CN106534317B - A kind of calamity based on block chain technology is for cloud storage system construction method - Google Patents

A kind of calamity based on block chain technology is for cloud storage system construction method Download PDF

Info

Publication number
CN106534317B
CN106534317B CN201611025145.2A CN201611025145A CN106534317B CN 106534317 B CN106534317 B CN 106534317B CN 201611025145 A CN201611025145 A CN 201611025145A CN 106534317 B CN106534317 B CN 106534317B
Authority
CN
China
Prior art keywords
data
index data
cloud storage
block
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611025145.2A
Other languages
Chinese (zh)
Other versions
CN106534317A (en
Inventor
黄步添
陈建海
刘振广
王云霄
杨文龙
张维赛
王备
温琪
杨正清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Network Technology Co Ltd
Original Assignee
Hangzhou Yunxiang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Network Technology Co Ltd filed Critical Hangzhou Yunxiang Network Technology Co Ltd
Priority to CN201611025145.2A priority Critical patent/CN106534317B/en
Publication of CN106534317A publication Critical patent/CN106534317A/en
Application granted granted Critical
Publication of CN106534317B publication Critical patent/CN106534317B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of calamities based on block chain technology for cloud storage system construction method, it introduces block chain technology in cloud storage system building process, using the decentralization of block chain technology, the characteristics of trusting is gone to realize data exchange and data sharing in cloud storage system based on common recognition algorithm between the Distributed Autonomous and memory node of memory node.Compared with the centralization cloud service system of current mainstream, network node can establish multi-to-multi rather than one-to-many communication relationship, and the posting efficiency of data can be substantially improved;In data storage, exchange and blocking encapsulation, anonymous exchange and the asymmetry Encryption Algorithm for uploading, taking data in downloading process respectively, the safety and reliability of the entire ecological chain of data cloud storage greatly ensure that.Compared with the centralization cloud service system of current mainstream, running efficiency of system, which can be substantially improved, in the present invention on the basis of promoting Information Security reduces the operation cost of cloud storage service.

Description

A kind of calamity based on block chain technology is for cloud storage system construction method
Technical field
The invention belongs to cloud storage technical fields, and in particular to a kind of calamity based on block chain technology is for cloud storage system structure Construction method.
Background technique
Cloud storage is the primary extension of cloud computing concept, and similar with cloud computing, cloud storage refers to through cluster application, grid Different types of storage equipment a large amount of in network are gathered collaboration by virtualization software by technology or distributed file system Work, it is common that data storage and business access function are externally provided, it is the management and use to virtualized memory resource.
In recent years, cloud storage service was commercialized by many Internet companies, such as it is domestic it is well-known have Baidu's cloud disk, 360 cloud disks etc..The cloud storage system being widely used at present is typical centralized system, i.e., is built by corresponding Internet company Software platform, a large amount of servers of configuration and virtualization software come many multiple storage devices and the bridge of storage demand in communication network Beam.The cloud storage service of this centralization is easily achieved and promotes, but it also has more obvious drawback, centralization platform It builds and needs to expend a large amount of manpower and material resources, operating cost is higher, and as the increase centralization of network medium cloud storage demand is flat Platform needs constantly to extend reinforcing to meet data exchange and shared rate requirement.The cloud storage system of this centralization is not There is the marrow of realization " cloud ", better cloud storage system should be decentralization, can independently transport autonomous mechanism in a distributed manner Capable data storage management system.
The appearance of block chain technology largely solves the technical problem of distributed cloud storage system building.Block chain Technology has natural decentralization feature, can be realized the intercommunication mutual trust between each network node by algorithm of knowing together.It can With, it is envisioned that by block chain technical application to calamity for cloud storage field may be implemented numerous network storage equipments and storage demand it Between directly establish the communication relationship of multi-to-multi, without building unified management platform, so that building, transporting for system be greatly reduced Row, management cost.
Summary of the invention
In view of above-mentioned, the present invention provides a kind of calamities based on block chain technology for cloud storage system construction method, can Realize the building of Distributed Autonomous formula cloud storage system.
A kind of calamity based on block chain technology includes the following steps: for cloud storage system construction method
(1) the distributed autonomous calamity of building is for cloud storage system operation frame;
(2) blocking encapsulation is carried out by index data of the network storage node to client data to be stored, and will encapsulation Independent blocks after the completion connect into block chain;
It (3) is to be packaged with the block of index data to carry Merkle tree check addition, to verify client depositing in systems Whether storage data completely can be used;Shortage of data if it exists, network storage node alert user and carry out corresponding completion or secondary upload Backup;
(4) index data is encrypted using rivest, shamir, adelman.
The concrete methods of realizing of the step (1) are as follows: cancel the centralization platform being widely present in current cloud storage system, To realize that client is directly interacted with network storage node, entire cloud storage system is set to reach decentralization distributed autonomous;Visitor Data to be stored is divided into data text and index data two parts when carrying out calamity for cloud storage by family end, and locally and extremely Backup Data text in few two network storage nodes, by index data split into multiple index data packets it is encrypted after be stored in In multiple network storage nodes.
The index data is one group of keyword for having obvious characteristic or distinguishing feature, therefore, to assure that by completely indexing Data can find data text, the group of the fields such as " data name " " settling time " " modification time " " author " like clockwork Conjunction can be used as index data.
Network storage node carries out block structure used by blocking encapsulation by area to index data in the step (2) Build and block body composition, block head is the essential information column of independent blocks, and enclosed inside has a upper block and next block Address information, reflect the timestamp of block packaging time, the file cryptographic Hash of index data and its for system extension His data meta file;Multiple index data packet numbers of the corresponding same data text, all indexes are then encapsulated in block body Package number finds Merkle tree root by Hash process and the Merkle tree root is credited in block head.
The sequencing that each independent blocks are temporally stabbed is connected into block chain by network storage node in the step (2) As main chain, if there are multiple index data blocks of the same data text of correspondence for current network memory node, by it In the index data block H that encapsulates earliest be connected on main chain, other index data blocks are sequentially connected to by packaging time A shorter branch is formed on index data block H.
In the step (3) Merkle tree check addition the specific implementation process is as follows: between each network storage node mutually The number of respectively deposited index data packet is sent, network storage node compiles two adjacent index data packets after being collected into number Number new character string is formed after a Hash procedure, and then carry out Hash mistake again after merging two adjacent new character strings Journey forms new character string, and so on, until Merkle tree root is obtained, the index that will be encapsulated in Merkle tree root and block head Data file cryptographic Hash is compared, to verify whether the storing data of client in systems completely can be used.
Network storage node finds all index data packet numbers by Hash process in the step (3) The index data file cryptographic Hash encapsulated in Merkle tree root block head is compared: if they are the same, then passing through verification;If it is different, Alarm is then issued, requesting client repairs corresponding data or uploads partial data again;It is persistently kept if client is without response Alarm reaches upper limit threshold until alarm number, if client has carried out data modification in time or has uploaded partial data again, Duplication check process is until pass through verification.
The specific implementation process encrypted using rivest, shamir, adelman to index data in the step (4) is such as Under: index data is split into multiple index data packets and is encrypted using private key by client when uploading index data;When When client needs to download its storing data in systems, confirmation wants the index of downloading data and submits public key, has index The storage for obtaining data text is decrypted using public key after summarizing all index data packets for the network storage node of data Location is downloaded.
The generating process of the public key and private key are as follows: by calling random number generator to generate digit be 128 random Number, and then the random number is converted by private key by hash algorithm SHA256 and Base58 and is supplied to client;The public key For the random number by elliptic curve encryption algorithm according to 40 character length of original private keys text string generation, using hash algorithm The random number is converted to by SHA256 and Base58.
The present invention can establish the calamity of decentralization, each network node Distributed Autonomous for cloud storage system, can be substantially Reduce data cloud carrying cost;Due to present invention utilizes in block chain technology node common recognition algorithm and data upload and under Rivest, shamir, adelman is used during carrying, the safety of storing data can be greatly improved, and effectively prevent leaking data or illegal It distorts.
Detailed description of the invention
Fig. 1 is the block encapsulation schematic diagram of index data in block chain technology of the present invention.
Fig. 2 is the structural schematic diagram of block chain in the present invention.
Fig. 3 is the flow diagram of the complete availability verification of index data packet and alarm.
Fig. 4 is the process schematic that the encryption of index data packet uploads.
Fig. 5 is the generating process schematic diagram of public key and private key.
Fig. 6 is principle schematic diagram of the Distributed Autonomous formula calamity of the present invention for cloud storage system.
Specific embodiment
In order to more specifically describe the present invention, with reference to the accompanying drawing and specific embodiment is to technical solution of the present invention It is described in detail.
The present invention is based on the calamities of block chain technology for cloud storage system construction method, the specific implementation process is as follows:
(1) the Distributed Autonomous formula calamity based on block chain technology is constructed for cloud storage system operation frame, is cancelled current cloud and is deposited The centralization platform being widely present in storage system realizes the direct friendship of storage demand node (client) and network storage node Mutually, enable entire cloud storage system to reach decentralization and distribution is autonomous.
In network there are a large amount of data storage requirement (client) and random distribution be ready sell depositing for memory space Equipment is stored up, data to be stored is divided into data text and index data two parts first when carrying out calamity for cloud storage by client. Wherein, index data is one group of keyword for having obvious characteristic or distinguishing feature, therefore, to assure that passes through complete index data energy It is enough to find data text like clockwork.The combination of fields such as " data name " " settling time " " modification time " " authors " can be with As index data.
For data text, client Backup Data text in local and x network storage node, x be greater than etc. In 1 integer, x means that only 1 network node has data text when being equal to 1, if the network node, which has an accident, to lead It causes the unavailable of stored data text or loses;X value means that more greatly the network node for having data text is more, client When downloading cloud storage data, response and speed of download are faster, but the wave that will cause quite a few storage device storage capacity Take, the value of x is set to 2 in the present invention.
For index data, client is split into multiple data packets and is stored in multiple network nodes after private key encryption In.The relevant information of index data is carried out blocking encapsulation by each network storage node, and numerous data of this node will be present The index data block of file is linked into block chain and is managed.Node in network is deposited by the verification of Merkle tree check addition The integrality of data packet, if discovery data-bag lost or it is unavailable if to client issue alert, request repair or upload again Data.
(2) index data of data to be stored is subjected to blocking encapsulation, and establishes block in each network storage node Chain easily and safely manages storing data.
After network storage node receives the index data packet of client upload, blocking encapsulation, block structure are carried out As shown in Figure 1.Each block is divided into block head and block body two parts, and the address information of the block is encapsulated in block head --- " previous block " and " latter block " reflects " timestamp " of block packaging time, " index data file cryptographic Hash " and uses " other data meta files " extended with system.Merkle tree check addition is then encapsulated in block body, to verify institute in network The integrality and availability of deposit data, the Merkle root verified are compared with the file cryptographic Hash in block head, if two Person is identical, proves that data are complete available.
For convenience of management, numerous blocks is linked into block chain by each network memory node, and numerous blocks are according to encapsulation The main chain for being successively linked into one of time, if the node has multiple index data packets of the same data text, earliest One block of encapsulation is linked on main chain, and the block of post package is consecutively connected to be formed on first block one shorter Branch, as shown in Figure 2.
It (3) is the block carrying Merkle tree check addition for being packaged with storing data, whether verification network stored data packet is complete It is whole available.
The cloud storage system of Distributed Autonomous need the packet for proving storage be on network it is complete, it is available.This means that every A node for having index data packet needs to prove this section to the other nodes for having same textual data residue index data packet Point possesses some or multiple index data encrypted packets.The working principle of Merkle tree check addition are as follows: between each memory node mutually Index data packet number is sent, two adjacent index data packet numbers form new character string after a Hash procedure, Two adjacent new character strings carry out Hash procedure again and form new character strings after merging, and so on, until Merkle root is obtained, By Merkle with being compared with the file cryptographic Hash encapsulated in block, if they are the same, then by verification, if it is different, alarm is issued, Requesting client repairing corresponding data or the upload for re-starting completion.
(4) it when finding that network stored data packet surprisingly lack or is unavailable, alerts user and is accordingly supplemented or secondary Upload backup.
As shown in figure 3, each node timing for having index data packet mutually sends the index data packet respectively having Number, is verified by Merkle tree process after node summarizes left and right index data packet number, if verifying successfully, is proved Data packet in network is complete available;If verification failure is issuing alarm, client is reminded to repair or upload again number in time According to lasting if user is without response that alarm is kept to reach the upper limit that system defines until alarm number;If client carries out in time The repairing of data uploads again, and duplication check process is until pass through verification.
(5) cloud storage data are encrypted using rivest, shamir, adelman, guarantees the safety of storing data.
Client is encrypted after splitting index data packet using private key, the process is such as when uploading index data packet Shown in Fig. 4.When client needs to download the data of storage, confirmation wants the index of downloading data and submits decryption public key, has rope The storage address for obtaining data text is decrypted in all index data packets of the network node of argument evidence after summarizing, carry out down It carries.
As shown in figure 5, the generating process of public key and private key are as follows: generating digit by calling random number generator is 128 Private key, the theoretical quantity of private key is up to great 2128, it is ensured that private data is cryptography safety.For convenient for identification, It is converted to by hash algorithm SHA256 and Base58;Public key is by using this asymmetric arithmetic root of elliptic curve encryption algorithm According to 40 character length random number of original private keys text string generation, it is converted to using hash algorithm SHA256 and Base58.
We construct the small-sized base including two storage demand nodes (client), 8 network storage nodes below In block chain technology calamity for cloud storage system, system structure is as shown in Figure 6.Within the system, storage demand 1 is by textual data Backup is stored in 1,2,3,5,6 nodes after encryption in node 1 and node 6, index data data packet;Storage demand 2 will In node 3 and node 8, index data packet is stored in 3,4,7,8 nodes after encryption for textual data backup, other settings or Method is arranged referring to summary of the invention, and the mini system can smoothly realize the cloud storage function of the Distributed Autonomous of decentralization after tested Energy.
The above-mentioned description to embodiment is for that can understand and apply the invention convenient for those skilled in the art. Person skilled in the art obviously easily can make various modifications to above-described embodiment, and described herein general Principle is applied in other embodiments without having to go through creative labor.Therefore, the present invention is not limited to the above embodiments, ability Field technique personnel announcement according to the present invention, the improvement made for the present invention and modification all should be in protection scope of the present invention Within.

Claims (7)

1. a kind of calamity based on block chain technology includes the following steps: for cloud storage system construction method
(1) the distributed autonomous calamity of building is for cloud storage system operation frame, specific implementation are as follows: cancels current cloud storage system The centralization platform being widely present in system makes entire cloud storage system to realize that client is directly interacted with network storage node It is distributed autonomous to reach decentralization;Data to be stored is divided into data text and index when carrying out calamity for cloud storage by client Data two parts, and the Backup Data text in local and at least two network storage nodes, index data are split into more It is stored in after a index data packet is encrypted in multiple network storage nodes;
(2) blocking encapsulation is carried out by index data of the network storage node to client data to be stored, and encapsulation is completed Independent blocks afterwards connect into block chain;
It (3) is the block carrying Merkle tree check addition for being packaged with index data, to verify the storage number of client in systems According to whether completely available;Shortage of data if it exists, network storage node alert user and carry out corresponding completion or secondary upload backup;
(4) index data is encrypted using rivest, shamir, adelman.
2. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that: network in the step (2) Memory node carries out block structure used by blocking encapsulation to index data and is made of block head and block body, and block head is The essential information column of independent blocks, when enclosed inside has the address information of a upper block and next block, reflection block encapsulation Between timestamp, index data file cryptographic Hash and for system extension other data meta files;It is then sealed in block body Multiple index data packet numbers of the corresponding same data text are filled, all index data packet numbers are found by Hash process The Merkle tree root and Merkle tree root is credited in block head.
3. calamity according to claim 2 is for cloud storage system construction method, it is characterised in that: network in the step (2) The sequencing that each independent blocks are temporally stabbed is connected into block chain as main chain, if current network storage section by memory node There are multiple index data blocks of the same data text of correspondence for point, then the index data block H that will wherein encapsulate earliest It is connected on main chain, other index data blocks by packaging time is sequentially connected to be formed on index data block H one shorter Branch.
4. calamity according to claim 2 is for cloud storage system construction method, it is characterised in that: in the step (3) Merkle tree check addition the specific implementation process is as follows: respectively deposited index data packet is mutually sent between each network storage node Number, network storage node be collected into number after make two adjacent index data packet numbers shape after a Hash procedure The character string of Cheng Xin, and then carry out Hash procedure again after merging two adjacent new character strings and form new character string, with this Analogize, until obtaining Merkle tree root, the index data file cryptographic Hash encapsulated in Merkle tree root and block head is compared It is right, to verify whether the storing data of client in systems completely can be used.
5. calamity according to claim 4 is for cloud storage system construction method, it is characterised in that: network in the step (3) The rope that memory node will encapsulate in Merkle tree root block head that all index data packet numbers are found by Hash process Draw data file cryptographic Hash to be compared: if they are the same, then passing through verification;If it is different, then issuing alarm, requesting client repairs phase It answers data or uploads partial data again;It is lasting if client is without response that alarm is kept to reach upper limit threshold until alarm number Value, if client has carried out data modification in time or uploaded partial data again, duplication check process is until pass through verification.
6. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that: used in the step (4) Rivest, shamir, adelman to index data encrypt the specific implementation process is as follows: client upload index data When, index data is split into multiple index data packets and is encrypted using private key;When client needs to download it in system In storing data when, confirmation wants the index of downloading data and submits public key, has the network storage node of index data for institute It is downloaded after thering is index data packet to summarize using the storage address that acquisition data text is decrypted in public key.
7. calamity according to claim 6 is for cloud storage system construction method, it is characterised in that: the life of the public key and private key At process are as follows: by calling random number generator to generate digit be 128 random numbers, and then by hash algorithm SHA256 and The random number is converted into private key and is supplied to client by Base58;The public key is by elliptic curve encryption algorithm according to original private The random number of 40 character length of key text string generation converts the random number using hash algorithm SHA256 and Base58 It arrives.
CN201611025145.2A 2016-11-17 2016-11-17 A kind of calamity based on block chain technology is for cloud storage system construction method Active CN106534317B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611025145.2A CN106534317B (en) 2016-11-17 2016-11-17 A kind of calamity based on block chain technology is for cloud storage system construction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611025145.2A CN106534317B (en) 2016-11-17 2016-11-17 A kind of calamity based on block chain technology is for cloud storage system construction method

Publications (2)

Publication Number Publication Date
CN106534317A CN106534317A (en) 2017-03-22
CN106534317B true CN106534317B (en) 2019-09-03

Family

ID=58353109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611025145.2A Active CN106534317B (en) 2016-11-17 2016-11-17 A kind of calamity based on block chain technology is for cloud storage system construction method

Country Status (1)

Country Link
CN (1) CN106534317B (en)

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451011B (en) * 2017-03-24 2020-12-25 北京瑞卓喜投科技发展有限公司 Error correction method and system for block chain of parallel added blocks
CN111614655A (en) * 2017-03-24 2020-09-01 创新先进技术有限公司 Consensus checking method and device
CN107450979B (en) 2017-03-28 2020-06-02 创新先进技术有限公司 Block chain consensus method and device
CN106991165B (en) * 2017-03-31 2020-07-31 京东数字科技控股有限公司 Method and device for processing financial data based on block chain and electronic equipment
CN107122682B (en) * 2017-04-20 2019-02-05 杭州铜板街互联网金融信息服务有限公司 Data processing method and system based on the storage of block chain
CN107122477A (en) * 2017-05-02 2017-09-01 成都中远信电子科技有限公司 A kind of block chain storage system
CN107103087A (en) * 2017-05-02 2017-08-29 成都中远信电子科技有限公司 Block chain big data analysis of market conditions system
CN107273410B (en) * 2017-05-03 2020-07-07 上海点融信息科技有限责任公司 Block chain based distributed storage
CN107368184B (en) 2017-05-12 2020-04-14 阿里巴巴集团控股有限公司 Password input method and device in virtual reality scene
CN108323232B (en) * 2017-05-16 2020-01-24 北京大学深圳研究生院 Method for maintaining index and chain topological structure between multi-level block chain systems
CN107196934B (en) * 2017-05-18 2019-05-10 电子科技大学 A kind of cloud data managing method based on block chain
CN107203344A (en) * 2017-05-31 2017-09-26 郑州云海信息技术有限公司 A kind of date storage method and data-storage system
CN107273455B (en) * 2017-05-31 2020-12-18 深圳前海微众银行股份有限公司 Block chain data access method and device
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN107249046A (en) * 2017-08-15 2017-10-13 李俊庄 A kind of distributed cloud storage system construction method based on block chain
CN107480559B (en) * 2017-08-25 2019-08-20 北京中星仝创科技有限公司 A kind of safe storage system and method for the block chain from chain data
CN107659410A (en) * 2017-08-30 2018-02-02 湖南众享政联科技有限公司 Based on the anti-tamper official document transmission of block chain and storage method
CN107734021B (en) 2017-09-30 2020-04-07 深圳壹账通智能科技有限公司 Block chain data uploading method and system, computer system and storage medium
CN109660493B (en) * 2017-10-11 2020-12-18 南京南瑞继保电气有限公司 New energy centralized control cloud storage method based on block chain
JP7453911B2 (en) 2017-12-13 2024-03-21 エヌチェーン ライセンシング アーゲー System and method for securely sharing cryptographic materials
CN108111585B (en) * 2017-12-15 2021-08-31 成都波霎科技有限公司 Distributed storage method based on block chain
CN108062202A (en) * 2017-12-15 2018-05-22 中链科技有限公司 A kind of file block storage method and system
CN108076148A (en) * 2017-12-15 2018-05-25 成都链网络科技有限公司 Storage system based on block chain
CN108270874B (en) * 2018-02-05 2021-04-23 武汉斗鱼网络科技有限公司 Application program updating method and device
CN108462582B (en) * 2018-02-09 2020-03-27 北京欧链科技有限公司 Feedback processing method and device in block chain
CN108401026B (en) * 2018-02-26 2020-06-19 深圳智乾区块链科技有限公司 Block chain-based data storage method, system and computer-readable storage medium
CN108549654B (en) * 2018-03-09 2023-09-05 浙江昕微电子科技有限公司 Big data analysis method based on image processing
CN108647230B (en) * 2018-03-29 2021-10-08 深圳市网心科技有限公司 Distributed storage method, electronic device, and storage medium
CN108712409B (en) * 2018-05-09 2021-05-25 广西创轩科技有限公司 Electronic bill transaction system based on private block chain
CN108681760B (en) * 2018-05-15 2021-09-14 恒生电子股份有限公司 Data sending method, receiving method and device
CN108764902B (en) * 2018-05-23 2020-12-22 北京京东尚科信息技术有限公司 Method, node and blockchain system for storing data
CN109165122B (en) * 2018-08-13 2021-10-29 浙商银行股份有限公司 Method for improving disaster recovery capability of application system same city multi-park deployment realized based on block chain technology
CN109274717B (en) * 2018-08-22 2021-08-24 泰康保险集团股份有限公司 Block chain based shared storage method, device, medium and electronic equipment
CN109284625A (en) * 2018-09-03 2019-01-29 佛山科学技术学院 A kind of Data Access Security method and device based on block chain
CN109271283A (en) * 2018-09-06 2019-01-25 北京云测信息技术有限公司 A kind of data back up method based on block chain
CN110958285B (en) * 2018-09-27 2023-03-31 安徽华峪文化科技有限公司 Data storage system based on block chain
CN109408523B (en) * 2018-10-10 2020-06-02 罗克佳华科技集团股份有限公司 Data sharing method and device, data sharing platform and electronic equipment
CN109493017B (en) * 2018-11-05 2021-11-23 江苏大学 Trusted outsourcing storage method based on block chain
CN109753823B (en) * 2018-12-11 2021-11-02 烨链(上海)科技有限公司 Block chain data supervision method, system and computer storage medium
CN109766723A (en) * 2018-12-11 2019-05-17 烨链(上海)科技有限公司 A kind of block chain data framework, regulatory framework, monitoring and managing method and computer readable storage medium
CN109739927A (en) * 2018-12-12 2019-05-10 北京世纪互联宽带数据中心有限公司 Date storage method and its device, electronic equipment, computer-readable medium
CN109753810B (en) * 2018-12-12 2021-06-29 北京世纪互联宽带数据中心有限公司 Data hierarchical storage method and device, electronic equipment and computer readable medium
CN109583899A (en) * 2018-12-20 2019-04-05 鸿秦(北京)科技有限公司 Data storage and management method and system based on cloud storage service device
CN109936620B (en) * 2019-01-21 2022-02-01 中国联合网络通信集团有限公司 Block chain-based storage method, device, system and storage medium
CN109788060B (en) * 2019-01-22 2021-05-07 曲阜师范大学 Cloud data sharing and updating method based on block chain
CN109889504B (en) * 2019-01-23 2020-08-28 北京航空航天大学 Decentralized data access right transaction method and system
CN109727135A (en) * 2019-01-23 2019-05-07 昧来网络科技(上海)有限公司 Promote method, the computer-readable medium of the operation of block chain information and processing capacity
CN109918874B (en) * 2019-03-14 2022-09-02 度小满科技(北京)有限公司 Physical information storage method and device and physical information searching method and device
CN112152981B (en) * 2019-06-29 2021-11-19 华为技术有限公司 Communication method, node and communication system
CN110321723B (en) * 2019-07-08 2021-11-09 环玺信息科技(上海)有限公司 Block chain safety information processing system and method, electronic equipment and medium
CN111104686B (en) * 2019-09-10 2021-07-30 腾讯科技(深圳)有限公司 Block chain network control method, device, equipment and storage medium
CN110989934B (en) * 2019-12-05 2023-08-25 达闼机器人股份有限公司 Block chain link point data storage method, block chain system and block chain node
CN111159741A (en) * 2019-12-30 2020-05-15 深圳探科技术有限公司 Block chain intelligent contract information safety system
CN111400751A (en) * 2020-03-12 2020-07-10 厦门区块链云科技有限公司 Disaster recovery cloud storage system construction method based on block chain technology
CN111368333A (en) * 2020-03-26 2020-07-03 国金公用通链(海南)信息科技有限公司 Universal block chain key encapsulation technology
CN111586109B (en) * 2020-04-17 2023-04-28 上海坤仪金科信息技术有限公司 Block chain cloud storage user data deduplication solution method
CN111831743B (en) * 2020-06-05 2023-11-14 广东科学技术职业学院 Block chain data storage system and method based on cloud storage
CN111427965B (en) * 2020-06-10 2020-10-23 浙江和达科技股份有限公司 Management method and management system for water affair data
CN111723071A (en) * 2020-06-18 2020-09-29 江苏优网智能科技有限公司 Distributed dynamic point cloud storage technology
CN112019330B (en) * 2020-08-04 2024-03-29 广东省科技基础条件平台中心 Intranet security audit data storage method and system based on alliance chain
CN112750514A (en) * 2021-01-30 2021-05-04 云知声智能科技股份有限公司 Medical record management method and system based on block chain technology
CN112948856B (en) * 2021-03-03 2022-11-15 电信科学技术第五研究所有限公司 Tamper-proof credible network collaborative control system and implementation method
CN115052008B (en) * 2022-05-26 2023-07-25 南京邮电大学 Block chain data under-chain storage method based on cloud storage

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106022681A (en) * 2016-05-13 2016-10-12 杭州云象网络技术有限公司 Logistics tracking method based on block chain
CN106130779A (en) * 2016-07-18 2016-11-16 布比(北京)网络技术有限公司 A kind of Internet of Things equipment and with the Internet of Things construction method of this equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9569771B2 (en) * 2011-04-29 2017-02-14 Stephen Lesavich Method and system for storage and retrieval of blockchain blocks using galois fields

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106022681A (en) * 2016-05-13 2016-10-12 杭州云象网络技术有限公司 Logistics tracking method based on block chain
CN106130779A (en) * 2016-07-18 2016-11-16 布比(北京)网络技术有限公司 A kind of Internet of Things equipment and with the Internet of Things construction method of this equipment

Also Published As

Publication number Publication date
CN106534317A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN106534317B (en) A kind of calamity based on block chain technology is for cloud storage system construction method
CN112396423B (en) Transaction data processing method, device, equipment and storage medium
WO2019214312A1 (en) Blockchain-based logistics information transmission method, system and device
CN109889497B (en) Distrust-removing data integrity verification method
CN111444277B (en) Anti-terrorism information cooperative sharing platform and method based on blockchain technology
Yu et al. Toward data security in edge intelligent IIoT
CN111461879A (en) Block chain-based government affair service processing system and method
CN108683747A (en) Resource acquisition, distribution, method for down loading, device, equipment and storage medium
CN107249046A (en) A kind of distributed cloud storage system construction method based on block chain
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN105873031B (en) Distributed unmanned plane cryptographic key negotiation method based on credible platform
CN103718164A (en) Virtual computer and service
CN110690961B (en) Quantum network function virtualization method and device
CN104484187B (en) A kind of information integration method and system
CN111931215B (en) Data management method and device and storage medium
Li et al. Solving the last mile problem in logistics: A mobile edge computing and blockchain‐based unmanned aerial vehicle delivery system
CN110690962B (en) Application method and device of service node
CN112529508A (en) Electric power material management system based on PBFT alliance chain
JP2023535914A (en) Sustainable tokens for supply chains with confidentiality protocols
CN110555783B (en) Block chain-based electric power marketing data protection method and system
CN115208665A (en) Block chain-based germplasm resource data secure sharing method and system
Wibowo et al. Blockchain implementation assessment framework, case study of IoT LPWA licensing in Indonesia
CN112380179A (en) Block chain-based steel supply chain information secret sharing method and system
Wang Sok: Applying blockchain technology in industrial internet of things
CN112927079A (en) Block chain-based digital asset management of power industry

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant