Header Ads

ad

IDM - A Highly Secure Digital Data Storage Service

IDM - A Highly Secure Digital Data Storage Service



Current trends and issues associated with cloud data storage


The 21st century is the age of information. More and more data are generated on the daily basis creating an ever-increasing demand for storage space. Not every home computer, let alone a mobile device, can store all its own generated data. The capacity of the built-in memory is growing along with requirements for data safety.  The increased volume of generated data proportionally increases the number of potential threats to the storage of this data.

With the growth in the number of devices, cloud storage services are becoming increasingly important. Many cloud storage providers promise fast, reliable and convenient services. However, the reality is a bit more complicated.

Description of IDM Service


IDM has its own patented data protection technology called SIZE and now is preparing to launch a new service - a global decentralized ecosystem that connects users who want to store information safely and miners who provide memory on their devices to generate revenue

IDM can successfully compete with all cloud data storage services, as we offer following exclusive features:
  • Safest Storage System
  • Competitive Price
  • Unparalleled level of protection across the market
  • Comprehensive Marketing Strategy
  • Legal guarantee of data security

Our patented technology has the following features:

  • Highest level of data protection - the absolute cypher, the “one-time notepad” principle and the post-quantum level of protection;
  • No “back-door” - the working principle of the system does not permit creation of a functional backdoor;
  • System configuration does not permit a successful (MiTM) hacker attack;
  • Service doesn’t operate via DNS servers;
  • No metadata collection - all metadata is generated and stored only on users’ computers and is never transmitted over the Internet;
  • Independent metadata management allows users to manage, protect and search within the stored information;
  • Fully protected personal communication channel based on our own technology;
  • Possibility for full recovery of a file even if the 98% of stored data has been lost;
  • Automatic recovery and replication of information from unreliable storage nodes, preventing reliability of stored information falling to a critical level where recovery is impossible;
  • Inherent scalability. The ecosystem is easily scalable, depending on the number of active storage nodes;
  • Non-susceptibility to a risk of massive rolling disconnections of storage nodes in countries and on entire continents, which may happen due to natural disasters, power outages, enforcement of bans by governments or other competent authorities, due to the distribution of converted data for storage across all continents and throughout the world;
  • Full autonomy of the ecosystem: the monitoring of storage nodes, the quality of individual nodes, their reputation and distribution of data is performed by the SIZE algorithm, whereas all settlements with users and miners are administered via blockchain;
  • Revenue. Generation of revenue from leasing unused memory on mobile or home devices;
  • Second life of memory, provision for using obsolete and no longer used devices;

Prerequisites for creating the IDM Service

With a rapid growth in volume of stored and transmitted information the cloud services are becoming increasingly popular. The amount of storage space grows every year. At the same time, the number of hacker attacks is also growing. As a result, users tend to value security more than the costs when choosing a cloud storage.

  1. Disconnection of storage servers as the result of hacker attacks, decisions made by companies, decisions made by legal and government bodies, etc.
  2. Blocking of a specific client, a decision made by the company, state or legal body, etc.
  3. Unauthorized access to stored information that is owned by the client, company, or company employee
  4. Hacking into global storage servers like iCloud (Apple), Xbox Live, etc.
  5. The number of hacked cloud services is growing every year by nearly 50%.
  6. 80% of users are not ready to share confidential personal data on cloud services.

Market Analysis

Volume of Cloud Storage Market ( 2012 to 2020 ) 

  • According to IBM, every day we generate 2.5 quintillion bytes of data. As much as 90% of the data in the world was generated only in the last two years. It is expected that in the period from 2012 to 2020 the total amount of all data volume in the US will be between 898 exabytes and 6.6 zettabytes, raising by more than 25% per year, meaning, it will double every three years.
  • According to DEAC, a well-known data center operator in Europe, the volume of business data in the world is doubling every 1.2 years. By 2020, every person will generate 1.7 Mb/sec.
  • According to a forecast made by Gartner, the world market for public cloud services is projected to grow to $287,820 billion in 2018 compared to the $246,821 billion in 2017.
  • The market for cloud applications (software as a service SaaS) is expected to grow by 14.2% in 2018
Volume of Cybersecurity Market

The cybersecurity market will grow from $95.6 billion dollars in 2014 to $155.74 billion by 2019 at an average growth rate (CAGR) of 10.3%. North America is expected to become the largest market according to the report.
The Market of Cybersecurity: Global forecasts, Forecasts, and Analysis (2014-2019)

 Data Storage Problems and Our Unique Solutions

Problems
  • Data theft and hacking into personal information
  • Loss of Data;
  • Loss of Control;
Problem Solutions SIZE Technology

    • SIZE provides post-quantum level of protection.
    • SIZE does not permit a creation of functional backdoors.
    • SIZE cannot be decrypted by spyware.
    • SIZE is completely insusceptible to transmission errors. The entire file can be safely recovered even if the transmitted message has been corrupted.
    • Using SIZE frees up a lot of bandwidth.
    • SIZE does not require powerful computing resources.
    • Temporary files created by the SIZE encryption protocol are stored in operating memory and are immediately deleted upon completion of a programmable action.
    • User’s exclusive control over own Metadata.

    ICO And TOKEN Distribution

    • Name of the token (ticker): IDM
    • Full name: Ideal Digital Memory
    • Token price: Preliminary price 0.01 ETH. It may change with ETH rate
    • Based on: Ethereum (ERC-20) - burnable
    • Divider (the number of digits after a comma): 18
    • Total number of emitted tokens: Mintable, at purchase
    • Minimum investment: 0.1 ETH
    • Emission: One-time only
    Token distribution:
    • Founders: 33,00%
    • Developers: 5,00%
    • Bounty: 2,00%
    • For sale: 60,00%
    ICO:
    • Date: Launch on May 15, 2 months
    • Accepted currency: ETH
    • Duration: 2 months
    • Investment bonus: 10-50k$ + 3%, 50-100k$ +5%, 100k$+ +7% 
    Time bonus:
    • Day 1 - 14: 20,00%
    • Day 15 - 28: 15,00%
    • Day 29 - 42: 10,00%
    • Day 43+: 5,00%
    • Softcap: $3 000 000
    • Hardcap: $27 000 000
    • Referral program: 3% inviter/ 2% inv
    Closing:
    • The number of tokens: Any
    • Total hardcap: $27 000 000/ exact amount in ETH is calculated before the launch
    • Remaining tokens: Minted for the founders/developers/bounty after the ICO
    • Investment bonus: 10-50k$ + 3%, 50-100k$ +5%, 100k$+ +7%

    ROADMAP

      • 2010 - The SIZE algorithm was successfully tested on CamGrid network at the Cavendish Laboratory at the University of Cambridge in the United Kingdom.
      • 2012 – Foundation of Equivalence AG
      • 2014 - An ultra-secure file-sharing program based on SIZE technology was introduced at "Hack in Paris" where the global hacker community tried to crack the algorithm without success.
      • 2015 - The launch of a publicly available version of the BoobookBox for business and private users.
      • March 2018 - Technology has been successfully tested in European cybersecurity laboratories.
      • April 2018 - ICO for the global decentralized ultra-secure storage service IDM
      • 2019 – Launch of IDM service
      • 2019 - Development of the cloud blockchain platform (SaaS) based on SIZE data protection technology
      • 2019 - 2020 - Implementation of a marketing strategy for the promotion of the IDM service and SIZE technology
      • 2020 - 2022 - Development of a decentralized and distributed cloud platform (PaaS)


      TEAM And ADVISORS



      For More Information

      BTT profile: moetimas

      Tidak ada komentar