CN107995270A - A kind of method that distributed document storage is realized based on block chain - Google Patents
A kind of method that distributed document storage is realized based on block chain Download PDFInfo
- Publication number
- CN107995270A CN107995270A CN201711194251.8A CN201711194251A CN107995270A CN 107995270 A CN107995270 A CN 107995270A CN 201711194251 A CN201711194251 A CN 201711194251A CN 107995270 A CN107995270 A CN 107995270A
- Authority
- CN
- China
- Prior art keywords
- node
- file
- download
- network
- receiving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
- G06F16/1834—Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of method that distributed document storage is realized based on block chain, sets and sends the node for adding network request information to initiate node, the node for receiving addition network request information is receiving node;The receiving node for adding network request information is received, construction echo message is sent to initiation node, and broadcasts the message that the initiation node adds network;The initiation node after echo message is received, the ID of receiving node is added in the ID lists of the initiation node.Present invention employs the P2P network architectures based on Internet, each node in same network is peers to, it is common to provide and enjoy network service jointly, there is no any special node, topological structure between node is not based on what geographical location was organized,, may be on geographical location remote away with the node of some node interconnection;Interworking, collaboration processing business, have the advantages that reliability, decentralization, opening between each node.
Description
Technical field
The present invention relates to block chain technical field, and in particular to a kind of side that distributed document storage is realized based on block chain
Method.
Background technology
Existing block chain technology is only to record simple account information, that is to say, that is merely able to the letter of record transaction
Breath, either bit coin or ether coin or other digital cash based on block chain technology have the limitation of block size,
Lead to not the record to form mass file data;
On the other hand, existing document storage system has relied on centring system and more back mechanisms, can not accomplish
The distributed document storage scheme of centralization;Need to obtain in data storage procedure and trust, cause efficiency low, and data reliability
Difference, security are low, easy to be lost.
The content of the invention
Based on this, in view of the above-mentioned problems, be necessary to propose a kind of method for realizing distributed document storage based on block chain,
The invention enables each node in same network to be peers to, common to provide and enjoy network service jointly,
There is no any special node, the topological structure between node is not based on what geographical location was organized, with some node
The node of interconnection, may be on geographical location remote away;Interworking, collaboration processing business, have reliable between each node
The advantages of property, decentralization, opening.
The technical scheme is that:
A kind of method that distributed document storage is realized based on block chain, setting send the node for adding network request information
To initiate node, the node for receiving addition network request information is receiving node, is comprised the following steps:
A, the receiving node for adding network request information is received, construction echo message is sent to initiation node, and is broadcasted
The initiation node adds the message of network;
B, the initiation node after echo message is received, the ID of receiving node is added to the ID lists of the initiation node
In.
The present invention is an autonomous shared storage network based on block chain technology, passes through shared global storage resource, profit
With block chain technology, file fragmentation is stored, builds the cloud storage of decentralization, becomes global block chain distributed document storage
Infrastructure;Which employs the P2P network architectures based on Internet, each node in same network is
Reciprocity each other, common to provide and enjoy network service jointly, there is no any special node;The function of being provided according to node
Or the difference of authority, each node may have the different division of labor, each node is by route, service discovery, file record number
Uploaded according to storehouse, file storage service, file, the function set of file download.
As the further optimization of such scheme, the step a comprises the following steps:
A1, receive the receiving node after adding network request information, whether just to verify the parameters of the solicited message
Really;If it is, being verified, construction echo message is sent to initiation node, and enters step a2;If it is not, then verification is lost
Lose, refusal initiates the request that node adds network, terminates flow;
A2, the configuration strategy for parsing receiving node, judge whether need that node ID addition reception will be initiated in configuration strategy
In the ID lists of node, if it is, being added to node ID is initiated in receiving node ID lists, and a3 is entered step;If
It is no, then it is directly entered step a3;
A3, judge whether select broadcast to initiate the message that node adds network in configuration strategy, if it is, random selection
4-5 nodal information in the initiation node, and broadcast the message that the initiation node adds network;If it is not, then without broadcast.
, all can be according to the BootStrap addresses of default configuration when in the present solution, any one node is in new start
List randomly chooses some nodes and sends the request for adding network, and receiving node is tested first after the request of addition network is received
Whether the every terms of information demonstrate,proved in required parameter is correct, after all parameters are verified, if authentication failed, responds refusal node and adds
Enter the information of network request;If be proved to be successful, construction, which is receiveed the response, first wraps and is sent to initiation node, according further to reception
New node is added in the node listing of oneself by the configuration strategy selection of node, while is selected according to the configuration strategy of receiving node
Select and whether broadcast the message that the node adds network;Node is completely dependent on relative to other distributed storages or Distributed Calculation
Consciousness it is different, it is contemplated that make a kind of shared economic business model, make sharing for idle storage space
Trade market, makes the slack resources of personal computer be used, corresponding with regard to that can obtain as long as sharing the free hard disk of oneself
Economic well-being of workers and staff, finally in the city of sufficient competition off field, everybody can go central store with extremely low price using what is be perfectly safe.
As the further optimization of such scheme, the step b comprises the following steps:
B1, receive the initiation node after echo message, verifies whether the signing messages of the echo message is correct, if
It is then to be verified, enters step b2;If it is not, then authentication failed, this is receiveed the response for refusal parsing, terminates flow;
B2, parse this and receive the response, and reading receives the response and includes ReqPeerID, ResPeerID, Net and Result
Data structure parameter;
B3, judge whether parameter ReqPeerID is the initiation node ID for receiving the echo message, if it is, will ginseng
Number ResPeerID and Net, which is added to, to initiate in node ID list;Initiate in node ID list, and tie if it is not, then being added without
Line journey.
In the present solution, any node for initiating addition network request first verifies that after response is received and responds result
Signing messages, reads the data structure for responding bag after being verified, the data structure of response includes following information:
ReqPeerID, represents to send the initiation node ID for adding network request information to receiving node;
ResPeerID, represents the ID of verification node, i.e., the receiving node ID receiveed the response is sent to initiation node;
Net, represents the basic network information and signature of verification node, that is, sends the facilities network for the receiving node receiveed the response
Network information and signature;
Result, represents the result of verification;
When receiving node receive initiate node send addition network request information after, can construct an echo message to
Node is initiated, after the signature for verifying echo message passes through, judges that the ReqPeerID in echo message (sends addition network
The initiation node ID of solicited message) whether it is same ID with receiving the initiation node ID receiveed the response, if so, will just initiate
The receiving node ID of echo message and its network information are added in the ID lists of the initiation node;Make to interact between each node
Running, collaboration processing business, while verify data, ensure that the security of data storage, realize in the going of data
The heartization stores.
As the further optimization of such scheme, file uploading step is further included:
After obtaining file upload permissions, determine to need the file uploaded;
The size and type of transmitting file in parsing, confirm the storage area grade of this document;
The demand for initiating node is received, and will be passed including the information data of price, rank, broadband speeds and online hours
Node is postbacked.
Back information is received initiating node, diffusion 3 is jumped around warp-wise if timeliness is by 3000ms or initiation node
Or have been received by 50 feedback records, then terminate the reception of back information.
As the further optimization of such scheme, the file uploading step further includes:
After initiating node receive information, according to center regular backup quantity, best price option is collected, and reports
To initiation node;
Judge whether to receive the price, if it is, file is cut into slices, and fragment is stored up respectively according to backup quantity
It is stored to online adjacent node spatially;If it is not, then the upper transmitting file of refusal.
In the present solution, the spatial level of selected file includes the parameters such as space size, uploading speed, stability,
In upload procedure, to ensure both sides of supply and demand interests, it is necessary to pay certain upload expense, paying corresponding red coin, (upload takes
With) after, burst is carried out to file according to the setting of parameter in the grade of file space, and by the file division scheme of setting, is made
Each slicing files are independently uploaded in distributed node, and the file of the storage has the characteristics that:
It is one is all equal everywhere:There is no central data center, data once produce and enter the block chain of the present invention
In, then data will be permanently present in network as ghost, never be lost;Anywhere anyone can obtain
The data that must be stored, fast and effective, the whole network is synchronous;
The second is permanent record:The computer that the whole world is much distributed together is distributed data under certain rule to be stored, superfluous
Remaining backup, some nodes, which go wrong, can't influence the computer of other storages.
As the further optimization of such scheme, file downloading step is further included:
File download authority is obtained, the address for searching for file to be downloaded is downloaded, if address error, search is lost
Lose;If address is correct, searches for successfully, carry out file download payment;
Judge whether to pay successfully, if it is, carrying out file download;If it is not, then refusal carries out file download;
The request of the detailed burst index data of node broadcasts this document address is downloaded, obtains all points of the download file
The index hash values of piece.
For file after burst uploads, user obtains a string of document No. addresses, so only needing input should when downloading file
Coded address both can search for downloading file accordingly, also, due to being the storage service of decentralization, so needing payment one
Determine expense to be downloaded, play certain guaranteeing role;Before downloading, dividing in detail for this document address can be broadcasted by downloading node first
The request of piece index data, to receive the index hash values of all bursts respectively;By the institute for removing download file correspondingly
There is burst so that ensure that the integrality of file while speed of download is improved.
As the further optimization of such scheme, the file downloading step further includes:
After the index hash values for receiving all bursts of downloaded file, the corresponding burst letter of each hash values is broadcasted
Breath;
Judge whether other nodes are stored with the corresponding burst information of hash values, if it is, sending echo message extremely
Download node;If it is not, then do not send echo message.
The corresponding burst information of each hash values is broadcasted, one-to-one download relation is realized to all bursts of file,
Meanwhile judge whether to download repetition or download path mistake, it ensure that the integrality and security of file download.
As the further optimization of such scheme, the file downloading step further includes:
Each slicing files are completed after downloading, contrast its hash value, it is legal to judge whether, if it is, by all points
Piece is merged into complete file;If it is not, then re-initiate the download request of the slicing files.
It is parallel at the same time to download multiple slicing files, after the completion of download, if the hash values of each slicing files are legal,
Complete file is then merged into, both improves speed of download, in turn ensure that the integrality of file, for illegal slicing files,
Then only need to re-download corresponding illegal slicing files, without re-downloading whole file, simplify download flow,
Make speed of download faster, download efficiency higher, while the security of the file ensured;The present invention technical characterstic be exactly POR and
POW common recognition mechanism, optimizes memory space, by using the mode of adjustable packet, burst is carried out to file, one complete
File be cut into very small fragment, each burst can be stored in more parts, ensure that the security of data, while elasticity
The online situation according to node do redundancy;After file is uploaded, can also hash verifications be carried out to file, because file is divided into
Fritter, every piece occupies little space so that speed of download is faster.
The beneficial effects of the invention are as follows:
1st, the present invention builds shared file storage service using the P2P network architectures, it is located at each in same network
Node is all peers to, common to provide and enjoy network service jointly, there is no any special node, is handed between each node
Interworking, collaboration processing business, have the advantages that reliability, decentralization, opening.
2nd, the consciousness for being completely dependent on node relative to other distributed storages or Distributed Calculation is different, purport of the present invention
A kind of shared economic business model is being made, that makes idle storage space shares trade market, makes personal computer
Slack resources be used, as long as sharing the free hard disk of oneself, with regard to corresponding economic well-being of workers and staff can be obtained, finally fully it is competing
Off field, everybody can go central store with extremely low price using what is be perfectly safe in the city striven.
3rd, the present invention optimizes memory space, by using adjustable packet based on being POR and POW common recognition mechanism
Mode, carries out burst, a complete file is cut into very small fragment, and each burst can be stored in more to file
Part, it ensure that the security of data, while the online situation according to node of elasticity does redundancy;, also can be right after file is uploaded
File carries out hash verifications, because file is divided into fritter, every piece occupies little space so that speed of download is faster.
4th, the file stored by the present invention can realize all equal everywhere that, there is no central data center, data are once produced
To give birth to and enter in the block chain of the present invention, data will be permanently present in network as ghost, never be lost, anyone
Anywhere the data of storage can be obtained, fast and effective, the whole network is synchronous.
5th, the file stored by the present invention can also realize permanent record, and the computer that the whole world is much distributed is together to data
Storage is distributed under certain rule, redundancy backup, some nodes, which go wrong, can't influence the computer of other storages.
Brief description of the drawings
Fig. 1 is the flow chart for the method for realizing distributed document storage described in the embodiment of the present invention based on block chain;
Fig. 2 is that the flow chart for adding network request is received described in the embodiment of the present invention;
Fig. 3 is the flow chart that echo message is received described in the embodiment of the present invention;
Fig. 4 is the flow chart of file uploading step described in the embodiment of the present invention;
Fig. 5 is the flow chart of file downloading step described in the embodiment of the present invention.
Embodiment
The embodiment of the present invention is described in detail below in conjunction with the accompanying drawings.
Embodiment
As shown in Figure 1, a kind of method that distributed document storage is realized based on block chain, setting send addition network request
For the node of information to initiate node, the node for receiving addition network request information is receiving node, is comprised the following steps:
A, the receiving node for adding network request information is received, construction echo message is sent to initiation node, and is broadcasted
The initiation node adds the message of network;
B, the initiation node after echo message is received, the ID of receiving node is added to the ID lists of the initiation node
In.
The present invention is an autonomous shared storage network based on block chain technology, passes through shared global storage resource, profit
With block chain technology, file fragmentation is stored, builds the cloud storage of decentralization, becomes global block chain distributed document storage
Infrastructure;Which employs the P2P network architectures based on Internet, each node in same network is
Reciprocity each other, common to provide and enjoy network service jointly, there is no any special node;The function of being provided according to node
Or the difference of authority, each node may have the different division of labor, each node is by route, service discovery, file record number
Uploaded according to storehouse, file storage service, file, the function set of file download;Node is each participated in first necessarily participates in the whole network
The routing function and Network Discovery Service function of network, other functions as shown in table 1, can be described according to the type configuration of node
Most commonly seen node type and function correspondence in the present invention.
Table 1
In one of the embodiments, as shown in Fig. 2, the step a comprises the following steps:
A1, receive the receiving node after adding network request information, whether just to verify the parameters of the solicited message
Really;If it is, being verified, construction echo message is sent to initiation node, and enters step a2;If it is not, then verification is lost
Lose, refusal initiates the request that node adds network, terminates flow;
A2, the configuration strategy for parsing receiving node, judge whether need that node ID addition reception will be initiated in configuration strategy
In the ID lists of node, if it is, being added to node ID is initiated in receiving node ID lists, and a3 is entered step;If
It is no, then it is directly entered step a3;
A3, judge whether select broadcast to initiate the message that node adds network in configuration strategy, if it is, random selection
4-5 nodal information in the initiation node, and broadcast the message that the initiation node adds network;If it is not, then without broadcast.
, all can be according to the BootStrap addresses of default configuration when in the present solution, any one node is in new start
List randomly chooses some nodes and sends the request for adding network, needs to include information as shown in Table 2 in request:
Parameter name | Parameter interpretation |
PeerID | Node ID |
Net | The basic network information and signature of node |
BlockStore | The block file storage information and related signature of node |
FileStore | The storage organization information and signature of node |
Routing | The routing iinformation and signature of node |
Config | The configuration information and signature of node |
Table 2
Receiving node first verifies that whether the every terms of information in required parameter is correct after the request of addition network is received,
After all parameters are verified, if authentication failed, the information that refusal node adds network request is responded;If be proved to be successful,
Construction, which is receiveed the response, first wraps and is sent to initiation node, selects to add new node according further to the configuration strategy of receiving node
Choose whether that broadcasting the node adds disappearing for network in the node listing of oneself, while according to the configuration strategy of receiving node
Breath;
The consciousness for being completely dependent on node relative to other distributed storages or Distributed Calculation is different, it is contemplated that
A kind of shared economic business model is made, that makes idle storage space shares trade market, makes personal computer
Slack resources are used, as long as sharing the free hard disk of oneself, with regard to that can obtain corresponding economic well-being of workers and staff, finally in sufficient competition
City off field, everybody can go central store with extremely low price using what is be perfectly safe.
In another embodiment, as shown in figure 3, the step b comprises the following steps:
B1, receive the initiation node after echo message, verifies whether the signing messages of the echo message is correct, if
It is then to be verified, enters step b2;If it is not, then authentication failed, this is receiveed the response for refusal parsing, terminates flow;
B2, parse this and receive the response, and reading receives the response and includes ReqPeerID, ResPeerID, Net and Result
Data structure parameter;
B3, judge whether parameter ReqPeerID is the initiation node ID for receiving the echo message, if it is, will ginseng
Number ResPeerID and Net, which is added to, to initiate in node ID list;Initiate in node ID list, and tie if it is not, then being added without
Line journey.
In the present solution, any node for initiating addition network request first verifies that after response is received and responds result
Signing messages, reads the data structure for responding bag after being verified, the data structure of response includes information as shown in table 3:
Parameter name | Parameter interpretation |
ReqPeerID | Initiate the ID of node |
ResPeerID | Verify the ID of node |
Net | Verify the basic network information and signature of node |
Result | Verification result |
Table 3
ReqPeerID, represents to send the initiation node ID for adding network request information to receiving node;
ResPeerID, represents the ID of verification node, i.e., the receiving node ID receiveed the response is sent to initiation node;
Net, represents the basic network information and signature of verification node, that is, sends the facilities network for the receiving node receiveed the response
Network information and signature;
Result, represents the result of verification;
When receiving node receive initiate node send addition network request information after, can construct an echo message to
Node is initiated, after the signature for verifying echo message passes through, judges that the ReqPeerID in echo message (sends addition network
The initiation node ID of solicited message) whether it is same ID with receiving the initiation node ID receiveed the response, if so, will just initiate
The receiving node ID of echo message and its network information are added in the ID lists of the initiation node;Make to interact between each node
Running, collaboration processing business, while verify data, ensure that the security of data storage, realize in the going of data
The heartization stores.
In another embodiment, as shown in figure 4, further including file uploading step:
After obtaining file upload permissions, determine to need the file uploaded;
The size and type of transmitting file in parsing, confirm the storage area grade of this document;
The demand for initiating node is received, and will be passed including the information data of price, rank, broadband speeds and online hours
Node is postbacked.
Back information is received initiating node, diffusion 3 is jumped around warp-wise if timeliness is by 3000ms or initiation node
Or have been received by 50 feedback records, then terminate the reception of back information.
In another embodiment, as shown in figure 4, the file uploading step further includes:
After initiating node receive information, according to center regular backup quantity, best price option is collected, and reports
To initiation node;
Judge whether to receive the price, if it is, file is cut into slices, and fragment is stored up respectively according to backup quantity
It is stored to online adjacent node spatially;If it is not, then the upper transmitting file of refusal.
In the present solution, the spatial level of selected file includes the parameters such as space size, uploading speed, stability,
During upper transmitting file, due to being the storage service of decentralization, so needing to carry out reimbursement of expense to play certain guarantor
Barrier acts on, and after corresponding red coin (upload expense) is paid, according to the setting of parameter in the grade of file space, and passes through setting
File division scheme carries out burst to file, each slicing files is independently uploaded in distributed node, the file of the storage
Have the characteristics that:
It is one is all equal everywhere:There is no central data center, data once produce and enter the block chain of the present invention
In, then data will be permanently present in network as ghost, never be lost;Anywhere anyone can obtain
The data that must be stored, fast and effective, the whole network is synchronous;
The second is permanent record:The computer that the whole world is much distributed together is distributed data under certain rule to be stored, superfluous
Remaining backup, some nodes, which go wrong, can't influence the computer of other storages.
In another embodiment, as shown in figure 5, further including file downloading step:
File download authority is obtained, the address for searching for file to be downloaded is downloaded, if address error, search is lost
Lose;If address is correct, searches for successfully, carry out file download payment;
Judge whether to pay successfully, if it is, carrying out file download;If it is not, then refusal carries out file download;
The request of the detailed burst index data of node broadcasts this document address is downloaded, obtains all points of the download file
The index hash values of piece.
For file after burst uploads, user obtains a string of document No. addresses, so only needing input should when downloading file
Coded address both can search for downloading file accordingly, also, due to being the storage service of decentralization, so needing payment one
Determine expense to be downloaded, play certain guaranteeing role;Before downloading, dividing in detail for this document address can be broadcasted by downloading node first
The request of piece index data, to receive the index hash values of all bursts respectively;By the institute for removing download file correspondingly
There is burst so that ensure that the integrality of file while speed of download is improved.
In another embodiment, as shown in figure 5, the file downloading step further includes:
After the index hash values for receiving all bursts of downloaded file, the corresponding burst letter of each hash values is broadcasted
Breath;
Judge whether other nodes are stored with the corresponding burst information of hash values, if it is, sending echo message extremely
Download node;If it is not, then do not send echo message.
The corresponding burst information of each hash values is broadcasted, one-to-one download relation is realized to all bursts of file,
Meanwhile judge whether to download repetition or download path mistake, it ensure that the integrality and security of file download.
In another embodiment, as shown in figure 5, the file downloading step further includes:
Each slicing files are completed after downloading, contrast its hash value, it is legal to judge whether, if it is, by all points
Piece is merged into complete file;If it is not, then re-initiate the download request of the slicing files.
It is parallel at the same time to download multiple slicing files, after the completion of download, if the hash values of each slicing files are legal,
Complete file is then merged into, both improves speed of download, in turn ensure that the integrality of file, for illegal slicing files,
Then only need to re-download corresponding illegal slicing files, without re-downloading whole file, simplify download flow,
Make speed of download faster, download efficiency higher, while the security of the file ensured;The present invention technical characterstic be exactly POR and
POW common recognition mechanism, optimizes memory space, by using the mode of adjustable packet, burst is carried out to file, one complete
File be cut into very small fragment, each burst can be stored in more parts, ensure that the security of data, while elasticity
The online situation according to node do redundancy;After file is uploaded, can also hash verifications be carried out to file, because file is divided into
Fritter, every piece occupies little space so that speed of download is faster.
In the present invention, the storage service of decentralization is realized, storage both sides can be divided into party in request and supplying party, its
In, party in request is needs the node of the storage file in the communal space, and to provide the node of the communal space, supplying party will for supplying party
The memory space of itself is provided as the communal space, and a party in request can correspond to multiple supplying parties, i.e. party in request can be by text
Part is stored in the communal space that multiple supplying parties provide, so the communal space memory provided when party in request in a certain supplying party
When storing up file, then need to pay corresponding expense to the supplying party, can be in the communal space of supplying party's offer after certain expense is paid
The interior storage operation for implementing file and uploading and downloading;And supplying party is needed after being registered as miner, the communal space could be set, it is real
The download and upload of existing file, the register flow path of miner are as follows:
1) registration miner is clicked on, determines whether platform ordinary user, if it is, being registered into next step;Such as
Fruit is no, then prompting enters ordinary user's Login Register flow;
2) read and agree to《User Agreement》If disagreed, registration failure, if agreed to, into next stepping
Row registration;
3) judge whether to have paid miner guarantee fund, if it is, succeeding in registration, if it is not, then registration failure.
The miner that registration is completed is corresponding with a communal space, and the operation setting flow in the communal space is as follows:
1) communal space is clicked on, determines whether miner, if it is, into next link;If it is not, then notify its into
Enter to register miner's flow;
2) communal space catalogue is set, clicks on and confirms to enter in next step, and generate a text under the space catalogue at the same time
Part presss from both sides, such as " my computer/F:/ fig ";
3) safety detection being carried out to space, the safety detection plug-in unit based on client insertion carries out safety detection to local,
Testing result is "No", prompts which link of user to go wrong;As a result be "Yes", then by safety detection and enter it is next
Step;
4) broadband is tested the speed, and super node can be allowed to transmit a small documents to object space here, and carries out evaluation of testing the speed, greatly
Do not passed through then less than 2M by testing the speed into next step then when 2M;
5) communal space amount of capacity is set, inquires about whether the disk there are 200G free spaces, if it is, into next
Step, if it is not, then the prompting user spatial content is less than 200G;
6) installation space price (because being the product of decentralization, allows providing service side and set price, and according to city
Economic benefits promote supply and demand transaction), respectively store price and download price, according to " 1G ", " 100M ", " below 100M " into
Row setting price;
7) complete, become the bronze level communal space.
Only after being registered as miner and carrying out communal space setting, file upload and down operation can be just carried out, is filled
The guarantee to file security point is realized, improves the efficiency that file is uploaded and downloaded, and is used as by paying guarantee fund and deposited
The guarantee of service is stored up, meets supply and demand transaction relationship, promotes market economy.
Embodiment described above only expresses the embodiment of the present invention, its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect scope.
Claims (8)
- A kind of 1. method that distributed document storage is realized based on block chain, it is characterised in that setting sends addition network request For the node of information to initiate node, the node for receiving addition network request information is receiving node, is comprised the following steps:A, the receiving node for adding network request information is received, construction echo message is sent to initiation node, and broadcasts the hair Play the message that node adds network;B, the initiation node after echo message is received, the ID of receiving node is added in the ID lists of the initiation node.
- 2. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that the step Rapid a comprises the following steps:A1, receive the receiving node after adding network request information, verifies whether the parameters of the solicited message are correct;Such as Fruit is then to be verified, and construction echo message is sent to initiation node, and enters step a2;If it is not, then authentication failed, is refused The request that node adds network is initiated absolutely, terminates flow;A2, the configuration strategy for parsing receiving node, judge whether need that node ID addition receiving node will be initiated in configuration strategy ID lists in, if it is, being added to node ID is initiated in receiving node ID lists, and enter step a3;If it is not, then It is directly entered step a3;A3, judge whether select broadcast to initiate the message that node adds network in configuration strategy, if it is, randomly choosing the hair 4-5 nodal information in node is played, and broadcasts the message that the initiation node adds network;If it is not, then without broadcast.
- 3. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that the step Rapid b comprises the following steps:B1, receive the initiation node after echo message, verifies whether the signing messages of the echo message is correct, if it is, It is verified, enters step b2;If it is not, then authentication failed, this is receiveed the response for refusal parsing, terminates flow;B2, parse this and receive the response, and reading receives the response and includes the number of ReqPeerID, ResPeerID, Net and Result According to structural parameters;B3, judge whether parameter ReqPeerID is the initiation node ID for receiving the echo message, if it is, by parameter ResPeerID and Net, which is added to, to initiate in node ID list;Initiate in node ID list, and terminate if it is not, then being added without Flow.
- 4. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that further include File uploading step:After obtaining file upload permissions, determine to need the file uploaded;The size and type of transmitting file in parsing, confirm the storage area grade of this document;The demand for initiating node is received, and passes the information data including price, rank, broadband speeds and online hours back hair Play node.
- 5. the method according to claim 4 that distributed document storage is realized based on block chain, it is characterised in that the text Part uploading step further includes:After initiating node receive information, according to center regular backup quantity, best price option is collected, and reports to hair Play node;Judge whether to receive the price, if it is, file is cut into slices, and fragment is stored into respectively according to backup quantity Online adjacent node is spatially;If it is not, then the upper transmitting file of refusal.
- 6. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that further include File downloading step:File download authority is obtained, the address for searching for file to be downloaded is downloaded, if address error, search failure;Such as Fruit address is correct, then searches for successfully, carry out file download payment;Judge whether to pay successfully, if it is, carrying out file download;If it is not, then refusal carries out file download;The request of the detailed burst index data of node broadcasts this document address is downloaded, obtains all bursts of the download file Index hash values.
- 7. the method according to claim 6 that distributed document storage is realized based on block chain, it is characterised in that the text Part download step further includes:After the index hash values for receiving all bursts of downloaded file, the corresponding burst information of each hash values is broadcasted;Judge whether other nodes are stored with the corresponding burst information of hash values, if it is, sending echo message to download Node;If it is not, then do not send echo message.
- 8. the method according to claim 7 that distributed document storage is realized based on block chain, it is characterised in that the text Part download step further includes:Each slicing files are completed after downloading, contrast its hash value, it is legal to judge whether, if it is, all bursts are closed And into complete file;If it is not, then re-initiate the download request of the slicing files.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711194251.8A CN107995270A (en) | 2017-11-24 | 2017-11-24 | A kind of method that distributed document storage is realized based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711194251.8A CN107995270A (en) | 2017-11-24 | 2017-11-24 | A kind of method that distributed document storage is realized based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107995270A true CN107995270A (en) | 2018-05-04 |
Family
ID=62033042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711194251.8A Pending CN107995270A (en) | 2017-11-24 | 2017-11-24 | A kind of method that distributed document storage is realized based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107995270A (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650085A (en) * | 2018-05-10 | 2018-10-12 | 杭州智块网络科技有限公司 | A kind of group membership's extended method, device, equipment and medium based on block chain |
CN108733788A (en) * | 2018-05-11 | 2018-11-02 | 北京奇虎科技有限公司 | A kind of idle memory space confirmation method, device and computer storage media |
CN108810157A (en) * | 2018-06-20 | 2018-11-13 | 泰链(厦门)科技有限公司 | The connection method of block chain network, medium, apparatus and system |
CN108833515A (en) * | 2018-06-05 | 2018-11-16 | 上海和数软件有限公司 | Block chain node optimization method, device and computer readable storage medium |
CN108897497A (en) * | 2018-06-29 | 2018-11-27 | 吴俊杰 | A kind of acentric data managing method and device |
CN109120714A (en) * | 2018-09-21 | 2019-01-01 | 深圳市九洲电器有限公司 | Security protection data reconstruction method and system, node server |
CN109150968A (en) * | 2018-07-13 | 2019-01-04 | 上海大学 | A kind of block chain distributed storage method based on privacy sharing |
CN109255583A (en) * | 2018-07-27 | 2019-01-22 | 深圳市元征科技股份有限公司 | A kind of information sharing method, device, relevant device and medium |
CN109302307A (en) * | 2018-08-16 | 2019-02-01 | 泰链(厦门)科技有限公司 | Network host, the method based on network host rapid deployment block chain node |
CN109408463A (en) * | 2018-09-21 | 2019-03-01 | 深圳市九洲电器有限公司 | Distributive file storage method and device, node server |
CN109587253A (en) * | 2018-12-11 | 2019-04-05 | 浙江大学 | A method of distributed storage is realized to file based on block chain |
CN109600357A (en) * | 2018-11-05 | 2019-04-09 | 电子科技大学 | A kind of distributed identity authentication system, method and server |
CN109819013A (en) * | 2018-12-11 | 2019-05-28 | 上海大学 | A kind of block chain memory capacity optimization method based on cloud storage |
CN109885424A (en) * | 2019-01-16 | 2019-06-14 | 平安科技(深圳)有限公司 | A kind of data back up method, device and computer equipment |
CN110290192A (en) * | 2019-06-18 | 2019-09-27 | 贝富(广州)新技术有限公司 | The storage of data distribution formula and data capture method, device based on block chain |
CN110288445A (en) * | 2019-06-28 | 2019-09-27 | 杭州复杂美科技有限公司 | Decentralization storage method, equipment and storage medium |
CN110381072A (en) * | 2018-10-11 | 2019-10-25 | 腾讯科技(深圳)有限公司 | Data verification method, system and computer readable storage medium based on block chain |
CN110599144A (en) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Network access method and device for block link points |
CN110737658A (en) * | 2019-09-06 | 2020-01-31 | 平安国际智慧城市科技股份有限公司 | Data fragment storage method, device, terminal and readable storage medium |
CN110784463A (en) * | 2019-10-24 | 2020-02-11 | 深圳市超算科技开发有限公司 | File storage and access method and system based on block chain |
CN111092909A (en) * | 2019-12-30 | 2020-05-01 | 深圳市优权天成科技有限公司 | Decentralized remote control downloading algorithm and equipment |
WO2020125224A1 (en) * | 2018-12-20 | 2020-06-25 | 阿里巴巴集团控股有限公司 | Data structure reading method and apparatus, data structure updating method and apparatus, and electronic device |
WO2021022737A1 (en) * | 2019-08-08 | 2021-02-11 | 南京中诚区块链研究院有限公司 | Financial security depository receipt system and method based on blockchain |
CN113515496A (en) * | 2021-05-25 | 2021-10-19 | 上海旺链信息科技有限公司 | File transmission method and device, electronic equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624748A (en) * | 2012-04-16 | 2012-08-01 | 暨南大学 | Peer-to-peer (P2P) network access control method |
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN106027647A (en) * | 2016-05-20 | 2016-10-12 | 云南云电同方科技有限公司 | LXPFS (Linux XProgram File System) cluster distributed file storage system |
CN106600405A (en) * | 2016-11-17 | 2017-04-26 | 复旦大学 | Block-chain-based data rights protection method |
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN106878000A (en) * | 2017-03-06 | 2017-06-20 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of alliance's chain common recognition method and system |
CN107040594A (en) * | 2017-04-12 | 2017-08-11 | 山大地纬软件股份有限公司 | The method and device of license block chain node access based on PBFT |
CN107231239A (en) * | 2017-06-27 | 2017-10-03 | 中国联合网络通信集团有限公司 | Create generation block method for anti-counterfeit and device |
CN107330720A (en) * | 2017-06-12 | 2017-11-07 | 中国联合网络通信集团有限公司 | Integration processing method and system based on block chain |
-
2017
- 2017-11-24 CN CN201711194251.8A patent/CN107995270A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624748A (en) * | 2012-04-16 | 2012-08-01 | 暨南大学 | Peer-to-peer (P2P) network access control method |
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN106027647A (en) * | 2016-05-20 | 2016-10-12 | 云南云电同方科技有限公司 | LXPFS (Linux XProgram File System) cluster distributed file storage system |
CN106600405A (en) * | 2016-11-17 | 2017-04-26 | 复旦大学 | Block-chain-based data rights protection method |
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN106878000A (en) * | 2017-03-06 | 2017-06-20 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of alliance's chain common recognition method and system |
CN107040594A (en) * | 2017-04-12 | 2017-08-11 | 山大地纬软件股份有限公司 | The method and device of license block chain node access based on PBFT |
CN107330720A (en) * | 2017-06-12 | 2017-11-07 | 中国联合网络通信集团有限公司 | Integration processing method and system based on block chain |
CN107231239A (en) * | 2017-06-27 | 2017-10-03 | 中国联合网络通信集团有限公司 | Create generation block method for anti-counterfeit and device |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650085B (en) * | 2018-05-10 | 2021-01-01 | 杭州智块网络科技有限公司 | Block chain-based group member expansion method, device, equipment and medium |
CN108650085A (en) * | 2018-05-10 | 2018-10-12 | 杭州智块网络科技有限公司 | A kind of group membership's extended method, device, equipment and medium based on block chain |
CN108733788A (en) * | 2018-05-11 | 2018-11-02 | 北京奇虎科技有限公司 | A kind of idle memory space confirmation method, device and computer storage media |
CN108833515A (en) * | 2018-06-05 | 2018-11-16 | 上海和数软件有限公司 | Block chain node optimization method, device and computer readable storage medium |
CN108833515B (en) * | 2018-06-05 | 2021-12-28 | 上海和数软件有限公司 | Block chain node optimization method and device and computer readable storage medium |
CN108810157A (en) * | 2018-06-20 | 2018-11-13 | 泰链(厦门)科技有限公司 | The connection method of block chain network, medium, apparatus and system |
CN108897497A (en) * | 2018-06-29 | 2018-11-27 | 吴俊杰 | A kind of acentric data managing method and device |
CN108897497B (en) * | 2018-06-29 | 2021-10-08 | 吴俊杰 | Centerless data management method and device |
CN109150968A (en) * | 2018-07-13 | 2019-01-04 | 上海大学 | A kind of block chain distributed storage method based on privacy sharing |
CN109255583A (en) * | 2018-07-27 | 2019-01-22 | 深圳市元征科技股份有限公司 | A kind of information sharing method, device, relevant device and medium |
CN109302307A (en) * | 2018-08-16 | 2019-02-01 | 泰链(厦门)科技有限公司 | Network host, the method based on network host rapid deployment block chain node |
CN109302307B (en) * | 2018-08-16 | 2021-06-04 | 泰链(厦门)科技有限公司 | Network host and method for rapidly deploying block chain nodes based on network host |
CN109408463A (en) * | 2018-09-21 | 2019-03-01 | 深圳市九洲电器有限公司 | Distributive file storage method and device, node server |
CN109120714B (en) * | 2018-09-21 | 2021-07-09 | 深圳市九洲电器有限公司 | Security data recovery method and system, and node server |
CN109120714A (en) * | 2018-09-21 | 2019-01-01 | 深圳市九洲电器有限公司 | Security protection data reconstruction method and system, node server |
CN109408463B (en) * | 2018-09-21 | 2020-12-08 | 深圳市九洲电器有限公司 | File distributed storage method and device and node server |
CN110381072A (en) * | 2018-10-11 | 2019-10-25 | 腾讯科技(深圳)有限公司 | Data verification method, system and computer readable storage medium based on block chain |
CN110381072B (en) * | 2018-10-11 | 2020-07-03 | 腾讯科技(深圳)有限公司 | Block chain based data verification method, system and computer readable storage medium |
CN109600357A (en) * | 2018-11-05 | 2019-04-09 | 电子科技大学 | A kind of distributed identity authentication system, method and server |
CN109587253B (en) * | 2018-12-11 | 2021-06-29 | 浙江大学 | Method for realizing distributed storage of files based on block chain |
CN109587253A (en) * | 2018-12-11 | 2019-04-05 | 浙江大学 | A method of distributed storage is realized to file based on block chain |
CN109819013A (en) * | 2018-12-11 | 2019-05-28 | 上海大学 | A kind of block chain memory capacity optimization method based on cloud storage |
TWI724570B (en) * | 2018-12-20 | 2021-04-11 | 開曼群島商創新先進技術有限公司 | Method, device, electronic equipment and storage medium for reading and updating data structure |
US11775507B2 (en) | 2018-12-20 | 2023-10-03 | Advanced New Technologies Co., Ltd. | Methods and apparatuses for reading and updating data structures, and electronic devices |
WO2020125224A1 (en) * | 2018-12-20 | 2020-06-25 | 阿里巴巴集团控股有限公司 | Data structure reading method and apparatus, data structure updating method and apparatus, and electronic device |
CN109885424A (en) * | 2019-01-16 | 2019-06-14 | 平安科技(深圳)有限公司 | A kind of data back up method, device and computer equipment |
CN110290192A (en) * | 2019-06-18 | 2019-09-27 | 贝富(广州)新技术有限公司 | The storage of data distribution formula and data capture method, device based on block chain |
CN110288445B (en) * | 2019-06-28 | 2024-03-05 | 杭州复杂美科技有限公司 | Decentralised storage method, device and storage medium |
CN110288445A (en) * | 2019-06-28 | 2019-09-27 | 杭州复杂美科技有限公司 | Decentralization storage method, equipment and storage medium |
WO2021022737A1 (en) * | 2019-08-08 | 2021-02-11 | 南京中诚区块链研究院有限公司 | Financial security depository receipt system and method based on blockchain |
CN110737658A (en) * | 2019-09-06 | 2020-01-31 | 平安国际智慧城市科技股份有限公司 | Data fragment storage method, device, terminal and readable storage medium |
CN110599144B (en) * | 2019-09-24 | 2023-08-22 | 腾讯科技(深圳)有限公司 | Network access method and device for blockchain nodes |
CN110599144A (en) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Network access method and device for block link points |
CN110784463B (en) * | 2019-10-24 | 2021-08-31 | 深圳市超算科技开发有限公司 | File storage and access method based on block chain |
CN110784463A (en) * | 2019-10-24 | 2020-02-11 | 深圳市超算科技开发有限公司 | File storage and access method and system based on block chain |
CN111092909A (en) * | 2019-12-30 | 2020-05-01 | 深圳市优权天成科技有限公司 | Decentralized remote control downloading algorithm and equipment |
CN113515496A (en) * | 2021-05-25 | 2021-10-19 | 上海旺链信息科技有限公司 | File transmission method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107995270A (en) | A kind of method that distributed document storage is realized based on block chain | |
Wan et al. | Recent advances in consensus protocols for blockchain: a survey | |
CN109471744B (en) | Main chain and parallel multi-sub-chain system architecture based on block chain | |
CN112541758A (en) | Multi-round voting type fault-tolerant sequencing consensus mechanism and method based on block chain | |
CN113395363B (en) | Data processing method, device and equipment based on block chain and storage medium | |
CN108776929A (en) | Bill processing method, system based on block chain database and readable storage medium storing program for executing | |
US20190279210A1 (en) | Infinitely scalable cryptocurrency system with fast, secure verification | |
Ersoy et al. | Transaction propagation on permissionless blockchains: incentive and routing mechanisms | |
Levin et al. | Interdomain routing and games | |
CN110351133A (en) | Method and device for the host node hand-off process in block catenary system | |
CN109039847A (en) | A kind of method and device solving block chain the whole network message consistency problem using DMT | |
CN108596621A (en) | Block chain accounting nodes generation method, device, computer equipment and storage medium | |
CN105827410A (en) | Block chain transmission method and system with trusted node/satellite node construction | |
CN109360100A (en) | Transaction rapid acknowledgment method and device based on block chain technology | |
CN107945017B (en) | Hybrid chain accounting method based on multi-stage verification | |
CN107807951A (en) | A kind of block chain generation method, data verification method, node and system | |
Zhang et al. | Cycledger: A scalable and secure parallel protocol for distributed ledger via sharding | |
EP3698518A1 (en) | Primary and secondary blockchain device | |
US10757007B1 (en) | Techniques for payment-based network transmissions | |
CN105678151A (en) | Block chain transmitting method and system for constructing trustable nodes/satellite nodes | |
CN110839056B (en) | Data processing method and device based on block chain and node network | |
CN110177124A (en) | Identity identifying method and relevant device based on block chain | |
CN109087105A (en) | For digging the Hash Search method of mine, digging mine machine and block catenary system | |
CN116595094A (en) | Federal learning incentive method, device, equipment and storage medium based on block chain | |
CN113342838B (en) | Data processing method, device and equipment based on block chain and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |
|
RJ01 | Rejection of invention patent application after publication |