What is it about?

The project solves the problem of leakage of protected information when working on the Internet. By protected information here we mean all types of confidential information (personal, commercial, professional and other types of secrets), as well as any data and metadata posted by users privately (not for public use) in the Internet information systems (ISI), or generated by their actions when using the ISI or accessing the ISI (digital footprint). By user, we mean both individuals (subscribers) and organizations. Organizations are made up of internal subscribers (organization subscribers). We consider leak channels: 1. Owners of the ISI (Except for the case when the user himself is the owner of the ISI); 2. The personnel of the ISI owners. This staff is divided into two subtypes: 2.a Personnel whose work requires direct access to protected information for the performance of labor duties (For example, a sales manager needs access to data on previously completed transactions and the customer base); 2.b Personnel whose work does not require direct access to protected information, but this personnel has access. This is, as a rule, technical staff (For example, a database administrator who maintains a DBMS containing data on previously completed transactions and customers does not need access to this data, but, in fact, he has such access); 3. Internet providers and telecom operators that provide data transfer from the subscriber to the ISI and their personnel; 4. Operators of cloud services and Web hosting ISI and their personnel. Leak channels can be formed both as a result of intentional actions and as a result of errors, for example, when configuring information security systems, administering a DBMS, etc.

Featured Image

Why is it important?

The mission of TheOoL DAO is to assure the rights and freedoms of online users as declared in the Universal Declaration of Human Rights, namely the right to privacy, the right to protection from prosecution on political, religious or any other grounds, and the right to access online data by way of technological elimination of any third party censorship.

Perspectives

To accomplish this task, we designed and launched a product under the working title TheOoL.net, which combines decentralized, secure and serverless services: web hosting, a decentralized application launch environment and a payment system. These services provide an overlay (running on top of the Internet) environment that provides users with private space and operations without a “digital footprint” on the Internet and an affordable high-speed cloud of secure distributed computing and storage at the best price. At the same time, we provide owners of computing resources with the ability to securely, automatically and impersonally lease capacity to content owners through a layer of metadata nodes and TheOoL payment system. The payment system is built into TheOoL.net for billing when renting computing resources, which can be performed exclusively through this payment system. The use of the TheOoL payment system for other purposes (for example, payment for goods and / or access to content through the TheOoL.net network) is technically possible, but is not a priority function. TECHNICAL CONCEPT: TheOoL.net consists of a cloud of computing resources (servers) and a cloud of data (content and ISI hosted by users), which are abstracted from each other by a layer from a metadata and payment management system operating on distributed ledger technology (TheOoL blockchain). TheOoL.net defines 2 basic types of hardware nodes: subscriber nodes and technical nodes. Technical nodes form a cloud of computing resources. Data and tasks in the cloud of computing resources are protected by strong cryptography and distributed among the nodes of the cloud in such a way that access to any of these nodes does not allow access to information processed and stored in the data cloud. It is assumed that servers can be connected to the cloud of computing resources by any member of the TheOoL network who has installed the TheOoL Technical Node software on their server. The system at the basic level consists of: 1. Subsystems for executing decentralized applications (DApps) in a microservice architecture. The system raises a separate set of microservices for each user request. Servers for executing microservices are selected randomly. Information about the results of the microservice is not available to the server owner. Before starting a microservice, the network makes sure that its execution is safe, for which it checks the invariability of TheOoL modules on the selected server. At the current stage of development, DApps written in Python are acceptable. 2. Subsystems of decentralized secure data storage. We store data in encrypted form according to the "everywhere and nowhere" principle. In a simplified way, this can be described as follows: before being placed in the TheOoL cloud, any completed data set (file) is encrypted, then cut into blocks of a standard size (but not less than 2), and then scattered into randomly selected technical nodes, so that each technical node contained no more than one block belonging to one file. Access to data for the user is available through metadata stored in an individual set of search indexes. 3. A decentralized search system that provides access to data through search indices of three levels: individual (index and data are available to one specific subscriber, the rest do not know about their existence), group (index and data are available to subscribers—members of a certain group, subscribers – do not members of the group do not know about their existence), public (available to all subscribers, contains metadata for pages with public access, while it does not contain information about the owner of the pages, they are stored in the owner's individual index). The subscriber gets access to the data through search indexes available to him. If the index is hidden from the subscriber, such subscriber not only has no access to the data registered in this index, but also has no knowledge of the existence of such data in the system. 4. Built-in payment system and metadata management system on TheOoL blockchain, with support for a fixed set of standard smart contracts that are designed to serve the interactions of content owners (customers) and hardware resource owners (performers). This is necessary to provide customers with guaranteed access to high-performance computing resources, which distinguishes the developed platform.

Alexey Nenashev
Samara State Technical University

Read the Original

This page is a summary of: Secure serverless internet (TheOoL.net), January 2023, American Institute of Physics,
DOI: 10.1063/5.0125509.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page