How is data security ensured?
For any questions, contact .Thanks for your continuous support to Onebox!

Onebox has the following security features:

  • Secure access
    • Onebox provides a locking mechanism when a login attempt fails, in order to prevent brute force cracking of your password.
    • Onebox provides the extraction code for accessing a file or folder link, in order to prevent other illegitimate users from accessing that file or folder.
    • Onebox assigns permissions to all Uniform Resource Locators (URLs). A user must have the corresponding rights to access a specific URL. After a user is authenticated, corresponding role and permissions will be assigned based on user information. Authentication information must be verified each time the user accesses a URL, and unauthorized access is denied.
    • Onebox utilizes object-based storage, and all data is stored in specific containers as objects. A user must use an Access Key and a Secret Key to access data. Containers are separated logically to ensure the security of data access.
  • Secure data transmission

    Onebox supports encrypted data transfer over Hypertext Transfer Protocol Secure (HTTPS) to prevent data damage or loss during transfer.

  • Secure storage
    • Slice-based data storage

      After object data is sliced, data slices are stored on disks of different storage nodes randomly based on a distributed hash algorithm. Malicious users cannot obtain user data from a single storage node or disk. When the lifecycle of a service ends or a user stops using a service, the slice-based data storage technology supports secure data destruction, preventing data leaks.

    • User data isolation

      Each user owns independent logical space and follows unique storage policies. Data of one user is isolated from that of another user, ensuring data security and privacy.

    • Encrypted storage of sensitive user data

      Sensitive and private user data, such as authentication information and email addresses, is encrypted using the Advanced Encryption Standard (AES) algorithm before being stored.