Hivenet owes its efficiency, reliability, and robustness to an intricate distributed and sustainable cloud.
Hivenet works on our proprietary distributed cloud infrastructure.
It brings together individual devices of community members, who contribute their storage space to create a secure and resilient network.
This network forms the backbone of all our services from cloud storage to computing, enabling us to provide our users with an affordable, efficient, sustainable, and highly private and secure cloud solution.
All major cloud companies rely on huge data centers running 24/7. Our cloud is different - it uses hard drives of computers like yours so it doesn’t use any extra energy.
Simple on the outside, complex on the inside. There is a lot of “magic” happening to keep your data private, safe, and ready to use.
1
Uploading and preparing your data
This is where your data gets split, encrypted, and encoded, ready for storage on Hivenet.
Chunk
Before the upload, your data is divided into manageable pieces, known as "chunks".
Compression and encryption
Each chunk is compressed using the zlib algorithm to minimize its size. Then we apply client-side encryption to ensure that no one, including Hivenet, can access your data. We use AES-GCM with a 256-bit key, which is considered quantum-safe.
Sharding and encoding
After encryption, chunks are further divided into shards and encoded using erasure codes (specifically, Reed-Solomon codes), resulting in additional shards.
This encoding allows for the retrieval of the original data with only 50% of available shards.
2
Storing and maintaining your data
Here's how we choose where to store your data and what we do to ensure it stays safe and accessible.
Node selection and dissemination
Hivenet selects the most suitable nodes based on reliability, capacity, performance, and location to host your data shards. The chosen shards are then uploaded to these nodes.
Monitoring and healing
Hivenet continually monitors the network to ensure data availability, even when nodes disappear. It tracks the redundancy ratio of your data (the total number of available shards divided by the number of shards required to reconstruct your data).
If the redundancy level falls below a safety threshold, the network triggers a swarm healing process to regenerate new shards, maintaining the desired redundancy ratio.
3
Retrieving your data
When you need your data back, this process ensures that you can download, decode, and decrypt your data.
Downloading and decoding
To retrieve your data, Hivenet downloads the minimum subset of shards needed to decode the chunks. The decoding process generates encrypted and compressed chunks.
Decryption and reconstruction
After retrieving the encryption keys from the network, the chunks are decrypted. This process is zero-knowledge and happens only on your device, ensuring your data's security. Following decryption, your data is reconstructed.
Secure and sustainable cloud storage
Hivenet transforms unused digital space on various devices into a secure storage haven for data, spread securely across the globe.
Scalable and reliable cloud computing
From data analysis to complex calculations and GenAI, Hivenet taps into the distributed power of our cloud, offering businesses unparalleled processing capabilities.