ETHERNITY DECENTRALIZED CLOUD COMPUTING

Similar documents
Decentralized Database for Developers. White Paper v March 31,2018

Vladimir Groshev. COO, Project Coordinator.

lifeid Foundation FAQ v.1

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

QUADCORECHAIN. White Paper ver.1

INX Tokenomics I

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

ICO Review: Etherparty (FUEL)

DISTRIBUTION PLAN. Operation of EMMARES smart contract. EMA Token Allocation

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

NON-TECHNICAL WHITEPAPER Version 1.0

EXECUTIVE PRODUCT SUMMARY

Cloud Services. Infrastructure-as-a-Service

Whitepaper Rcoin Global

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

VERSION: 1

Introduction to Blockchain

TOKEN PAPER.

Mobilink-Network Partial List of Partners

GENESIS VISION NETWORK

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

Yada. A blockchain-based social graph

Why is Office 365 the right choice?

Mobilink-Network Partial List of Partners

Overview & White Paper.

IoT security based on the DPK platform

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Preserving Data Privacy in the IoT World

Previous Name: D3. Fourth Estate. A secure, decentralized news data storing and sharing solution for journalists

INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018

Executive Summary. Swiss Alps Mining & Energy.

How do you decide what s best for you?

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx

The Interactive Guide to Protecting Your Election Website

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Blockchain! What consultants should know about it. Daniel

Whitepaper The blockchain platform for building decentralized marketplaces

Microsoft 365 Business FAQs

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Mitigating Risks with Cloud Computing Dan Reis

SECURITY AUDIT REPORT

Deliver Data Protection Services that Boost Revenues and Margins

Three-Dimensional Scalable Blockchain. Tokenomics draft v. 0.3 (En)

THE END OF SURVEILLANCE

Client-Server Architecture PlusUltra beyond the Blockchain

Cyber-Physical Chain (CPChain) Light Paper

BUILDING the VIRtUAL enterprise

The Nasuni Security Model

Government IT Modernization and the Adoption of Hybrid Cloud

Managing SaaS risks for cloud customers

Enabling a Multicloud World. Kip Compton VP, Cloud Platform & Solutions Group December 4,

Five Reasons It s Time For Secure Single Sign-On

The Device Has Left the Building

Orbs is built by developers, for developers, with real business needs in mind. Design strategy is driven by:

Pulseway Security White Paper

INTRODUCTION WHY DAPS?

Converged Cloud and Digital Transformation: A Strategy for Business Success

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry

Blockchain-enabled peer-to-peer marketplaces

Emerging Landscape of IT. Hishamul Hasheel,Vice President Software & Security, Redington Gulf - Value Division

Fujitsu World Tour 2018

Choosing the Right Cloud. ebook

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

PKI is Alive and Well: The Symantec Managed PKI Service

Ergo platform: from prototypes to a survivable cryptocurrency

Lecture 44 Blockchain Security I (Overview)

NGN: Carriers and Vendors Must Take Security Seriously

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar

Cloud-Security: Show-Stopper or Enabling Technology?

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise

Building Cloud Trust. Ioannis Stavrinides. Technical Evangelist MS Cyprus

ETHEREUM META. Whitepaper 2018/2019. A decentralized token with privacy features. Ethereum Meta team

Accelerate Your Enterprise Private Cloud Initiative

The Honest Advantage

Who s Protecting Your Keys? August 2018

The Marketplace for Cloud Resources

Project Review: VideoCoin (VID)

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Managed Services Rely on us to manage your business services

Management Information Systems. B15. Managing Information Resources and IT Security

Product Brief. Circles of Trust.

The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved.

How unified backup and cloud enable your digital transformation success

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

Creating Trust in a Highly Mobile World

ENEE 457: E-Cash and Bitcoin

Security Overview of the BGI Online Platform

32% DATA LOSS SKYKICK CLOUD BACKUP FOR OFFICE 365 IN THE CLOUD OF COMPANIES WILL EXPERIENCE 6HRS. Easy set up, unlimited backup & one-click restore

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

A Decentralized Peer-to-Peer Media Editing, Transcoding & Distribution Platform

Maintain Data Control and Work Productivity

BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

Transcription:

ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud

DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY developers, whose website can be found at https://ethernity.cloud. This whitepaper does not constitute an offer or sale of ETHERNITY Tokens (the Tokens) or any other mechanism for purchasing the Tokens (such as, without limitation, a fund holding the Tokens or a simple agreement for future tokens related to the Tokens). Any offer or sale of the Tokens or any related instrument will occur only based on definitive offering documents for the Tokens or the applicable instrument.

ABSTRACT The traditional cloud infrastructure has many central points of failure and trust: (1) The centralized nature of the Domain Name System (DNS) (2) dependency on one or multiple cloud providers for service availability (3) centralized storage of user-data. The ETHERNITY project envisions the cloud computing infrastructure to be an environment where the user s data is hosted on a wide range of systems in an encrypted and anonymous manner. From home computers, mid-range servers, to datacenter level of hardware could be utilized with ETHERNITY, fully trusting that the data is safe and private while in transit, and at rest. ETHERNITY removes the middle-men consisting of cloud service provider companies and replaces them with the Ethereum blockchain. The ETHERNITY nodes are meticulously programmed virtual machines that obey the blockchain. Users software and data run inside ETHERNITY nodes exactly according to the Ethereum smart contract agreement. These nodes are location-agnostic, self-replicating and constantly spawning in random locations on the internet. This allows the user s software and data to be online and run FOREVER. The design of the smart contracts and the underlying infrastructure of ETHERNITY is backed by a team which cumulates more than 60 years of experience in cloud computing. The technology that has been developed successfully over the past 5 years. ETHERNITY is crucial to freedom of speech in the current internet environment of censorship. ETHERNITY can be utilized as base infrastructure for an online library such as Wikipedia. ETHERNITY can ensure high availability of online resources by avoiding a single point of failure like traditional cloud storage solutions. ETHERNITY can be the answer for any other decentralized service or web application that demands true high availability.

Contents I. Introduction II. Architecture Encryption Anonymity Decentralized DNS Continuous Availability Performance III. Circular Economy IV. Tokenomics V. Roadmap VI. References

I. Introduction The past ten years gave witness to a migration of software from the desktop, home and small business servers, to the cloud infrastructure which stores users data on remote, but centralized servers. The centralized servers are a primary target for hackers. Over 1.9 billion records were lost to data breaches in first half of 2017 alone, many of which involved cloud computing servers. [1] The ETHERNITY infrastructure software is built on top of open-source services and technologies. Using industrywide open source technologies and standards, the migration from regular, centralized cloud providers to ETHERNITY is quite simple. Other proposed decentralized hosting solutions are overly complex and try to reinvent the wheel. We strive to make the transition to the decentralized cloud as transparent, secure, and simple to the end-user as possible. In addition, ETHERNITY SDK allows for everyone to contribute and start their own decentralized solutions. Several challenges exist when trying to create a fully decentralized cloud infrastructure. The decentralized solution must provide similar performance, and scalability. At the same time, it must maintain the software s continuous availability, privacy, integrity, and anonymity. The purpose of ETHERNITY is to provide the blockchain infrastructure for participants to run their favorite cloud software decentralized, to rent their idling or extra hardware for monetary gain, all this while incentivizing the decentralized cloud applications developers. Developers interaction with ETHERNITY is critical to the rapid adoption of our platform. Every instance a service is provisioned using a specific decentralized cloud application, the application developer receives a bonus percentage of the transacted amount. We believe it is a step in the right direction for any developer to join our effort to expand the decentralized cloud by integrating existing cloud applications into ETHERNITY s decentralized cloud!

II. Architecture ETHERNITY is designed to meet the following goals: 1. Privacy and anonymity. Service buyer's data is encrypted at all times using strong open encryption algorithms. All network communication should happen over anonymous networks to preserve buyer's anonymity. Our aim is for the sellers is to be able to monitor their resource usage but be unable to interfere or tamper with the service running on their computers. Any attempt is prohibited by the network service monitoring system. 2. Decentralized Domain Name System. Service buyers benefit from the decentralized DNS blockchains or public services. ETHERNITY supports the developers to implement these technologies in their decentralized applications. 3. Continuous Availability. Buyer's services are available at all times due to the design that allows multiple instance of the same node to run and sync continuously. Anytime one of the instances fails for any given reason, all other instances will still be up and ready to resume the service. They will be spread geographically according to the buyer s preference. 4. Performance. Buyers are able to rate their service sellers, and this ensures the service sellers are providing their advertised service at full capacity; creating a more competitive market, and a better service overall provided to the buyers.

II.1. Encryption Our architecture is designed to favor the most secure encryption and hashing algorithms while keeping the overhead low to prevent performance drops. This section covers encryption of data on the blockchain, encryption of data in transit, and encryption of data at rest. Due to privacy concerns, we consider imperative to encrypt the information that is being exchanged across the network. The ecosystem is designed in a manner that prevents decryption of data in transit even with the current most advanced cryptographic attacks including brute-force and collusion attacks. Equally important is the encryption of data at rest. When ETHERNITY was designed consideration was emphasized on trust-less business model. Data is stored across the network; however, the decentralized cloud service providers will be unable to access, read, modify or interfere in anyway with the ETHERNITY node that runs on their machine. Similar to the blockchain technology, ETHERNITY uses a trust-less design model. Members of the network are considered by default untrustworthy. The open-source software code ensures and enforces the trust, reassuring the decentralized cloud users about their data safety while handled by different parties. II.2. Anonymity Privacy today is one of the top priorities worldwide, especially with the centralization of the cloud and expansion of the big data. Malicious actors can easily identify content owners and with the standard IP-based communication user's personally identifiable information (PII) can be linked to their data. Security breaches in the past occurred in which personally identifiable information was exposed due to the non-anonymous and centralized processing of user's PII on tradition cloud-based solutions.

Unless otherwise regulated by the law, private users, private enterprises, and government agencies should be able to store and run their software anonymously. This strengthens freedom of expression at all levels while protecting users privacy rights. ETHERNITY uses anonymity alongside encryption for all the connections that will be performed on the network. This is accomplished with technologies that route the user's traffic on the internet. The exchange encryption keys occur at different levels to discourage attackers from linking communication partners. This kind of anonymity techniques is applied for wallet communication, node communication, decentralized cloud applications communication. II.3. Decentralized DNS The current DNS infrastructure of the internet is very centralized, therefore making it vulnerable to attacks. The current DNS can be attacked in several ways: cache poisoning, hijacking, DDoS, censorship. All these attacks are avoided by using a decentralized system that propagates DNS records. ETHERNITY utilizes this technique. Due to its difficulty level, it is not easy to implement. The concentration of the efforts to assist decentralized cloud application developers/packagers is ETHERNITY s focus. The developers will have the ability to easy convert or straight build up their decentralized web application by following guideline provided by the ETHERNITY project. The developers decentralized applications will be available both on the classic DNS and the decentralized DNS services. Regular Internet users outside the ETHERNITY network will be able to access the decentralized cloud application through the regular DNS as well the decentralized DNS free of charge by using simple and minimum intrusive open source tools.

II.4. Continuous availability Several key factors must be taken into consideration when proposing and designing a decentralized cloud platform. The most important factor being service availability. Currently the uptime SLA of cloud service providers depend on their physical, logistic, and hardware capabilities. These capabilities are limited. It can be difficult and expensive to guarantee 100% uptime when the architecture of the network is concentrated in few specific locations. The hardware needs to be maintained through regular maintenance and unexpected events occur. ETHERNITY is designed with continuous service availability at its foundation. The service buyer s data is replicated in a highly secure and anonymous manner across the network. Leveraging the decentralized nature of the platform, 100% service availability is achievable at a much lower cost than traditional cloud solutions. II.5. Performance The actual cloud services provider market is misleading when looking for the best service money can get. This is because it is difficult to properly run conclusive benchmarks. Currently there is no unbiased feedback system available for cloud service buyers to objectively rate or make an informed choice on services. Due to its decentralized nature, ETHERNITY implements a voting and feedback system. This allows service buyers to directly rate they service sellers. The decentralized nature of the system allows for the service providers and developers to increase or decrease their service price based on their service quality level., resulting in a more competitive and variant cloud services market. The rating system is backed by technical statistical proof to avoid abuse or malicious reviews. Leveraging the blockchain, the rating system is designed to be unbiased, and clear. It allows the service buyers to decide to aim temporarily or permanently for cheaper services. With either a focus on slightly lower performance or more expensive services, with better overall performance depending on their end-state goals.

III. Circular economy See above IDC prediction for the EU cloud services market till 2020 in billion EUR. [2] See above Gartner prediction for worldwide public cloud services market till 2020 in billion USD. [3]

The dawn of the digital age has begun, and we strongly believe that the circular economy is a concept which benefits society and there are already a handful of very successful projects that make use of the circular economy model. ETHERNITY contributes to the circular economy concept by allowing people to monetize their idle computing power and storage, which otherwise does not happen. This decreases the overall price of the cloud services and because of its decentralized nature, will further diversify the cloud services market. ETHERNITY users can both act as service buyers (cloud users) and service providers (miners), therefore they can easily recover the money they spend to run their decentralized cloud application and content by renting their spare hardware to other ETHERNITY service buyers. This way, all ETHERNITY users can host their cloud application and content online FOREVER, without deep technical knowledge, backed up by a trustworthy blockchain contract, continuously available, anonymous and encrypted and location independent. Join the revolution, subscribe for updates on our website and social media channels! Stay tuned for updated versions of this whitepaper.

IV. Tokenomics Symbol: ETNY Platform: Ethereum/ERC20 Price: 0.027 USD Soft Cap: 4000000 USD Hard Cap: 16200000 USD Maximum Supply: 1000000000 ETNY Unsold tokens adjustment: Burning Team tokens lock: 2 Years

V. Roadmap Q1 2014 SchnellNode launch Q4 2017 first whitepaper Q2 2017 SchnellNode hyperconverged storage goes production Q1 2018 demo Q4 2018 token pre-sale Q1 2019 token crowdsale Q2 2019 full node encryption Q2 2020 decentralized DNS and file system Q4 2019 connection anonymity and encryption Q4 2020 SDK and 2 example decentralized cloud apps

VI. References [1] - http://breachlevelindex.com/assets/breach-level-index-report-h1-2017-gemalto.pdf [2] - http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=41184 [3] - https://www.gartner.com/newsroom/id/3616417

THANK YOU! For more info, please visit https://ethernity.cloud