CN106534317B - A kind of calamity based on block chain technology is for cloud storage system construction method - Google Patents
A kind of calamity based on block chain technology is for cloud storage system construction method Download PDFInfo
- Publication number
- CN106534317B CN106534317B CN201611025145.2A CN201611025145A CN106534317B CN 106534317 B CN106534317 B CN 106534317B CN 201611025145 A CN201611025145 A CN 201611025145A CN 106534317 B CN106534317 B CN 106534317B
- Authority
- CN
- China
- Prior art keywords
- data
- index data
- cloud storage
- block
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of calamities based on block chain technology for cloud storage system construction method, it introduces block chain technology in cloud storage system building process, using the decentralization of block chain technology, the characteristics of trusting is gone to realize data exchange and data sharing in cloud storage system based on common recognition algorithm between the Distributed Autonomous and memory node of memory node.Compared with the centralization cloud service system of current mainstream, network node can establish multi-to-multi rather than one-to-many communication relationship, and the posting efficiency of data can be substantially improved;In data storage, exchange and blocking encapsulation, anonymous exchange and the asymmetry Encryption Algorithm for uploading, taking data in downloading process respectively, the safety and reliability of the entire ecological chain of data cloud storage greatly ensure that.Compared with the centralization cloud service system of current mainstream, running efficiency of system, which can be substantially improved, in the present invention on the basis of promoting Information Security reduces the operation cost of cloud storage service.
Description
Technical field
The invention belongs to cloud storage technical fields, and in particular to a kind of calamity based on block chain technology is for cloud storage system structure
Construction method.
Background technique
Cloud storage is the primary extension of cloud computing concept, and similar with cloud computing, cloud storage refers to through cluster application, grid
Different types of storage equipment a large amount of in network are gathered collaboration by virtualization software by technology or distributed file system
Work, it is common that data storage and business access function are externally provided, it is the management and use to virtualized memory resource.
In recent years, cloud storage service was commercialized by many Internet companies, such as it is domestic it is well-known have Baidu's cloud disk,
360 cloud disks etc..The cloud storage system being widely used at present is typical centralized system, i.e., is built by corresponding Internet company
Software platform, a large amount of servers of configuration and virtualization software come many multiple storage devices and the bridge of storage demand in communication network
Beam.The cloud storage service of this centralization is easily achieved and promotes, but it also has more obvious drawback, centralization platform
It builds and needs to expend a large amount of manpower and material resources, operating cost is higher, and as the increase centralization of network medium cloud storage demand is flat
Platform needs constantly to extend reinforcing to meet data exchange and shared rate requirement.The cloud storage system of this centralization is not
There is the marrow of realization " cloud ", better cloud storage system should be decentralization, can independently transport autonomous mechanism in a distributed manner
Capable data storage management system.
The appearance of block chain technology largely solves the technical problem of distributed cloud storage system building.Block chain
Technology has natural decentralization feature, can be realized the intercommunication mutual trust between each network node by algorithm of knowing together.It can
With, it is envisioned that by block chain technical application to calamity for cloud storage field may be implemented numerous network storage equipments and storage demand it
Between directly establish the communication relationship of multi-to-multi, without building unified management platform, so that building, transporting for system be greatly reduced
Row, management cost.
Summary of the invention
In view of above-mentioned, the present invention provides a kind of calamities based on block chain technology for cloud storage system construction method, can
Realize the building of Distributed Autonomous formula cloud storage system.
A kind of calamity based on block chain technology includes the following steps: for cloud storage system construction method
(1) the distributed autonomous calamity of building is for cloud storage system operation frame;
(2) blocking encapsulation is carried out by index data of the network storage node to client data to be stored, and will encapsulation
Independent blocks after the completion connect into block chain;
It (3) is to be packaged with the block of index data to carry Merkle tree check addition, to verify client depositing in systems
Whether storage data completely can be used;Shortage of data if it exists, network storage node alert user and carry out corresponding completion or secondary upload
Backup;
(4) index data is encrypted using rivest, shamir, adelman.
The concrete methods of realizing of the step (1) are as follows: cancel the centralization platform being widely present in current cloud storage system,
To realize that client is directly interacted with network storage node, entire cloud storage system is set to reach decentralization distributed autonomous;Visitor
Data to be stored is divided into data text and index data two parts when carrying out calamity for cloud storage by family end, and locally and extremely
Backup Data text in few two network storage nodes, by index data split into multiple index data packets it is encrypted after be stored in
In multiple network storage nodes.
The index data is one group of keyword for having obvious characteristic or distinguishing feature, therefore, to assure that by completely indexing
Data can find data text, the group of the fields such as " data name " " settling time " " modification time " " author " like clockwork
Conjunction can be used as index data.
Network storage node carries out block structure used by blocking encapsulation by area to index data in the step (2)
Build and block body composition, block head is the essential information column of independent blocks, and enclosed inside has a upper block and next block
Address information, reflect the timestamp of block packaging time, the file cryptographic Hash of index data and its for system extension
His data meta file;Multiple index data packet numbers of the corresponding same data text, all indexes are then encapsulated in block body
Package number finds Merkle tree root by Hash process and the Merkle tree root is credited in block head.
The sequencing that each independent blocks are temporally stabbed is connected into block chain by network storage node in the step (2)
As main chain, if there are multiple index data blocks of the same data text of correspondence for current network memory node, by it
In the index data block H that encapsulates earliest be connected on main chain, other index data blocks are sequentially connected to by packaging time
A shorter branch is formed on index data block H.
In the step (3) Merkle tree check addition the specific implementation process is as follows: between each network storage node mutually
The number of respectively deposited index data packet is sent, network storage node compiles two adjacent index data packets after being collected into number
Number new character string is formed after a Hash procedure, and then carry out Hash mistake again after merging two adjacent new character strings
Journey forms new character string, and so on, until Merkle tree root is obtained, the index that will be encapsulated in Merkle tree root and block head
Data file cryptographic Hash is compared, to verify whether the storing data of client in systems completely can be used.
Network storage node finds all index data packet numbers by Hash process in the step (3)
The index data file cryptographic Hash encapsulated in Merkle tree root block head is compared: if they are the same, then passing through verification;If it is different,
Alarm is then issued, requesting client repairs corresponding data or uploads partial data again;It is persistently kept if client is without response
Alarm reaches upper limit threshold until alarm number, if client has carried out data modification in time or has uploaded partial data again,
Duplication check process is until pass through verification.
The specific implementation process encrypted using rivest, shamir, adelman to index data in the step (4) is such as
Under: index data is split into multiple index data packets and is encrypted using private key by client when uploading index data;When
When client needs to download its storing data in systems, confirmation wants the index of downloading data and submits public key, has index
The storage for obtaining data text is decrypted using public key after summarizing all index data packets for the network storage node of data
Location is downloaded.
The generating process of the public key and private key are as follows: by calling random number generator to generate digit be 128 random
Number, and then the random number is converted by private key by hash algorithm SHA256 and Base58 and is supplied to client;The public key
For the random number by elliptic curve encryption algorithm according to 40 character length of original private keys text string generation, using hash algorithm
The random number is converted to by SHA256 and Base58.
The present invention can establish the calamity of decentralization, each network node Distributed Autonomous for cloud storage system, can be substantially
Reduce data cloud carrying cost;Due to present invention utilizes in block chain technology node common recognition algorithm and data upload and under
Rivest, shamir, adelman is used during carrying, the safety of storing data can be greatly improved, and effectively prevent leaking data or illegal
It distorts.
Detailed description of the invention
Fig. 1 is the block encapsulation schematic diagram of index data in block chain technology of the present invention.
Fig. 2 is the structural schematic diagram of block chain in the present invention.
Fig. 3 is the flow diagram of the complete availability verification of index data packet and alarm.
Fig. 4 is the process schematic that the encryption of index data packet uploads.
Fig. 5 is the generating process schematic diagram of public key and private key.
Fig. 6 is principle schematic diagram of the Distributed Autonomous formula calamity of the present invention for cloud storage system.
Specific embodiment
In order to more specifically describe the present invention, with reference to the accompanying drawing and specific embodiment is to technical solution of the present invention
It is described in detail.
The present invention is based on the calamities of block chain technology for cloud storage system construction method, the specific implementation process is as follows:
(1) the Distributed Autonomous formula calamity based on block chain technology is constructed for cloud storage system operation frame, is cancelled current cloud and is deposited
The centralization platform being widely present in storage system realizes the direct friendship of storage demand node (client) and network storage node
Mutually, enable entire cloud storage system to reach decentralization and distribution is autonomous.
In network there are a large amount of data storage requirement (client) and random distribution be ready sell depositing for memory space
Equipment is stored up, data to be stored is divided into data text and index data two parts first when carrying out calamity for cloud storage by client.
Wherein, index data is one group of keyword for having obvious characteristic or distinguishing feature, therefore, to assure that passes through complete index data energy
It is enough to find data text like clockwork.The combination of fields such as " data name " " settling time " " modification time " " authors " can be with
As index data.
For data text, client Backup Data text in local and x network storage node, x be greater than etc.
In 1 integer, x means that only 1 network node has data text when being equal to 1, if the network node, which has an accident, to lead
It causes the unavailable of stored data text or loses;X value means that more greatly the network node for having data text is more, client
When downloading cloud storage data, response and speed of download are faster, but the wave that will cause quite a few storage device storage capacity
Take, the value of x is set to 2 in the present invention.
For index data, client is split into multiple data packets and is stored in multiple network nodes after private key encryption
In.The relevant information of index data is carried out blocking encapsulation by each network storage node, and numerous data of this node will be present
The index data block of file is linked into block chain and is managed.Node in network is deposited by the verification of Merkle tree check addition
The integrality of data packet, if discovery data-bag lost or it is unavailable if to client issue alert, request repair or upload again
Data.
(2) index data of data to be stored is subjected to blocking encapsulation, and establishes block in each network storage node
Chain easily and safely manages storing data.
After network storage node receives the index data packet of client upload, blocking encapsulation, block structure are carried out
As shown in Figure 1.Each block is divided into block head and block body two parts, and the address information of the block is encapsulated in block head ---
" previous block " and " latter block " reflects " timestamp " of block packaging time, " index data file cryptographic Hash " and uses
" other data meta files " extended with system.Merkle tree check addition is then encapsulated in block body, to verify institute in network
The integrality and availability of deposit data, the Merkle root verified are compared with the file cryptographic Hash in block head, if two
Person is identical, proves that data are complete available.
For convenience of management, numerous blocks is linked into block chain by each network memory node, and numerous blocks are according to encapsulation
The main chain for being successively linked into one of time, if the node has multiple index data packets of the same data text, earliest
One block of encapsulation is linked on main chain, and the block of post package is consecutively connected to be formed on first block one shorter
Branch, as shown in Figure 2.
It (3) is the block carrying Merkle tree check addition for being packaged with storing data, whether verification network stored data packet is complete
It is whole available.
The cloud storage system of Distributed Autonomous need the packet for proving storage be on network it is complete, it is available.This means that every
A node for having index data packet needs to prove this section to the other nodes for having same textual data residue index data packet
Point possesses some or multiple index data encrypted packets.The working principle of Merkle tree check addition are as follows: between each memory node mutually
Index data packet number is sent, two adjacent index data packet numbers form new character string after a Hash procedure,
Two adjacent new character strings carry out Hash procedure again and form new character strings after merging, and so on, until Merkle root is obtained,
By Merkle with being compared with the file cryptographic Hash encapsulated in block, if they are the same, then by verification, if it is different, alarm is issued,
Requesting client repairing corresponding data or the upload for re-starting completion.
(4) it when finding that network stored data packet surprisingly lack or is unavailable, alerts user and is accordingly supplemented or secondary
Upload backup.
As shown in figure 3, each node timing for having index data packet mutually sends the index data packet respectively having
Number, is verified by Merkle tree process after node summarizes left and right index data packet number, if verifying successfully, is proved
Data packet in network is complete available;If verification failure is issuing alarm, client is reminded to repair or upload again number in time
According to lasting if user is without response that alarm is kept to reach the upper limit that system defines until alarm number;If client carries out in time
The repairing of data uploads again, and duplication check process is until pass through verification.
(5) cloud storage data are encrypted using rivest, shamir, adelman, guarantees the safety of storing data.
Client is encrypted after splitting index data packet using private key, the process is such as when uploading index data packet
Shown in Fig. 4.When client needs to download the data of storage, confirmation wants the index of downloading data and submits decryption public key, has rope
The storage address for obtaining data text is decrypted in all index data packets of the network node of argument evidence after summarizing, carry out down
It carries.
As shown in figure 5, the generating process of public key and private key are as follows: generating digit by calling random number generator is 128
Private key, the theoretical quantity of private key is up to great 2128, it is ensured that private data is cryptography safety.For convenient for identification,
It is converted to by hash algorithm SHA256 and Base58;Public key is by using this asymmetric arithmetic root of elliptic curve encryption algorithm
According to 40 character length random number of original private keys text string generation, it is converted to using hash algorithm SHA256 and Base58.
We construct the small-sized base including two storage demand nodes (client), 8 network storage nodes below
In block chain technology calamity for cloud storage system, system structure is as shown in Figure 6.Within the system, storage demand 1 is by textual data
Backup is stored in 1,2,3,5,6 nodes after encryption in node 1 and node 6, index data data packet;Storage demand 2 will
In node 3 and node 8, index data packet is stored in 3,4,7,8 nodes after encryption for textual data backup, other settings or
Method is arranged referring to summary of the invention, and the mini system can smoothly realize the cloud storage function of the Distributed Autonomous of decentralization after tested
Energy.
The above-mentioned description to embodiment is for that can understand and apply the invention convenient for those skilled in the art.
Person skilled in the art obviously easily can make various modifications to above-described embodiment, and described herein general
Principle is applied in other embodiments without having to go through creative labor.Therefore, the present invention is not limited to the above embodiments, ability
Field technique personnel announcement according to the present invention, the improvement made for the present invention and modification all should be in protection scope of the present invention
Within.
Claims (7)
1. a kind of calamity based on block chain technology includes the following steps: for cloud storage system construction method
(1) the distributed autonomous calamity of building is for cloud storage system operation frame, specific implementation are as follows: cancels current cloud storage system
The centralization platform being widely present in system makes entire cloud storage system to realize that client is directly interacted with network storage node
It is distributed autonomous to reach decentralization;Data to be stored is divided into data text and index when carrying out calamity for cloud storage by client
Data two parts, and the Backup Data text in local and at least two network storage nodes, index data are split into more
It is stored in after a index data packet is encrypted in multiple network storage nodes;
(2) blocking encapsulation is carried out by index data of the network storage node to client data to be stored, and encapsulation is completed
Independent blocks afterwards connect into block chain;
It (3) is the block carrying Merkle tree check addition for being packaged with index data, to verify the storage number of client in systems
According to whether completely available;Shortage of data if it exists, network storage node alert user and carry out corresponding completion or secondary upload backup;
(4) index data is encrypted using rivest, shamir, adelman.
2. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that: network in the step (2)
Memory node carries out block structure used by blocking encapsulation to index data and is made of block head and block body, and block head is
The essential information column of independent blocks, when enclosed inside has the address information of a upper block and next block, reflection block encapsulation
Between timestamp, index data file cryptographic Hash and for system extension other data meta files;It is then sealed in block body
Multiple index data packet numbers of the corresponding same data text are filled, all index data packet numbers are found by Hash process
The Merkle tree root and Merkle tree root is credited in block head.
3. calamity according to claim 2 is for cloud storage system construction method, it is characterised in that: network in the step (2)
The sequencing that each independent blocks are temporally stabbed is connected into block chain as main chain, if current network storage section by memory node
There are multiple index data blocks of the same data text of correspondence for point, then the index data block H that will wherein encapsulate earliest
It is connected on main chain, other index data blocks by packaging time is sequentially connected to be formed on index data block H one shorter
Branch.
4. calamity according to claim 2 is for cloud storage system construction method, it is characterised in that: in the step (3)
Merkle tree check addition the specific implementation process is as follows: respectively deposited index data packet is mutually sent between each network storage node
Number, network storage node be collected into number after make two adjacent index data packet numbers shape after a Hash procedure
The character string of Cheng Xin, and then carry out Hash procedure again after merging two adjacent new character strings and form new character string, with this
Analogize, until obtaining Merkle tree root, the index data file cryptographic Hash encapsulated in Merkle tree root and block head is compared
It is right, to verify whether the storing data of client in systems completely can be used.
5. calamity according to claim 4 is for cloud storage system construction method, it is characterised in that: network in the step (3)
The rope that memory node will encapsulate in Merkle tree root block head that all index data packet numbers are found by Hash process
Draw data file cryptographic Hash to be compared: if they are the same, then passing through verification;If it is different, then issuing alarm, requesting client repairs phase
It answers data or uploads partial data again;It is lasting if client is without response that alarm is kept to reach upper limit threshold until alarm number
Value, if client has carried out data modification in time or uploaded partial data again, duplication check process is until pass through verification.
6. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that: used in the step (4)
Rivest, shamir, adelman to index data encrypt the specific implementation process is as follows: client upload index data
When, index data is split into multiple index data packets and is encrypted using private key;When client needs to download it in system
In storing data when, confirmation wants the index of downloading data and submits public key, has the network storage node of index data for institute
It is downloaded after thering is index data packet to summarize using the storage address that acquisition data text is decrypted in public key.
7. calamity according to claim 6 is for cloud storage system construction method, it is characterised in that: the life of the public key and private key
At process are as follows: by calling random number generator to generate digit be 128 random numbers, and then by hash algorithm SHA256 and
The random number is converted into private key and is supplied to client by Base58;The public key is by elliptic curve encryption algorithm according to original private
The random number of 40 character length of key text string generation converts the random number using hash algorithm SHA256 and Base58
It arrives.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611025145.2A CN106534317B (en) | 2016-11-17 | 2016-11-17 | A kind of calamity based on block chain technology is for cloud storage system construction method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611025145.2A CN106534317B (en) | 2016-11-17 | 2016-11-17 | A kind of calamity based on block chain technology is for cloud storage system construction method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534317A CN106534317A (en) | 2017-03-22 |
CN106534317B true CN106534317B (en) | 2019-09-03 |
Family
ID=58353109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611025145.2A Active CN106534317B (en) | 2016-11-17 | 2016-11-17 | A kind of calamity based on block chain technology is for cloud storage system construction method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534317B (en) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451011B (en) * | 2017-03-24 | 2020-12-25 | 北京瑞卓喜投科技发展有限公司 | Error correction method and system for block chain of parallel added blocks |
CN111614655A (en) * | 2017-03-24 | 2020-09-01 | 创新先进技术有限公司 | Consensus checking method and device |
CN107450979B (en) | 2017-03-28 | 2020-06-02 | 创新先进技术有限公司 | Block chain consensus method and device |
CN106991165B (en) * | 2017-03-31 | 2020-07-31 | 京东数字科技控股有限公司 | Method and device for processing financial data based on block chain and electronic equipment |
CN107122682B (en) * | 2017-04-20 | 2019-02-05 | 杭州铜板街互联网金融信息服务有限公司 | Data processing method and system based on the storage of block chain |
CN107122477A (en) * | 2017-05-02 | 2017-09-01 | 成都中远信电子科技有限公司 | A kind of block chain storage system |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN107273410B (en) * | 2017-05-03 | 2020-07-07 | 上海点融信息科技有限责任公司 | Block chain based distributed storage |
CN107368184B (en) | 2017-05-12 | 2020-04-14 | 阿里巴巴集团控股有限公司 | Password input method and device in virtual reality scene |
CN108323232B (en) * | 2017-05-16 | 2020-01-24 | 北京大学深圳研究生院 | Method for maintaining index and chain topological structure between multi-level block chain systems |
CN107196934B (en) * | 2017-05-18 | 2019-05-10 | 电子科技大学 | A kind of cloud data managing method based on block chain |
CN107203344A (en) * | 2017-05-31 | 2017-09-26 | 郑州云海信息技术有限公司 | A kind of date storage method and data-storage system |
CN107273455B (en) * | 2017-05-31 | 2020-12-18 | 深圳前海微众银行股份有限公司 | Block chain data access method and device |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN107249046A (en) * | 2017-08-15 | 2017-10-13 | 李俊庄 | A kind of distributed cloud storage system construction method based on block chain |
CN107480559B (en) * | 2017-08-25 | 2019-08-20 | 北京中星仝创科技有限公司 | A kind of safe storage system and method for the block chain from chain data |
CN107659410A (en) * | 2017-08-30 | 2018-02-02 | 湖南众享政联科技有限公司 | Based on the anti-tamper official document transmission of block chain and storage method |
CN107734021B (en) | 2017-09-30 | 2020-04-07 | 深圳壹账通智能科技有限公司 | Block chain data uploading method and system, computer system and storage medium |
CN109660493B (en) * | 2017-10-11 | 2020-12-18 | 南京南瑞继保电气有限公司 | New energy centralized control cloud storage method based on block chain |
JP7453911B2 (en) | 2017-12-13 | 2024-03-21 | エヌチェーン ライセンシング アーゲー | System and method for securely sharing cryptographic materials |
CN108111585B (en) * | 2017-12-15 | 2021-08-31 | 成都波霎科技有限公司 | Distributed storage method based on block chain |
CN108062202A (en) * | 2017-12-15 | 2018-05-22 | 中链科技有限公司 | A kind of file block storage method and system |
CN108076148A (en) * | 2017-12-15 | 2018-05-25 | 成都链网络科技有限公司 | Storage system based on block chain |
CN108270874B (en) * | 2018-02-05 | 2021-04-23 | 武汉斗鱼网络科技有限公司 | Application program updating method and device |
CN108462582B (en) * | 2018-02-09 | 2020-03-27 | 北京欧链科技有限公司 | Feedback processing method and device in block chain |
CN108401026B (en) * | 2018-02-26 | 2020-06-19 | 深圳智乾区块链科技有限公司 | Block chain-based data storage method, system and computer-readable storage medium |
CN108549654B (en) * | 2018-03-09 | 2023-09-05 | 浙江昕微电子科技有限公司 | Big data analysis method based on image processing |
CN108647230B (en) * | 2018-03-29 | 2021-10-08 | 深圳市网心科技有限公司 | Distributed storage method, electronic device, and storage medium |
CN108712409B (en) * | 2018-05-09 | 2021-05-25 | 广西创轩科技有限公司 | Electronic bill transaction system based on private block chain |
CN108681760B (en) * | 2018-05-15 | 2021-09-14 | 恒生电子股份有限公司 | Data sending method, receiving method and device |
CN108764902B (en) * | 2018-05-23 | 2020-12-22 | 北京京东尚科信息技术有限公司 | Method, node and blockchain system for storing data |
CN109165122B (en) * | 2018-08-13 | 2021-10-29 | 浙商银行股份有限公司 | Method for improving disaster recovery capability of application system same city multi-park deployment realized based on block chain technology |
CN109274717B (en) * | 2018-08-22 | 2021-08-24 | 泰康保险集团股份有限公司 | Block chain based shared storage method, device, medium and electronic equipment |
CN109284625A (en) * | 2018-09-03 | 2019-01-29 | 佛山科学技术学院 | A kind of Data Access Security method and device based on block chain |
CN109271283A (en) * | 2018-09-06 | 2019-01-25 | 北京云测信息技术有限公司 | A kind of data back up method based on block chain |
CN110958285B (en) * | 2018-09-27 | 2023-03-31 | 安徽华峪文化科技有限公司 | Data storage system based on block chain |
CN109408523B (en) * | 2018-10-10 | 2020-06-02 | 罗克佳华科技集团股份有限公司 | Data sharing method and device, data sharing platform and electronic equipment |
CN109493017B (en) * | 2018-11-05 | 2021-11-23 | 江苏大学 | Trusted outsourcing storage method based on block chain |
CN109753823B (en) * | 2018-12-11 | 2021-11-02 | 烨链(上海)科技有限公司 | Block chain data supervision method, system and computer storage medium |
CN109766723A (en) * | 2018-12-11 | 2019-05-17 | 烨链(上海)科技有限公司 | A kind of block chain data framework, regulatory framework, monitoring and managing method and computer readable storage medium |
CN109739927A (en) * | 2018-12-12 | 2019-05-10 | 北京世纪互联宽带数据中心有限公司 | Date storage method and its device, electronic equipment, computer-readable medium |
CN109753810B (en) * | 2018-12-12 | 2021-06-29 | 北京世纪互联宽带数据中心有限公司 | Data hierarchical storage method and device, electronic equipment and computer readable medium |
CN109583899A (en) * | 2018-12-20 | 2019-04-05 | 鸿秦(北京)科技有限公司 | Data storage and management method and system based on cloud storage service device |
CN109936620B (en) * | 2019-01-21 | 2022-02-01 | 中国联合网络通信集团有限公司 | Block chain-based storage method, device, system and storage medium |
CN109788060B (en) * | 2019-01-22 | 2021-05-07 | 曲阜师范大学 | Cloud data sharing and updating method based on block chain |
CN109889504B (en) * | 2019-01-23 | 2020-08-28 | 北京航空航天大学 | Decentralized data access right transaction method and system |
CN109727135A (en) * | 2019-01-23 | 2019-05-07 | 昧来网络科技(上海)有限公司 | Promote method, the computer-readable medium of the operation of block chain information and processing capacity |
CN109918874B (en) * | 2019-03-14 | 2022-09-02 | 度小满科技(北京)有限公司 | Physical information storage method and device and physical information searching method and device |
CN112152981B (en) * | 2019-06-29 | 2021-11-19 | 华为技术有限公司 | Communication method, node and communication system |
CN110321723B (en) * | 2019-07-08 | 2021-11-09 | 环玺信息科技(上海)有限公司 | Block chain safety information processing system and method, electronic equipment and medium |
CN111104686B (en) * | 2019-09-10 | 2021-07-30 | 腾讯科技(深圳)有限公司 | Block chain network control method, device, equipment and storage medium |
CN110989934B (en) * | 2019-12-05 | 2023-08-25 | 达闼机器人股份有限公司 | Block chain link point data storage method, block chain system and block chain node |
CN111159741A (en) * | 2019-12-30 | 2020-05-15 | 深圳探科技术有限公司 | Block chain intelligent contract information safety system |
CN111400751A (en) * | 2020-03-12 | 2020-07-10 | 厦门区块链云科技有限公司 | Disaster recovery cloud storage system construction method based on block chain technology |
CN111368333A (en) * | 2020-03-26 | 2020-07-03 | 国金公用通链(海南)信息科技有限公司 | Universal block chain key encapsulation technology |
CN111586109B (en) * | 2020-04-17 | 2023-04-28 | 上海坤仪金科信息技术有限公司 | Block chain cloud storage user data deduplication solution method |
CN111831743B (en) * | 2020-06-05 | 2023-11-14 | 广东科学技术职业学院 | Block chain data storage system and method based on cloud storage |
CN111427965B (en) * | 2020-06-10 | 2020-10-23 | 浙江和达科技股份有限公司 | Management method and management system for water affair data |
CN111723071A (en) * | 2020-06-18 | 2020-09-29 | 江苏优网智能科技有限公司 | Distributed dynamic point cloud storage technology |
CN112019330B (en) * | 2020-08-04 | 2024-03-29 | 广东省科技基础条件平台中心 | Intranet security audit data storage method and system based on alliance chain |
CN112750514A (en) * | 2021-01-30 | 2021-05-04 | 云知声智能科技股份有限公司 | Medical record management method and system based on block chain technology |
CN112948856B (en) * | 2021-03-03 | 2022-11-15 | 电信科学技术第五研究所有限公司 | Tamper-proof credible network collaborative control system and implementation method |
CN115052008B (en) * | 2022-05-26 | 2023-07-25 | 南京邮电大学 | Block chain data under-chain storage method based on cloud storage |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106022681A (en) * | 2016-05-13 | 2016-10-12 | 杭州云象网络技术有限公司 | Logistics tracking method based on block chain |
CN106130779A (en) * | 2016-07-18 | 2016-11-16 | 布比(北京)网络技术有限公司 | A kind of Internet of Things equipment and with the Internet of Things construction method of this equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9569771B2 (en) * | 2011-04-29 | 2017-02-14 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
-
2016
- 2016-11-17 CN CN201611025145.2A patent/CN106534317B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106022681A (en) * | 2016-05-13 | 2016-10-12 | 杭州云象网络技术有限公司 | Logistics tracking method based on block chain |
CN106130779A (en) * | 2016-07-18 | 2016-11-16 | 布比(北京)网络技术有限公司 | A kind of Internet of Things equipment and with the Internet of Things construction method of this equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106534317A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534317B (en) | A kind of calamity based on block chain technology is for cloud storage system construction method | |
CN112396423B (en) | Transaction data processing method, device, equipment and storage medium | |
WO2019214312A1 (en) | Blockchain-based logistics information transmission method, system and device | |
CN109889497B (en) | Distrust-removing data integrity verification method | |
CN111444277B (en) | Anti-terrorism information cooperative sharing platform and method based on blockchain technology | |
Yu et al. | Toward data security in edge intelligent IIoT | |
CN111461879A (en) | Block chain-based government affair service processing system and method | |
CN108683747A (en) | Resource acquisition, distribution, method for down loading, device, equipment and storage medium | |
CN107249046A (en) | A kind of distributed cloud storage system construction method based on block chain | |
CN110032545A (en) | File memory method, system and electronic equipment based on block chain | |
CN105873031B (en) | Distributed unmanned plane cryptographic key negotiation method based on credible platform | |
CN103718164A (en) | Virtual computer and service | |
CN110690961B (en) | Quantum network function virtualization method and device | |
CN104484187B (en) | A kind of information integration method and system | |
CN111931215B (en) | Data management method and device and storage medium | |
Li et al. | Solving the last mile problem in logistics: A mobile edge computing and blockchain‐based unmanned aerial vehicle delivery system | |
CN110690962B (en) | Application method and device of service node | |
CN112529508A (en) | Electric power material management system based on PBFT alliance chain | |
JP2023535914A (en) | Sustainable tokens for supply chains with confidentiality protocols | |
CN110555783B (en) | Block chain-based electric power marketing data protection method and system | |
CN115208665A (en) | Block chain-based germplasm resource data secure sharing method and system | |
Wibowo et al. | Blockchain implementation assessment framework, case study of IoT LPWA licensing in Indonesia | |
CN112380179A (en) | Block chain-based steel supply chain information secret sharing method and system | |
Wang | Sok: Applying blockchain technology in industrial internet of things | |
CN112927079A (en) | Block chain-based digital asset management of power industry |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |