Distributed Data Management

PrivacyChain has built a Distributed Data Management System (DDMS) that reverses traditional thinking on how data should be stored, secured and managed. The PrivacyChain DDMS enables new classes of applications that take advantage of a distributed data architecture that stores, secures and controls data where it is needed.

PrivacyChain’s distributed data architecture enables any type of data to be stored, secured and managed across distributed devices and removes much of the infrastructure and resources required to store data centrally.

PrivacyChain attaches security and control to each individual data record (e.g., a single document, video, employee profile, sensor stream, x-ray, source code file, email). Each record is individually encrypted with its own unique key. This bottoms up approach enables direct, precise, targeted and persistent security and control to be enforced on each data record.

How does PrivacyChain DDMS work ?

PrivacyChain ingests and stores each individual data record as follows:

DATA INGESTION

Presentation objects are created for each system or application attached to PrivacyChain. The Presentation object is used to remove the record formatting and each record is stored in a generic format, together with its metadata. The generic record and its metadata are stored together as a unique data object.

Each record is imported in its native format. There is no ETL or similar process required.

Rules Objects contain the business logic, access, usage, ownership rights, etc. associated with a record or class of records.

The record is separately encrypted with its own unique key. Metadata can also be encrypted, depending on security requirements for that record.

DATA INGESTION

Presentation objects are created for each system or application attached to PrivacyChain. The Presentation object is used to remove the record formatting and each record is stored in a generic format, together with its metadata. The generic record and its metadata are stored together as a unique data object.

Each record is imported in its native format. There is no ETL or similar process required.

Rules Objects contain the business logic, access, usage, ownership rights, etc. associated with a record or class of records.

The record is separately encrypted with its own unique key. Metadata can also be encrypted, depending on security requirements for that record.

DATA INGESTION

Presentation objects are created for each system or application attached to PrivacyChain. The Presentation object is used to remove the record formatting and each record is stored in a generic format, together with its metadata. The generic record and its metadata are stored together as a unique data object.

Each record is imported in its native format. There is no ETL or similar process required.

Rules Objects contain the business logic, access, usage, ownership rights, etc. associated with a record or class of records.

The record is separately encrypted with its own unique key. Metadata can also be encrypted, depending on security requirements for that record.

DATA INGESTION

Presentation objects are created for each system or application attached to PrivacyChain. The Presentation object is used to remove the record formatting and each record is stored in a generic format, together with its metadata. The generic record and its metadata are stored together as a unique data object.

Each record is imported in its native format. There is no ETL or similar process required.

Rules Objects contain the business logic, access, usage, ownership rights, etc. associated with a record or class of records.

The record is separately encrypted with its own unique key. Metadata can also be encrypted, depending on security requirements for that record.

MICRO BLOCKCHAIN’S

Smart Contracts (added to a record's blockchain) can also be used to enforce transactions such as commercial arrangements.

PrivacyChain does not use tokens enabling each "micro" blockchain to be deployed for a single record. This unique approach means that PrivacyChain avoids the heavy lift associated with single chain implementations

MICRO BLOCKCHAIN’S

Smart Contracts (added to a record's blockchain) can also be used to enforce transactions such as commercial arrangements.

PrivacyChain does not use tokens enabling each "micro" blockchain to be deployed for a single record. This unique approach means that PrivacyChain avoids the heavy lift associated with single chain implementations

MICRO BLOCKCHAIN’S

Smart Contracts (added to a record's blockchain) can also be used to enforce transactions such as commercial arrangements.

PrivacyChain does not use tokens enabling each "micro" blockchain to be deployed for a single record. This unique approach means that PrivacyChain avoids the heavy lift associated with single chain implementations

MICRO BLOCKCHAIN’S

Smart Contracts (added to a record's blockchain) can also be used to enforce transactions such as commercial arrangements.

PrivacyChain does not use tokens enabling each "micro" blockchain to be deployed for a single record. This unique approach means that PrivacyChain avoids the heavy lift associated with single chain implementations

DISTRIBUTED STORAGE

Data objects are stored wherever there is available and authorized storage space on any accessible and authorized device.

Performance is automatically managed based upon demand. A business rule can direct an object to clone, based on demand, and to split traffic between the record and its clone. Clones can be distributed across the universe of devices to meet demand (and to increase data resilience).

Security and Control remain with a record throughout it’s life, no matter it’s location or state (in transit, at rest and in-use)

DISTRIBUTED STORAGE

Data objects are stored wherever there is available and authorized storage space on any accessible and authorized device.

Performance is automatically managed based upon demand. A business rule can direct an object to clone, based on demand, and to split traffic between the record and its clone. Clones can be distributed across the universe of devices to meet demand (and to increase data resilience).

Security and Control remain with a record throughout it’s life, no matter it’s location or state (in transit, at rest and in-use)

DISTRIBUTED STORAGE

Data objects are stored wherever there is available and authorized storage space on any accessible and authorized device.

Performance is automatically managed based upon demand. A business rule can direct an object to clone, based on demand, and to split traffic between the record and its clone. Clones can be distributed across the universe of devices to meet demand (and to increase data resilience).

Security and Control remain with a record throughout it’s life, no matter it’s location or state (in transit, at rest and in-use)

DISTRIBUTED STORAGE

Data objects are stored wherever there is available and authorized storage space on any accessible and authorized device.

Performance is automatically managed based upon demand. A business rule can direct an object to clone, based on demand, and to split traffic between the record and its clone. Clones can be distributed across the universe of devices to meet demand (and to increase data resilience).

Security and Control remain with a record throughout it’s life, no matter it’s location or state (in transit, at rest and in-use)

DATA ACCESS

Each record can be directly findable through its exposed metadata. PrivacyChain uses abstraction objects and a process that works like Secure DNS for Data to locate records in response to a query. PrivacyChain will automatically deliver the record / clone that is located nearest the request origin.

PrivacyChain will check the rights and privileges of the requestor against the requirements for the data record requested.

Data relationships are established in real time, in response to a query. No predefined hierarchies or data relationships are required, minimizing much of the activity and effort traditionally carried out under Master Data Management

DATA ACCESS

Each record can be directly findable through its exposed metadata. PrivacyChain uses abstraction objects and a process that works like Secure DNS for Data to locate records in response to a query. PrivacyChain will automatically deliver the record / clone that is located nearest the request origin.

PrivacyChain will check the rights and privileges of the requestor against the requirements for the data record requested.

Data relationships are established in real time, in response to a query. No predefined hierarchies or data relationships are required, minimizing much of the activity and effort traditionally carried out under Master Data Management

DATA ACCESS

Each record can be directly findable through its exposed metadata. PrivacyChain uses abstraction objects and a process that works like Secure DNS for Data to locate records in response to a query. PrivacyChain will automatically deliver the record / clone that is located nearest the request origin.

PrivacyChain will check the rights and privileges of the requestor against the requirements for the data record requested.

Data relationships are established in real time, in response to a query. No predefined hierarchies or data relationships are required, minimizing much of the activity and effort traditionally carried out under Master Data Management

DATA ACCESS

Each record can be directly findable through its exposed metadata. PrivacyChain uses abstraction objects and a process that works like Secure DNS for Data to locate records in response to a query. PrivacyChain will automatically deliver the record / clone that is located nearest the request origin.

PrivacyChain will check the rights and privileges of the requestor against the requirements for the data record requested.

Data relationships are established in real time, in response to a query. No predefined hierarchies or data relationships are required, minimizing much of the activity and effort traditionally carried out under Master Data Management

Diagram : Data Flow

Diagram : Data Flow

PrivacyChain Use Case Examples

Learn More

Copyright@2023 Privacy Chain LLC. All Rights Reserved

Copyright@2023 Privacy Chain LLC.

All Rights Reserved

Copyright@2023 Privacy Chain LLC.

All Rights Reserved