YottaChain distributed data storage block chain of the present invention, secure storage and processing of data rewriting worldwide problem --- "to the re-encrypted

In today's big data, data encryption and deduplication is a relationship between opposites, like fish and can not have both, "Is that true of you? So what is data encryption, data deduplication is what?
Many people know about data security needs, often need to encrypt the data, but can not be removed after the encrypted duplicate data. even now, after how to make data encryption can go heavy, still a lot of technical staff are hard to overcome the problem, however, this problem has now been YottaChain founder Wang Donglin Jiaoshou overcome, Wang Donglin Jiaoshou breaking the conventional thinking, starting from the most basic principles of data security and storage of the invention can achieve "encrypted deduplication" with rigorous scientific method TruPrivacy technology , thus subvert the pattern storage block chain, to achieve zero-knowledge data encryption and data deduplication.
YottaChain distributed data storage block chain of the present invention, secure storage and processing of data rewriting worldwide problem --- "to the re-encrypted
 What is data encryption?
there is an ancient secret to the ancients invented a variety of encryption technologies, such as our country has a long history of gossip, both innate gossip confidential basis, at the same time, but also a deeper times in a special encrypted acquired gossip, this Is the most simple content encryption.
So far, data encryption technology has undergone enormous changes occur from the most simple data encryption technology. High computing power of computers, the encryption algorithm has been improved on the complexity and security, how to use encryption technology protection of digital products in the security and privacy of information, reduce the loss caused due to the economic losses of these digital products will also become a hot topic of data encryption technology. 
with the birth of the block chain technology and maturing, for data encryption has become prerequisites every business or personal devices. block chain storage core is decentralized storageSince the block chain source code is open, and each storage node can freely access, it can not be trusted. If the data is not encrypted, decentralized storage is only suitable for storing data pages such disclosure is not suitable for the storage of privacy / trade secrets of personal or business data. So common block chain store data encryption must be done "zero-knowledge encryption" is not only encrypted data, and the key has a very good management, in addition to the owner of the data and its licensors, no one can get data.
YottaChain distributed data storage block chain of the present invention, secure storage and processing of data rewriting worldwide problem --- "to the re-encrypted
What is data deduplication?
It is the "remove duplicates" means. If a plurality of persons have the same data, but the memory will not be repeated with a combined shared space, it referred to the weight (i.e., remove duplicate data), also known as deduplication (i.e. deduplication). This world there are a lot of data, you have, I have you have, such as some music, files, or project plan, and so on, these are the duplicate data. Data de-duplication, when the data is to be repeated, we can just keep a copy. In other words, logically it seems to have a lot of pieces of data, but only the amount of data a physical space actually occupied. Everyone seems to have separate data space, but in fact use the same copy of shared data, so that you can effectively reduce storage costs. Outside, no one can get the data.
YottaChain distributed data storage block chain of the present invention, secure storage and processing of data rewriting worldwide problem --- "to the re-encrypted
YottaChain founder Wang Donglin husband is a world-renowned scientist and storage of cryptography, he blocks chain decentralized data storage has its own understanding and technical systems that re-encrypted to the core problem is that the authorization data: data that is stored in the A , when the same data B should be stored, how the data is licensed to use a B without compromising data security of a. Can save the plaintext hash value data to identify duplicate data by comparing the hash values, this does not impair the security of the data.
Based YottaChain decentralized data storage to sesame sesame cloud server cloud serverThe birth of the system, we can even say without hesitation that the deduplication data encryption, including the interconnection of all things, the value of the Internet era make a significant contribution to the future 5G large data led.

Guess you like

Origin blog.51cto.com/14502495/2430338