Skip to main content

System Architecture

💜 Support the DIG Network

Help build the future of decentralized storage! The DIG Network is an open-source project that needs community support to continue development.

💜 Support the Project → - Donate crypto, buy NFTs, or sponsor development

The DIG Network implements a four-layer architecture that separates concerns while maintaining cryptographic linkage between components. This design enables independent evolution of each layer while preserving system integrity.

Architecture Layers

┌─────────────────────────────────────────────────────────────────────────────────┐
│ DIG Network System Architecture │
├─────────────────────────────────────────────────────────────────────────────────┤
│ │
│ CONTENT LAYER │
│ ┌──────────────────────────────────────────────────────────────────────────┐ │
│ │ DataStores (NFTs) → DIG Handles → Content Fragmentation → Merkle Trees │ │
│ │ Content packaging with cryptographic integrity and human-readable names │ │
│ └──────────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ COORDINATION LAYER (Chia Blockchain) │
│ ┌─────────────────────────────────────────────────────────────────────────┐ │
│ │ PlotCoins → Proof Registry → Stake Management → Reward Distribution │ │
│ │ On-chain coordination with privacy-preserving verification │ │
│ └─────────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ STORAGE LAYER │
│ ┌─────────────────────────────────────────────────────────────────────────┐ │
│ │ DIG Nodes → Plot Files → Capsule Storage → Proof Generation │ │
│ │ Distributed storage with cryptographic commitment │ │
│ └─────────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ VALIDATION LAYER │
│ ┌─────────────────────────────────────────────────────────────────────────┐ │
│ │ Random Selection → Proof Verification → Fraud Detection → Rewards │ │
│ │ Trustless verification ensuring network integrity │ │
│ └─────────────────────────────────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────────────────────────────────┘

Content Layer

The content layer handles data packaging and addressing:

  • DataStore NFTs: Immutable content containers with Merkle tree integrity
  • DIG Handles: Human-readable domain system (@dig:<handle>)
  • Content Fragmentation: Capsule-level splitting for distributed storage
  • Merkle Organization: Cryptographic integrity verification

Coordination Layer

Built on Chia blockchain for decentralized consensus:

  • PlotCoin Registry: Maps data to storage providers with proof commitments
  • Stake Management: Economic security through token staking
  • Reward Distribution: Automated incentive payments
  • Privacy Preservation: Zero-knowledge proof verification

Storage Layer

Distributed storage network of independent operators:

  • DIG Nodes: Storage providers running specialized software
  • Plot Files: Cryptographically secured storage containers
  • Capsule Storage: Content-agnostic fragment storage
  • Proof Generation: Four-part cryptographic Proof of Living Storage

Validation Layer

Ensures network integrity through cryptographic verification:

  • Random Selection: Deterministic VRF-based capsule selection
  • Proof Verification: Mathematical validation of storage claims
  • Fraud Detection: Identifies and penalizes malicious behavior
  • Reward Distribution: Fair compensation for honest providers

Core Design Principles

Separation of Concerns

Each layer operates independently while maintaining cryptographic linkage:

  • Content layer focuses on user experience and data integrity
  • Coordination layer provides consensus without storing data
  • Storage layer optimizes for performance and reliability
  • Validation layer ensures trustless verification

Economic-Driven Distribution

The architecture embeds economic incentives at every level:

  • Content Layer: Handle pricing signals value to the network
  • Coordination Layer: Staking requirements prevent Sybil attacks
  • Storage Layer: Reward optimization drives efficient distribution
  • Validation Layer: Performance-based rewards ensure quality service

Privacy-Preserving Verification

Zero-knowledge proofs enable validation without data exposure:

  • Storage providers prove possession without revealing content
  • Validators verify claims without accessing raw data
  • Users maintain privacy while ensuring availability
  • Network achieves transparency without compromising security

Technical Components

Primitives

The architecture relies on carefully designed primitives:

Off-Chain Primitives:

  • Plots: 7-table storage format with embedded PoW
  • Carts: Data transport packages (WIP)

On-Chain Primitives:

Proof of Living Storage

The comprehensive Proof of Living Storage enables trustless verification:

  1. Plot Ownership: Digital signature verification
  2. Data Inclusion: Merkle proof validation
  3. Computational Work: PoW binding verification
  4. Physical Access: Real-time access validation

Data Flow Patterns

The architecture supports three primary flows:

Publishing Flow

  1. Create DataStore with content
  2. Register DIG Handle (economic value signal to network)
  3. Create CapsuleStakeCoins (per-capsule collateral commitment)
  4. Network propagates to DIG Nodes based on economic signals
  5. Witness Nodes validate storage against DIG Nodes
  6. Multisig validator authorizes rewards for verified storage

Storage Flow

  1. Discover valuable content
  2. Generate plot with proofs
  3. Register PlotCoin on-chain
  4. Serve content for rewards

Access Flow

  1. Resolve DIG Handle to providers
  2. Query PlotCoin registry
  3. Retrieve and verify content
  4. Cache for performance

Integration Points

The architecture provides clear integration interfaces:

For Developers

  • DataStore creation APIs
  • DIG Handle registration
  • Content retrieval SDKs
  • Proof verification libraries

For Storage Providers

  • DIG Node software
  • Plot generation tools
  • P2P discovery protocol
  • Reward claiming interface

For Validators

  • Proof verification suite
  • Random selection algorithm
  • Reward distribution tools
  • Fraud detection systems

Security Model

Multi-layered security ensures system integrity:

Cryptographic Security

  • Four-part Proof of Living Storage prevents forgery
  • Merkle trees ensure content integrity
  • Digital signatures verify ownership
  • Zero-knowledge proofs preserve privacy

Economic Security

  • Staking requirements align incentives
  • Slashing penalties deter misbehavior
  • Tiered rewards (handle tier + capsule size) encourage quality service
  • Market dynamics prevent centralization

Network Security

  • Distributed architecture resists attacks
  • Random validation prevents gaming
  • P2P propagation ensures redundancy
  • Consensus integration provides finality