– This Won’t Happen in Genaro!

Recently, a startup company named ‘Front Edge CNC’ found that the online production data it had been keeping in Tencent Cloud Storage was completely lost. According to the company, the incident resulted in the loss of nearly 10 million RMB of platform data, including the precise registration of users and content data accumulated by the startup for two years. This means that the company has basically lost the entire database it had been accumulating since its establishment. It is now on the verge of bankruptcy.

After the incident, there were many discussions in cloud storage technology circles, and professionals in the IT industry said it was beyond them how this incident could happen. In theory, the explanation that the data loss was due to Tencent Cloud hard drive damage is not convincing. The reason is it is not technically difficult to recover data when the hard drive fails and the server is down if the company uses its own server for storage. What’s more, given the fact that Tencent Cloud has a back-up, there should be a ‘DBRA’ and data integrity test. It is reasonable to say that as long as the hard disk entity is not physically destroyed, it should be possible to recover data.

As a technology giant, Tencent should provide users with durable, stable and secure services. Tencent even claims that it has only one billionth of a probability of error. Plus it is equipped with a three-copy storage strategy for the cloud hard disk. Why then was the data not recovered effectively after the incident? Let’s see how Tencent Cloud responded.

Tencent Cloud said that the incident was caused by a Silent Data Corruption (inconsistent data written and read data) error caused by a bug in the firmware version of the physical hard disk, and the file system metadata was corrupted. And Tencent Cloud said that this Silent Data Corruption only occurred with a minimum probability. After the incident, Tencent Cloud immediately organized a file system expert team and tried to recover the data with the vendor’s technical experts, eventually ending with partial data integrity verification failure.

With the high development of the Internet, everyone has data files stored in various network cloud disks. No one wants the files in their cloud drive to be leaked or lost. But if even a technology giant like Tencent has such a data loss scandal in cloud storage, is there a way to truly provide users with truly secure, private and permanent cloud storage?

Genaro has created this secure, private, and permanent Internet cloud storage application: Genaro Eden!

Before introducing Genaro Eden, let’s take a look at Silent Data Corruption.

It is well known that the core purpose of a hard disk is to correctly store, read data and activate an alarm in time when an error occurs. Abnormal disk conditions may include hardware errors, firmware bugs or software bugs, power problems, media corruption, etc. These problems can be caught easily. Silent Data Corruption means the data processing appears normal, but it is not.. You remain unaware until you use it and find the data is damaged. In short, the main cause of Silent Data Corruption may be a file write error, which means that the newly stored C file should overwrite the A file, but for some reason it covers the B file. At this time, the data block B loses the data block. A still contains the wrong data. As a result, the data is written to the wrong location where there is old, erroneous data in one area; data is lost in the other area, and neither the RAID system nor the HDD detects this error. Retrieving an access to B or C will result in incorrect data being returned without warning. It can be seen that the characteristics of silent errors are difficult to detect and prevent. For this, Genaro adopted the following measures:

The Distributed Hash Table (DHT) is a distributed storage method. In DHT, a type of information that can be uniquely identified by a key value is stored on multiple nodes according to a certain convention/protocol, which can effectively avoid the issues of the single failure of a “centralized” server (such as a tracker). As distinct from a centralized node server, each node in the DHT network does not need to store the information of the entire network, but only stores data from its neighboring subsequent node, which greatly reduces the bandwidth occupation and resource consumption. The DHT network also backs up redundant information on the node closest to the keyword, avoiding the single node failure problem.

A unique hybrid consensus mechanism–the combination of storage consensus SPoR and chained PoS.

Genaro’s ultimate goal is to have a public chain that can be encrypted and shared. So first we need to ensure that the encrypted shared files themselves can be proven to have storage integrity. Genaro’s SPoR (Sentinel Proof of Retrievability) + PoS (Proof of Stake) low-energy sustainable hybrid consensus mechanism can improve performance while ensuring safety.

The SPoR verification algorithm has long been used in today’s cloud storage and is also an optimized and validated algorithm that was previously centralized. It can effectively verify that the file is stored intact and that it can be retrieved completely. Genaro has designed a unique file fingerprint set. This design makes the file fingerprint a “password” for determining the integrity of the file. Simply speaking, as long as the stored file is changed or deleted, the file fingerprint will change accordingly, so it is only necessary to detect the correctness of the file fingerprint. The PoS consensus mechanism is the next level of development after PoW. At the same time, PoS has two well-known problems: Nothing at Stake and Long Term Attack. Genaro solves these two problems well with SPoR+PoS by combining storage with the public chain. This reduces the possibility of attacks and greatly improves file storage integrity.

In the future, Genaro will consider more encryption storage features, including the use of de-duplex encryption to ensure that a single encrypted file is not redundantly processed to increase miners’ benefits. Encrypted file storage allows users to watch streaming media operations as well as download files. In terms of consensus, Genaro will provide more fine-grained consensus improvements to ensure the participation of small and medium-sized nodes and increase the instruction set of new VMs to expand and increase more application scenarios.

In this way, Genaro’s storage network application Genaro Eden perfectly solves this problem. From now on, please follow the Genaro Network, be the owner of your own data, and create a truly secure, private and permanent data cloud space.

Genaro’s latest versions, Genaro Eden and Genaro Eden Sharer, will allow you to store your files in a more secure way and share your unused storage to earn GNX. To download Genaro Eden and begin storing and sharing, follow this link: https://genaro.network/en/genaro_eden/

Get your Genaro Eden/Sharer for Linux, Windows and MAC OS right now from the official website:

Git source repository is on GitHub>>

Important:

Warm reminder to our community members, please download Genaro Eden ONLY from our official website/GitHub and DO NOT trust any referral links and reposts from anyone, otherwise, we won’t be able to guarantee privacy and security of your data and protect you from scammers.

Genaro Eden — The first decentralized application on the Genaro Network, providing everyone with a trustworthy Internet and a sharing community:

Related Publications:

Genaro’s Core Product Concept

Genaro Eden: Five Core Features

How Does Genaro’s Technology Stand Out?

Genaro Eden Application Scenarios and User Experience

The Genaro Ecosystem

Matthew Roszak Comments on Release of Genaro Eden