FIRST STAGE: KAK FILE
File storage and search:KAK File stores and searches files based on content, a long string generated by the hash function in KAK FILE for each stored file, rather than address. Only ask "Who owns this file" can you request a file from KAK File and then the node where the file is stored in the system will provide this file. If you want to verify the file, you only need to compare the hash value of the file we got with the hash value we requested from KAK File. If the hash value are the same, then we get the correct and complete file.
Proof of data storage:Proof of data storage in KAK File includes a data integrity validation mechanism and a data space-time validation mechanism. The main application technologies are proof of replication and proof of space-time. The proof of replication PoRep will be used to verify the integrity of the data storage, ensuring the independence of each data storage while preventing sybil attacks, external attacks and generation attacks. Proof of space-time PoST validation checks whether the node has stored the outsourced data within the specified time.
KPoS Consensus Mechanism:Similar to existing PoS projects, candidate nodes of KAKLAB need to pledge KAK to compete to be validators. At the same time, candidate nodes can send a request to other KAKLAB participants, and the latter will pledge KAK to the Staking of the former and share the income.
Incentive and punishment:Nodes participating in file storage in KAK File will be rewarded through the consensus mechanism.
STORAGE REWARD：Storage service providers deposit KAK to become a storage service provider, and provide storage service within specific time to obtain rewards from customers.
BLOCK GENERATION REWARD：Storage service providers become validators through competition, and obtain rewards and fees through packaging blocks.
When the following rules are triggered, they will be punished or even emptied
Consensus attack punishment：if a qualified node does not generate a new block required by the consensus mechanism, it will be regarded as a network attack.
Failure to submit the storage proof within specified time：if the delay time exceeds the generation attack threshold value, it will be considered as malicious offline that affects the security of the stored file.
Error in submitted storage proof：when a node has disk damage or data loss, it shall try to recover the data. If the proof submitted by the node deviates from the hash value of the customer's source file, and the data is not recovered within specified time, it will be considered as malicious destruction.
SECOND STAGE: KAK Protocol
NFT asset protocol
In KAK Protocol stage, Developers can use or create various standardized NFT asset protocols because KAK Protocol is compatible with widely used NFT asset protocols such as ERC721 and ERC1155. In addition, KAK Protocol will also support more types of NFT asset protocols such as dynamic, cross-chain, division and reorganization and financial protocols.
ERC721：ERC-721 is a free, open standard that describes how to build non-fungible or unique tokens on the Ethereum blockchain. While most tokens are fungible (every token is the same as every other token), ERC-721 tokens are all unique.
ERC1155：ERC-1155 supports an unlimited number of NFTs in one smart contract, and multiple NFTs s can be sent in one transaction
ERC889：ERC-998 can compose multiple ERC-721 and ERC-20 tokens, thus Composable NFTs (abbreviated as CNFT), which allows any NFT to be bundled with other NFTs or FTs. When transferring CNFT, it means transferring the entire hierarchical structure and ownership of CNFTs.
NFT dynamic protocol:NFT dynamic protocols can trigger changes in response to corresponding events in the real world, such as casting, destroying, or changing its own attributes, such as NFT data, face value, multimedia presentation form and other information.
NFT cross-chain protocol:
NFT cross-chain protocols will provide huge interoperability for NFT between KAKLAB and other main chains, including scenarios such as transmission, transaction, Defi, etc.
NFT financial protocol:
NFT financial protocols will realize NFT decentralized trading market and more financial transactions of NFT derivatives, such as options, contracts, debts, indexes, etc.
NFT segmenting and recasting protocol:
NFT segmenting and recasting protocols can solve the segmenting and recasting of NFTs, and generate new value for the issued NFTs.
At the same time, Through cross-chain bridge with smart contracts, NFT assets will be transferred in KAKLAB and other blockchain ecosystems and realize value interoperability.
Application layer development
KAKLAB application layer can be divided into two sub-layers: “application end” and “execution end”. Application end includes scripts, APIs, user interfaces and application architecture; execution end is the sub-layer that constitutes the smart contract and blockchain code, including actual code to be executed and executed.