I.D.S – Incorruptible Data Storage

Decentralized Cloud 3.0/DataSend/DataStore/Blockchain E-Mail

Incorruptible Data Storage (I.D.S.) is an innovatively designed SINOVATE decentralized cloud and private network mechanism for sending, storing, and verifying encrypted data files. It allows users to store files for future retrieval and to send files peer-2-peer anonymously. It also allows private messaging between users with SIN messenger application to guarantee security without storing data on any server.

– Decentralized Cloud 3.0

– DataSend and DataStore

– Blockchain-mail and Proof-of-Integrity

– Unlimited private networking of big data storage

– SIN Messenger Direct Messaging

Chain Stats

Block Height

503,027

Circulating Supply

0

Total Addresses

1,078,650

Transactions

11,464,003

Total Burns

1,031,344,977

How does I.D.S Work?

The I.D.S (Step-1) feature uses the ‘MINI  SIN’ Infinity Node Layer and blockchain architecture to process and store data files. 

 

What follows are the steps a user must follow to use I.D.S:

– Upload a copy of the document or message to the core qt wallet or mobile application.

– Send the data to the ‘MINI SIN’ Infinity Node Layer for temporary storage.

– Infinity Nodes validate the data transaction

– After two confirmations, the data stored and indexed permanently in the ‘MINI SIN’ Layer get broadcasted across the decentralized network protocol. Users can compare a local copy with the recorded copy to provide proof of ownership. 

 

Data is stored and encrypted using the public key of the data owner. For future retrieval, the transaction ID and proof of authenticity (private key) are necessary to access the Infinity Nodes data. In the future, third party logical access control will be added as a feature to allow third-party access if demanded.To avoid blockchain bloat, a user has to pay a SIN transaction fee to store data. The amount paid depends on the size of the data and its level of encryption. All transaction fees are burnt and removed from the SIN coin circulation supply. The mainnet SINOVATE blockchain and the ‘MINI SIN’ layer store the metadata. It is then saved in level DB and indexed, but only the data owner can view and utilize the data for verification.

I.D.S. DataStore

DataStore allows users to store digital documentation or data, timestamped with metadata, and secured by the incorruptible SIN blockchain.

A local copy of the document or data is available to compare with that stored in the blockchain at any time. SINOVATE cryptography and the blockchain provide the underlying trust and empirical truth to enable the data stored to be validated.

Besides being able to send data, the SINOVATE network allows users to store data for specific time limits. It is important to emphasize that data is not directly transferred to a receiver but instead distributed between 20 Infinity Nodes. 

Using Alice (sender) and Bob (receiver) as the typical examples, the following applies:

– When choosing Infinity Nodes to store the data, Alice can either choose nodes she trusts or uses an algorithm that randomly picks twenty nodes categorized as ‘low risk’ (if Infinity Node has <70% ROI)

– Data is stored in 20 nodes (including any chosen by Alice)

 – Alice can select more than twenty nodes to store the data, but the fee will be higher

 – The Infinity Nodes will store data for seven days unless a higher fee is paid for a longer time limit

DataSend

Using the same technology and underlying I.D.S protocol, this also allows users to send data and documentation to each other using the trusted and secure SINOVATE blockchain to guarantee the validity of the data.
This provides the following unique benefits:
– Increased security of personal information.
– Data control back in the hands of users and recipients, with no additional storage costs.
– Privacy of data – This is paramount in the face of Facebook, Google, and other data hacks and misuse.
– Alleviation of hacking and disruptions that centralized databases are prone to experience.

 

For example, a sender called Alice can encrypt data, then send it to Bob. Bob then be the only peer who can receive and open it. This transfer of data utilizes the ‘Elliptic Curve Digital Signature Algorithm’ or ECDSA, which uses private/public keys and digital signatures. To be specific, Alice can encrypt the data by using the public key provided by Bob before it is broadcasted via the SINOVATE network. Only Bob has permission to decrypt the data by using his secret private key. Additionally, Bob receives a notification within the wallet client that his data is stored, for a limited time, by specific infinity nodes.

SIN Messenger Direct Messaging

Using the same underlying I.D.S protocol, users can send data and documentation to each other using the trusted and secure SINOVATE blockchain to guarantee the validity of the data.

This provides the following unique benefits: 

  1. Increased security of personal information.
  2. Data control back in the hands of users and recipients, with no additional storage costs.
  3. Privacy of data – This is paramount in the face of Facebook, Google, and other data hacks and misuse. 
  4. Alleviation of hacking and disruptive downtime periods that centralized databases are prone to experience.

For example, a sender called Alice can encrypt data, then send it to Bob. Bob is then the only peer who can receive and open it. 

This transfer of data utilizes the ‘Elliptic Curve Digital Signature Algorithm’ or ECDSA, which uses private/public keys and digital signatures. 

To be specific, Alice can encrypt the data by using the public key provided by Bob before it is broadcasted via the SINOVATE network. 

Only Bob has permission to decrypt the data by using his secret private key. Additionally, Bob receives a notification within the wallet client that his data is stored, for a limited time, by specific Infinity Nodes. 

What follows is the process by which simple “data” messages can be sent from Alice to Bob:

  1. Alice sends a “register” transaction with a specific SIN coin “amount” to the wallet address SINBurnAddressForRegisterxxx
  2. When Alice broadcasts the “data” message, the chosen or randomly selected Infinity Nodes will check if Alice has permission (data size, expiration time, etc.).
    1. Infinity Nodes refuse the transaction if the permission is not granted.
    2. If granted permission, the Infinity Nodes will save the “data” message sent from Alice, ready for Bob to download it later on.
  3. Bob must prove he is the recipient by using his private key to download the “data” message by signing the message and then broadcasting it to the network.

Transactions

In a similar way, how SINOVATE network broadcasts financial transactions, the SIN Messenger feature uses the same type of transaction (Burn and Data) as implemented in the ‘Infinity Node’ feature. 

Each time a user executes the message, the following metadata is recorded and saved in LevelDB:

– Transaction ID
– HashKey
– How large the data file is
– How long the data is stored for (time limit)
– List of the IPs of the chosen or randomly selected Infinity Nodes

Transaction Fees

Network Fee: Each DataSend transaction costs (default minimum) 0.1 SIN to transfer data of size 1 Mb and for 7 days of storage.

Storage Fee: 0.1 SIN for additional extra 1 Mb

Time Limit Fee: 0.1 SIN for an additional 7 days of storage

Once Alice has chosen what fee to pay and saved the data, the Infinity Nodes broadcast the metadata and commits the collateral. She must also send a “Burn and Data” transaction to the receiver (Bob) with 0 SIN sent. It contains the necessary information to permit Bob to successfully receive the data. 

All five Infinity nodes, either assigned randomly or chosen, continue to verify that the data is stored for the specified time limit. The network fee is committed by the highest rank of the five nodes.

Proof-of-Storage

It is the responsibility of the five chosen or randomly assigned Infinity Nodes to verify that the data is stored until the time limit has expired. The highest-ranked Infinity Node commits the network fee. 

– Node A sends a random number (RN) to Node B.

– Node B answer by hash (RN, data size)

– Node A verifies the response of Node B.

   – If OK, do nothing.

   – If KO, create an alarm to 4 other nodes to verify and ban node B if necessary.

PROOF OF INTEGRITY

The I.D.S feature makes it possible for users to prove the integrity of that data in addition to sending and storing data files on the blockchain. Private individuals, corporations, and governments need to be sure that the data they receive is genuine. SINOVATE will utilize proof-of-integrity to solve this problem. For example, when Alice decides to send data to Bob, Alice must create a new transaction type TX_BURN_DATA. This transaction is then included in a subsequently mined block and saved in the main SIN blockchain.  

  1. <PublicKey of Bob> ⇒ this is known by Alice (required to send data to Bob)
  2. <OP_RETURN> ⇒ the number of SIN coins committed to the transaction will be burnt. The amount transacted is dependent on how long Infinity Nodes will store the data and which Infinity Node layer is chosen (MINI, MID, BIG)
  3. <SMALLDATA> ⇒ the hash of the data file (used as proof-of-integrity)

In summary, when the transaction and data file are sent from within a user’s wallet interface, they are both broadcast to the network. The hash data file is stored on the blockchain, and the actual data is saved on the chosen Infinity Node layer. The immutability of the hash data file proves that no-one is authorized to change it, and the data sent from Alice to Bob is authentic, whole, and trusted.

Summary Of Data Services

In summary, the DataSend feature empowers users of the SINOVATE network. It is a highly secure method by which to send and store data. It is also possible to track the time at which the data was transferred. As the SINOVATE network expands, users will be able to “sell” disk space, and data will not be deleted from Infinity Nodes. 

Later on, the SIN InfiniteChain (completely separate from the main SIN blockchain) will be the complete solution to the constant trilemma faced by many blockchains. It will be essential to optimize the decentralization, security, and scalability of the SINOVATE blockchain as the number of users grows.

Conclusion

In summary, the DataSend feature empowers users of the SINOVATE network. It is a highly secure method by which to send and store data. It is also possible to track the time at which the data was transferred. As the SINOVATE network expands, users will be able to “sell” disk space, and data will not be deleted from Infinity Nodes.

Later on, the SIN Infinitechain (completely separate from the main SIN blockchain) will be the complete solution to the constant trilemma faced by many blockchains. It will be essential to optimize the decentralization, security, and scalability of the SINOVATE blockchain as the number of users grows.

Otherwise, the network willbecome too sluggish and prone to attack.