CN107995270A - A kind of method that distributed document storage is realized based on block chain - Google Patents

A kind of method that distributed document storage is realized based on block chain Download PDF

Info

Publication number
CN107995270A
CN107995270A CN201711194251.8A CN201711194251A CN107995270A CN 107995270 A CN107995270 A CN 107995270A CN 201711194251 A CN201711194251 A CN 201711194251A CN 107995270 A CN107995270 A CN 107995270A
Authority
CN
China
Prior art keywords
node
file
download
network
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711194251.8A
Other languages
Chinese (zh)
Inventor
史凌云
王波
梁磊
高明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Red Software Technology Co Ltd
Original Assignee
Chengdu Red Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Red Software Technology Co Ltd filed Critical Chengdu Red Software Technology Co Ltd
Priority to CN201711194251.8A priority Critical patent/CN107995270A/en
Publication of CN107995270A publication Critical patent/CN107995270A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1834Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of method that distributed document storage is realized based on block chain, sets and sends the node for adding network request information to initiate node, the node for receiving addition network request information is receiving node;The receiving node for adding network request information is received, construction echo message is sent to initiation node, and broadcasts the message that the initiation node adds network;The initiation node after echo message is received, the ID of receiving node is added in the ID lists of the initiation node.Present invention employs the P2P network architectures based on Internet, each node in same network is peers to, it is common to provide and enjoy network service jointly, there is no any special node, topological structure between node is not based on what geographical location was organized,, may be on geographical location remote away with the node of some node interconnection;Interworking, collaboration processing business, have the advantages that reliability, decentralization, opening between each node.

Description

A kind of method that distributed document storage is realized based on block chain
Technical field
The present invention relates to block chain technical field, and in particular to a kind of side that distributed document storage is realized based on block chain Method.
Background technology
Existing block chain technology is only to record simple account information, that is to say, that is merely able to the letter of record transaction Breath, either bit coin or ether coin or other digital cash based on block chain technology have the limitation of block size, Lead to not the record to form mass file data;
On the other hand, existing document storage system has relied on centring system and more back mechanisms, can not accomplish The distributed document storage scheme of centralization;Need to obtain in data storage procedure and trust, cause efficiency low, and data reliability Difference, security are low, easy to be lost.
The content of the invention
Based on this, in view of the above-mentioned problems, be necessary to propose a kind of method for realizing distributed document storage based on block chain, The invention enables each node in same network to be peers to, common to provide and enjoy network service jointly, There is no any special node, the topological structure between node is not based on what geographical location was organized, with some node The node of interconnection, may be on geographical location remote away;Interworking, collaboration processing business, have reliable between each node The advantages of property, decentralization, opening.
The technical scheme is that:
A kind of method that distributed document storage is realized based on block chain, setting send the node for adding network request information To initiate node, the node for receiving addition network request information is receiving node, is comprised the following steps:
A, the receiving node for adding network request information is received, construction echo message is sent to initiation node, and is broadcasted The initiation node adds the message of network;
B, the initiation node after echo message is received, the ID of receiving node is added to the ID lists of the initiation node In.
The present invention is an autonomous shared storage network based on block chain technology, passes through shared global storage resource, profit With block chain technology, file fragmentation is stored, builds the cloud storage of decentralization, becomes global block chain distributed document storage Infrastructure;Which employs the P2P network architectures based on Internet, each node in same network is Reciprocity each other, common to provide and enjoy network service jointly, there is no any special node;The function of being provided according to node Or the difference of authority, each node may have the different division of labor, each node is by route, service discovery, file record number Uploaded according to storehouse, file storage service, file, the function set of file download.
As the further optimization of such scheme, the step a comprises the following steps:
A1, receive the receiving node after adding network request information, whether just to verify the parameters of the solicited message Really;If it is, being verified, construction echo message is sent to initiation node, and enters step a2;If it is not, then verification is lost Lose, refusal initiates the request that node adds network, terminates flow;
A2, the configuration strategy for parsing receiving node, judge whether need that node ID addition reception will be initiated in configuration strategy In the ID lists of node, if it is, being added to node ID is initiated in receiving node ID lists, and a3 is entered step;If It is no, then it is directly entered step a3;
A3, judge whether select broadcast to initiate the message that node adds network in configuration strategy, if it is, random selection 4-5 nodal information in the initiation node, and broadcast the message that the initiation node adds network;If it is not, then without broadcast.
, all can be according to the BootStrap addresses of default configuration when in the present solution, any one node is in new start List randomly chooses some nodes and sends the request for adding network, and receiving node is tested first after the request of addition network is received Whether the every terms of information demonstrate,proved in required parameter is correct, after all parameters are verified, if authentication failed, responds refusal node and adds Enter the information of network request;If be proved to be successful, construction, which is receiveed the response, first wraps and is sent to initiation node, according further to reception New node is added in the node listing of oneself by the configuration strategy selection of node, while is selected according to the configuration strategy of receiving node Select and whether broadcast the message that the node adds network;Node is completely dependent on relative to other distributed storages or Distributed Calculation Consciousness it is different, it is contemplated that make a kind of shared economic business model, make sharing for idle storage space Trade market, makes the slack resources of personal computer be used, corresponding with regard to that can obtain as long as sharing the free hard disk of oneself Economic well-being of workers and staff, finally in the city of sufficient competition off field, everybody can go central store with extremely low price using what is be perfectly safe.
As the further optimization of such scheme, the step b comprises the following steps:
B1, receive the initiation node after echo message, verifies whether the signing messages of the echo message is correct, if It is then to be verified, enters step b2;If it is not, then authentication failed, this is receiveed the response for refusal parsing, terminates flow;
B2, parse this and receive the response, and reading receives the response and includes ReqPeerID, ResPeerID, Net and Result Data structure parameter;
B3, judge whether parameter ReqPeerID is the initiation node ID for receiving the echo message, if it is, will ginseng Number ResPeerID and Net, which is added to, to initiate in node ID list;Initiate in node ID list, and tie if it is not, then being added without Line journey.
In the present solution, any node for initiating addition network request first verifies that after response is received and responds result Signing messages, reads the data structure for responding bag after being verified, the data structure of response includes following information:
ReqPeerID, represents to send the initiation node ID for adding network request information to receiving node;
ResPeerID, represents the ID of verification node, i.e., the receiving node ID receiveed the response is sent to initiation node;
Net, represents the basic network information and signature of verification node, that is, sends the facilities network for the receiving node receiveed the response Network information and signature;
Result, represents the result of verification;
When receiving node receive initiate node send addition network request information after, can construct an echo message to Node is initiated, after the signature for verifying echo message passes through, judges that the ReqPeerID in echo message (sends addition network The initiation node ID of solicited message) whether it is same ID with receiving the initiation node ID receiveed the response, if so, will just initiate The receiving node ID of echo message and its network information are added in the ID lists of the initiation node;Make to interact between each node Running, collaboration processing business, while verify data, ensure that the security of data storage, realize in the going of data The heartization stores.
As the further optimization of such scheme, file uploading step is further included:
After obtaining file upload permissions, determine to need the file uploaded;
The size and type of transmitting file in parsing, confirm the storage area grade of this document;
The demand for initiating node is received, and will be passed including the information data of price, rank, broadband speeds and online hours Node is postbacked.
Back information is received initiating node, diffusion 3 is jumped around warp-wise if timeliness is by 3000ms or initiation node Or have been received by 50 feedback records, then terminate the reception of back information.
As the further optimization of such scheme, the file uploading step further includes:
After initiating node receive information, according to center regular backup quantity, best price option is collected, and reports To initiation node;
Judge whether to receive the price, if it is, file is cut into slices, and fragment is stored up respectively according to backup quantity It is stored to online adjacent node spatially;If it is not, then the upper transmitting file of refusal.
In the present solution, the spatial level of selected file includes the parameters such as space size, uploading speed, stability, In upload procedure, to ensure both sides of supply and demand interests, it is necessary to pay certain upload expense, paying corresponding red coin, (upload takes With) after, burst is carried out to file according to the setting of parameter in the grade of file space, and by the file division scheme of setting, is made Each slicing files are independently uploaded in distributed node, and the file of the storage has the characteristics that:
It is one is all equal everywhere:There is no central data center, data once produce and enter the block chain of the present invention In, then data will be permanently present in network as ghost, never be lost;Anywhere anyone can obtain The data that must be stored, fast and effective, the whole network is synchronous;
The second is permanent record:The computer that the whole world is much distributed together is distributed data under certain rule to be stored, superfluous Remaining backup, some nodes, which go wrong, can't influence the computer of other storages.
As the further optimization of such scheme, file downloading step is further included:
File download authority is obtained, the address for searching for file to be downloaded is downloaded, if address error, search is lost Lose;If address is correct, searches for successfully, carry out file download payment;
Judge whether to pay successfully, if it is, carrying out file download;If it is not, then refusal carries out file download;
The request of the detailed burst index data of node broadcasts this document address is downloaded, obtains all points of the download file The index hash values of piece.
For file after burst uploads, user obtains a string of document No. addresses, so only needing input should when downloading file Coded address both can search for downloading file accordingly, also, due to being the storage service of decentralization, so needing payment one Determine expense to be downloaded, play certain guaranteeing role;Before downloading, dividing in detail for this document address can be broadcasted by downloading node first The request of piece index data, to receive the index hash values of all bursts respectively;By the institute for removing download file correspondingly There is burst so that ensure that the integrality of file while speed of download is improved.
As the further optimization of such scheme, the file downloading step further includes:
After the index hash values for receiving all bursts of downloaded file, the corresponding burst letter of each hash values is broadcasted Breath;
Judge whether other nodes are stored with the corresponding burst information of hash values, if it is, sending echo message extremely Download node;If it is not, then do not send echo message.
The corresponding burst information of each hash values is broadcasted, one-to-one download relation is realized to all bursts of file, Meanwhile judge whether to download repetition or download path mistake, it ensure that the integrality and security of file download.
As the further optimization of such scheme, the file downloading step further includes:
Each slicing files are completed after downloading, contrast its hash value, it is legal to judge whether, if it is, by all points Piece is merged into complete file;If it is not, then re-initiate the download request of the slicing files.
It is parallel at the same time to download multiple slicing files, after the completion of download, if the hash values of each slicing files are legal, Complete file is then merged into, both improves speed of download, in turn ensure that the integrality of file, for illegal slicing files, Then only need to re-download corresponding illegal slicing files, without re-downloading whole file, simplify download flow, Make speed of download faster, download efficiency higher, while the security of the file ensured;The present invention technical characterstic be exactly POR and POW common recognition mechanism, optimizes memory space, by using the mode of adjustable packet, burst is carried out to file, one complete File be cut into very small fragment, each burst can be stored in more parts, ensure that the security of data, while elasticity The online situation according to node do redundancy;After file is uploaded, can also hash verifications be carried out to file, because file is divided into Fritter, every piece occupies little space so that speed of download is faster.
The beneficial effects of the invention are as follows:
1st, the present invention builds shared file storage service using the P2P network architectures, it is located at each in same network Node is all peers to, common to provide and enjoy network service jointly, there is no any special node, is handed between each node Interworking, collaboration processing business, have the advantages that reliability, decentralization, opening.
2nd, the consciousness for being completely dependent on node relative to other distributed storages or Distributed Calculation is different, purport of the present invention A kind of shared economic business model is being made, that makes idle storage space shares trade market, makes personal computer Slack resources be used, as long as sharing the free hard disk of oneself, with regard to corresponding economic well-being of workers and staff can be obtained, finally fully it is competing Off field, everybody can go central store with extremely low price using what is be perfectly safe in the city striven.
3rd, the present invention optimizes memory space, by using adjustable packet based on being POR and POW common recognition mechanism Mode, carries out burst, a complete file is cut into very small fragment, and each burst can be stored in more to file Part, it ensure that the security of data, while the online situation according to node of elasticity does redundancy;, also can be right after file is uploaded File carries out hash verifications, because file is divided into fritter, every piece occupies little space so that speed of download is faster.
4th, the file stored by the present invention can realize all equal everywhere that, there is no central data center, data are once produced To give birth to and enter in the block chain of the present invention, data will be permanently present in network as ghost, never be lost, anyone Anywhere the data of storage can be obtained, fast and effective, the whole network is synchronous.
5th, the file stored by the present invention can also realize permanent record, and the computer that the whole world is much distributed is together to data Storage is distributed under certain rule, redundancy backup, some nodes, which go wrong, can't influence the computer of other storages.
Brief description of the drawings
Fig. 1 is the flow chart for the method for realizing distributed document storage described in the embodiment of the present invention based on block chain;
Fig. 2 is that the flow chart for adding network request is received described in the embodiment of the present invention;
Fig. 3 is the flow chart that echo message is received described in the embodiment of the present invention;
Fig. 4 is the flow chart of file uploading step described in the embodiment of the present invention;
Fig. 5 is the flow chart of file downloading step described in the embodiment of the present invention.
Embodiment
The embodiment of the present invention is described in detail below in conjunction with the accompanying drawings.
Embodiment
As shown in Figure 1, a kind of method that distributed document storage is realized based on block chain, setting send addition network request For the node of information to initiate node, the node for receiving addition network request information is receiving node, is comprised the following steps:
A, the receiving node for adding network request information is received, construction echo message is sent to initiation node, and is broadcasted The initiation node adds the message of network;
B, the initiation node after echo message is received, the ID of receiving node is added to the ID lists of the initiation node In.
The present invention is an autonomous shared storage network based on block chain technology, passes through shared global storage resource, profit With block chain technology, file fragmentation is stored, builds the cloud storage of decentralization, becomes global block chain distributed document storage Infrastructure;Which employs the P2P network architectures based on Internet, each node in same network is Reciprocity each other, common to provide and enjoy network service jointly, there is no any special node;The function of being provided according to node Or the difference of authority, each node may have the different division of labor, each node is by route, service discovery, file record number Uploaded according to storehouse, file storage service, file, the function set of file download;Node is each participated in first necessarily participates in the whole network The routing function and Network Discovery Service function of network, other functions as shown in table 1, can be described according to the type configuration of node Most commonly seen node type and function correspondence in the present invention.
Table 1
In one of the embodiments, as shown in Fig. 2, the step a comprises the following steps:
A1, receive the receiving node after adding network request information, whether just to verify the parameters of the solicited message Really;If it is, being verified, construction echo message is sent to initiation node, and enters step a2;If it is not, then verification is lost Lose, refusal initiates the request that node adds network, terminates flow;
A2, the configuration strategy for parsing receiving node, judge whether need that node ID addition reception will be initiated in configuration strategy In the ID lists of node, if it is, being added to node ID is initiated in receiving node ID lists, and a3 is entered step;If It is no, then it is directly entered step a3;
A3, judge whether select broadcast to initiate the message that node adds network in configuration strategy, if it is, random selection 4-5 nodal information in the initiation node, and broadcast the message that the initiation node adds network;If it is not, then without broadcast.
, all can be according to the BootStrap addresses of default configuration when in the present solution, any one node is in new start List randomly chooses some nodes and sends the request for adding network, needs to include information as shown in Table 2 in request:
Parameter name Parameter interpretation
PeerID Node ID
Net The basic network information and signature of node
BlockStore The block file storage information and related signature of node
FileStore The storage organization information and signature of node
Routing The routing iinformation and signature of node
Config The configuration information and signature of node
Table 2
Receiving node first verifies that whether the every terms of information in required parameter is correct after the request of addition network is received, After all parameters are verified, if authentication failed, the information that refusal node adds network request is responded;If be proved to be successful, Construction, which is receiveed the response, first wraps and is sent to initiation node, selects to add new node according further to the configuration strategy of receiving node Choose whether that broadcasting the node adds disappearing for network in the node listing of oneself, while according to the configuration strategy of receiving node Breath;
The consciousness for being completely dependent on node relative to other distributed storages or Distributed Calculation is different, it is contemplated that A kind of shared economic business model is made, that makes idle storage space shares trade market, makes personal computer Slack resources are used, as long as sharing the free hard disk of oneself, with regard to that can obtain corresponding economic well-being of workers and staff, finally in sufficient competition City off field, everybody can go central store with extremely low price using what is be perfectly safe.
In another embodiment, as shown in figure 3, the step b comprises the following steps:
B1, receive the initiation node after echo message, verifies whether the signing messages of the echo message is correct, if It is then to be verified, enters step b2;If it is not, then authentication failed, this is receiveed the response for refusal parsing, terminates flow;
B2, parse this and receive the response, and reading receives the response and includes ReqPeerID, ResPeerID, Net and Result Data structure parameter;
B3, judge whether parameter ReqPeerID is the initiation node ID for receiving the echo message, if it is, will ginseng Number ResPeerID and Net, which is added to, to initiate in node ID list;Initiate in node ID list, and tie if it is not, then being added without Line journey.
In the present solution, any node for initiating addition network request first verifies that after response is received and responds result Signing messages, reads the data structure for responding bag after being verified, the data structure of response includes information as shown in table 3:
Parameter name Parameter interpretation
ReqPeerID Initiate the ID of node
ResPeerID Verify the ID of node
Net Verify the basic network information and signature of node
Result Verification result
Table 3
ReqPeerID, represents to send the initiation node ID for adding network request information to receiving node;
ResPeerID, represents the ID of verification node, i.e., the receiving node ID receiveed the response is sent to initiation node;
Net, represents the basic network information and signature of verification node, that is, sends the facilities network for the receiving node receiveed the response Network information and signature;
Result, represents the result of verification;
When receiving node receive initiate node send addition network request information after, can construct an echo message to Node is initiated, after the signature for verifying echo message passes through, judges that the ReqPeerID in echo message (sends addition network The initiation node ID of solicited message) whether it is same ID with receiving the initiation node ID receiveed the response, if so, will just initiate The receiving node ID of echo message and its network information are added in the ID lists of the initiation node;Make to interact between each node Running, collaboration processing business, while verify data, ensure that the security of data storage, realize in the going of data The heartization stores.
In another embodiment, as shown in figure 4, further including file uploading step:
After obtaining file upload permissions, determine to need the file uploaded;
The size and type of transmitting file in parsing, confirm the storage area grade of this document;
The demand for initiating node is received, and will be passed including the information data of price, rank, broadband speeds and online hours Node is postbacked.
Back information is received initiating node, diffusion 3 is jumped around warp-wise if timeliness is by 3000ms or initiation node Or have been received by 50 feedback records, then terminate the reception of back information.
In another embodiment, as shown in figure 4, the file uploading step further includes:
After initiating node receive information, according to center regular backup quantity, best price option is collected, and reports To initiation node;
Judge whether to receive the price, if it is, file is cut into slices, and fragment is stored up respectively according to backup quantity It is stored to online adjacent node spatially;If it is not, then the upper transmitting file of refusal.
In the present solution, the spatial level of selected file includes the parameters such as space size, uploading speed, stability, During upper transmitting file, due to being the storage service of decentralization, so needing to carry out reimbursement of expense to play certain guarantor Barrier acts on, and after corresponding red coin (upload expense) is paid, according to the setting of parameter in the grade of file space, and passes through setting File division scheme carries out burst to file, each slicing files is independently uploaded in distributed node, the file of the storage Have the characteristics that:
It is one is all equal everywhere:There is no central data center, data once produce and enter the block chain of the present invention In, then data will be permanently present in network as ghost, never be lost;Anywhere anyone can obtain The data that must be stored, fast and effective, the whole network is synchronous;
The second is permanent record:The computer that the whole world is much distributed together is distributed data under certain rule to be stored, superfluous Remaining backup, some nodes, which go wrong, can't influence the computer of other storages.
In another embodiment, as shown in figure 5, further including file downloading step:
File download authority is obtained, the address for searching for file to be downloaded is downloaded, if address error, search is lost Lose;If address is correct, searches for successfully, carry out file download payment;
Judge whether to pay successfully, if it is, carrying out file download;If it is not, then refusal carries out file download;
The request of the detailed burst index data of node broadcasts this document address is downloaded, obtains all points of the download file The index hash values of piece.
For file after burst uploads, user obtains a string of document No. addresses, so only needing input should when downloading file Coded address both can search for downloading file accordingly, also, due to being the storage service of decentralization, so needing payment one Determine expense to be downloaded, play certain guaranteeing role;Before downloading, dividing in detail for this document address can be broadcasted by downloading node first The request of piece index data, to receive the index hash values of all bursts respectively;By the institute for removing download file correspondingly There is burst so that ensure that the integrality of file while speed of download is improved.
In another embodiment, as shown in figure 5, the file downloading step further includes:
After the index hash values for receiving all bursts of downloaded file, the corresponding burst letter of each hash values is broadcasted Breath;
Judge whether other nodes are stored with the corresponding burst information of hash values, if it is, sending echo message extremely Download node;If it is not, then do not send echo message.
The corresponding burst information of each hash values is broadcasted, one-to-one download relation is realized to all bursts of file, Meanwhile judge whether to download repetition or download path mistake, it ensure that the integrality and security of file download.
In another embodiment, as shown in figure 5, the file downloading step further includes:
Each slicing files are completed after downloading, contrast its hash value, it is legal to judge whether, if it is, by all points Piece is merged into complete file;If it is not, then re-initiate the download request of the slicing files.
It is parallel at the same time to download multiple slicing files, after the completion of download, if the hash values of each slicing files are legal, Complete file is then merged into, both improves speed of download, in turn ensure that the integrality of file, for illegal slicing files, Then only need to re-download corresponding illegal slicing files, without re-downloading whole file, simplify download flow, Make speed of download faster, download efficiency higher, while the security of the file ensured;The present invention technical characterstic be exactly POR and POW common recognition mechanism, optimizes memory space, by using the mode of adjustable packet, burst is carried out to file, one complete File be cut into very small fragment, each burst can be stored in more parts, ensure that the security of data, while elasticity The online situation according to node do redundancy;After file is uploaded, can also hash verifications be carried out to file, because file is divided into Fritter, every piece occupies little space so that speed of download is faster.
In the present invention, the storage service of decentralization is realized, storage both sides can be divided into party in request and supplying party, its In, party in request is needs the node of the storage file in the communal space, and to provide the node of the communal space, supplying party will for supplying party The memory space of itself is provided as the communal space, and a party in request can correspond to multiple supplying parties, i.e. party in request can be by text Part is stored in the communal space that multiple supplying parties provide, so the communal space memory provided when party in request in a certain supplying party When storing up file, then need to pay corresponding expense to the supplying party, can be in the communal space of supplying party's offer after certain expense is paid The interior storage operation for implementing file and uploading and downloading;And supplying party is needed after being registered as miner, the communal space could be set, it is real The download and upload of existing file, the register flow path of miner are as follows:
1) registration miner is clicked on, determines whether platform ordinary user, if it is, being registered into next step;Such as Fruit is no, then prompting enters ordinary user's Login Register flow;
2) read and agree to《User Agreement》If disagreed, registration failure, if agreed to, into next stepping Row registration;
3) judge whether to have paid miner guarantee fund, if it is, succeeding in registration, if it is not, then registration failure.
The miner that registration is completed is corresponding with a communal space, and the operation setting flow in the communal space is as follows:
1) communal space is clicked on, determines whether miner, if it is, into next link;If it is not, then notify its into Enter to register miner's flow;
2) communal space catalogue is set, clicks on and confirms to enter in next step, and generate a text under the space catalogue at the same time Part presss from both sides, such as " my computer/F:/ fig ";
3) safety detection being carried out to space, the safety detection plug-in unit based on client insertion carries out safety detection to local, Testing result is "No", prompts which link of user to go wrong;As a result be "Yes", then by safety detection and enter it is next Step;
4) broadband is tested the speed, and super node can be allowed to transmit a small documents to object space here, and carries out evaluation of testing the speed, greatly Do not passed through then less than 2M by testing the speed into next step then when 2M;
5) communal space amount of capacity is set, inquires about whether the disk there are 200G free spaces, if it is, into next Step, if it is not, then the prompting user spatial content is less than 200G;
6) installation space price (because being the product of decentralization, allows providing service side and set price, and according to city Economic benefits promote supply and demand transaction), respectively store price and download price, according to " 1G ", " 100M ", " below 100M " into Row setting price;
7) complete, become the bronze level communal space.
Only after being registered as miner and carrying out communal space setting, file upload and down operation can be just carried out, is filled The guarantee to file security point is realized, improves the efficiency that file is uploaded and downloaded, and is used as by paying guarantee fund and deposited The guarantee of service is stored up, meets supply and demand transaction relationship, promotes market economy.
Embodiment described above only expresses the embodiment of the present invention, its description is more specific and detailed, but simultaneously Therefore the limitation to the scope of the claims of the present invention cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention Protect scope.

Claims (8)

  1. A kind of 1. method that distributed document storage is realized based on block chain, it is characterised in that setting sends addition network request For the node of information to initiate node, the node for receiving addition network request information is receiving node, is comprised the following steps:
    A, the receiving node for adding network request information is received, construction echo message is sent to initiation node, and broadcasts the hair Play the message that node adds network;
    B, the initiation node after echo message is received, the ID of receiving node is added in the ID lists of the initiation node.
  2. 2. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that the step Rapid a comprises the following steps:
    A1, receive the receiving node after adding network request information, verifies whether the parameters of the solicited message are correct;Such as Fruit is then to be verified, and construction echo message is sent to initiation node, and enters step a2;If it is not, then authentication failed, is refused The request that node adds network is initiated absolutely, terminates flow;
    A2, the configuration strategy for parsing receiving node, judge whether need that node ID addition receiving node will be initiated in configuration strategy ID lists in, if it is, being added to node ID is initiated in receiving node ID lists, and enter step a3;If it is not, then It is directly entered step a3;
    A3, judge whether select broadcast to initiate the message that node adds network in configuration strategy, if it is, randomly choosing the hair 4-5 nodal information in node is played, and broadcasts the message that the initiation node adds network;If it is not, then without broadcast.
  3. 3. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that the step Rapid b comprises the following steps:
    B1, receive the initiation node after echo message, verifies whether the signing messages of the echo message is correct, if it is, It is verified, enters step b2;If it is not, then authentication failed, this is receiveed the response for refusal parsing, terminates flow;
    B2, parse this and receive the response, and reading receives the response and includes the number of ReqPeerID, ResPeerID, Net and Result According to structural parameters;
    B3, judge whether parameter ReqPeerID is the initiation node ID for receiving the echo message, if it is, by parameter ResPeerID and Net, which is added to, to initiate in node ID list;Initiate in node ID list, and terminate if it is not, then being added without Flow.
  4. 4. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that further include File uploading step:
    After obtaining file upload permissions, determine to need the file uploaded;
    The size and type of transmitting file in parsing, confirm the storage area grade of this document;
    The demand for initiating node is received, and passes the information data including price, rank, broadband speeds and online hours back hair Play node.
  5. 5. the method according to claim 4 that distributed document storage is realized based on block chain, it is characterised in that the text Part uploading step further includes:
    After initiating node receive information, according to center regular backup quantity, best price option is collected, and reports to hair Play node;
    Judge whether to receive the price, if it is, file is cut into slices, and fragment is stored into respectively according to backup quantity Online adjacent node is spatially;If it is not, then the upper transmitting file of refusal.
  6. 6. the method according to claim 1 that distributed document storage is realized based on block chain, it is characterised in that further include File downloading step:
    File download authority is obtained, the address for searching for file to be downloaded is downloaded, if address error, search failure;Such as Fruit address is correct, then searches for successfully, carry out file download payment;
    Judge whether to pay successfully, if it is, carrying out file download;If it is not, then refusal carries out file download;
    The request of the detailed burst index data of node broadcasts this document address is downloaded, obtains all bursts of the download file Index hash values.
  7. 7. the method according to claim 6 that distributed document storage is realized based on block chain, it is characterised in that the text Part download step further includes:
    After the index hash values for receiving all bursts of downloaded file, the corresponding burst information of each hash values is broadcasted;
    Judge whether other nodes are stored with the corresponding burst information of hash values, if it is, sending echo message to download Node;If it is not, then do not send echo message.
  8. 8. the method according to claim 7 that distributed document storage is realized based on block chain, it is characterised in that the text Part download step further includes:
    Each slicing files are completed after downloading, contrast its hash value, it is legal to judge whether, if it is, all bursts are closed And into complete file;If it is not, then re-initiate the download request of the slicing files.
CN201711194251.8A 2017-11-24 2017-11-24 A kind of method that distributed document storage is realized based on block chain Pending CN107995270A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711194251.8A CN107995270A (en) 2017-11-24 2017-11-24 A kind of method that distributed document storage is realized based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711194251.8A CN107995270A (en) 2017-11-24 2017-11-24 A kind of method that distributed document storage is realized based on block chain

Publications (1)

Publication Number Publication Date
CN107995270A true CN107995270A (en) 2018-05-04

Family

ID=62033042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711194251.8A Pending CN107995270A (en) 2017-11-24 2017-11-24 A kind of method that distributed document storage is realized based on block chain

Country Status (1)

Country Link
CN (1) CN107995270A (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650085A (en) * 2018-05-10 2018-10-12 杭州智块网络科技有限公司 A kind of group membership's extended method, device, equipment and medium based on block chain
CN108733788A (en) * 2018-05-11 2018-11-02 北京奇虎科技有限公司 A kind of idle memory space confirmation method, device and computer storage media
CN108810157A (en) * 2018-06-20 2018-11-13 泰链(厦门)科技有限公司 The connection method of block chain network, medium, apparatus and system
CN108833515A (en) * 2018-06-05 2018-11-16 上海和数软件有限公司 Block chain node optimization method, device and computer readable storage medium
CN108897497A (en) * 2018-06-29 2018-11-27 吴俊杰 A kind of acentric data managing method and device
CN109120714A (en) * 2018-09-21 2019-01-01 深圳市九洲电器有限公司 Security protection data reconstruction method and system, node server
CN109150968A (en) * 2018-07-13 2019-01-04 上海大学 A kind of block chain distributed storage method based on privacy sharing
CN109255583A (en) * 2018-07-27 2019-01-22 深圳市元征科技股份有限公司 A kind of information sharing method, device, relevant device and medium
CN109302307A (en) * 2018-08-16 2019-02-01 泰链(厦门)科技有限公司 Network host, the method based on network host rapid deployment block chain node
CN109408463A (en) * 2018-09-21 2019-03-01 深圳市九洲电器有限公司 Distributive file storage method and device, node server
CN109587253A (en) * 2018-12-11 2019-04-05 浙江大学 A method of distributed storage is realized to file based on block chain
CN109600357A (en) * 2018-11-05 2019-04-09 电子科技大学 A kind of distributed identity authentication system, method and server
CN109819013A (en) * 2018-12-11 2019-05-28 上海大学 A kind of block chain memory capacity optimization method based on cloud storage
CN109885424A (en) * 2019-01-16 2019-06-14 平安科技(深圳)有限公司 A kind of data back up method, device and computer equipment
CN110290192A (en) * 2019-06-18 2019-09-27 贝富(广州)新技术有限公司 The storage of data distribution formula and data capture method, device based on block chain
CN110288445A (en) * 2019-06-28 2019-09-27 杭州复杂美科技有限公司 Decentralization storage method, equipment and storage medium
CN110381072A (en) * 2018-10-11 2019-10-25 腾讯科技(深圳)有限公司 Data verification method, system and computer readable storage medium based on block chain
CN110599144A (en) * 2019-09-24 2019-12-20 腾讯科技(深圳)有限公司 Network access method and device for block link points
CN110737658A (en) * 2019-09-06 2020-01-31 平安国际智慧城市科技股份有限公司 Data fragment storage method, device, terminal and readable storage medium
CN110784463A (en) * 2019-10-24 2020-02-11 深圳市超算科技开发有限公司 File storage and access method and system based on block chain
CN111092909A (en) * 2019-12-30 2020-05-01 深圳市优权天成科技有限公司 Decentralized remote control downloading algorithm and equipment
WO2020125224A1 (en) * 2018-12-20 2020-06-25 阿里巴巴集团控股有限公司 Data structure reading method and apparatus, data structure updating method and apparatus, and electronic device
WO2021022737A1 (en) * 2019-08-08 2021-02-11 南京中诚区块链研究院有限公司 Financial security depository receipt system and method based on blockchain
CN113515496A (en) * 2021-05-25 2021-10-19 上海旺链信息科技有限公司 File transmission method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624748A (en) * 2012-04-16 2012-08-01 暨南大学 Peer-to-peer (P2P) network access control method
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN106027647A (en) * 2016-05-20 2016-10-12 云南云电同方科技有限公司 LXPFS (Linux XProgram File System) cluster distributed file storage system
CN106600405A (en) * 2016-11-17 2017-04-26 复旦大学 Block-chain-based data rights protection method
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN106878000A (en) * 2017-03-06 2017-06-20 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of alliance's chain common recognition method and system
CN107040594A (en) * 2017-04-12 2017-08-11 山大地纬软件股份有限公司 The method and device of license block chain node access based on PBFT
CN107231239A (en) * 2017-06-27 2017-10-03 中国联合网络通信集团有限公司 Create generation block method for anti-counterfeit and device
CN107330720A (en) * 2017-06-12 2017-11-07 中国联合网络通信集团有限公司 Integration processing method and system based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624748A (en) * 2012-04-16 2012-08-01 暨南大学 Peer-to-peer (P2P) network access control method
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN106027647A (en) * 2016-05-20 2016-10-12 云南云电同方科技有限公司 LXPFS (Linux XProgram File System) cluster distributed file storage system
CN106600405A (en) * 2016-11-17 2017-04-26 复旦大学 Block-chain-based data rights protection method
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN106878000A (en) * 2017-03-06 2017-06-20 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of alliance's chain common recognition method and system
CN107040594A (en) * 2017-04-12 2017-08-11 山大地纬软件股份有限公司 The method and device of license block chain node access based on PBFT
CN107330720A (en) * 2017-06-12 2017-11-07 中国联合网络通信集团有限公司 Integration processing method and system based on block chain
CN107231239A (en) * 2017-06-27 2017-10-03 中国联合网络通信集团有限公司 Create generation block method for anti-counterfeit and device

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650085B (en) * 2018-05-10 2021-01-01 杭州智块网络科技有限公司 Block chain-based group member expansion method, device, equipment and medium
CN108650085A (en) * 2018-05-10 2018-10-12 杭州智块网络科技有限公司 A kind of group membership's extended method, device, equipment and medium based on block chain
CN108733788A (en) * 2018-05-11 2018-11-02 北京奇虎科技有限公司 A kind of idle memory space confirmation method, device and computer storage media
CN108833515A (en) * 2018-06-05 2018-11-16 上海和数软件有限公司 Block chain node optimization method, device and computer readable storage medium
CN108833515B (en) * 2018-06-05 2021-12-28 上海和数软件有限公司 Block chain node optimization method and device and computer readable storage medium
CN108810157A (en) * 2018-06-20 2018-11-13 泰链(厦门)科技有限公司 The connection method of block chain network, medium, apparatus and system
CN108897497A (en) * 2018-06-29 2018-11-27 吴俊杰 A kind of acentric data managing method and device
CN108897497B (en) * 2018-06-29 2021-10-08 吴俊杰 Centerless data management method and device
CN109150968A (en) * 2018-07-13 2019-01-04 上海大学 A kind of block chain distributed storage method based on privacy sharing
CN109255583A (en) * 2018-07-27 2019-01-22 深圳市元征科技股份有限公司 A kind of information sharing method, device, relevant device and medium
CN109302307A (en) * 2018-08-16 2019-02-01 泰链(厦门)科技有限公司 Network host, the method based on network host rapid deployment block chain node
CN109302307B (en) * 2018-08-16 2021-06-04 泰链(厦门)科技有限公司 Network host and method for rapidly deploying block chain nodes based on network host
CN109408463A (en) * 2018-09-21 2019-03-01 深圳市九洲电器有限公司 Distributive file storage method and device, node server
CN109120714B (en) * 2018-09-21 2021-07-09 深圳市九洲电器有限公司 Security data recovery method and system, and node server
CN109120714A (en) * 2018-09-21 2019-01-01 深圳市九洲电器有限公司 Security protection data reconstruction method and system, node server
CN109408463B (en) * 2018-09-21 2020-12-08 深圳市九洲电器有限公司 File distributed storage method and device and node server
CN110381072A (en) * 2018-10-11 2019-10-25 腾讯科技(深圳)有限公司 Data verification method, system and computer readable storage medium based on block chain
CN110381072B (en) * 2018-10-11 2020-07-03 腾讯科技(深圳)有限公司 Block chain based data verification method, system and computer readable storage medium
CN109600357A (en) * 2018-11-05 2019-04-09 电子科技大学 A kind of distributed identity authentication system, method and server
CN109587253B (en) * 2018-12-11 2021-06-29 浙江大学 Method for realizing distributed storage of files based on block chain
CN109587253A (en) * 2018-12-11 2019-04-05 浙江大学 A method of distributed storage is realized to file based on block chain
CN109819013A (en) * 2018-12-11 2019-05-28 上海大学 A kind of block chain memory capacity optimization method based on cloud storage
TWI724570B (en) * 2018-12-20 2021-04-11 開曼群島商創新先進技術有限公司 Method, device, electronic equipment and storage medium for reading and updating data structure
US11775507B2 (en) 2018-12-20 2023-10-03 Advanced New Technologies Co., Ltd. Methods and apparatuses for reading and updating data structures, and electronic devices
WO2020125224A1 (en) * 2018-12-20 2020-06-25 阿里巴巴集团控股有限公司 Data structure reading method and apparatus, data structure updating method and apparatus, and electronic device
CN109885424A (en) * 2019-01-16 2019-06-14 平安科技(深圳)有限公司 A kind of data back up method, device and computer equipment
CN110290192A (en) * 2019-06-18 2019-09-27 贝富(广州)新技术有限公司 The storage of data distribution formula and data capture method, device based on block chain
CN110288445B (en) * 2019-06-28 2024-03-05 杭州复杂美科技有限公司 Decentralised storage method, device and storage medium
CN110288445A (en) * 2019-06-28 2019-09-27 杭州复杂美科技有限公司 Decentralization storage method, equipment and storage medium
WO2021022737A1 (en) * 2019-08-08 2021-02-11 南京中诚区块链研究院有限公司 Financial security depository receipt system and method based on blockchain
CN110737658A (en) * 2019-09-06 2020-01-31 平安国际智慧城市科技股份有限公司 Data fragment storage method, device, terminal and readable storage medium
CN110599144B (en) * 2019-09-24 2023-08-22 腾讯科技(深圳)有限公司 Network access method and device for blockchain nodes
CN110599144A (en) * 2019-09-24 2019-12-20 腾讯科技(深圳)有限公司 Network access method and device for block link points
CN110784463B (en) * 2019-10-24 2021-08-31 深圳市超算科技开发有限公司 File storage and access method based on block chain
CN110784463A (en) * 2019-10-24 2020-02-11 深圳市超算科技开发有限公司 File storage and access method and system based on block chain
CN111092909A (en) * 2019-12-30 2020-05-01 深圳市优权天成科技有限公司 Decentralized remote control downloading algorithm and equipment
CN113515496A (en) * 2021-05-25 2021-10-19 上海旺链信息科技有限公司 File transmission method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107995270A (en) A kind of method that distributed document storage is realized based on block chain
Wan et al. Recent advances in consensus protocols for blockchain: a survey
CN109471744B (en) Main chain and parallel multi-sub-chain system architecture based on block chain
CN112541758A (en) Multi-round voting type fault-tolerant sequencing consensus mechanism and method based on block chain
CN113395363B (en) Data processing method, device and equipment based on block chain and storage medium
CN108776929A (en) Bill processing method, system based on block chain database and readable storage medium storing program for executing
US20190279210A1 (en) Infinitely scalable cryptocurrency system with fast, secure verification
Ersoy et al. Transaction propagation on permissionless blockchains: incentive and routing mechanisms
Levin et al. Interdomain routing and games
CN110351133A (en) Method and device for the host node hand-off process in block catenary system
CN109039847A (en) A kind of method and device solving block chain the whole network message consistency problem using DMT
CN108596621A (en) Block chain accounting nodes generation method, device, computer equipment and storage medium
CN105827410A (en) Block chain transmission method and system with trusted node/satellite node construction
CN109360100A (en) Transaction rapid acknowledgment method and device based on block chain technology
CN107945017B (en) Hybrid chain accounting method based on multi-stage verification
CN107807951A (en) A kind of block chain generation method, data verification method, node and system
Zhang et al. Cycledger: A scalable and secure parallel protocol for distributed ledger via sharding
EP3698518A1 (en) Primary and secondary blockchain device
US10757007B1 (en) Techniques for payment-based network transmissions
CN105678151A (en) Block chain transmitting method and system for constructing trustable nodes/satellite nodes
CN110839056B (en) Data processing method and device based on block chain and node network
CN110177124A (en) Identity identifying method and relevant device based on block chain
CN109087105A (en) For digging the Hash Search method of mine, digging mine machine and block catenary system
CN116595094A (en) Federal learning incentive method, device, equipment and storage medium based on block chain
CN113342838B (en) Data processing method, device and equipment based on block chain and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504

RJ01 Rejection of invention patent application after publication