当前位置:网站首页>4everland storage node portal network design
4everland storage node portal network design
2022-07-25 20:03:00 【4EVERLAND】
4everland storage node
Introduce
4EVERLAND The data node layer is based on IPFS Global distributed collaborative node network on , These nodes will form a large IPFS swarm Clustered network . The node program makes use of TEE The technical function of trusted verification , Its purpose is to verify the network access process and program reliability of nodes . Nodes in the whole network need to assume the following roles and functions :
1.pin Some specific IPFS CID data
2. Verify the program functions of other nodes in the network
3. Regularly report the data storage of nodes
4. Synchronous storage challenges are reported to other nodes and mutually verified whether the reported data is logical. In general , The organization form of nodes is shown in the figure :
Which consists of :PoSC of TEE:PoSC:Proof of Storage challenge, Is based on TEE Implemented node verifiable program Data Storage: finger IPFS Storage , The two are binding relationships PoSC Introduce Nodes in the network cooperatively store some characteristics cid data , Therefore need PoSC(Proof of Storage challenge) Mechanism to verify that the node stores these data according to the expected logic . The node will periodically check the stored data of the node according to some preset logic . Each such spot check mechanism will form a report and broadcast it to other nodes throughout the network , Other nodes will verify the validity of the report and store it locally , The following data is an important basis for rewarding and punishing nodes . The network access process of the node. The network access process of the whole node is roughly as follows :
1. The node program is TEE enclave The region generates a public-private key pair
2. Generate Quote as well as create_attestation_report And send it to IAS Do the authentication
3.IAS Check the result report return
4. After the verification is passed, the mr_enclave Value is compared with the value on the chain check_mr_enclave, If it's not consistent , The program directly returns
5.check_mr_enclave After passing the inspection, store the public and private keys and other information
6. subscribe IPFS Message notification subject
7. On the subscription chain cid Storage contracts , Follow up on these CID Do something about it
8. Listen for messages from other nodes , For example, report synchronization 、 Request of public key 、cid Synchronization message of
9. Different messages are processed according to the predetermined logic , The message field types are roughly as follows 
Store reports
The node program listens to storage cid Contract events on the chain , Trigger the corresponding log processing event ( for example insert、remove cid), Nodes will follow a certain “ cycle ” Generate storage proof report , Report fields include stored cid Sample data 、 Data accuracy and other fields , meanwhile , The node will also report the local key signature to the storage and broadcast it to other nodes throughout the network . The general process is :
Reference resources
边栏推荐
- PyTorch 模型 onnx 文件的导出和调用
- Shopping guide for high-end flagship projectors: dangbei X3 pro and dangbei F5 are more immersive!
- 相机内参矩阵K和fov的相互转换
- A high efficiency 0-delay 0-copy QT player scheme based on Hisilicon 3559
- Socket error Event: 32 Error: 10053. Connection closing...Socket close
- When the V100 of mindpole 8 card is trained to 101 epochs, an error of reading data timeout is reported
- Notes - record a cannotfinddatasourceexception: dynamic datasource can not find primary datasource problem solving
- [mindspore] [read graph data] cannot read mindrecord format graph data
- The query data returned by the print database is null or the default value. Does not match the value returned by the database
- Oracle数据库下载、安装、使用教程及问题汇总
猜你喜欢

A high efficiency 0-delay 0-copy QT player scheme based on Hisilicon 3559
![[wp]ctfshow-web getting started - Explosion](/img/4b/6d8f4c044578382b9353d4d1c69c8f.png)
[wp]ctfshow-web getting started - Explosion

How to set tiktok mobile network environment? How can tiktok break the playback volume?

【云原生 | 从零开始学Kubernetes】八、命名空间资源配额以及标签

Sentinel simple current limiting and degradation demo problem record

C语言学习日记3——realloc函数

10.< tag-动态规划和子序列, 子数组>lt.53. 最大子数组和 + lt.392. 判断子序列 dbc

软件设计师下午真题:2009-2022

Recommendations on how to install plug-ins and baby plug-ins in idea

Ml programming skills:
随机推荐
什么是聚类分析?聚类分析方法的类别[通俗易懂]
「分享」DevExpress ASP.NET v22.1最新版本系统环境配置要求
9.< tag-动态规划和子序列, 子数组>lt.718. 最长重复子数组 + lt.1143. 最长公共子序列
A good way to generate interface documents efficiently
How does tiktok break zero?
飞行器pid控制(旋翼飞控)
When AI encounters life and health, Huawei cloud builds three bridges for them
Selenium runs slowly - speed up by setting selenium load policy
Configure and install cocos2dx development environment under Tongxin UOS
使用cookie登录百度网盘(网站使用cookie)
919. Complete binary tree inserter
YOLOv7论文部分解读【含自己的理解】
FormatDateTime说解[通俗易懂]
高数_第3章重积分 学习体会与总结
wallys//IPQ5018/IPQ6010/PD-60 802.3AT Input Output 10/100/1000M
what is qml in qt
滑雪手机端H5小游戏源码下载
Pytorch's transforms (numpy data type is converted to tensor, normalized and resized)
[Infographics Show] 248 Public Domain Name
How to ensure the quality of customized slip rings