Storj DCS (Decentralized Cloud Storage) automatically encrypts all files before being uploaded--your data is only in your hands and those you share it with.
No. Files are encrypted, split into pieces, and stored on geographically diverse Nodes, making data breaches a thing of the past.
Every file is encrypted using AES-256-GCM symmetric encryption. This is standard on every file before being uploaded to our network to ensure no unauthorized user can access it.
Only you should own your data. A file on Storj DCS can't be accessed without keys or permissions. Everything is encrypted before being uploaded—your data can only be viewed by those who are granted access.
Yes. You have complete control over your data and can give and take away permission at any time.
After being encrypted, each object is split into pieces that are indistinguishable from any other object’s pieces—this also gives your data constant availability.
Each file gets split into 80 pieces, and retrieving a file only requires 29. Each of the 80 pieces is stored on a different Node, all with different operators, power supplies, networks, and geographies.
Splitting files yields unparalleled performance and durability. Our decentralized architecture offers improved out-of-the-box security and privacy for our customers and enables more reliable performance than traditional cloud storage providers.
We like to think of it as a completely new standard for data security. You don’t have to trust us, that’s just how it works. It’s what we call trustless—we’ve taken trust out of the equation entirely. We couldn't read your data even if we wanted to. If someone else wants to access your data, they would need to first constitute your file from the network—already a tricky and complex task without strict authorization from our system—then they would need to break AES-256-GCM encryption, which protects the world’s most sensitive data and classified information. It’s not going to happen.
Pieces of an object are then individually stored over a global network of Storage Nodes. An object is never in one place, outages, downtime, and data breaches are a thing of the past.
Our global network is made up of thousands of Nodes. Currently, over 10k Nodes are being hosted in 84 countries.
80. We split each file into 80 different encrypted pieces, and each piece is stored on a different Node.
Nodes are chosen by reputation and local latency. We select reputable Nodes at random, weighted by network diversity, then attempt to upload to a larger set of those selected Nodes. The fastest Nodes from this set are chosen to store files.
When you retrieve an object, only 29 of its 80 pieces are needed to reconstitute that object. With no central point of failure, your data is always quickly available, all over the world.
To retrieve a file, we only need 29 encrypted pieces.
One Node going offline won't impact any files. Our network's automatic repair process reacts when too many pieces for any files are lost, and repairs them within a very healthy margin of safety.
Discover how to practically apply the unique edge-based security and privacy benefits of decentralization to solve real-world problems.Read the Blog
Take a deep dive into the multi-layered encryption and access management capabilities of Storj DCS that deliver a new standard in data security.Read the Tech Brief
If your data isn't there when you need it most, you're out of business. Learn how Storj DCS can ensure on-demand availability of your data.Read the Report