• Challenging centralized storage with blockchain-technology

Storing data in the cloud is contemporarily used by enterprise more than ever. The cloud data storage model helps save thousands of dollars in IT investments while being easy-to-use and remotely accessible. However, using the cloud comes with an inherent security risk. The primary issue is that control of data privacy is moved to a third-party environment which must be trusted with sensitive data. Data leakage and mishandled data management are serious enterprise concerns and the security model of popular data storage solutions on the market, offered by globally reputed organizations that require the enterprise to trust an organization to be working in their best interest.

The use of distributed ledger technologies such as the Hyperledger Fabric framework has security as its greatest advantage. It provides an access-control layer to improve the security of an underlying blockchain.

Blockchain technology at its core works by keeping a record of activities happening on a network utilizing transactions. The transactions are sequenced into blocks forming a structured ledger that details and tracks every activity taking place on the network. Strong encryption algorithms are used to ensure that transactions are immutable once added to the network. The access-control layer provided by Hyperledger Fabric improves security by allowing transactions and network identities to be configured as desired. This type of blockchain implementation is therefore perfectly suitable for enterprise usage or authorities, who wish to enjoy fine-grained permissions and eliminate the need for trust in a centralized cloud environment.

Rebuilding secure data storage using blockchain

Card image cap
Card image cap
Immutable data persistence and trustless nature.

Blockchain technology at its core works by keeping a record of activities happening on a network by means of transactions. The transactions are sequenced into blocks forming a structured ledger that details and tracks every activity taking place on the network

Client-side (e2ee) data encryption:

Online privacy is slowly fading away and it is becoming more difficult to control. Delta/NET values online privacy which is why the product aims to offer different levels of security. One of such, includes zero-knowledge client-side encryption which ensures that stored files, only are viewable on the client side of the exchange. As a result, unauthorised data discovery by DeltaNet as a service provider or any associated 3rd-parties becomes impossible since only the communicating entities are capable of decrypting the content of the shared files.

Double Encryption:

Delta/NET uses strong encryption to secure communication channels. Once uploaded, then the files are transmitted through the network route via a protected channel by means of TLS. At rest the data is encrypted using AES256-GCM and at flight it is protected by well-known libraries such as OpenSSL. Contrary to a majority of popular cloud storage providers, DeltaNet seeks to implement double encryption by client-side encrypting files and this results in an additional layer of security.

Programmable enterprise integration:

Delta/NET takes the complex contemporary business landscape and associated requirements and regulations into consideration. As a result, its customers can seamlessly turn business processes or logic into storage protocols with high accuracy by means of using programmable smart contracts and chain-code packages. DeltaNet essentially brings interoperable opportunities for enterprises and governments to seamlessly integrate with their secure data storage needs in a flexible way.

Permissioned identity-based file-sharing:

Unlike many other secure data storage providers, DeltaNet knows the importance of verifiable identity management and its a core feature of the platform. Its permissioned membership-based Identity management service is part of a system which includes a two-tiered PKI with compartmentalised user registries and Hyperledger Fabric services to bring nonpareil control over authentication and permission levels.

Immutable data persistence:

Delta/NET reduces trust issues and provides verifiable organisational auditability. Its backbone consist of Hyperledger Fabric which stores network-related activities in the form of transactions and then couples them into immutable sequences of records, a process which forms a transparent verifiable audit trail of data related to network activities. Based on the former, it takes file versioning and auditability to a whole new level of verbosity and transparency.

Immutable data storage:

As organisations become more digitalised, it is evident that efficient file management requires flexibility and fine-grained customisation. Among other features, Delta/NET will offer immutable data folders meaning that any data stored inside of such a folder is unmodifiable for a certain length of time or forever. This feature protects against malicious destruction or alteration which are the most common data loss risks as of today. Using an immutable folder will, therefore, protect against risks such as human error or sabotage, system bugs, and malware such as ransomware.

Fault tolerant data storage/replication

Delta/NET strives to provide high availability of file storage by means of efficient storage and fault tolerance management. It achieves the former by encrypting (if the file is large, it will shard it first) files and by using an IPFS cluster to orchestrate replication, distribution and tracking for file retrieval. In the future, it aims to use erasure codes to efficiently split up files and encode them to several files with the intention of improving storage efficiency and mitigating file corruption, while preserving high availability. In the future, Delta/Net aims to implement convergent cryptography to reduce file duplication and improve storage house-keeping.

Privacy-preserving data partitioning:

Delta/NET is aware of the increasing importance of customer privacy with respect to regulations on confidentiality of data, protection laws or similar. It takes advantage of Hyperledger Fabric channels to offer controllable data partitioning which allows customers to manage organisational privacy levels as needed.

Interoperable pluggability:

Delta/NET takes middleware dependancy into consideration and is based on a highly modular architecture. Hyperledger Fabric is used as a backbone to its operational state and unlike other solutions in the industry, it allows for customised plug-ability and interoperability with 3rd-party dependencies or middleware as desired.


Security threats can rise from various attack surfaces, a large one is from the device itself, especially in a growing BYOD culture. The antivirus feature will scan files during the upload, in advance of encryption, to avoid infections and prevent financial damage or similar.

ClamAV will be integrated into the file upload process and it comes with different options to choose from in terms of runtime mode. it is an open source tool that synergises tremendously well with Delta/Net and it prevents backdoors from being injected into innocent file uploads before it is too late.

Powerful API

Coming soon…

Powerful Dashboard

Coming soon…

1. Upload a file

2. Sharding of a file


3. Distributing to Cluster

4. Distributing to Nodes

The Blockchain

5. Retrieving files

6. Locating parent hash

7. Packaging the file


Contact Us

Let’s talk data security

  • Your personal data will be processed by JS Security according to our Privacy and Cookies Policy. We respect your personal data and guarantee it’s safety.

JS Security HQ
  • Birger Jarlsgatan 18
  • 114 34, Stockholm
  • Sverige
JS Security Dev Center
  • Brogatan 9
  • 252 6, Helsingborg
  • Sverige