Cloudeezy is the first decentralized collaborative cloud solution. Cloudeezy is more secure, affordable and reliable.

Your data, do you want it? So do we: that's why we have chosen to host all your data in a 100% encrypted (AES256-CTR) and 100% decentralized way using a distributed hash table.

Global service availability and one of the highest levels of security on the market.

Cloudeezy's offers are specifically studied and designed for the needs of professionals, public and associative organizations.

Each file is transmitted over a secure, encrypted connection.

Each file is transmitted over a secure, encrypted connection.

Each file you store on your platform is transmitted from your device to our processing servers using HTTPS, using a TLS (1.2 or 1.3) encryption layer and 2048-bit RSA key. Unsecured connections are systematically refused.
The transmitted file is then fully encrypted, cut and distributed.

The transmitted file is then fully encrypted, cut and distributed.

The files are then encrypted using AES-256-CTR. The use of CTR allows random read access to known indices. The file is then split into several fragments and inserted into a distributed hash table based on the Ethereum blockchain.
The file is distributed over dozens of nodes and hundreds of disks.

The file is distributed over dozens of nodes and hundreds of disks.

The file is now ready to be stored on dozens of distributed nodes and hundreds of disks in RAID mode. Each node contains only a part of the encrypted file, and only the hash table knows their location so that it can be reconstructed.

🔒 The data stored in the datacenter, including the user database, is also 100% encrypted, in transit and at rest, by AES256!

Idle SQL encryption protects your data where it's stored, in your database in the cloud. SQL encryption in transit protects your data as it moves from one location to another, such as between nodes, when you send a new file, browse your Nextcloud, or download documents.

Reduce dependency on cloud providers, while improving data privacy, service levels and security

Each node only sees a fraction of a fraction of a file, and everything is encrypted. It's part of how we get security, availability and reliability of the network. Each file is decrypted when it is accessed through Nextcloud, which we also protect with double authentication for each user.

Contact us for your Nextcloud projects

For your Cloud or On-Premises projects, we will always respond to your requests.