Consistency

Using multiple user servers for storage introduces a decentralized approach to data storage and security. This model enhances the distribution of data loss risk, ensuring that even if data is lost on several servers, Enerzion can recover it using the ENR algorithm.

However, like all data storage and security models, vulnerabilities exist, and Enerzion's decentralized approach is no exception. This approach aims to balance three critical aspects often referred to as the trilemma triangle: scalability, decentralization, and privacy.

  • Scalability: Theoretically, the number of subfiles into which data can be divided is infinite. Increasing the number of child files decreases the likelihood of losing the original file. However, excessively splitting files can lead to wasteful resource use, as each subfile incurs infrastructure and labor costs. Therefore, it’s crucial to find a balance between the number of subfiles created for security purposes and the associated storage costs.

  • Decentralization: Enerzion's system fragments the output data and distributes it to individual users. Each user is responsible for storing just one subfile from a larger file. This method ensures the decentralization of data storage. Nevertheless, scenarios where users create multiple accounts to store several subfiles from the same file are possible. We acknowledge this and will address it more thoroughly in a subsequent section.

  • Privacy: Fundamentally, downloaders do not know the format or content of the original file because the Splitted File (SF) they download is just a small, encrypted piece of the original. To prevent scenarios akin to a "51% attack," each SF is uniquely identified. This identifier is linked to the downloader’s information, including the wallet address owning the NFT, device ID, and file identifier. The system verifies this information to ensure each user is unique when downloading files and to maintain the accuracy of the SF when retrieval is requested.

By addressing these elements, Enerzion seeks to optimize the balance between scalability, decentralization, and privacy, enhancing the overall effectiveness and security of the data storage system.

Last updated