탈중앙화 저장소
중앙 서버 없는 데이터 보관 방식.
## Content Addressing vs Location Addressing
Traditional storage uses Location Addressing (e.g., 'go to server X to get file Y'). Decentralized storage uses Content Addressing (e.g., 'anyone who has file with hash Z, please provide it'). This makes the web more resilient because if one server goes down, the same file can be retrieved from anyone else on the network who has it, verified by its unique cryptographic fingerprint.
graph LR
Center["탈중앙화 저장소"]:::main
Pre_cryptographic_hashing["cryptographic-hashing"]:::pre --> Center
click Pre_cryptographic_hashing "/terms/cryptographic-hashing"
Pre_encryption["encryption"]:::pre --> Center
click Pre_encryption "/terms/encryption"
Center --> Child_ipfs["ipfs"]:::child
click Child_ipfs "/terms/ipfs"
Center --> Child_filecoin["filecoin"]:::child
click Child_filecoin "/terms/filecoin"
Center --> Child_arweave["arweave"]:::child
click Child_arweave "/terms/arweave"
Rel_cloud_computing["cloud-computing"]:::related -.-> Center
click Rel_cloud_computing "/terms/cloud-computing"
Rel_blockchain["blockchain"]:::related -.-> Center
click Rel_blockchain "/terms/blockchain"
Rel_web3["web3"]:::related -.-> Center
click Rel_web3 "/terms/web3"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5살도 이해할 수 있게 설명
Centralized storage is keeping all your papers in one office building. Decentralized storage is like shredding those papers, mixing them up, and giving one tiny piece to 100 different people. Only you have the magic key to put them back together.
🤓 Expert Deep Dive
## Content Addressing vs Location Addressing
Traditional storage uses Location Addressing (e.g., 'go to server X to get file Y'). Decentralized storage uses Content Addressing (e.g., 'anyone who has file with hash Z, please provide it'). This makes the web more resilient because if one server goes down, the same file can be retrieved from anyone else on the network who has it, verified by its unique cryptographic fingerprint.