CN115809250A - Block chain-based consistency evaluation method and device for files stored on chain - Google Patents

Block chain-based consistency evaluation method and device for files stored on chain Download PDF

Info

Publication number
CN115809250A
CN115809250A CN202111082503.4A CN202111082503A CN115809250A CN 115809250 A CN115809250 A CN 115809250A CN 202111082503 A CN202111082503 A CN 202111082503A CN 115809250 A CN115809250 A CN 115809250A
Authority
CN
China
Prior art keywords
chain
verification
files
voting
consistency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111082503.4A
Other languages
Chinese (zh)
Inventor
伍前红
辜智强
郑海彬
谢平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Publication of CN115809250A publication Critical patent/CN115809250A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain-based consistency evaluation system and method for files stored on a chain, wherein the system comprises the following steps: the verification module is used for verifying the consistency of the files on the chain through a file consistency verification algorithm and carrying out multi-direction and multi-stage judgment on the files on the chain; the storage module is used for storing the files of the users in the distributed system and rewarding the contribution of the storage workers through an incentive mechanism; and the front-end module is used for visually displaying the consistency verification process of the files on the chain. The system can quantitatively evaluate the correctness, legality, validity and acceptance of the file.

Description

Block chain-based consistency evaluation method and device for files stored on chain
Technical Field
The invention relates to the technical field of information security, in particular to a block chain-based consistency evaluation method and device for on-chain storage files.
Background
After birth, the block chain technology has the characteristics of decentralization, no tampering, verification and the like by means of technologies such as cryptography, game theory and the like, and is applied to the fields of intelligent transportation, supply chain management, intelligent medical treatment, electronic government affairs and the like. Distributed storage based on block chains is continuously developed in recent years, products such as Filecin, storj, PPIO and the like are successively produced, and the storage products based on the block chains have the excellent characteristics of decentralization, non-tampering and the like and have strong application prospects.
However, as blockchain memory technology continues to evolve, some problems become increasingly exposed. At present, a perfect file verification mechanism is not provided, and community users cannot know basic information such as file correctness, file quality and the like, so that the difficulty of retrieval is greatly increased, and the community users are lost. Meanwhile, the existing product lacks a perfect incentive mechanism, and good incentive and promotion are not formed among file uploaders, hard disk providers and downloaders, so that the resource utilization rate and the community participation degree are reduced.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, an object of the present invention is to provide a block chain-based system for evaluating consistency of files stored on a chain, which is capable of quantitatively evaluating correctness, validity and acceptability of the files.
An embodiment of the first aspect of the present invention provides a system for evaluating consistency of files stored on a chain based on a block chain, including: the verification module is used for verifying the consistency of the files on the chain through a file consistency verification algorithm and judging the files on the chain in multiple directions and multiple stages; the storage module is used for storing the files of the users in the distributed system and rewarding the contribution of the storage workers through an incentive mechanism; and the front-end module is used for visually displaying the consistency verification process of the files on the chain.
In addition, the system for evaluating consistency of files stored on a block chain based chain according to the above embodiment of the present invention may further have the following additional technical features:
in one embodiment of the invention, the verification module is further used for evaluating the correctness, validity and popularity of the file by verifying workers by using a correctness evaluation algorithm based on closed voting and open voting on a gambling agreement, and uploading the evaluation result to a block chain for viewing.
In an embodiment of the present invention, the verification module is further configured to perform verification based on a voting protocol that can link the one-time ring signature, specifically: anonymous voting on a block chain is carried out through a linkable one-time ring signature technology, a symmetric key and a block chain technology, a voting process is initiated in a voting initiation stage, voters are randomly selected through a distributed random number beacon technology in a preparation stage, participation in the voting is confirmed through uploading a one-time public key, the encrypted voting content is signed through the linkable one-time ring signature technology in the voting stage, a one-time private key is published in a ticket counting stage, and a voting result is calculated.
In an embodiment of the present invention, the verification module is further configured to verify the correctness of the gambling agreement based on a correctness testing algorithm, specifically: the correctness of the files on the chain is judged through an automatic test, then the result is published through a voting protocol based on a linkable one-time ring signature, a plurality of verification workers simultaneously carry out verification, and if the verification results of the verification workers are inconsistent, disputes are resolved by using a gambling protocol.
In an embodiment of the present invention, the verification module is further configured to perform verification through a closed voting protocol, evaluate the legitimacy and the popularity of the files on the chain through community members, evaluate the consistency of the files on the chain through a voting protocol based on a linkable one-time ring signature, and open the files on the chain in a system when the voting score is higher than a set system parameter.
In an embodiment of the present invention, the verification module is further configured to quantitatively evaluate the workload of all nodes participating in the verification process through a workload proving algorithm, and give an incentive.
In one embodiment of the invention, the verification module is further used for adjusting the reputation value of the user through the behavior of the user, defining community members according to the reputation value and restricting the behavior of the community members in the community.
The embodiment of the second aspect of the invention provides a block chain-based consistency evaluation method for on-chain storage files, which comprises the following steps: verifying the consistency of the files on the chain through a file consistency verification algorithm, and performing multi-azimuth and multi-stage judgment on the files on the chain; storing the user's files in a distributed system, rewarding the storage worker's contributions through an incentive mechanism; and visually displaying the consistency verification process of the files on the chain.
An embodiment of a third aspect of the present invention provides an electronic device, including: a processor and a memory; wherein, the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to implement the consistency evaluation method for the files stored on the chain based on the block chain as described in the above embodiment.
A fourth aspect of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor, to implement the consistency evaluation method for a block chain-based on-chain storage file according to the foregoing embodiments.
The system and the method for evaluating the consistency of the files stored on the chain based on the block chain have the following beneficial effects that:
1) A consistency evaluation protocol suitable for files stored on a chain is provided, and a complete and expandable file content evaluation system is constructed by an automatic testing algorithm based on a betting protocol, a closed voting scheme and an open voting scheme based on a linkable one-time ring signature and the like. The protocol can be used for judging files in an all-around manner, and has important significance for constructing a block chain storage network with high quality, high efficiency and sustainable development.
2) A set of extensible workload proving algorithm for evaluating objective work is provided, the workload proving algorithm widely used at present mainly solves objective problems, such as computational mathematics difficulty, proves that a copy of a certain file is stored and the like, the research of the workload proving algorithm aiming at subjective problems is in an early stage, the contribution degree proving algorithm of the invention can evaluate and stimulate the work of solving the subjective problems, and the algorithm can be transplanted to the fields of code publishing, blogs, novels, music creation and the like.
3) The method realizes that all components related to the file consistency protocol are stored based on the block chain, the function test and the performance test are carried out under the experimental environment, the system constructed by the mechanism is stable and reliable during the trial operation, and the reliability, the effectiveness and the practicability of the consistency protocol designed by the scheme are further verified.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a block chain-based on-chain storage file consistency evaluation system according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating a file consistency assessment protocol according to an embodiment of the present invention;
FIG. 3 is a block chain based file coherence protocol hierarchy architecture according to an embodiment of the present invention;
FIG. 4 is a storage tier interaction node flow diagram according to one embodiment of the present invention;
FIG. 5 is a flow diagram illustrating interaction among nodes of a verification layer according to an embodiment of the present invention;
FIG. 6 is a flow diagram of a file consistency evaluation protocol according to one embodiment of the invention;
FIG. 7 is a flow diagram of a voting scheme based on one-time ring signatures according to one embodiment of the present invention;
FIG. 8 is a flow diagram of an automated testing algorithm based on a wagering agreement, according to one embodiment of the present invention;
FIG. 9 is a flow diagram of a wagering agreement according to one embodiment of the present invention;
FIG. 10 is a flowchart of a block chain-based method for evaluating consistency of on-chain stored files according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Description of the reference numerals:
100-authentication module, 200-storage module, 300-front-end module, 111-memory, 112-processor and 113-communication interface.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The following describes a system and a method for evaluating consistency of a block chain-based on-chain storage file according to an embodiment of the present invention with reference to the accompanying drawings.
A block chain-based on-chain storage file consistency evaluation system proposed according to an embodiment of the present invention will be described first with reference to the drawings.
Fig. 1 is a schematic structural diagram of a system for evaluating consistency of files stored on a block chain according to an embodiment of the present invention.
As shown in fig. 1, the system for evaluating consistency of files stored on a block chain-based chain includes: an authentication module 100, a storage module 200, and a front end module 300.
The verification module 100 is configured to verify consistency of the files on the chain through a file consistency verification algorithm, and perform multi-directional and multi-stage evaluation on the files on the chain.
Specifically, the consistency of the file is verified through a file consistency verification algorithm, and the correctness, the legality, the recognition degree and the like of the file are judged in an all-round and staged manner.
The storage module 200 is used for storing the files of the users in the distributed system and rewarding the contribution of the storage workers through an incentive mechanism.
Specifically, the on-chain storage module stores on-chain files, and is a distributed storage mode, wherein the files of users are stored in a distributed system, and the contributions of storage workers are rewarded through an incentive mechanism.
And the front-end module 300 is used for a visualized verification process of file consistency on the display chain.
Specifically, the front-end module visually shows the whole process of file consistency verification, and can help a user to simply and conveniently participate in the process of file consistency verification.
As shown in fig. 2, the components of the file consistency evaluation protocol are shown, including a reputation system, a file consistency evaluation protocol, an incentive mechanism, and an anti-cheating module. The reputation system and the anti-cheating module are the preconditions of high-quality and safe operation of the system, the file consistency evaluation protocol is a core algorithm for verifying the file consistency, and the incentive mechanism is the precondition of long-term stable operation of the system.
For clarity of description, the hierarchy of the overall system will be described in terms of system layering, as shown in fig. 3. The system adds a file verification function on the basis of the Filecin, so that a verification layer is added on a hierarchy of the Filecin.
And (3) a data layer: the data layer is a block chain account book, and the characteristics of non-tampering property, verifiability and the like of data stored on a chain are guaranteed through a chain structure, a hash function and an asymmetric encryption mechanism.
Network layer: the network layer is responsible for communication of each node, rapid broadcasting of data is completed through a p2p network, and meanwhile, a message mechanism and a verification mechanism are used for guaranteeing the safety of the data in the message transmission process.
A consensus layer: the consensus layer is responsible for ensuring the consistency of the state of each node in the network, and in the system, the expected consensus is adopted as a consensus algorithm, so that users can more likely obtain block rights and obtain rewards by contributing more storage space.
A storage layer: the storage layer is mainly responsible for safe and effective storage of data, and guarantees that a storage worker honestly stores a certain file through copy certification, space-time certification, download certification and the like, and stimulates the storage worker. The storage process is composed of the following steps, as shown in fig. 4.
1. A user submits a storage order to a block chain network and locks a certain cost of storage cost to a chain;
2. the worker submits own storage capacity and pledges a certain deposit to the chain;
3. the storage market carries out transaction matching, and a user sends a file to a storage worker after the transaction is completed;
4. the verification worker needs to prove that the verification worker stores the copy of a certain file of the user for a certain period of time through a copy proving algorithm and a space-time proving algorithm.
The files stored through the process are not verified, community users and downloaders have no knowledge of the stored contents, and if the users want to disclose the files and download the files by families, the verification process needs to be started.
Verification layer: the verification layer mainly runs a file consistency evaluation protocol which mainly ensures the safety, effectiveness, consistency and legality of files stored on a chain, and the protocol consists of an automatic testing algorithm based on a betting protocol, a closed voting scheme based on a one-time ring signature and an open voting scheme. The protocol details can be found below. The flow of the verification layer is shown in fig. 5.
1. After the file uploader stores the file in the IPFS interplanetary storage network, if the file needs to be published for downloading, a verification order needs to be submitted and a verification fee needs to be paid to a verification worker.
2. And after receiving a verification request of the user, a verification worker starts file correctness verification, and obtains and downloads the storage position of the file to be verified through the block chain account book. In the scenario of code or program files, the verification chain workers mainly verify the correctness, the normalization, the validity of documents, the content validity and the like of the code and store a verification report into a blockchain. The verified document will continue to be voted by the community members, and disclosure will not be allowed if verification fails.
3. And the block chain network generates voting users through a distributed random number beacon technology, the selected community users score files based on a closed voting scheme of one-time ring signatures, and the results are stored in the block chain network. After the closed voting is finished, the user can also score the files in a public voting way.
4. The community users search the files according to the search keywords, the obtained results are sorted according to the scores, and the users select the appropriate files to download on the storage chain.
The consistency of the file and the description of the file is guaranteed through a file consistency evaluation protocol of the verification layer, reasonable excitation is conducted on each node through a contribution degree proving algorithm, and the protocol has expansibility and feasibility.
And (3) contract layer: the contract layer is mainly responsible for interaction of an external system and a block chain network, and a user mainly uses an intelligent contract and a grpc to read and write a block chain account book.
And (3) a service layer: the user can directly participate in the verification process of the whole file by means of the grpc protocol and the intelligent contract, but the threshold is higher for most users, and the user is expected to obtain good use experience by means of a graphical interface, so that more users are attracted to participate in the process. The service layer at the uppermost layer is used for interacting with the block chain account book by calling an intelligent contract and rpc protocol, a community is constructed through a visual UI, and users can perform operations such as registration, voting, commenting, sharing, retrieving and downloading on the visual application.
In an embodiment of the invention, the verification module is further configured to evaluate the correctness, validity and popularity of the file by verifying workers by using a correctness evaluation algorithm based on closed voting and open voting on a betting agreement, and upload the evaluation result to the block chain for viewing.
Specifically, the document consistency verification protocol is divided into three stages in total, the first stage is a document correctness test, a verification worker runs an automatic test program to complete document correctness detection, and taking a code or a program as an example, firstly, the correctness of the code or the program is ensured, and secondly, the normalization, the security and the legality are ensured. The second stage is closed voting, and each voter does not know the voting information of other people in the evaluation process, and the stage is mainly to detect the legality and consistency of the file, whether the file contains inappropriate opinions and the like, if the score is low, the file is not allowed to be disclosed, and if the evaluation is passed, the voting result of the second stage participates in the retrieval ranking by fifty percent. The third stage is public voting, wherein for open source files, community participants can vote after reading codes, documents and the like, and for payment files, after payment downloading, each downloader can obtain a scoring opportunity to comment on used experiences. FIG. 6 is a full process of the document consistency verification algorithm.
In an embodiment of the present invention, the verification module is further configured to perform verification based on a voting protocol that can link the one-time ring signature, specifically: anonymous voting on a block chain is carried out through a linkable one-time ring signature technology, a symmetric key and a block chain technology, a voting process is initiated in a voting initiation stage, voters are randomly selected through a distributed random number beacon technology in a preparation stage, participation in the voting is confirmed through uploading a one-time public key, the encrypted voting content is signed through the linkable one-time ring signature technology in the voting stage, a one-time private key is published in a ticket counting stage, and a voting result is calculated.
Specifically, the anonymous voting scheme based on the one-time ring signature is that participants of the scheme are voters and a block chain ledger, and are divided into a preparation phase, a voting phase and a vote counting phase together, and the specific content is shown in fig. 7.
1. And (3) voting initiation: the voting initiator initiates a voting process and sends (Sig) to the worker of the block chain orgnizer TOPIC), wherein TOPIC is the voting TOPIC, sig orgnizer The public key of the initiator signs the TOPIC, and the worker starts the voting process after the signature is verified.
2. A preparation stage: after the voting is initiated, the worker randomly selects the voter by using the distributed random number beacon technology without a trusted third party, and the public key list { Pub } of the voter is obtained after the selected user confirms to participate in the voting 1 ,Pub 2 ,...,Pub n Store it into a blockchain, where n represents users eligible to participate in the vote. Since the whole process is recorded in the blockchain account book, anyone can supervise and verify. After the voter confirms to participate in the voting, the voter randomly generates a private key x i ∈[1,l-1]And calculates a public key P corresponding thereto i =x i G, simultaneously mirroring the key I i =x i H p (P i ) Stored locally, using wallet public key Pub i To P i Sign to obtain Sig (Pub) i ,P i ) And sending the result to a worker, and checking the signature of the worker successfully by using the P i And storing the data in a block chain account book. So that anyone can get the voter voting public key list P 1 ,P 2 ,...,P n Where n is the total number of people confirmed to participate in the vote.
3. A voting stage: voter use x i Symmetric encryption of voting content res i Get the vote i =encry(x i ,res i ) Using locally stored image I i And a private key x i Generating a one-time ring signature delta i =(I i ,c 1 ,...,c n ,r 1 ,...,r n ) Then delta will be i Sent to the worker for saving into the blockchain ledger. The process of generating the one-time ring signature is as follows:
Figure RE-GDA0003436511460000071
Figure RE-GDA0003436511460000081
wherein, { q i |i=0,…,n},{w i I =0, …, n, i ≠ s } are all random numbers generated by signers, and q i ,w i ∈[1,l-1]. The following calculation is carried out:
c=H s (vote i ,L 1 ,…,L n ,R 1 ,…,R n )
the following calculation is performed:
Figure RE-GDA0003436511460000082
Figure RE-GDA0003436511460000083
the resulting one-time ring signature is:
δ i =(I i ,c 1 ,…,c n ,r 1 ,…,r n )
the correctness of the vote can be verified by:
Figure RE-GDA0003436511460000084
Figure RE-GDA0003436511460000085
votes stored on a chain i The encrypted ballot is encrypted, so that only how many voters vote currently, and the non-voted users and the specific information of the number of votes cannot be known.
4、A ticket counting stage: voter publishing one-time private key x i By calculating x i G obtains the public key P i Thereby knowing the sum of P i Corresponding Pub i . Can also utilize x i Decrypting to obtain voting content msg of user i It is thus known which voter cast a positive vote and which voter cast a negative vote. If the user does not disclose his private key, the ticket is credited as a waste ticket, the reward is deducted and the reputation value is reduced, which all reveals the private key for a limited time to the intelligent voter.
In an embodiment of the invention, the verification module is further configured to verify the correctness of the betting agreement based on a correctness testing algorithm, specifically: the correctness of the files on the chain is judged through an automatic test, then the result is published through a voting protocol based on a linkable one-time ring signature, a plurality of verification workers simultaneously carry out verification, and if the verification results of the verification workers are inconsistent, disputes are resolved by using a gambling protocol.
Specifically, a verification worker is introduced on the basis of the Filecin, the verification worker only participates in the verification process of the file and does not participate in the packaging of the blocks, and the income mainly comes from the verification cost paid by a file uploader and the bonus of a bonus pool. The reason why the verification worker is introduced for verification is that the uncertainty of the verification time greatly reduces the block-out speed and increases the uncertainty of the block-out time if the storage worker is allowed to perform verification, so that the verification behavior of the verification worker can be regarded as offline behavior.
In the file correctness judgment process which takes a program as a main analysis object, because codes or programs needing to be analyzed have the characteristics of uncertainty, complexity and the like, the file correctness judgment is difficult to be carried out by a manual judgment mode in the correctness judgment process, and the complex test work is difficult to be completed with high quality and high efficiency by manual testing. By introducing automatic testing, the software testing time can be greatly shortened, the standardization of the testing process is ensured, and the existing automatic testing technology is widely applied to various software development processes.
Since the main is the on-chain file consistency protocol, it is assumed that the virtual machines performing the automated detection possess the environment required for the execution of the various codes. For convenience and feasibility of automated testing, a minimum THRESHOLD UNIT TEST MIN THRESHOLD for UNIT TEST coverage is set, and release of code is permitted only if the UNIT TEST coverage of the code is greater than UNIT TEST MIN THRESHOLD. The worker firstly runs the unit test, if the unit test fails, the code logic is in a problem, the code is prevented from being issued, if the unit test passes, document format detection, code format detection, wrongly written word detection, link validity detection and other complex detections are carried out, meanwhile, in order to avoid the existence of bad contents and the like in the program, keywords in the code are identified and intercepted, a detection report is output when the detection is finished, the detection result is described, and the detection result has an auxiliary function when the manual judgment is carried out.
In order to prevent cheating of the verification workers, detection is not carried out or detection items are reduced, and detection results are controlled artificially. At least three workers can be guaranteed to participate in detection of the same file at the same time through one-time verification, and in order to guarantee that the three workers cannot be tampered and verifiability, the verification result can be stored on a block chain account book. But due to the openness of the blockchain, anyone can know the verification result of the verifying worker, which will be unfair and insecure certainly in the verification process, an anonymous voting scheme based on a one-time ring signature will be used, and the verification process is shown in fig. 8.
1. The validation worker registers computing power on the blockchain ledger and pays the deposit. The block chain ledger book locks the deposit.
2. And initiating a verification process by the file uploader, giving the address of the file to be verified and the prepaid verification cost, and locking the verification cost by the block chain account book.
3. The worker randomly selects m verification workers by adopting a distributed random number beacon technology, and the addresses of the verification workers are respectively { address } 1 ,address 2 ,...,address m And if the number of verification workers confirming verification is less than 3, initiating three random selection processes until the number is more than three.
4. The verifying worker generates a one-time key pair (x) if it confirms that verification is to be performed i ,P i ) And will be (P) i ,addrese i ) Stored on the chain. Downloading the code or program to be detected after the verification is started, running the automatic test, and outputting the detection result res i . Using private key x by a verifier i For the detection result res i Symmetric encryption is carried out to obtain the vote i
5. Verifying worker pair vote with one-time ring signature i Signature is carried out to obtain sig i Will (sig) i ,vote I ) And storing the data on a block chain book.
6. In the billing phase, the verifying worker publishes the private key x i Then the vote can be converted i Decrypting to obtain res i While simultaneously calculating x i G inquires the corresponding public key P i So as to determine the voter address corresponding to the vote i
More than three verification workers are guaranteed to detect the same file, and if the detection results are inconsistent, cheating users certainly exist for the objectivity problem. In such a case, the determination of the final test result is accomplished by a betting agreement. The antecedents to the betting agreement are as follows:
1. the cheaters are considered to be few and the honest validation workers are most.
2. In one test, the majority of the parties are considered winners.
3. For the same file, if the verification worker is honest, the verification result is consistent.
Under the above preconditions, the flow of the betting agreement is shown in fig. 9.
1. Before verification, the workers can credit the deposit of 2 × cost, wherein cost = TOTAL _ cost/N, TOTAL _ cost is the TOTAL fee paid by the uploader, and N is the number of verification workers in the current round.
2. If the verification results of the N verification workers are inconsistent, one party can choose to accept and lose, and the pledges of the accepting and losing party are all distributed to other verifiers.
3. If both parties choose to bet, a round of validation will be initiated, where the number of validation workers will become 3N. Each worker has a credit for 2 × N cost per mortgage, which means that as the number of complaint rounds increases, both the number of the mortgages and the credit cost increase exponentially, with a TOTAL of 3*N TOTAL _ cost for paying the credit costs of 3N of the mortgages, and a TOTAL of 3*N TOTAL _ cost for paying the winner of the round.
In the embodiment of the invention, the verification module is further used for verifying through a closed voting protocol, evaluating the legality and the popularity of the files on the chain through community members, evaluating the consistency of the files on the chain through the voting protocol based on the linkable one-time ring signature, and opening the files on the chain in the system for disclosure when the voting score is higher than the set system parameter.
In the closed evaluation stage, the legality of the file and the content quality of the file are focused, the legality mainly includes whether the file is plagiarized or has bad content, and the content quality only includes the popularity, the practicability, the entertainment and the like of the file. Thus, there is much concern about the ability to audit reputation and authentication. The closed scoring stage is mainly used for preventing illegal or low-quality files from being publicly transmitted to influence the community image. Meanwhile, the closed voting has the advantages of stronger fairness, correctness and the like compared with the open voting. The voting process and the automated testing algorithm based on betting agreements described above use an anonymous voting system based on one-time ring signatures.
1. And initiating a closed voting process by the file uploader to establish a voting project.
2. The block packing worker adopts a distributed random number beacon to randomly select m voters, and the addresses of the voters are { address } 1 ,address 2 ,...,address m And if fewer users are confirmed to vote, more addresses are randomly selected.
3. If the voter confirms to vote, a one-time key pair (x) is generated i ,P i ) And will be (P) i ,addrese i ) Stored on the chain. And downloading the code or program to be detected for evaluation after the verification is started, and classifying the evaluation of the content into a positive evaluation and a negative evaluation, wherein the positive evaluation score is from 0 to 5, and the negative evaluation score is from-5 to 0. Output the detection result res i . Voter using private key x i For the detection result res i Symmetric encryption is carried out to obtain the vote i
4. Voter pair votes using one-time ring signature i Signature is carried out to obtain sig i Will (sig) i ,vote I ) And storing the data on a block chain book.
5. In the vote counting phase, the voter publishes the private key x i Then the vote can be converted i Decrypting to obtain res i While simultaneously calculating x i G inquires the corresponding public key P i So as to determine the voter address corresponding to the vote i . Closed review link total score closcoresurm uses reputation value reputations in ticketing i Fraction res is obtained i I.e., the total score calculated using the following formula is calculated using the following formula.
Figure RE-GDA0003436511460000111
Wherein n represents the total number of tickets.
In one embodiment of the present invention, the verification module is further configured to quantitatively evaluate the workload of all nodes participating in the verification process through a workload certification algorithm and give an incentive.
In one embodiment of the invention, the verification module is further used for adjusting the reputation value of the user through the behavior of the user, defining community members according to the reputation value and restricting the behavior of the community members in the community.
Compared with the closed voting scheme, the open voting scheme of the invention has the advantage that the voter knows the current number and score of votes during the open voting. In the open review stage, the influence of the files in the community is more concerned, and the influence is recognized by active contributors of the community, so that in the stage, users with reputation values higher than the lowest reputation value requirement can participate in the voting process. The main calculates the influence of community users in the community through the currency day, wherein the currency day is the product of the number balance of tokens and the number of days of possession accumulateDay, and the balance of tokens is the balance of tokens owned by the account.
After an account has a certain number of tokens, it starts accumulating coins as time passes until it stops growing after a maximum MAX _ accumulator _ DAY balance is reached. Where MAX _ accumulator _ DAY is a system parameter.
The evaluation behaviors of the account consume the number of dollar days, which relates to another parameter, namely a single evaluation consumption FACTOR, selected by the user himself, and determines the proportion of the number of dollar days consumed by each evaluation behavior of the user, and the number of dollar days required to be consumed by each evaluation can be calculated in the following manner.
consumedTokenDay=FACTOR*balance*accumulateDay
Wherein consumedTokenDay is the coin DAY consumed by this evaluation behavior, if MAX _ accumulator _ DAY =7 and factor =0.2, the coin DAY accumulated by one user in one DAY can be effectively evaluated 5 times, and the coin DAY accumulated by one user at maximum possibility can be effectively evaluated 35 times.
The consistency evaluation system for the files stored on the chain based on the block chain can evaluate the consistency of the files, combines a block chain social technology, does not depend on a trusted third party in the process of evaluating the consistency of the files, evaluates the consistency of the files in all aspects and in multiple processes through a computer and community members, and reasonably stimulates the evaluation process.
Next, a block chain-based on-chain storage file consistency evaluation method according to an embodiment of the present invention will be described with reference to the drawings.
Fig. 10 is a flowchart of a block chain-based consistency evaluation method for on-chain storage files according to an embodiment of the present invention.
As shown in fig. 10, the method for evaluating consistency of files stored on a chain based on a block chain includes:
and S101, verifying the consistency of the files on the chain through a file consistency verification algorithm, and performing multi-azimuth and multi-stage judgment on the files on the chain.
Step S102, storing the files of the users in the distributed system, and rewarding the contributions of the storage workers through an incentive mechanism.
And step S103, visually displaying the consistency verification process of the files on the chain.
It should be noted that the foregoing explanation of the system embodiment also applies to the method of this embodiment, and is not repeated here.
According to the evaluation method for the consistency of the files stored on the chain based on the block chain, provided by the embodiment of the invention, the consistency of the files can be evaluated, a block chain social technology is combined, a trusted third party is not needed in the evaluation process of the consistency of the files, the consistency of the files is evaluated in all aspects and in multiple processes through a computer and community members, and the evaluation process is reasonably stimulated.
In order to implement the above embodiment, the present invention further provides an electronic device, including: a processor and a memory. Wherein, the processor runs the program corresponding to the executable program code by reading the executable program code stored in the memory, so as to implement the method for evaluating consistency of files stored on the chain based on the block chain as in the foregoing embodiments.
Fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. The electronic device may include: memory 111, processor 112, and computer programs stored on memory 111 and executable on processor 112.
The processor 112 executes the program to implement the block chain-based on-chain storage file consistency evaluation method provided in the above embodiments.
Further, the computer device further comprises:
a communication interface 113 for communication between the memory 111 and the processor 112.
A memory 111 for storing computer programs executable on the processor 112.
The memory 111 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
If the memory 111, the processor 112 and the communication interface 113 are implemented independently, the communication interface 113, the memory 111 and the processor 112 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 11, but that does not indicate only one bus or one type of bus.
Optionally, in a specific implementation, if the memory 111, the processor 112, and the communication interface 113 are integrated on a chip, the memory 111, the processor 112, and the communication interface 113 may complete communication with each other through an internal interface.
The processor 112 may be a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention.
The present embodiment also provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the above method for evaluating consistency of files stored on a chain based on a block chain.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or to implicitly indicate the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A block chain-based consistency evaluation system for on-chain storage files is characterized by comprising the following steps:
the verification module is used for verifying the consistency of the files on the chain through a file consistency verification algorithm and judging the files on the chain in multiple directions and multiple stages;
the storage module is used for storing the files of the users in the distributed system and rewarding the contribution of the storage workers through an incentive mechanism;
and the front-end module is used for visually displaying the consistency verification process of the files on the chain.
2. The system of claim 1, wherein the validation module is further configured to evaluate correctness, validity, and popularity of the document based on closed voting for betting agreements and open voting by validating the worker using a correctness evaluation algorithm, and upload the evaluation results into a blockchain for review.
3. The system of claim 1, wherein the verification module is further configured to verify based on a voting protocol of linkable one-time ring signatures, specifically: anonymous voting on a block chain is carried out through a linkable one-time ring signature technology, a symmetric key and a block chain technology, a voting process is initiated in a voting initiation stage, voters are randomly selected through a distributed random number beacon technology in a preparation stage, participation in the voting is confirmed through uploading a one-time public key, the encrypted voting content is signed through the linkable one-time ring signature technology in the voting stage, a one-time private key is published in a ticket counting stage, and a voting result is calculated.
4. The system of claim 1, wherein the validation module is further configured to validate based on a correctness testing algorithm for the wagering agreement, in particular: the correctness of the files on the chain is judged through an automatic test, then the result is published through a voting protocol based on a linkable one-time ring signature, a plurality of verification workers simultaneously carry out verification, and if the verification results of the verification workers are inconsistent, disputes are resolved by using a gambling protocol.
5. The system of claim 1, wherein the verification module is further configured to verify the documents through a closed voting protocol, evaluate the legality and popularity of the documents on the chain through community members, evaluate the consistency of the documents on the chain through a voting protocol based on a linkable one-time ring signature, and open the documents on the chain to the public when the voting score is higher than a set system parameter.
6. The system of claim 1, wherein the verification module is further configured to quantitatively evaluate the workload of all nodes participating in the verification process by a workload certification algorithm and to give an incentive.
7. The system of claim 1, wherein the verification module is further configured to adjust a reputation value of the user according to the behavior of the user, define members of the community according to the reputation value, and constrain the behavior of the members in the community.
8. A block chain-based consistency evaluation method for files stored on a chain is characterized by comprising the following steps:
verifying the consistency of the files on the chain through a file consistency verification algorithm, and performing multi-azimuth and multi-stage judgment on the files on the chain;
storing the user's files in a distributed system, rewarding the storage worker's contribution through an incentive mechanism;
and visually displaying the consistency verification process of the files on the chain.
9. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor executing the program to implement the method of on-chain storage file consistency evaluation based on a blockchain as claimed in claim 8.
10. A computer-readable storage medium, on which a computer program is stored, the program being executed by a processor for implementing the consistency evaluation method for files stored on a block chain based chain according to claim 8.
CN202111082503.4A 2021-09-14 2021-09-15 Block chain-based consistency evaluation method and device for files stored on chain Pending CN115809250A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111076397 2021-09-14
CN2021110763979 2021-09-14

Publications (1)

Publication Number Publication Date
CN115809250A true CN115809250A (en) 2023-03-17

Family

ID=85482043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111082503.4A Pending CN115809250A (en) 2021-09-14 2021-09-15 Block chain-based consistency evaluation method and device for files stored on chain

Country Status (1)

Country Link
CN (1) CN115809250A (en)

Similar Documents

Publication Publication Date Title
JP7181232B2 (en) Blockchain for general computation
Ghosh et al. Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects
KR102240939B1 (en) Blockchain system with consensus algorithm based on proof-of -transaction and method there of
Macdonald et al. The blockchain: a comparison of platforms and their uses beyond bitcoin
Miller et al. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions
CN111090892B (en) Block chain consensus method and device based on VRF and threshold signature
Babaioff et al. On bitcoin and red balloons
US20160330034A1 (en) Transferring ledger assets between blockchains via pegged sidechains
CN111567009B (en) Declarative intelligent contracts
Motepalli et al. Reward mechanism for blockchains using evolutionary game theory
Sun et al. Rtchain: A reputation system with transaction and consensus incentives for e-commerce blockchain
CN110298641B (en) Rule updating method and device for block chain, block chain node and network
CN114372589A (en) Federated learning method and related device
Gupta et al. A hybrid POW-POS implementation against 51 percent attack in cryptocurrency system
KR102039570B1 (en) P2p ledger for fiat money without cryptocurrency
CN115809250A (en) Block chain-based consistency evaluation method and device for files stored on chain
Byers Combating Front-Running in the Blockchain Ecosystem
Pandey et al. Functional analysis of blockchain consensus algorithms
CN115314352B (en) Privacy-enhanced fair blockchain leader election method and device
Gai et al. A Secure Sidechain for Decentralized Trading in Internet of Things
Pollett et al. TontineCoin: Survivor-based Proof-of-Stake
Guo Cypherium: a scalable and permissionless smart contract platform
US20230410102A1 (en) Blockchain
Leshno et al. Can open decentralized ledgers be economically secure?
CN112764714B (en) Self-excitation random number generation method based on intelligent contract and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination