Centralization is a one-to-many architecture
and decentralization is a many-to-many architecture. In the centralized
environment, a server handles processing, users connect to the server
requesting services including applications, database, storage, etc. It is the
most widely used today. If a server goes down, data may be lost unless there is
backup data, and to recover the data from backup takes time. Conversely, the
trending technology of decentralization distributes processing and data across multiple
computers or nodes serving the user needs.
Each node acts as a server, if a node goes down, other nodes will
continue processing without data loss preventing downtime. Other advantages of decentralization
over centralization are the lack of a single authority, better scalability, the
lack of a single point of failure, and greater data protection/privacy.
The basis of infrastructure design includes
the reassurance of preventing data loss, strong security measures to prevent
attacks, ensuring network uptime, and improving performance. So how do we
address these design points?
Cumulus Encrypted Storage System (CESS) is a
project based on blockchain technology with the infrastructure architected to address
the aforementioned design considerations. CESS is a new participant in the
market with solutions that go beyond a typical decentralization infrastructure
including improved beneficial offerings. For instance, CESS’s 10000 TPS rapid
transaction processing speed is suitable for personal to enterprise use. With
that performance, CESS invested extra efforts into protecting the data by deploying
distributed failsafe duplications with hashing algorithms. So, how does CESS
protect the data?
The following steps describe the CESS
processing cycle:

Step 1. User data files are uploaded and
pre-processed by CESS client software. Meta-data and
data fingerprints are
generated and submitted to the CESS chain.
Step 2. Each data file is replicated, by
default, to three identical copies.
Step 3. Each copy is sliced into small data
segments.
Step 4. Apply fault tolerant erasure coding (3,2),
so that even if two data segment copies are
destroyed, they can be
recovered via the fault tolerant method.
Step 5-6. Generate auxiliary data needed for
CESS proof schemes, namely, Proof of Data
Reduplication and Recovery
(PoDR²), Proof of Replication, and Proof of Spacetime.
Step 7. Randomly and evenly distribute and
store data segments to miners’ storage nodes.
Step 8. Periodically validate data segments
stored on all nodes, using CESS proof mechanism
PoDR², to ensure data
reliability and integrity.
Decentralization is the way to future user
interactions with the Internet, social media, finance, and many more. CESS’s involvement
with decentralization with its multifaceted solutions will be a major player in
the development of the future.
Joseph Li