GGS-2: Compartmentalized Information Protection

Stage: Finalize

Definitions

Compartmentalization

Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-know basis to perform certain tasks.

Information

Information is an abstract concept that refers to something which has the power to inform. At the most fundamental level, it pertains to the interpretation (perhaps formally) of that which may be sensed, or their abstractions. Any natural process that is not completely random and any observable pattern in any medium can be said to convey some amount of information. Information is not knowledge itself, but the meaning that may be derived from a representation through interpretation. For instance, this standard contains information and those who understand it know about it.

Protection

Protection is any measure taken to guard something against damage (changes introduced into the system that adversely affect its current or future performance).

CIP

Short for Compartmentalized Information Protection. It is the standard used in the Gen6 ecosystem, designed to safeguard sensitive information by isolating it into separate compartments, ensuring that access is restricted to only those who need it for specific tasks. This approach prevents unauthorized access and minimizes the risk of data leakage, misuse, or corruption. CIP leverages a layered defense strategy ("defense in depth"), using multiple levels of security to maintain the confidentiality, integrity, and availability of information while maintaining compliance with regulatory standards.

Standard Structure of CIP

Immutable Proof Information Storage: Blockchain

Immutable proofs are stored on the blockchain without revealing the data. All proofs's timestamp can be verified through the inspecting the block it was written into.

This provides:

  • Undeniability of proof creation

  • Undeniability of timestamp of event

  • Privacy, as the data itself is off-chain

  • Permissionless access to proofs.

Data Information Storage: G6 Middleware

G6 Middleware provides data storage and permissioned access to them. While the data remains private, it can be revealed to selected entities.

Data can be optionally encrypted, so not even the G6 Middleware provider can understand its content.

This provides:

  • Permissions control of data

  • Information and data security

  • Privacy, as only the proofs are on-chain

  • Allows encryption of data

  • Allows ZK implementations

  • Possibility for 3rd party storage providers and backups

  • Scalable and fast data storage

User Stored Information: Secrets

The keeps her/his own wallet in form of private keys or using the G6 OAuth system at 3rd party provider (not recommended).

This provides:

  • Freedom to create your own identity and share data with your own prefecernces

    • Free choice of what to encrypt, reveal or publish

  • Central authirities cannot block your wallet and account

  • Self-custody and censorship resistance

Last updated

Was this helpful?