CN106295406A - A kind of block chain that is used for is from safe storage system and method thereof - Google Patents

A kind of block chain that is used for is from safe storage system and method thereof Download PDF

Info

Publication number
CN106295406A
CN106295406A CN201610665287.9A CN201610665287A CN106295406A CN 106295406 A CN106295406 A CN 106295406A CN 201610665287 A CN201610665287 A CN 201610665287A CN 106295406 A CN106295406 A CN 106295406A
Authority
CN
China
Prior art keywords
transaction
self
data
storage system
intrusion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610665287.9A
Other languages
Chinese (zh)
Inventor
张丛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fanxi Electronics Co Ltd
Original Assignee
Shenzhen Fanxi Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fanxi Electronics Co Ltd filed Critical Shenzhen Fanxi Electronics Co Ltd
Priority to CN201610665287.9A priority Critical patent/CN106295406A/en
Priority to PCT/CN2016/095580 priority patent/WO2018032376A1/en
Publication of CN106295406A publication Critical patent/CN106295406A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operations
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供了一种用于区块链的自安全存储系统及其方法,包括:(1)守护进程模块,安装在客户端,用于为文件访问服务;(2)原数据演进模块,用于为每个访问文件的原数据创建一个新版本;(3)监视窗,用于把所有数据和原数据纪录下来,用于溯源和分析任何不适宜的访问;(4)交易数据完整性维护模块,用于对任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性;(5)隔离模块,用于确保用户不会受到被质疑信任度存在问题的交易文件,所述交易文件在入侵过程中会丢失交易数据,并且不会让用户不知情的访问被入侵者更改后的文件。采用该区块链的自安全存储系统及方法,可以更快更完整的恢复被入侵的交易数据文件。

This invention provides a self-secure storage system and method for blockchain, comprising: (1) a daemon module, installed on the client, for providing file access services; (2) a source data evolution module, for creating a new version of the source data for each accessed file; (3) a monitoring window, for recording all data and source data for tracing and analyzing any inappropriate access; (4) a transaction data integrity maintenance module, for ensuring the integrity of all transaction data up to the point of intrusion by any intrusion occurring under the monitoring window; and (5) an isolation module, for ensuring that users are not exposed to transaction files whose trustworthiness is questionable, as these transaction files will lose transaction data during the intrusion process, and users will not be allowed to access files modified by the intruder without their knowledge. Using this self-secure storage system and method for blockchain, intruded transaction data files can be recovered more quickly and completely.

Description

一种用于区块链自安全存储系统及其方法A self-safe storage system and method for blockchain

技术领域technical field

本发明涉及区块链的交易数据安全问题,特别是一种区块链的自安全存储系统及其方法。The invention relates to the transaction data security problem of the block chain, in particular to a self-safe storage system and method of the block chain.

背景技术Background technique

2009年比特币的出现带来了一种颠覆性的成果--区块链技术,区块链是一个安全的帐簿类数据库,由一个个数据区块组成,使用者可以在这个不断更新升级的平台查找数据,对于金融机构来说,区块链能加快交易处理过程、降低成本、减少中间人、提高市场洞察力,增加业务透明度。The emergence of Bitcoin in 2009 brought a subversive result - block chain technology, block chain is a secure ledger database, composed of data blocks, users can continuously update and upgrade For financial institutions, blockchain can speed up transaction processing, reduce costs, reduce middlemen, improve market insight, and increase business transparency.

计算和存储是计算机系统的两大基本任务,随着信息的爆炸性增长,存储部件会经历基于单服务器的直连存储,到基于局域网的集群网格存储,最后发展到基于广域网的数据网格,区块链技术是目前发展的最末端,这种数据存储介质的本征特质包括智能化的存储,存储服务质量可以保证为用户应用提供服务区分和性能保证,存储是面向对象的海量存储,以及网络存储必须保证是机密完整和安全的,现有的互联网还没有很好的或者方便的办法保证区块链传输过程中的数据和保存在存储设备上的数据的保密性、完整性、可用性、不可抵赖性以及整个网络存储系统的可靠性能,尤其是近年来区块链可信计算技术的产生,对网络存储安全又提出更高的要求。Computing and storage are the two basic tasks of computer systems. With the explosive growth of information, storage components will experience direct-connected storage based on a single server, cluster grid storage based on a LAN, and finally develop into a data grid based on a wide area network. Blockchain technology is at the very end of the current development. The intrinsic characteristics of this data storage medium include intelligent storage, storage service quality can guarantee service differentiation and performance guarantee for user applications, storage is object-oriented mass storage, and Network storage must be guaranteed to be confidential, complete and secure. The existing Internet does not have a good or convenient way to ensure the confidentiality, integrity, availability, and Non-repudiation and the reliable performance of the entire network storage system, especially the emergence of blockchain trusted computing technology in recent years, have put forward higher requirements for network storage security.

发明内容Contents of the invention

本发明的目的在于提供一种用于区块链的自安全存储系统及其方法,包括:(1)守护进程模块,安装在客户端,用于为文件访问服务;(2)原数据演进模块,用于为每个访问文件的原数据创建一个新版本;(3)监视窗,用于把所有数据和原数据纪录下来,除了记录各种修改数据的显性写操作外,每次对文件的访问都会通过更新文件的日志而被记录下来,用于溯源和分析任何不适宜的访问;(4)交易数据完整性维护模块,用于对在任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性;(5)隔离模块,用于确保用户不会受到被质疑信任度存在问题的交易文件,所述交易文件在入侵过程中会丢失交易数据,并且不会让用户不知情的访问被入侵者更改后的文件。The purpose of the present invention is to provide a self-safe storage system and method for blockchain, including: (1) daemon module, installed on the client, for file access services; (2) original data evolution module , used to create a new version for the original data of each accessed file; (3) the monitoring window, used to record all data and original data, except for recording the explicit write operations of various modified data, every time the file is All visits will be recorded by updating the log of the file, which is used to trace and analyze any inappropriate visits; (4) the transaction data integrity maintenance module is used to monitor the intrusion that occurs under the monitoring window at any time, the system Can guarantee the integrity of all transaction data at the intrusion point; (5) an isolation module, used to ensure that the user will not be questioned by transaction files with trustworthiness problems, and the transaction files will lose transaction data during the intrusion process, And it will not allow users to access files changed by intruders without knowing it.

优选的,还包括一个二次交易数据恢复模块,用于恢复发生在入侵时和发现入侵之间的合法更改所导致的交易数据丢失。Preferably, a secondary transaction data recovery module is also included, which is used to recover the loss of transaction data caused by legitimate changes between the time of the intrusion and the discovery of the intrusion.

优选的,交易文件能够可靠的恢复到入侵之前的最后一个访问,并且在验证单个交易文件的访问日志后,如果没有发现不适宜的异常记录,这些交易文件可以被完整地恢复。Preferably, the transaction files can be reliably restored to the last access before the intrusion, and after verifying the access logs of individual transaction files, if no inappropriate abnormal records are found, these transaction files can be completely restored.

优选的,从时间和空间两方面进行记录交易文件,一种是使用基于日志的原交易数据时间记录法,第二种是基于多版本日志的二进制树空间记录法。Preferably, the transaction files are recorded from two aspects of time and space, one is to use the log-based original transaction data time recording method, and the second is to use the binary tree space recording method based on multi-version logs.

优选的,区块链的自安全存储系统不提供保证机密性的模块,假设这些自安全磁盘和一个使用标准认证协议的交易文件服务器连接,所有发送到该自安全存储系统的请求不需要额外的认证和加密。Preferably, the self-secure storage system of the blockchain does not provide a module to ensure confidentiality. Assuming that these self-secure disks are connected to a transaction file server using a standard authentication protocol, all requests sent to the self-secure storage system do not require additional Authentication and encryption.

采用该区块链的自安全存储系统,可以更快更完整的恢复被入侵的交易数据文件。Using the self-secure storage system of the blockchain, the hacked transaction data files can be recovered faster and more completely.

本发明的。of the present invention.

根据下文结合附图对本发明具体实施例的详细描述,本领域技术人员将会更加明了本发明的上述以及其他目的、优点和特征。Those skilled in the art will be more aware of the above and other objects, advantages and features of the present invention according to the following detailed description of specific embodiments of the present invention in conjunction with the accompanying drawings.

附图说明Description of drawings

后文将参照附图以示例性而非限制性的方式详细描述本发明的一些具体实施例。附图中相同的附图标记标示了相同或类似的部件或部分。本领域技术人员应该理解,这些附图未必是按比例绘制的。本发明的目标及特征考虑到如下结合附图的描述将更加明显,附图中:Hereinafter, some specific embodiments of the present invention will be described in detail by way of illustration and not limitation with reference to the accompanying drawings. The same reference numerals in the drawings designate the same or similar parts or parts. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. The objectives and features of the present invention will be more apparent in consideration of the following description in conjunction with the accompanying drawings, in the accompanying drawings:

图1为根据本发明实施例的区块链自安全存储系统的结构示意图。Fig. 1 is a schematic structural diagram of a blockchain self-secure storage system according to an embodiment of the present invention.

具体实施方式detailed description

在进行具体实施方式的说明之前,为了更为清楚的表达所论述的内容,首先定义一些非常重要的概念。Before describing the specific implementation manners, in order to express the discussed content more clearly, some very important concepts are firstly defined.

交易:交易的实质是个关系数据结构,这个数据结构中包含交易参与者价值转移的相关信息。这些交易信息被称为记账总账簿。交易需经过三个创建、验证、写入区块链。交易必须经过数字签名,保证交易的合法性。Transaction: The essence of a transaction is a relational data structure, which contains information about the value transfer of transaction participants. These transaction information is called ledger ledger. Transactions need to go through three steps of creating, verifying, and writing to the blockchain. The transaction must be digitally signed to ensure the legality of the transaction.

区块:所有的交易信息存放于区块中,一条交易信息就是一条记录,作为一个独立的记录存放于区块链中。区块由区块头部和数据部分组成,区块头字段包含区块本身的各种特性,例如前一区块信息,merkle值及时间戳等。其中区块头哈希值和区块高度是标识区块最主要的两个指标。区块主标识符是它的加密哈希值,一个通过SHA算法对区块头进行二次哈希计算而得到的数字指纹。产生的32字节哈希值被称为区块哈希值,或者区块头哈希值,只有区块头被用于计算。区块哈希值可以唯一、明确地标识一个区块,并且任何节点通过简单地对区块头进行哈希计算都可以独立地获取该区块哈希值。Block: All transaction information is stored in the block, and a transaction information is a record, which is stored in the blockchain as an independent record. A block consists of a block header and a data part. The block header field contains various characteristics of the block itself, such as the previous block information, merkle value and timestamp. Among them, the block header hash value and block height are the two most important indicators for identifying blocks. The block master identifier is its encrypted hash value, a digital fingerprint obtained by hashing the block header twice through the SHA algorithm. The resulting 32-byte hash is called the block hash, or block header hash, and only the block header is used for the calculation. The block hash value can uniquely and unambiguously identify a block, and any node can independently obtain the block hash value by simply hashing the block header.

区块链:由区块按照链式结构有序链接起来的数据结构。区块链就像一个垂直的堆栈,第一个区块作为栈底的首区块,随后每个区块都被放置在其他区块之上。当区块写入区块链后将永远不会改变,并且备份到其他的区块链服务器上。Blockchain: A data structure in which blocks are linked in an orderly manner according to a chain structure. A blockchain is like a vertical stack, with the first block being the first block at the bottom of the stack, and each subsequent block being placed on top of the others. When the block is written into the blockchain, it will never change and is backed up to other blockchain servers.

实施例:Example:

任何系统的机密性实际上都会被打破,因此首要目标是防止交易数据遭到破坏,并且通过检测和诊断捕获入侵区块链系统的来源。参见图1,一种用于区块链的自安全存储系统,存储原理基于对主机操作系统的不信任,需要一些基本的运算来管理文件系统,在客户端安装一个守护进程模块,服务于文件访问。该自安全存储系统不提供保证机密性的措施,它假设这些自安全磁盘和一个使用标准认证协议的交易文件服务器连接,所有发送到该自安全存储系统的请求不需要额外的认证和加密。Confidentiality of any system can be breached in practice, so the primary goal is to prevent the breach of transaction data and capture the source of intrusion into the blockchain system through detection and diagnostics. See Figure 1, a self-secure storage system for blockchain. The storage principle is based on the distrust of the host operating system. Some basic operations are required to manage the file system. A daemon module is installed on the client to serve the file system. access. The self-secure storage system does not provide measures to ensure confidentiality. It assumes that these self-secure disks are connected to a transaction file server using a standard authentication protocol, and all requests sent to the self-secure storage system do not require additional authentication and encryption.

区块链的自安全存储系统包括原数据演进模块,用于为每个访问文件的原数据创建一个新版本。The blockchain's self-secure storage system includes an original data evolution module for creating a new version of the original data for each accessed file.

并且还包括一个监视窗,用于把所有数据和原数据纪录下来,除了记录各种修改数据的显性写操作外,每次对文件的访问都会通过更新文件的日志而被记录下来,这样任何不适宜的访问都可以得到溯源和分析,一旦设置监视窗,就不可避免接近数据时不备监视,从而排除入侵者以不被察觉的方式更改数据。还包括交易数据完整性维护模块,用于对在任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性,通过详尽的记录,在区块链管理员发现入侵后,文件能够可靠的恢复到入侵之前的最后一个访问,此外,在验证单个交易文件的访问日志后,如果没有发现不适宜的异常记录,这些交易文件可以被完整地恢复。And it also includes a monitoring window, which is used to record all data and original data. In addition to recording the explicit write operations of various modified data, each access to the file will be recorded by updating the log of the file, so that any Unsuitable access can be traced and analyzed. Once the monitoring window is set, it is inevitable to be unprepared to monitor when approaching the data, thereby preventing intruders from changing the data in an undetected manner. It also includes a transaction data integrity maintenance module, which is used for intrusions that occur under the monitoring of the monitoring window at any time. The system can ensure the integrity of all transaction data at the point of intrusion. Through detailed records, the blockchain administrator After an intrusion is discovered, the files can be reliably restored to the last access before the intrusion. In addition, after verifying the access logs of individual transaction files, if no inappropriate abnormal records are found, these transaction files can be completely restored.

还包括隔离模块,那些被质疑信任度存在问题的交易文件就会在入侵过程中丢失交易数据,由自安全存储系统的隔离机构确保用户不能接收这些有问题的文件,并且不会让用户不知情的访问被入侵者更改后的文件。It also includes an isolation module. Those transaction files that are questioned about their trustworthiness will lose transaction data during the intrusion process. The isolation mechanism of the self-secure storage system ensures that users cannot receive these problematic files and will not let users know. access to files altered by intruders.

还可以包括一个二次交易数据恢复模块,用于恢复发生在入侵时和发现入侵之间的合法更改所导致的交易数据丢失,从而提高交易数据可用性,损失最小化。A secondary transaction data recovery module may also be included, which is used to recover the loss of transaction data caused by legitimate changes between the time of the intrusion and the detection of the intrusion, thereby improving the availability of transaction data and minimizing losses.

鉴于为每个交易文件访问都需要做一个日志,本实施例从时间和空间两方面进行记录,一种是使用基于日志的原交易数据时间记录法,第二种是基于多版本日志的二进制树空间记录法。通过对某一份交易文件的入侵后交易数据的恢复时间和恢复状况来看,该系统能够获得比传统系统大约1倍以上的速度改进,100%恢复交易数据。In view of the need to make a log for each transaction file access, this embodiment records from two aspects of time and space, one is to use the time recording method of the original transaction data based on the log, and the second is to use the binary tree based on the multi-version log Spatial recording method. Judging from the recovery time and recovery status of the transaction data after the intrusion of a certain transaction file, the system can achieve a speed improvement of more than twice that of the traditional system, and 100% recovery of transaction data.

虽然本发明已经参考特定的说明性实施例进行了描述,但是不会受到这些实施例的限定而仅仅受到附加权利要求的限定。本领域技术人员应当理解可以在不偏离本发明的保护范围和精神的情况下对本发明的实施例能够进行改动和修改。While the invention has been described with reference to certain illustrative embodiments, it is not to be limited by these embodiments but only by the appended claims. Those skilled in the art should understand that changes and modifications can be made to the embodiments of the present invention without departing from the protection scope and spirit of the present invention.

Claims (10)

1.一种用于区块链的自安全存储系统,其特征在于包括:1. A self-safe storage system for blockchain, characterized in that it comprises: (1)守护进程模块,安装在客户端,用于为文件访问服务;(1) a daemon module, installed on the client, for serving file access; (2)原数据演进模块,用于为每个访问文件的原数据创建一个新版本;(2) The original data evolution module is used to create a new version for the original data of each access file; (3)监视窗,用于把所有数据和原数据纪录下来,除了记录各种修改数据的显性写操作外,每次对文件的访问都会通过更新文件的日志而被记录下来,用于溯源和分析任何不适宜的访问;(3) The monitoring window is used to record all data and original data. In addition to recording the explicit write operations of various modified data, each access to the file will be recorded by updating the log of the file for source tracing and analyze any inappropriate access; (4)交易数据完整性维护模块,用于对在任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性;(4) The transaction data integrity maintenance module is used to ensure the integrity of all transaction data at the point of intrusion for the intrusion that occurs under the monitoring of the monitoring window at any time; (5)隔离模块,用于确保用户不会受到被质疑信任度存在问题的交易文件,所述交易文件在入侵过程中会丢失交易数据,并且不会让用户不知情的访问被入侵者更改后的文件。(5) The isolation module is used to ensure that the user will not receive transaction files with questionable trustworthiness. The transaction files will lose transaction data during the intrusion process, and will not allow users to access without knowing it after being changed by the intruder document. 2.根据权利要求1所述的一种用于区块链的自安全存储系统,其特征在于:还包括一个二次交易数据恢复模块,用于恢复发生在入侵时和发现入侵之间的合法更改所导致的交易数据丢失。2. A self-safe storage system for blockchain according to claim 1, characterized in that: it also includes a secondary transaction data recovery module, which is used to recover legal data between the intrusion and the discovery of the intrusion. Transaction data lost as a result of the change. 3.根据权利要求1所述的一种用于区块链的自安全存储系统,其特征在于:,所述交易文件能够可靠的恢复到入侵之前的最后一个访问,并且在验证单个交易文件的访问日志后,如果没有发现不适宜的异常记录,这些交易文件可以被完整地恢复。3. A self-safe storage system for blockchain according to claim 1, characterized in that: the transaction file can be reliably restored to the last access before the intrusion, and when verifying a single transaction file After accessing the log, these transaction files can be completely restored if no inappropriate abnormal records are found. 4.根据权利要求1所述的一种用于区块链的自安全存储系统,其特征在于:从时间和空间两方面进行记录所述交易文件,一种是使用基于日志的原交易数据时间记录法,第二种是基于多版本日志的二进制树空间记录法。4. A kind of self-safe storage system for blockchain according to claim 1, characterized in that: record the transaction file from two aspects of time and space, one is to use the original transaction data time based on log Recording method, the second is the binary tree space recording method based on multi-version logs. 5.根据权利要求1所述的一种用于区块链的自安全存储系统,其特征在于:所述区块链的自安全存储系统不提供保证机密性的模块,假设这些自安全磁盘和一个使用标准认证协议的交易文件服务器连接,所有发送到该自安全存储系统的请求不需要额外的认证和加密。5. A kind of self-safety storage system for block chain according to claim 1, is characterized in that: the self-safety storage system of described block chain does not provide the module that guarantees confidentiality, assuming these self-safety disks and A transaction file server connection using standard authentication protocols, all requests sent to this self-secure storage system do not require additional authentication and encryption. 6.一种用于区块链的自安全存储系统,其特征在于包括如下步骤:6. A self-safe storage system for blockchain, characterized in that it comprises the steps of: (1)守护进程模块,安装在客户端,用于为文件访问服务;(1) a daemon module, installed on the client, for serving file access; (2)原数据演进模块,用于为每个访问文件的原数据创建一个新版本;(2) The original data evolution module is used to create a new version for the original data of each access file; (3)监视窗,用于把所有数据和原数据纪录下来,除了记录各种修改数据的显性写操作外,每次对文件的访问都会通过更新文件的日志而被记录下来,用于溯源和分析任何不适宜的访问;(3) The monitoring window is used to record all data and original data. In addition to recording the explicit write operations of various modified data, each access to the file will be recorded by updating the log of the file for source tracing and analyze any inappropriate access; (4)交易数据完整性维护模块,用于对在任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性;(4) The transaction data integrity maintenance module is used to ensure the integrity of all transaction data at the point of intrusion for the intrusion that occurs under the monitoring of the monitoring window at any time; (5)隔离模块,用于确保用户不会受到被质疑信任度存在问题的交易文件,所述交易文件在入侵过程中会丢失交易数据,并且不会让用户不知情的访问被入侵者更改后的文件。(5) The isolation module is used to ensure that the user will not receive transaction files with questionable trustworthiness. The transaction files will lose transaction data during the intrusion process, and will not allow users to access without knowing it after being changed by the intruder document. 7.根据权利要求6所述的一种用于区块链的自安全存储系统,其特征在于:还包括一个二次交易数据恢复模块,用于恢复发生在入侵时和发现入侵之间的合法更改所导致的交易数据丢失。7. A self-safe storage system for blockchain according to claim 6, characterized in that: it also includes a secondary transaction data recovery module, which is used to restore the legal data between the intrusion and the discovery of the intrusion Transaction data lost as a result of the change. 8.根据权利要求6所述的一种用于区块链的自安全存储系统,其特征在于:,所述交易文件能够可靠的恢复到入侵之前的最后一个访问,并且在验证单个交易文件的访问日志后,如果没有发现不适宜的异常记录,这些交易文件可以被完整地恢复。8. A self-safe storage system for blockchain according to claim 6, characterized in that: the transaction file can be reliably restored to the last access before the intrusion, and when verifying a single transaction file After accessing the log, these transaction files can be completely restored if no inappropriate abnormal records are found. 9.根据权利要求6所述的一种用于区块链的自安全存储系统,其特征在于:从时间和空间两方面进行记录所述交易文件,一种是使用基于日志的原交易数据时间记录法,第二种是基于多版本日志的二进制树空间记录法。9. A self-safe storage system for blockchain according to claim 6, characterized in that: record the transaction file from two aspects of time and space, one is to use the log-based original transaction data time Recording method, the second is the binary tree space recording method based on multi-version logs. 10.根据权利要求6所述的一种用于区块链的自安全存储系统,其特征在于:所述区块链的自安全存储方法不提供保证机密性的模块,假设这些自安全磁盘和一个使用标准认证协议的交易文件服务器连接,所有发送到该自安全存储系统的请求不需要额外的认证和加密。10. A self-safe storage system for blockchain according to claim 6, characterized in that: the self-safe storage method of said blockchain does not provide a module to ensure confidentiality, assuming that these self-safe disks and A transaction file server connection using standard authentication protocols, all requests sent to this self-secure storage system do not require additional authentication and encryption.
CN201610665287.9A 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof Pending CN106295406A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610665287.9A CN106295406A (en) 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof
PCT/CN2016/095580 WO2018032376A1 (en) 2016-08-13 2016-08-16 Self-securing storage system and method for block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610665287.9A CN106295406A (en) 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof

Publications (1)

Publication Number Publication Date
CN106295406A true CN106295406A (en) 2017-01-04

Family

ID=57670625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610665287.9A Pending CN106295406A (en) 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof

Country Status (2)

Country Link
CN (1) CN106295406A (en)
WO (1) WO2018032376A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107329888A (en) * 2017-05-31 2017-11-07 深圳前海微众银行股份有限公司 Intelligent contract command code coverage rate computational methods and system
CN107943833A (en) * 2017-10-25 2018-04-20 华南农业大学 A kind of storage of non-stop layer distributed document and search method based on block chain
CN108521434A (en) * 2018-05-29 2018-09-11 广西电网有限责任公司 A kind of network security intrusion detecting system based on block chain technology
CN109558064A (en) * 2017-09-25 2019-04-02 航天信息股份有限公司 A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain
CN109829297A (en) * 2017-11-23 2019-05-31 财团法人资讯工业策进会 Monitoring device, method and its computer storage medium
CN110019235A (en) * 2017-12-29 2019-07-16 百度在线网络技术(北京)有限公司 Data storage, restoration methods, device, equipment and medium based on block chain
CN110163007A (en) * 2019-04-23 2019-08-23 西安邮电大学 Data integrity verification method, equipment and storage medium based on block chain
CN110309166A (en) * 2019-07-10 2019-10-08 中国电子科技集团公司第二十八研究所 A Traceable Completion Method for Geographical Elevation Data
WO2020010763A1 (en) * 2018-07-12 2020-01-16 中国科学院深圳先进技术研究院 Blockchain spatio-temporal data querying method and system, and electronic apparatus
CN114331451A (en) * 2021-10-27 2022-04-12 东北大学 Data modification method on block chain based on double hash chains
CN114553488A (en) * 2022-01-24 2022-05-27 四川华西集采电子商务有限公司 Square encryption bidding method and system
CN115080538A (en) * 2022-06-14 2022-09-20 蚂蚁区块链科技(上海)有限公司 Block chain version verification method and device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741064B (en) * 2019-01-10 2023-05-05 广东工业大学 A review attack processing method, system, electronic equipment and storage medium
CN110781531B (en) * 2019-09-04 2023-04-07 安徽省粮油信息中心(安徽粮食批发交易市场管委会) Tamper-proof grain depot data secure storage system and method
CN111680111B (en) * 2020-05-29 2023-09-01 泰康保险集团股份有限公司 Billing method and device, computer equipment and computer readable storage medium
US11803864B2 (en) * 2020-09-28 2023-10-31 Bank Of America Corporation Distributed ledgers for enhanced chain of custody certification
CN113570384A (en) * 2021-07-26 2021-10-29 大连民族大学 Agricultural product tracing method and system based on block chain
CN115437852B (en) * 2022-11-07 2023-02-03 四川大学 A fast blockchain system and method based on disaster recovery and file partition table

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system
CN102339321A (en) * 2011-11-09 2012-02-01 上海盛霄云计算技术有限公司 Network file system with version control and method using same
CN104392405A (en) * 2014-11-14 2015-03-04 杭州银江智慧医疗集团有限公司 Electronic medical record safety system
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8799247B2 (en) * 2011-02-11 2014-08-05 Purdue Research Foundation System and methods for ensuring integrity, authenticity, indemnity, and assured provenance for untrusted, outsourced, or cloud databases
CN102981945B (en) * 2012-12-31 2016-02-10 北京京东世纪贸易有限公司 A kind of unfailing performance supervisory system and method
CN104281808B (en) * 2014-09-25 2017-09-01 中国科学院信息工程研究所 A general Android malicious behavior detection method
CN105183609B (en) * 2015-09-16 2017-03-15 焦点科技股份有限公司 A kind of real-time monitoring system for being applied to software system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system
CN102339321A (en) * 2011-11-09 2012-02-01 上海盛霄云计算技术有限公司 Network file system with version control and method using same
CN104392405A (en) * 2014-11-14 2015-03-04 杭州银江智慧医疗集团有限公司 Electronic medical record safety system
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107329888A (en) * 2017-05-31 2017-11-07 深圳前海微众银行股份有限公司 Intelligent contract command code coverage rate computational methods and system
CN107329888B (en) * 2017-05-31 2019-10-18 深圳前海微众银行股份有限公司 Smart contract operation code coverage calculation method and system
CN107241360B (en) * 2017-08-04 2019-01-18 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN109558064A (en) * 2017-09-25 2019-04-02 航天信息股份有限公司 A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain
CN109558064B (en) * 2017-09-25 2022-06-07 航天信息股份有限公司 Electronic invoice data chain synchronization method, device, medium and electronic equipment
CN107943833A (en) * 2017-10-25 2018-04-20 华南农业大学 A kind of storage of non-stop layer distributed document and search method based on block chain
CN109829297B (en) * 2017-11-23 2022-04-19 财团法人资讯工业策进会 Monitoring device, method and computer storage medium thereof
CN109829297A (en) * 2017-11-23 2019-05-31 财团法人资讯工业策进会 Monitoring device, method and its computer storage medium
CN110019235A (en) * 2017-12-29 2019-07-16 百度在线网络技术(北京)有限公司 Data storage, restoration methods, device, equipment and medium based on block chain
CN110019235B (en) * 2017-12-29 2021-08-17 百度在线网络技术(北京)有限公司 Block chain based data storage and recovery method, device, equipment and medium
CN108521434A (en) * 2018-05-29 2018-09-11 广西电网有限责任公司 A kind of network security intrusion detecting system based on block chain technology
WO2020010763A1 (en) * 2018-07-12 2020-01-16 中国科学院深圳先进技术研究院 Blockchain spatio-temporal data querying method and system, and electronic apparatus
CN110163007A (en) * 2019-04-23 2019-08-23 西安邮电大学 Data integrity verification method, equipment and storage medium based on block chain
CN110163007B (en) * 2019-04-23 2021-05-04 西安邮电大学 Blockchain-based data integrity verification method, device and storage medium
CN110309166A (en) * 2019-07-10 2019-10-08 中国电子科技集团公司第二十八研究所 A Traceable Completion Method for Geographical Elevation Data
CN110309166B (en) * 2019-07-10 2021-10-01 中国电子科技集团公司第二十八研究所 A Traceable Geographical Elevation Data Completion Method
CN114331451A (en) * 2021-10-27 2022-04-12 东北大学 Data modification method on block chain based on double hash chains
CN114331451B (en) * 2021-10-27 2024-12-06 东北大学 A data modification method on blockchain based on double hash chain
CN114553488A (en) * 2022-01-24 2022-05-27 四川华西集采电子商务有限公司 Square encryption bidding method and system
CN114553488B (en) * 2022-01-24 2025-02-18 四川华西集采电子商务有限公司 A method and system for four-party encrypted bidding
CN115080538A (en) * 2022-06-14 2022-09-20 蚂蚁区块链科技(上海)有限公司 Block chain version verification method and device

Also Published As

Publication number Publication date
WO2018032376A1 (en) 2018-02-22

Similar Documents

Publication Publication Date Title
CN106295406A (en) A kind of block chain that is used for is from safe storage system and method thereof
US12099606B2 (en) Systems and methods for protecting against malware attacks
US12566879B2 (en) Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data
CN113326317B (en) Blockchain evidence storage method and system based on homogeneous multi-chain architecture
US10366247B2 (en) Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data
US12088583B2 (en) Permissions for backup-related operations
Zawoad et al. OCF: an open cloud forensics model for reliable digital forensics
CN103226675B (en) A kind of traceability system and method analyzing intrusion behavior
CN107563199A (en) It is a kind of that software detection and defence method in real time are extorted based on file request monitoring
US11803461B2 (en) Validation of log files using blockchain system
CN106302720B (en) survivable storage system and method for block chain
CN102739774B (en) Method and system for obtaining evidence under cloud computing environment
WO2018032379A1 (en) Untrusted remote transaction file secure storage system for block chain
WO2020237874A1 (en) Project data verification method, device, computer apparatus and storage medium
US10735457B2 (en) Intrusion investigation
US8745010B2 (en) Data storage and archiving spanning multiple data storage systems
US20250021997A1 (en) Distributed Ledgers for Enhanced Chain of Custody Certification
CN120822215B (en) Audit evidence obtaining method, device and equipment based on virtual desktop infrastructure log
US20250080551A1 (en) Remote operations forensics
US20260039675A1 (en) Data-aware anomaly detection
Joshi et al. An Improved Mechanism to Maintain Data Integrity and Anomaly Detection in Cloud Storage
CN120675747A (en) Log auditing method, system, device, electronic equipment and medium
CN119918048A (en) Ransomware detection method, device, equipment, storage medium and product
CN115857815A (en) A data security management system in the open sharing of scientific data
Zeng Research on Forensics Method based on Log on SaaS

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170104