and cools and removes the untrusted nodes. Based on a small number of these extremely difficult “lying” nodes, Leviatom further implements the trusted execution of arbitrary native code, and distributes smart contract programs to these nodes, which improves the consensus efficiency.
Trias is composed of three layers: Leviatom, Prometh and MagCarta.
1. Leviatom is an integration of Trusted Execution Environments (TEEs) and Heterogeneous Consensus Graph, a graph computing algorithm similar to Hashgraph or DAGs. It can serve as the underlying ‘-1 layer’ for other public chains, including Ethereum and Hyperledger.
2. Prometh is a combination of formal verification and DevSecOps methodologies to achieve traceable and verifiable general-purpose software development.
3. MagCarta is a consensus-oriented programming paradigm to achieve embed and self-defined consensus strategy for high-order enterprise DApps.
Learn more about Trias:
Official website: https://www.trias.one
Trade TRY on Kucoin: https://www.kucoin.com/
Catherine West is a Labour Party politician in the United Kingdom. She was first elected as the Member of Parliament for Hornsey and Wood Green in May 2015. She writes stories as well as news. She wrote number of book.
Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Acumen Digest journalist was involved in the writing and production of this article.