System Architecture
Help build the future of decentralized storage! The DIG Network is an open-source project that needs community support to continue development.
💜 Support the Project → - Donate crypto, buy NFTs, or sponsor development
The DIG Network implements a four-layer architecture that separates concerns while maintaining cryptographic linkage between components. This design enables independent evolution of each layer while preserving system integrity.
Architecture Layers
┌─────────────────────────────────────────────────────────────────────────────────┐
│ DIG Network System Architecture │
├─────────────────────────────────────────────────────────────────────────────────┤
│ │
│ CONTENT LAYER │
│ ┌──────────────────────────────────────────────────────────────────────────┐ │
│ │ DataStores (NFTs) → DIG Handles → Content Fragmentation → Merkle Trees │ │
│ │ Content packaging with cryptographic integrity and human-readable names │ │
│ └──────────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ COORDINATION LAYER (Chia Blockchain) │
│ ┌─────────────────────────────────────────────────────────────────────────┐ │
│ │ PlotCoins → Proof Registry → Stake Management → Reward Distribution │ │
│ │ On-chain coordination with privacy-preserving verification │ │
│ └─────────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ STORAGE LAYER │
│ ┌─────────────────────────────────────────────────────────────────────────┐ │
│ │ DIG Nodes → Plot Files → Capsule Storage → Proof Generation │ │
│ │ Distributed storage with cryptographic commitment │ │
│ └─────────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ VALIDATION LAYER │
│ ┌─────────────────────────────────────────────────────────────────────────┐ │
│ │ Random Selection → Proof Verification → Fraud Detection → Rewards │ │
│ │ Trustless verification ensuring network integrity │ │
│ └─────────────────────────────────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────────────────────────────────┘
Content Layer
The content layer handles data packaging and addressing:
- DataStore NFTs: Immutable content containers with Merkle tree integrity
- DIG Handles: Human-readable domain system (@dig:<handle>)
- Content Fragmentation: Capsule-level splitting for distributed storage
- Merkle Organization: Cryptographic integrity verification
Coordination Layer
Built on Chia blockchain for decentralized consensus:
- PlotCoin Registry: Maps data to storage providers with proof commitments
- Stake Management: Economic security through token staking
- Reward Distribution: Automated incentive payments
- Privacy Preservation: Zero-knowledge proof verification
Storage Layer
Distributed storage network of independent operators:
- DIG Nodes: Storage providers running specialized software
- Plot Files: Cryptographically secured storage containers
- Capsule Storage: Content-agnostic fragment storage
- Proof Generation: Four-part cryptographic Proof of Living Storage
Validation Layer
Ensures network integrity through cryptographic verification:
- Random Selection: Deterministic VRF-based capsule selection
- Proof Verification: Mathematical validation of storage claims
- Fraud Detection: Identifies and penalizes malicious behavior
- Reward Distribution: Fair compensation for honest providers
Core Design Principles
Separation of Concerns
Each layer operates independently while maintaining cryptographic linkage:
- Content layer focuses on user experience and data integrity
- Coordination layer provides consensus without storing data
- Storage layer optimizes for performance and reliability
- Validation layer ensures trustless verification
Economic-Driven Distribution
The architecture embeds economic incentives at every level:
- Content Layer: Handle pricing signals value to the network
- Coordination Layer: Staking requirements prevent Sybil attacks
- Storage Layer: Reward optimization drives efficient distribution
- Validation Layer: Performance-based rewards ensure quality service
Privacy-Preserving Verification
Zero-knowledge proofs enable validation without data exposure:
- Storage providers prove possession without revealing content
- Validators verify claims without accessing raw data
- Users maintain privacy while ensuring availability
- Network achieves transparency without compromising security
Technical Components
Primitives
The architecture relies on carefully designed primitives:
Off-Chain Primitives:
On-Chain Primitives:
- PlotCoins: Storage commitment registry
- DataStores: NFT-based content containers
- DIG Handles: Domain name system
- CapsuleStakeCoins: Per-capsule collateral commitments
- Rewards Distributor: Incentive distribution
Proof of Living Storage
The comprehensive Proof of Living Storage enables trustless verification:
- Plot Ownership: Digital signature verification
- Data Inclusion: Merkle proof validation
- Computational Work: PoW binding verification
- Physical Access: Real-time access validation
Data Flow Patterns
The architecture supports three primary flows:
Publishing Flow
- Create DataStore with content
- Register DIG Handle (economic value signal to network)
- Create CapsuleStakeCoins (per-capsule collateral commitment)
- Network propagates to DIG Nodes based on economic signals
- Witness Nodes validate storage against DIG Nodes
- Multisig validator authorizes rewards for verified storage
Storage Flow
- Discover valuable content
- Generate plot with proofs
- Register PlotCoin on-chain
- Serve content for rewards
Access Flow
- Resolve DIG Handle to providers
- Query PlotCoin registry
- Retrieve and verify content
- Cache for performance
Integration Points
The architecture provides clear integration interfaces:
For Developers
- DataStore creation APIs
- DIG Handle registration
- Content retrieval SDKs
- Proof verification libraries
For Storage Providers
- DIG Node software
- Plot generation tools
- P2P discovery protocol
- Reward claiming interface
For Validators
- Proof verification suite
- Random selection algorithm
- Reward distribution tools
- Fraud detection systems
Security Model
Multi-layered security ensures system integrity:
Cryptographic Security
- Four-part Proof of Living Storage prevents forgery
- Merkle trees ensure content integrity
- Digital signatures verify ownership
- Zero-knowledge proofs preserve privacy
Economic Security
- Staking requirements align incentives
- Slashing penalties deter misbehavior
- Tiered rewards (handle tier + capsule size) encourage quality service
- Market dynamics prevent centralization
Network Security
- Distributed architecture resists attacks
- Random validation prevents gaming
- P2P propagation ensures redundancy
- Consensus integration provides finality
Related Documentation
- System Components - Detailed component interactions
- Network Participants - Roles and responsibilities
- Content Propagation - Distribution mechanisms
- Incentive Model - Economic design details