How it Works

Decentralization is complicated stuff, we make it simple while offering a new standard in security, performance, and pricing.

1. Encrypt

First, objects are automatically encrypted using AES-256-GCM encryption.

2. Split

Encrypted data is then split into pieces that can't be distinguished from any other object’s pieces.

3. Distribute

Next, pieces are individually distributed to uncorrelated nodes around the world.

4. Retrieve

Finally, only 29 of an object’s pieces are needed to reconstitute that data for download.

Common Questions

Step 1
Encrypt

Storj automatically encrypts all files before being uploaded--your data is only in your hands and those you share it with.

Can Storj see the data I store?

We use the best in encryption technology on a decentralized network which means we couldn't access your encrypted data even if we really wanted to. This is why data breaches and downtime are a thing of the past with Storj DCS.

What kind of encryption is used?

Every file is encrypted using AES-256-GCM symmetric encryption. This is standard on every file before being uploaded to the network which is why no unauthorized user can access your data.

Why is this important?

Only you should own your data. A file on Storj DCS can't be accessed without keys or permissions. Everything is encrypted before being uploaded—your data can only be viewed by those who have been granted access.

Can I revoke access privileges?

Yes. You have complete control over yourdata and can give and take away permission at any time

Step 2
Split

After being encrypted, each object is split into pieces that are indistinguishable from any other object’s pieces—this also gives your data constant availability.

How many pieces do files get split into?

Each file gets split into 80 pieces, and retrieving a file only requires 29 of those pieces. Each of piece is stored on a different Node, all with different operators, power supplies, networks, and geographies.

Why split up the files?

Splitting files into pieces means your data is never in one place, ensuring ultimate security and availability. If there's a massive power outage, or something causes several nodes to go offline, that's completely ok. The Storj network automatically repairs each piece and recreates it on a healthy node ensuring data is never lost. And because each piece is indistinguishable from any other file's pieces without the encryption key, this enables unparalleled security and privacy.

Is this secure?

This is a new standard in data security. You don’t have to trust us, that’s just how it works. We’ve taken trust out of the equation entirely by using Reed-Solomon erasure coding. If someone else wants to access your data, they would need to locate each node, then identify your files piece from thousands of other file pieces and repeat that process 29 times. Next, they would need to break AES-256-GCM encryption, which protects the world’s most sensitive data and classified information. It’s not going to happen.

Step 3
Distribute

Each piece of an object is distributed over a massive global network of nodes so data is never in just one place—it's all over the world with better security and privacy.

Where are the nodes?

Our global network is made up of thousands of Nodes. Currently, over 16k Nodes arebeing hosted in 80+ countries.

How many nodes are files stored on?

80. We split each file into 80 different encrypted pieces, and each piece is stored on a unique, statistically uncorrelated node.

How are nodes selected to store an object piece?

Nodes are automatically selected according to reputation and local latency. We select reputable nodes at random, weighted by network diversity, then attempt to upload to a larger set of those selected nodes. The fastest nodes from this set are chosen to store files.

Step 4
Retrieve

When you retrieve an object, only 29 of its 80 pieces are needed to reconstitute that object. With no central point of failure, your data is always quickly available, all over the world.

How many pieces are needed to retrieve a file?

To retrieve a file, we only need 29 encrypted pieces. Using just those 29 pieces, the network can automatically rebuild the data contained in the remaining pieces.

What happens if a node goes offline?

One node going offline won't impact any files. Our network's automatic repair processreacts when too many pieces for any filesare lost, and repairs them within a very healthy margin of safety.

More resources.

Build on the decentralized cloud.

Get S3-compatible object storage with better security and performance at up to 80% less cost.

Start for free