🗂️Data Replication

Data Security - Data Replication

Infinity BOX provides data owners with the flexibility to define their security strategies by allowing them to configure the replica quantity and shard quantity. By default, Infinity BOX creates 3 replicas for each copy of data, which provides a good balance between data availability and storage space requirements. However, some data owners may require higher levels of security, which can be achieved by increasing the replica and shard quantities.

Increasing the replica and shard quantities can improve data availability and protection against data loss due to hardware failure or natural disasters. However, it also requires more storage space and more complex monitoring and adjustment processes. The security strategy chosen by the data owner will directly influence how Watchers fix the issue of lost data and impact the convergence speed of the entire network's data objects.

Watchers are responsible for continuously monitoring and adjusting the data replication and distribution to ensure that the current data file is secure and that at least one resource is always accessible. They achieve this by detecting any changes in the network's topology, monitoring the status of each node, and adjusting the data replication and distribution accordingly. The security strategy chosen by the data owner will determine how Watchers adjust the data replication and distribution, and how quickly they converge on a solution in the event of lost data.

Overall, Infinity BOX provides data owners with the flexibility to define their security strategies, allowing them to balance their security needs with their storage space and monitoring requirements. Watchers continuously monitor and adjust the data replication and distribution to ensure data availability and protection against data loss, based on the security strategy chosen by the data owner.

Last updated