🤖 AI Summary
Current cloud computing faces three critical challenges: centralized trust assumptions (reliance on centralized cloud providers), fragmented ecosystems hindering interoperability, and insufficient computational verifiability and confidentiality—eroding user privacy and data sovereignty. To address these, Acurast introduces a decentralized serverless cloud architecture. Its method embeds the scheduler, reputation system, and remote attestation service directly into the blockchain consensus layer and designs a modular execution layer leveraging Trusted Execution Environments (TEEs) to enable zero-trust computation. The core contributions are: (1) cryptographically enforced privacy, verifiability, and high performance for cross-device computation via TEE-based remote attestation; (2) support for heterogeneous hardware—including mobile devices—as compute resource contributors; and (3) permissionless interoperability across previously isolated ecosystems. This open-source, scalable architecture establishes a novel paradigm for globally distributed, decentralized cloud computing.
📝 Abstract
Centralized trust is ubiquitous in today's interconnected world, from computational resources to data storage and its underlying infrastructure. The monopolization of cloud computing resembles a feudalistic system, causing a loss of privacy and data ownership. Cloud Computing and the Internet in general face widely recognized challenges, such as (1) the centralization of trust in auxiliary systems (e.g., centralized cloud providers), (2) the seamless and permissionless interoperability of fragmented ecosystems and (2) the effectiveness, verifiability, and confidentiality of the computation. Acurast is a decentralized serverless cloud that addresses all these shortcomings, following the call for a global-scale cloud founded on the principles of the open-source movement. In Acurast, a purpose-built orchestrator, a reputation engine, and an attestation service are enshrined in the consensus layer. Developers can off-load their computations and verify executions cryptographically. Furthermore, Acurast offers a modular execution layer, taking advantage of secure hardware and trusted execution environments, removing the trust required in third parties, and reducing them to cryptographic hardness assumptions. With this modular architecture, Acurast serves as a decentralized and serverless cloud, allowing confidential and verifiable compute backed by the hardware of security and performance mobile devices.