Calculus Features — Storage Verification & Authenticity

Calculus_io
calcu_io
Published in
4 min readMay 19, 2021

The infamous stories about data breaches and network compromises have run rampant in the past few years. But if you need a little jog on the memory lane — In April of 2019, Facebook caused an uproar among the masses when the UpGuard Cyber risk team disclosed two of the many third-party apps employed by Facebook datasets had been exposed to the public internet. The damage was bad — over 540 million records of comments, likes, reactions, FB account names, and FB IDs were collected. There are many speculations on over-collecting data to such a magnitude and the potential ways in which it is being or was planned to be exploited.

Another major breach documented in the 21st CenturyIn November, Marriot International released a statement revealing bone-shattering news (well, especially for the guests at the time!). The announcement stated that the personal details of over 500 million Starwood customers were hacked. The hackers could gain unauthorized access to the Starwood hotel system and remain there for quite a while. Marriott believes that financial information such as credit and debit card numbers and expiration dates of more than 100 million customers was stolen. However, the company is uncertain whether the attackers were able to decrypt the credit card numbers.

What Is the Reason?

As baffling as these incidents might seem to be, the reason why they occur is quite simple — it is because the traditional data storage provider typically stores data on one or two servers. The lack of diversity and numbers is what makes data breaches an easy execution. The traditional storage system is vulnerable and extremely difficult to defend.

Also read — Native NFT Support — Empowering Data Commercialization

In contrast — decentralized data storage powered by the revolutionary blockchain technology makes it possible to shard data, spreading information across a massive network of storage nodes. This makes it extremely difficult for malicious entities to steal the data even when they manage to attack one or two of the servers of a network so vast and deep.

So, is there a decentralized storage network that can make data storage resilient to the max? Yes, there is –

Calculus — Implementing decentralized Storage

The Calculus marketplace shall run effectively because of the confidence clients can have with the fact that the storage miners on the network are properly storing their data. This confidence comes from Calculus’s own unique and hybrid-proof system, the POSS for ensuring storage on the Calculus network works as contracted. The Calculus POSS proof system gives every user on the network assurance that all miners store data in the manner it was promised.

Storage verification holds the Calculus data marketplace together and maintains the integrity of all the data stored on the network. The constant checks employed by the system on the integrity of stored data offer the user much-needed assurance. The checks are the most fundamental blocks of all applications built on the Calculus network. The POSS system is one of the key role players in implementing decentralized data storage, verification, and authenticity on the Calculus network while also rewarding participants for their interactions (so, if you are curious about Calculus’s very own hybrid POSS system.

Calculus holds complex layers of hybrid mechanism to implement robust storage verification –

Privacy Protection — Zero-Knowledge Proof Algorithm

Calculus proposes a privacy protection method for cross-chain transactions based on the zk-SNARK algorithm. This ensures robust anonymity; the network and its users do not need to trust the participation of the central node and other stakeholders in the network.

The Calculus POSS Proof System

Calculus adopts a POSS mechanism, which provides network, storage, and computing infrastructure for all nodes. It is responsible for transaction verification, transaction statistics, block packing, and confirmation of the Calculus network. The node system will be rewarded for successful packaging and will be supervised by the Calculus community.

All nodes are selected by all members of the community through voting. CAL token holders need to Stake tokens during the voting period. If the token is transferred out during this period, it is considered a withdrawal. To ensure the effective implementation of node election, Calculus will formulate a series of standards and rules for candidates.

How does Calculus implement data authentication?

Calculus implements remote authentication, using storage certificates from the current system generated at the time of signing the key. The remote authenticator can perceive and verify any changes on the network via the storage certificate. This ensures that the execution logic remains safe and credible at any given point in time.

Five key Trusted Execution Environment (TEE) implementations ensure storage verification and authentication on the Calculus network. TEE is simpler and more effective in implementation logic. In terms of technological development, TEE has a fast-growing technological ecology and a strong driving force for sustainable development. It supports the trusted execution of complex computing logic, which is more in line with Calculus’s technical vision. It further supports decentralized computing based on decentralized storage and then forms a complete decentralized cloud service ecosystem.

A check program runs in the node TEE and remotely authenticates the TEE environment information and the trusted code version information of other nodes in the network. Thus, it can be seen that data integrity checks, storage verification and statistics, node environment checks, and node authentication are all protected by TEE.

Finally,

The Calculus system is designed on cryptographic technology, consensus protocol, and a robust proof–incentive mechanism. The network provides a decentralized storage marketplace that shall ensure a confident interaction for the users and miners. At the very heart of it all is Calculus’s impenetrable and original approach to storage verification and authenticity.

--

--