CN109040305A - Block chained record method based on heterogeneous hierarchical dynamic topology fragment - Google Patents

Block chained record method based on heterogeneous hierarchical dynamic topology fragment Download PDF

Info

Publication number
CN109040305A
CN109040305A CN201811052005.3A CN201811052005A CN109040305A CN 109040305 A CN109040305 A CN 109040305A CN 201811052005 A CN201811052005 A CN 201811052005A CN 109040305 A CN109040305 A CN 109040305A
Authority
CN
China
Prior art keywords
node
piece
network
network node
fragment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811052005.3A
Other languages
Chinese (zh)
Other versions
CN109040305B (en
Inventor
刘复昌
葛睿
孟凡胜
庄钊
王世超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Yuancun Technology Co ltd
Original Assignee
Zhejiang Tianmai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Tianmai Technology Co Ltd filed Critical Zhejiang Tianmai Technology Co Ltd
Priority to CN201811052005.3A priority Critical patent/CN109040305B/en
Publication of CN109040305A publication Critical patent/CN109040305A/en
Application granted granted Critical
Publication of CN109040305B publication Critical patent/CN109040305B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1042Peer-to-peer [P2P] networks using topology management mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1059Inter-group management mechanisms, e.g. splitting, merging or interconnection of groups

Abstract

The invention discloses a kind of block chained record methods based on heterogeneous hierarchical dynamic topology fragment, this method is by utilizing the data record that plant growth simulation algorithm (PGSA) is block chain each time to construct heterogeneous hierarchical dynamic topology fragment in the home network, the constructed double-deck isomery dynamic topology fragment is made of public chain piece and major network piece two parts, and public chain piece undertakes the record weight no more than node total number 49%, major network piece undertakes the record weight not less than node total number 51%;The node of major network piece is used to distributed storage data, and the node of public chain piece is for recording 256 hash values after specific encryption method (such as MD5, SHA-256, SHA-512);The present invention combines heterogeneous hierarchical dynamic topology slicing algorithm with block chained record, under the premise of guaranteeing block chain technology for realizing existing distributed recording technology, can also effectively solve the problems, such as " trilemma " that block chain data record generally faces.

Description

Block chained record method based on heterogeneous hierarchical dynamic topology fragment
Technical field
The present invention relates to block chain technical fields, are related to a kind of block chained record based on heterogeneous hierarchical dynamic topology fragment Method.
Background technique
Block chain technology, also known as " distributed account book technology " are that a kind of decentralization, collective safeguard distributed account book Technical solution, block chain technology is by Encryption Algorithm, common recognition mechanism, the chain type block structure storing data of timestamp, to be Data increase time dimension, realize in a distributed system the point-to-point transaction dependent on some trust center, coordination and Cooperation means reach efficient, safe, anti-tamper, and have the characteristics such as extremely strong verifiability and trackability.
Block chain technology is virtual digit currency using bit coin as representative and grows up all the time, digital cash Using being a set of account book system and note issuance mechanism, but there are problems that very serious " trilemma ": digital cash application Generally pursued in decentralization and safety ultimate attainment, then each node will store whole transaction data, a large amount of to calculate power wave Expense is during reaching common understanding, for example bit coin is exactly averagely to generate one on all nodes all storage to public chain The time of block has reached 10 minutes, sacrifices high efficiency;
There are some digital cash in order to realize high efficiency, using privately owned chain, privately owned chain is by resting in a reality for block On hand, the node that lets on is limited and controllable for body, realizes the transactions velocity being exceedingly fast and better secret protection, it will be clear that this is Technology through almost a kind of " centralization ";
When block chain technical application to one can free uploaded videos decentralization network, with upload and playback volume More and more, in order to guarantee that operational efficiency, system must give up some secondary datas, this just compromises in " safety ". It is unacceptable in the system high to security request data such as finance.
Meanwhile before this although the network node of application block chain technology has reached decentralization, but these nodes are opened up Flutter structure all and be it is identical, it is still not safe enough when in face of with the ultra-large attack for calculating power;
1. so for how to solve the problems, such as that current block chain technology faces: (1) realizing high efficiency;(2) it realizes in going The heart;(3) reach higher safety;(4) each network node is allowed to be owned by different topological structures etc.;The invention proposes A kind of block chained record method based on heterogeneous hierarchical dynamic topology slicing algorithm, this method is heterogeneous hierarchical dynamic topology fragment Algorithm is in conjunction with block chained record, under the premise of guaranteeing block chain technology for realizing existing distributed recording technology, greatly Solve the problems, such as that data record records " trilemma " faced at the very start in degree, i.e., height can be achieved at the same time in the method for the present invention Imitate these three requirements of low energy, decentralization and safety.
Summary of the invention
In view of the deficiencies of the prior art, the block chain note based on heterogeneous hierarchical dynamic topology fragment that the invention proposes a kind of Recording method, for solve it is of the existing technology be difficult to simultaneously (1) realize high efficiency;(2) decentralization is realized;(3) reach compared with High safety;(3) the problems such as allowing each network node to be owned by different topological structures.
To solve the above-mentioned problems, a kind of block chained record side based on heterogeneous hierarchical dynamic topology fragment of the invention Method is by utilizing the data record building point that plant growth simulation algorithm (PGSA) is block chain each time in the home network Layer isomery dynamic topology fragment;The constructed double-deck isomery dynamic topology fragment is made of public chain piece and major network piece two parts, And public chain piece undertakes the record weight α no more than node total number 49%, major network piece undertakes the record not less than node total number 51% Weight beta;Node in major network piece is used to distributed storage data, and the node effect in public chain piece is record specific encryption method 256 hash values after (such as MD5, SHA-256, HMAC);Meanwhile the node between major network piece and the record node of public chain piece Coincidence factor is not more than the 26% of major network piece, as security mechanism.
The natural growth mechanism of plant growth simulation algorithm is used to construct in heterogeneous hierarchical topology fragment by the present invention, used Plant growth simulation algorithm belong to a kind of optimization random algorithm, it is the shape of growing tips of the plant that this algorithm, which has several key points respectively, State element, the phototropism of plant and growing point stop growing criterion etc.;Utilize plant growth simulation algorithm building heterogeneous hierarchical topology Fragment, improves the random topologies of each node of network, dynamically ensure that the stability of each node of network, specific building step It is rapid as follows:
S1, initialization local network node
(1) it selects and has configured corresponding local network node as original plant growing point;
(2) local network node reads in the parameters such as network performance, the memory space needed;
(3) number, that is, network node number of growing point required for constructing, the address ip of network node, topological fragment piece Number, topological fragment cut the parameters such as ratio value and set of random numbers and import in local network;
The data that S2, input block chain encapsulate are recorded in local network;
S3, local network node create task according to topological fragment demand, as the original plant growing point direction of growth;
(1) topological fragment is divided into two layers by local network node;
There are three different weight tasks altogether for (2) two etale topology fragments, the major network for being not less than 51% weight including accounting for total node The network node that network node growth task, the public chain piece network node growth task weight of piece are 49% grows task and in public affairs Path node between chain piece and major network piece and no more than major network piece weight 26% grows task;
S4, local network node select one of direction in three directions of growth to be grown;
S5, objective function and history optimal network node is calculated
(1) the network node parameter grown as needed obtains the objective function f of egress comprehensive performance superposition, and formula is such as Under,
F=is superimposed (network performance, free memory, network line duration, ttl value etc.)
In the formula, " superposition " expression stacks up multiple performances of node, is the integrated performance index of node, node The network performance of each performance such as node, the free memory of node, the network line duration of node, ttl value of node etc.;
(2) global optimum's network node and global minima network node, global optimum's network section are determined according to objective function It puts and global minima network node is i.e. two minimum and maximum nodes of functional value, and general from being calculated by objective function f The addition of the two networks can grow set;
S6, objective function filter out most suboptimum network node
(1) network node that can be grown is added to S5 step is obtained grows in node set;
(2) objective function calculates separately out the functional value that can grow network node in network node;
(3) functional value of previous step is ranked up, screening obtain most suboptimum network node as target growth point, it is worst Excellent network node is the network node that objective function f function value is only smaller than global optimum's network node functional value;
S7, the growing points grown all before are counted, judges whether the weight for reaching current task, if reaching, Terminate current task, S4 is jumped to if not up to and continues iteration generation target growth point, the weight until reaching current task;
S8, local network can send the order for judging whether to complete to three different weight tasks, terminate to give birth to if completing It is long, S4 is jumped to if not completing to be continued to grow.
Further, the method for the present invention further includes a judgment mechanism, i.e., local network node can be in major network piece network section Point storage complete data after to the all-network node of major network piece send judgement order, major network piece node after receiving order can will The content feeds such as size of data, state data memory, the storage location of transmission can be incited somebody to action to local network node, local network node The content fed back to transmit before data content compare, check whether it is identical, thus complete integrality judgement.
Further, the method for the present invention further includes a kind of dynamic growth mechanism, i.e., the block chain in major network piece node and It, can be to local network if normally can be read or extract when block chain in public chain piece node is read or extracts every time Normal online signal is fed back, if cannot be read, this node can feed back improper online signal, local network to major network piece After receiving the signal of feedback, above-mentioned plant growth simulation algorithm can be re-used immediately and is regrowed a new node Completion is carried out, to guarantee the integrality and Information Security of node, to reach dynamic characteristic proposed by the present invention.
The topological structure of network node is all different in all major network pieces grown in the present invention, this is also simulating plant The growth characteristic of growth algorithm.
Three different weight tasks, respective function are as follows: account for network of total node not less than the major network piece of 51% weight Node is mainly responsible for storing data, and the network node for accounting for public chain piece of total node no more than 49% is mainly responsible for record particular encryption Encrypted 256 hash values of method (such as MD5), between public chain piece and major network piece and no more than major network piece weight 26% Path node is mainly responsible for data transmission, at the same make in whole network so public chain piece be it is disclosed, major network piece is concealment, In addition each network node of major network piece is different, the probability that data are illegally distorted is greatly reduced.
When major network piece and public chain piece carry out data transmission, it can repeatedly pass through some nodes, the very high point of these coincidence factors It is to prevent the data on block chain from illegally being distorted, public chain piece and the big node of major network piece coincidence factor undertake no more than major network piece 26% weight of weight beta, thus the path node of this 26% weight can storing data and hash value, it is excellent to play one layer of safety Machining function.
Public chain piece only accounts for 49% weight of the whole network, rather than has accounted for 100% as digital cash application, reaches raising effect Rate effect, major network piece account for 51% weight of the whole network, and each node stores same data, has reached decentralization effect, simultaneously 26% weight path node collective effect between public chain piece and major network piece is in solving safety problem, so the present invention is for solving Conventional digital currency plays the role of very big using long-standing " trilemma " problem, and the specific weight that acts on can be referring to Following table 1:
Table 1
When the weighted of data record, the node number of distribution is not also identical, i.e., if block chain needs the number encapsulated It is important according to recording, then more nodes are distributed, otherwise, distribute default node number, such as 100 nodes.
The beneficial effects of the present invention are:
The present invention solves building isomery dynamic topology separation problem using plant growth simulation algorithm, compared to using other Optimization algorithm, with outstanding advantage: first, which is provided with stronger dependence to parameter unlike other optimization algorithms Property, parameter setting it is appropriate whether will have a direct impact on the quality of optimum results;Second, which has Growable, there is one The directionality and the comparatively ideal search mechanisms of randomness equilibrium ratio that a morphactin determines, and be in entire growing space according to The mode of global optimum carries out growth operation, therefore can guarantee to obtain globally optimal solution;Third, the algorithm search for institute each time Obtained result is all to bear branch by seed by nearest from light source limb growth gained, branch bear it is dry, repeatedly, until Search entirely can growing space, search speed is stronger extensive particularly with solving system, complexity there has also been raising Problem has a clear superiority than other algorithms.
In addition, the present invention combines heterogeneous hierarchical dynamic topology fragment with block chained record, guaranteeing block chain technology Under the premise of existing distributed recording technology, largely solve what data record record faced at the very start " trilemma " problem, i.e., invention achieves three efficient low energy, decentralization and safety requirements.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below by embodiment or existing Attached drawing needed in technical description is briefly described, it should be apparent that, the accompanying drawings in the following description is only this Shen Some embodiments please without creative efforts, may be used also for the common invoice technical staff of this field To obtain other drawings based on these drawings.
Fig. 1 is the method for the present invention overall flow figure;
Fig. 2 is the detail flowchart of plant growth simulation algorithm building lamination mechanism topology Slicing procedure;
The instance graph that Fig. 3 summary journal node is 100;
Specific embodiment
In order to keep technical characterstic and effect of the invention more obvious, example is to technical side of the invention with reference to the accompanying drawing Case illustrates, all features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutual Other than the feature and/or step of repulsion, it can combine in any way.
The natural growth mechanism of plant growth simulation algorithm is used to construct in heterogeneous hierarchical topology fragment, simulation used Plant growth algorithm belongs to a kind of optimization random algorithm, this algorithm have several key points respectively and be the morphactin of growing tips of the plant, The phototropism and growing point of plant stop growing criterion etc.;The present invention utilizes plant growth simulation algorithm building heterogeneous hierarchical topology Fragment, improves the random topologies of each node of network, dynamically ensure that the stability of each node of network, specific building step It is rapid as follows:
S1, initialization local network node
(1) it selects and has configured corresponding local network node as original plant growing point;
(2) local network node reads in the parameters such as network performance, the memory space needed;
(3) number, that is, network node number of growing point required for constructing, the address ip of network node, topological fragment piece Number, topological fragment cut the parameters such as ratio value and set of random numbers and import in local network;
The data that S2, input block chain encapsulate are recorded in local network;
S3, local network node create task according to topological fragment demand, as the original plant growing point direction of growth;
(1) topological fragment is divided into two layers by local network node;
There are three different weight tasks altogether for (2) two etale topology fragments, the major network for being not less than 51% weight including accounting for total node The network node that network node growth task, the public chain piece network node growth task weight of piece are 49% grows task and in public affairs Path node between chain piece and major network piece and no more than major network piece weight 26% grows task;
S4, local network node select one of direction in three directions of growth to be grown;
S5, objective function and history optimal network node is calculated
(1) the network node parameter grown as needed, the objective function f of node comprehensive performance superposition, formula is as follows,
F=is superimposed (network performance, free memory, network line duration, ttl value etc.)
In the formula, " superposition " expression stacks up multiple performances of node;For the integrated performance index of node, node Each performance just like the network performance of node, the free memory of node, the network line duration of node, node ttl value Deng, the function can self-defining, weight is such as accompanied by according to the importance of each joint behavior, to node performance give a mark multiplied by All properties data are added obtain comprehensive performance score again by weight shared by the performance.
(2) global optimum's network node and global minima network node, global optimum's network section are determined according to objective function It puts and global minima network node is i.e. two minimum and maximum nodes of functional value, and general from being calculated by objective function f The two networks are put into growth point set;
S6, objective function filter out most suboptimum network node
(1) network node that can be grown is added to S5 step is obtained grows in node set;
(2) objective function calculates separately out the functional value that can grow network node in network node;
(3) functional value of previous step is ranked up, screening obtain most suboptimum network node as target growth point, it is worst Excellent network node is the network node that functional value is only smaller than global optimum's network node functional value;
S7, the growing points grown all before are counted, judges whether the weight for reaching current task, if reaching, Terminate current task, S4 is jumped to if not up to and continues iteration generation target growth point, the weight until reaching current task;
S8, local network can send the order for judging whether to complete to three different weight tasks, terminate to give birth to if completing It is long, S4 is jumped to if not completing to be continued to grow.
The topological structure of network node is all different in all major network pieces grown in the above method, this is also that simulation is planted The growth characteristic of object growth algorithm.
Three different weight tasks, respective function are as follows: account for network of total node not less than the major network piece of 51% weight Node is mainly responsible for storing data, and the network node for accounting for public chain piece of total node no more than 49% is mainly responsible for record particular encryption Encrypted 256 hash values of method (such as MD5), the road between public chain piece and major network piece and no more than major network piece weight 26% Diameter node is mainly responsible for data transmission, at the same make in whole network so public chain piece be it is disclosed, major network piece is concealment, is added Upper each network node of major network piece is different, and greatly reduces the probability that data are illegally distorted.
This method further includes a judgment mechanism, i.e., local network node can store in major network piece network node and complete data Judgement order is sent to the all-network node of major network piece afterwards, carries out data transmission integrality judgment mechanism.
Meanwhile further including a kind of dynamic growth mechanism, i.e., in the block chain and public chain piece node in major network piece node When block chain is read or extracts every time, if normally can be read or extract, normal online letter can be fed back to local network Number, if cannot be read, this node can feed back improper online signal to major network piece, and local network is receiving feedback After signal, the above-mentioned plant growth simulation algorithm new node that regrows can be re-used immediately and carries out completion, to protect The integrality and Information Security for demonstrate,proving node, to reach dynamic characteristic proposed by the present invention.
When major network piece and public chain piece carry out data transmission, it can repeatedly pass through some nodes, the very high point of these coincidence factors It is that path node to prevent the data on block chain from illegally being distorted, between public chain piece and major network piece undertakes no more than major network piece 26% weight of weight beta, thus the path node of this 26% weight can storing data and hash value, and play one layer of safety Machining function.
Public chain piece only accounts for 49% weight of the whole network, rather than has accounted for 100% as digital cash application, reaches raising effect Rate effect, major network piece account for 51% weight of the whole network, and each node stores same data, has reached decentralization effect, simultaneously Between public chain piece and major network piece there are also 26% weight path node collective effect in solve safety problem, so the present invention for It is very big to solve the problems, such as that conventional digital currency plays the role of using long-standing " trilemma ", specific effect weight can Referring to following table 1:
Table 1
When the weighted of data record, the node number of distribution is not also identical, i.e., if block chain needs the number encapsulated It is important according to recording, then more nodes are distributed, otherwise, distribute default node number, such as 100 nodes.
To further facilitate explanation, as shown in figure 3, being illustrated by taking 100 node demands as an example to method of the invention It is as follows:
Step 1: the local network node for selecting Fig. 3 rightmost to mark first is as just according to the demand of 100 nodes Begin growth node;
Step 2: local network node is online;
Step 3: obtain Fig. 3 rightmost local network node parameter, as network performance, stand-by time, cpu performance, Memory space etc.:
Step 4: user is according to its data weighting difference, i.e. data importance is different, and selection needs to be used to record data Interstitial content (default is 100), network performance (network speed that default is not less than existing national regulation), memory space are (silent Recognize not less than the record size after block chain encapsulated user data) etc. parameters used if these parameters user does not have customized Default parameters;
Step 5: local network node is broadcast to the whole network publication formula of flooding is ready to provide 100 networks for calculating power service Node obtains the network node for meeting the Parameter Conditions of user's needs;
Step 6: this 100 network nodes after the signal for receiving local network publication, are returned to local network node The address ip and various call parameters such as network performance, stand-by time, cpu performance, memory space, are currently located service type, machine Device type etc.;
Step 7: the parameter that 100 nodes return is imported into local network node;
Step 8: the parameter that local network is returned according to the data of user's selection and 100 network nodes, demand is appointed Business is divided into three directions of growth: public chain piece network node≤100*49%=49, major network piece network node >=100*51%= It is used to transmit the path node of data≤100*51%*26%=13.26 ≈ 14 between 51, public chain piece and major network piece;
Step 9: progress explanation in Fig. 3 step 8: be largely divided into two layers, for visualization description, the dotted line left side is first Layer major network piece, the right are that the second layer is public chain piece, this two layers is really overlying relation;
Step 10: local network node is carried out while being grown along upper layer and lower layer;
Step 11: this 100 nodes are all put into and can grow in node set, and selects and go through according to objective function f History optimal network node and minimal network node;
It calculates, obtains each step 12: using objective function these can be grown with the network node in collection of network From functional value;
Step 13: being ranked up to obtained functional value, most suboptimum network node is obtained as target growth node;
Step 14: utilizing corresponding 51%, 49%, 26% weight of three tasks, then to verify whether three tasks All growth is defeated completely, if growth is completed, is terminated to grow, if not having, is repeated above-mentioned growth step;
Step 15: the network node that local network can be sent to major network piece and public chain piece judge the life of integrality It enables, if having met its weight, stops growing, if continuing without if according to the tenth step to the 14th step continued growth, Know until meeting respective weight;
Step 16: the data that user provides can be carried out block encapsulation by local network after stopping growing, passing through spy After fixed decipherment algorithm encryption, 256 hash values can be obtained, are stored in the network node of public chain piece;
Step 17: being then transferred to the network of major network piece by the complete data of a part of network node of public chain piece In node, and each node deposits data once, achievees the purpose that decentralization;
Step 18: local network can to the all-network node of major network piece send verify data whether the life of full storage It enables, to guarantee the function of data full storage;
Step 19: the block chain in the block chain and public chain piece node in major network piece node is read or extracts every time When, if normally can be read or extract, normal online signal can be fed back to local network, if cannot be read, this Node can feed back improper online signal to major network piece, and local network can re-use immediately after receiving the signal of feedback The above-mentioned plant growth simulation algorithm new node that regrows carries out completion, to guarantee the integrality and data peace of node Quan Xing, to reach dynamic characteristic proposed by the present invention;
Step 20: simultaneously, in the method as proposed in the present invention, public chain piece only stores 256 hash values, in open State, and major network piece is dormant, when there is network illegal invasion, can only invade public chain piece first, even if the 49 of public chain piece After a node has been invaded, discovery can not still modify data, because the content of modification does not reach 50 or more of the whole network, need The node for modifying major network piece, when having modified in major network piece present node, present node can be sent out to local network simultaneously Abnormal signal out when local network detects the network node abnormality of major network piece, can regrow into again one not using algorithm The node of homeomorphism structure, so the node of previous modification has been replaced with one newly when next node is modified Node, can not be modified so as to cause nodes data, reach very high security performance.
So public affairs chain piece proposed according to the present invention only accounts for 49% weight of the whole network, rather than as digital cash application 100% has been accounted for, the effect of improving efficiency is reached, major network piece accounts for 51% weight of the whole network, and each node stores same data, reaches Decentralization effect is arrived, while the path node collective effect between public chain piece and major network piece there are also 26% weight is in solution Safety problem, so the present invention can effectively solve the problems, such as conventional digital currency using long-standing " trilemma ".

Claims (5)

1. a kind of block chained record method based on heterogeneous hierarchical dynamic topology fragment, which is characterized in that this method be by Heterogeneous hierarchical dynamic is constructed using the data record that plant growth simulation algorithm (PGSA) is block chain each time in local network Topological fragment;The constructed double-deck isomery dynamic topology fragment is made of public chain piece and major network piece two parts, and public chain piece is held Load is not more than the record weight α of node total number 49%, and major network piece undertakes the record weight beta not less than node total number 51%;Major network Node in piece is used to distributed storage data, and the node in public chain piece is for recording 256 hash values after particular encryption;This Outside, the path node between major network piece and the record node of public chain piece accounts for 26% no more than major network piece number of nodes.
2. the block chained record method according to claim 1 based on heterogeneous hierarchical dynamic topology fragment, which is characterized in that The building heterogeneous hierarchical dynamic topology fragment, specific construction step are as follows:
S1, initialization local network node
(1) it selects and has configured corresponding local network node as original plant growing point;
(2) local network node reads in the parameters such as network performance, the memory space needed;
(3) number, that is, network node number of growing point required for constructing, the address ip of network node, topological fragment the piece number, Topological fragment cuts the parameters such as ratio value and set of random numbers and imports in local network;
The data that S2, input block chain encapsulate are recorded in local network;
S3, local network node create task according to topological fragment demand, as the original plant growing point direction of growth;
(1) topological fragment is divided into two layers by local network node;
(2) two etale topology fragments are altogether there are three different weight tasks, including accounting for major network piece of total node not less than 51% weight The network node that network node grows task, public chain piece network node growth task weight is 49% grows task and in public chain piece Path node between major network piece and no more than major network piece weight 26% grows task;
S4, local network node carry out simultaneously in growth above three task, each direction in three directions of growth It is grown in the following manner;
S5, objective function and history optimal network node is calculated
(1) the network node parameter grown as needed obtains the objective function f of egress comprehensive performance superposition, and formula is as follows,
F=is superimposed (network performance, free memory, network line duration, ttl value etc.)
In the formula, " superposition " expression stacks up multiple performances of node, i.e. the integrated performance index of node;
(2) global optimum's network node and global minima network node are determined according to objective function, global optimum's network node and Global minima network node is being calculated by objective function f, i.e. two minimum and maximum nodes of functional value, and by this two A network node, which is put into, to be grown in node set;
S6, objective function filter out most suboptimum network node
(1) network node that can be grown is added to S5 step is obtained to be grown in node set;
(2) objective function calculates separately out the functional value that can grow all-network node in node set;
(3) functional value of previous step is ranked up, screening obtains most suboptimum network node as target growth point, most suboptimum net Network node is the network node that objective function f function value is only smaller than global optimum's network node functional value;
S7, the growing points grown all before are counted, judges whether the weight for reaching current task, if reaching, terminates Current task jumps to step S4 if not up to and continues iteration generation target growth point, the weight until reaching current task;
S8, local network send the order for judging whether to complete to three different weight tasks, terminate to grow if completing, if not having There is completion then to jump to step S4 to continue to grow.
3. the block chained record method according to claim 1 based on heterogeneous hierarchical dynamic topology fragment, which is characterized in that This method further includes a judgment mechanism, i.e., local network node can be after major network piece network node stores completion data to major network The all-network node transmission of piece judge integrality order, major network piece node understand after receiving order by the size of data of transmission, The content feeds such as state data memory, storage location to local network node, local network node can by the content fed back to Transmit before data content compare, check whether it is identical, thus complete integrality judgement.
4. the block chained record method according to claim 1 based on heterogeneous hierarchical dynamic topology fragment, which is characterized in that This method further includes a kind of dynamic growth mechanism, i.e., the block chain in the block chain and public chain piece node in major network piece node is every It is secondary when being read or extracting, if normally can be read or extract, normal online signal can be fed back to local network, if not It can be read, then this node can feed back improper online signal to major network piece, and local network is after receiving the signal of feedback, meeting Re-use the plant growth simulation algorithm new node that regrows immediately and carry out completion, with guarantee node integrality and Information Security.
5. the block chained record method according to claim 1 based on heterogeneous hierarchical dynamic topology fragment, which is characterized in that The particular encryption refers to MD5, SHA-256 or HMAC etc..
CN201811052005.3A 2018-09-10 2018-09-10 Block chain recording method based on hierarchical heterogeneous dynamic topological fragments Active CN109040305B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811052005.3A CN109040305B (en) 2018-09-10 2018-09-10 Block chain recording method based on hierarchical heterogeneous dynamic topological fragments

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811052005.3A CN109040305B (en) 2018-09-10 2018-09-10 Block chain recording method based on hierarchical heterogeneous dynamic topological fragments

Publications (2)

Publication Number Publication Date
CN109040305A true CN109040305A (en) 2018-12-18
CN109040305B CN109040305B (en) 2021-06-04

Family

ID=64621117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811052005.3A Active CN109040305B (en) 2018-09-10 2018-09-10 Block chain recording method based on hierarchical heterogeneous dynamic topological fragments

Country Status (1)

Country Link
CN (1) CN109040305B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112001730A (en) * 2020-08-25 2020-11-27 徐鹏飞 Data security detection method based on block chain and digital currency and cloud computing center
CN112528276A (en) * 2020-11-23 2021-03-19 中国联合网络通信集团有限公司 Block chain-based distributed storage tamper-proof method and system
CN112565448A (en) * 2020-12-16 2021-03-26 宁波云麟信息科技有限公司 Block chain-based electronic evidence storage node selection method and electronic equipment
CN114356937A (en) * 2022-01-09 2022-04-15 广州聚高信息科技有限公司 Financial information management system based on block chain and big data
CN115174565A (en) * 2022-05-18 2022-10-11 国网河南省电力公司信息通信公司 Consensus method and device based on block chain fragmentation technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821605A (en) * 2015-04-13 2015-08-05 国家电网公司 Active safety correction method based on improved particle swarm optimization algorithm
US20170076286A1 (en) * 2015-09-11 2017-03-16 Bank Of America Corporation Controlling access to data
CN107591841A (en) * 2017-09-26 2018-01-16 清华大学 Power network Evolution Simulation method under being accessed on a large scale suitable for new energy
CN108323232A (en) * 2017-05-16 2018-07-24 北京大学深圳研究生院 The maintaining method of index and chain topological structure between a kind of multi-layer block catenary system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821605A (en) * 2015-04-13 2015-08-05 国家电网公司 Active safety correction method based on improved particle swarm optimization algorithm
US20170076286A1 (en) * 2015-09-11 2017-03-16 Bank Of America Corporation Controlling access to data
CN108323232A (en) * 2017-05-16 2018-07-24 北京大学深圳研究生院 The maintaining method of index and chain topological structure between a kind of multi-layer block catenary system
CN107591841A (en) * 2017-09-26 2018-01-16 清华大学 Power network Evolution Simulation method under being accessed on a large scale suitable for new energy

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
武勇,李斌: "区块链安全技术体系研究", 《信息安全与通信保密》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112001730A (en) * 2020-08-25 2020-11-27 徐鹏飞 Data security detection method based on block chain and digital currency and cloud computing center
CN112001730B (en) * 2020-08-25 2021-10-22 徐鹏飞 Data security detection method based on block chain and digital currency and cloud computing center
CN112528276A (en) * 2020-11-23 2021-03-19 中国联合网络通信集团有限公司 Block chain-based distributed storage tamper-proof method and system
CN112528276B (en) * 2020-11-23 2023-06-09 中国联合网络通信集团有限公司 Distributed storage tamper-proof method and system based on block chain
CN112565448A (en) * 2020-12-16 2021-03-26 宁波云麟信息科技有限公司 Block chain-based electronic evidence storage node selection method and electronic equipment
CN114356937A (en) * 2022-01-09 2022-04-15 广州聚高信息科技有限公司 Financial information management system based on block chain and big data
CN115174565A (en) * 2022-05-18 2022-10-11 国网河南省电力公司信息通信公司 Consensus method and device based on block chain fragmentation technology
CN115174565B (en) * 2022-05-18 2023-08-15 国网河南省电力公司信息通信公司 Consensus method and device based on block chain slicing technology

Also Published As

Publication number Publication date
CN109040305B (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN109040305A (en) Block chained record method based on heterogeneous hierarchical dynamic topology fragment
CN108985089B (en) Internet data sharing system
Jogenfors Quantum bitcoin: an anonymous, distributed, and secure currency secured by the no-cloning theorem of quantum mechanics
CN103116720B (en) A kind of USB Key device and account management thereof and checking using method
CN108389047A (en) The method and block chain network of fundamental chain and subchain transaction in block chain
CN107688944A (en) A kind of power system method of commerce based on block chain
CN109583885A (en) Bout controls rewritable block chain
CN108681966A (en) A kind of information monitoring method and device based on block chain
CN109165190A (en) A kind of electronic data based on block chain intelligence contract deposits card method
CN109635165A (en) Data summarization method, device, equipment and medium based on tree-like block chain network
CN109101572A (en) Card method, apparatus and server, storage medium are deposited based on block chain
CN106528775A (en) Private block chain operation support system that supports logical multi-chain, and working method thereof
CN108494581A (en) The controller distributed information log generation method and device of SDN network
CN109241087A (en) A kind of data processing method and terminal of alliance's chain
CN109985389A (en) Cards game anti-cheating method and its system based on block chain intelligence contract
CN107819753A (en) Not exclusively anonymous block chain transaction system and method
CN108462785A (en) A kind of processing method and processing device of malicious call phone
CN111353172B (en) Hadoop cluster big data access method and system based on block chain
CN110414270A (en) A kind of personal data protection system and method based on block chain
CN109428892A (en) Multistage rewritable block chain
CN110413652A (en) A kind of big data privacy search method based on edge calculations
CN110324358A (en) Video data manages authentication method, module, equipment and platform
CN111489143A (en) Auditable encrypted digital currency supervision method based on alliance side chain
Hu et al. Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric
CN111597167A (en) Big data management system and method applying block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230707

Address after: No. A910, Building A, Three Gorges Mall, No. 52 Jiefang Road, Xiling District, Yichang City, Hubei Province, 443099

Patentee after: Hubei Yuancun Technology Co.,Ltd.

Address before: Room 205, block C, National Science and Technology Park, Zhejiang University, No. 525, Xixi Road, Xihu District, Hangzhou City, Zhejiang Province, 310012

Patentee before: ZHEJIANG TIANMAI FIELD TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right