With the help of DCS, we can create a world where people and people are directly connected, decentralized, collaborating, peer-to-peer exchange, and value-driven world under community or social consensus.
The DCS project is dedicated to providing a data storage infrastructure for blockchain and decentralized applications, providing decentralized cloud database storage and access capabilities on top of this infrastructure platform, and DCS based on horizontal scalability and fragmentation Technology, providing high-speed transaction capabilities; providing cross-chain transaction and data access and verification capabilities within the system through relay chain technology and cross-chain transaction verification, providing cross-chaining with other chain systems through support for BCP protocols Communication ability.
DCS enables distributed applications to easily generate and compute data by providing unlimited storage of block storage, file storage, object storage, KV storage and table storage, and a set of basic capabilities such as fast network transport (rsync). , transfer, storage, retrieval. We provide protection for the privacy of data through attribute encryption and proxy encryption. Not only that, but the DCS project also features flexible data structure, powerful programming interface, and efficient backup.
With the development of DCS projects, there will be more and more service capabilities, such as distributed cache, distributed shared memory computing based on non-volatile memory, distributed relational database, distributed MapReduce and other projects, as parallels The chain joins the network to provide infrastructure services through DCS.
Finally, a self-organizing self-management data management system covering tens of millions of nodes in the cloud will be formed. All decentralized applications can use the cloud database to store and query data conveniently through the API. In particular, this decentralized cloud database must have a very high cost performance advantage, as well as natural off-site disaster recovery and inter-continental data sharing capabilities, without having to bear the costly organization of IAAS's huge organizational costs. This has initially formed a decentralized IAAS with three basic IAAS capabilities: storage, computing, and network bandwidth. Coupled with the value exchange system provided by the blockchain network, DCS will be a global infrastructure with unlimited imagination. The internet.
DCSystem is designed to put platform stability, security, scalability. By introducing modular virtual machines, smart sandboxes, value exchanges, and forks, a blockchain network that evolves, is easy to use, low-cost, and moderately customized is created.
PoW has contributed to the security of the Bitcoin network, but due to the increasing difficulty of the ever-increasing computing power, almost all rights are concentrated in the hands of miners and mining pools. Through professional cooperation, they have in fact become highly centralized “central servers”. If combined with more than 51% of computing power, it is theoretically possible to control most bitcoin transactions, such as the DDoS (Distributed Denial of Service) attacks we are familiar with. In addition, the high power consumption is equally criticized. Compared with the PoW mode, the PoS mode is still developing, and these development directions are mainly based on security and application.
Stability is a necessary condition to ensure that DCS is available. Blockchains come with de-intermediation features, and de-intermediation networks are often complex and full of uncertainty. Therefore, we abstract and simplify the blockchain with modular design tools. This design brings two benefits by building a stack-based smart contract that runs the WebAssembly (hereafter referred to as WASM) encoding format. First, optimizing virtual machine performance directly improves contract execution efficiency and reduces interference caused by system coupling; second, weakens the correlation between blockchain network and smart contract running status, even if there is a problem with contract execution, or the virtual machine runs abnormally, the block The stability of the chain network is still guaranteed.
DCS is a de-intermediary public blockchain platform. Developers can use DCS to publish Tokens, smart contracts and blockchain systems in a simple, fast and secure manner. DCS is committed to building a blockchain network system for global information exchange, value interconnection and trust exchange. The philosophy and technical mission of DCS is to build a world of blockchains without barriers.
Virtual host servers must have some "scalability" because enterprise networks are unlikely to last forever, especially in today's information age. If the server does not have certain scalability, if the number of users is not enough, a server worth tens of thousands or even hundreds of thousands will be eliminated in a short time. This is impossible for any enterprise. Beared.
When the chain and the chain need to interact, the connection can be established through the registration information, and the information exchange and value exchange can be realized under the VEP framework. VEP is similar to the Internet's DNS service and is responsible for registering information, updating information, and providing access services.
Traditional smart contracts are limited to the input and output data on the chain, which only supports some simple application scenarios.
In the blockchain network, the account address is designed for secure exchange, and the account, public key, and private key generation processes are as follows. Department: Private Key -> Public Key -> Account Address, all of which use the Secure Hash Algorithm (SHA) to ensure sufficient security. A hash is a refinement of information, usually with a much smaller output than the input and a fixed length. With the current technical means, the strong hash of encryption must be irreversible.
That is, the user's private key information cannot be derived through the user's account address. The specific process of generating the private key, the public key, and the account is as follows: the process of generating the private key, the public key, and the AAC account can be divided into two types of accounts, a primary account and a sub-account according to the byte width of the account address.
VEP is a standard protocol for connections between different blockchain networks. As before, a network can carry a limited number of applications, connected to each other to form a larger network, the greater the value stack that can be generated. Let's first understand how individual network nodes trust each other. The biggest advantage of blockchain networks is the ability to provide reliable information queries. This reliability is reflected in distributed ledgers and distributed consensus.
The blockchain network is a community formed by many participants according to certain consensus. The nodes form a mutual trust relationship under the influence of consensus and incentive. By extension, a blockchain network is as a node, a connection between multiple blockchain networks also requires such a consensus mechanism. Because the equality, credibility, and interest demands of different networks make network collaboration difficult, plus there are always bad nodes in the network. Therefore, the pre-set rules before collaboration are particularly important. This is like the need for legal, contractual, and ethical constraints in cross-organizational collaboration in human society.
DCSystem's consensus mechanism adopts the POW work and certification mechanism, which can achieve complete decentralization, high security, and low probability of being successfully attacked. A proof of work can be simply understood as a proof that you have done a certain amount of work. The work certification mechanism is a consensus mechanism adopted by Bitcoin, Litecoin, etc. The miners gain the corresponding block rewards by paying for their power.
In the digital currency system, the workload proof mainly guesses a random number (nonce) by calculation, so that the hash value of the content after it is pieced together with the transaction data satisfies a prescribed upper limit.
Hashing is one of the most common workload proof mechanisms. The mechanism mainly uses the complexity of the hash operation, performs a simple value increment operation by a given initial value, and uses a hash algorithm to solve until a collision value that satisfies the condition is found.