IOTAÂ from now provides its data producers with the ability to control in detail who has an access to the data they produce through the final release of Alpha IOTA Streams.
IOTA Streams were created to secure and structure data on the device itself. All this is possible thanks to cryptography, tamper-proof historical verification and sorting the data on the Tangle. In this way, IOTA ensures the value of the data at the time it is created.
Through itsÂ blog, IOTA also informs that the streams will remain in the alpha version until the Chrysalis phase 2 protocol is updated. Following the update to full feature compatibility, the streams will be transitioned to Beta.
IOTA Streams use Layer 2 technology, which is designed to complement other IOTA Layer 2 frameworks, like IOTA Access.
To secure data from a device, structure it in an easily consumable fashion, and share it securely, the operations need to be conducted on the device, on premises, or on chip depending on the use case. By enabling these functions as an embedded integration, something important is enabled â€” the â€œOwn your own dataâ€ movement.Official IOTA Foundation blog
With IOTA Streams, the company wants to fight hard against the sale and theft of data, because it is aware of how valuable your data can be, as well as the data of large companies. As to the value of your data, the company refers to aÂ presentationÂ by John Ellis, who claims that a family of fourâ€™s Google search data amounts to $ 5500 in value a year.
Finally, IOTA adds that now is the right time to show that decentralization can have a real impact on the way the systems are designed and solutions are developed. With goals such as lowering the barrier to entry, enhancing transparency and accountability, increasing the efficiency of existing solutions and raising the bar for ethical use and management of data.