The expression “Peer to peer or P2P” is used in different contexts when describing file storage, file sharing, file exchange or file sync.Peer to peer file sharing is well known from software solutions available to exchange files with an anonymous group of people with the goal to find ways to get the desired software or files without being traceable. These solutions use technologies like “distributed hash tables” to locate “chunks” of files which will be downloaded from many different locations in parallel to create the target file with the received blocks.
When using these technologies you do not know who the participating parties are and where they are located exactly. You are not able to control any of the other participants you can only get what is shown to you.
Although this might be an efficient way to receive the requested files, it will never be a technology for a company for different reasons:
- An administrator of a company always wants to know where file data remains and who has the access rights
- The admin wants to be able to re-locate files or delete data whenever necessary
- He wants to control the way file data traffic takes on the route from source to target node, e.g. it might not be desired to load production data for the marketing department from the managing directors notebook
Peer to peer sync
P2P is the most efficient way to synchronize file data between two locations, because it is faster, more secure and does not depend on central file storage systems.
The way we designed our product is that the administrator can decide where the files of a company are stored. The admin chooses the content locations which could be servers, NAS or other storage devices located in the enterprise`s private or public cloud environment. He further decides whether accessing clients receive the right to sync the files or will get remote file access.
P2P sync or P2P file storage only refers to the way the devices communicate, but has nothing to do with a file storage that uses disc space spread all over various different nodes.
The data sovereignty remains with the customer. Even the data routes are controlled by the client by assigning “priority levels” to the content nodes.