CN106612285A - Distributed cloud data management method and system based on peer-to-peer network - Google Patents
Distributed cloud data management method and system based on peer-to-peer network Download PDFInfo
- Publication number
- CN106612285A CN106612285A CN201611269919.6A CN201611269919A CN106612285A CN 106612285 A CN106612285 A CN 106612285A CN 201611269919 A CN201611269919 A CN 201611269919A CN 106612285 A CN106612285 A CN 106612285A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- peer
- storage
- user node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention belongs to the technical field of electronics, and provides a distributed cloud data management method and system based on a peer-to-peer network. The peer-to-peer network comprises a plurality of user nodes, and each user node in the peer-to-peer network can encrypt data via a private key of a user of the node and then upload the data to the peer-to-peer network to store the encrypted data to other user nodes of the peer-to-peer network in a distributed manner. By encrypting data and storing the data to the user nodes of the peer-to-peer network in the distributed manner, mass data can be stored, so that the storage security of data is effectively guaranteed while the existing storage space is expanded.
Description
Technical field
The embodiment of the present invention belongs to electronic technology field, more particularly to a kind of distributed cloud data pipe based on peer-to-peer network
Reason method and system.
Background technology
As the electric terminals such as the continuous popularization of various electric terminals, mobile phone, panel computer, personal computer have become
Living and studying instrument indispensable in people's daily life, people are got used to saving the data in electric terminal.Due to
Personal electric terminal memory capacity is limited, and people would generally save the data in (example on the memory space of third-party server
Such as network cloud disk), to extend existing memory space, so as to store more data.
However, saving the data in third-party server stores larger potential safety hazard, the private data being used for is possible to
Can be stolen or be distorted by third-party server operator, it is very dangerous.
The content of the invention
The embodiment of the present invention provides a kind of distributed cloud data managing method and system based on peer-to-peer network, by logarithm
According to being encrypted and being stored in data distribution formula in the user node of peer-to-peer network, can store big data is realized, with
While extending existing memory space, the storage safety of data is effectively ensured.
On the one hand the embodiment of the present invention provides a kind of distributed cloud data managing method based on peer-to-peer network, the equity
Network includes multiple user nodes, and the distributed cloud data managing method is applied to first user node, the distributed cloud
Data managing method includes:
Storage request is received, the storage is asked for first object data distribution formula is stored into the peer-to-peer network
User node;
The first encryption key corresponding with the first object data is generated, the first encryption key includes the first public key
With the first private key;
The first object data according to first public key encryption, obtain first object encryption data, and by described
One target encryption data is divided at least one encrypted data chunk;
By the default meta-data index storage of metadata information write of the first object encryption data, the default metadata
There is between memory block and the plurality of user node default communication connection relation;
The first storage contract corresponding with the first object encryption data is generated, and obtains signing first storage and closed
The CAMEL-Subscription-Information of all second user nodes about, the first storage contract are used to define the first object encryption data
Memory requirement and storage income;
By at least one encrypted data chunk distributed storage in all second user nodes, and by described first
The CAMEL-Subscription-Information of the store path of target encrypted data chunk and the first storage contract writes the default meta-data index storage.
On the other hand the embodiment of the present invention also provides a kind of distributed cloud data management system based on peer-to-peer network, described
Peer-to-peer network includes multiple user nodes, and the distributed cloud data management system is applied to first user node, the distribution
Formula cloud data management system includes:
Human-computer interaction module, for receiving storage request, the storage is asked for first object data distribution formula is deposited
Store up the user node into the peer-to-peer network;
Key management module, for generating the first encryption key corresponding with the first object data, described first adds
Close key includes the first public key and the first private key;
Data encrypting and deciphering module, for the first object data according to first public key encryption, obtains first object
Encryption data, and the first object encryption data is divided into at least one encrypted data chunk;
Tadata memory module, deposits for the default metadata of metadata information write by the first object encryption data
Storage area, has default communication connection relation between the default meta-data index storage and the plurality of user node;
Contract administration module, for generating the first storage contract corresponding with the first object encryption data, and obtains
Contract the first storage contract all second user nodes CAMEL-Subscription-Information, the first storage contract is used to defining described
The memory requirement and storage income of first object encryption data;
Distributed Storage module, for by least one encrypted data chunk distributed storage in described all
Two user nodes, and the CAMEL-Subscription-Information of the store path of the first object encrypted data chunk and the first storage contract is write
Enter the default meta-data index storage.
The embodiment of the present invention is by being encrypted to data and saving the user for being stored in peer-to-peer network of data distribution formula
In point, can store big data is realized, to extend while existing memory space, the storage safety of data be effectively ensured.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability
For the those of ordinary skill of domain, on the premise of not paying creative work, can be attached to obtain others according to these accompanying drawings
Figure.
Fig. 1 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 2 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 3 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 4 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 5 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 6 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 7 is the flow process of the distributed cloud data managing method based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram;
Fig. 8 is the structure of the distributed cloud data management system based on peer-to-peer network that one embodiment of the present of invention is provided
Block diagram.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, is explicitly described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is the present invention one
The embodiment divided, rather than the embodiment of whole.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing
The every other embodiment obtained under the premise of going out creative work, should all belong to the scope of protection of the invention.
Term " including " and their any deformations in description and claims of this specification and above-mentioned accompanying drawing, meaning
Figure is to cover non-exclusive including.Process, method or system, product or the equipment for for example including series of steps or unit does not have
The step of listing or unit are defined in, but alternatively also include the step of not listing or unit, or alternatively also wrapped
Include other intrinsic for these processes, method, product or equipment step or unit.Additionally, term " first ", " second " and
" 3rd " etc. is for distinguishing different objects, not for description particular order.
As shown in figure 1, one embodiment of the present of invention provides one kind based on peer-to-peer network (Peer to Peer, P2P)
Distributed cloud data managing method, the peer-to-peer network include multiple user nodes.
In the present embodiment, user node specifically refers to the client with physical store function being connected in peer-to-peer network
End, for example:Mobile phone, panel computer, personal pc client etc..First user node refers to any user section in peer-to-peer network
Point, second user node refer to other any user nodes in peer-to-peer network in addition to first user node.Peer-to-peer network
Any user node in network can store data distribution formula to other users node, to realize the extension of memory space.
Below using first user node as executive agent describing the distributed cloud data managing method in detail, which includes:
Step S101:Receive storage request, the storage request is for first object data distribution formula is stored to described
User node in peer-to-peer network.
In a particular application, first object data refer to active user needs to store to the data of peer-to-peer network.Step
S101 specifically can be performed by the human-computer interaction interface of first user node, and active user is man-machine by first user node
Interactive interface input storage request, the storage request can specifically pass through to click on or press virtual or real on human-computer interaction interface
Body button is realizing, it is also possible to be input into by way of word or voice.
In one embodiment, include before step S101:
File selection instruction is received, choosing needs the first object data for being uploaded to peer-to-peer network.
Step S102:Generate the first encryption key corresponding with the first object data, the first encryption key bag
Include the first public key and the first private key.
In the present embodiment, the first encryption key is specially the encryption key based on rivest, shamir, adelman, active user
The the first private key decryption that can only be set by active user by the data of the first public key encryption of the first encryption key.
In a particular application, when user needs to upload multiple data and preserves to peer-to-peer network, can be respectively per number
According to corresponding encryption key is generated, to realize the independent encryption to each data.
Step S103:The first object data according to first public key encryption, obtain first object encryption data, and
The first object encryption data is divided into at least one encrypted data chunk.
In a particular application, the size of data of encrypted data chunk and the redundancy of piecemeal is carried out to target encryption data can be with
It is adjusted according to the needs of user.For example, target encryption data that can be by a size of data for 1,000,000,000 (MB) is divided
For 10 encrypted data chunks, the size of each data block is 100,000,000;Redundancy then refers to that user needs to enter target encryption data
The quantity of row backup, for example, if user needs three backups (to include target encryption data itself and replicate two for obtaining altogether
Target encryption data), then as a example by the target encryption data by size of data for 1,000,000,000 (MB), need distributed being stored in entirely
The size of data of the target encryption data in peer-to-peer network is 1000 × 3=3,000 million, if every part of target encryption data is divided into
10 encrypted data chunks, then the distributed number for being stored in encrypted data chunk in whole peer-to-peer network is 10 × 3=30..
Step S104:Meta-data index storage is preset in the metadata information write of the first object encryption data, it is described
There is between default meta-data index storage and the plurality of user node default communication connection relation.
In a particular application, metadata (Metadata), also known as broker data, relay data, is the data for describing data
(data about data), mainly describes the information of data attribute (property), for support as indicate storage location,
The functions such as historical data, resource lookup, file record.
In the present embodiment, all user nodes during default meta-data index storage is specifically referred to by peer-to-peer network are tieed up jointly
The block catenary system of shield.Arbitrary user node being connected in peer-to-peer network is set up communication connection with the block catenary system and is closed
But system, can access not have authority arbitrarily to change the data in the block catenary system.
Step S105:The first storage contract corresponding with the first object encryption data is generated, and it is described to obtain signing
The CAMEL-Subscription-Information of all second user nodes of the first storage contract, the first storage contract are used to define the first object
The memory requirement and storage income of encryption data.
In a particular application, store contract to be mainly used in by the formal definition second user node of electronics contract storage the
The storage condition observed and the storage income that can be obtained, storage condition is needed specifically may be used during the data that one user node is uploaded
So that including data confidentiality agreement, data integrity protection's agreement etc., storage income can specifically include remuneration, reward etc., remuneration
Can be specifically electronic money, reward can be specifically that reward second user node can freely store a certain size data extremely
Peer-to-peer network.User can be made to be more willing to preserve what other users node was uploaded by its user node by setting storage income
Data.User can voluntarily change the storage condition and storage income of storage contract according to actual needs.
In a particular application, signing first stores contract and specifically refers to receive storage condition and storage defined in the contract
Income, the CAMEL-Subscription-Information produced by the first storage contract of contracting will be saved to the block that all user nodes are safeguarded jointly
Catenary system, that is, preset in meta-data index storage, and which the second use first user node can check by the block catenary system
Family endorsed the first storage contract, and CAMEL-Subscription-Information can also be stored in locally for signing contract by second user node simultaneously
In hardware or software module (the contract administration modules in i.e. following systems).
Step S106:By at least one encrypted data chunk distributed storage in all second user nodes, and
The CAMEL-Subscription-Information of the store path of the first object encrypted data chunk and the first storage contract is write into the default unit
Data storage area.
The present embodiment by being encrypted to data and being stored in data distribution formula in the user node of peer-to-peer network,
The storage safety of data can be effectively ensured while extending existing memory space big data storage is realized.
In one embodiment of the invention, active user can download the data which is stored into peer-to-peer network, this reality
Apply in example, by taking first object encryption data as an example in detail, the process for downloading first object encryption data is described in detail.
In certain embodiments of the present invention, based on the method and step in the embodiment corresponding to Fig. 1, the distributed cloud
Data managing method can also include being downloaded, delete for the data to distributed storage in peer-to-peer network, sharing or
The method and step of transaction.
As shown in Fig. 2 the present embodiment specifically includes the side that the data to distributed storage in peer-to-peer network are downloaded
Method step, in the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 also includes:
Step S201:Download request is received, and the download request is used to distributed storage is downloaded in the peer-to-peer network
The first object encryption data.
In a particular application, step S201 can be performed by the human-computer interaction interface of first user node, active user
Download request is input into by the human-computer interaction interface of first user node.The download request specifically by clicking on or can press people
Virtual or entity button on machine interactive interface is realizing, it is also possible to be input into by way of word or voice.
In one embodiment, include before step S201:
File selection instruction is received, the first object encryption data for needing from peer-to-peer network to download is chosen.
Step S202:The storage road of the first object encryption data write in reading the default meta-data index storage
Footpath;
Step S203:Download the first object encryption pointed by the store path of the first object encrypted data chunk
Data, and down operation record is write into the default meta-data index storage;
Step S204:Obtain first private key;
Step S205:The first object encryption data is decrypted by first private key.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage and the encryption data is entered by downloading active user
Row decryption so that active user can download the data of its storage according to their needs anywhere or anytime from peer-to-peer network.
In one embodiment of the invention, active user can delete the data which is stored into peer-to-peer network, this reality
Apply in example, by taking first object encryption data as an example in detail, the process for deleting first object encryption data is described in detail.
As shown in figure 3, the present embodiment specifically includes the side deleted by the data to distributed storage in peer-to-peer network
Method step, in the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 also includes:
Step S301:Removal request is received, and the removal request is used to distributed storage is deleted in the peer-to-peer network
The first object encryption data.
In a particular application, step S301 can be performed by the human-computer interaction interface of first user node, active user
Removal request is input into by the human-computer interaction interface of first user node.The removal request specifically by clicking on or can press people
Virtual or entity button on machine interactive interface is realizing, it is also possible to be input into by way of word or voice.
In one embodiment, include before step S301:
File selection instruction is received, the first object encryption data for needing from peer-to-peer network to delete is chosen.
Step S302:The storage of the first object encrypted data chunk write in reading the default meta-data index storage
Path;
Step S303:Delete the first object encryption number pointed by the store path of the first object encryption data
According to, and deletion action record is write into the default meta-data index storage.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage by deleting active user so that active user can be with
Delete the data of its storage according to their needs anywhere or anytime from peer-to-peer network.
In one embodiment of the invention, active user can be stored data sharing into peer-to-peer network to which
He is user, it is also possible to obtain the data that other users are shared into peer-to-peer network, in the present embodiment, with first object encryption data
As a example by, process of the shared first object encryption data to second user node is described in detail in detail.
As shown in figure 4, the present embodiment specifically includes the data sharing by distributed storage in peer-to-peer network using to other
The method and step at family, in the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 is also wrapped
Include:
Step S401:The first sharing request that the second user node sends is received, first sharing request is used for
The first object encryption data of the distributed storage in the peer-to-peer network is shared to into the second user node.
In a particular application, step S401 can be performed by the human-computer interaction interface of first user node, when receiving
During the first sharing request, the human-computer interaction interface of first user node shows first sharing request, and active user can pass through
The virtual or entity button on human-computer interaction interface is clicked on or is pressed responding first sharing request, it is also possible to by word
Or the mode that the mode of voice is input into is responded.
In one embodiment, include before step 401:
File selection instruction is received, the first object encryption number that second user node is shared in needing peer-to-peer network is chosen
According to.
Step S402:If response first sharing request, obtains the second public key that the second user node sends;
Step S403:Key is encrypted by described in second public key encryption first and the second user section is sent to
Point.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage to other users by sharing active user so that when
Front user can share the data of its storage according to their needs anywhere or anytime.
In one embodiment of the invention, active user can obtain other users and share the number into peer-to-peer network
According to, in the present embodiment, by taking the second target encryption data of second user nodes sharing to peer-to-peer network as an example, describing acquisition in detail
The process of the second target encryption data of two user's nodes sharings.
As shown in figure 5, the present embodiment specifically includes acquisition other users sharing to distributed storage in peer-to-peer network
In the present embodiment, the distributed cloud data managing method provided by the embodiment corresponding to Fig. 1 is also wrapped the method and step of data
Include:
Step S501:The second sharing request is sent to the second user node, second sharing request is used to obtain
The second user Node distribution formula is stored in the second target encryption data of the peer-to-peer network.
In a particular application, step S501 can be performed by the human-computer interaction interface of first user node, active user
Second sharing request is input into by the human-computer interaction interface of first user node and second user node is sent to.This second share
Request specifically can be input into by clicking on or pressing the virtual or entity button on human-computer interaction interface, it is also possible to by word
Or the mode of voice is input into.
In one embodiment, include before step 501:
File selection instruction is received, the second target in the second user nodes sharing to peer-to-peer network for needing to obtain is chosen
Encryption data.
Step S502:If detecting the second user node responds second sharing request, described second is downloaded
Target encryption data;
Step S503:First public key is sent to the second user node, and it is anti-to obtain the second user node
The second encryption key by first public key encryption of feedback, the second encryption key include the second public key and second private
Key;
Step S504:The second encryption key is decrypted by first private key, and is decrypted according to second private key
The second target encryption data.
The present embodiment is uploaded to the encryption data of peer-to-peer network storage by obtaining other users so that active user can be with
Obtain other users according to their needs anywhere or anytime and share the data into peer-to-peer network.
In one embodiment of the invention, active user can be uploaded to the data in peer-to-peer network, used as friendship
Easily object in the present embodiment, by taking first object encryption data as an example, describes the first mesh of transaction in detail being traded with other users
Mark encryption data process.
As shown in fig. 6, the present embodiment specifically includes the data being stored in peer-to-peer network in a distributed manner as trading object
The method and step being traded with other users, in the present embodiment, the distributed cloud number provided by the embodiment corresponding to Fig. 1
According to management method, also include:
Step S601:The first transaction request that the second user node sends is received, first transaction request is used for
Using distributed storage in the peer-to-peer network the first object encryption data as trading object and the second user section
Point is traded.
In a particular application, step S601 can be performed by the human-computer interaction interface of first user node, when receiving
During the first sharing request, the human-computer interaction interface of first user node shows first transaction request, and active user can pass through
The virtual or entity button on human-computer interaction interface is clicked on or is pressed responding first transaction request, it is also possible to by word
Or the mode that the mode of voice is input into is responded.
In one embodiment, include before step 601:
File selection instruction is received, the first object encryption number for needing to be traded with second user node is chosen
According to.
Step S602:If response first transaction request, corresponding with the first object encryption data the is generated
One transaction contract, and the contract information of the described first transaction contract is write into the default meta-data index storage, described first hands over
Easily contract is used for the terms of trade for defining the first object encryption data;
Step S603:Obtain the second public key that the second user node sends;
Step S604:Key is encrypted by described in second public key encryption first and the second user section is sent to
Point.
In a particular application, key is encrypted by the second public key encryption first so that the only user of second user node
Can only by the second private key corresponding with the second public key decryption first encrypt key, and other users cannot decrypt obtain first plus
Close key, so as to the user for ensureing only second user node can decrypt first object encryption text by the first encryption key
Part.
The present embodiment is by carrying out data trade with other users so that active user can according to their needs at any time with
The data shared into peer-to-peer network on ground are traded with other users as trading object.
In one embodiment of the invention, active user can be uploaded in peer-to-peer network as friendship for other users
The data of easily object are traded with other users, in the present embodiment, are uploaded to the second of peer-to-peer network with second user node
As a example by target encryption data in detail, the second target encryption data process of transaction is described in detail.
As shown in fig. 7, the present embodiment specifically include data using other users distributed storage in peer-to-peer network as
The method and step that trading object is traded with other users, in the present embodiment, what the embodiment corresponding to Fig. 1 was provided divides
Cloth cloud data managing method, also includes:
Step S701:To the second user node send the second transaction request, second transaction request for institute
State second user node to be traded to obtain the second target encryption data;
In a particular application, step S701 can be performed by the human-computer interaction interface of first user node, active user
Second transaction request is input into by the human-computer interaction interface of first user node and second user node is sent to.Second transaction
Request specifically can be input into by clicking on or pressing the virtual or entity button on human-computer interaction interface, it is also possible to by word
Or the mode of voice is input into.
In one embodiment, include before step 701:
File selection instruction is received, the second target encryption data for needing to be traded with second user node is chosen.
Step S702:If detecting the second user node responds second transaction request, described second is downloaded
Target encryption data;
Step S703:First public key is sent to the second user node, and it is anti-to obtain the second user node
The second encryption key by first public key encryption of feedback, the second encryption key include the second public key and second private
Key;
Step S704:The second encryption key is decrypted by first private key, and is decrypted by second private key
The second target encryption data;
Step S705:The contract information of the second transaction contract is obtained from the default meta-data index storage, according to institute
State terms of trade defined in the contract information of the second transaction contract and perform the second transaction contract.
In a particular application, it is uploaded to what the transaction principles of the data that peer-to-peer network is traded were just as, therefore, in advance
The corresponding second transaction contract of the second target encryption data if meta-data index storage is stored with, the second transaction contract are used
In the terms of trade for defining the second target encryption data.
The present embodiment is by carrying out data trade with other users so that active user can according to their needs at any time with
Ground the data in other users to share to peer-to-peer network are traded as trading object with other users.
As shown in figure 8, one embodiment of the present of invention provides a kind of distributed cloud data management system based on peer-to-peer network
System 100, for performing the method and step in the embodiment corresponding to Fig. 1.The distributed cloud data management system 100 is applied to
One user node, which includes:
Human-computer interaction module 101, for receiving storage request, the storage request is for by first object data distribution formula
Store the user node into the peer-to-peer network;
Key management module 102, for generate it is corresponding with the first object data first encryption key, described first
Encryption key includes the first public key and the first private key;
Data encrypting and deciphering module 103, for the first object data according to first public key encryption, obtains the first mesh
Mark encryption data, and the first object encryption data is divided into at least one encrypted data chunk;
Tadata memory module 104, for the default unit's number of metadata information write by the first object encryption data
According to memory block, there is between the default meta-data index storage and the plurality of user node default communication connection relation;
Contract administration module 105, for generating the first storage contract corresponding with the first object encryption data, and obtains
The CAMEL-Subscription-Information of all second user nodes of signing the first storage contract is taken, the first storage contract is used to define institute
State the memory requirement and storage income of first object encryption data;
Distributed Storage module 106, for by least one encrypted data chunk distributed storage in the institute
There is second user node, and the signing of the store path of the first object encrypted data chunk and the first storage contract is believed
The breath write default meta-data index storage.
In a particular application, what user node was specifically referred to is connected to the visitor with physical store function in peer-to-peer network
Family end, for example:Mobile phone, panel computer, personal pc client etc..Human-computer interaction module 101 can specifically include touching display screen
Or keyboard.
The present embodiment by being encrypted to data and being stored in data distribution formula in the user node of peer-to-peer network,
The storage safety of data can be effectively ensured while extending existing memory space big data storage is realized.
In one embodiment of the invention, the distributed cloud data management system 100 shown in Fig. 8 can be also used for performing
The method and step in embodiment corresponding to Fig. 2~7.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 2:
Human-computer interaction module 101 is used to receive download request, and the download request is used to download distributed storage in described
The first object encryption data of peer-to-peer network;
The first object encryption that tadata memory module 104 is write in being used to read the default meta-data index storage
The store path of data;
Distributed Storage module 106 is used to download pointed by the store path of the first object encrypted data chunk
The first object encryption data, and down operation record is write into the default meta-data index storage;
Key management module 102 is used to obtain first private key;
Data encrypting and deciphering module 103 is used to decrypt the first object encryption data by first private key.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 3:
Human-computer interaction module 101 is used to receive removal request, and the removal request is used to delete distributed storage in described
The first object encryption data of peer-to-peer network;
The first object encryption that tadata memory module 104 is write in being used to read the default meta-data index storage
The store path of data block;
Distributed Storage module 106 is used to delete the institute pointed by the store path of the first object encryption data
First object encryption data is stated, and deletion action record is write into the default meta-data index storage.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 4:
Human-computer interaction module 101 is used to receive the first sharing request that the second user node sends, and described first altogether
Enjoy request the second user is shared to for the first object encryption data by distributed storage in the peer-to-peer network
Node;
If key management module 102 is used to respond first sharing request, obtains the second user node and send
The second public key;
Data encrypting and deciphering module 103 is used for by the first encryption key described in second public key encryption and is sent to described
Second user node.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 5:
Human-computer interaction module 101 for sending the second sharing request to the second user node, described second it is shared please
Seek the second target encryption data that the peer-to-peer network is stored in for obtaining the second user Node distribution formula;
If Distributed Storage module 106 be used to detecting second user node response it is described second it is shared please
Ask, then download the second target encryption data;
Key management module 102 is for sending first public key to the second user node, and obtains described second
The second encryption key by first public key encryption of user node feedback, the second encryption key include the second public key
With the second private key;
Data encrypting and deciphering module 103 is used to decrypt the second encryption key by first private key, and according to described
Second private key decrypts the second target encryption data.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 6:
Human-computer interaction module 101 is used to receive the first transaction request that the second user node sends, and described first hands over
Easily ask for using distributed storage in the peer-to-peer network the first object encryption data as trading object with it is described
Second user node is traded;
If contract administration module 105 is used to respond first transaction request, generate and number is encrypted with the first object
According to the corresponding first transaction contract, and the contract information of the described first transaction contract is write into the default meta-data index storage,
The first transaction contract is used to define the terms of trade of the first object encryption data;
Key management module 102 is used to obtain the second public key that the second user node sends;
Data encrypting and deciphering module 103 is used for by the first encryption key described in second public key encryption and is sent to described
Second user node.
When distributed cloud data management system 100 is used to perform the method and step in the embodiment corresponding to Fig. 7:
, for sending the second transaction request to the second user node, second transaction please for human-computer interaction module 101
Ask for being traded to obtain the second target encryption data with the second user node;
If Distributed Storage module 106 is additionally operable to detect the second user node response, and second transaction please
Ask, then download the second target encryption data;
If key management module 102 is used to detect the second user node response second transaction request, to
The second user node sends first public key, and obtain the second user node feeding back by first public key
Second encryption key of encryption, the second encryption key include the second public key and the second private key;
Data encrypting and deciphering module 103 is used to decrypt the second encryption key by first private key, and by described
Second private key decrypts the second target encryption data;
Contract administration module 105 is believed for the contract that the second transaction contract is obtained from the default meta-data index storage
Breath, terms of trade defined in the contract information of contract of concluding the business according to described second perform the second transaction contract.
Module in all embodiments of the invention, can be by universal integrated circuit, such as CPU (Central
Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated
Circuit, special IC) realizing.
All user nodes in the present invention are respectively provided with identical operation principle and structure.
Step in present invention method can carry out order adjustment according to actual needs, merge and delete.
Module in embodiment of the present invention device can be merged according to actual needs, divides and be deleted.
One of ordinary skill in the art will appreciate that all or part of flow process in realizing above-described embodiment method, can be
Instruct related hardware to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
Presently preferred embodiments of the present invention is the foregoing is only, not to limit the present invention, all essences in the present invention
Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.
Claims (10)
1. a kind of distributed cloud data managing method based on peer-to-peer network, the peer-to-peer network include multiple user nodes, its
It is characterised by, the distributed cloud data managing method is applied to first user node, the distributed cloud data managing method
Including:
Storage request is received, the storage is asked for first object data distribution formula to be stored the use into the peer-to-peer network
Family node;
The first encryption key corresponding with the first object data is generated, the first encryption key includes the first public key and the
One private key;
The first object data according to first public key encryption, obtain first object encryption data, and by first mesh
Mark encryption data is divided at least one encrypted data chunk;
By the default meta-data index storage of metadata information write of the first object encryption data, the default metadata storage
There is between area and the plurality of user node default communication connection relation;
The first storage contract corresponding with the first object encryption data is generated, and obtains signing the first storage contract
The CAMEL-Subscription-Information of all second user nodes, the first storage contract are used to define the storage of the first object encryption data
Require and store income;
By at least one encrypted data chunk distributed storage in all second user nodes, and by the first object
The CAMEL-Subscription-Information of the store path of encrypted data chunk and the first storage contract writes the default meta-data index storage.
2. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution
Formula cloud data managing method also includes:
Download request is received, the download request adds in the first object of the peer-to-peer network for downloading distributed storage
Ciphertext data;
The store path of the first object encryption data write in reading the default meta-data index storage;
The first object encryption data pointed by the store path of the first object encrypted data chunk is downloaded, and will be downloaded
Operation note writes the default meta-data index storage;
Obtain first private key;
The first object encryption data is decrypted by first private key.
3. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution
Formula cloud data managing method also includes:
Removal request is received, the removal request adds in the first object of the peer-to-peer network for deleting distributed storage
Ciphertext data;
The store path of the first object encrypted data chunk write in reading the default meta-data index storage;
The first object encryption data pointed by the store path of the first object encryption data is deleted, and behaviour will be deleted
Note down and write the default meta-data index storage.
4. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution
Formula cloud data managing method also includes:
Receive the first sharing request that the second user node sends, first sharing request for by distributed storage in
The first object encryption data of the peer-to-peer network shares to the second user node;
If response first sharing request, obtains the second public key that the second user node sends;
Key is encrypted by described in second public key encryption first and the second user node is sent to;
The second sharing request is sent to the second user node, second sharing request is used to obtain the second user section
Point distributed storage is in the second target encryption data of the peer-to-peer network;
If detecting the second user node responds second sharing request, the second target encryption data is downloaded;
Send first public key to the second user node, and obtain the second user node feeding back by described the
Second encryption key of one public key encryption, the second encryption key include the second public key and the second private key;
The second encryption key is decrypted by first private key, and second target is decrypted according to second private key and added
Ciphertext data.
5. the distributed cloud data managing method based on peer-to-peer network as claimed in claim 1, it is characterised in that the distribution
Formula cloud data managing method also includes:
Receive the first transaction request that the second user node sends, first transaction request for by distributed storage in
The first object encryption data of the peer-to-peer network is traded with the second user node as trading object;
If response first transaction request, the first transaction contract corresponding with the first object encryption data is generated, and
The contract information of the described first transaction contract is write into the default meta-data index storage, the first transaction contract is used to define
The terms of trade of the first object encryption data;
Obtain the second public key that the second user node sends;
Key is encrypted by described in second public key encryption first and the second user node is sent to;
To the second user node send the second transaction request, second transaction request for the second user node
It is traded to obtain the second target encryption data;
If detecting the second user node responds second transaction request, the second target encryption data is downloaded;
Send first public key to the second user node, and obtain the second user node feeding back by described the
Second encryption key of one public key encryption, the second encryption key include the second public key and the second private key;By described first
Private key decryption the second encryption key, and the second target encryption data is decrypted by second private key;
The contract information of the second transaction contract is obtained from the default meta-data index storage, according to the described second transaction contract
Contract information defined in terms of trade perform it is described second transaction contract.
6. a kind of distributed cloud data management system based on peer-to-peer network, the peer-to-peer network include multiple user nodes, its
It is characterised by, the distributed cloud data management system is applied to first user node, the distributed cloud data management system
Including:
Human-computer interaction module, for receive storage request, it is described storage request for by first object data distribution formula store to
User node in the peer-to-peer network;
Key management module, for generating the first encryption key corresponding with the first object data, first encryption is secret
Key includes the first public key and the first private key;
Data encrypting and deciphering module, for the first object data according to first public key encryption, obtains first object encryption
Data, and the first object encryption data is divided into at least one encrypted data chunk;
Tadata memory module, for the default metadata storage of metadata information write by the first object encryption data
Area, has default communication connection relation between the default meta-data index storage and the plurality of user node;
Contract administration module, for generating the first storage contract corresponding with the first object encryption data, and obtains signing
The CAMEL-Subscription-Information of all second user nodes of the first storage contract, the first storage contract are used to define described first
The memory requirement and storage income of target encryption data;
Distributed Storage module, at least one encrypted data chunk distributed storage is used in described all second
Family node, and the CAMEL-Subscription-Information of the store path of the first object encrypted data chunk and the first storage contract is write into institute
State default meta-data index storage.
7. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive download request, and the download request is used to download distributed storage in described right
Deng the first object encryption data of network;
The first object encryption that the tadata memory module is write in being additionally operable to read the default meta-data index storage
The store path of data;
The Distributed Storage module is additionally operable to download pointed by the store path of the first object encrypted data chunk
The first object encryption data, and down operation record is write into the default meta-data index storage;
The key management module is additionally operable to obtain first private key;
The data encrypting and deciphering module is additionally operable to decrypt the first object encryption data by first private key.
8. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive removal request, and the removal request is used to delete distributed storage in described right
Deng the first object encryption data of network;
The first object encryption that the tadata memory module is write in being additionally operable to read the default meta-data index storage
The store path of data block;
The Distributed Storage module is additionally operable to delete the institute pointed by the store path of the first object encryption data
First object encryption data is stated, and deletion action record is write into the default meta-data index storage.
9. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive the first sharing request that the second user node sends, and described first shares
Ask to share to the second user section for the first object encryption data by distributed storage in the peer-to-peer network
Point;
If the key management module is additionally operable to response first sharing request, obtain what the second user node sent
Second public key;
The data encrypting and deciphering module is additionally operable to by the first encryption key described in second public key encryption and is sent to described
Second user node;
The human-computer interaction module is additionally operable to send the second sharing request, second sharing request to the second user node
The second target encryption data of the peer-to-peer network is stored in for obtaining the second user Node distribution formula;
If the Distributed Storage module is additionally operable to detect the second user node response second sharing request,
The second target encryption data is downloaded then;
The key management module is additionally operable to send first public key to the second user node, and obtains second use
Family node feeding back by first public key encryption second encryption key, it is described second encryption key include the second public key and
Second private key;
The data encrypting and deciphering module is additionally operable to decrypt the second encryption key by first private key, and according to described the
Two private keys decrypt the second target encryption data.
10. the distributed cloud data management system based on peer-to-peer network as claimed in claim 6, it is characterised in that:
The human-computer interaction module is additionally operable to receive the first transaction request that the second user node sends, first transaction
Ask for using distributed storage in the peer-to-peer network the first object encryption data as trading object and described
Two user nodes are traded;
If the contract administration module is additionally operable to response first transaction request, generate and the first object encryption data
Corresponding first transaction contract, and the contract information of the described first transaction contract is write into the default meta-data index storage, institute
The first transaction contract is stated for defining the terms of trade of the first object encryption data;
The key management module is additionally operable to obtain the second public key that the second user node sends;
The data encrypting and deciphering module is additionally operable to by the first encryption key described in second public key encryption and is sent to described
Second user node;
The human-computer interaction module is additionally operable to send the second transaction request, second transaction request to the second user node
For being traded to obtain the second target encryption data with the second user node;
If the Distributed Storage module is additionally operable to detect the second user node response second transaction request,
The second target encryption data is downloaded then;
The key management module is additionally operable to send first public key to the second user node, and obtains second use
Family node feeding back by first public key encryption second encryption key, it is described second encryption key include the second public key and
Second private key;
The data encrypting and deciphering module is additionally operable to decrypt the second encryption key by first private key, and by described the
Two private keys decrypt the second target encryption data;
The contract administration module is additionally operable to obtain the contract letter of the second transaction contract from the default meta-data index storage
Breath, terms of trade defined in the contract information of contract of concluding the business according to described second perform the second transaction contract.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611269919.6A CN106612285B (en) | 2016-12-30 | 2016-12-30 | Distributed cloud data management method and system based on peer-to-peer network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611269919.6A CN106612285B (en) | 2016-12-30 | 2016-12-30 | Distributed cloud data management method and system based on peer-to-peer network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106612285A true CN106612285A (en) | 2017-05-03 |
CN106612285B CN106612285B (en) | 2020-05-19 |
Family
ID=58636834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611269919.6A Active CN106612285B (en) | 2016-12-30 | 2016-12-30 | Distributed cloud data management method and system based on peer-to-peer network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106612285B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107948253A (en) * | 2017-11-10 | 2018-04-20 | 江苏通付盾科技有限公司 | Decentralization date storage method and system, electronic equipment, storage medium |
CN108647230A (en) * | 2018-03-29 | 2018-10-12 | 深圳市网心科技有限公司 | Distributed storage method, electronic device and storage medium |
CN108710643A (en) * | 2018-04-20 | 2018-10-26 | 广东省科技基础条件平台中心 | Data sharing method, device, computer equipment and storage medium |
CN108718341A (en) * | 2018-05-30 | 2018-10-30 | 北京阿尔山金融科技有限公司 | Shared and search the method for data |
CN108854077A (en) * | 2018-07-17 | 2018-11-23 | 广州瞪羚信息科技有限公司 | Across game item circulation method based on block chain technology |
CN109117096A (en) * | 2018-09-03 | 2019-01-01 | 安徽太阳石科技有限公司 | Distributed data storage method and system based on block chain |
CN109241756A (en) * | 2018-08-20 | 2019-01-18 | 深圳市腾讯网络信息技术有限公司 | Data processing method, system, server and medium based on block chain |
CN109271115A (en) * | 2018-10-11 | 2019-01-25 | 重庆晨鲸科技有限公司 | Store sharing method, device, block chain distributed network topology |
CN109379184A (en) * | 2018-09-28 | 2019-02-22 | 北京金山安全软件有限公司 | Block chain private key storage method and device and electronic equipment |
CN109492419A (en) * | 2018-11-27 | 2019-03-19 | 众安信息技术服务有限公司 | For obtaining the method, apparatus and storage medium of the data in block chain |
CN109618190A (en) * | 2018-12-07 | 2019-04-12 | 深圳市云歌人工智能技术有限公司 | Based on the method, apparatus and storage medium for promoting video setting and acquisition reward |
CN109862119A (en) * | 2019-03-15 | 2019-06-07 | 深圳市网心科技有限公司 | Memory capacity sharing method, device, service server, user terminal and system |
CN109995715A (en) * | 2017-12-29 | 2019-07-09 | 百度在线网络技术(北京)有限公司 | Private data encipher-decipher method, device, equipment and the storage medium of block chain |
CN110990407A (en) * | 2018-04-27 | 2020-04-10 | 腾讯科技(深圳)有限公司 | Block chain based data storage method and device, server and storage medium |
CN111382458A (en) * | 2018-12-28 | 2020-07-07 | 富泰华工业(深圳)有限公司 | Data batch sealing method and device and computer storage medium |
CN112291356A (en) * | 2020-11-02 | 2021-01-29 | 大连理工大学 | Self-verification variable name distributed storage method based on CNFS protocol |
CN113157207A (en) * | 2021-04-07 | 2021-07-23 | 橙色云互联网设计有限公司 | Data processing method, device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101192924A (en) * | 2006-11-24 | 2008-06-04 | 北京大学 | P2P storage system coding method based on Reed-Solomon code |
CN101605148A (en) * | 2009-05-21 | 2009-12-16 | 何吴迪 | The framework method of the parallel system of cloud storage |
CN103034814A (en) * | 2012-12-11 | 2013-04-10 | 浙江大学 | Data access method |
CN103442057A (en) * | 2013-08-27 | 2013-12-11 | 玉林师范学院 | Cloud storage system based on user collaboration cloud |
-
2016
- 2016-12-30 CN CN201611269919.6A patent/CN106612285B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101192924A (en) * | 2006-11-24 | 2008-06-04 | 北京大学 | P2P storage system coding method based on Reed-Solomon code |
CN101605148A (en) * | 2009-05-21 | 2009-12-16 | 何吴迪 | The framework method of the parallel system of cloud storage |
CN103034814A (en) * | 2012-12-11 | 2013-04-10 | 浙江大学 | Data access method |
CN103442057A (en) * | 2013-08-27 | 2013-12-11 | 玉林师范学院 | Cloud storage system based on user collaboration cloud |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107948253A (en) * | 2017-11-10 | 2018-04-20 | 江苏通付盾科技有限公司 | Decentralization date storage method and system, electronic equipment, storage medium |
CN107948253B (en) * | 2017-11-10 | 2021-03-02 | 江苏通付盾科技有限公司 | Decentralized data storage method and system, electronic device and storage medium |
CN109995715A (en) * | 2017-12-29 | 2019-07-09 | 百度在线网络技术(北京)有限公司 | Private data encipher-decipher method, device, equipment and the storage medium of block chain |
CN108647230A (en) * | 2018-03-29 | 2018-10-12 | 深圳市网心科技有限公司 | Distributed storage method, electronic device and storage medium |
CN108710643A (en) * | 2018-04-20 | 2018-10-26 | 广东省科技基础条件平台中心 | Data sharing method, device, computer equipment and storage medium |
CN108710643B (en) * | 2018-04-20 | 2020-11-24 | 广东省科技基础条件平台中心 | Data sharing method and device, computer equipment and storage medium |
CN110990407B (en) * | 2018-04-27 | 2020-11-10 | 腾讯科技(深圳)有限公司 | Block chain based data storage method and device, server and storage medium |
CN110990407A (en) * | 2018-04-27 | 2020-04-10 | 腾讯科技(深圳)有限公司 | Block chain based data storage method and device, server and storage medium |
CN108718341A (en) * | 2018-05-30 | 2018-10-30 | 北京阿尔山金融科技有限公司 | Shared and search the method for data |
CN108854077A (en) * | 2018-07-17 | 2018-11-23 | 广州瞪羚信息科技有限公司 | Across game item circulation method based on block chain technology |
CN108854077B (en) * | 2018-07-17 | 2021-05-18 | 广州瞪羚信息科技有限公司 | Cross-game item circulation method based on block chain technology |
CN109241756A (en) * | 2018-08-20 | 2019-01-18 | 深圳市腾讯网络信息技术有限公司 | Data processing method, system, server and medium based on block chain |
CN109117096B (en) * | 2018-09-03 | 2020-04-21 | 安徽太阳石科技有限公司 | Block chain based distributed data storage method and system |
CN109117096A (en) * | 2018-09-03 | 2019-01-01 | 安徽太阳石科技有限公司 | Distributed data storage method and system based on block chain |
CN109379184A (en) * | 2018-09-28 | 2019-02-22 | 北京金山安全软件有限公司 | Block chain private key storage method and device and electronic equipment |
CN109271115B (en) * | 2018-10-11 | 2021-07-30 | 重庆晨鲸科技有限公司 | Storage sharing method and device and block chain distributed network topology |
CN109271115A (en) * | 2018-10-11 | 2019-01-25 | 重庆晨鲸科技有限公司 | Store sharing method, device, block chain distributed network topology |
CN109492419A (en) * | 2018-11-27 | 2019-03-19 | 众安信息技术服务有限公司 | For obtaining the method, apparatus and storage medium of the data in block chain |
CN109492419B (en) * | 2018-11-27 | 2022-07-01 | 众安信息技术服务有限公司 | Method, device and storage medium for acquiring data in block chain |
CN109618190A (en) * | 2018-12-07 | 2019-04-12 | 深圳市云歌人工智能技术有限公司 | Based on the method, apparatus and storage medium for promoting video setting and acquisition reward |
CN111382458A (en) * | 2018-12-28 | 2020-07-07 | 富泰华工业(深圳)有限公司 | Data batch sealing method and device and computer storage medium |
CN109862119A (en) * | 2019-03-15 | 2019-06-07 | 深圳市网心科技有限公司 | Memory capacity sharing method, device, service server, user terminal and system |
CN112291356A (en) * | 2020-11-02 | 2021-01-29 | 大连理工大学 | Self-verification variable name distributed storage method based on CNFS protocol |
CN112291356B (en) * | 2020-11-02 | 2022-01-04 | 大连理工大学 | Self-verification variable name distributed storage method based on CNFS protocol |
CN113157207B (en) * | 2021-04-07 | 2022-03-08 | 橙色云互联网设计有限公司 | Data processing method, device and storage medium |
CN113157207A (en) * | 2021-04-07 | 2021-07-23 | 橙色云互联网设计有限公司 | Data processing method, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106612285B (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106612285A (en) | Distributed cloud data management method and system based on peer-to-peer network | |
CN105453105B (en) | System and method for cloud data safety | |
CN109214201B (en) | Data sharing method, terminal equipment and computer readable storage medium | |
CN110210246B (en) | Personal data service method and system based on safety calculation | |
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
US10140460B2 (en) | File storage system and user terminal | |
WO2018218953A1 (en) | Data backup method and device, storage medium and server | |
CN104270517A (en) | Information encryption method and mobile terminal | |
CN105635131B (en) | Transmit data method, device and server | |
CN111475832B (en) | Data management method and related device | |
KR20210046357A (en) | Method and apparatus for key storing and recovery for blockchain based system | |
CN104967591A (en) | Cloud storage data read-write method and device, and read-write control method and device | |
CN112073444B (en) | Data set processing method and device and server | |
CN108400868A (en) | Storage method, device and the mobile terminal of seed key | |
CN110474764B (en) | Ciphertext data set intersection calculation method, device, system, client, server and medium | |
CN114240347A (en) | Business service secure docking method and device, computer equipment and storage medium | |
CN103379133A (en) | Safe and reliable cloud storage system | |
KR20160040399A (en) | Personal Information Management System and Personal Information Management Method | |
JP6272546B2 (en) | Data storage device, data processing method, and data processing program | |
CN112069525A (en) | Encryption method, device and equipment for generating key based on attribute of information | |
CN101527013B (en) | Method, terminal and system of data cooperation | |
CN110598427A (en) | Data processing method, system and storage medium | |
CN112947834A (en) | Information input method and device and electronic equipment | |
US20110288976A1 (en) | Total computer security | |
CN114978620B (en) | Encryption method and decryption method for identity identification number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |