Future of Data: IOVO Proposal
Today we are living in a world that data comes important in our daily lives. Data is growing and growing every day that we expected with the help of the technology. Data is everywhere, file sharing is easier with the help of the internet, we can send an email with the blink of an eye and also we can transfer data or information where ever you are.
Brief History of the internet
The Internet history is started in the year 1957 in when US founded the Defence Advance Research Project Agency (https://www.darpa.mil/)(DARPA) and the creation of the ARPANET (https://en.wikipedia.org/wiki/ARPANET)network. Further more three other concepts develop which are the fundamental history of the Internet, the Military Network concept of the RAND company (https://en.wikipedia.org/wiki/RAND_Corporation) from the US, the commercial network of National Physics Laboratory (https://en.wikipedia.org/wiki/National_Physical_Laboratory_%28United_Kingdom%29)(NPL) in England, and the Scientific network of CYCLADES in France. With this four concepts, this is the foundation of our modern internet that we using today. CYCLADES (https://en.wikipedia.org/wiki/Cyclades)is a well-funded network than the ARPANET and also focussed in the communication of the other’s network so the term INTERNET born.
(https://images.unsplash.com/photo-1532339848923-c4beffa7abcb?ixlib=rb-0.3.5&s=b4d0acf1996cf551c917ce56dec831a8&auto=format&fit=crop&w=750&q=80)
In 1989 it was the creation of the World Wide Web by the English scientist Tim Berners-Lee (https://en.wikipedia.org/wiki/Tim_Berners-Leel), at that time Tim Berners-Lee working in the National Physics Laboratory. In 1990 Tim Berners-Lee released the first web browser and the very first website was online. In 1992 TCP/IP protocol (https://searchnetworking.techtarget.com/definition/TCP-IP)was standardized by the International Organizations of Standardization to standardized the networks from its ends and the channel division into separate layers. TCP/IP protocol is a standard which guaranteed compatibility between networks and finally merged them, creating the internet. And also on February 28, 1990, the ARPANET was removed but the internet up and running.
Term: BIG DATA
(http://clairvoyantsoft.com/assets/img/cv/big-data/big-data-graphic-transparent.png)
With the creation of the internet, data is likely to explode as more and more devices are connected to the internet. In 2005 Roger Mougalas (https://datasciencebe.com/tag/roger-magoulas/) from O’Reilly Media use the term Big Data for the first time, Big data (https://en.wikipedia.org/wiki/Big_data) is refers to a large set of data that is almost impossible to manage and process using traditional business intelligence tools. In 2010, Eric Schmidt (https://en.wikipedia.org/wiki/Eric_Schmidt) speaks at the Techonomy conference in Lake Tahoe in California and he stated that “there were 5 exabytes of information created by the entire world between the dawn of civilization and 2003. Now that same amount is created every two days.”
Data Breach short list
We are now facing the biggest issues ; how and where to store data in a safe and secure mannered. Even some popular and secured company can be compromised , some examples of this below :
In 2011 , Sony PlayStation network breached (https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/), hackers saw the 77 millions of customers record including a small number revealing credit card numbers. Also company system down for 23 days this is the first big data breach to affect people across the globe. Sony okay for £250,000 fine by the British information Commission.
(https://cdn-images-1.medium.com/max/800/1*M-HZRfKOeiPmYNQcb7TCjw.jpeg)
In 2012, Brighton and Sussex University Hospitals NHS Trust data breached (https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/), over thousands of their patient’s data sold on the internet (eBay). Brighton and Sussex University Hospital NHS Trust okay for fine worth £325,000 by the Information Commission.
In 2013, 1 Billion of Yahoo users affected during the data breached attack (https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/) and the Yahoo facing numerous lawsuits after being criticized for not disclosing this information sooner, impacting its sale to Verizon. Also in 2014 Yahoo encountered again a data breached resulting of 500 Million users data affected.
In 2017, UBER hack that affected over 57 million customers and drivers worldwide (https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/) and 2.7 million users in the UK. UBER paid $100,000 the hacker to delete the data that he stoled from their company.
And lastly this year (2018), Over 90 Million of Facebook users account data compromised (https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/) during the Facebook security breached happen in this last September.
A decentralized database ecosystem is a solution
Some startups offering a solution into this problem ( where and how we secure our data?) one of this is IOVO. IOVO (http://www.iovo.io/) means Internet of Value Omniledger, the term of Omniledger refers to IOVO’s status as a “ledger of ledgers, a universal global database network acting as a base layer for different decentralized social and commercial applications.
(https://cdn-images-1.medium.com/max/800/1*oRpvzyfGKe3NrruRUSxeLw.jpeg)
IOVO (http://www.iovo.io/) is a decentralized database ecosystem that every user’s gain back the ownership of their data and power over data and its monetization to those whose lives generate it. IOVO is a Directed Acyclic Graph (https://www.techopedia.com/definition/5739/directed-acyclic-graph-dag) (DAG) that primary functions are to collect, store, and secure user data shared with applications built upon the IOVO DAG. IOVO team believed that the Directed Acyclic Graph which can replace the Blockchain, DAG offered a better scalability than the blockchain and hardly secured than the blockchain. IOVO also allow users to monetize their data to some companies.
Every data in IOVO is encrypted using public-key encryption algorithms, only the holder of a private key that decrypt the encrypted data, and no one can forge their signature. Also, IOVO is a quantum resistant, no quantum attack can affect the IOVO. For more information about the IOVO, you can read their whitepaper (http://www.iovo.io/assets/whitepaper.pdf).
For more information about the IOVO
Website : http://www.iovo.io/
Facebook : https://www.facebook.com/iovoledger/
Twitter : https://twitter.com/iovoledger
Medium : https://medium.com/@iovo
Whitepaper : http://www.iovo.io/assets/whitepaper.pdf
Github : https://github.com/iovoledger
Author
My bitcointalk username: bigatenz
My bitcointalk profile: https://bitcointalk.org/index.php?action=profile;u=2195504
ETH Wallet: 0xF1ED09C74EfA48FC7a3F5824055C7ce0Ea8B36e7