5ire’s Data Storage Process and Security

5ireChain
2 min readJul 20, 2022

--

5ire Data Storage is a decentralized, distributed, data storage solution that relies on the Interplanetary File System (IPFS) to store files securely. Security is built into the storage process, with user-end encryption creating discrete 5MB “flickers” using Threefish block ciphers.

Encryption Methodology

On 5ireChain, data is always encrypted on the user side, which enhances security as no naked data is traveling across the network or is held on 5ireChain. We use the Threefish data encryption model that uses a 1024-bit key that avoids cache timing attacks by circumventing reliance on S-boxes or other table lookups, and it is virtually impossible to break but is also quantum-safe. We anticipate that quantum computing will be developed to a point in the near future where 5ireChain will need to be secure against attacks on traditional computing models and on quantum models. With that in mind, we review our security models against both current and future scenarios.

5ire’s Data Storage Process

The 5ire data storage process is cognizant of the users’ data security and splits, encrypts, and stores data through a rigorously secure process. The process contains the following steps, all performed on the user side: 1) Initially the data is split into 50MB chunks. 2) These chunks are then repeatedly

replicated to create redundancy. 3) The 50MB chunks are further split into ten 5MB flickers to prepare the data for encryption and upload. 4) Each 5MB flicker is put through a 1024-bit Threefish encryption algorithm. These encrypted figures are then uploaded to the 5ire IPFS server.

Redundancy

Every data storage system, whether encrypted or not, has a tendency for corruption. To counter this potential data loss, cloud storage providers replicate data using various methodologies to secure against corruption and loss. The replication process serves the dual purpose of stronger encryption as well as redundancy. The stronger encryption is met via the replication process as each replicated portion is encrypted separately. While redundancy is resource-heavy, the payoff for secure and uncorrupted redundant data is worth the cost of resources. Additionally, 5ireChain’s nested block model relieves some of the costs traditionally associated with redundancy as blocks are working in concert with each other.

Using robust encryption and redundancy, 5ire offers a secure and failsafe data storage system built to withstand future quantum computing and scaling.

More information about 5ireChain can be found by clicking on the following links:

Website: https://5ire.org

White paper: https://bit.ly/3Qcsmor

LinkedIn: https://www.linkedin.com/company/5ireChain

Twitter: https://twitter.com/5irechain

Discord: http://discord.gg/5ire

Telegram: https://t.me/OfficialFireChain

--

--

5ireChain

5ireChain — www.5ire.org | Layer-1 EVM Compatible Smart Contract Platform | In Consensus Sustainability