corda/docs/source/key-concepts-security-model.rst
2017-03-21 18:01:17 +01:00

2.9 KiB
Raw Blame History

Security model

Corda has been designed from the ground up to implement a global, decentralised database where all nodes are assumed to be untrustworthy. This means that each node must actively cross-check each other's work to reach consensus amongst a group of interacting participants.

The security model plays a role in the following areas:

  • Identity: Corda is designed for semi-private networks in which admission requires obtaining an identity signed by a root authority. This assumption is pervasive the flow API provides messaging in terms of identities, with routing and delivery to underlying nodes being handled automatically. See sections 3.2 of the Technical white paper for further details on identity and the permissioning service.
  • Notarisation: pluggable notaries and algorithms offering different levels of trust. Notaries may be validating or non-validating. A validating notary will resolve and fully check transactions they are asked to deconflict. Without the use of any other privacy features, they gain full visibility into every transaction. On the other hand, non-validating notaries assume transaction validity and do not request transaction data or their dependencies beyond the list of states consumed (and thus, their level of trust is much lower and exposed to malicious use of transaction inputs). From an algorithm perspective, Corda currently provides a distributed notary implementation that uses Raft.

Note

A byzantine fault tolerant notary based on the BFT-SMaRT algorithm is included in the code, but is still incubating and is not yet ready for use.

  • Authentication, authorisation and entitlements: Network permissioning, including node to node authentication, is performed using TLS and certificates. See permissioning for further detail.

Warning

API level authentication (RPC, Web) is currently simple username/password for demonstration purposes and will be revised. Similarly, authorisation is currently based on permission groups applied to flow execution.

Privacy techniques

  • Partial data visibility: transactions are not globally broadcast as in many other systems.

  • Transaction tear-offs: Transactions are structured as Merkle trees, and may have individual subcomponents be revealed to parties who already know the Merkle root hash. Additionally, they may sign the transaction without being able to see all of it.

    See merkle-trees for further detail.

  • Multi-signature support: Corda uses composite keys to support scenarios where more than one key or party is required to authorise a state object transition.

Note

Future privacy techniques will include key randomisation, graph pruning, deterministic JVM sandboxing and support for secure signing devices. See sections 10 and 13 of the Technical white paper for detailed descriptions of these techniques and features.