SDKs
The Züs SDK allows developers to integrate decentralized storage into their applications seamlessly. By using Züs’s robust, high-performance cloud storage, developers can enable secure, private, and efficient data storage, distribution, and management.
Key Features:
Multi-Platform Support: Züs SDK is available for multiple platforms, including desktop, mobile, and web, offering developers the flexibility to build solutions across environments.
End-to-End Encryption: Züs SDK ensures that all data stored on the network is encrypted end-to-end, providing full privacy and security to users.
Decentralized Storage: Züs’s decentralized architecture splits and distributes data across different servers, enhancing data availability, security, and performance.
Blockchain-Based Transactions: Through Züs SDK, developers can use blockchain functionality for immutable transactions, audit trails, and transparent storage operations.
Customizable Storage Options: The SDK allows developers to choose specific servers, locations, and redundancy levels for data storage, providing flexibility for performance optimization and regulatory compliance.
Supported Platforms:
Züs SDK is designed to be platform-agnostic, providing compatibility with the following platforms:
macOS
Linux (Ubuntu-based and RHEL/CentOS-based systems)
Mobile (iOS and Android)
WebAssembly (WASM)
SDK Components:
The Züs SDK consists of several core components that are essential for developers to interact with the decentralized storage network. These include:
ZCNCore: The core component to interact with the Züs blockchain and manage transactions, tokens, and authentication.
ZboxCore: The primary component for interacting with the decentralized storage layer. It provides functions to upload, download, share, and manage files stored on the Züs network.
Encryption Module: Provides end-to-end encryption to ensure data privacy and security, allowing secure data sharing with trusted parties.
Proxy Re-encryption: Enables users to securely share encrypted files by re-encrypting them for designated recipients without revealing the original encryption key.
Last updated