kmschain
play

KMSchain Zero-knowle ledge, , dec decentraliz ized solu - PowerPoint PPT Presentation

KMSchain Zero-knowle ledge, , dec decentraliz ized solu solutions for or inclusive pr protection of of da data pr priv ivacy on cl on cloud, , bl blockchain in an and be beyond. . We e ar are experts of of zer ero-knowle


  1. KMSchain Zero-knowle ledge, , dec decentraliz ized solu solutions for or inclusive pr protection of of da data pr priv ivacy on cl on cloud, , bl blockchain in an and be beyond. . We e ar are experts of of zer ero-knowle ledge pr priv ivacy solu solutions. 2018 PRES ESENT NTATION Copyrig Co ight KM KMSchain in 2018

  2. Who are we We are expertized in Blockchain T echnology and development of Zero Knowledge Privacy Protocols. There are three main dimensions of technologies provided by us. Zero Knowledge Privacy TRANSACTIONAL DATA PRIVACY ZERO KNOWLEDGE PROOFS CONFIDENTIALITY Decentralized, zero-knowledge KMS and Private blockchain solutions powered State-of-the-art Zero-knowledge Proof easy-to-use end-to-end encryption tools for by zero knowledge proof protocol technology developed to enable securing user data in modern distributed (Lelantus) for enterprise grade verification of data without applications and beyond protection of transactional privacy compromising its privacy and anonymity. Application of the technology in different Enables data privacy on Blockchain and cloud Designed to Power Blockchain Infrastructures domains Provides unique scalable solution for Privacy of transaction values and origins Develop use case specific privacy protocols encrypted data management to meet your ecosystem needs 2

  3. 1. KMSCHAIN: DECENTRALIZED KEY MANAGEMENT SOLUTION

  4. Data is a Core Resource We live in a data-centric world, where data is the cornerstone of business infrastructures and driving force of social-economic relationships 2.5 2.5 qu quintilli lion byt ytes s of of da data is s cr created per per da day 90% 90% of of da data ha have be been cr created in las ast two yea ears Em Emergence of of au audit an and com ompli liance req equir irements s (GD (GDPR, , HI HIPAA, CJI JIS, , FER FERPA, , PC PCI, I, IT ITAR, etc.) 4

  5. Encryption as a way to Protect Data Encryption is a robust approach of protecting data from breaches and leaks. Plain Text Encrypted Gibberish EnCt2ac4 ac4bfa fa13c7 c762664d 4d5352dee ee620 Hello o World! 2eeb360a0 a029d3dac4 ac4bfa fa13c7 c762664d5 4d5 352dee60 e60v1+mjP5 1+mjP5fA fAF Pub Publi lic c Key ey Cryptog yptograph phy 5

  6. Management of Encrypted Data is a Challenge As a cryptographic access control mechanism Public Key Encryption is limited in several ways Limit itati ation ons s of Stand ndar ard d Publ blic ic Key Cryptog ography hy Requires advanced knowledge of recipient Does not scale well in case of many to many messaging and multiple intended recipients Access can not be revoked after the encrypted message has been shared . 6

  7. Sample Scalability and Performance Failures in Case of Legacy system Bob David id Eve Eve x 1 x 100 00 Carol IPFS, S, Swarm, m, Cloud It d It does not oes not sca scale le wel ell 7

  8. What are Alternatives of Key Management? Amazon, Google, Microsoft, Alibaba provide Key Management as a Service for addressing this technical challenge. But these services have single point of failure 1. Service providers get access and manage all user keys. 2. Centralized Services with an undue trust put on the service provider can not serve decentralized applications 8

  9. Combining the Best of Both Words We provide flexible encryption and data management technology which does not compromise the data security via introducing single point of failure Legacy Encryption Federated Key Method Management ain Schai ✓ Secur curit ity y KMSc ✓ Sca calabi ability lity KM ✓ Privac vacy ✓ Convin vinence ence 9

  10. How Proxy Re-encryption Works The proxy can transform a ciphertext encrypted under Alice’s public -key into ciphertext encrypted under Bob’s public key. Re Re-Encr ncryption ption Re Re-Encr ncryption ption Key ey 10

  11. Advantages of Our Technology Proxy re-encryption allows KMSchain to split document access management from cryptographic operations without the need to always-trusted, centralized entity KMSchai Schain n enables bles flexible ible , s scala calable ble and secur ure key manageme agement nt in distribu tributed ted environ onments. ents. Enables bles re-encr cryp yption tion of alread eady y encrypt pted ed data ta and d access cess delegation gation without out decrypti ypting ng data ta as an intermediat mediate e step. p. Highly hly flexible ible user r exper erie ience, ce, revocable ocable data ta access ess. Efficien ficient t utilization zation of data ta stora rage. ge.

  12. Decentralized Privacy Layer KMSchain enables to build decentralized, zero-knowledge Key Management Services to solve a significant market need enabling DApps and other data critical applications to integrate data encryption and KMS technologies without compromising decentralization. Re Re-encry ryption Key Re-encryption key are split into multiple re- encryption shares. We leverage cutting-edge cryptography techniques and blockchain technology to decentralize our service into multiple standalone KMS Services (nodes)

  13. Comparison with Alternative Solution None of the existing methods enables safe, scalable and decentralized key management service for modern distributed applications and other data critical use cases. User Exclusive Simple User Distributed KMS, No Easy-to-deploy Cost Efficient Control Over the Experience, Scalable, Single Point of and maintain Solution Flexible Data Sharing Encryption Keys Failure Federated Key No Yes Yes Yes No Management (FKM) Deploying On-Premise No Yes No Yes No KSM/HSM Legacy Encryption Yes Yes No No No Methods (LEM) Yes Yes Yes Yes Yes KMSchain KMS 13

  14. Data Access Policies for Automatic KMS, Integration to Smart Contracts Conditional Data Access Delegation Time : enabling or disabling user to get data access after a certain point of time, Transaction value : enabling users to get access to data when a amount is sent to an address Other Events: other easily verifiable, blockchain based events. Lorem ipsum is dummy text 14

  15. 1.1 KMSchain Nodes and White Lables

  16. Key Management Service Providers in KMSchain Network, White-label System Pr Proxy 2 xy 2 Proxy 3 Pr xy 3 Pr Proxy 4 xy 4 Proxy 1 Pr xy 1 Pr Proxy xy 5 5 Alice Bob 16

  17. Decentralized Proxy Re-Encryption Network Considering the data privacy needs and regulatory requirements, enterprises from several sectors will be well motivated to run their nodes to use the proxy re-encryption technology internally as well as to provide KMS services to clients FINANCIA IAL L SERVICE ICES HEALTHC HCAR ARE & PHARMA SERVIC VICES MANUFACTURIN RING TECH & SOFTWARE PUBLIC SECTOR LEGAL SERVIC VICES HOSPITALIT ITY RETAIL IL 17

  18. 1.2 KMSCHAIN: SCALABLE END TO END ENCRYPTION

  19. Application of KMSchain End to end Encryption Data a is o only y effect ctive ively ly encrypt ypted ed in t tran ansit sit and In has sever eral al vulner erabili ability y points s . Fronte ontend nd 3 Database tabase Server er 1 2 Re Re-enc encryp yptio tion opera eratio tion done e with thin in device ice Hi Melanie, Encrypt , I am fine. pted Hi Melanie, , I am fine. Encrypt pted htt https ps https htt ps at-rest at est KMSCH MSCHAIN Encrypt ypted ed Encrypt ypted ed In case e of our end to end encryption ion data a is In effec ectiv ivel ely y encrypted at all times 19

  20. SDK That can be Licensed Our easy to use cryptographic libraries turn every developer into applied cryptographer. Add data encryption and cryptographic trust management into your app with just a few lines of code. Perform Re-Encryption for the given ciphertext and Generate and Manage User's Public and Private keys. the re-encryption key Enable users to generate Re-Encryption keys Decrypt both the original or transformed ciphertexts in for their peers. order to reveal the encapsulated symmetric encryption key Encapsulate a symmetric encryption key via given Public Key (similar to Diffie-Hellman Key Exchange) 20

  21. 1.3 USE CASES OF THE TECHNOLOGY

  22. Big Data Systems Development of the big data systems which enables secure transfer of data, development of collaborative data lakes, monetization of the enterprise data. 22

  23. Data Marketplaces (Financial, Insurance, etc.) KMSChain provides robust infrastructure for the development of decentralized data marketplaces. Anonymity ymity and Privac ivacy protectio ection Decent entraliz alizati ation on Trans nspar parency ency Control ol 23

  24. KYC, KYT, Digital Identity Systems Secure and flexible control over digital IDs, streamlining travel, KYC, insurance claims, and more. 24

  25. Social Networks, Secure Chat Rooms Via KMSchain users can create very secure social groups by assigning different attributes and keys to their social contacts, and then encrypt data such that only particular users with desired set of attributes can decrypt it. 25

  26. Role based Data Management and Access Control If there are different classes of nodes in the network (master nodes, service providers, Oracles, etc.) our technology can be applied to segregate the permission levels of these users, also enabling dynamic self-management. 26

Recommend


More recommend