CESS

PROTECTS YOUR DATA

CESS

When a client requests to store a data file, CESS platform pre-processes the data file to obtain and store its meta-data and data fingerprints. The pre-process software also performs data file replication and fault tolerant erasure coding. The meta-data includes info of data owner, data keywords, and etc. The data fingerprints are for subsequent data rights confirmation.

CESS DATA STORAGE
WORKFLOW
CESS

First, user data files are uploaded and pre-processed by CESS client software. Meta-data and data fingerprints are generated and submitted to CESS chain.

Each data file is replicated, by default, to three identical copies.

Each copy is sliced into small data segments.

Apply fault tolerant erasure coding (3,2), so that even if two data segment copies are destroyed, they can be recovered via fault tolerant method.

Generate auxiliary data needed for CESS proof schemes, namely, Proof of Data Reduplication and Recovery (PoDR²), Proof of Replication and Proof of SpaceTime.

Randomly and evenly distribute and store data segments to miners’ storage nodes.

Periodically validate data segments stored on all nodes, using CESS proof mechanism PoDR², to ensure data reliability and completeness.

CESS CLIENT-PLATFORM INTERACTIONS

A typical CESS data client and platform interaction flow is as follows. A data storage client interrogates CESS chain to get current storage price. The client then places an order for his/her data file via on-chain smart contract. Once the payment is made and order is approved, the client then uploads the data file using API provided by CESS platform. The data file is not directly uploaded to storage nodes, instead, to a CESS storage scheduling node. The scheduling nodes are the ones with secure hardware environment (Trusted Execution Environment or TEE) and the data file will be pre-processed, encrypted, and sharded. Finally, the scheduling node distributes data segments to storage nodes to store.

CESS storage miners do not make deal directly with clients, and they get rewarded from CESS system by providing storage space. Miners’ storage resources are uniformly managed by CESS system, which fairly distribute data files. Miners have responsibility to maintain the integrity of clients’ data. Any malicious behaviour will be punished (CESS token deduction).

CESS
DECENTRALIZED CLOUD STORAGE FOR WEB 3.0

CESS is committed to build a block-chain-based distributed cloud storage system. The focus is on providing consistent and efficient distributed storage services to clients by effectively managing distributed resources using virtualization technology.

CESS global content delivery network enables users to easily access their data from anywhere, any time.

ADVANTAGES OF CESS CLOUD STORAGE
Data security and high availability
  • Data stored in multiple copies.
  • Data sliced to small pieces.
  • System randomly distributes data slices to multiple nodes.
  • Data recovery.
  • Guarantees data safety at no additional cost.
  • Data stored in multiple copies.
  • Data sliced to small pieces.
  • System randomly distributes data slices to multiple nodes.
  • Data recovery.
  • Guarantees data safety at no additional cost.
Data Privacy Protection
Open Participation & Equal Opportunity
Multi-format Data to Store
Multi-format Data Rights Confirmation
Rapid Transaction Processing Throughput (10,000TPS)