CDPC will use a blockchain-centric technology cluster to provide a decentralized and trusted solution for data encryption storage, data leakage, data isolation, data migration, and data outsourcing, ensuring data security, data sharing, and user privacy To build an eﬃcient and intelligent cloud data storage system, and organically combine the construction of large-scale data storage systems, online expansion and contraction of storage devices, application-oriented professional management strategies to reduce energy storage and consumption of cloud storage, and automatic global load balancing of the system The ecological application promotes the operation and operation of the CDPC cloud data eco-economy, and stimulates the huge value potential of cloud data in the "blockchain +" era
CDPC can providing provable consensus, traceability, and credit mechanisms through a proof-of-contribution protocol.
Cloud storage must provide container-based multi-level tenant / application isolation technology: the system must provide data isolation functions to ensure that data is not accessed illegally and to ensure the privacy of user data. cloud Storage can be combined with physical isolation and permission control to achieve data isolation
Cloud storage systems require cloud storage to have multi-level automatic load balancing and scheduling functions based on quality of service (QoS).
Cloud storage systems are large in scale and need to provide high-quality external services. Traditional construction methods to improve performance and energy consumption have an approximately linear relationship. The new system architecture is required to break this relationship and resolve the contradiction between system performance and energy consumption.
During the use of storage devices, there will be a need to adjust the storage resource pool. This requires the storage resource pool to increase or decrease storage devices according to business needs. During the adjustment process, the business cannot be interrupted, and the upper-level business cannot be interrupted.
The realization of an application-oriented professional management strategy presents some characteristics: traditional storage system storage resources are independent of applications and storage resource utilization is low; mass storage systems integrate resources, but use unified storage for all applications Storage strategy; how to achieve resource integration and professional strategy management for applications in the cloud storage system, and to manage flexible amounts according to application changes is a major challenge. Cloud storage must provide container-based multi-level tenant / application isolation technology: the system must provide data isolation functions to ensure that data is not accessed illegally and to ensure the privacy of user data. cloud Storage can be combined with physical isolation and permission control to achieve data isolation.
With the explosive growth of data, the scale of storage is getting larger and larger. The scale of cloud storage construction in 2012 is tens of petabytes, and the number of files or objects stored is several billions. By 2013 or 2014, there will be hundreds of petabytes and EBs of demand, and in a few years it will grow to ZB, and the number of files or objects will exceed 10 billion and 100 billion. Traditional storage usually completes resource organization and management in one device, one rack, or one data center. When the storage capacity rises to EB or ZB level, storage is difficult to complete in a data center. Large-scale storage requires the organization and management of storage devices, data, and storage services across data centers, cities, provinces, and even countries, and supports cross-domain access, backup, and disaster recovery functions. At the same time, large-scale storage requires storage to provide different levels of management and service permissions, and assign different permissions according to regions and levels. System access to resources must be strictly controlled. Only users confirm total
CDPC remote cloud users can access video in cloud storage through Ethernet. cloud storage provides multiple application interfaces for application, management, and end use in video surveillance systems. Using a browser-based method, cloud users can remotely play back surveillance videos and re-analyze videos without installing any playback and management software.
Internet companies have joined the R & D and application teams of cloud storage, and bound personal information that needs to be stored in Internet products to cloud storage applications, which has accelerated user reception.
Through home media sharing and interactive control functions, interoperability of the fourth screen, set-top box, etc. can be achieved.
He has a double degree in physics and economics. He has worked for Neuberger and Apollo for 8 years. Have a deep understanding of economic models. Master multiple computer languages, good at using data software to analyze data. He has been studying and researching on block- chain technology for 2 years and has participated in several North American blockchain technolo- gy conferences.
With many years of entrepreneurial experience, worked in Neuberger and Apollo for 6 years. Having negotiated and negotiated on behalf of the company, increased the company's monthly income by 30%. Have a deep understanding of market development and demand, and grasp the development trend of the United States. Have a deep understanding of blockchain and digital currency.
Has more than 10 years of investment experience in equity capital markets. He once served as a high net worth client advisor to many well-known exchanges, and is currently committed to digging deeper into the digital currency market and doing marketing work.
The data owner constitutes a data set of documents. Each document contains a fixed set of keywords. The data owner wants to outsource the data set to save data storage and maintenance costs, and at the same time can authorize other customers to search their outsourced data sets
A data consumer is a subscriber to a data set provided by the data owner. If the data consumer subscribes to the data set, he is granted permissions. It can then interact with blockchain nodes to prove their credentials and perform keyword searches on outsourced data.
In this scenario, separate cloud service providers are considered as blockchain nodes and collectively form a joint cloud.
|Item||Proportion||Quantity||Locking mechanism||Unlocking instructions||Remarks|
|Team motivation||20%||200million||yes||Lock position for 6 months, starting half a year later, release 5% monthly||For team motivation|
|mechanism||15%||150million||yes||Unlock 5% before going online, lock up for 6 months, unlock 15% in the 7th month, and subsequently unlock 10% monthly||/|
|Ecological incentive||35%||200million||no||/||For airdrops, incentives for user registration and transactions|
|Protection fund foundation||15%||120million||no||/||Used to protect user funds|
|foundation||15%||150million||no||/||For project normal expenses|