CRYPTYK: Bringing Cloud Security to the Node
Cloud computing has been a mainstay in the technology hub for some time now. It has afforded users the opportunity to save more files without the physical capacity, in an age where the physical capacity to contain such mammoth data is becoming impossible. Cloud Storage has also helped a little with the issue of onsight data theft and breaches, data has become safer in a sense because the so-called data thieves know quite alright that the data are physically not in the owners' hands anymore.
Looking beyond all these advantages that cloud storage has brought we have still not totally solved the issues at hand. With a lot of cloud storage service centers, data theft and breaches have still not reduced it has only wax stronger in other dimensions. And there is a need for our data storage facilities to be moved to more safe hands which is the blockchain. In a need to not only secure our data from theft we also need our data to be secure and private, but we also need it to be “incorruptible” and “unhackable”. If we look at the blockchain network there are only a few services getting this aspect of cloud computing and data storage right. This is where Cryptyk comes in.
What is CRYPTYK?
The Cryptyk platform is a hybrid decentralized data processing platform designed for secure and scalable online storage management, as well as file sharing, document editing, messaging and other cloud applications within businesses, enterprises, government organizations and for individual consumers.
The main proposition of the decentralized technology developed by Cryptyk Inc. is to store data that can not be corrupted and hacked. This project boast of dynamic solutions to these problems and also has an advantage of developing cloud storage market worldwide. There has been a growing demand for data storage from end users and these services will contribute to the efficient operation of this platform. The ecosystem is structured to provide scalable benefits and incentives for all participants to grow the security, integrity, financial competitiveness and performance of Cryptyk technology for the benefit of the CRYPTYK token or CTK value (and hence all its participants).
The Problem CRYPTYK aims to Solve
Businesses and enterprises alike are increasingly pulling their confidential data online via cloud storage vendors. Couple with this, are using online applications that have the majority of its source saved and running on the cloud to create, collect, manage, use and sell information for business management operations. However, the biggest risk, largest cost and major operational concern involved in migrating an enterprise to the cloud is security.
Existing security technologies may act to reduce the risk of security breaches but they do not mitigate the risk entirely. Over time all cloud storage vendors will eventually be compromised, and all information stored by enterprises in the cloud will eventually be exposed to security breaches.
The fundamental weakness of existing cloud storage and enterprise security technologies lies in their centralized design architecture that relies on trusted third-party vendors. Every cloud storage vendor is vulnerable to cyber-security attacks, and once a security breach has been successfully achieved enormous amounts of confidential data can be readily stolen from a centralized network. We can identify the five main security threats to enterprise networks:
- External threats from remotely located syndicated hacker groups.
- Viral threats from malicious software programs such as viruses, malware, and ransomware.
- Operational failure threats and denial of service attacks.
- Internal threats from bad actors, disgruntled employees.
- Surveillance intercept threats or man-in-the-middle attacks.
The Solution
With the use of a decentralized hybrid data processing algorithm, CRYPTYK was able to solve some these fundamental issues. The blockchain is categorized as a ‘hybrid’ because it combines two different decentralized platforms — multi-cloud storage and blockchain auditing.
VAULT
With hacking becoming progressively profitable every week, frequent security breaches are practically unavoidable. With this, Cryptyk has created a decentralized multi-cloud storage platform that is safe-to-hack. This innovation represents a potential paradigm shift for online security.
Now, instead of playing the cat-and-mouse game with hackers who are always one step ahead of the cyber security solutions meant to stop them, Cryptyk turns the game on its head. They assume that it’s just a matter of time before hackers and viral attacks will exploit a vulnerability somewhere.
Rather than trying to prevent the inevitable, they developed a technological process that renders the exploits of security breaches useless.
When a file is uploaded to VAULT, it is automatically divided into multiple encrypted pieces that are stored separately by independent cloud storage providers such as Google Drive, Amazon S3, iCloud, Microsoft Azure, Dropbox, etc. The encryption keys that unlock access to each piece of the file are stored on the user’s own smart devices.
For a hacker to gain access to a single file, they would have to simultaneously break into 3 of the 5 storage providers, discover the uniquely coded hash that links each part of the file, decrypt 6 levels of SHA 256 bit military-grade encryption, and break into the user’s device to decrypt their private key. To put it another way, hacking is neither practical nor viable.
This process reduces the potential attack surface by more than 90%, while still enabling customers to access files with speeds comparable to Google Drive.
SENTRY
VAULT is immune to 3 of the 5 threats to cloud storage: external threats, operational threats, and viral threats. The second part of the Cryptyk hybrid solution, SENTRY, addresses the other two threats.
SENTRY is an auditing platform built on an immutable blockchain. It controls all user access to the Cryptyk platform and tracks file sharing and communications. Through continuous AI monitoring of the blockchain, Cryptyk is also able to counter internal security and surveillance threats — combining with VAULT to address all 5 of the major vulnerabilities of centralized platforms.
The CRYPTYK ecosystem incentivizes enterprise customers with a complete security solution, simpler deployment, easier management, and lower overall costs. The platform addresses the security problem at the fundamental data storage level itself, thereby not requiring the complex, piecemeal, afterthought approaches of conventional security and storage solutions.
The ecosystem further incentivizes the processing of information for CRYPTYK token participants (or CTK miners) with rewards for verifying user ID, file uploads, file sharing, data integrity, and secure user access sessions. It also incentivizes the open-source development of future platform features and encourages rapid trial and adoption by all customers. In terms of architecture, the hybrid platform consists of three different but complimentary decentralized platforms integrated with a security engine and user-interface to form a complete security and storage solution.
Token
The token to be utilized on the framework is the CTK token. In contrast to bitcoin (that automatically has an ever-decreasing amount of coins released into the ecosystem subject to its mining protocol), the Cryptyk Foundation can manually increase or decrease the rate of release of tokens to customers, developers, and miners dependent upon current market conditions and ecosystem valuation. This will act to counter or minimize spurious market fluctuations and large price spikes in CTK value as a result of speculative investors or bad actors.
TOKEN SALE: 26 SEP 2018 — 31 OCT 2018
- Ticker: CTK
- Token type: ERC20
- ICO Token Price: 1 CTK = 0.13 USD
- Fundraising Goal: 25,000,000 USD
- Sold on presale: 7,033,120 USD (% BONUS)
- Total Tokens: 750,000,000
- Available for Token Sale: 33,3%