Blockchain distributed storage

Blockchain Distributed Storage
Blockchain is a technical system composed of asymmetric encryption algorithms, consensus mechanisms, distributed storage, point-to-point transmission and other technologies. It integrates the advantages of the various technologies mentioned above and can be realized at the same time The functions of information decentralized management, information tamper-proof, and mutual trust between transmission nodes have obvious advantages compared with the above various single technology applications. Blockchain distributed storage
(1)
Information calculation and recording on the decentralized distributed accounting blockchain are not Concentrated in a single server, but distributed in blocks on the network, each block is independent and connected to each other, and can directly exchange information and value.
(2) The non-tamperable
information will be permanently stored after being verified and added to the blockchain. Each node in the system has the latest complete database, and a single node cannot tamper with the data, ensuring the stability and reliability of the blockchain data. Each time a new block is generated in the blockchain system, a corresponding time stamp will be generated, and the block chain will be connected in the order of the block generation time. Each independent node establishes a connection through a peer-to-peer network to form a decentralized record of information and data Distributed time stamp service system. Timestamp makes the difficulty of changing records exponentially increase with the passage of time. The longer the blockchain runs, the more difficult it is to tamper with data.
(3) The collective maintenance
system is jointly maintained by all nodes with maintenance functions, and all nodes can query blockchain data and develop related applications through public interfaces.
(4) The
parties with limited access can only access the shared ledger if they have been authenticated and have authority. The type and scope of access permissions can be assigned under system control to ensure data security.
(5) The
data exchange of each node of the anonymous block chain is carried out under a fixed algorithm, and the block chain procedure rules determine the transaction

Guess you like

Origin blog.51cto.com/14962412/2546141