Data Storage & Privacy
Last updated
Last updated
For privacy protection, we use Google Confidential VMs, which provide a secure computing environment where data remains encrypted during processing. This solution prevents unauthorized access and data leakage, ensuring that sensitive data is protected even during computation.
For storage, we integrate decentralized storage solutions such as IPFS and Greenfield. These technologies enable data to be stored in a distributed manner across multiple nodes, enhancing accessibility and security. Additionally, access control mechanisms ensure that only authorized users can access specific data fragments.
XnY provides a dedicated pool of trusted custodial service nodes, each running identical Trusted Execution Environment (TEE) nodes. Additionally, it offers an exclusive Key Management Service (KMS) for Data Demanders to securely manage data decryption keys.
Each TEE Node runs the same XnY data-loading service Docker image, with isolation between nodes (Data Demanders can establish mutual trust between nodes if required). Each node is connected solely to its unique KMS to decrypt data after it has been loaded from the XnY chain.
When a Data Demander needs to load third-party stored data via a TEE Node, the TEE Node will automatically identify the third-party storage based on information stored on the XnY Chain. Using the unique data identifier, it will directly retrieve the data from the third-party storage. Upon successful retrieval, the data is decrypted in a standardized manner and ultimately consumed by Frontier.
The XnY TEE Node supports third-party storage solutions, including IPFS and GreenField.