Core Concepts & Architecture

Full Technical Specification & Developer Integration Guide

1. What is TransferChain S4

TransferChain S4 (Secure Simple Storage Service) is a self-hosted, Dockerized cryptographic storage enforcement layer that exposes an HTTP SDK for secure object storage.

S4 is not a storage provider.

It is a cryptographic + authorization layer that sits between your application and storage infrastructure, ensuring that no data is ever exposed in plaintext outside the trusted execution boundary.

Core Guarantees

  • Client-side and service-enforced encryption

  • Customer-controlled key custody (mnemonics-based)

  • Data fragmentation and distributed storage

  • Blockchain-backed immutability and auditability

  • Zero-knowledge architecture

2. High-Level Architecture

Client / Application
        |
        |  SDK (encryption + signing + chunking)
        v
TransferChain S4 (HTTP SDK - Docker)
        |
        |  Encrypted + fragmented data
        v
TransferChain File Operation Service
        |
        |  Metadata (hashes, references)
        v
TransferChain Blockchain (Medusa v2)

Trust Boundaries

Component
Trust Level
Notes

Client

Trusted

Holds keys

S4

Trusted

Handles crypto + orchestration

Storage

Untrusted

Never sees full file

Blockchain

Trust anchor

Immutable metadata

Critical Guarantees

  • S4 never stores plaintext at rest

  • Storage backends never receive full files

  • Blockchain never stores data or keys

  • TransferChain cannot decrypt customer data

3. Deployment Model

  • Runtime: Docker container

  • Stateless architecture

State is externalized via:

  • s4.yaml (identity + key custody)

  • Storage backend (S3 / MinIO / etc.)

  • Blockchain ledger

Supported Environments

  • Local development

  • On-premise

  • Private cloud

  • Regulated environments (finance, healthcare, defense)

4. Configuration File: s4.yaml

This is the core security file.

It defines:

  • Identity

  • Key custody

  • Storage routing

  • Blockchain connectivity

  • Runtime behavior

⚠️ Critical Warning

s4.yaml contains:

  • mnemonics (root key)

  • organization identity

Anyone with this file can access data.

4.1 Full Configuration

5. Configuration Deep Explanation

5.1 account (Root of Trust)

This defines identity + key ownership.

Fields

  • token / secret → API authentication

  • identifier → organization scope

  • uuid → global identity binding

  • mnemonicscryptographic root key

Mnemonics - BIP39 (Most Critical Part)

  • Generated during /v1/account/init

  • Used to derive:

    • encryption keys

    • signing keys

  • Required for:

    • restore

    • decrypt

    • ownership

If lost → data is unrecoverable If leaked → partial compromise

5.2 fileoperation

Handles:

  • encrypted uploads

  • encrypted downloads

  • deletion orchestration

Important:

  • receives only encrypted fragments

  • cannot reconstruct files

  • has no key access

5.3 readnode (Blockchain Layer)

Used for:

  • verifying transactions

  • audit trails

  • compliance

Blockchain stores:

  • hashes

  • timestamps

  • proofs

Never:

  • file contents

  • encryption keys

5.4 Runtime Controls

Field
Purpose

verbose

debug logging

listen

enable HTTP SDK

logformat

JSON or text

version

schema

6. Environment Variables

Recommended approach:

Override s4.yaml dynamically.

7. Service Lifecycle

8. HTTP SDK Overview

Base:

9. SDK Internal Architecture (Critical)

S4 is not just API.

It internally performs:

10. Cryptographic Flow (Real Core)

Upload Pipeline

Download Pipeline


11. Account APIs

11.1 Initialize


Response

Behavior

  • Writes mnemonics to s4.yaml

  • Must run once

11.2 Restore

Used for:

  • migration

  • disaster recovery

12. Storage APIs

12.1 Upload

What Actually Happens

  1. File encrypted locally

  2. Split into chunks

  3. Distributed across storage

  4. Metadata created

  5. Metadata signed

  6. Transaction written to blockchain

Response

Important Concept

txID = your file reference Filename is irrelevant

12.2 List

12.3 Details

12.4 Download

12.5 Delete

Delete Guarantees

  • Cryptographic erasure

  • Blockchain record

  • Irreversible

13. Deep SDK Implementation (Developer View)

13.1 Encryption

13.2 Fragmentation

13.3 Metadata

13.4 Signing


14. Example: Full SDK Upload (Pseudo)

15. Multi-Cloud Distribution

16. Security Model (Deep)

Zero-Knowledge

Layer
Can read data?

S4

Storage

TransferChain

Key Custody

  • derived from mnemonics

  • never stored centrally

  • no recovery possible

17. Blockchain Guarantees

Each operation:

  • transaction hash

  • timestamp

  • immutable record

18. Logging & Observability

  • JSON structured logs

  • transaction correlation

  • SIEM compatible

19. Failure & Recovery

Scenario: Lost Server

→ Restore via:

Scenario: Lost Mnemonic

→ ❌ Data permanently lost

Scenario: Storage Compromised

→ attacker sees only fragments

20. Performance Considerations

Chunk Size

Size
Impact

Small

higher security

Large

faster

Recommended:

Parallel Upload

21. Compliance Alignment

Supports:

  • GDPR

  • HIPAA

  • PCI-DSS

  • ISO 27001 / 27701

  • FIPS

22. Real Use Case (Your Example - Refined)

A logistics platform stores irsaliye documents:

  • Files encrypted client-side

  • Platform owner cannot access contents

  • Data fragmented across storage

  • Metadata committed to blockchain

  • All actions are authorized and validated via blockchain

Result:

  • No insider risk

  • No data tampering

  • Multi-party trust

23. Key Differentiation

Feature
Traditional Storage
S4

Encryption

Server-side

Client-side

Access

Admin-visible

Zero-knowledge

Integrity

Mutable

Blockchain-backed

Storage

Centralized

Fragmented

24. Final Summary

TransferChain S4 is not S3.

It is:

  • A cryptographic enforcement layer

  • A key custody system

  • A blockchain-audited data plane

  • A zero-knowledge storage SDK

If deployed correctly, no external party including TransferChain can access your data

Last updated