Simple Drive otherwise known as SDrive aims to revolutionize cloud storage using Hyperledger Blockchain Technology. The goal is to create a Decentralized Storage Platform that will surely disrupt various technology industries with its innovative and incentivized revenue profit model.
Blockchain is a new approach to create a distributed network which was first introduced in 2008. By the help of this disruptive technology a peer-to-peer network can be formed where nodes must reach a consensus and form a chain from accepted blocks, while no central party or trusted controller is required. Amongst all the existing usage of this technology, we are only ones using Hyperledger Fabric as a decentralized storage system where data is stored across multiple storage nodes without a single point of failure. . Hyperledger Fabric is one of the prominent framework of blockchain. By implementing end-to-end encryption clients can securely transmit their files through a fully decentralized network and eliminate the risk of data failures.
We believe end user experience is key to drive success. Our technology will empower the individual without being reliant on centralized corporations.
We are providing various amounts of storage packages.
The rise in popularity of permissioned blockchain platforms in recent time is significant. We are providing data storage built on Hyperledger Fabric. Hyperledger Fabric is a highly secure permissioned blockchain platform, and we are the first to innovate using it for Data Storage. Hyperledger is a multi-project open source collaborative effort hosted by The Linux Foundation. The Fabric comprises various components such as smart-contracts, endorsers, committers, validators, On-Chain and Off-Chain transactions and orderers. As the performance of blockchain platform is a major concern for enterprise applications, in this work, we performed a comprehensive empirical design to characterize the performance of Hyperledger Fabric and identify lack of performance in centralized system.
Hyperledger Fabric is built on a modular architecture that separates transaction processing into three phases: distributed logic processing and agreement (â€œchaincodeâ€), transaction ordering, and transaction validation and commitment. This separation confers several advantages: Fewer levels of trust and verification are required across node types, and network scalability and performance are optimized.
Hyperledger Fabric is a framework for permissioned networks, where all participants have known identities. When considering a permissioned network, you should think about whether your blockchain use case needs to comply with data protection regulations. Many use cases â€” in the financial sector and healthcare industry, in particular â€” are subject to data protection laws that require knowing who the members of the network are and who is accessing specific data.
Data on a need-to-know basis
Businesses, due to competitiveness, protection laws, and regulation on confidentiality of personal data dictate the need for privacy of certain data elements, which can be achieved through data partitioning on the blockchain. Channels, supported in Hyperledger Fabric, allow for data to go to only the parties that need to know.
Immutable Distributed Ledger
The ledger is the sequenced record of state transitions for the blockchain application. Each transaction results in a set of asset key-value pairs that are committed to the ledger as create and search transaction only. The immutable source of truth is appended into the file system of the peer, which also has LevelDB and CouchDB embedded.
Protection of Sensitive Data
HSM (Hardware Security Module) support is vital for safeguarding and managing digital keys for strong authentication. Hyperledger Fabric provides modified and unmodified PKCS11 for key generation, which supports cases like identity management that need more protection. For scenarios dealing with identity management, HSM increases the protection of keys and sensitive data.
Modular Architecture Support
The modularity of Hyperledger Fabric architecture enables network designers to plug in their preferred implementations for components, which is an advantage. One of the most requested areas for modularity is â€œbring your own identity.â€ Some multi-company networks already have identity management and want to reuse instead of rebuild. Other components of the architecture that can be easily plugged in include consensus or encryption, where some countries have their own encryption standards..