🔑How to Access the Data

Camp Network leverages TEEs to securely manage and grant access to its data, ensuring privacy and integrity through a pay-per-access model. Smart contracts handle the payment verification and access

Data Storage and Encryption

Data retrieved from Web2 platforms is encrypted using a hybrid encryption method and stored on IPFS. Each data file receives a unique content identifier (CID) that is recorded on-chain, ensuring the data is securely stored and easily retrievable.

Key Management

TEEs are used to securely manage and store decryption keys. These keys are encrypted with the user’s public key, ensuring that only authorized users can access the keys necessary to decrypt the stored data.

Access Control via Smart contracts

Users request access to data by interacting with smart contracts that handle the payment verification process. The smart contracts check if the required payment has been made before signaling the TEE to proceed with data decryption, ensuring that access control is strictly enforced.

Data Decryption and Access

Upon payment verification, the TEE retrieves the encrypted data from IPFS using its CID. The decryption key is then used to decrypt the data within the secure environment of the TEE, and the plaintext data is provided to the authorized user, ensuring privacy and integrity throughout the process.

Payment Verification

The pay-per-access model is enforced through smart contracts. Users must complete a payment transaction to access the data. The smart contract verifies the payment before authorizing the TEE to proceed with decryption, ensuring that data access is granted only upon successful payment.

Privacy and Security

All sensitive operations, including key handling and data decryption, occur within the secure confines of the TEE. This guarantees that the data remains protected from external threats and unauthorized access, maintaining high levels of privacy and security for users.

Last updated