The EDEN Architecture
A blockchain infrastructure powered seamlessly by three distinctive layers :
Distributed Ledger, Validation Layer and Bridge Layer.
This layer consists of an e-bridge that connects EdenChain with external data sources through secured interoperability, enabling the on-chain smart contract to interact with the off-chain modules. As nodes exist on both the on-chain and the off-chain, an E-Protocol uses an encryption process called the Elliptic Curve Cryptography (ECC) – Threshold Cryptography (TC) for trusted connectivity.
Transactions are executed and verified in this layer, which includes the Ethereum Virtual Machine (EVM). Using a Transaction Execution Scheduler, it forwards transactions to corresponding nodes based on namespaces. Automation of transaction routing allows efficient resource management across transactions and nodes. One can also operate the blockchain with optimal resources and computing power through real-time monitoring of the workload allocated to the Trusted Execution Environment (TEE). By grouping related transactions into batches, the validation layer ensures efficient execution and eliminates any data dependency issues.
Distributed Ledger Layer
Based on Linux Foundation’s open source project, Hyperledger Sawtooth, the distributed ledger layer provides the decentralized database functionality for EdenChain. Proof-of-Elapsed-Time (PoET) is a consensus algorithm that integrates a CPU command in the Software Guard Extensions (SGX) to select a leader randomly without utilizing large amounts of energy to solve a hash problem. SGX allows applications to run trusted code in a protected environment.
EdenChain has 3 major technical strengths to provide enterprise blockchain platform. Those are scalability, security and accessibility. Those are inevitable factors when it comes to real world blockchain service application. EdenChain considered those factors from the very beginning to meet enterprise's requirement.
Scalability is the biggest technical obstacle for blockchain adoption as of now. Without achieving scalability, it is hard to process transactions in high performance. EdenChain uses namespace technology for the scalability. It is proven technology in various areas.
Security between On-Off Chain
E-Oracle and ECC-TC based E-Protocol provide trust and security for external system interworking. Median Voter Theorem (MVT) is adopted as a Consensus Algorithm to prevent data manipulation.
Accessibility is the practically challenging issue when it comes to implementation because enterprise needs human resources for the development. EdenChain supports API, So it is easy to find necessary resources and quick to development blockchain application.