Maidsafe.net, a fully-centralized cloud storage System

Source: Internet
Author: User

Maidsafe.net, a fully-centralized cloud storage system (similar to the Bitcloud system)

This post was last edited by Tbit on 2014-3-26 16:11

It has been developed for 8 years and is about to launch tests and IPOs recently. Open source, C + +, GitHub download. The white paper is very long, I first translated a part. If you are interested, I will continue to translate.
Some references:

Scottish company Maidsafe claims to the built a bitcloud-like system
Http://www.wired.co.uk/news/archive/2014-01/27/maidsafe-bitcloud

Safe White Paper
Https://github.com/maidsafe/Whit ... ter/project-safe.md

Maidsafe.net

1. Introduction
Today's Internet architecture is increasingly difficult to address the needs of 2.4 billion of connected users. By 2017, it is estimated that internet users will increase to 3.6 billion. And today's centralized server architecture to provide data access services is expensive and inefficient. Data centers consume 1.1% to 1.5% of the world's electricity (and grow at a rate of 60% a year). The news that the user accounts and passwords have been stolen every week has proven that the security of user profiles is almost impossible under this architecture. Data centers have become the bottleneck of the Internet.

To meet these challenges, a new alternative is to eliminate these expensive data centers with a fully-centralized architecture. Safe-secure Access for Everyone will make the central Internet a reality by implementing the following features:

-Automatic processing of structural and unstructured data types
-Private and secure communications
-Data is shared across the network at the file system level without the need for HTTP, SMTP, FTP and other protocols
-Allow users to log on anonymously/exit the network
-Resistance to man-in-the-middle attacks and IP tracing
-No administrator and no manual intervention required
-No pre-scale planning, network real-time adaptive configuration based on user use
-Free high-availability API for developers to develop two times
-Provide crypto currency safecoin inspire the parties in the ecosystem

Safe has been working with developers for more than 8 years, including Maidsafe.ne and other developers who go to the Center for Internet applications. For more information on safe technology, refer to Http://maidsafe.net, as well as documentation and open source code on GitHub. Https://github.com/maidsafe/MaidSafe/wiki

Adding cryptocurrency to the Maidsafe core design is a natural decision. It is important that this proposal does not create a founder pool or founder unit, but rather an incentive for funders, developers, users and existing investors. This will make maidsafe clearly prove that the network truly and forever belongs to us all. This is an extremely important step to ensure that the safe network is widely used and on this basis attracts hundreds of developers who understand the importance of complete security and the centrality of the network. So, this crowdfunding proposal is aimed at launching the network, expanding the developer community, and presenting the promotion to other communities in a clear and logical way.

A Brief History of MaidSafe

Founded in February 2006 in Troon, Scotland, with 14 core members. At the beginning of the project, funds were invested by relatives and friends, as well as supporters and angel funds.

It is worth reminding that the founders held about 28% per cent of Maidsafe shares through the employee share plan, almost 50% of which belonged to the [Maidsafe Foundation] (http://www.maidsafefoundation.org/), A registered charity (under Scottish law, the Foundation must be a non-profit organization). The foundation will be a key member of this proposal to ensure a fair and equitable distribution of funds, and to support the promotion and innovation of the project.

2. Project status

Currently, Maidsafe has completed the development of the underlying code base. The API is being finalized to make it easier for current application developers to use and develop demonstration programs. The network is ready to enter a wide-ranging testing phase, and Maidsafe expects to launch the test at the same time as announcing the IPO. Now the program is open to download and provide programmer testing.

The Safe network will be released to the public soon. After a few weeks of testing and debugging, the node profitability feature will be added. Maidsafe will assist developers and respond to public consultation through Google Hangouts.

3. Resource Possession Certificate POR (Proof of Resource)

Today's total number of cryptocurrency and go-to-center networks require the submission of certain mathematical proofs to confirm the effectiveness of the behavior and services. Bitcoin, for example, validates the validity of a transaction by working to prove the POW. The safe network uses a por approach-an accurate and secure encryption method to authenticate nodes and determine their contribution to the network. A resource refers to a computer node's ability to store data, including CPU speed, bandwidth, storage space, and on-line time. This enables the resource to prove itself to be valuable, measurable and verifiable in real time. Por is a highly efficient and extremely costly proving mechanism.
And, as a fully-centralized network, safe generates and confirms transactions at network speed (even under 1 seconds). This is due to the trading management system, not the zone chain system. In the safe network, a trading management system is linked and non-linked in two ways. Bitcoin accesses all transactions through the use of block links. and safe chooses the non-link mode. Each user's information is stored in a similar node group (based on the XOR distance of the address). The transaction management system only keeps the user's temporary receipts in a trading process, this temporary receipt can be maintained as proof of the transaction, or destroyed immediately after the transaction, without leaving any traceable information on the network. Furthermore, safe provides third-party escrow mechanisms that allow third parties to arbitrate transaction disputes.

4. Security Coin Safecoin

Please refer to the Appendix for technical details.

History has shown that without a good incentive, even the most sophisticated technology cannot guarantee its success. In order for the safe network to be used more widely and effectively, the incentive scheme of the token mechanism is proposed so that all investors can earn these tokens in a fair and reasonable way (secure currency).

Security tokens can be obtained by means of a transaction purchase. Users can obtain security tokens by sharing their machine resources. Developers use secure currency as their application revenue, while project funders can obtain security tokens in advance of the network by purchasing (in Maidsafecoin). In this way, the network can get enough resources to start, and app developers can launch free apps for everyone to use. It's going to be a brand new Internet, one owned by everyone, and no control over the Internet-the internet has no boundaries.

In short, the security coin is a fair and transparent way to motivate developers, supporters and end users. By sharing network resources, the user obtains secure coins in a resource-proof way, the developer obtains the security money through the application service, the supporters focus on providing the public goods support network and are willing to take the capital risk to obtain the return on investment.
The circulation of the security currency is 2^32 and the value will be determined by the market. The Safe network uses secure currency transactions.

5. Project proposals

Maidsafe.net, a fully-centralized cloud storage System

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.