# Data Lifecycle

User data uploaded to the CESS network undergo the following lifecycle. We will cover them in-depth here.

* [**Data Upload**](https://doc.cess.network/ref/data-lifecycle/upload): Through CESS clients or gateways, users upload data to the rented storage space. CESS uses erasure codes to store the data on multiple storage nodes with 1.5 times redundancy.
* [**Data Download**](https://doc.cess.network/ref/data-lifecycle/download): Data on CESS is available for download. The file meta information is saved on-chain. Users can use a client or gateway to retrieve the data locally.
* [**Data Deletion**](https://doc.cess.network/ref/data-lifecycle/delete): CESS node deletes the data upon their owner requests and intelligently handles replacing active data back with idle data.
* [**Data Restore**](https://doc.cess.network/ref/data-lifecycle/restore): CESS ensures the integrity of user data through a storage challenge mechanism. When a data block is found to be lost, CESS immediately repairs the data block.
* [**Data Audit**](https://doc.cess.network/ref/data-lifecycle/audit): CESS has developed a series of audit algorithms and reward mechanisms to ensure the data stored in the storage nodes is honestly and objectively served.
