
At the second Thunderchain Technology Salon held in Hangzhou on October 13, Guo Jialou, a research and development engineer of Thunderchain, explained in detail the Thunderchain File System (TCFS), which has received wide attention in the industry.
secondary title
The file system born for the blockchain is a new architecture
Guo Jialou introduced the internal framework of TCFS in detail, which consists of three parts. At the center is a storage node with a number of up to 1.5 million, which constitutes the storage basis of the entire TCFS. All files uploaded to TCFS will be divided into 36 slices, and among the 1.5 million nodes, 36 are selected for storage. In any case, as long as any 18 nodes remain valid, the original file can be recovered.
Followed by the user module, the user wants to upload files, just log in to this module. Through this module, the user first realizes the backup of the storage space, then obtains a batch of available storage nodes, and then slices and encodes the file, and then increases the available nodes through PTV. Before the file is uploaded, these storage nodes need to be verified, and after the distribution is successful, the index of the file is provided, and the entire file upload process is completed.
The downloading process is similar, just randomly find 18 nodes from the 36 slices to get it back, and then decrypt and restore it.
Another important module is the module for scheduling 1.5 million nodes. TCFS has more than 1.5 million nodes, which requires reasonable utilization of resources to maximize efficiency, so scheduling is very important. However, the scheduling of distributed storage is very different from that of the scheduler. Distributed storage is scheduled according to the region, and some available storage nodes are selected in different cities, so that the highest effect can be achieved, and this function relies on the scheduling module to achieve completion.
secondary title
The security policy emphasizes multiple authentication and rights protection
As a distributed open file system, security is one of the most concerned parts of TCFS. According to Guo Jialou, the security strategy of TCFS is multiple authentication and rights protection.
The first thing that needs to be determined for file security is the authenticity and validity of the file. TCFS will verify the data uploaded by the file owner to ensure the authenticity of the file. Then, when downloading, it will verify the identity of the downloader to confirm that the file is available for download. Permissions will be passed. In addition, during the data interaction process, encrypted data is used for transmission.
Although the file is divided into 36 slices and stored on 36 different nodes, the data encoded by the slices is naturally encrypted, and the nodes used for storage cannot obtain the original data. Only after obtaining all the slices of at least 18 nodes, perform Code translation is required to obtain the original file content. The selection of these nodes is randomly designated, and 1.5 million nodes guarantee the randomness of this designation, thus realizing the security of file storage.
At the same time, users can also encrypt their own files and upload them using a key, thereby achieving multiple protections and ensuring data security.
Guo Jialou specifically mentioned that TCFS has a special mechanism setting that allows users to authorize uploaded files to meet the needs of users to share and sell files for a fee. The structure of the mechanism includes key information such as the validity period, the authorized person's address, signature, and the path of the authorization file.
This is a mechanism that is very consistent with the characteristics of the blockchain, through which TCFS realizes the protection of the rights and interests of users' personal data.
What is also particularly important is that TCFS combines ThunderChain's LinkToken system as an incentive mechanism to protect the reliability of each node and make full use of the society's idle bandwidth and storage to achieve low-cost and high-quality It is available and closely integrated with Thunderchain, which is beneficial for developers to quickly develop blockchain applications.