当前位置:网站首页>Challenges of decentralized storage
Challenges of decentralized storage
2022-07-23 19:14:00 【Blockchain Star Club】
Centralized storage is the mainstream way of data storage nowadays , Even cloud storage, known as distributed storage , In essence , It still belongs to centralized storage . This storage method that relies on storage service providers to provide servers has gradually failed to meet the growing amount of data and people's demand for data storage .
The decentralized network built by blockchain has become a new exploration direction , Decentralized storage, which relies on massive nodes to provide storage space, has brought a breakthrough for data storage . But this change was not achieved overnight , The implementation of decentralized storage still needs to face many challenges .

Data storage format
There are two main forms of storing data in decentralized networks , One is to store complete files directly , The other is to use erasure codes to store fragments of files . In terms of technical difficulty , The former is easier to implement and complete , But corresponding , There are also more problems .
The nodes in the blockchain network are jointly formed by users , Although all nodes in the overall network have high security , However, a single node is insufficient in both storage performance and security protection . There are great hidden dangers in storing complete files directly on a single node . therefore , More projects use fragmented storage , For example, today's well-known decentralized storage Filecoin、Swarm All use erasure codes . In this way of storage , Don't decompose the data into fragments of constant size , Scattered in different nodes , And each segment will be encoded with redundant data , Further enhanced the security protection of data .

Store trace
Decentralized network nodes are scattered in different regions , This makes it need stronger tracking ability for the data stored in it , In order to better retrieve the data 、 Inquire about .
On storage tracking , There are also many different schemes . such as Filecoin Use local blockchain to track stored orders , At the same time, the storage node is also used to maintain the local network location list ;Swarm It writes the data address directly into the data block , During data retrieval , The network can quickly search according to the data .

Proof of storage
Decentralized storage uses user nodes to provide storage space , Users can get paid by providing nodes , But at the same time , In order to prevent users from leaving at will after accepting the stored order , Nodes are also required to submit valid storage certificates within a fixed time , To verify the validity of the storage .
Storage proof is a mechanism used to ensure long-term storage of data in decentralized storage . Different storage networks also adopt different ways of proving .
Filecoin Using a method called duplicate proof , This is a method of sealing data in a closed storage sector . And get a duplicate fragment in the sealing process , Through this copy fragment and the original data, it is mutually proved that they are unique , To verify that it is stored on the network .
and Swarm The data block is stored in Merkle In the tree . When storing data , The root hash of the tree proves that the file will be correctly partitioned and stored .
边栏推荐
- 去中心化存储面临的挑战
- Google正在改进所有产品中的肤色表现 践行“图像公平”理念
- 并非原创的原文路径【如有侵权 请原博主联系删除】
- Jumpserver administrator account is locked
- Application of jishili electrometer in testing scheme of new energy battery
- The first layer of OSI model: physical layer, the cornerstone of existence!
- 日志框架【详解学习】
- moxa串口服务器型号,moxa串口服务器产品配置说明
- 1259. Disjoint handshake dynamic programming
- DevStack云计算平台快速搭建
猜你喜欢

数据链路层 -------- 以太网 和 ARP

多线程【全面学习 图文精讲】

ThreadPoolExecutor源码分析

FPGA flash reading and writing based on SPI

日志框架【详解学习】

Digital security giant entrust revealed that it was attacked by blackmail software gangs in June

TODO FIXME BUG TAG FEATURE 等配置

11.神经网络基本概念

MEE | 浙大程磊组开发设计与构建合成菌群新方法
![[2020] [paper notes] Based on Rydberg atom——](/img/5c/186cae4e47a236ae4062d15f839196.png)
[2020] [paper notes] Based on Rydberg atom——
随机推荐
The first layer of OSI model: physical layer, the cornerstone of existence!
Time2Vec 的理解与简单实现
How to realize the digital transformation of the banking industry
一定要执行多个请求,都要捕获错误,使用try catch 不够优雅
识别引擎ocropy->ocropy2->OCRopus3总结
还在用Xshell?你out了,推荐一个更现代的终端连接工具
Redis [super superfine introductory tutorial]
什么是堆栈以及堆栈的区别
Rapid establishment of devstack cloud computing platform
Opencv (13): brief introduction to cv2.findcontours, cv:: findcontours and description of cv2.findcontours function in various versions of opencv
MEE | 浙大程磊组开发设计与构建合成菌群新方法
Navigation component of jetpack compose uses
GVIM/VIM使用技巧
[2022] [paper notes] terahertz quantum well——
PHP file lock lottery to prevent concurrency
Know two things: how does redis realize inventory deduction and prevent oversold?
? The problem of front desk parameter transmission needs to be confirmed
人脸识别系统技术方案
Redis【2022最新面试题】
Three ways to realize multithreading