CN112861162A - Block chain storage safety guarantee system based on distributed storage - Google Patents

Block chain storage safety guarantee system based on distributed storage Download PDF

Info

Publication number
CN112861162A
CN112861162A CN202110275121.7A CN202110275121A CN112861162A CN 112861162 A CN112861162 A CN 112861162A CN 202110275121 A CN202110275121 A CN 202110275121A CN 112861162 A CN112861162 A CN 112861162A
Authority
CN
China
Prior art keywords
module
user
file
signal connection
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110275121.7A
Other languages
Chinese (zh)
Other versions
CN112861162B (en
Inventor
周明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Internet Online Cloud Computing Co ltd
Original Assignee
Shenzhen Internet Online Cloud Computing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Internet Online Cloud Computing Co ltd filed Critical Shenzhen Internet Online Cloud Computing Co ltd
Priority to CN202110275121.7A priority Critical patent/CN112861162B/en
Publication of CN112861162A publication Critical patent/CN112861162A/en
Application granted granted Critical
Publication of CN112861162B publication Critical patent/CN112861162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention relates to the technical field of computer distributed storage, and discloses a block chain storage security guarantee system based on distributed storage, which comprises a user login module, wherein a transmitting end of the user login module is in signal connection with a user information encryption module, a user information registration module and a receiving end of a user information retrieval module, and transmitting ends of the user information encryption module, the user information registration module and the user information retrieval module are in signal connection with a receiving end of a central processing module. This block chain storage safety guarantee system based on distributed storage, verify for the first time through user's file encryption public key verification module, thereby it is more powerful to carry out the secondary verification through setting up user's file encryption private key verification module, when user's file encryption private key verification module can't pass through, will lock the module and lock the file by the file, make this system have can lock the file when non-user uses, thereby prevent that user's file data from revealing.

Description

Block chain storage safety guarantee system based on distributed storage
Technical Field
The invention relates to the technical field of computer distributed storage, in particular to a block chain storage safety guarantee system based on distributed storage.
Background
Blockchains are a term of art in information technology. In essence, the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceable', 'open transparency', 'collective maintenance' and the like, and based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism, and has wide application prospect.
The storage safety of the existing block chain cannot be guaranteed, and some people mistakenly open the stored files, so that the privacy of users cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a block chain storage security guarantee system based on distributed storage to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a block chain storage security guarantee system based on distributed storage comprises a user login module, the transmitting end of the user login module is in signal connection with a user information encryption module, a user information registration module and a receiving end of a user information retrieval module, the transmitting end of the user information encryption module, the user information registration module and the user information retrieval module is connected with the receiving end of the central processing module through signals, the central processing module transmitting end is connected with a interplanetary file system module receiving end through signals, the interplanetary file system module transmitting end is connected with a safety shell protocol module receiving end through signals, the transmitting end of the secure shell protocol module is connected with a receiving end of a hypertext transfer protocol module through signals, the hypertext transfer protocol module transmitting terminal is in signal connection with a user space file system module receiving terminal, and the user space file system module transmitting terminal is in signal connection with a block chain storage module.
Preferably, the transmitting terminal of the block chain storage module is in signal connection with a user space file modification module, a user space file storage module and a receiving terminal of a user space file retrieving module.
Preferably, the transmitting end of the user space file modification module is in signal connection with a user file encryption public key verification module and a user file encryption private key verification module receiving end, and the transmitting ends of the user file encryption public key verification module and the user file encryption private key verification module are in signal connection with a search positioning module and a redundancy removal module.
Preferably, the transmitting end of the user file encryption private key verification module is in signal connection with a file locking module and a file unlocking module receiving end.
Preferably, the transmitting end of the user space file storage module is in signal connection with a local user file storage module and a receiving end of a cloud user file storage module, and the transmitting end of the cloud user file storage module is in signal connection with a receiving end of a public user file encryption key module and a receiving end of a private user file encryption key module.
Preferably, the central processing module is one or more of a single chip microcomputer and a CPU.
Preferably, the transmitting terminal of the user file encryption public key verification module is in signal connection with the user file encryption private key verification module.
Preferably, the user file cloud storage module is one of a hundred-degree cloud disk and an Tencent micro cloud.
Compared with the prior art, the invention provides a block chain storage safety guarantee system based on distributed storage, which has the following beneficial effects:
1. according to the block chain storage security guarantee system based on distributed storage, a user can be protected for the first time by arranging the user file encryption public key module, so that outsiders can be prevented from opening files to snoop the privacy of the user as far as possible.
2. According to the block chain storage security guarantee system based on distributed storage, secondary protection can be performed on a user by setting the user file encryption secret key, even if a hacker obtains the user file encryption public key module through a technical means to open a user folder, the encryption public key set by the user can be used for preventing outsiders from opening a cloud storage file, and therefore the security of file data when the user uses the system is improved.
3. This block chain storage safety guarantee system based on distributed storage, carry out verification for the first time through user's file encryption public key verification module, thereby it is more powerful to carry out secondary verification through setting up user's file encryption private key verification module, when user's file encryption private key verification module can't pass, will be locked to the file by file locking module, until user's file encryption private key verification module passes through, file unblock module operation, thereby the unblock is carried out to the file, make this system have can lock the file when non-user uses, thereby prevent user's file data leakage.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without inventive labor
FIG. 1 is a schematic view of an overall system of the present invention;
FIG. 2 is a schematic diagram of a system including a central processing module, a user login module, etc. according to the present invention;
FIG. 3 is a block chain memory module and other systems of the present invention;
FIG. 4 is a schematic diagram of the system coordination of the user space file modification module and the like according to the present invention;
fig. 5 is a schematic diagram of the system coordination of the user file encryption private key verification module and the like.
In the figure: 1. a user login module; 2. a user information encryption module; 3. a user information registration module; 4. a user information retrieving module; 5. a central processing module; 6. an interplanetary file system module; 7. a secure shell protocol module; 8. a hypertext transfer protocol module; 9. a user space file system module; 10. a block chain storage module; 11. a user space file modification module; 111. a user file encryption public key verification module; 112. a user file encryption private key verification module; 1121. a file locking module; 1122. a file unlocking module; 113. a search positioning module; 114. a redundancy removal module; 12. a user space file saving module; 121. storing the user file locally; 122. storing the user file in a cloud mode; 1221. encrypting a public key by a user file; 1222. a user file encryption private key; 13. and the user space file retrieving module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
Referring to fig. 1-5, the present invention provides a technical solution: a block chain storage security guarantee system based on distributed storage comprises a user login module 1, wherein a transmitting end of the user login module 1 is in signal connection with a user information encryption module 2, a user information registration module 3 and a receiving end of a user information retrieval module 4, transmitting ends of the user information encryption module 2, the user information registration module 3 and the user information retrieval module 4 are in signal connection with a receiving end of a central processing module 5, the central processing module 5 is one or more of a single chip microcomputer and a CPU, a transmitting end of the central processing module 5 is in signal connection with a receiving end of an interstellar file system module 6, a transmitting end of the interstellar file system module 6 is in signal connection with a receiving end of a secure shell protocol module 7, a transmitting end of the secure shell protocol module 7 is in signal connection with a receiving end of a hypertext transfer protocol module 8, a transmitting end of the hypertext transfer protocol module 8 is in signal, the transmitting end of the user space file system module 9 is connected with the blockchain storage module 10 by a signal, the transmitting end of the blockchain storage module 10 is connected with the receiving ends of the user space file modification module 11, the user space file storage module 12 and the user space file retrieving module 13 by a signal, the transmitting end of the user space file modification module 11 is connected with the receiving ends of the user file encryption public key verification module 111 and the user file encryption private key verification module 112 by a signal, the transmitting end of the user file encryption public key verification module 111 is connected with the user file encryption public key verification module 111 by a signal, the transmitting ends of the user file encryption public key verification module 111 and the user file encryption private key verification module 112 are connected with the search positioning module 113 and the redundancy removing module 114 by a signal, the user file cloud storage module 122 is one of a hundred-degree cloud disk and an Tencent micro-cloud, the transmitting end of the user file encryption private key verification module 112, the user can be protected for the first time by arranging the user file encryption public key module 1221, thereby avoiding the file opened by outsiders to snoop the privacy of the user as much as possible, the transmitting end of the user space file storage module 12 is in signal connection with the receiving ends of the user file local storage module 121 and the user file cloud storage module 122, the transmitting end of the user file cloud storage module 122 is in signal connection with the receiving ends of the user file encryption public key module 1221 and the user file encryption private key module 1222, the user can be protected for the second time by arranging the user file encryption private key 1222, even if a hacker obtains the user file encryption public key module 1221 to open a user folder by technical means, the outsiders can be prevented from opening the cloud storage file by the encryption public key 1221 arranged by the user, thereby improving the security of the file data when the user is used, the first time of verification is carried out by the user file encryption, the user file encryption private key verification module 112 is arranged for secondary verification, so that the protection function is stronger, when the user file encryption private key verification module 112 cannot pass through, the file is locked by the file locking module 1121, and until the user file encryption private key verification module 112 passes through verification, the file unlocking module 1122 operates to unlock the file, so that the system can lock the file when not used by a user, and the data leakage of the user file is prevented.
In the actual operation process, when the system is used, the user can log in through the user login module 1, meanwhile, the user information encryption module 2 encrypts the user information, if no user information exists, the user is registered through the user information registration module 3, if the user login information is lost, the user login information can be retrieved through the set user information retrieval module 4, the data is uniformly transmitted to the interplanetary file system module 6 through the set central processing module 5, at the moment, the user needs to confirm the security shell protocol module 7, the hypertext transmission protocol module 8 and the user space file system module 9, the information is transmitted to the inside of the block chain storage module 10 after the confirmation is passed, the user space file storage module 12 can independently select the user file local storage module 121 and the user file cloud storage module 122, the encrypted public key obtained by processing data by the user file encrypted public key module 1221 can be obtained after storage, meanwhile, the user file encrypted private key module 1222 enables a user to set an encrypted private key, when the content of a user file needs to be modified or checked, the user file encrypted public key verification module 111 performs first verification, the user file encrypted private key verification module 112 performs second verification, so that the protection function is stronger, when the file encrypted private key verification module 112 cannot pass, the file is locked by the file locking module 1121, until the file encrypted private key verification module 112 passes verification, the file unlocking module 1122 operates to unlock the file, so that the system can lock the file when the system is not used by the user, thereby preventing the data leakage of the user file, and after the user opens the file, the search positioning module 113 is used, when a user needs to modify, a certain position or a certain keyword needs to be located to locate the content, and redundant file data in the file can be located by arranging the redundancy removing module 114, so that redundant file data can be selectively removed.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The term "comprising", without further limitation, means that the element so defined is not excluded from the group consisting of additional identical elements in the process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A block chain storage security guarantee system based on distributed storage comprises a user login module (1), and is characterized in that: the transmitting end of the user login module (1) is in signal connection with a user information encryption module (2), a user information registration module (3) and a user information retrieval module (4) receiving end, the transmitting ends of the user information encryption module (2), the user information registration module (3) and the user information retrieval module (4) are in signal connection with a central processing module (5) receiving end, the transmitting end of the central processing module (5) is in signal connection with an interstellar file system module (6) receiving end, the transmitting end of the interstellar file system module (6) is in signal connection with a safe shell protocol module (7) receiving end, the transmitting end of the safe shell protocol module (7) is in signal connection with a hypertext transfer protocol module (8) receiving end, the transmitting end of the hypertext transfer protocol module (8) is in signal connection with a user space file system module (9) receiving end, and the transmitting end of the user space file system module (9) is in signal connection with a block chain storage module (10).
2. The distributed storage based block chain storage security assurance system according to claim 1, wherein: the transmitting end of the block chain storage module (10) is in signal connection with a user space file modification module (11), a user space file storage module (12) and a receiving end of a user space file retrieving module (13).
3. The distributed storage based block chain storage security assurance system according to claim 2, wherein: the transmitting end of the user space file modification module (11) is in signal connection with a user file encryption public key verification module (111) and a user file encryption private key verification module (112) receiving end, and the transmitting ends of the user file encryption public key verification module (111) and the user file encryption private key verification module (112) are in signal connection with a search positioning module (113) and a redundancy removing module (114).
4. The distributed storage based block chain storage security assurance system according to claim 3, wherein: the transmitting end of the user file encryption private key verification module (112) is in signal connection with a file locking module (1121) and a file unlocking module (1122) receiving end.
5. The distributed storage based block chain storage security assurance system according to claim 2, wherein: the transmitting end of the user space file storage module (12) is in signal connection with a user file local storage module (121) and a user file cloud storage module (122) receiving end, and the transmitting end of the user file cloud storage module (122) is in signal connection with a user file encryption public key module (1221) and a user file encryption private key module (1222) receiving end.
6. The distributed storage based block chain storage security assurance system according to claim 1, wherein: the central processing module (5) is one or more of a single chip microcomputer and a CPU.
7. The distributed storage based block chain storage security assurance system according to claim 1, wherein: and the transmitting end of the user file encryption public key verification module (111) is in signal connection with the user file encryption public key verification module (111).
8. The distributed storage based block chain storage security assurance system according to claim 1, wherein: the user file cloud storage module (122) is one of a hundred-degree cloud disk and an Tencent micro cloud.
CN202110275121.7A 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage Active CN112861162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110275121.7A CN112861162B (en) 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110275121.7A CN112861162B (en) 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage

Publications (2)

Publication Number Publication Date
CN112861162A true CN112861162A (en) 2021-05-28
CN112861162B CN112861162B (en) 2024-05-03

Family

ID=75994457

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110275121.7A Active CN112861162B (en) 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage

Country Status (1)

Country Link
CN (1) CN112861162B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055253A (en) * 2017-12-06 2018-05-18 珠海格力电器股份有限公司 A kind of software login validation method, apparatus and system
CN108734029A (en) * 2018-05-23 2018-11-02 陈萍 A kind of approaches to IM and platform based on block chain and interspace file system
CN108924092A (en) * 2018-06-07 2018-11-30 北京航空航天大学 Based on block chain can open arbitration distribution cloud storage method and system
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110866273A (en) * 2019-11-09 2020-03-06 北京工业大学 Inter-enterprise standard consensus method based on block chain and interplanetary file system
US20200252457A1 (en) * 2019-02-05 2020-08-06 S&P Global Inc. Content Management Systems And Methods
CN111552955A (en) * 2020-04-29 2020-08-18 合肥井创数字科技有限公司 Personal identity authentication method and device based on block chain and IPFS
CN112235409A (en) * 2020-10-19 2021-01-15 平安证券股份有限公司 File uploading method and device, electronic equipment and computer readable storage medium
CN112347188A (en) * 2020-10-16 2021-02-09 零氪科技(北京)有限公司 Authorization and access auditing system and method based on private chain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055253A (en) * 2017-12-06 2018-05-18 珠海格力电器股份有限公司 A kind of software login validation method, apparatus and system
CN108734029A (en) * 2018-05-23 2018-11-02 陈萍 A kind of approaches to IM and platform based on block chain and interspace file system
CN108924092A (en) * 2018-06-07 2018-11-30 北京航空航天大学 Based on block chain can open arbitration distribution cloud storage method and system
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
US20200252457A1 (en) * 2019-02-05 2020-08-06 S&P Global Inc. Content Management Systems And Methods
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110866273A (en) * 2019-11-09 2020-03-06 北京工业大学 Inter-enterprise standard consensus method based on block chain and interplanetary file system
CN111552955A (en) * 2020-04-29 2020-08-18 合肥井创数字科技有限公司 Personal identity authentication method and device based on block chain and IPFS
CN112347188A (en) * 2020-10-16 2021-02-09 零氪科技(北京)有限公司 Authorization and access auditing system and method based on private chain
CN112235409A (en) * 2020-10-19 2021-01-15 平安证券股份有限公司 File uploading method and device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN112861162B (en) 2024-05-03

Similar Documents

Publication Publication Date Title
JP7051766B2 (en) Self-provisioning access control
US10601805B2 (en) Securitization of temporal digital communications with authentication and validation of user and access devices
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US20180254891A1 (en) Utilization of a Proxy Technique in Escrow Encryption Key Usage
EP2434462B1 (en) Biometric key
JP2016515784A5 (en)
CN102800141A (en) Entrance guard controlling method and system based on bidirectional authentication
CN201037941Y (en) Electronic lock system by using public key system to verify digital signature
EP2575070B1 (en) Classification-based digital rights management
CN102799831B (en) Information safety protection system of application system based on database and information safety protection method
CN114942729A (en) Data safety storage and reading method for computer system
CN112861162A (en) Block chain storage safety guarantee system based on distributed storage
US9262619B2 (en) Computer system and method for protecting data from external threats
KR101133210B1 (en) Mobile Authentication System and Central Control System
US11463251B2 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
EP3955142A1 (en) Method and system for authentication of a computing device
Catuogno et al. Flexible and robust enterprise right management
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN113593088A (en) Intelligent unlocking method, intelligent lock, mobile terminal and server
CN106557677A (en) Unlocking method and device for container system
CN111369710A (en) Intelligent lock system supported by block chain
CN108133534A (en) A kind of electric lock controller encryption method
Griffin Biometric-based cybersecurity techniques
CN117910032A (en) Data security system for computer
KR200299271Y1 (en) Integrated information security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant