GGS-2: Compartmentalized Information Protection

Stage: Finalize

Definitions

Compartmentalization

Compartmentalization, in information securityarrow-up-right, whether public or private, is the limiting of access to informationarrow-up-right to persons or other entities on a need-to-knowarrow-up-right basis to perform certain tasks.

Information

Information is an abstract conceptarrow-up-right that refers to something which has the power to informarrow-up-right. At the most fundamental level, it pertains to the interpretationarrow-up-right (perhaps formallyarrow-up-right) of that which may be sensedarrow-up-right, or their abstractionsarrow-up-right. Any natural process that is not completely randomarrow-up-right and any observable patternarrow-up-right in any mediumarrow-up-right can be said to convey some amount of information. Information is not knowledgearrow-up-right itself, but the meaningarrow-up-right that may be derived from a representationarrow-up-right through interpretation. For instance, this standard contains information and those who understand it know about it.

Protection

Protection is any measure taken to guard something against damage (changes introduced into the system that adversely affect its current or future performance).

CIP

Short for Compartmentalized Information Protection. It is the standard used in the Gen6 ecosystem, designed to safeguard sensitive information by isolating it into separate compartments, ensuring that access is restricted to only those who need it for specific tasks. This approach prevents unauthorized access and minimizes the risk of data leakage, misuse, or corruption. CIP leverages a layered defense strategy ("defense in depth"), using multiple levels of security to maintain the confidentiality, integrity, and availability of information while maintaining compliance with regulatory standards.

Standard Structure of CIP

Immutable Proof Information Storage: Blockchain

Immutable proofs are stored on the blockchain without revealing the data. All proofs's timestamp can be verified through the inspecting the block it was written into.

This provides:

  • Undeniability of proof creation

  • Undeniability of timestamp of event

  • Privacy, as the data itself is off-chain

  • Permissionless access to proofs.

Data Information Storage: G6 Middleware

G6 Middleware provides data storage and permissioned access to them. While the data remains private, it can be revealed to selected entities.

Data can be optionally encrypted, so not even the G6 Middleware provider can understand its content.

This provides:

  • Permissions control of data

  • Information and data security

  • Privacy, as only the proofs are on-chain

  • Allows encryption of data

  • Allows ZK implementations

  • Possibility for 3rd party storage providers and backups

  • Scalable and fast data storage

User Stored Information: Secrets

The user keeps her/his own wallet in form of private keys or alternatively using the G6 OAuth system at 3rd party provider.

This setup provides:

  • Freedom to create your own identity and share data with your own preferences

    • Free choice of what to encrypt, reveal or publish

  • Central authorities (except OAuth if you use it) cannot block your wallet and account

  • Self-custody and censorship resistance

Last updated

Was this helpful?