Data Shield - the hottest blockchain security project in 2018 | A connected world without thieves

Data Shield - the hottest blockchain security project in 2018 | A connected world without thieves

Humanity has entered the era of big data. Each mobile phone user generates an average of 80 dimensions of data tags every day, and the tags are updated every 10 minutes. This means that a mobile phone user will generate more than 10,000 pieces of data every day. At the same time, the value of data is also increasing. Our personal information, social relationships, website accounts, exchange accounts, keys... The value of these data assets may have far exceeded the value of cash stored in banks by individuals or companies.

The huge value and precarious data security environment have spawned a black industry that steals and sells personal data. Every year, the underground black industry in China alone has a data information transaction volume of more than 100 billion yuan. The illegal transaction of data has become the third largest black industry after drug trafficking and gambling.

Is there a way to build a secure data protection model? The answer is yes. In 2018, Data Shield came on strong and built a new era of "no thieves in the world".


What is Data Shield?

Simply put, Data Shield is a cross-border security storage technology based on blockchain technology, plus decentralization, distributed storage, cryptography and other technologies. Its ultimate goal is to prevent hackers from stealing any data.

Nowadays, data leakage has become the most serious threat to data security: in June 2017, a data company called Deep Root Analytics suffered a data leakage, which involved the sensitive information of 198 million American voters, including name, date of birth, address, telephone number and voter registration details; in September, Equifax, a well-known American credit agency, was hacked, and the data of about 143 million users were leaked; at the end of January 2018, Coincheck, another cryptocurrency exchange in Japan, was also hacked, and about US$534 million of NEM was stolen... There are countless data leakage incidents, and the personal harm and property losses caused are immeasurable.

Data leakage problems often stem from the "centralized" data storage idea. Without a centralized database, hackers cannot see the global data, which greatly increases the difficulty of hacker attacks. When hackers find that the cost of stealing all the data is far greater than the value they want to sell in the underground black market, they will give up the attack. Based on this idea, the initial concept of Data Shield was formed.


How Data Shield can achieve a world without thieves

Data Shield has changed the way data is stored. In the original database, data is generally stored in plain text. Even if it is encrypted, once the key is leaked, the ciphertext becomes plain text again. General security products are forms of protection such as building walls and establishing gateways. However, in the era of cloud computing and mobile office, data boundaries are gradually blurred or even disappearing, and many enterprise-level data storages are like a mess connected together. Therefore, the traditional way of building walls and defending has been gradually eliminated, and Data Shield has emerged as a new technology.

First, Data Shield will perform special processing such as filling, sharding, and reversing the data based on bits, so that the data will form many fragments. Then the data will be intelligently stored in each node of the network in a distributed form through encryption, N-Backup, N-Copy and other technologies. This is Data-Intelligent-Fragmentation technology.

Secondly, Data Shield will use ZKP, or Zero-Knowledge-Proof, to solve the problem of data owners proving their identity. This mechanism relies on hardware information to complete verification at the bottom layer, such as the serial number of the hard disk or the fingerprint or voice of the owner for verification, and users are no longer in a tense life of carefully saving keys. This mechanism completes verification at the bottom layer, ensuring that only the owner of the data can start the reorganization without the need for a key. This achieves security while avoiding the embarrassment of "locking the key of another safe with one safe."

When restoring and reorganizing data, Data Shield will use N-Recover, i.e., multi-copy recovery technology. Because many data copies will be affected by network online fluctuations, Data Shield needs to prevent data from self-destruction or loss during the data sharding process to the greatest extent possible. Too many shards will waste space, and too few shards will affect data stability. Multi-copy recovery technology uses algorithm design to keep the amount of fragments at a reliable threshold, ensuring that data recovery and integration can be performed in any severe situation.

These three core technologies achieve the purpose of data shield, making it so that even if hackers crack a door in the building, they can only get fragments of the money; even if they open all the doors, they can only get fragments and cannot restore them to plain text data, leaving hackers with no data to steal.


Data Shield - a blockchain project with practical applications

The actual application scenarios of Data Shield are from sharing storage space to deploying enterprise-level data security solutions to truly achieve "a world without thieves".

In terms of practical application, Data Shield will first protect personal sensitive data, and solve the problem of secure storage of personal identity information and private photos through encrypted sharing. Then it will enter the field of enterprise-level data security. In fact, most of the data leakage incidents that have caused huge public impact are caused by the leakage of enterprise-level data. Personal data will be repeatedly leaked many times on different enterprise platforms, making the data in many databases available for sale in the underground black industry. Therefore, Data Shield's vision will not be limited to the protection of personal data. The team has begun planning to migrate Data Shield's personal applications to enterprise-level applications, and this migration will be achieved by reserving enough space in the architecture.

At present, many companies store their data in the cloud or buy tape drives for storage every year. But in the future, you only need to purchase a certain amount of space services to store data in a shared storage network. This storage form has a weak dependence on the underlying operating system and can be directly stored in the network without building a platform. The ultimate ideal is to establish a decentralized distributed processing network at the ZB level or even the YB level. At that time, there will be no need for iCloud or Baidu Netdisk on mobile phones. Storage services such as Alibaba Cloud and AWS will gradually disappear.


Data Shield is ready to open a new era of data security

Data Shield innovates the "boundary protection" mechanism of the traditional data security industry, proposes a unique security protection that combines data security and data storage, and opens a new era of data security. The Data Shield team also has its own vision for the future. Doing a good job in secure storage and entering higher fields is its direction of progress.

In the network architecture of the Internet of Everything, decentralization is inevitable, but the current centralized architecture still has problems such as insecurity and slow network. Therefore, the development of the Internet of Things will force decentralization to become an important technology. Data Shield is not only a data security storage technology, but also a decentralized revolution that subverts the existing storage method. It will shoulder a great mission in the process of the Internet of Everything, that is, to ensure the implementation of decentralized storage and enable mankind to take a huge step on the road to the Internet of Everything.


<<:  Google to ban cryptocurrency and ICO ads from June

>>:  What is an ASIC miner?

Recommend

Easy to lose money

Money is not everything, but living without money...

How to know the recent fortune from the facial complexion

Buddhism says: The future is unattainable, the pa...

Let's see whether it is good or bad to have protruding ears

Personality traits of protruding ears Protruding ...

Is it good for a man to have a mole on his back?

You may have moles in both obvious and hidden pla...

Some opinions on domestic listed companies publicly buying Bitcoin

Some opinions on domestic listed companies public...

What is pig mouth?

What is a pig's mouth: The upper lip of a pig...

A woman with wide eyebrow distance is a lucky sign

The distance between the eyebrows is a relatively...

Russian Payments Company Tries Bitcoin Tool for User Verification

Russian payment service is experimenting with a v...