Yotta enterprise cloud disk has the patent of Truprivacy data encryption in document encryption and storage, even the cloud administrator can't obtain user data, which effectively prevents cloud disk data from leaking, supports real-time backup of user data, and protects enterprise data security. Cloud disk does not store plaintext keys, even if it breaks through the database, it is invalid. Every file is encrypted, and each user's file key is different. After encryption, it is still repeated. This not only saves time, but also saves costs. Encryption can be done locally, and the system administrator can only maintain the system and personnel, and cannot view the contents of files stored in the system.
Two. Document permission control
This is mainly achieved through authority control management. For example, we control the access rights of documents and effectively control the coverage of documents. It can further enhance the security of files and protect them. When users share and * * * enjoy files, they can choose roles for the objects that * * * enjoys. Then control access to files. Role permissions are uniformly configured by the administrator, and multiple roles can be selected. The cloud disk system log will completely record the user's operation process of the file and keep the complete file life cycle. Record the administrator's operation on the system in detail, and it is not allowed to delete or modify the log, which is convenient for monitoring and auditing.
Three. Document security protection
Delete protected and shared people. When deleting a file, the file will automatically enter the recycle bin of the sharer, so as to protect the loss and safety of the file. After the files in the enterprise space are deleted, they will automatically enter the recycle bin of the enterprise administrator, and will not be directly deleted by employees, thus protecting the enterprise. Watermark protection, when previewing a document, automatically adding a watermark to the current document with the current user name, user name and time as data, and taking photos, downloading and taking screenshots for malicious dissemination will be condemned. External chain protection, real-time statistics system external chain documents, strictly control the security of external chain documents, to prevent the disclosure of company secrets.
Yottachain block linked storage, storage is completely decentralized, and there is no risk of data being controlled and analyzed. The public chain adopts semi-centralized mechanism, and the transaction vouchers can be checked at any time. The governance structure of transaction data winding, anti-counterfeiting, non-tampering, traceability and decentralization is the foundation of everything. Adopt the constitution and membership system, and abide by the creed that "laws are implemented by codes". Fundamentally ensure that everything is decentralized and the data is controlled by the owner and the owner.