scholarly journals On the Exploitation of Blockchain for Distributed File Storage

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Zuoting Ning ◽  
Lijun Xiao ◽  
Wei Liang ◽  
Weiqi Shi ◽  
Kuan-Ching Li

Distributed file storage aims to support credible access to data on distributed nodes. There are some application scenarios, for example, data centers, peer-to-peer (P2P) storage systems, and storage in wireless networks. Nevertheless, among these applications, data blocks are inevitably replaced and inaccessible when there exists nodes failure. As a result, data integrity and credibility is absent. To overcome such a challenge, blockchain is explored to protect the distributed data. Through analysis and evaluation, we demonstrate that blockchain advocates data integrity and credibility for distributed file storage, as well as the application of blockchain technology for distributed file storage.

Author(s):  
D. V. Gribanov

Introduction. This article is devoted to legal regulation of digital assets turnover, utilization possibilities of distributed computing and distributed data storage systems in activities of public authorities and entities of public control. The author notes that some national and foreign scientists who study a “blockchain” technology (distributed computing and distributed data storage systems) emphasize its usefulness in different activities. Data validation procedure of digital transactions, legal regulation of creation, issuance and turnover of digital assets need further attention.Materials and methods. The research is based on common scientific (analysis, analogy, comparing) and particular methods of cognition of legal phenomena and processes (a method of interpretation of legal rules, a technical legal method, a formal legal method and a formal logical one).Results of the study. The author conducted an analysis which resulted in finding some advantages of the use of the “blockchain” technology in the sphere of public control which are as follows: a particular validation system; data that once were entered in the system of distributed data storage cannot be erased or forged; absolute transparency of succession of actions while exercising governing powers; automatic repeat of recurring actions. The need of fivefold validation of exercising governing powers is substantiated. The author stresses that the fivefold validation shall ensure complex control over exercising of powers by the civil society, the entities of public control and the Russian Federation as a federal state holding sovereignty over its territory. The author has also conducted a brief analysis of judicial decisions concerning digital transactions.Discussion and conclusion. The use of the distributed data storage system makes it easier to exercise control due to the decrease of risks of forge, replacement or termination of data. The author suggests defining digital transaction not only as some actions with digital assets, but also as actions toward modification and addition of information about legal facts with a purpose of its establishment in the systems of distributed data storage. The author suggests using the systems of distributed data storage for independent validation of information about activities of the bodies of state authority. In the author’s opinion, application of the “blockchain” technology may result not only in the increase of efficiency of public control, but also in the creation of a new form of public control – automatic control. It is concluded there is no legislation basis for regulation of legal relations concerning distributed data storage today.


Author(s):  
Chanti S. ◽  
Taushif Anwar ◽  
Chithralekha T. ◽  
V. Uma

The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.


Author(s):  
Chanti S. ◽  
Taushif Anwar ◽  
Chithralekha T. ◽  
V. Uma

The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.


Author(s):  
Amip J. Shah ◽  
Van P. Carey ◽  
Cullen E. Bash ◽  
Chandrakant D. Patel

Recent compaction and miniaturization of electronic equipment has caused a dramatic increase in the amount of heat dissipated within data centers housing compute, network, and storage systems. The efficient thermal management of these systems is complicated by the intricate interdependence among the various components of the thermal architecture, including the heat-dissipating computer racks, the Computer Room Air-Conditioning (CRAC) units, and the physical airspace within the room. To account for this interdependence, an approach based on the thermodynamic metric of exergy has been proposed, which allows for prediction of an optimal CRAC operating point that corresponds to the point of minimal irreversibility for the overall system. To validate the formulated theory, predictions from the model have been compared with actual data center power consumption measurements. Initial comparisons indicate good agreement, suggesting that the proposed theory has great applicability for efficient data center thermal management.


2020 ◽  
pp. 102-109
Author(s):  
D.KH. DOMULLODZHANOV ◽  
◽  
R. RAHMATILLOEV

The article presents the results of the field studies and observations that carried out on the territory of the hilly, low-mountain and foothill agro landscapes of the Kyzylsu-yuzhnaya (Kyzylsu-Southern) River Basin of Tajikistan. Taking into account the high-altitude location of households and the amount of precipitation in the river basin, the annual volumes of water accumulated with the use of low-cost systems of collection and storage of precipitation have been clarified. The amount of water accumulated in the precipitation collection and storage systems has been established, the volume of water used for communal and domestic needs,the watering of livestock and the amount of water that can be used to irrigate crops in the have been determined. Possible areas of irrigation of household plots depending on the different availability of precipitation have been determined. It has been established that in wet years (with precipitation of about 10%) the amount of water collected using drip irrigation will be sufficient for irrigation of 0.13 hectares, and in dry years (with 90% of precipitation) it will be possible to irrigate only 0.03 ha of the household plot. On the basis of the basin, the total area of irrigation in wet years can be 4497 ha, and in dry years only 1087 ha. Taking into account the forecasts of population growth by 2030 and an increase in the number of households, the total area of irrigation of farmlands in wet years may reach 5703 hectares,and in dry years – 1379 hectares. Growing crops on household plots under irrigation contributes to a significant increase in land productivity and increases the efficiency of water use of the Kyzylsu-yuzhnaya basin.


2018 ◽  
Author(s):  
Dick Bierman ◽  
Jacob Jolij

We have tested the feasibility of a method to prevent the occurrence of so-called Questionable Research Practices (QRP). A part from embedded pre-registration the major aspect of the system is real-time uploading of data on a secure server. We outline the method, discuss the drop-out treatment and compare it to the Born-open data method, and report on our preliminary experiences. We also discuss the extension of the data-integrity system from secure server to use of blockchain technology.


Sign in / Sign up

Export Citation Format

Share Document