IDM - Digital data storage service

54645ytr.jpg


 Over the past decade, cloud storage campaigns have repeatedly steal customer data. As a result, clients suffered major financial and reputational losses.

One of the main problems of cloud storage is the loss of your data. This may well happen, since your data is stored on hard disks. And hard drives are not eternal, and any moment can fail. Not always the data is lost due to technical reasons, and more often because of hacker attacks. Everyone probably heard about the scandal when Hollywood stars stole icloud intimate photos. Also cloud storage is subject to ddos-attacks and files at the moment you need will not be available. But these problems are less resolved, but what can not be guessed is the human factor. The situation is prosaic and not so rare. Some employees are ready to go for crimes for the sake of enrichment or he is just a sick activist. The stolen data of users and access to information are sold to criminal structures, which causes enormous harm - both moral, so also material. All these problems were solved by IDM using SIZE technology.

IDM has its own proprietary SIZE protection and transmission technology and is ready to launch a new service - a decentralized ecosystem that connects users who want to store information securely and safely, and miners who provide free memory for their devices to generate revenue. The IDM command created a working prototype of a cloud storage service called BoobookBox. Service already works in 2015 and has more than 2 thousand regular customers. The working prototype was launched to conduct tests and tests of the technology functionality, both by developers and third-party organizations.

That is, in simple words, IDM will create a p2p site where anyone can provide a place for storing customer data. Thanks to the use of our SIZE algorithm, user data is guaranteed to be protected from loss (as a result of distributed storage of parts of data from which it is possible to restore a file, even if there are not more than 2% of them remaining) on ​​different storage media. Administration of the service will be carried out with the help of blocking technology.

Now I will tell you the advantage of SIZE, with other methods. SIZE, in the field of recovering lost information, favorably differ from traditional and widespread methods of achieving reliability, like 3 or 4-fold Backup or replication, embedded in Hadoop, ZFS file systems from Google, Luster. The SIZE encoding algorithm is able to provide the same reliability indicators with much less redundancy. Replacing the replication method with SIZE technology in data centers storing Big Data (with 8-fold backup) is comparable with the construction of a new data center. For each existing data center, there is also one more new one. The use of SIZE technology can significantly reduce the gap between the amount of digital information generated in the world and the lack of memory for its storage. With increasing parity, the SIZE algorithm allows to recover all large volumes of information loss, and the difference with traditional storage systems becomes even more significant. At the 10th parity level, for example, it is possible to lose up to 98% of the stored information, and for the remaining 2% completely restore the original data.

SIZE technology differs from its competitors in its safety. Without the consent of the information owner, neither outsiders, nor employees of companies representing data storage services in data centers or cloud services, nor any governmental or non-governmental organizations should be able to access the stored information. Usually, the encryption method is used for information security. But this technology has its drawbacks, the use of the key at one of the stages of the transformation as a secret component. SIZE technology creates a metafile that can be considered a "key" in a cryptographic sense, automatically, during the processing of the source file. This "key" is created only once and never repeats. Even if the same file is converted several times using SIZE technology, then each time a new "key" will be created. The conversion process itself is determined not by the "key", but by the program settings, which are selected randomly by the user. Since the "cryptographic key" itself is not randomly assigned, but a series of unrelated program settings, there is no rigid binding to the truth of the random sequence. It is sufficient to use reliable cryptographic random number generators. The so-called "cryptographic key" is not stored anywhere, no one is transferred and there is no need to keep the library of these "keys". Secure information can always be read by knowing the settings of the computer program that are stored in the metafile, a base value that does not exceed hundreds of bytes. The SIZE algorithm automatically fulfills the requirement to ensure the authenticity and integrity of the protected information. Any change to the file will result in a change to the corresponding metafile. A metafile is not a "key," it's just a file describing how the package was created. Thus, the cryptographic key, as such, does not exist. And, as a consequence, there is no object for hacking for a quantum computer.

Data management in the technology application of the SIZE algorithm, which automatically generates a metafile, which is the original, innate and integral parameter of the stored information. This metafile is a unique, never-repeated feature of a particular file. To a basic metafile of several hundred bytes in size, you can attach additional metafile blocks that are filled with information according to the owner's information of importance, secrecy, access rights, and so on. In case of changing the requirements, it is enough to change the attached blocks in the metafile, not processing the data itself.

All settlements in the ecosystem are made in IDM tokens. Payment for the service from the user's side is made by token. A smart contract calculates the number of tokens needed to pay for the leased memory and accepts payment. Rewards to miners are calculated in the same way in IDM tokens. A smart contract calculates the time period and the amount leased out to the memory and makes payments to the miners.

For more information, visit

WEBSITE https://myidm.io/
WHITEPAPER https://myidm.io/img/doc/wp_en.pdf
TELEGRAM https://t.me/idmprotect_en
TWITTER https://twitter.com/IDMdatasecurity
FACEBOOK https: // www.facebook.com/IDMdatasec
ANN https://bitcointalk.org/index.php?topic=3395543.msg35555064#msg35555064

My Bitcointalk profile link - https://bitcointalk.org/index.php?action=profile;u=1182404 

Comments

Popular posts from this blog

CargoCoin

PHItoken

Cosplaytoken - 블록 체인 기술로 만들어진 코스프레 플랫폼