SlideShare a Scribd company logo
1 of 24
IOTA
Masked Authenticated Messaging
Recalling IOTA
● distributed ledger architecture that has no transaction fees
● built for ecosystems such as the Internet of Things or Web 3.0
● uses a gossip protocol to propagate transactions through the network
Masked Authenticated Messaging
Data communication protocol which adds functionality to emit and access an
encrypted data stream, like RSS, over the Tangle
Why bother?
● IOTA’s consensus protocol adds integrity to these message streams
● fulfills an important need in industries where integrity and privacy meet
The Concept
In IOTA, a user can publish a message at any time. They only need to conduct a
small amount of proof of work to allow the data to propagate through the
network (This is necessary to prevent spamming of the network). If nodes are
listening for the channel ID (= address) in real time, the message (gossipped
through the network) will be received by a subscriber when it reaches the
subscriber’s node.
How it affects others on the Tangle?
Since these messages are part of the distributed ledger, they both contribute to
the security of the network by increasing total hashing power and benefit from
the data integrity properties of the network as other transactions continue to
indirectly reference them.
Existing application of MAM
On embedded devices
Bosch XDK IoT developer kit or the RuuviTag, an open source sensor
beacon from Ruuvi Labs. Using the XDK or RuuviTags, one can create
portable weather stations, Eddystone proximity beacons, vehicle locators
and many other nifty sensor applications that report telemetry to a limited
audience via the tangle or receive commands through a MAM stream.
In-depth
MAM uses a Merkle tree based signature scheme to sign the cipher digest of
an encrypted message. The root of this Merkle tree is used as the ID of the
channel. Each message contains the root of the next Merkle tree (or the future
direction of the channel). Since previous trees are not referenced, this might be
used to add an element of forward secrecy to a channel.
Remember Merkle trees?
Privacy & Encryption Modes
1. Public: Masked-message is decrypted using root.
2. Private: address=hash(root). Masked message is decrypted usingroot.
3. Restricted: address=hash(root). Masked message is decrypted using
sideKey.
Public
Public mode uses the tree’s root as the address of the transaction that the
message is published to. A random user to stumbling across a message can
then decode it by using the address of the message.
This mode is similar to broadcasting on HAM radio. It could be used for public
announcements from a device or individual and a possible use case would be a
twitter clone, however now you have the added properties of immutability and
data integrity.
Private
Private mode can be used for encrypted streams not meant for public
consumption. In private mode, the hash of the Merkle root is used as the
address. This stops a random user from decrypting your message if they
stumble across it due to the fact that they are unable to derive the root from the
hash. This makes a MAM stream only readable by those who are provided with
the root.
Restricted
Restricted mode adds an authorization key to private mode. The address used
to attach to the network is the hash of the authorization key and the Merkle
root. A message publisher could stop using the auth key without changing their
Channel ID (that is, the merkle tree), so access could be in essence revoked
from subscribers if desired. When a key change event occurs the new auth key
needs to be distributed to the parties that are allowed to follow the stream.
Forward Secrecy
Given that a current message only points to the next merkle tree, there is no
way for a user reading the MAM stream to read messages prior to the root they
have been given. It’s easiest to think of a MAM stream as a freeway: when you
first start to read a stream you are entering the freeway and you can’t go
against the flow of traffic.
Channel Splitting
A MAM publisher can decide to split the channel at any point in time. This
means: future messages use a new Merkle tree whose root has not been
revealed before. This enables offshoot channels for specific subsets of data,
the entirety of which is not intended to be shared, thereby permissioning data
and providing fine grained access.
Digital Identity- A use case
Record can have two main branches: Public and Private data. The Public
branch uses the Private MAM mode and lets all users who have the root read
the messages. This could include name, a list of interests,etc.
When going to a physician the user can share the a substream of daily weight
data. They can do this by sharing the root and auth key of the weight stream.
Given that there is forward secrecy, the physician will be unable to gain access
to extra data they have not been given access to.
Channel Splits- Another use case
A device may do a daily report on environmental data. When it detects an
anomaly it then splits the channel and starts reporting data at a smaller
interval. In addition to communicating values at the regular interval to the main
channel, it could also notify listeners of the new split channel that contains the
more frequent updates. This maintains the temporal spacing of the main
stream while allowing the flexibility to add in secondary stream for special use
cases.
MAM- The Conclusion
Masked Authenticated Messaging is one of IOTA’s most potent IXI Modules
and opens up a new field of use cases on top of IOTA. Being able to secure
data’s integrity and control its access management is a prerequisite for things
like Over-The-Air updates(OTA), Data Marketplaces, Fog Analytics, End-to-End
verifiable Supply Chains, Automated Insurance and so much more.
IOTA Data Marketplace
It’s just an application of MAM module
It’s promising because…
… it enables connected devices and "machines" to share securely information
and also allow seamless transactions between IoT devices.

More Related Content

Similar to Iota data marketplace

Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNSecure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
 
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsA Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsIJMER
 
Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
Designing Distributed Systems
Designing Distributed SystemsDesigning Distributed Systems
Designing Distributed SystemsDhananjay Singh
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Mumbai Academisc
 
LAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxLAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxRohitKumarShah6
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNIJMTST Journal
 
How io t is changing our world
How io t is changing our worldHow io t is changing our world
How io t is changing our worldmanoharparakh
 

Similar to Iota data marketplace (20)

Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNSecure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
 
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsA Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Designing Distributed Systems
Designing Distributed SystemsDesigning Distributed Systems
Designing Distributed Systems
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
LAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxLAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptx
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
H0362052056
H0362052056H0362052056
H0362052056
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSN
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Module 2.pdf
Module 2.pdfModule 2.pdf
Module 2.pdf
 
Module 2.Cryptography and Cryptanalysis
Module 2.Cryptography and CryptanalysisModule 2.Cryptography and Cryptanalysis
Module 2.Cryptography and Cryptanalysis
 
How io t is changing our world
How io t is changing our worldHow io t is changing our world
How io t is changing our world
 

Recently uploaded

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Recently uploaded (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Iota data marketplace

  • 2. Recalling IOTA ● distributed ledger architecture that has no transaction fees ● built for ecosystems such as the Internet of Things or Web 3.0 ● uses a gossip protocol to propagate transactions through the network
  • 3. Masked Authenticated Messaging Data communication protocol which adds functionality to emit and access an encrypted data stream, like RSS, over the Tangle Why bother? ● IOTA’s consensus protocol adds integrity to these message streams ● fulfills an important need in industries where integrity and privacy meet
  • 4. The Concept In IOTA, a user can publish a message at any time. They only need to conduct a small amount of proof of work to allow the data to propagate through the network (This is necessary to prevent spamming of the network). If nodes are listening for the channel ID (= address) in real time, the message (gossipped through the network) will be received by a subscriber when it reaches the subscriber’s node.
  • 5.
  • 6. How it affects others on the Tangle? Since these messages are part of the distributed ledger, they both contribute to the security of the network by increasing total hashing power and benefit from the data integrity properties of the network as other transactions continue to indirectly reference them.
  • 7. Existing application of MAM On embedded devices Bosch XDK IoT developer kit or the RuuviTag, an open source sensor beacon from Ruuvi Labs. Using the XDK or RuuviTags, one can create portable weather stations, Eddystone proximity beacons, vehicle locators and many other nifty sensor applications that report telemetry to a limited audience via the tangle or receive commands through a MAM stream.
  • 8. In-depth MAM uses a Merkle tree based signature scheme to sign the cipher digest of an encrypted message. The root of this Merkle tree is used as the ID of the channel. Each message contains the root of the next Merkle tree (or the future direction of the channel). Since previous trees are not referenced, this might be used to add an element of forward secrecy to a channel.
  • 10. Privacy & Encryption Modes 1. Public: Masked-message is decrypted using root. 2. Private: address=hash(root). Masked message is decrypted usingroot. 3. Restricted: address=hash(root). Masked message is decrypted using sideKey.
  • 11. Public Public mode uses the tree’s root as the address of the transaction that the message is published to. A random user to stumbling across a message can then decode it by using the address of the message. This mode is similar to broadcasting on HAM radio. It could be used for public announcements from a device or individual and a possible use case would be a twitter clone, however now you have the added properties of immutability and data integrity.
  • 12.
  • 13. Private Private mode can be used for encrypted streams not meant for public consumption. In private mode, the hash of the Merkle root is used as the address. This stops a random user from decrypting your message if they stumble across it due to the fact that they are unable to derive the root from the hash. This makes a MAM stream only readable by those who are provided with the root.
  • 14.
  • 15. Restricted Restricted mode adds an authorization key to private mode. The address used to attach to the network is the hash of the authorization key and the Merkle root. A message publisher could stop using the auth key without changing their Channel ID (that is, the merkle tree), so access could be in essence revoked from subscribers if desired. When a key change event occurs the new auth key needs to be distributed to the parties that are allowed to follow the stream.
  • 16.
  • 17. Forward Secrecy Given that a current message only points to the next merkle tree, there is no way for a user reading the MAM stream to read messages prior to the root they have been given. It’s easiest to think of a MAM stream as a freeway: when you first start to read a stream you are entering the freeway and you can’t go against the flow of traffic.
  • 18.
  • 19. Channel Splitting A MAM publisher can decide to split the channel at any point in time. This means: future messages use a new Merkle tree whose root has not been revealed before. This enables offshoot channels for specific subsets of data, the entirety of which is not intended to be shared, thereby permissioning data and providing fine grained access.
  • 20.
  • 21. Digital Identity- A use case Record can have two main branches: Public and Private data. The Public branch uses the Private MAM mode and lets all users who have the root read the messages. This could include name, a list of interests,etc. When going to a physician the user can share the a substream of daily weight data. They can do this by sharing the root and auth key of the weight stream. Given that there is forward secrecy, the physician will be unable to gain access to extra data they have not been given access to.
  • 22. Channel Splits- Another use case A device may do a daily report on environmental data. When it detects an anomaly it then splits the channel and starts reporting data at a smaller interval. In addition to communicating values at the regular interval to the main channel, it could also notify listeners of the new split channel that contains the more frequent updates. This maintains the temporal spacing of the main stream while allowing the flexibility to add in secondary stream for special use cases.
  • 23. MAM- The Conclusion Masked Authenticated Messaging is one of IOTA’s most potent IXI Modules and opens up a new field of use cases on top of IOTA. Being able to secure data’s integrity and control its access management is a prerequisite for things like Over-The-Air updates(OTA), Data Marketplaces, Fog Analytics, End-to-End verifiable Supply Chains, Automated Insurance and so much more.
  • 24. IOTA Data Marketplace It’s just an application of MAM module It’s promising because… … it enables connected devices and "machines" to share securely information and also allow seamless transactions between IoT devices.