Position: Home page » Blockchain » How to solve data redundancy in blockchain
How to solve data redundancy in blockchain
Publish: 2021-04-29 05:13:16
1. The relationship between blockchain and big data is not very big. The main purpose of big data is to manage massive data, and the core of blockchain is to achieve high security and high reliability of data without centralized intermediary accounting. Therefore, blockchain and big data do not conflict with or replace each other. They are completely different solutions for data in different scenarios.
2. Private key~
3. Jinwowo analysis believes that blockchain mainly solves the trust and security problems of transactions. Once the information is confirmed and added to the blockchain, it will be permanently stored. Unless more than 51% of the nodes in the system can be controlled at the same time, the modification of data on a single node cannot be realized. Therefore, the data stability and reliability of blockchain are very high
e to the use of Distributed Accounting and storage, there is no centralized hardware or management organization, the rights and obligations of each node are equal, and the data blocks in the system are jointly maintained by the nodes with maintenance function in the whole system.
e to the use of Distributed Accounting and storage, there is no centralized hardware or management organization, the rights and obligations of each node are equal, and the data blocks in the system are jointly maintained by the nodes with maintenance function in the whole system.
4. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks
Article source: white paper on blockchain technology and application development in China
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks
Article source: white paper on blockchain technology and application development in China
5. The increase of blockchain network information is bound to need expansion, but it is not limited to a BTC public chain. No matter which public chain develops to a certain stage, it needs expansion technical support network. Therefore, it can be said that expansion is a necessary link for the implementation of blockchain scheme
the expansion of blockchain is the general trend, but there are differences in the specific operation. According to the different levels of blockchain architecture, the instry has proposed a number of expansion solutions: first, optimize the data transmission protocol for the underlying data layer of blockchain, do not change the upper structure of blockchain, and improve the scalability, such as bloxroute, the 0-layer expansion scheme of blockchain; The second is to change the data structure and consensus algorithm to improve the scalability of the basic protocol of blockchain, such as DAG (directed acyclic graph), fragmentation, dpos algorithm, etc; Third, aiming at the application level, such as side chain, sub chain, state channel lightning network and so on, part of the on chain transactions are transferred to the off chain execution to rece the on chain processing pressure and improve the overall efficiency.
the expansion of blockchain is the general trend, but there are differences in the specific operation. According to the different levels of blockchain architecture, the instry has proposed a number of expansion solutions: first, optimize the data transmission protocol for the underlying data layer of blockchain, do not change the upper structure of blockchain, and improve the scalability, such as bloxroute, the 0-layer expansion scheme of blockchain; The second is to change the data structure and consensus algorithm to improve the scalability of the basic protocol of blockchain, such as DAG (directed acyclic graph), fragmentation, dpos algorithm, etc; Third, aiming at the application level, such as side chain, sub chain, state channel lightning network and so on, part of the on chain transactions are transferred to the off chain execution to rece the on chain processing pressure and improve the overall efficiency.
6. Hello, of course.
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. Blockchain is an important concept of bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains a batch of information about bitcoin network transactions, Used to verify the validity of its information (anti-counterfeiting) and generate the next block. In fact, the original English version of bitcoin white paper [1] does not use the word blockchain, but uses the word chain of blocks. In the earliest Chinese translation of bitcoin white paper [2], chain of blocks was translated into blockchain. This is the earliest time when the Chinese word "blockchain" appeared.
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. Blockchain is an important concept of bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains a batch of information about bitcoin network transactions, Used to verify the validity of its information (anti-counterfeiting) and generate the next block. In fact, the original English version of bitcoin white paper [1] does not use the word blockchain, but uses the word chain of blocks. In the earliest Chinese translation of bitcoin white paper [2], chain of blocks was translated into blockchain. This is the earliest time when the Chinese word "blockchain" appeared.
7. The distributed architecture and tamper proof features of blockchain technology help to solve the problems of bill authenticity and information opacity. When participants need to check whether the bill has been tampered or transferred, blockchain can provide indisputable proof of consistency
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
8. Jinwowo analyzes the security of data when using blockchain Technology: blockchain technology is a kind of technology that supports decentralization in a trustless network environment
it can ensure the security of the communication network of the application system running on the chain by means of digital signature, and use hash chain technology to ensure that the written data can not be changed.
it can ensure the security of the communication network of the application system running on the chain by means of digital signature, and use hash chain technology to ensure that the written data can not be changed.
9. Chongqing jinwowo analyzes and solves problems in the following ways:
first of all, by using all data chains in the blockchain for prediction and analysis, the regulatory authorities can timely discover and prevent possible systemic risks. The decentralized characteristics of the blockchain can eliminate the information island in big data risk control, and improve risk control through information sharing
secondly, the distributed database of blockchain can improve the poor quality of big data risk control data, and solve the problems of data format diversification, data form fragmentation, lack of effective data and incomplete data content
finally, blockchain can prevent data leakage. Because the blockchain database is a decentralized database, any node's operation on data will be found by other nodes, thus strengthening the monitoring of data leakage.
first of all, by using all data chains in the blockchain for prediction and analysis, the regulatory authorities can timely discover and prevent possible systemic risks. The decentralized characteristics of the blockchain can eliminate the information island in big data risk control, and improve risk control through information sharing
secondly, the distributed database of blockchain can improve the poor quality of big data risk control data, and solve the problems of data format diversification, data form fragmentation, lack of effective data and incomplete data content
finally, blockchain can prevent data leakage. Because the blockchain database is a decentralized database, any node's operation on data will be found by other nodes, thus strengthening the monitoring of data leakage.
Hot content