System Architecture
The Gateway storage architecture operates across three distinct layers that work in concert to provide secure and efficient data storage services. The Client Layer manages all user-facing operations. It handles initial data encryption, user authentication, and provides the primary interface through the Gateway API. All cryptographic operations necessary for ensuring end-to-end security occur at this layer before data transmission. The Coordination Layer serves as the network’s central nervous system. Through metadata management and blockchain anchoring, it orchestrates storage operations and maintains the network’s state. This layer validates storage proofs and coordinates data sharing operations while ensuring all access controls are properly enforced. The Storage Layer consists of distributed Encrypted Data Vaults (EDVs) that form the backbone of the storage infrastructure. These nodes work together to store encrypted data shards, execute proxy re-encryption operations, and maintain proofs of storage.Core Components
Encrypted Data Vaults (EDVs)
EDVs serve as the fundamental storage units within Gateway’s infrastructure. Each vault operates as an isolated environment for encrypted data shards, capable of executing proxy re-encryption operations for secure data sharing. Through continuous proof generation and maintenance, EDVs ensure data integrity while participating in recovery operations when needed.Erasure Coding System
Gateway’s implementation of Reed-Solomon erasure coding represents a significant advancement in distributed storage efficiency. The system employs a 10:4 parity ratio, creating 14 total shards for each stored file. This carefully chosen ratio provides optimal balance between redundancy and storage efficiency.Distribution Strategy
The erasure coding process first divides incoming data into 10 equal chunks. The system then generates 4 parity shards using Reed-Solomon algorithms. These 14 resultant shards are distributed across geographically diverse EDV nodes based on factors including:- Network latency and bandwidth capacity
- Current storage utilization
- Geographic distribution for regulatory compliance
- Historical node reliability metrics
Recovery Process
During file recovery, the system only needs any 10 shards from the total 14 to reconstruct the original file. This approach provides significant advantages over traditional replication:- Faster recovery times through parallel shard retrieval
- Lower network bandwidth requirements
- Improved resistance to geographic network outages
- Reduced storage costs while maintaining reliability
Proxy Re-encryption (PRE)
You can learn more about our implementation of PRE here: Overview.
Transform Key Security
Re-encryption keys are generated with carefully controlled scope. Each key:- Can only re-encrypt specific data shards
- Has configurable time-based validity
- Cannot be used to decrypt the original data
- Cannot be combined with other keys to escalate privileges
Shard-Level Operations
Re-encryption occurs independently at each EDV storing relevant shards. This distributed approach provides several advantages:- No single point of system compromise
- Parallel processing reduces latency
- Network bandwidth optimization
- Reconstruct the original file without sufficient shards
- Access plaintext data without appropriate decryption keys
- Generate valid re-encryption keys without proper authorization
- Bypass the access control system through direct shard access