CN110351362A - Data verification method, equipment and computer readable storage medium - Google Patents

Data verification method, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110351362A
CN110351362A CN201910627888.4A CN201910627888A CN110351362A CN 110351362 A CN110351362 A CN 110351362A CN 201910627888 A CN201910627888 A CN 201910627888A CN 110351362 A CN110351362 A CN 110351362A
Authority
CN
China
Prior art keywords
cloud storage
node
storage node
data
fragment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910627888.4A
Other languages
Chinese (zh)
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201910627888.4A priority Critical patent/CN110351362A/en
Publication of CN110351362A publication Critical patent/CN110351362A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The embodiment of the present invention provides a kind of data verification method, equipment and computer readable storage medium.The embodiment of the present invention sends inquiry request to multiple cloud storage nodes by user node, so that the fragment data of each cloud storage querying node data to be checked in multiple cloud storage node, when the user node receives the fragment data that each cloud storage querying node arrives, to each cloud storage querying node to fragment data be compared, if some cloud storage querying node to fragment data it is different from the fragment data that other cloud storage querying nodes arrive, then user node broadcasts compensation requests in block chain network, it avoids and needs to download mass data from each cloud storage node when the data that user node stores each cloud storage node are verified, to save a large amount of computing resources of the user node, improve the user node inquiring and authenticating efficiency, the safety of data storage is also improved simultaneously.

Description

Data verification method, equipment and computer readable storage medium
Technical field
The present embodiments relate to fields of communication technology more particularly to a kind of data verification method, equipment and computer can Read storage medium.
Background technique
Cloud storage is a kind of mode of online on-line storage (English: Cloud storage), i.e., data is stored in usually By more virtual servers of third party's trustship, and on non-exclusive server.The number of trustship (hosting) company operation large size According to center, the people of data storage trustship is needed, then through the mode to its purchase or lease memory space, to meet data storage Demand.Data center operator prepares the resource of Storage Virtualization according to the demand of user, in rear end, and by it to store money The mode in source pond (storage pool) provides, and client can voluntarily store file or object using this memory resource pool.It is real On border, these resources are possibly distributed on numerous server hosts.
But whether the content stored in block chain medium cloud memory node correct, if is dropped, if be tampered or Imperfect, the cloud storage node that the presence of problems above makes user node need to pay to it is verified.If with Family node gets off all data content downloads to be verified every time, when each cloud storage node in multiple cloud storage nodes When being stored with mass data, then means that user node needs to download mass data from each cloud storage node, so lead A large amount of computing resources of the user node are caused to be wasted.
Summary of the invention
The embodiment of the present invention provides a kind of data verification method, equipment and computer readable storage medium, to save the use A large amount of computing resources of family node improve the user node inquiring and authenticating efficiency, while also improving the safety of data storage.
In a first aspect, the embodiment of the present invention provides a kind of data verification method, comprising:
User node sends inquiry request to multiple cloud storage nodes, and the inquiry request includes the Hash of data to be checked The fragment identification of value and the data to be checked;
The user node receives the fragment identification of each cloud storage node feeding back in the multiple cloud storage node Corresponding fragment data;
The fragment identification pair of the user node to each cloud storage node feeding back in the multiple cloud storage node The fragment data answered is compared;
If the corresponding segment of the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node Data fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then the user node is in area Compensation requests are broadcasted in block chain network, the compensation requests include the fragment identification pair of the target cloud storage node feeding back The fragment data answered;
Wherein, the multiple cloud storage node and the user node are the participation nodes in the block chain network.
Second aspect, the embodiment of the present invention provide a kind of user node, comprising:
Memory;
Processor;
Communication interface;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor following Operation:
Inquiry request is sent to multiple cloud storage nodes by the communication interface, the inquiry request includes number to be checked According to cryptographic Hash and the data to be checked fragment identification;
The segment of each cloud storage node feeding back in the multiple cloud storage node is received by the communication interface Identify corresponding fragment data;
To the corresponding fragment data of the fragment identification of each cloud storage node feeding back in the multiple cloud storage node It is compared;
If the corresponding segment of the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node Data fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then passes through the communication interface Compensation requests are broadcasted in block chain network, the compensation requests include described segment mark of the target cloud storage node feeding back Know corresponding fragment data;
Wherein, the multiple cloud storage node and the user node are the participation nodes in the block chain network.
The third aspect, the embodiment of the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, The computer program is executed by processor to realize method described in first aspect.
Data verification method, equipment and computer readable storage medium provided in an embodiment of the present invention, pass through user node Inquiry request is sent to multiple cloud storage nodes, so that each cloud storage querying node in multiple cloud storage node is to be checked The fragment data of data deposits each cloud when the user node receives the fragment data that each cloud storage querying node arrives Storage querying node to fragment data be compared, if some cloud storage querying node to fragment data deposited with other clouds The fragment data that storage querying node arrives is different, then user node broadcasts compensation requests in block chain network, avoids user's section It needs to download mass data from each cloud storage node when point verifies the data that each cloud storage node stores, thus The a large amount of computing resources for saving the user node improve the user node inquiring and authenticating efficiency, while also improving data The safety of storage.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of application scenarios provided in an embodiment of the present invention;
Fig. 2 is data verification method flow chart provided in an embodiment of the present invention;
Fig. 3 be another embodiment of the present invention provides data verification method flow chart;
Fig. 4 be another embodiment of the present invention provides data verification method flow chart;
Fig. 5 is the structural schematic diagram of user node provided in an embodiment of the present invention.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Data verification method provided in an embodiment of the present invention can be adapted for communication system shown in FIG. 1.As shown in Figure 1, The communication system includes: user node, accounting nodes, backup memory node 1, backup memory node 2 and primary storage node, In, user node, accounting nodes, backup memory node 1, backup memory node 2 and primary storage node are in block chain network Participate in node.It is appreciated that only schematically illustrate herein, the node number and type in the block chain network are not limited. Wherein, backup memory node 1, backup memory node 2 or primary storage node can be an either multiple cloud servers, cloud Server i.e. Cloud Server are held, is a server cluster, there is that many servers are similar with general computer architecture, The composition of cloud server includes processor, hard disk, memory, system bus etc..User node specifically can be user terminal, example Such as, smart phone, tablet computer, personal computer etc..
Data verification method provided in an embodiment of the present invention, it is intended to solve the technical problem as above of the prior art.
How to be solved with technical solution of the specifically embodiment to technical solution of the present invention and the application below above-mentioned Technical problem is described in detail.These specific embodiments can be combined with each other below, for the same or similar concept Or process may repeat no more in certain embodiments.Below in conjunction with attached drawing, the embodiment of the present invention is described.
Fig. 2 is data verification method flow chart provided in an embodiment of the present invention.The embodiment of the present invention is for the prior art Technical problem as above provides data verification method, and specific step is as follows for this method:
Step 201, user node send inquiry request to multiple cloud storage nodes, and the inquiry request includes number to be checked According to cryptographic Hash and the data to be checked fragment identification.
In the present embodiment, user node, primary storage node, backup memory node 1, backup memory node 2 are blocks Participation node in chain network, wherein primary storage node, backup memory node 1, backup memory node 2 are denoted as cloud storage section Point.Cloud storage node can in real time or periodically monitor the size of the idle storage space of oneself, and in block chain network Broadcast message is sent, which can specifically include the sky of the block chain mark of the cloud storage node, the cloud storage node The size of not busy memory space, the data of the cloud storage node store monovalent information (for example, 1 yuan/G month), the cloud storage node Reparation information (for example, reparation data storage n times of expense) when occurring storage mistake of IP address, the cloud storage node in At least one.
Data to be stored can be stored in multiple cloud storage nodes in the block chain network by user node, for example, Data to be stored can be respectively stored in backup memory node 1 as shown in Figure 1, backup memory node 2 and master by user node Memory node, and record data to be stored cryptographic Hash and the IP address of each backup memory node or block chain mark it is corresponding Relationship, and record the cryptographic Hash of the data to be stored and the corresponding pass of the IP address of the primary storage node or block chain mark System.In some embodiments, the user node can not also record data to be stored cryptographic Hash and each backup memory node IP address or block chain mark corresponding relationship, and record the cryptographic Hash of the data to be stored and the IP of the primary storage node The corresponding relationship of address or block chain mark, the IP address or area of the cryptographic Hash of the data to be stored and each backup memory node The corresponding relationship of block chain mark, and record the cryptographic Hash of the data to be stored and the IP address of the primary storage node or block chain The corresponding relationship of mark can store in block chain account book.
In the present embodiment, when data to be stored is respectively stored in backup storage section as shown in Figure 1 by the user node After point 1, backup memory node 2 and primary storage node, which can be periodically or acyclic to backup storage Node 1, backup memory node 2 and primary storage node send inquiry request respectively, which includes the data to be checked The fragment identification of cryptographic Hash and the data to be checked.The data to be checked specifically can be backup memory node 1, backup storage section The data of point 2 and the storage of primary storage node, the fragment identification of the data to be checked specifically can be the n-th of the data to be checked Byte, N can be any positive integer.Specifically, the inquiry request can be broadcast in the block chain network by the user node, So that the backup memory node 1, backup memory node 2 and primary storage node in the block chain network are respectively received the inquiry and ask It asks.Alternatively, the user node can IP address, the IP address and primary storage of backup memory node 2 according to backup memory node 1 The inquiry request is sent to backup using the mode of point-to-point (peer to peer lending, P2P) by the IP address of node Memory node 1, backup memory node 2 and primary storage node.
Step 202, the user node receive the described of each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of fragment identification.
When the backup memory node 1 receives the inquiry of user node transmission by way of block chain network or P2P After request, which obtains the corresponding data of the cryptographic Hash according to the cryptographic Hash in the inquiry request, and inquires To the corresponding fragment data of nth byte in the data.Further, the backup memory node 1 is by the n-th word in the data It saves corresponding fragment data and feeds back to the user node.
Similarly, when the backup memory node 2 receives user node transmission by way of block chain network or P2P After inquiry request, which obtains the corresponding data of the cryptographic Hash according to the cryptographic Hash in the inquiry request, and Inquire the corresponding fragment data of nth byte in the data.Further, the backup memory node 2 is by the N in the data The corresponding fragment data of a byte feeds back to the user node.
Similarly, when the primary storage node receives looking into for user node transmission by way of block chain network or P2P After asking request, which obtains the corresponding data of the cryptographic Hash according to the cryptographic Hash in the inquiry request, and inquires The corresponding fragment data of nth byte in the data.Further, the primary storage node is by the nth byte pair in the data The fragment data answered feeds back to the user node.
Correspondingly, user node reception backup memory node 1, backup memory node 2 and primary storage node difference are anti- The corresponding fragment data of nth byte in the data of feedback.
Step 203, the user node are to described of each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of segment identification is compared.
It is fed back respectively when the user node receives the backup memory node 1, backup memory node 2 and the primary storage node The data in the corresponding fragment data of nth byte after, to the backup memory node 1, backup memory node 2 and the main memory The corresponding fragment data of nth byte in the data that storage node is fed back respectively is compared.
If in the data that the backup memory node 1, backup memory node 2 and the primary storage node are fed back respectively The corresponding fragment data of N number of byte is consistent, then illustrates backup memory node 1, backup memory node 2 and the primary storage node point The data not stored are correct, this verifying terminates.
If the fragment identification pair of the target cloud storage node feeding back in step 204, the multiple cloud storage node The fragment data answered fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then the user Node broadcasts compensation requests in block chain network, and the compensation requests include described of the target cloud storage node feeding back The corresponding fragment data of segment identification.
If there is the n-th word an of node feeding back in backup memory node 1, backup memory node 2 and primary storage node Save that corresponding fragment data fragment data corresponding with the nth byte of other node feeding backs is inconsistent, then it should by inconsistent Node is denoted as target cloud storage node.For example, backup memory node 1 feed back the corresponding fragment data of nth byte and other The corresponding fragment data of the nth byte of node feeding back is inconsistent, then the backup memory node 1 is denoted as target cloud storage section Point.At this point, the user node can broadcast compensation requests in the block chain network, reparation is executed by the block chain network and is asked It asks.It include the corresponding fragment data of nth byte of the backup memory node 1 feedback in the compensation requests.
Optionally, in the block chain network further include: third party's node;The user node is wide in block chain network After broadcasting compensation requests, the method also includes: after third party's node is verified the compensation requests, the use Family node receives the reparation that the target cloud storage node that third party's node generates compensates the user node Information.
For example, when third party's node in the block chain network receives the compensation requests of the user node, by this Tripartite's node confirms whether establishment to the compensation requests.When third party's node determine the compensation requests of the user node at Immediately, which generates the reparation information that backup memory node 1 compensates the user node.Further, this The reparation information is broadcast in the block chain network by tripartite's node.Specifically, third party's node can use the third party The private key of node signs to the reparation information, and the reparation information after signature is broadcast in the block chain network.When this When accounting nodes in block chain network receive the reparation information after the signature, area is recorded in the reparation information after the signature In block chain account book.Further, the intelligent contract which signs according to the backup memory node 1 is stored from the backup and is saved Transfer operation is enforced in the account of point 1, which is given to the user node.
The embodiment of the present invention sends inquiry request to multiple cloud storage nodes by user node, so that multiple cloud storage The fragment data of each cloud storage querying node data to be checked in node, when the user node receives each cloud storage section Point inquire fragment data when, to each cloud storage querying node to fragment data be compared, if some cloud is deposited Store up querying node to fragment data it is different from the fragment data that other cloud storage querying nodes arrive, then user node is in block chain Compensation requests are broadcasted in network, are avoided and are needed when the data that user node stores each cloud storage node are verified from every A cloud storage node downloads mass data, to save a large amount of computing resources of the user node, improves user section Point inquiring and authenticating efficiency, while also improving the safety of data storage.
Fig. 3 be another embodiment of the present invention provides data verification method flow chart.On the basis of the above embodiments, originally The data verification method that embodiment provides specifically comprises the following steps:
Step 301, user node send inquiry request to multiple cloud storage nodes, and the inquiry request includes number to be checked According to cryptographic Hash and the data to be checked fragment identification.
Step 301 and the implementation of step 201 are consistent with concrete principle, and details are not described herein again.
Step 302, the user node receive the described of each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of fragment identification.
Step 302 and the implementation of step 202 are consistent with concrete principle, and details are not described herein again.
Step 303, the user node are to described of each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of segment identification is compared.
Step 303 and the implementation of step 203 are consistent with concrete principle, and details are not described herein again.
If the fragment identification pair of the target cloud storage node feeding back in step 304, the multiple cloud storage node The fragment data answered fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then the user Node obtains the corresponding data of the cryptographic Hash from the target cloud storage node.
In the present embodiment, if there is a node in backup memory node 1, backup memory node 2 and primary storage node Such as the corresponding fragment data of nth byte that backup memory node 1 is fed back is corresponding with the nth byte of other node feeding backs Fragment data is inconsistent, then the user node can also send the cryptographic Hash of the data to be checked to the backup memory node 1, makes The corresponding data of the cryptographic Hash that the backup memory node 1 obtains its storage according to the cryptographic Hash are obtained, and the cryptographic Hash is corresponding Data return to the user node.
If step 305, the corresponding data of the cryptographic Hash of the target cloud storage node feeding back with it is described to be checked Data are inconsistent, then the user node broadcasts compensation requests in block chain network.
When the corresponding data of the cryptographic Hash that the user node receives the backup memory node 1 return, user section Point can also further compare the corresponding data of the cryptographic Hash and the data to be checked of the backup memory node 1 return, if The corresponding data of the cryptographic Hash and the data to be checked that the backup memory node 1 returns are inconsistent, then the user node determines The data stored in the backup memory node 1 are modified, at this point, the user node broadcasts compensation requests in block chain network.
The embodiment of the present invention sends inquiry request to multiple cloud storage nodes by user node, so that multiple cloud storage The fragment data of each cloud storage querying node data to be checked in node, when the user node receives each cloud storage section Point inquire fragment data when, to each cloud storage querying node to fragment data be compared, if some cloud is deposited Store up querying node to fragment data it is different from the fragment data that other cloud storage querying nodes arrive, then user node is in block chain Compensation requests are broadcasted in network, are avoided and are needed when the data that user node stores each cloud storage node are verified from every A cloud storage node downloads mass data, to save a large amount of computing resources of the user node, improves user section Point inquiring and authenticating efficiency, while also improving the safety of data storage.
Fig. 4 be another embodiment of the present invention provides data verification method flow chart.On the basis of the above embodiments, originally The data verification method that embodiment provides specifically comprises the following steps:
Step 401, user node send inquiry request to multiple cloud storage nodes, and the inquiry request includes number to be checked According to cryptographic Hash and the data to be checked fragment identification.
Step 401 and the concrete principle of step 201 are consistent with implementation, and details are not described herein again.
Step 402, the user node receive the use of each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of the fragment identification after the private key signature of the cloud storage node.
For example, being corresponded to when backup memory node 1, backup memory node 2 and primary storage node inquire the cryptographic Hash respectively Data in nth byte corresponding fragment data when, the backup memory node 1, backup memory node 2 and primary storage node The private key that oneself can be respectively adopted signs to the fragment data that oneself is inquired, and the fragment data after oneself is signed It is sent to the user node.Correspondingly, the user node receives backup memory node 1, backup memory node 2 and primary storage section Fragment data after the private key signature that point is fed back respectively.
Step 403, the user node are using the public key of each cloud storage node in the multiple cloud storage node to every After the private key signature of a cloud storage node is verified, to the institute of each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of fragment identification is stated to be compared.
When the user node receives the private that backup memory node 1, backup memory node 2 and primary storage node are fed back respectively When fragment data after key signature, be respectively adopted the public key of backup memory node 1 to the private key signature of the backup memory node 1 into Row verifying is verified the private key signature of the backup memory node 2 using the public key of backup memory node 2 and using master The public key of memory node verifies the private key signature of the primary storage node.When the user node is to backup memory node 1, standby When the private key signature of part memory node 2 and primary storage node is verified, to the backup memory node 1, backup memory node 2 Fragment data corresponding with the nth byte in the data that the primary storage node is fed back respectively is compared.
If the fragment identification pair of the target cloud storage node feeding back in step 404, the multiple cloud storage node The fragment data answered fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then the user Node broadcasts the compensation requests after the private key signature using the user node in block chain network, and the compensation requests include The fragment identification after the private key signature using the target cloud storage node of the target cloud storage node feeding back is corresponding Fragment data.
If there is a node for example to back up storage section in backup memory node 1, backup memory node 2 and primary storage node The corresponding fragment data of the nth byte fragment data corresponding with the nth byte of other node feeding backs of 1 feedback of point is different It causes, then the n-th word for the private key signature with backup memory node 1 that the user node is fed back according to the backup memory node 1 It saves corresponding fragment data and generates compensation requests, include the N of the private key signature with backup memory node 1 in the compensation requests The corresponding fragment data of a byte.Further, which can also carry out again the compensation requests using the private key of oneself Secondary signature, the compensation requests after being signed, and the compensation requests after the signature are broadcast in the block chain network.
In the present embodiment, cloud storage node is not necessarily to respond the full content verification of other nodes, in addition in data storage Hold corresponding user node, but be directed to the request of given query, cloud storage node can be supported all.
The embodiment of the present invention sends inquiry request to multiple cloud storage nodes by user node, so that multiple cloud storage The fragment data of each cloud storage querying node data to be checked in node, when the user node receives each cloud storage section Point inquire fragment data when, to each cloud storage querying node to fragment data be compared, if some cloud is deposited Store up querying node to fragment data it is different from the fragment data that other cloud storage querying nodes arrive, then user node is in block chain Compensation requests are broadcasted in network, are avoided and are needed when the data that user node stores each cloud storage node are verified from every A cloud storage node downloads mass data, to save a large amount of computing resources of the user node, improves user section Point inquiring and authenticating efficiency, while also improving the safety of data storage.
Fig. 5 is the structural schematic diagram of user node provided in an embodiment of the present invention.User's section provided in an embodiment of the present invention Point can execute data verification method embodiment offer process flow, as shown in figure 5, user node 50 include: memory 51, Processor 52, computer program and communication interface 53;Wherein, computer program is stored in memory 51, and be configured as by Processor 52 executes following operation: sending inquiry request, the inquiry request to multiple cloud storage nodes by communication interface 53 The fragment identification of cryptographic Hash and the data to be checked including data to be checked;The multiple cloud is received by communication interface 53 The corresponding fragment data of the fragment identification of each cloud storage node feeding back in memory node;To the multiple cloud storage node In the corresponding fragment data of the fragment identification of each cloud storage node feeding back be compared;If the multiple cloud storage section The corresponding fragment data of the fragment identification of target cloud storage node feeding back in point and the institute of other cloud storage node feeding backs It is inconsistent to state the corresponding fragment data of fragment identification, then compensation requests, institute are broadcasted in block chain network by communication interface 53 State the corresponding fragment data of the fragment identification that compensation requests include the target cloud storage node feeding back;Wherein, described more A cloud storage node and the user node are the participation nodes in the block chain network.
Optionally, if the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node is corresponding Fragment data fragment data corresponding with the fragment identification of other cloud storage node feeding backs it is inconsistent, then processor 52 is logical When crossing communication interface 53 and broadcasting compensation requests in block chain network, processor 52 is specifically used for: if the multiple cloud storage The corresponding fragment data of the fragment identification of target cloud storage node feeding back in node and other cloud storage node feeding backs The corresponding fragment data of the fragment identification is inconsistent, then obtains the corresponding number of the cryptographic Hash from the target cloud storage node According to;If the corresponding data of the cryptographic Hash and the data to be checked of the target cloud storage node feeding back are inconsistent, Processor 52 broadcasts compensation requests in block chain network by communication interface 53.
Optionally, in the block chain network further include: third party's node;Processor 52 is by communication interface 53 in block After broadcasting compensation requests in chain network, it is also used to: after third party's node is verified the compensation requests, passes through Communication interface 53 receives what the target cloud storage node that third party's node generates compensated the user node Compensate information.
Optionally, to receive each cloud storage node in the multiple cloud storage node anti-by communication interface 53 for processor 52 When the corresponding fragment data of the fragment identification of feedback, it is specifically used for: the multiple cloud storage section is received by communication interface 53 The fragment identification corresponding in point after the private key signature using the cloud storage node of each cloud storage node feeding back Segment data;The fragment identification corresponding to each cloud storage node feeding back in the multiple cloud storage node of processor 52 When segment data is compared, it is specifically used for: using the public key of each cloud storage node in the multiple cloud storage node to each After the private key signature of cloud storage node is verified, to described in each cloud storage node feeding back in the multiple cloud storage node The corresponding fragment data of fragment identification is compared.
Optionally, when processor 52 broadcasts compensation requests by communication interface 53 in block chain network, it is specifically used for: logical It crosses communication interface 53 and broadcasts the compensation requests after the private key signature for using the user node, the reparation in block chain network Request includes the segment after the private key signature using the target cloud storage node of the target cloud storage node feeding back Identify corresponding fragment data.
The user node of embodiment illustrated in fig. 5 can be used for executing the technical solution of above method embodiment, realization principle Similar with technical effect, details are not described herein again.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium, it is stored thereon with computer program, institute Computer program is stated to be executed by processor to realize data verification method described in above-described embodiment.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention The part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various It can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modules At the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.On The specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (11)

1. a kind of data verification method characterized by comprising
User node to multiple cloud storage nodes send inquiry request, the inquiry request include data to be checked cryptographic Hash and The fragment identification of the data to be checked;
The fragment identification that the user node receives each cloud storage node feeding back in the multiple cloud storage node is corresponding Fragment data;
The user node is corresponding to the fragment identification of each cloud storage node feeding back in the multiple cloud storage node Fragment data is compared;
If the corresponding fragment data of the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node Fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then the user node is in block chain Compensation requests are broadcasted in network, the compensation requests include that the fragment identification of the target cloud storage node feeding back is corresponding Fragment data;
Wherein, the multiple cloud storage node and the user node are the participation nodes in the block chain network.
2. the method according to claim 1, wherein if target cloud storage in the multiple cloud storage node The corresponding fragment data of the fragment identification of node feeding back is corresponding with the fragment identification of other cloud storage node feeding backs Fragment data is inconsistent, then the user node broadcasts compensation requests in block chain network, comprising:
If the corresponding fragment data of the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node Fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then the user node is from the mesh It marks cloud storage node and obtains the corresponding data of the cryptographic Hash;
If the corresponding data of the cryptographic Hash and the data to be checked of the target cloud storage node feeding back are inconsistent, The user node broadcasts compensation requests in block chain network.
3. method according to claim 1 or 2, which is characterized in that in the block chain network further include: third party's section Point;
After the user node broadcasts compensation requests in block chain network, the method also includes:
After third party's node is verified the compensation requests, it is raw that the user node receives third party's node At target cloud storage node reparation information that the user node is compensated.
4. method according to claim 1 or 2, which is characterized in that the user node receives the multiple cloud storage section The corresponding fragment data of the fragment identification of each cloud storage node feeding back in point, comprising:
The user node receive each cloud storage node feeding back in the multiple cloud storage node using the cloud storage section The corresponding fragment data of the fragment identification after the private key signature of point;
The user node is corresponding to the fragment identification of each cloud storage node feeding back in the multiple cloud storage node Fragment data is compared, comprising:
The user node is using the public key of each cloud storage node in the multiple cloud storage node to each cloud storage node Private key signature be verified after, to the fragment identification pair of each cloud storage node feeding back in the multiple cloud storage node The fragment data answered is compared.
5. being asked the method according to claim 1, wherein the user node broadcasts reparation in block chain network It asks, comprising:
The user node broadcasts the compensation requests after the private key signature using the user node in block chain network, described Compensation requests include the target cloud storage node feeding back the private key signature using the target cloud storage node after described in The corresponding fragment data of fragment identification.
6. a kind of user node characterized by comprising
Memory;
Processor;
Communication interface;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as executing following operation by the processor:
Inquiry request is sent to multiple cloud storage nodes by the communication interface, the inquiry request includes data to be checked The fragment identification of cryptographic Hash and the data to be checked;
The fragment identification of each cloud storage node feeding back in the multiple cloud storage node is received by the communication interface Corresponding fragment data;
The corresponding fragment data of the fragment identification of each cloud storage node feeding back in the multiple cloud storage node is carried out It compares;
If the corresponding fragment data of the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node Fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then by the communication interface in area Compensation requests are broadcasted in block chain network, the compensation requests include the fragment identification pair of the target cloud storage node feeding back The fragment data answered;
Wherein, the multiple cloud storage node and the user node are the participation nodes in the block chain network.
7. user node according to claim 6, which is characterized in that if the target cloud in the multiple cloud storage node The corresponding fragment data of the fragment identification of memory node feedback and the fragment identification pair of other cloud storage node feeding backs The fragment data answered is inconsistent, then when the processor broadcasts compensation requests by the communication interface in block chain network, The processor is specifically used for:
If the corresponding fragment data of the fragment identification of the target cloud storage node feeding back in the multiple cloud storage node Fragment data corresponding with the fragment identification of other cloud storage node feeding backs is inconsistent, then from the target cloud storage node Obtain the corresponding data of the cryptographic Hash;
If the corresponding data of the cryptographic Hash and the data to be checked of the target cloud storage node feeding back are inconsistent, The processor broadcasts compensation requests in block chain network by the communication interface.
8. user node according to claim 6 or 7, which is characterized in that in the block chain network further include: third party Node;
After the processor broadcasts compensation requests in block chain network by the communication interface, it is also used to:
After third party's node is verified the compensation requests, the third party is received by the communication interface and is saved The reparation information that the target cloud storage node that point generates compensates the user node.
9. user node according to claim 6 or 7, which is characterized in that the processor is connect by the communication interface It is specific to use when receiving the corresponding fragment data of the fragment identification of each cloud storage node feeding back in the multiple cloud storage node In:
Depositing using the cloud for each cloud storage node feeding back in the multiple cloud storage node is received by the communication interface The corresponding fragment data of the fragment identification after storing up the private key signature of node;
The fragment identification corresponding to each cloud storage node feeding back in the multiple cloud storage node of the processor When segment data is compared, it is specifically used for:
The private key signature of each cloud storage node is tested using the public key of each cloud storage node in the multiple cloud storage node After card passes through, to the corresponding fragment data of the fragment identification of each cloud storage node feeding back in the multiple cloud storage node It is compared.
10. user node according to claim 6, which is characterized in that the processor is by the communication interface in area When broadcasting compensation requests in block chain network, it is specifically used for:
Compensation requests after broadcasting the private key signature using the user node in block chain network by the communication interface, After the compensation requests include the private key signature using the target cloud storage node of the target cloud storage node feeding back The corresponding fragment data of the fragment identification.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The method according to claim 1 to 5 is realized when being executed by processor.
CN201910627888.4A 2019-07-12 2019-07-12 Data verification method, equipment and computer readable storage medium Pending CN110351362A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910627888.4A CN110351362A (en) 2019-07-12 2019-07-12 Data verification method, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910627888.4A CN110351362A (en) 2019-07-12 2019-07-12 Data verification method, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110351362A true CN110351362A (en) 2019-10-18

Family

ID=68175879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910627888.4A Pending CN110351362A (en) 2019-07-12 2019-07-12 Data verification method, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110351362A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177257A (en) * 2019-12-13 2020-05-19 东软集团股份有限公司 Data storage and access method, device and equipment of block chain
CN111815337A (en) * 2020-07-15 2020-10-23 深圳市中选科技有限公司 Block chain-based full-link anti-counterfeiting tracing method and system, intelligent terminal and storage medium
CN111931247A (en) * 2020-07-04 2020-11-13 华电联合(北京)电力工程有限公司 Verification method, verification device, verification system and computer-readable storage medium for verification data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301789A (en) * 2016-08-16 2017-01-04 电子科技大学 Apply the dynamic verification method of the cloud storage data that linear homomorphism based on lattice signs
CN107203345A (en) * 2017-06-01 2017-09-26 深圳市云舒网络技术有限公司 A kind of many copy storage rapid verification coherence methods and its device
CN107249009A (en) * 2017-08-02 2017-10-13 广东工业大学 A kind of data verification method and system based on block chain
CN108769171A (en) * 2018-05-18 2018-11-06 百度在线网络技术(北京)有限公司 The copy of distributed storage keeps verification method, device, equipment and storage medium
CN109359978A (en) * 2018-10-08 2019-02-19 全链通有限公司 Intelligent contract method of commerce and system based on block chain network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106301789A (en) * 2016-08-16 2017-01-04 电子科技大学 Apply the dynamic verification method of the cloud storage data that linear homomorphism based on lattice signs
CN107203345A (en) * 2017-06-01 2017-09-26 深圳市云舒网络技术有限公司 A kind of many copy storage rapid verification coherence methods and its device
CN107249009A (en) * 2017-08-02 2017-10-13 广东工业大学 A kind of data verification method and system based on block chain
CN108769171A (en) * 2018-05-18 2018-11-06 百度在线网络技术(北京)有限公司 The copy of distributed storage keeps verification method, device, equipment and storage medium
CN109359978A (en) * 2018-10-08 2019-02-19 全链通有限公司 Intelligent contract method of commerce and system based on block chain network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177257A (en) * 2019-12-13 2020-05-19 东软集团股份有限公司 Data storage and access method, device and equipment of block chain
CN111931247A (en) * 2020-07-04 2020-11-13 华电联合(北京)电力工程有限公司 Verification method, verification device, verification system and computer-readable storage medium for verification data
CN111815337A (en) * 2020-07-15 2020-10-23 深圳市中选科技有限公司 Block chain-based full-link anti-counterfeiting tracing method and system, intelligent terminal and storage medium
CN111815337B (en) * 2020-07-15 2024-04-09 深圳市中选科技有限公司 Block chain-based full-link anti-counterfeiting traceability method, system, intelligent terminal and storage medium

Similar Documents

Publication Publication Date Title
CN109936457B (en) Block chain multi-party witness method, device, equipment and computer readable storage medium
CN110417558B (en) Signature verification method and device, storage medium and electronic device
CN109949111B (en) Electronic bill identification distribution method, electronic bill generation method, device and system
CN108470298B (en) Method, device and system for transferring resource numerical value
US20200092084A1 (en) System and methods for operating a blockchain network
CN109829718B (en) Block chain multi-level framework based on storage application scene and operation method thereof
CN111614709B (en) Partition transaction method and system based on block chain
CN110351363A (en) Data back up method, equipment and computer readable storage medium
CN113347164B (en) Block chain-based distributed consensus system, method, device and storage medium
CN110365766A (en) Cloud storage method, equipment and computer readable storage medium based on block chain
EP4318362A1 (en) Blockchain-based data processing method, apparatus and device, and storage medium
CN109040279A (en) Block chain network network-building method, device, equipment and readable storage medium storing program for executing
CN109981279B (en) Block chain system, communication method, device, equipment and medium
CN110351362A (en) Data verification method, equipment and computer readable storage medium
CN111294379B (en) Block chain network service platform, authority hosting method thereof and storage medium
CN111698315B (en) Data processing method and device for block and computer equipment
CN111507717B (en) Data processing method, device, block node and computer readable storage medium
CN111163130B (en) Network service system and data transmission method thereof
CN110347689A (en) Date storage method, equipment and computer readable storage medium
JP2012531640A (en) 24 hour global low delay computer controlled switching system
CN110351364A (en) Date storage method, equipment and computer readable storage medium
CN113342838B (en) Data processing method, device and equipment based on block chain and readable storage medium
CN109150981B (en) Block chain network networking method, device, equipment and computer readable storage medium
CN110062044A (en) Distributed application program downloads verification method, equipment and storage medium
CN109218447A (en) Media file distribution method and file distributing platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191018

WD01 Invention patent application deemed withdrawn after publication