Position: Home page » Blockchain » Improve the storage capacity of blockchain

Improve the storage capacity of blockchain

Publish: 2021-04-17 06:28:46
1. The information of each block in the blockchain is different, and the generation time and recorded data of each block are different. You can regard the blockchain as a bookkeeping book. Every once in a while, someone will write all the transaction information on the blockchain network to one page of the ledger, page by page, and record all the transactions on the blockchain network in turn according to the time
on the other hand, all nodes (computers in short) participating in the network will store one account book, which is updated in real time. Even if one node fails, the blockchain will not be affected.
2. How to store information on the blockchain: call the API provided by the blockchain platform

generally, the blockchain platform will provide corresponding interfaces, such as RPC, json-rpc, HTTP, etc. of course, the platforms are not the same, and the degree of friendliness is different

some companies specializing in API, such as blockcypher, can provide friendly calling interfaces, and it is not very convenient to write answers on the mobile phone, Search below

as for the storage content, add a point: in addition to the conventional cloud storage, file entities on the file hash record chain also have blockchain based storage schemes, such as IPFs, storej and so on
3. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks

Article source: white paper on blockchain technology and application development in China
4. One of the three conditions for large-scale implementation of blockchain applications is blockchain 3.0 technology, which can improve the performance, ease of use, operability and scalability of blockchain, and involves new technologies such as side chain, sub chain, cross chain, layering, fragmentation and zoning. According to Xiao Feng's observation, most of these technologies will mature in 2019, and the main network will go online. The launch of these new technologies is the premise of large-scale commercial application of blockchain. So from a technical point of view, after 2019, the large-scale commercial application of blockchain can be expected
the second is that only mature technology is not enough. In order to realize a large number of DAPP and commercial applications on the blockchain, we must be prepared on one hand: that is, the digital currency that can be used as payment tool, exchange medium, value measure and value storage. Xiao Feng said that everyone thinks that bitcoin is a payment system, but the real bitcoin can not meet our demand for payment because its currency value fluctuates too much
for example, he said that a mall sold a bottle of water and accepted bitcoin payment. When he got up the next morning, he found that 20% of the value was gone. So it can't be accepted. After the Japanese parliament made it clear that bitcoin could be used as a payment tool, some Japanese businesses announced that they would accept bitcoin payment. But later found that it caused a lot of trouble for the stability of the company's balance sheet. Your balance sheet is unstable, up or down. This not only affects the value of the things sold, but also affects the credit evaluation of enterprises and the services provided by banks to companies
the third condition is the construction of laws and regulations and supervision system. The digital economy on the blockchain must obtain legal protection and comply with the law. Xiao Feng stressed that there can be no decentralization in this regard
the differences between blockchain and Internet are discussed. He believes that the core difference between the two is that the Internet is a centralized trust mechanism, while the blockchain is a decentralized trust mechanism, and there is no need to trust a third party
the second core difference between the Internet and blockchain is the incentive mechanism, not the digital currency or the ability to issue currency. Economics has been discussing incentive incompatibility. Under the company system and on the Internet, the incompatibility of incentive mechanism has not been solved. However, in the decentralized blockchain, the blockchain achieves complete incentive compatibility. Without shareholders, board of directors and employees, the conflicts of interest between these roles will not happen again.
5. Hello, of course.
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. Blockchain is an important concept of bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains a batch of information about bitcoin network transactions, Used to verify the validity of its information (anti-counterfeiting) and generate the next block. In fact, the original English version of bitcoin white paper [1] does not use the word blockchain, but uses the word chain of blocks. In the earliest Chinese translation of bitcoin white paper [2], chain of blocks was translated into blockchain. This is the earliest time when the Chinese word "blockchain" appeared.
6. Big data and blockchain are two independent things, which do not have to be used
in fact, only high-level security data can be used for blockchain development, and most companies do not have this requirement. It can be understood that there are so many companies in the world, only a small part needs to use big data technology, and a smaller part needs to use blockchain technology. These two parts can intersect but do not include
for companies that normally use big data, there are non relational databases like HBase, mongodb, hive, Mr, spark and so on in terms of storage and processing, which have nothing to do with blockchain.
7. DGC is really unreliable. It's been 20 days since the withdrawal. I think it's really unreliable. Sorry to die
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750