Use of distributed ledger technology
Security and confidentiality
- High fault tolerance due to no single point of failure
- Confidentiality: only addresses (wallets) are used for verification
- Timestamps can be used to prove copyright or ownership
Monitored by Web Shield for IP and BRAM violations
Top 400 Most Visited Websites in Asia
Over 20 PB of storage capacity
40M visits per month
Contractors make an insurance deposit
Customer sends a storage request specifying file size, storage period and other terms (e.g. download fee)
Contractors (Hosts) make their offers
The system forms a list of the best offers
Customer chooses a Host (or several) based on rates and prices and proceeds with the payment
Host sees the payment transaction and sends a URL for file upload
Customer uploads the file; the file is split into chunks, encrypted with the private key and sent to the Host’s servers
Customer or someone they grant access to downloads the file using the public key
Gets supersafe and affordable data storage and transmission
is rewarded for data storage and gets a possibility to utilize unused disc space
is remunerated for verifying transactions and forging blocks
gets a reward for data transmission
Secure international transactions with remote payment
Backups for businesses made by professionals at the best suitable price
Transfer photos, videos and other materials with proof of copyright
Deliver new film prints to cinemas in a flash without data leakage or extra costs incurred
Distribute your authentic content seamlessly without intermediaries: artists upload their works, set a fee and share the download link with the audience
Centralized data storage services are reliable, but insecure, as there’s a possibility of data scanning. Data leaks and theft with centralized silos are not rare.
Decentralized storage services solve the problem of insecurity due to use of blockchain technology. However, they rely on a network of consumer devices that are simply not adjusted to high load and 24/7 work. This may result in data corruption and loss.
Market.space empowers the customer to choose everything – from the host, number of backups and parts the file is split into to the types of encryption used.
Engagement of professional hosting providers renders Market.space a completely reliable service granting you instant and round-the-clock data access. Use of blockchain technology underpins confidentiality and security.
But for the traditional data storage and transmission, Market.space can be used for confirmation of transactions (document signature time) and proof of ownership. Our system can simplify and expedite the defense of patents, trademarks and intellectual property rights.
Market.space is ideal for direct distribution of the authored content as it enables secure and seamless delivery of audio, video, etc. from artists to their audience. in case of attacks. DLT also enables using addresses (wallets) for verification in order to bypass the proof of identity and maintain anonymity of the participants. Timestamps may serve for defense of intellectual property rights or as a proof of ownership.