Edenchain Technological Protocol Description

in #crypto6 years ago

1_Hm4pitBC_XIHzvAHt6O26g.jpeg

Edenchain is based on the platform of programmable blockchain technology and it can be used for capitalizing and trading the assets for the programmable economy technology. This will be used by the adoption of blockchain Smart Contracts for the capitalization of tangible and intangible assets and it will value to the tokenization process.

The smart contract will integrate real and virtual economies generating a fundamental and programmable economy platform. The system has the ambition to provide high-quality service ensuring low-cost transaction without any involvement of mining criteria.

Confidentiality Regarding Technology Used in Edenchain

The confidentiality of Edenchain is assured by the use of SGX enclave as an encrypted protocol. This includes the privacy of guaranteed and detailed transaction for the smart contracts by the execution in Eden which might not be visible currently. The process of E-Oracle is the consensus for the access in the external system from the E-Oracle server and it is used for importing data and selects one of the multiple pieces of data.

This will be executed in the SGX enclave while running with the limited access in data encryption. This might not be understood by the insiders like system operators or hackers. Even in the SGX enclave, the import of data will be used through HTTPS as it can facilitate the SSL certification and encrypt the communication by reducing the risk of hacking. It will ultimately prevent the insider from learning the content of the data.

The smart contracts will support the interactions by the external system supporting HTTPS. This will not have the permission of encrypted communication protocol since SGX enclave does not have any storage of data usage. These data can be used for communication within external systems in a permanent storage device like a disk and at the end of the execution; the data can be erased right away.

Encrypted Protocol

Roadmap.jpeg

The hackers can use two possible attacks while networking and the E-Oracle software is running. The networking of SGX enclave runs through the external systems and the networking among the servers of E-Oracle.

The communication process also lies in between the servers of E-Oracle and it can be encrypted by the use of ECC-TC. This might be the result of decrypting or manipulating messages even if the attacker has the accesses into the messages.

Lack of Censorship

The transactions and the execution of the smart contracts in Ednchain have been running through an EVM and the DGX enclave. The data will be used here without being controlled, accessed or censored. Edenchain is the permissined blockchain and it is more likely with the similar attributes as permissionless blockchain.

It does not contain any censored data and for this reason, it may provide an environment for every sort of transactions and smart contracts that will run equally and completely.

Edenchain is the successful implementation of Programmable Economy platform and it brings two problems with it related to performance and non-secured connectivity. The organization is highly focused on the solution of the technical issues employed through the software and hardware.

So it has a motto to elevate the performance of the entire network to protect the blockchain against the external hackers. It shows the ability of Edenchain to monetize every sort of assets and to execute them safe, secures, cost-efficient as well as faster in transactional form. This will help the system to adopt across multiple industries like IoT, Finance, Shared Economy, Games, ICO and so on.

Website : http://edenchain.io/
Whitepaper : https://drive.google.com/file/d/1qUUUm8mNuL-7f5yYsNza1gqcZE6PoDhN/view
Telegram : https://t.me/edenchainio
Twitter : https://twitter.com/edenchainio