Decentralization Delivers Better Security & Privacy.

How it works.

Step 1

Objects are encrypted.

Storj DCS (Decentralized Cloud Storage) automatically encrypts all files before being uploaded--your data is only in your hands and those you share it with.

Can Storj see the data I store?

Arrow Right

No. Files are encrypted, split into pieces, and stored on geographically diverse Nodes, making data breaches a thing of the past.

What kind of encryption is used?

Arrow Right

Every file is encrypted using AES-256-GCM symmetric encryption. This is standard on every file before being uploaded to our network to ensure no unauthorized user can access it.

Why is this important?

Arrow Right

Only you should own your data. A file on Storj DCS can't be accessed without keys or permissions. Everything is encrypted before being uploaded—your data can only be viewed by those who are granted access.

Can I revoke access privileges?

Arrow Right

Yes. You have complete control over your data and can give and take away permission at any time.

Step 2

Encrypted objects are split into smaller pieces.

After being encrypted, each object is split into pieces that are indistinguishable from any other object’s pieces—this also gives your data constant availability.

How many pieces do files get split into?

Arrow Right

Each file gets split into 80 pieces, and retrieving a file only requires 29. Each of the 80 pieces is stored on a different Node, all with different operators, power supplies, networks, and geographies.

Why split up the files?

Arrow Right

Splitting files yields unparalleled performance and durability. Our decentralized architecture offers improved out-of-the-box security and privacy for our customers and enables more reliable performance than traditional cloud storage providers.

Is Storj DCS secure?

Arrow Right

We like to think of it as a completely new standard for data security. You don’t have to trust us, that’s just how it works. It’s what we call trustless—we’ve taken trust out of the equation entirely. We couldn't read your data even if we wanted to. If someone else wants to access your data, they would need to first constitute your file from the network—already a tricky and complex task without strict authorization from our system—then they would need to break AES-256-GCM encryption, which protects the world’s most sensitive data and classified information. It’s not going to happen.

Step 3

Object pieces are globally distributed.

Pieces of an object are then individually stored over a global network of Storage Nodes. An object is never in one place, outages, downtime, and data breaches are a thing of the past.

Where are the Nodes?

Arrow Right

Our global network is made up of thousands of Nodes. Currently, over 10k Nodes are being hosted in 84 countries.

How many Nodes are files stored on?

Arrow Right

80. We split each file into 80 different encrypted pieces, and each piece is stored on a different Node.

How are Nodes selected to store an object piece?

Arrow Right

Nodes are chosen by reputation and local latency. We select reputable Nodes at random, weighted by network diversity, then attempt to upload to a larger set of those selected Nodes. The fastest Nodes from this set are chosen to store files.

Step 4

Objects are retrieved when you need them.

When you retrieve an object, only 29 of its 80 pieces are needed to reconstitute that object. With no central point of failure, your data is always quickly available, all over the world.

How many pieces are needed to retrieve a file?

Arrow Right

To retrieve a file, we only need 29 encrypted pieces.

What happens if a Node goes offline?

Arrow Right

One Node going offline won't impact any files. Our network's automatic repair process reacts when too many pieces for any files are lost, and repairs them within a very healthy margin of safety.

Edge-Based Privacy

Discover how to practically apply the unique edge-based security and privacy benefits of decentralization to solve real-world problems.

Read the Blog

Data Security Tech Brief

Take a deep dive into the multi-layered encryption and access management capabilities of Storj DCS that deliver a new standard in data security.

Read the Tech Brief

Availability & Reliability Report

If your data isn't there when you need it most, you're out of business. Learn how Storj DCS can ensure on-demand availability of your data.

Read the Report

Build on the
decentralized cloud.

Kickstart your next project and grow your revenue with this high-converting, beautifully crafted template.
Start for free