同有科技区块链存储
近年来,区块链技术在许多领域的应用受到了广泛的关注,其中,同有科技区块链存储技术也受到了极大的重视。今天,小编就为大家介绍一下同有科技区块链存储技术的三大关键词:去中心化、安全性和可扩展性。
去中心化是指区块链系统没有一个中心化的服务器来存储数据,而是由一组节点来维护数据的完整性。同有科技的区块链存储技术采用去中心化存储架构,将数据分布在不同的节点上,形成一个分布式的网络,这样就可以有效的防止数据泄露和篡改,也可以更好的保护数据的安全。
安全性是指区块链存储技术的安全性。同有科技的区块链存储技术采用了先进的加密技术,可以有效的保护数据的安全,使数据不易被篡改和泄露。此外,同有科技还采用了多种安全措施,如数据备份、数据审计、数据安全扫描等,可以有效的保护数据的安全。
可扩展性是指区块链存储技术的可扩展性。同有科技的区块链存储技术采用了分布式架构,可以支持多种类型的节点,可以根据实际需求动态扩展节点,提高系统的可用性。此外,同有科技还提供了一系列的API接口,可以帮助开发者快速构建可扩展的应用,满足不同业务场景的需求。
以上就是小编介绍的同有科技区块链存储技术的三大关键词:去中心化、安全性和可扩展性。同有科技的区块链存储技术可以提供高效安全的数据存储服务,有效的满足不同业务场景的需求,是一种非常有前景的技术。
请查看相关英文文档
㈠ What exactly does blockchain refer to and what disciplines or fields does it involve?
What is blockchain? Blockchain applications mainly include Internet technology and information content encryption algorithms, combined with appropriate rules and systems, to form a reliable system software infrastructure. The infrastructure here can be interpreted as the online environment. What does this trust mean? Database encryption methods can be divided into symmetric encryption algorithms and symmetric encryption. Symmetric encryption has higher security, but slower response speed. The elliptic curve encryption technology used in blockchain technology is the fastest method among non-asymmetric encryption algorithms. Therefore, the encryption algorithm of blockchain technology is very powerful and it can ensure the uniqueness of the customer's identity. In addition, the information in blockchain technology is also protected by data encryption and is difficult to forge.
The blockchain system avoids the above three problems. The behavior of each node is different from other nodes. The behavior of the node is determined by the program in advance. The regulations are stipulated, and the encryption algorithm ensures that every connection point cannot violate the regulations. This is the connotation of grassroots democracy in the system. Blockchain applications are generally used to build trading software, and it is necessary to ensure that the transaction information content is authentic, valid, traceable and cannot be tampered with. Each transaction information is verified and stored in a zone, and the blockchain information is encrypted through hashing technology to ensure that the information cannot be forged. This blockchain forms a transmission chain in chronological order. Each node has complete blockchain information. If the information content of some nodes is destroyed, the blockchain information will not be affected. This type of archival information method is called a distributed ledger.
In such a distributed ledger of blockchain technology, the actual operation of adding a new record and linking it to all nodes must be carried out according to certain rules, otherwise nothing will be true and effective. . This standard is the consensus mechanism of blockchain technology. In essence, a fair and equitable consensus mechanism should allow all nodes to improve the blockchain. When the contents of the added blockchains are different, they should be negotiated according to certain standards until the contents of a certain blockchain are accepted, and then all nodes will copy this blockchain. Instead of equalizing the amount, not all nodes can be added to the blockchain. Instead, a point eligible to be added to the new server block is selected based on certain criteria and the blockchain information added by the node is copied. Blockchain technology uses the latter, and since the election rules are open and transparent, the election ceremony will become the entire competition process.
㈡ Functional characteristics of blockchain technology
Blockchain is essentially a distributed storage system. Because it adopts a transaction accounting storage model, it also It can be called a distributed accounting system. Beijing Muqi Mobile Technology Co., Ltd., a professional blockchain development company, welcomes exchanges and cooperation. Let’s talk about the functional characteristics of blockchain technology.
In traditional platform technology,Central decision-making is a very common data processing method. For example, in the traditional bank transfer method, transaction information must be processed by the bank's central server cluster, and transactions between two accounts are completed through layers of data upload and instruction distribution. Every transaction in the blockchain is directly communicated and transacted by both parties. From the initiation of the transaction to the confirmation of transaction completion, all nodes are equal and have exactly the same permissions without going through any intermediaries. This kind of The peer-to-peer transaction model in the network makes blockchain applications free from the risks of intermediary transactions.
It should be noted that although blockchain is often called a distributed ledger, and is even essentially a distributed storage system, blockchain is different from conventional distributed systems. The distributed structure is even more special. Distribution is a concept corresponding to centralization. All sub-nodes in the centralized structure only interact with the central node and have no connection with each other. Therefore, the central node needs to bear all the load. A centralized system Efficiency is basically only related to the processing speed of the central node. At the same time, once the central node encounters problems such as blocking, deadlock, and downtime, the entire centralized system will stagnate or even collapse directly. The characteristic of the distributed structure is that there are multiple nodes that can interact with other nodes for data. Distributed network storage technology stores data dispersedly on multiple independent machines and devices. This sounds a bit confusing, but it is easy to understand if it is classified and described based on the characteristics of centralization. The distributed structure includes multi-centralized structure and decentralized structure.
A polycentralized system refers to a system composed of multiple centralized systems, each of which includes a master node and several slave nodes. When performing task processing, the master node decomposes the task into multiple sub-tasks and sends them to multiple subordinate slave nodes for simultaneous processing. After the slave node transmits the processing results back to the master node, the master node will integrate the processing results of each sub-task and finally complete the task. Of course, this is just a simplified description of task processing. A multi-centralized system may have a multi-layer master-slave structure, forming a tree-like task allocation structure. At the same time, slave nodes may also take orders from multiple master nodes to maximize efficiency based on complex task management mechanisms. But the fundamental difference between multi-centralization and decentralization is whether there is a central node that controls the operation of each master node. If the top-most node is multiple nodes, then it is decentralized. On the contrary, if there is only one node at the top, it is decentralized. It's multi-centered.
In decentralization, there is a more special structure that does not have any center, which can be called a completely decentralized structure. This is also a point-to-point network structure. This structure is This is reflected in the Bitcoin network. The relative advantages of point-to-point network structure are high fault tolerance, strong node scalability, strong privacy and data consistency, etc. However, there are also problems such as redundant communication and message delay.
Figure 5 Schematic diagram of network structure division
The "decentralization" emphasized in the general blockchain field mostly refers to the ownership level of the system. The system is decentralized if it belongs to the community and all accounts, and the system is centralized if it belongs to an institution or even an individual. Decentralization is a common feature of blockchain, but the completely decentralized structure of peer-to-peer networks has few current applications. Only public chains such as Bitcoin and Ethereum belong to this structure, because anyone in the world can Enter the system at any time to read data, send confirmable transactions, and compete for accounting activities, which results in the inability to guarantee its security and system efficiency. Private chains often have one or more centers that control the nodes, and all operations require permission from the center and are subject to its constraints and restrictions. Although it uses a decentralized mechanism for routine data processing, it is strictly A distributed blockchain deployment model. The alliance chain can be regarded as a collection of private chains, which is a compromise between the security and efficiency of the public chain. It adopts a multi-center technical architecture.
Due to the natural characteristics of the blockchain that cannot be tampered with, it is based on the consensus algorithm to ensure data consistency. No node in the system can tamper with or forge transactions. All transaction contents are certain and undisputed. There will be no credit risk in transactions, and the blockchain system will also have trustless characteristics.
Based on the changes in the content carried in the block from transactions to smart contracts, the trustlessness of the blockchain has two stages. The first stage is to verify the authenticity of historical transaction behaviors in the blockchain network. Trust, the second stage is trust in future transaction behavior based on smart contract rules.
The first stage of trust in the authenticity of historical behaviors can be simply understood as the blockchain system eliminates the process of proving historical transactions. When we tell others that something has happened, we need evidence to make others believe it, and this evidence often needs to be proved by a credible third party and provided with a credit guarantee through verification. For example, the electronic transaction slip provided by the shopping platform is evidence when shopping online, the tax bureau invoice provided by the restaurant when dining out is evidence, or the marriage certificate provided by the institution when purchasing a house using the identity of a couple is evidence. The person who accepts this information also needs to verify the evidence to be sure that these things have indeed happened. Corresponding to the previous article, when an online shopping dispute occurs, it is necessary to check whether the electronic transaction slip of the shopping platform actually exists; When reimbursing expenses, the signature of the invoice needs to be verified; when confirming the identity of two people as a couple, the anti-counterfeiting mark of the marriage certificate needs to be verified. However, the data in the blockchain system is considered to be non-tamperable and non-forgery. Therefore, as long as you explain a historical event to other nodes on the chain, you do not need any third-party certification, because the information on the data block can be obtained at any time. Come out and verify it directly, which results in the distrust of historical transactions in the blockchain.
The second stage is trust in future transaction behavior, because in an ideal state, the smart contract of the blockchain is bound to the business, that is, the smart contract has enforceability in the blockchain system. Because the smart code is completely public and is recorded in the main chain and stored by all accounts. After the smart contract is called or triggered by a certain mechanism, the transaction will be enforced and there is no possibility of denial. Therefore, users in the blockchain system do not have to worry about the other party's credit risk in the future, and there is a lack of trust in future transactions.
In the public chain, the ledger of each node completely records all transactions. The blockchain does not directly record real-time account information, but obtains real-time account information through transaction traceability. At the same time, since anyone can create a blockchain account to form a blockchain node, the information in the public chain can be considered open to everyone, which forms the open and traceable characteristics of the blockchain. And because the code of the public chain is often open source, what is open and traceable is not only the transaction data in the system, but also the transaction rules of the entire system. The high degree of openness and transparency enables the blockchain to meet many application scenarios that require open data. .
However, the blockchain has developed many variants based on the Bitcoin network, such as light nodes, private chains and consortium chains. These variants cannot meet the strict requirements of openness. Traceable. Light nodes can only execute and verify transactions, and do not have all transaction data for traceability, so light nodes do not have traceability. However, this problem only lies in the user's choice. If there is a good enough hardware environment, the user can choose to become a full node instead of a light node in order to master all data. In addition, access permission or verification is required to join a private chain or alliance chain, and read permissions are selectively open to the outside world and are not open to the entire network, which does not meet the strict sense of openness.
㈢What is the relationship between blockchain and big data storage
The relationship between blockchain and big data storage is as follows:
1. Data security: blockchain Let data truly flow with confidence
Blockchain, with its trustworthiness, security and non-tamperability, allows more data to be liberated. Let’s use a typical case to illustrate how blockchain promotes the generation of gene sequencing big data. Blockchain sequencing can use private keys to limit access rights, thereby circumventing legal restrictions on individuals' access to genetic data, and utilize distributed computing resources to complete sequencing services at low cost. The security of blockchain makes sequencing an industrialized solution, enabling global-scale sequencing, thus promoting the massive growth of data.
2. Data openness and sharing: Blockchain ensures data privacy
The government holds a large amount of high-density and high-value data, such as medical data, population data, etc. The openness of government data is a general trend and will have an immeasurable impetus to the development of the entire economy and society. However, the main difficulty and challenge of data openness is how toOpen data while protecting personal privacy. Blockchain-based data desensitization technology can ensure data privacy and provides a solution for data openness under privacy protection. Data desensitization technology mainly uses encryption algorithms such as hashing. For example, the Enigma system based on blockchain technology can calculate data without accessing the original data, which can protect the privacy of data and eliminate information security issues in data sharing. For example, company employees can safely open access to their salary information and jointly calculate the average salary within the group. Each participant is informed of his relative position within the group but not of the compensation of other members.
Data HASH desensitization processing diagram
3. Data storage: Blockchain is an immutable, full-historical, strongly endorsed database storage technology
Blockchain technology, through the network All nodes in the network participate in calculations and verify the authenticity of their information to reach a consensus across the entire network. It can be said that blockchain technology is a specific database technology. So far, our big data is still in a very basic stage. Trusted blockchain data based on the consensus of the entire network is non-tamperable and full of history, which also enables the quality of the data to gain unprecedented strong trust endorsement. It also brings the development of database into a new era.
4. Data analysis: Blockchain ensures data security
Data analysis is the core of realizing data value. When conducting data analysis, how to effectively protect personal privacy and prevent core data leakage has become the primary consideration. For example, with the popularization of fingerprint data analysis applications and genetic data detection and analysis methods, more and more people are worried that once personal health data is leaked, it may lead to serious consequences. Blockchain technology can prevent such situations through multi-signature private keys, encryption technology, and secure multi-party computing technology. When the data is hashed and placed on the blockchain, digital signature technology is used to allow only authorized people to access the data. The private key ensures data privacy and can be shared with authorized research institutions. The data is uniformly stored on the decentralized blockchain, and data analysis can be performed without accessing the original data. This can not only protect the privacy of the data, but also safely provide it to global scientific research institutions and doctors for sharing. The basic health database will bring great convenience to solve sudden and difficult diseases in the future.
5. Data circulation: Blockchain protects data-related rights and interests
For valuable data assets of individuals or institutions, blockchain can be used to register them, and transaction records are recognized and transparent by the entire network. , traceable, clarifying the source, ownership, use rights and circulation path of big data assets, which is of great value to data asset transactions.
On the one hand, blockchain can eliminate the threat of intermediaries copying data and help establish a trustworthy data asset trading environment. Data is a very special commodity, which is essentially different from ordinary commodities. It mainly has unclear ownership and "seeing".Characteristics such as "passing, copying and ownership" also determine that the transaction method using traditional commodity intermediaries cannot meet the sharing, exchange and transaction of data. Because the intermediary center has the conditions and ability to copy and save all the data that flows through it, this is very important for Data producers are extremely unfair. This threat cannot be eliminated by relying on promises alone, and the existence of this threat has also become a huge obstacle to data circulation. Based on decentralized blockchain, the threat of intermediary centers copying data can be eliminated. Protect the legitimate rights and interests of the data owner.
On the other hand, the blockchain provides a traceable path, which can effectively solve the problem of data verification. The blockchain jointly participates in the processing of data through multiple nodes participating in calculations in the network. Calculate and record, and mutually verify the validity of the information, which can not only prevent information counterfeiting, but also provide a traceable path. By stringing together the transaction information of each block, a complete transaction list is formed, and the ins and outs of each transaction are very clear. , transparent. In addition, when people have doubts about the "value" of a certain block, they can easily review historical transaction records to determine whether the value is correct, and identify whether the value has been tampered with or recorded incorrectly.
Everything is guaranteed on the blockchain, and big data will naturally become more active.
The tokens of crowdfunding projects on the Biying China platform are developed based on blockchain technology, and relevant information will be recorded to the blockchain.
㈣ Blockchain technology concept
Blockchain technology concept
Blockchain technology concept, nowadays, blockchain It has become an area of concern to most people, and many companies have already studied this technology in depth. However, there are still people who do not know much about it. Below I will share an article about the concept of blockchain technology.
Blockchain Chain technology concept 1Basic concepts and working principles of blockchain
1. Basic concepts
Blockchain is distributed data storage, point-to-point transmission, consensus mechanism, encryption New application models of computer technology such as algorithms. The so-called consensus mechanism is a mathematical algorithm that establishes trust and obtains rights and interests between different nodes in the blockchain system.
Blockchain is an important part of Bitcoin Concept, it is essentially a decentralized database and serves as the underlying technology of Bitcoin. The blockchain is a series of data blocks generated using cryptographic methods. Each data block contains a Bitcoin network transaction. The information is used to verify the validity of the information, prevent counterfeiting, and generate the next block.
In a narrow sense, the blockchain is a combination of data blocks that are sequentially connected in chronological order. It is a chain data structure that is cryptographically guaranteed to be an untamperable and unforgeable distributed ledger.
Broadly speaking, blockchain technology uses a block chain data structure to verify And store data, use distributed node consensus algorithm to generate and update data, use secretA new distributed infrastructure and computing method that uses coding methods to ensure the security of data transmission and access, and uses smart contracts composed of automated script codes to program and operate data.
2. Working principle
The blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer. Among them, the data layer encapsulates the underlying data blocks and related basic data and basic algorithms such as data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms, and data verification mechanisms; the consensus layer mainly encapsulates network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain The basis of programmable features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.
Blockchain mainly solves the trust and security issues of transactions, so it proposes four technological innovations to address this issue:
1. Distributed The ledger means that transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they can all participate in supervising the legality of the transaction and can also jointly testify for it.
Different from traditional distributed storage, the uniqueness of blockchain distributed storage is mainly reflected in two aspects: First, each node of the blockchain stores complete data according to the block chain structure. For data, traditional distributed storage generally divides the data into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure storage consistency, while traditional distributed storage generally synchronizes data to other backup nodes through the central node. [8]
No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.
2. Asymmetric encryption and authorization technology. Transaction information stored on the blockchain is public, but account identity information is highly encrypted and can only be accessed with authorization from the data owner. , thus ensuring data security and personal privacy.
3. The consensus mechanism is how all accounting nodes reach a consensus to determine the validity of a record. This is both a means of identification and a means of preventing tampering. Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.
DistrictThe consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". "The minority obeys the majority" does not entirely refer to the number of nodes, but can also be computing power, the number of shares, or other characteristics that computers can compare. quantity. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, which will be directly recognized by other nodes and may eventually become the final consensus result. Taking Bitcoin as an example, it uses proof of work. Only when more than 51% of the accounting nodes in the entire network are controlled, it is possible to forge a non-existent record. When there are enough nodes joining the blockchain, this is basically impossible, thus eliminating the possibility of fraud.
4. Smart contracts. Smart contracts are based on these trustworthy and non-tamperable data. Some predefined rules and terms can be automatically executed. Take insurance as an example. If everyone's information, including medical information and risk occurrence information, is true and trustworthy, it will be easy to implement automated claims settlement in some standardized insurance products.
3. Others
The Internet exchanges information, and the blockchain exchanges value. Human history and the history of the Internet can be understood in eight words: if they are divided for a long time, they must be combined. For a long time, they must be combined. In the era of long-term separation, all network information is scattered on the Internet. It is very difficult for everyone to mine information. At this time, platforms such as Google and Facebook will appear. , the only thing it does is recombine all our information. In the Internet era, what the monopoly giants reorganize is information, rather than generating their own information. The information generated is entirely our own. Once the information is reorganized, a new monopoly giant will emerge, so it will be an era of long-lasting separation. Now, due to the emergence of blockchain technology, it has entered an era of long-term integration and inevitable division. It is a new multi-centralization. After the new multi-centralization, new value will be generated. These data will be in our own hands, and personal data will generate value. It belongs to oneself. This is the most exciting era of this era.
What is the value of blockchain? A low-cost mechanism to establish trust, establish data rights, and resolve data property rights.
At present, blockchain technology continues to develop, including the current development of single chains to multi-chains, and the technology can be further expanded. I think there may still be disruptions in the future, especially in transactions and other aspects. , especially many disruptive scenarios for existing industries.
The essence of blockchain is to establish trusted information exchange on untrustworthy networks.
One Belt, One Road + One Chain. The bigger thing about blockchain is not to create trust, but to allow trust to be transmitted losslessly, reducing the friction cost of society as a whole, thereby improving the overall efficiency.
Now the blockchain itself is still in its initial stage, so it includes the information transmission and encryption of the blockchain. Quantum encryption and other encryption appear in this process, which actually attacks the encryption algorithm used by the blockchain itself. This phenomenon also occurs from time to time. includeBlockchain is also a recognition of assets and digital assets. But now many of us use cryptographic algorithms, or as the key for us to decrypt. But if you forget the password, it is very likely that your current assets will be lost. Now, you can no longer get your original assets, so it should be said that there are still some hidden dangers in asset management, including information transmission and some security aspects. Of course, from a technical perspective, the processing speed of our blockchain itself, or its scalability, is because from the perspective of the working mechanism, the entire ledger must be copied to all participants, so in the blockchain Its operational efficiency and scalability are still relatively limited. We feel that these still need further development in terms of technology.
The underlying technologies of the blockchain platform also form blockchain wallets, blockchain browsers, node elections, mining machines, mining pools, development components, development modules, technical communities and project communities. and a series of ecosystems. The perfection of these ecosystems directly determines the efficiency and effectiveness of the underlying platform of the blockchain.
4. Mundell’s Impossible Triangle
It is impossible to achieve the ultimate in decentralization, efficiency, and security at the same time.
Blockchain technology concept 2The essence of blockchain is a distributed accounting technology, as opposed to centralized accounting technology, which is widely used in our current lives. exist. Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
Blockchain is an important concept of Bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of Bitcoin, it is a series of related cryptographic methods. Each data block contains a batch of Bitcoin network transaction information, which is used to verify the validity and anti-counterfeiting of the information and generate the next block.
In a narrow sense, blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-tamperable. Fake distributed ledger.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. It is a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data securely.
The popular understanding of blockchain technology is: connecting the front, back, left, and right blocks of "things" into a chain using one technology, but each block The original data of the block cannot be tampered with. It is a "linked module" technology in the field of Internet of Things that allows participants to trust. The application of blockchain technology is inseparable from the Internet and the Internet of Things.It is a technology that is based on the integration and interaction between the two, but allows participants to remain independent, decentralized, and jointly own this set of value chains to build and share.
Characteristics of blockchain: decentralization, openness, autonomy, information cannot be tampered with, and anonymity.
Blockchain is a network that can deliver value. The demand for a network that can deliver value is an important reason for the emergence of blockchain technology. Blockchain emerged driven by the need to protect information with ownership or other value. Through public and private key cryptography, distributed storage and other technical means, blockchain ensures on the one hand the efficient transmission of valuable information, and on the other hand ensures that this information will not be easily copied and tampered with during the transmission process.
Understand the connotation of blockchain from the inevitability of its birth. Blockchain is a distributed accounting technology that solves the shortcomings of centralized accounting and solves the problem of distributed consistency. It is also a The connected Internet is upgraded to a value network that ensures the safe and efficient transmission of valuable information.
Blockchain Technology Concept 3Blockchain: Blockchain is like a globally unique account book, or database, which records the history of all transactions in the network.
Ethereum Virtual Machine (EVM): It allows you to write more powerful programs on Ethereum and script programs on Bitcoin. It is also sometimes used to refer to the Ethereum blockchain, which is responsible for executing smart contracts and everything.
Node: You can run a node to read and write to the Ethereum blockchain, that is, using the Ethereum Virtual Machine. Full nodes require downloading the entire blockchain. Light nodes are still under development.
Miner: Mining, that is, the node that processes blocks on the blockchain. You can see some of the currently active Ethereum miners on this page: stats.ethdev.com.
Proof of Work: Miners are always competing to solve some mathematical problem. The first one to solve the problem (calculate the next block) will be rewarded with Ether coins. All nodes then update their own blockchain. All miners who want to figure out the next block have an incentive to stay in sync with other nodes and maintain the same blockchain, so the entire network can always reach consensus. (Note: Ethereum is planning to move to a proof-of-stake system (POS) without miners, but that is outside the scope of this article.)
Ethereum: Abbreviation ETH. A true digital currency that you can buy and use. Here is a chart from one of the exchanges where Ethereum can be traded. At the time of writing, 1 Ether is worth 65 cents.
Gas: Executing programs and saving data on Ethereum consumes a certain amount of Ethereum. Gas is converted from Ethereum. This mechanism is used to ensure efficiency.
DApp: The Ethereum community calls applications based on smart contracts decentralized applications (DecentralizedApp). The goal of DApp is (or should be) to have a friendly interface for your smart contracts, plus some extras, such as IPFS, a decentralized network that can store and read data, not from the Ethereum team but in a similar spirit ). DApp can run on a centralized server that can interact with Ethereum nodes, or it can run on any Ethereum equal node. (Take a minute to think about this: Unlike ordinary websites, DApps cannot run on ordinary servers. They need to submit transactions to the blockchain and read important data from the blockchain rather than a centralized database. Compared to typical users When logging into the system, the user may be represented as a wallet address and other user data is stored locally. Many things will be structured differently from current web applications.)
Ethereum client, smart contract language
p>Writing and deploying smart contracts does not require you to run an Ethereum node. Browser-based IDEs and APIs are listed below. But if you are just learning, you should still run an Ethereum node to understand the basic components, and running a node is not difficult.
Clients available for running Ethereum nodes
Ethereum has many client implementations in different languages, that is, multiple methods of interacting with the Ethereum network, , including C++, Go, Python, Java, Haskell, etc. Why do we need so many implementations? Different implementations can meet different needs. For example, the goal of Haskell implementation is to be mathematically verifiable, to make Ethereum more secure, and to enrich the entire ecosystem.
At the time of writing this article, I am using the client geth (go-ethereum) implemented in the Go language. At other times, I also use a tool called testrpc, which uses the Python client pyethereum. Later examples will use these tools.
About mining: Mining is fun, a bit like caring for your houseplant, but also a way to learn about the entire system. Although the current price of Ethereum may not even cover the electricity bill, who knows in the future. People are creating many cool DApps that may make Ethereum more and more popular.
Interactive console: Once the client is running, you can synchronize the blockchain, create a wallet, and send and receive Ethereum. One way to use geth is through the Javascript console. In addition, you can use cURL-like commands to interact with the client through JSON RPC. The goal of this article is to take you through the process of DApp development, so I won’t go into details about this. But we should remember that these command line tools are useful for debugging, configuring nodes, and using wallets.
Running the node on the test network: If you are running the geth client on the official network,Downloading the entire blockchain and synchronizing it with the network will take quite some time. You can determine if synchronization has occurred by comparing the last block number printed in the node logs with the latest block listed on stats.ethdev.com. ) Another problem is that running smart contracts on the official network requires real Ethereum. Running the node on the test network does not have this problem. At this time, there is no need to synchronize the entire blockchain. Just create your own private chain, which saves time for development.
Testrpc: Use geth to create a test network. Another faster way to create a test network is to use testrpc. Testrpc can help you create a bunch of test accounts with funds at startup. It also runs faster and is therefore better suited for development and testing. You can start with testrpc, and then as the contract slowly takes shape, move to the test network created by geth - the startup method is very simple, you only need to specify a networkid: geth --networkid "12345". Here is the code repository for testrpc, we will talk about it again below.
Next, let’s talk about the available programming languages, and then we can start the real programming. Solidity is the programming language used to write smart contracts.
There are several languages to choose from for writing smart contracts: Solidity, which is somewhat similar to Javascript, has a file extension of .sol. Serpent, which is similar to Python, has a file name ending in .se. There is also a Lisp-like LLL. Serpent has been popular for a while, but now the most popular and stable one is Solidity, so just use Solidity. I heard you like Python? Use Solidity.
solc compiler: After writing the smart contract with Solidity, you need to use solc to compile it. It is a component from a C++ client implementation. Again, different implementations complement each other. Here is how to install it. If you don't want to install solc, you can also use a browser-based compiler, such as Solidity real-time compiler or Cosmo. The programming sections below will assume you have solc installed.
web3.js API. After the Solidity contract is compiled and sent to the network, you can use Ethereum's web3.js JavaScript API to call it and build web applications that can interact with it.
㈤ What exactly is the blockchain?
What exactly is the blockchain? In essence, blockchain is a distributed, decentralized network database system that will make the storage, update, maintenance, and operation of data different. Blockchain hasThe four indispensable core technologies are: distributed storage, consensus mechanism, cryptography principles, and smart contracts.
Then let’s talk about how blockchain is different from traditional data processing to help everyone understand what blockchain is and give everyone a general understanding of blockchain. Cognition.
1. Data storage in blockchain: block chain data structure
In terms of data storage, blockchain technology utilizes "block chain data structure" To verify and store data.
What does the blockchain structure mean? Everyone has seen an iron chain, with one link within another. In fact, each link can be regarded as a block, and many links are linked together to form a blockchain.
How does this so-called "iron chain" store data? To put it simply, the difference between blockchain and ordinary stored data is that on blockchain, the data in the next block includes the data in the previous block.
Take reading as an example: when we read a book, we finish page 1, then page 2, page 3...
What about in the blockchain? If each block is marked with a page number, then the content on page 2 contains the content on page 1, the content on page 3 contains the content on page 1 and page 2...Page 10 contains The content of the first 9 pages is such a chain nested layer by layer. In this way, the most original data can be traced back. This is the traceability of the blockchain.
The "blockchain data structure" of blockchain makes it traceable, which is naturally suitable for many fields, such as: food traceability, drug traceability, etc. In this way, the probability of tainted milk powder, fake vaccines, and fake and substandard food incidents will be greatly reduced, because once a problem occurs, through traceability, we can clearly know which link caused the problem, and accountability and recovery will be clearer.
2. Data update in the blockchain: distributed node consensus algorithm
In terms of data update, blockchain technology uses the "distributed node consensus algorithm" to Generate and update data.
Every time a new block is generated (that is, when data is updated), an algorithm needs to be used to obtain the approval of more than 51% of the nodes in the entire network to form a new block. To put it bluntly, it is a vote, and it can be generated if more than half of the people agree, which makes the data on the blockchain non-tamperable.
Why do you say that? Let’s make an analogy: we compare the blockchain to a ledger, because it records data. In the traditional world, the bookkeeping power lies with the bookkeeper, and the ledger belongs to the bookkeeper alone. So in the blockchain, everyone owns this ledger and wants to update itAs for the accounts, you need to vote. Only if more than half of the people agree can you update the account data.
In this process, we will involve several terms: distributed, node, consensus algorithm. These terms are actually very easy to understand:
Everyone Accounting (that is, everyone has a ledger, and the ledger is scattered in everyone's hands) is the so-called "distributed";
The accounting method that everyone discusses, votes for, and unanimously agrees on is The so-called "consensus algorithm";
Every person participating in accounting is a so-called "node".
3. Data maintenance in blockchain: cryptography
In the data maintenance stage, the difference of blockchain is that it uses cryptography to Ensure the security of data transmission and access.
The cryptographic principles applied in the blockchain mainly include: hash algorithm, Merkle hash tree, elliptic curve algorithm, and Base58. These principles actually ensure data security on the blockchain through a series of complex operations and conversions.
4. Data operations in the blockchain: smart contracts
A smart contract is a commitment agreement defined and automatically executed by a computer program. To put it bluntly, it is executed with code A set of transaction rules, similar to the current automatic repayment function of credit cards. If you turn this function on, you don't have to worry about anything. The bank will automatically deduct the money you owe when it expires.
The outstanding advantage of smart contracts is that they largely avoid a series of problems caused by trust.
Many of us have encountered the situation of being borrowed money: a friend who is short of money borrows 2,000 yuan from you and promises to pay back the money after the salary is paid next month, but next month he finds other excuses. Also, dragging this matter around would be pointless. We didn't have much money, but we were still friends. Even though you were depressed, let it go.
Then, after having a smart contract, he cannot default on his debt, because in the smart contract, once the terms in the contract are triggered, the code will automatically execute, whether he wants it or not, as long as he sends Once you have earned your salary and have money in your account, he has to pay you back.
To summarize the contents of this section, there are four indispensable core technologies in the blockchain, namely: distributed storage, consensus mechanism, cryptography principles, and smart contracts.
We can understand it this way: distributed storage corresponds to the data storage stage, the consensus mechanism corresponds to the data processing and update stage, cryptography corresponds to data security, and smart contracts correspond to data operational issues.
㈥ What is blockchain technology and what is blockchain application?
The technology used in blockchain is distributed ledger technology, which uses 256-bit hash value calculationThe principle of distributed accounting based on the method.
Today’s blockchain technology can be summarized as a technology that collectively maintains a reliable database through decentralization and trustlessness. In fact, blockchain technology is not a single, brand-new technology, but the result of the integration of multiple existing technologies (such as encryption algorithms, P2P file transfer, etc.). These technologies are cleverly combined with databases to form A new way of recording, transmitting, storing and presenting data. Simply put, blockchain technology is a technology in which everyone participates in recording and storing information. In the past, people left the work of data recording and storage to centralized institutions, but blockchain technology allows everyone in the system to participate in the recording and storage of data. Blockchain technology uses a distributed collective operation method to build a P2P self-organizing network in a distributed peer-to-peer network without a central control point. Through a complex verification mechanism, the blockchain database can maintain integrity, continuity and consistency. Even if some participants commit fraud, they cannot change the integrity of the blockchain, let alone tamper with the data in the blockchain. The key points involved in blockchain technology include: decentralization, collective maintenance, timestamps, reliable databases, trustlessness, asymmetric encryption, etc.
㈦ Blockchain distributed storage: a new storage model for ecological big data
Blockchain is undoubtedly the most beautiful word in 2019. It shines in the field of technology and in the physical world. The industry is star-studded.
The 1024 speech in 2019 gave the word blockchain a new look. In the past, it was always associated with pyramid schemes and fraud, and the word "blockchain" was always cast in a layer of gray. But now, blockchain is closely connected with the integration of the real economy and has become a strategic technology for the country. The word instantly shines with passionate red and vibrant green.
"Industrial blockchain" came into being in the context of this era. It is another hot word after "Internet". The core is that blockchain must be integrated with real industries and move away from virtuality to reality. , it is the right way to let blockchain technology find more business scenarios.
The essence of the blockchain is a database, and it uses a distributed storage method. As a blockchain practitioner, today I will talk about the sparks generated by the collision of distributed storage of blockchain and ecological big data.
Most of the current storage is centralized storage, which is stored on traditional centralized servers. If the server goes down or malfunctions, or if the server ceases operations, a lot of data will be lost.
For example, the pictures we post in WeChat Moments, the videos uploaded on Douyin, etc. are all centralized storage. Many friends will store things on the Internet, but when they open it one day, the web page will display 404, which means that the stored things have disappeared.
Blockchain, as a distributed database, can solve this problem very well. This is powered by blockchaindetermined by its technical characteristics. Digital records on the blockchain cannot be tampered with or forged. Smart contracts allow everyone to collaborate more efficiently to establish a credible digital economic order, which can improve the efficiency of data flow, break down data silos, and create a new storage model.
Ecological big data is actually closely related to our daily lives, such as daily weather forecasts, traceability data of agricultural products we eat, etc., which are all part of ecological big data. To talk about this combination, first let's take a look at the characteristics of ecological big data storage.
With the development of the Internet, currently, ecological big data has the following characteristics in terms of storage:
From the perspective of data scale, the volume of ecological data It’s huge, and data has jumped from the TB level to the PB level.
With the development of various sensor technologies, satellite remote sensing, radar and video sensing technologies, data not only comes from traditional manual monitoring data, but also includes aviation, aerospace and ground data. Together, they have generated a massive amount of ecological data. environmental data. In the past 10 years, ecological data has grown by hundreds of terabytes every year.
Ecological environment big data requires a combination of dynamic new data and historical data for processing, and real-time continuous observation is particularly important. Only by processing and analyzing these dynamic new data in real time and combining them with existing historical data can we unearth useful information and provide scientific decisions for solving ecological and environmental problems.
For example, in the current urban construction, the ecological environment restoration and ecological model construction advocated require a large amount of ecological big data to be used for analysis, modeling and plan formulation. However, currently a lot of historical data disappears due to improper storage, resulting in the loss of data value.
Since ecological big data has these characteristics, what are its storage requirements?
Currently, ecological big data is facing serious security risks, and strong secure storage is imperative for ecological big data.
The security of big data mainly includes the security of big data itself and the security of big data technology. For example, in the data storage of big data, data information leakage occurs due to external network attacks by hackers and improper human operations. External attacks include data transmission attacks on static and dynamic data, data content attacks, data management and cyber-physical attacks.
For example, many massive data for wild ecological environment monitoring require network transmission, which increases the risk of cyber attacks. If it involves some ecological and environmental data used by the military, if these data are obtained by hackers, they may infer some information about our military or obtain sensitive ecological and environmental data, with disastrous consequences.
The commercial application of ecological big data requires the integration of data from multiple sources of society such as governments, enterprises, and scientific research institutes.Only when different types of ecological environment big data are connected, collided and shared can the value of ecological environment big data be released.
Taking the current smart city construction as an example, many cities are establishing agricultural information big data centers on intellectual property, germplasm resources, agricultural materials, agricultural products, pests and diseases in all aspects and dimensions to provide agricultural products with Supply and marketing provide full information services. The construction of such a big data center is inseparable from the sharing of ecological big data among various departments.
However, ecological big data sharing faces huge challenges. First of all, my country's ecological environment big data includes big data from meteorology, water conservancy, ecology, land, agriculture, forestry, transportation, social economy and other departments, involving multi-field, multi-sector and multi-source data. Although these departments have currently established their own data platforms, these platforms are not connected to each other and are just isolated data islands.
Secondly, the relevant departments cannot share the data because they are unable to track the trajectory of the data and are worried about the ownership of the data’s interests. Therefore, in order to explore the potential value hidden behind ecological big data, achieving secure data sharing is the key, and it is also the premise and basis for the value of ecological big data.
Ecological big data is hard-won and is the collective wisdom of research institutes, enterprises, individuals and other social sources.
Among them, many ecological big data involve the protection of intellectual property rights. However, the current centralized storage cannot guarantee the protection of intellectual property rights and cannot perform traceability management of data use, which can easily lead to the infringement of intellectual property rights and the leakage of private data.
These are the storage needs of ecological big data. Today, with the rapid development of industrial blockchain, the distributed storage of blockchain can provide a new storage method for ecological big data storage. This core premise is the distributed storage, non-tampering and data tracking characteristics of the blockchain.
Using blockchain as the underlying technology, build such a platform to specifically store ecological big data. You can set up node management, storage management, user management, license management, business channel management, etc. Implementation of the underlying services of the blockchain network that provides high availability and dynamic expansion for upper-layer business applications. In the application layer of this platform, API interfaces can be built to make the use of the entire platform flexible and scalable. Blockchain distributed storage has the following characteristics:
Utilizing the distributed storage of blockchain can achieve truly secure storage of ecological big data.
First, data is never lost. This is particularly friendly to the historical data of ecological big data, making it convenient to call and compare new and old data.
Secondly, data is not easily leaked or attacked. Because the data is stored in a distributed manner, if there is an attack, only the data fragments stored in some nodes can be obtained, and the complete data information or data segments cannot be completely obtained.
Blockchain can realize the storage and confirmation of ecological data, so as to avoid the infringement of intellectual property rights and achieve safe sharing. After all, the acquisition of ecological big data requires ecological workers to be stationed in the wild all year round to extract data.
Ecological big data is hard-won and is the hard work of many ecological workers. It needs to be protected by property rights, so that the data can reflect its application value and commercial value, and the work motivation of ecological workers can be protected. They can go deep into the front line and collect more high-quality big data.
At the same time, the use of blockchain's data security sharing mechanism can also break down data barriers in departments such as meteorology, forestry, and wetlands, and build a safe and reliable data sharing mechanism to make data flow more valuable.
Nowadays, some ecological workers will tamper with ecological data for personal gain. If you use blockchain technology, it is not so easy.
Using encryption technology, the stored data is placed on a distributed storage platform for encryption processing. If the ecological big data changes, the platform can record its different versions to facilitate subsequent tracing and verification.
This protection mechanism mainly takes advantage of the non-tamperability of data to meet the requirements for data security in various business processes that use ecological big data.
The blockchain can provide secure monitoring of data, record the operation logs of the application system and the operation log data of the database, encrypt and store them on the system, provide log warning functions, and browse abnormal situations through the blockchain The device is displayed to facilitate timely detection of illegal operations and the provision of evidence.
The above is the role that distributed storage of blockchain can play in ecological big data. In the future, there will definitely be many platforms for ecological big data storage.
Ecological big data is an important basic data for the construction of smart cities. Using blockchain technology to create a relevant ecological big data storage and management platform can ensure the safe storage and effective sharing of ecological big data and provide wisdom for the future. Contribute to urban construction and promote the development of industrial blockchain.
Author: Justina, WeChat public account: Miaoyishenghua, engaged in blockchain operations, good at content operations and overseas media operations.
The title picture comes from Unsplash, based on the CC0 agreement.
㈧ What is the development status of my country's big data industry in 2021
my country's big data industry has begun to enter a deepening stage
China's big data industry has gradually matured from its infancy to now system has gone through nearly 10 years. In the first year of the "14th Five-Year Plan", the big data industry has also entered a new stage of integrated innovation and in-depth application. The integrated application technology of big data in medical, industrial, transportation and other fields has accelerated innovative breakthroughs. The focus of big data integrated application has changed from the virtual economy to the real economy; the underlying technology of big dataIn this regard, information security, pattern recognition, language engineering, computer-aided design, high-performance computing, etc. are accelerating breakthroughs. The field of big data technology is gradually making up for its shortcomings and further strengthening its strong points.
—— For more detailed research and analysis of this industry, please see the "China Big Data Industry Development Prospects and Investment Strategic Planning Analysis Report" by the Qianzhan Industry Research Institute