Centralization is a one-to-many architecture and decentralization is a many-to-many architecture. In the centralized environment, a server handles processing, users connect to the server requesting services including applications, database, storage, etc. It is the most widely used today. If a server goes down, data may be lost unless there is backup data, and to recover the data from backup takes time. Conversely, the trending technology of decentralization distributes processing and data across multiple computers or nodes serving the user needs. Each node acts as a server, if a node goes down, other nodes will continue processing without data loss preventing downtime. Other advantages of decentralization over centralization are the lack of a single authority, better scalability, the lack of a single point of failure, and greater data protection/privacy.
The basis of infrastructure design includes the reassurance of preventing data loss, strong security measures to prevent attacks, ensuring network uptime, and improving performance. So how do we address these design points?
Cumulus Encrypted Storage System (CESS) is a project based on blockchain technology with the infrastructure architected to address the aforementioned design considerations. CESS is a new participant in the market with solutions that go beyond a typical decentralization infrastructure including improved beneficial offerings. For instance, CESS’s 10000 TPS rapid transaction processing speed is suitable for personal to enterprise use. With that performance, CESS invested extra efforts into protecting the data by deploying distributed failsafe duplications with hashing algorithms. So, how does CESS protect the data?
The following steps describe the CESS processing cycle:
Step 1. User data files are uploaded and pre-processed by CESS client software. Meta-data and
data fingerprints are generated and submitted to the CESS chain.
Step 2. Each data file is replicated, by default, to three identical copies.
Step 3. Each copy is sliced into small data segments.
Step 4. Apply fault tolerant erasure coding (3,2), so that even if two data segment copies are
destroyed, they can be recovered via the fault tolerant method.
Step 5-6. Generate auxiliary data needed for CESS proof schemes, namely, Proof of Data
Reduplication and Recovery (PoDR²), Proof of Replication, and Proof of Spacetime.
Step 7. Randomly and evenly distribute and store data segments to miners’ storage nodes.
Step 8. Periodically validate data segments stored on all nodes, using CESS proof mechanism
PoDR², to ensure data reliability and integrity.
Decentralization is the way to future user interactions with the Internet, social media, finance, and many more. CESS’s involvement with decentralization with its multifaceted solutions will be a major player in the development of the future.