Version 1.0.0
GitHub
Get Support

Neo Service Layer Architecture

Overview

The Neo Service Layer provides a secure, scalable infrastructure for extending Neo N3 blockchain capabilities. This document explains the high-level architecture, security model, and core components of the service.

System Architecture

The Neo Service Layer uses a multi-layered architecture to provide secure, scalable off-chain services for Neo N3 applications:

Neo Service Layer Architecture Overview

Key Components

  1. API Gateway Layer - Handles authentication, rate limiting, and request routing. This is the entry point for all external requests.

  2. Service Orchestration Layer - Manages service discovery, load balancing, and request processing across the platform services.

  3. TEE (Trusted Execution Environment) Services - Core services running in Azure Confidential Computing environments that provide secure execution isolated from the host system.

  4. Blockchain Integration Layer - Handles communication with the Neo N3 blockchain, including transaction creation, signing, and monitoring.

  5. Data Management Layer - Manages persistent data storage, caching, and retrieval for the service.

Trusted Execution Environment (TEE)

At the core of the Neo Service Layer security model is the use of Trusted Execution Environments (TEEs). We use Azure Confidential Computing to create secure, isolated environments for processing sensitive data and executing code.

How TEE Works

Memory Encryption

TEE uses hardware-level encryption to protect data in memory, ensuring that even the system administrators cannot access the data being processed.

Code Integrity

TEE validates the integrity of code before execution, ensuring that only authorized code runs in the secure environment.

Remote Attestation

TEE provides cryptographic proof that code is running in a genuine TEE with the expected configuration, allowing users to verify the environment.

Secure Key Management

Cryptographic keys are generated and stored within the TEE, never exposed to the host system or administrators.

TEE Implementation

The Neo Service Layer uses Azure Confidential Computing with Intel SGX (Software Guard Extensions) to create TEEs. This provides hardware-based memory encryption that isolates code and data in memory from the operating system, hypervisor, and other applications.

// Simplified representation of TEE initialization for Function execution

// Step 1: Create the TEE enclave
const enclave = await TEE.createEnclave({
  type: 'SGX',
  codeIdentity: 'function-executor-v1.2.3',
  securityLevel: 'EAL5'
});

// Step 2: Load user code and secrets into the enclave
await enclave.loadCode(functionCode);
await enclave.loadSecrets(functionSecrets);

// Step 3: Generate attestation report
const attestation = await enclave.generateAttestation();

// Step 4: Execute code in the secure enclave
const result = await enclave.execute(functionInput);

// Step 5: Return result and attestation proof
return {
  result,
  attestation
};

Technology Stack

ComponentTechnologiesPurpose
API GatewayKong, NGINX, Azure API ManagementRequest routing, authentication, rate limiting
Service CoreGo, gRPC, Protocol BuffersCore service implementation, inter-service communication
TEE RuntimeIntel SGX, Azure Confidential Computing, Open Enclave SDKSecure execution environment
Function RuntimeNode.js (v16, v18)JavaScript function execution
Blockchain IntegrationNeoGo SDK, Neo.js, Custom RPC clientsNeo N3 blockchain interaction
Data StoragePostgreSQL, Redis, Azure Cosmos DBPersistent storage, caching
Monitoring & LoggingPrometheus, Grafana, ELK StackSystem monitoring, log aggregation, alerting
InfrastructureKubernetes, Docker, Azure CloudContainer orchestration, infrastructure management

Service Components

The Neo Service Layer is composed of several core services, each providing specific functionality:

Functions Service

The Functions Service allows developers to deploy and execute JavaScript code in a secure TEE.

Key Components:

  • Function Executor - Runs JavaScript code in isolated environments
  • Function Store - Manages deployed function code and metadata
  • Invocation Manager - Handles function invocation requests and responses
  • Context Provider - Supplies execution context to functions

Secrets Management

The Secrets Management service provides secure storage and access to sensitive credentials and data.

Key Components:

  • Secret Store - Encrypted storage for sensitive data
  • Access Control - Manages permissions for secret access
  • Secret Provider - Delivers secrets to authorized functions
  • Audit Logger - Records all secret access and modifications

Contract Automation

The Contract Automation service enables time and event-based triggers for smart contract interactions.

Key Components:

  • Trigger Manager - Processes and evaluates trigger conditions
  • Schedule Manager - Handles time-based scheduling
  • Event Listener - Monitors blockchain and external events
  • Action Executor - Performs the configured actions when triggered

Gas Bank

The Gas Bank service manages GAS deposits and consumption for service operations.

Key Components:

  • Account Manager - Tracks user GAS balances
  • Transaction Processor - Handles deposits and withdrawals
  • Fee Calculator - Estimates and charges GAS fees for operations
  • Billing Reporter - Generates usage reports

Price Feed

The Price Feed service provides reliable market price data for cryptocurrencies and tokens.

Key Components:

  • Data Aggregator - Collects price data from multiple sources
  • Price Validator - Validates and normalizes price data
  • Update Scheduler - Manages the frequency of price updates
  • On-chain Publisher - Publishes price data to smart contracts

Random Number Generation

The Random service provides secure, verifiable random numbers for applications.

Key Components:

  • Entropy Collector - Gathers entropy from multiple sources
  • Random Generator - Produces random values with cryptographic security
  • Verification Provider - Creates proofs of randomness
  • Distribution Manager - Delivers random values to applications

Oracle Service

The Oracle service connects smart contracts with external data sources.

Key Components:

  • Data Fetcher - Retrieves data from external sources
  • Data Transformer - Processes and formats data
  • Consensus Engine - Validates data using configurable consensus methods
  • Delivery Manager - Provides data to smart contracts

Security Model

The Neo Service Layer employs a comprehensive security model with multiple layers of protection:

1. TEE Protection

All sensitive operations occur within Trusted Execution Environments, providing hardware-level isolation from the host system.

2. Authentication & Authorization

Strong API key authentication and role-based access control restrict access to resources and operations.

3. Encryption

End-to-end encryption for all sensitive data, both in transit and at rest, using industry-standard algorithms and key management.

4. Secure Development

Rigorous secure development practices, including code reviews, static analysis, and penetration testing.

5. Operational Security

Comprehensive monitoring, logging, and alerting to detect and respond to security events.

6. Compliance & Auditing

Regular security audits and compliance with industry standards and best practices.

High Availability and Scalability

The Neo Service Layer is designed for high availability and scalability to ensure reliable service for blockchain applications:

Availability Features

  • Multi-zone deployment across Azure regions
  • Automatic failover and replication for critical services
  • Load balancing and health monitoring
  • Graceful degradation for non-critical services

Scalability Features

  • Horizontal scaling for services based on demand
  • Asynchronous request processing for improved throughput
  • Efficient caching to reduce load on the blockchain
  • Auto-scaling based on resource utilization metrics

Network Architecture

The Neo Service Layer interacts with multiple networks and systems:

Neo Service Layer Network Architecture

Key Network Interfaces

Client Applications

Applications interact with the service layer through HTTPS REST APIs or WebSocket connections. All external communications are encrypted and authenticated.

Neo N3 Blockchain

The service layer connects to Neo N3 nodes using RPC and WebSocket connections to monitor events, submit transactions, and interact with smart contracts.

External Data Sources

For oracle and price feed services, the layer connects to external data providers using secure HTTPS connections, with data validation and transformation in TEEs.

Internal Services

Service components communicate using gRPC with mutual TLS authentication and encryption, ensuring secure and efficient internal communication.

Next Steps

Service Documentation

Explore the detailed documentation for each service in the Neo Service Layer.

View Services →

Security Deep Dive

Learn more about the security features and model of the Neo Service Layer.

View Security Documentation →

Getting Started

Start building with the Neo Service Layer using our quickstart guides.

View Getting Started Guide →

Was this page helpful?

Edit this page on GitHub