cthulhu white paper - ctl-storage.comctl-storage.com/uploads/ctl_whitepaper.pdf · challenges to...
TRANSCRIPT
1
Cthulhu White Paper
2
Catalog
Chapter I Project background ................................................ 3
Chapter II Introduction to blockchain ........................................ 7
2.1 What is digital assets ............................................... 7
2.2 What is blockchain ................................................... 7
2.3 Integration of blockchain and digital assets ......................... 9
Chapter III Project introduction ............................................ 10
3.1 Introduction to CTL ................................................. 10
3.2 CTL advantages ...................................................... 12
3.3 Characteristics of CTL .............................................. 13
3.4 Cthulhu profit ..................................................... 15
Chapter IV Technical Framework of CTL ....................................... 16
4.1 Overall architecture design ......................................... 16
4.2 Node ID ............................................................. 20
4.3 Storage dispute resolution .......................................... 20
Chapter V Application scenarios of CTL ...................................... 21
5.1 Distributed file storage ............................................ 21
5.2 Distributed file sharing ........................................... 22
5.3 Multimedia application .............................................. 22
5.4 Digital content transactions ....................................... 23
5.5 Social applications ................................................. 23
Chapter VI Ecological construction of CTL ................................... 24
6.1 Storage ecology ..................................................... 24
6.2 Retrieval ecology ................................................... 25
6.3 Application developer ecology ....................................... 26
6.4 Application service ecology ......................................... 26
Chapter VII Introduction to operation team .................................. 26
Chapter VIII Issuance plan .................................................. 29
8.1 Release plan ........................................................ 29
8.2 Issuance details ................................................... 30
Chapter IX Risk tips ........................................................ 30
Chapter X Disclaimer ........................................................ 32
3
Chapter I Project background
The development and opportunity of big data distributed
storage in the digital economy is very important. 5g
communication technology is developing rapidly. Many Internet
enterprises increase their product volume, especially the rise
of some social networking sites, which leads to the
unprecedented increase of data volume.
In 2020, the Internet is also in the era of data explosion.
The word "big data" has become everyone's topic. Multimedia
data such as text, audio, video and image are also overwhelming.
With the development of technology, big data exist widely, such
as enterprise data, statistical data, medical data, mobile data,
Internet of things data and so on. In all walks of life, data
has shown unprecedented growth.
4
In the face of the growing capacity, increasing types and
accelerating speed of data,huge data volume brings great
challenges to data storage.
The birth of blockchain technology has opened up a new way
for the development of software definition storage. It creates
the possibility of rethinking cloud storage and solving
industry dilemmas at the technical and economic level. First
of all, storage pooling can be realized in a broader space and
in a richer form. Secondly, the token incentive mechanism of
blockchain can drive you to contribute the remaining storage
space of enterprise storage, server, PC, mobile storage, etc.
Finally, the actual data stored in each node is just some slices
of data, and these slices are also saved in an encrypted way.
The data can be protected more safely. Even if the user who
provides the storage node has the opportunity to view these
slices, what they see is also the data segments without
practical significance. Blockchain, as a distributed business
model, has the opportunity to accelerate the development of the
distributed storage industry with the help of global resources
and talents, just like everyone's firewood. Compared with
existing cloud storage solutions, blockchain based distributed
5
storage is more secure, faster, cheaper, more auditable and
more widely distributed. It creates a market that allows people
to monetize their spare storage space, and the influx of supply
in the global storage market will reduce storage prices.
Blockchain can ensure to do this in a safe, untrusted,
peer-to-peer way. From centralized storage to decentralized
storage. From centralized Internet to decentralized Internet.
We are at a turning point in history.
In short, blockchain is to synchronize the storage of all
nodes in the whole network through the storage resources of
distributed nodes, and to ensure the effectiveness of internal
nodes' changes to the storage content through the corresponding
consensus technology, so as to maintain a complete searchable
database. In this system, the storage is the change or total
surplus of the balance between the accounts generated in the
chain. Of course, some more perfect system functions also
include the data state maintenance of multiple accounts to the
sub accounts in the database. Therefore, the main function of
this system is to record the change of the state, and then
synchronize. For nodes, whether pow, POS or POC, the core
requirement is to follow specific voting rules and synchronize
new changes in the storage of all nodes. If a system uses the
6
blockchain structure, it does not support the user's personal
data, or the data we want to achieve value. The data on the
blockchain is account data and settlement data, which are
stored in each node exactly the same.
Distributed storage is a kind of data storage technology.
It uses the disk space of every machine in the enterprise
through the network. These distributed storage resources
constitute a virtual storage device, and the data is stored in
every corner of the enterprise.
Distributed storage system, which can distribute data on
multiple independent devices. Traditional networked storage
systems use centralized storage servers to store all data.
Storage server becomes the bottleneck of system performance and
the focus of reliability and security, which can not meet the
needs of large-scale storage applications. The distributed
network storage system adopts the scalable system structure,
uses multiple storage servers to share the storage load, uses
the location server to locate the storage information, not only
improves the reliability, availability and access efficiency
of the system, but also is easy to expand.
7
Chapter II Introduction to blockchain
2.1 What is digital assets
Digital assets refer to the non monetary assets owned or
controlled by enterprises, existing in the form of electronic
data and held for sale or in the process of production in daily
activities.
Generalized digital assets refer to the assets in the form
of electronic data owned or controlled by individuals and
enterprises, which are held in daily activities to exchange or
exercise the corresponding physical assets. In a narrow sense,
digital assets refer to the computer program (token) registered
on the blockchain distributed ledger, which can be programmed.
The exchange between assets is the exchange of code and code.
2.2 What is blockchain
Blockchain is a new application mode of distributed data
storage, peer-to-peer transmission, consensus mechanism,
encryption algorithm and other computer technologies. The
so-called consensus mechanism is a mathematical algorithm for
building trust and acquiring rights and interests among
different nodes in the blockchain system. It is essentially a
8
decentralized database and serves as the underlying technology
of tokens. Blockchain is a series of data blocks generated by
using cryptography method. Each data block contains the
information of a bitcoin network transaction, which is used to
verify the effectiveness of its information
(anti-counterfeiting) and generate the next block.
In a narrow sense, blockchain is a kind of chained data
structure that combines data blocks in chronological order and
ensures the tamper proof and forgery proof distributed ledger
by cryptography.
In a broad sense, blockchain technology is a new
distributed infrastructure and computing method, which uses
blockchain data structure to verify and store data, uses
9
distributed node consensus algorithm to generate and update
data, uses cryptography to ensure the security of data
transmission and access, and uses intelligent contract
composed of automatic script code to program and operate data.
2.3 Integration of blockchain and digital assets
After the digitization of resources, there are many
problems, such as piracy, privacy disclosure, illegal data
reselling and so on. The key reason behind these problems lies
in that the mechanism of data resource transaction flow,
ownership certification, rights and interests protection is
not perfect enough, which makes it difficult for "digital
resources" to form "digital assets", and the value of data is
difficult to fully show.
The emergence of blockchain technology solves the above
problems. More and more industries are proposing their own
blockchain solutions. It can play a rapid role after landing
and application. Blockchain can help digital assets further
develop and upgrade. The details are as follows:
From centralization to decentralization, build the
ecosystem of digital assets. Blockchain promotes product and
cultural exchanges in all walks of life, and no longer relies
10
on third-party institutions or centralized management.
From mistrust to trust, blockchain helps digital assets to
solve the problems of fraud, duplicate payment and so on. The
operation of the system is open and transparent. Through the
mechanism of signature and the principle of minority obeying
the majority, the credit can be guaranteed. Users can view the
source of retroactive tokens at any time, and no longer worry
about risks such as counterfeiting.
From insecure to secure, information is sent from the
current node to all nodes after each transaction. When trading
again, the block will check whether the data has been tampered
through the data of other nodes, once it is found that it will
recover from the data of other nodes, effectively preventing
the hacker from tampering with the data.
Chapter III Project introduction
3.1 Introduction to CTL
Cthulhu is a chain based on the core technology of
blockchain distributed storage. It is a distributed database
that stores data on blocks and establishes through the storage
space of open nodes. It solves the problem that traditional
11
distributed storage is a centralized system, stores data on
multiple independent devices, adopts scalable system structure
and uses multiple storage servers The problem of carrying
storage load and using location server to locate storage
information.
The distributed storage service platform built by CTL is
faster, safer and cheaper than centralized storage. The file
is divided into several small parts (to ensure a certain degree
of redundancy) and stored on many nodes of the network. As long
as a certain number of nodes operate normally, the file can be
safe and complete.
CTL itself ensures that users' files are stored. As a
by-product of CTL mining process, the innovative encryption
proof creates a set of useful and valuable services for
12
customers. Miners are encouraged to use their hard disk space
to make money in CTL's verifiable storage market, and they will
be rewarded with the same amount: the larger the amount of
miners' storage, the more proof of interest token they will
earn.
3.2 CTL advantages
1. High performance
CTL has high-performance distributed storage, can
efficiently manage read and write cache, and supports automatic
hierarchical storage. CTL uses distributed storage to improve
the response speed of the system by mapping data in hot areas
to high-speed storage; once these areas are no longer hot spots,
the storage system will move them out of high-speed storage.
2. Support hierarchical storage
Due to the loose coupling of CTL through the network,
distributed storage allows high-speed storage and low-speed
storage to be deployed separately, or mixed in any proportion.
In unpredictable business environments or agile applications,
the advantages of tiered storage can be maximized.
3. Expansibility
CTL benefits from a reasonable distributed architecture.
13
Distributed storage can predict and elastically expand
computing, storage capacity and performance.
CTL distributed storage level expansion has the following
characteristics: 1) after node expansion, the old data will
automatically migrate to the new node to achieve load balancing
and avoid single point overheating; 2) level expansion only
needs to connect the new node and the original cluster to the
same network, and the whole process will not affect the business;
3) when the nodes are added to the cluster, the overall capacity
and performance of the cluster system will expand linearly.
After that, the resources of the new nodes will be taken over
by the management platform and used for allocation or
recycling.
3.3 Characteristics of CTL
CTL regards blockchain as the underlying technology,
builds a platform to store big data, and can set up node
management, storage management, user management, license
management, business channel management, etc. To provide high
availability and dynamic expansion of the underlying services
of blockchain network for the upper business applications. In
the application layer of this platform, API interfaces can be
14
built to make the use of the whole platform flexible and
extensible. Blockchain distributed storage has the following
characteristics:
1. Secure data storage
With the distributed storage of blockchain, real big data
can be stored safely. First, data is never lost. This is
especially friendly for the historical data of big data, and
convenient for the call and comparison of new and old data.
Secondly, data is not easy to be leaked or attacked. Because
the data is distributed storage, if it is attacked, it can only
get the data fragments stored in some nodes, and can not get
the complete data information or data segments.
2. Data security sharing
Blockchain can realize the storage of data, that is, right
confirmation, so as to avoid the infringement of intellectual
property rights and realize the safe sharing.
3. Data traceability monitoring
Using encryption technology, the stored data is encrypted
on the distributed storage platform. If the ecological big data
changes, the platform can record its different versions, which
is convenient for post tracking and verification.
This protection mechanism mainly uses the non
15
tamperability of data to meet the requirements of data security
in all kinds of business processes using big data.
3.4 Cthulhu profit
1. Profit of shopping mall
The mall transaction itself is free and open. The mall can
charge a considerable fee to provide advertising space for
merchants, which is also a main mode of profit in the early stage.
By refining the advertising of the mall, the merchants can
accurately locate the target customers, so that the advertising
fees invested by the merchants can be recovered and the profits
can achieve a win-win effect.
More refined services can be provided and more profit space
can be obtained in various scenarios of mall transaction.
2. Investment profit
Use the existing information resources to directly invest
in products with great development potential in the industry.
3. Blockchain parent chain profit
In the development of the market, the recognition degree
and self-worth are improved. Through the transaction of various
commodities, the user population and demand increase. As well
as the impact of blockchain ecology in various industries on
16
the parent chain, further realize the value growth, so as to
generate the profit of the parent chain.
4. Data profitability
(1) Market transaction data: for the collection of industry
first-hand transaction data, the trend data of the industry can
be mastered through the analysis of big data technology.
Provide data assistance to the industry and related industries.
(2) Payment data: through multiple image analysis of
payment location, time, crowd, etc., the market information is
deeply mined to provide services for enterprises that need
marketing. The platform information is pushed to the target
users, and then information feedback is obtained through users,
thus forming a closed-loop marketing.
Chapter IV Technical Framework of CTL
4.1 Overall architecture design
CTL calculates the hash value of the file as the unique
identification of the object in the system, and the fragments
generated after the file is encrypted and encoded are the object
data. The storage node stores the object data in its own storage
unit, and the super node is responsible for maintaining the
17
mapping relationship between the object data and the storage
node. The storage nodes are completely peer-to-peer. Through
a set of P2P transmission protocol, the storage nodes can
transmit data to each other. As a scheduler, the super node
receives the information of the storage node and updates the
real-time information of the storage object according to the
broadcast, so that the user can quickly return to the object
location when accessing the storage object.
1. Double layer network design
CTL separates the storage and retrieval networks, improves
the network efficiency and reduces the mining threshold.
Storage and retrieval requirements for mining machines are
different. Retrieval requires expensive computing power and
energy consumption, while storage requires idle storage
resources and bandwidth resources. The separation of storage
and retrieval is more conducive to the contribution of low-cost
miner to CTL.
2. Multi chain structure (main side chain design: Multi
Chain and multi consensus)
The main chain of CTL adopts porp (copy proof) and POE
(extract proof). IPW chain provides the consensus interface and
POW, POS, dpos and other real installations. Developers can
18
create and deploy their own nodes through the consensus
interface provided by the main chain. Dpos can be used for side
chains with high performance requirements and POW can be used
for those with high decentralization requirements.
3. Storage network
The essence of P2P is a new network communication
technology. This new communication technology breaks the
traditional structure, gradually becomes decentralized and
flat, so as to achieve the future trend of node equality. The
application of P2P file sharing (BTS / emules, etc.) is the most
concentrated embodiment of P2P technology. CTL is a P2P file
sharing network as the entrance, around a file network system,
its operability combined with blockchain formula algorithm to
design a new flat, decentralized cloud storage network. At the
same time, it retains the open and transparent characteristics
of blockchain.
DHT (distributed hash table) is a distributed storage
method. In DHT, a kind of information that can be uniquely
marked by key values is stored on multiple nodes according to
a certain agreement / protocol, which can effectively avoid the
whole network paralysis caused by a single failure of
"centralized" servers (such as tracker). Different from the
19
central node server, each node in DHT network does not need to
maintain the information of the whole network, but only stores
the information of its adjacent successor nodes in the nodes,
which greatly reduces the occupation of bandwidth and the
consumption of resources. DHT network also backs up redundant
information on the node closest to the key word to avoid single
node failure.
There are many technologies and algorithms to realize DHT,
such as chord, can, pastry, kademlia, etc. Considering
technology maturity and market application, CTL uses kademlia
algorithm. Kademlia, also known as the third generation P2P
technology, is a general P2P protocol, which is suitable for
all distributed peer-to-peer computer networks. Kademlia
defines the structure of the network, plans the communication
between nodes and the specific information interaction process.
In kademlia, network nodes use UDP to communicate with each
other, and store data through a distributed hash table. Each
node will have its own ID, which is used to identify the node
itself and also to assist in the implementation of kademlia
algorithm and process.
20
4.2 Node ID
The generation of peer-to-peer identity information and
routing rules are formulated through kademia protocol. The
essence of CTL protocol is to build a distributed and loose hash
table, referred to as DHT. Everyone who joins the DHT network
must generate their own identity information, and then they can
be responsible for storing the resource information and contact
information of other members in the network through this
identity information. If new node a needs to find the contact
information of another node B, and node a does not have the
contact method of node B, then node a can get the contact
information of node B by contacting any node that has contact
with node B.
4.3 Storage dispute resolution
In the distributed storage network, the data nodes are
scattered in the untrustworthy edge network. It is necessary
to ensure that the data are stored in the data nodes, and can
resist the witch attack, outsourcing attack, generation attack
and other cheating means. Considering the existence of
malicious nodes, the distributed storage system needs to
prevent all kinds of attacks. CTL realizes the replication
21
proof (porp) and extraction proof (POE) through zero knowledge
proof (zk snark) and seal, and realizes the storage proof with
less resources and high efficiency.
Proof of replication
Storage proof is different from workload proof and equity
proof. Storage proof is a consensus algorithm used in
distributed storage field. It is based on the storage space
contributed by users to the distributed cloud storage platform,
combined with traffic, bandwidth, online time and other factors
to motivate. The proof allows storage to provide the user to
convince the verifier by providing a copy proof (π). When the
verifier issues a random challenge, it provides proof that the
proof data X has been stored in a unique dedicated physical
storage area relative to the specific copy y of the verifier.
Porp algorithm can ensure that each data storage is independent,
and can prevent witch attack, exogenous attack and generation
attack.
Chapter V Application scenarios of CTL
5.1 Distributed file storage
CTL distributed storage cloud can provide basic cloud
22
storage services. Through OpenAPI, customers can easily access
and use CTL cloud storage services. Distributed storage cloud
can provide more secure, reliable and cost-effective cloud
storage services.
5.2 Distributed file sharing
The distributed shared cloud is based on the shared storage
services of the distributed storage cloud. Users can share some
of their own files (digital media or other valuable content).
When sharing, you can set a certain amount of CTL reward
requirements according to the specific content. If other users
want to be able to download or view the file completely, they
need to pay the corresponding amount of CTL as a reward to the
uploader. As a file sharing service, CTL will review and manage
the uploaded content of users in strict accordance with the
legal requirements of the operation location.
5.3 Multimedia application
At present, the traditional online video website adopts the
centralized storage service, which requires high storage and
bandwidth costs. The related costs will be converted into:
watching long-term advertisements and restricting non members
23
to watch and so on. The use of CTL as storage service will
greatly reduce the redundancy of the same resources, while
saving a large number of users' bandwidth costs when playing
video, making watching video more efficient and low-cost.
5.4 Digital content transactions
Due to the use of blockchain and distributed storage
technology, CTL storage cloud is very suitable for providing
storage capacity for copyright trading of long tail content.
Distributed ledgers can provide open, transparent and tamper
proof transaction records for transactions. It can also leave
a unique and unchangeable digital signature on the blockchain
for digital content works as the identification of copyright.
With the support of CTL platform, a large number of long tail
video, audio and photography creation can have a low-cost and
sustainable trading platform.
5.5 Social applications
Use CTL technology to create a decentralized social network.
As a decentralized application, CTL network allows social
applications to work without any center point, completely
peer-to-peer.
24
Chapter VI Ecological construction of
CTL
6.1 Storage ecology
Storage miners provide data storage for the network, and
they participate in the CTL operation by providing disk space
and responding to customer requests. To be a storage miner,
users need to provide storage space and bandwidth resources.
The miner stores the user's pieces of data in sectors to earn
IPW. The storage miner responds to the user's storage request
by storing data in memory at a specific time. The storage miners
generate certificates and submit them to the blockchain network
to prove that they have stored data at a specific time.
25
Storage miner workflow:
·The storage miner stores the mortgage in the blockchain
to ensure stable storage to the network. The collateral exists
to guarantee the service. If the miner generates a storage
certificate for the stored data, the collateral will be
returned. If a storage certificate is not successfully
generated, the miner will lose collateral.
·Once the mortgage transaction appears in the blockchain,
miners can provide storage services in the storage market.
·Once the order matches, the customer sends the data to
the storage miner. After receiving the data of the storage miner,
the miner and the customer sign the transaction order and submit
it to the blockchain.
·When the storage miners are assigned data, they must
generate the storage proof repeatedly to ensure that they are
storing the data proof to be published in the blockchain and
verified by the network.
·After the verification, the storage miner will receive
the corresponding storage reward.
6.2 Retrieval ecology
Retrieval miners provide data retrieval services for the
26
network, and they participate in the operation of CTL by
providing the data required by user retrieval requests. Unlike
storage miners, they don't need collateral, they don't need to
submit storage data, they don't need to provide storage
certificates.
6.3 Application developer ecology
CTL needs more businesses to prosper the whole ecosystem,
and corresponding application developers to manage business,
so that more storage needs come in.
6.4 Application service ecology
CTL provides users with file storage and retrieval services.
It has used various services provided by CTL through CTL
browser.
Chapter VII Introduction to operation
team
Project team members have passion, fighting spirit, dream
and ability. They adhere to the attitude of integrity,
professionalism, concentration and focus, and put all their
energy into the development of CTL. The main technical
27
personnel of the project have many years of industry experience,
are proficient in blockchain and related professional
technologies, and are good at understanding the needs of
customers and transforming them into services. He has rich
experience in project management and has undertaken many
large-scale projects at home and abroad. Team members with
strong technical strength and rich industry experience to
support the growth and development of CTL.
Founder: W Erickson
W Erickson graduated from Harvard University as a PHD. Once
served as the technical director of the world's top 500
enterprises, responsible for system architecture design,
leading more than 500 engineers to develop the underlying
modules. Since October 2017, a team of uining technology has
been formed to fully invest in the project of developing the
uining blockchain.
Technical partner: Jonathan Rosenberg
28
Jonathan Rosenberg graduated from Massachusetts Institute
of Technology in the United States. He is a senior software
engineer and has obtained the project management professional
certificate in the United States. He has been developing video
processing software on Facebook for 3 years. Two years ago he
turned his attention to the study of Ethereum technology. Good
at C + +, Java, solidity, web3.js, truffle framework, open
Zeppelin contract review technology. At present, he is
responsible for leading the development team to write the
platform of uining.
Business partner: David Lewis
29
The co-founder of bitworld purchase financial management
is responsible for the operation and promotion of bitbuy
financial management. At the same time, he also joined the
unining team at the invitation of the sponsor. At present, he
works as a business operation consultant. 20 years of financial
and business experience can help unining understand the needs
of users, and help the marketing and user operation of unining.
Chapter VIII Issuance plan
8.1 Release plan
1. Token Name: CTL.
2. Total token issuance: 100 million.
3. Issuance rules: Based on the ETH public account book,
decentralized, tamperable, fair and open.
4. At present, the project has obtained private investment
from a number of global investment banks and funds.
30
8.2 Issuance details
The total number of token issues is 100 million. private
funding 10%; founding team 10%; exchange 10%; mining 70%.
Chapter IX Risk tips
1. Risks related to judicial supervision
Blockchain technology has become the main object of
supervision in every major country in the world. If the
supervision subject interferes or exerts influence, the
application or token may be affected by it. For example, laws
and regulations restrict the use and sale of electronic tokens,
31
which may be restricted, hindered or even terminated.
2. Risk of application lack of attention
Platform applications are not likely to be used by a large
number of individuals or organizations, which means that the
public does not have enough interest to develop and develop
these related distributed applications. Such a lack of interest
may have a negative impact on tokens and applications.
3. Risk of competitive expansion
There is a certain competition between blockchain tokens,
assuming that there are stronger competitors in the industry,
it will be affected.
4. Risk of related applications or products failing to meet
expected standards
In the development stage of the platform itself, before the
release of the official version, there may be relatively large
changes, or before the release, the market experienced
tremendous changes, resulting in the platform failing to meet
the expected requirements in function or technology. Or because
of the wrong analysis, the application of the platform or the
function of token failed to meet the expectations.
5. Risk of cracking
At present, the technology used can not be cracked, but
32
assuming the rapid development of cryptography, or the rapid
progress of computer computing speed, such as the development
of quantum computer, or will bring the risk of cracking, leading
to the loss of tokens.
6. Other instructions
Please fully understand the development plan of the
operation platform and the relevant risks of the blockchain
industry. Otherwise, it is not recommended to participate in
this investment. If you make an investment, on behalf of you,
please confirm that you have fully understood and recognized
the terms and conditions in the detailed rules.
Chapter X Disclaimer
This document is only for the purpose of conveying
information, and does not constitute the relevant opinions of
the project. The above information or analysis does not
constitute the reference basis for investment decision-making
power. This document does not constitute any investment
proposal, investment intention or investment solicitation.
This document does not constitute or understand the act of
offering any business, nor is it a contract or promise in any
form.
33
Relevant intended users need to clearly understand the
risks of the project. Once they participate in the investment,
they will understand and accept the risks of the project, and
are willing to bear all the corresponding results or
consequences.
The operation team shall not bear any direct or indirect
losses caused by participating in the project.