https://catalogartifact.azureedge.net/publicartifacts/Microsoft.ConfidentialLedger-0.0.1-preview/Large.png

Confidential Ledger

Microsoft

(4 Classificações)

Confidential Ledger

Microsoft

(4 Classificações)

Azure Confidential Ledger provides a managed and decentralized ledger for data entries backed by Blockchain. Maintain data integrity by preventing unauthorized or accidental modification with tamperproof storage. Protect your data at rest, in transit, and in use with hardware-backed secure enclaves used in Azure confidential computing.

Protect your data with Blockchain
Ensure that your sensitive data records remain intact over time. The decentralized Blockchain structure uses consensus-based replicas and cryptographically signed blocks to make information committed to Confidential Ledger tamperproof in perpetuity. You’ll soon have the option to add multiple parties to collaborate on decentralized ledger activities with the consortium concept, a key feature in Blockchain solutions.

Access tamper evidence at any point of time
Trust that your stored data is immutable by verifying it yourself. Tamper evidence can be demonstrated for server nodes, the blocks stored on the ledger, and all user transactions. Receipts are also available for each transaction.

Get the benefits of Azure confidential computing
Protect your data at rest and in transit as well as data in use. Confidential Ledger runs exclusively on the trusted execution environments (TEEs) of Azure confidential computing. Transport layer security (TLS) terminates inside the enclave, which keeps cloud providers and administrators outside the trusted computing base (TCB), providing the highest level of security. Additionally, each transaction within Confidential Ledger is digitally signed by the hardware root of trust.

Keep cloud providers out of the TCB
Prevent service developers, datacenter technicians, and cloud administrators from accessing your data. Confidential Ledger runs on a minimalistic trusted computing base (TCB) that lets you keep cloud providers out of your computing plans with options like certificate-based authentication.