Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
We talk to NuGenesis about its freakish obsession with crashing and hacking their own blockchains, using the best blackhats in the business. In the light of the recent hacks continuing to plague Defi, its an opportunity to review the developments in security.
With the internet of things (‘IOT’), supply-chain and NFT serialisation of physical items using physical unclonable functions (‘PUFs’), being a digital fingerprint hardware that service as a unique identifier of the devices, there is exponential increases in the interaction of data through an increasing number of data points. Individuals have little or no control over the storage and the access to their information. in the era of cloud computing and networking systems where many users share the same physical storage or network. Application developers migrate their storage and computations to the clouds and require the data privacy to be granted. Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.
NuGenesis uses networks combining private and public networks in a blockchain system that separates the sensitivity of the data for client needs and consequently uses a vast variety of authentication systems, privacy services, providence services and integrity assurance services. “The proper integration for these services in blockchain technologies”, says CEO Hussein Faraj, “has been based around scalability concerns when using miners. We are increasingly streamlining our services with the removal of scalability as an issue.”
Integrity assurance deals with the correctness and the validity of the data stored, accessed, or generated by the network. It assures that the information has not been changed or corrupted by unauthorized users. Providing an end-to-end integrity assurance maintains consistency, reliability, accuracy, and trustworthiness of the information over its entire lifecycle. The integrity is one of the basic components of the CIA (confidentiality, integrity and availability) triad for information security. The leading approaches uses the smart contracts to achieve its objectives. This framework is dedicated to IoT applications that require a producer-consumer architecture. In this architecture, the owner shares the data with other consumers for specific purposes. The data is generally shared through the use of the cloud storage services, where the owner posts the data to the cloud and the consumers access the data from there. Storing the data in the blockchain database provides the integrity service.
However, the blockchain database are limited in memory and cannot handle the massive amounts of data. Thus, storing all the cloud data becomes impractical. The idea of this framework is to store encrypted hash values of the data on the blockchain database and these hash values are then used to check the integrity. Storj is a blockchain-based peer to peer data storage system that utilizes the blockchain database to store hash values of the data and verify the integrity. The network validates the data stored offchain and returns back the metadata needed to retrieve the original data. In this way, the integrity is provided efficiently; however, the requirement of tracking the intruders in case the data is changed is still not provided. Ericsson partnered with Guardtime to provide integrity services that allow the application developers to assure the integrity of their users’ data and assets. They utilize Keyless Signature Infrastructure (KSI) to generate signatures for the resources. The Ericsson service verifies that a collection of data has not been altered by storing their signature on a blockchain.
The limitations come down to the computational power required that nodes generally do not possess. The industry speculation is the use of specialised application mining nodes with high computational
power, and with the point of failure involved with greater centralisation. Other proposals involve decision making from the local blockchain logs without requiring distributed consensus. For example, in the blockchain-based ACL (Access Control List) mechanisms (the ACL assuring that by defining a set of rules stating who can access a specific set of data and when), the access decisions are made based on the local copies of the blockchain database. However, this defeats the technology decentralized architecture and its consensus as the nodes need to trust the local blockchain database and make centralized decisions. Many promises have been made to resolve Bitcoin’s time issues in Ethereum and Hyperledger platforms. However, the time required for mining is still two or three seconds as compared to the milliseconds requirement.
NuGenesis chains easily run in the milliseconds needed for the IOT and PUF supply chain rapid and frequent communication. Rather than looking to store data locally or off-chain etc, NuGenesis prefer dedicated blockchain storage chains to be readily auditable precisely for their valuable data analytics in real time. The system validator nodes run on the randomness of the round robin protocol and monitored by AI and can achieve transaction speeds in the milliseconds. There are no requests from 1000’s of validators and fee actions. The streamlined validation process through the super nodes with byzantine fault tolerance and randomness via round robin monitored by AI, makes unnecessarily superfluous broadcasting through validation networks.
NuGenesis’ current innovation is the use of specially designed load balancers for blockchain. Load balancers are used on the internet to transact millions of transactions per second. There is no apparent limitation on the load balancer. All requests from wallets, apps etc come to the load balancer, whose role it is to send the data to the right chain.
The load balancers work on both the hardware level (routers, switches and dedicated systems) and software level. They allocate the data according to the utilisation of the relevant chain at the relevant time with where the data is supposed to be processed.
NuGenesis load balancers do not require a continence chain to reconnect the data from the separate chains because they have a blockchain ledger built into them with a consensus mechanism that records what is in each block and backs up to a storage chain.
With parallel processing of infinite blockchains running as para-networks, scaling up to 1,000 chains parallel processing data is efficient. Data is sent through the load balancer which keeps track of the database and storage of where data is sent in the storage chains. Data can be readily searched from the explorer on the load balancer.
With NuGenesis’ implementation of load balancers and consensus before packing on the load balancer, the more parallel network chains that are added, the more data is injected into block creation of the connected chains. Without a validation delay (validation occurring within a 100th of a microsecond), and accordingly there are more dramatic increases in the speed of transactions. The more chains that connect to the NuGenesis blockchain system with their own sovereign systems, they claim there is no extraneous pressure on any particular system. With parallel processing, the more systems, the faster the transactions processing.
The simplicity of storage chains to provide comprehensive ACL updates and modify providence information in milliseconds, may be better appreciated at each stage of the security service process. The primary security service commences with authentication. Public Key Infrastructure (‘KPI’) involved centralised certificate authorities (‘CA’) or decentralised web of trust (‘WoT’) to create, manage, use, store, and distribute the public encryption keys. Whilst CA require trust and have a single point of failure, WOT-based KPI also has the problem that they are unable to provide identity retention. That is, it is possible for a user to impersonate the identity or the public key of an already registered user.
Blockchain based KPI solutions include Pemcor which uses the hash-value of the certificate being stored in the blockchain. Others include Blockstack ID that uses Namecoin to build a distributed PKI system. Namecoin is a fork of Bitcoin that allows data storage within the blockchain transactions. It is implemented by defining a name-value pair that is used to store usernames and can be recorded in the transactions. Namecoin was originated to store the DNS names, allowing users to register their humanreadable name and associating names with the corresponding public keys. Blockstack modifies Namecoin by adding another namevalue pair dedicated for the public keys. The advantage of using Namecoin is that it already supports the name-value pairs in its transactions. Thus, the public key is the value and the name is the identity of the owner. Blockstack implementation binds the user identity to an elliptic curve public key which is one of the strongest public key cryptography mechanisms to date.
Where the limitations of storage, efficiency and scalability with these solutions become insurmountable are with privacy services. One approach used by NuGenesis for those private blockchains within public blockchains configurations is to completely hide the user’s identify within the trustworthy environment of permissioned users. Data anonymization and differential privacy mechanisms hide the identity of the user and make it difficult to link the data to its owner. Another approach used by NuGenesis is to utilise smart contracts to define the access control policies and make authorisation decisions. The is their IOT solution for allowing users to register their new resources and define their access policies through the smart contract associated with these resources.
“our social media platform will revolutionise privacy” says NuGenesis CEO Hussein Faraj:
“users will be able to set their own policies, through our smart contract upgrade to Digital Notarised Contracts (“DNC’s”), to control the rules of what the platform, advertisers and users in general get to see and do with their personal data, including setting immediate and perpetual micropayments for that use”.
Another approach to privacy is to utilise utilize the blockchain technology to verify access control logs for clouds in a federated cloud environment. The key idea is to use the smart contracts in defining the access rights and collecting the access logs from different clouds. The blockchain miners compare the access rights to the access logs. If a violation is detected, an alert is raised to be further handled by the
system.
This approach was implemented on top of the Ethereum platform. Results show that the system is resilient to many threats, including compromising the communication channel to modify the access rights, compromising the policy evaluation to allow unauthorized accesses, and compromising the logs to alter or delete them. However, latency, cost and scalability are the challenges that need to be considered for this platform to become practical. These problems disappear on the NuGenesis’ own layer 1 chains.
Data provenance security services deal with the auditability of the metadata that tracks and reports the originality of the data and the operations associated with them. In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions. The owners need to know not only the data originality, but also the manipulations and the accesses to the data along its lifecycle. For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification. Further, the consumers need to know how accurate the information is and what time it was sent. This can be achieved only by proper data provenance techniques. The same provenance requirements are applied to the healthcare data, the financial data, the governmental resource, or even scientific applications. Such applications are worldwide, generating massive amounts of data that need to be tracked. Hence, the provenance guarantees are crucial for these applications.
ProvChain, Data Prov, Provenance and BlockVerify excel in this field using blockchain based tracking systems, particularly for specialised use cases. Data Prov is used for drug trials and wheat production. BlockVerify tracks counterfeit products and its best uses are in pharma, luxury products, diamonds and electronics. For more general application says NuGenesis CEO, Hussein Faraj says “you need two things. Firstly smart contracts that are more robust, such as DNCs, in checking data originality, validity and timing of all changes and an unlimited storage chain with dedicated node for analytics”.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.