DMZ Zone
Sensitive File Obfuscation and Protection
The DMZ (Demilitarized Zone) is a neutral network architecture zone positioned between an untrusted external network and a trusted internal network. While many organizations commonly use this area for data transfer and exchange applications, storing files temporarily in the DMZ poses a significant risk of data leakage. If not properly protected, attackers could easily steal the data. Even encrypted data is still vulnerable to risks, such as key or password breaches
Applicable Products
FractalAPI Fractal Engine
DMZ Scenario Features
Integration Access Gateway Service Website
Take immediate control of file temporary storage security
To address the temporary storage needs of sensitive personal data files on external service platforms, the Fractal Node Service can be used to receive and store sensitive files. Files uploaded to the gateway website are immediately transferred to the Fractal System for fragmentation and storage, ensuring that sensitive files are concealed through the fragmented data structure.
Protected files are fragmented
ensuring a high level of concealment
If malicious attackers attempt to steal fragmented data through security vulnerabilities, they will find that the original files lack identifiable characteristics. Given the complexity of fragment restoration and the multiple encryption mechanisms in place, it is impossible to crack and restore the data to its original form. The system architecture provides strong anti-theft advantages and ensures data access security
Highly secure file access mechanism
Restoration is only performed when files need to be retrieved
Based on the application-layer authentication token file access mechanism, specific files will be automatically retrieved by the fractal system, pulling specific data blocks, decrypting them, and reassembling the original file before returning it to the application layer system.