📝 Introduction to Using iApp
In the iExec network, multiple actors work together in a coordinated process to ensure secure, decentralized computation. Here's how the ecosystem operates:
Key Actors in the Network
- 👤 Requesters: Users who need computation performed on protected data
- 🏭 Workerpool Managers: Operators who manage groups of workers and coordinate task execution
- ⚙️ Workers: Individual machines that execute the actual computations
- 👨💻 iApp Developers: Developers who create and deploy applications to the iExec marketplace
- 🔐 Data Providers: Users who own and protect the data being processed
Network Assets
- 📱 iApp: Applications that process the data securely
- 💾 Data: Protected information that needs to be processed
- ⚡ Computational Power: Processing resources provided by workers
- 💰 PoCo: Proof of Contribution system that matches all actors through marketplace
Network Coordination
The iExec network coordinates all actors through the PoCo (Proof of Contribution) system, which automatically matches requesters with the appropriate applications, data, and computational resources based on availability, requirements, and pricing.
Deal Execution Flow
When a deal is triggered, the following sequence occurs:
- Request Creation: Requester submits a computation request with parameters
- Resource Matching: PoCo system matches the request with available applications, data, and computational resources
- Deal Creation: When compatible resources are found, a deal is created containing multiple tasks
- Task Distribution: Selected workerpool manager distributes tasks to their workers
- Secure Execution: Workers download the iApp and execute it in TEE environments
- Data Processing: iApp processes protected data without accessing raw content
- Result Generation: Computation results are generated
- Result Delivery: Results are returned to the requester through the network
- Payment Settlement: RLC tokens are distributed to all participants
Network Architecture Diagram
Detailed Interaction Flow
- Request Submission: Requester creates a request specifying the iApp, Protected Data, etc.
- PoCo Processing: PoCo system validates the request and matches resources
- Deal Creation: When resources are matched, PoCo creates a deal
- Secure Environment Setup: Workers initialize TEE environments and download the iApp
- Data Access: iApp requests access to protected data through secure channels
- Computation: iApp processes data within the TEE, maintaining privacy
- Payment Distribution: RLC tokens are distributed to all participants based on completed tasks
This decentralized architecture ensures that no single entity has control over the entire process, while the use of TEEs guarantees that sensitive data remains protected throughout the computation.
Getting Started
Ready to start using iApp? Check out our Getting Started Guide to learn how to find, execute, and interact with iApp on the iExec network.