CN109101830A - Real time data safety protecting method and system based on block chain - Google Patents
Real time data safety protecting method and system based on block chain Download PDFInfo
- Publication number
- CN109101830A CN109101830A CN201811018376.XA CN201811018376A CN109101830A CN 109101830 A CN109101830 A CN 109101830A CN 201811018376 A CN201811018376 A CN 201811018376A CN 109101830 A CN109101830 A CN 109101830A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- memory node
- real time
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of real time data safety protecting methods and system based on block chain, method includes the following steps: S1, data reception node receive data information;S2, data are encrypted using data desensitization technology;S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types;S5, data storage secret code key is generated.The invention also discloses a kind of real time data security protection systems based on block chain, including data reception module, data memory module, block chain memory module and data processing module.Real time data safety protecting method and system based on block chain of the invention, it is stored by segmented data and is stored in different types of memory node for what data information was distributed, and be encrypted by storage information of the block chain technology to data information, there is high safety.
Description
Technical field
The present invention relates to block chain technical field of memory, specifically a kind of real time data security protection side based on block chain
Method and system.
Background technique
Data be stored in Internet era occupy and its consequence, it is more next with the arrival of big data era
More data informations is derivative and goes out.In data storage technology, the disadvantage of hardware store is increasingly highlighted, and hardware store is deposited
Storage capacity makes what its drawback showed to be more and more obvious.And the technical application of cloud storage also has the disadvantage carried out by server
End, a large amount of servers bring huge disappear using the containment and resource use that will carry out to the development of Internet technology gradually
Consumption.
The advantage that block chain technology stores data is decentralization, uses internet terminal as memory node, builds
The shared storage mode of decentralization has been found, the distributed storage of data source solves the drawbacks of hardware store and cloud storage,
Solve the problems, such as that lack of memory capacity, Information Security be not high for data storage.
Prior art CN107193490A provides a kind of distributed data-storage system and method based on block chain, should
Method, which includes: data inputting module, calculates data content to data memory module logging data content, and using hash algorithm
It takes passages, there are on block chain;Data memory module receives data content, and transfers corresponding extracts, storage and extracts one
The data content of cause;When carrying out data query, data memory module lookup storage is queried data content, and transfers and the number
According to the corresponding extracts of content, returned and corresponding extracts is consistent is queried data content to query node.The technology is a little
Distributed storage is carried out to data by block chain technology, reliable management and the safety for realizing information are shared, and pass through extracts
Data preparation is carried out, the efficiency of data storage is improved.But the technology is calculated in data storage procedure by hash algorithm
Obtained data extract, and storing data is taken passages, and has carried out encryption to data information to a certain extent, conceals specific
Data content, but the premise to develop in advance in the network information, cipher mode is excessively single, and Information Security is not high.
Summary of the invention
The purpose of the present invention is to provide a kind of real time data safety protecting methods and system based on block chain, to solve
There are data encryption mode lists for the existing data safety guard technology based on block chain technology mentioned above in the background art
The not high problem of Information Security caused by one.
To achieve the above object, the invention provides the following technical scheme:
A kind of real time data safety protecting method based on block chain, method includes the following steps:
S1, data reception node receive data information;
S2, data are encrypted using data desensitization technology;
S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;
S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types;
S5, data storage secret code key is generated.
Preferably, the S2 is encrypted data to specifically include and calculate using including Hash using data desensitization technology
Data information is encrypted in the computational algorithm of method.
Preferably, the S3 is segmented encrypted data according to timestamp and data type by block chain technology
Formula processing specifically includes:
S31, the timestamp for extracting data information;
S32, the data type for obtaining data information;
S33, segmented processing is carried out to data according to data type;
S34, the striping order for generating and recording each segment data.
Preferably, the S5 generates data storage secret code key and specifically includes:
S51, data sectional type, the sequence of timestamp and segment data are read;
S52, according to the sequence of segment data to each memory node carry out sequence arrangement;
S53, the data memory node dendrogram for sequentially generating data information, and secret is generated according to dendrogram and timestamp
Code key.
More preferably, the S52 specifically includes each memory node progress sequence arrangement according to the sequence of segment data:
S521, primary storage node of the corresponding data memory node of segment data as the data information at first is chosen;
S522, memory node successively arranged according to striping order and memory node;
S523, when striping order grade is identical, by memory node arranged in parallel.
The invention also discloses a kind of real time data security protection systems based on block chain, comprising:
Data reception module, for receiving data information;
Data memory module, for storing the data slot of variant type;
Block chain memory module, for carrying out encryption and segment processing to the received data information of data reception module;
Data processing module, the segmented data for carrying out to block chain memory module carry out the generation of secret code key, and
It is that data are inquired and read by the segment stored in secret secret key pair data memory module.
Preferably, the data reception module includes several data reception nodes, establishes equity between data reception node
Connection, mutually opposite operation information carries out the disclosure of legitimate verification and stores the opening of information.
Preferably, the data memory module includes several data memory nodes, establishes equity between data memory node
Connection, is disclosed and is opened to data information with each other, and each data memory node corresponds to a kind of Stored Data Type and deposits
The data slot of the type is stored up to complete the section type storage of data information.
Preferably, the block chain memory module includes several block chain storage units, which is used for
Data information is encrypted according to hash algorithm, is segmented according to data information type, and record segment data
Sequentially.
Preferably, the data processing module includes several data processing units and query unit, the data processing unit
The sequence of data sectional type, timestamp and segment data for recording to block chain memory module is combined processing, and
According to the sequence of segment data to each memory node carry out sequence arrangement, the corresponding data memory node of segment data at first is chosen
Memory node, striping order are arranged according to striping order and memory node as the primary storage node of the data information, and successively
When grade is identical, by memory node arranged in parallel, the data memory node dendrogram of data information is sequentially generated, and according to tree-shaped
Figure and timestamp generate secret code key, and query unit is used to match memory node dendrogram according to secret code key and inquires and read
Data information.
Compared with prior art, the beneficial effects of the present invention are:
1) present invention carries out segmented processing to data information according to data extract type by hash algorithm, and by data
It is stored in matched type memory node, realizes data information distributed storage and specifies data memory node, to rear
Phase reading data has specific directive property, improves data access efficiency;
It is 2) of the invention by carrying out the generation of secret code key according to timestamp, segmented sequence and segmented type to data,
It improves the complexity of code key, and the code key generated by tree-shaped schema, the step of complicated code key cracks, improves data
Safety.
Detailed description of the invention
Fig. 1 is that the present invention is based on the flow charts of the real time data safety protecting method of block chain;
Fig. 2 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S2 of block chain;
Fig. 3 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S3 of block chain;
Fig. 4 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S5 of block chain;
Fig. 5 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S52 of block chain;
Fig. 6 is that the present invention is based on the structural schematic diagrams of the real time data security protection system of block chain;
Fig. 7 is to be formed to illustrate the present invention is based on the tree-shaped code key of the real time data safety protecting method of block chain and system
Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of real time data safety protecting method based on block chain, method includes the following steps:
S1, data reception node receive data information.
S2, data are encrypted using data desensitization technology;As shown in Fig. 2, it is specifically included using including breathing out
Data information is encrypted in the computational algorithm of uncommon algorithm.
S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;Such as
Shown in Fig. 3, the specific steps of which are as follows:
S31, the timestamp for extracting data information;
S32, the data type for obtaining data information;
S33, segmented processing is carried out to data according to data type;
S34, the striping order for generating and recording each segment data.
S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types.
S5, data storage secret code key is generated;As shown in figure 4, the specific steps of which are as follows:
S51, data sectional type, the sequence of timestamp and segment data are read;
S52, according to the sequence of segment data to each memory node carry out sequence arrangement;As shown in figure 5, it is specifically included:
S521, primary storage node of the corresponding data memory node of segment data as the data information at first is chosen;
S522, memory node successively arranged according to striping order and memory node;
S523, when striping order grade is identical, by memory node arranged in parallel.
S53, the data memory node dendrogram for sequentially generating data information, and secret is generated according to dendrogram and timestamp
Code key.
A kind of real time data security protection system based on block chain as shown in FIG. 6, comprising:
Data reception module, for receiving data information;
Data memory module, for storing the data slot of variant type;
Block chain memory module, for carrying out encryption and segment processing to the received data information of data reception module;
Data processing module, the segmented data for carrying out to block chain memory module carry out the generation of secret code key, and
It is that data are inquired and read by the segment stored in secret secret key pair data memory module.
Data reception module includes several data reception nodes, establishes peer to peer connection between data reception node, mutually opposite
Operation information carries out the disclosure of legitimate verification and stores the opening of information.
Data memory module includes several data memory nodes, peer to peer connection is established between data memory node, with each other
Data information is disclosed and is opened, each data memory node corresponds to a kind of Stored Data Type and stores the number of the type
The section type storage of data information is completed according to segment.
Block chain memory module includes several block chain storage units, which is used for according to hash algorithm
Data information is encrypted, is segmented according to data information type, and records the sequence of segment data.
Data processing module includes several data processing units and query unit, which is used for block chain
The sequence of data sectional type, timestamp and segment data that memory module records is combined processing, and according to segment data
Sequence to each memory node carry out sequence arrangement, choose the corresponding data memory node of segment data at first and believe as the data
The primary storage node of breath, and memory node is successively arranged according to striping order and memory node, it, will when striping order grade is identical
Memory node arranged in parallel sequentially generates the data memory node dendrogram of data information, and raw according to dendrogram and timestamp
At secret code key, query unit is used to match memory node dendrogram according to secret code key and inquires and read data information.
As shown in Figure 7, wherein n is positive integer.The segment 1 of striping order first is stored in memory node 1, is segmented suitable
The segment 2 of sequence second is stored in memory node 2, and the segment 3 of striping order third is stored in memory node 3, is segmented side by side
The segment 4 of sequence third is stored in storage 4, wherein memory node 3 and memory node 4 are located at the same layer of dendrogram
Grade ... is until composition is complete tree-shaped after the data information is fully deployed according to data sectional type, timestamp and striping order
Figure.Secret code key is generated by the dendrogram, by combining memory node type feature, timestamp and the striping order transferred
Form code key.The code key is individually corresponding for each different data information institute, and there are high Information Securities, pacify to data
Full protection has fabulous safeguard measure.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (10)
1. a kind of real time data safety protecting method based on block chain, which is characterized in that method includes the following steps:
S1, data reception node receive data information;
S2, data are encrypted using data desensitization technology;
S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;
S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types;
S5, data storage secret code key is generated.
2. a kind of real time data safety protecting method based on block chain according to claim 1, which is characterized in that described
S2 is encrypted data using data desensitization technology and specifically includes using the computational algorithm including hash algorithm to data
Information is encrypted.
3. a kind of real time data safety protecting method based on block chain according to claim 1, which is characterized in that described
S3 carries out segmented processing according to timestamp and data type to encrypted data by block chain technology and specifically includes:
S31, the timestamp for extracting data information;
S32, the data type for obtaining data information;
S33, segmented processing is carried out to data according to data type;
S34, the striping order for generating and recording each segment data.
4. a kind of real time data safety protecting method based on block chain according to claim 1, which is characterized in that described
S5 generates data storage secret code key and specifically includes:
S51, data sectional type, the sequence of timestamp and segment data are read;
S52, according to the sequence of segment data to each memory node carry out sequence arrangement;
S53, the data memory node dendrogram for sequentially generating data information, and it is secret according to dendrogram and timestamp generation secret
Key.
5. a kind of real time data safety protecting method based on block chain according to claim 4, which is characterized in that described
S52 specifically includes each memory node progress sequence arrangement according to the sequence of segment data:
S521, primary storage node of the corresponding data memory node of segment data as the data information at first is chosen;
S522, memory node successively arranged according to striping order and memory node;
S523, when striping order grade is identical, by memory node arranged in parallel.
6. a kind of real time data security protection system based on block chain characterized by comprising
Data reception module, for receiving data information;
Data memory module, for storing the data slot of variant type;
Block chain memory module, for carrying out encryption and segment processing to the received data information of data reception module;
Data processing module, the segmented data for carrying out to block chain memory module carries out the generation of secret code key, and passes through
The segment stored in secret secret key pair data memory module is that data are inquired and read.
7. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that described
Data reception module includes several data reception nodes, establishes peer to peer connection between data reception node, mutually opposite operation information
It carries out the disclosure of legitimate verification and stores the opening of information.
8. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that described
Data memory module includes several data memory nodes, and peer to peer connection is established between data memory node, with each other logarithm it is believed that
Breath is disclosed and is opened, each data memory node correspond to a kind of Stored Data Type and store the data slot of the type with
Complete the section type storage of data information.
9. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that described
Block chain memory module includes several block chain storage units, the block chain storage unit be used for according to hash algorithm logarithm it is believed that
Breath is encrypted, and is segmented according to data information type, and records the sequence of segment data.
10. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that institute
Stating data processing module includes several data processing units and query unit, which is used to store mould to block chain
The sequence of data sectional type, timestamp and segment data that block records is combined processing, and according to the sequence of segment data
To each memory node carry out sequence arrangement, master of the corresponding data memory node of segment data as the data information at first is chosen
Memory node, and memory node is successively arranged according to striping order and memory node, when striping order grade is identical, storage is saved
Point arranged in parallel sequentially generates the data memory node dendrogram of data information, and generates secret according to dendrogram and timestamp
Code key, query unit are used to match memory node dendrogram according to secret code key and inquire and read data information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811018376.XA CN109101830A (en) | 2018-09-03 | 2018-09-03 | Real time data safety protecting method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811018376.XA CN109101830A (en) | 2018-09-03 | 2018-09-03 | Real time data safety protecting method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109101830A true CN109101830A (en) | 2018-12-28 |
Family
ID=64864816
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811018376.XA Pending CN109101830A (en) | 2018-09-03 | 2018-09-03 | Real time data safety protecting method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109101830A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492432A (en) * | 2018-11-08 | 2019-03-19 | 安徽太阳石科技有限公司 | Real time data safety protecting method and system based on block chain |
CN109886040A (en) * | 2019-01-24 | 2019-06-14 | 北京融链科技有限公司 | Data processing method, device, storage medium and processor |
CN110084059A (en) * | 2019-03-21 | 2019-08-02 | 深圳壹账通智能科技有限公司 | A kind of method, apparatus and computer equipment of banking system data configuration block chain |
CN110086607A (en) * | 2019-03-13 | 2019-08-02 | 深圳壹账通智能科技有限公司 | It is switched fast method, apparatus, computer equipment and the storage medium of deployment key |
CN110209532A (en) * | 2019-06-03 | 2019-09-06 | 高田 | A kind of block chain big data security processing system and method |
CN110224817A (en) * | 2019-05-29 | 2019-09-10 | 中国人民大学 | A kind of software popularization intelligent service system and method based on block chain technology |
CN110245190A (en) * | 2019-06-11 | 2019-09-17 | 南京荣链科技有限公司 | A kind of block data fragmented storage method, terminal and medium |
CN111131465A (en) * | 2019-12-26 | 2020-05-08 | 深圳创客区块链技术有限公司 | Block chain-based Internet of things data processing method and device and server |
CN111259425A (en) * | 2020-01-16 | 2020-06-09 | 广东京信软件科技有限公司 | Smart city data safety management system |
CN111538786A (en) * | 2020-04-24 | 2020-08-14 | 上海简苏网络科技有限公司 | Block chain data desensitization and tracing storage method and device |
CN113010920A (en) * | 2021-04-01 | 2021-06-22 | 浙江永旗区块链科技有限公司 | Block chain data safety protection system and protection method thereof |
CN113282908A (en) * | 2020-02-19 | 2021-08-20 | 网联科技股份有限公司 | Validity verification method |
CN113360501A (en) * | 2021-06-04 | 2021-09-07 | 永旗(北京)科技有限公司 | Block chain-based distributed data storage method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182525A (en) * | 2014-08-27 | 2014-12-03 | 李岩 | Electronic record management device applying multimedia files with copyright protection function and applying state encryption algorithm |
CN105117402A (en) * | 2015-07-16 | 2015-12-02 | 中国人民大学 | Log data fragmentation method based on segment order-preserving Hash and log data fragmentation device based on segment order-preserving Hash |
US20160142204A1 (en) * | 2014-11-13 | 2016-05-19 | Teascom UK Ltd | System and method for generating a cryptographic key |
CN107171791A (en) * | 2017-05-24 | 2017-09-15 | 舒翔 | A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic |
-
2018
- 2018-09-03 CN CN201811018376.XA patent/CN109101830A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182525A (en) * | 2014-08-27 | 2014-12-03 | 李岩 | Electronic record management device applying multimedia files with copyright protection function and applying state encryption algorithm |
US20160142204A1 (en) * | 2014-11-13 | 2016-05-19 | Teascom UK Ltd | System and method for generating a cryptographic key |
CN105117402A (en) * | 2015-07-16 | 2015-12-02 | 中国人民大学 | Log data fragmentation method based on segment order-preserving Hash and log data fragmentation device based on segment order-preserving Hash |
CN107171791A (en) * | 2017-05-24 | 2017-09-15 | 舒翔 | A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492432A (en) * | 2018-11-08 | 2019-03-19 | 安徽太阳石科技有限公司 | Real time data safety protecting method and system based on block chain |
CN109886040B (en) * | 2019-01-24 | 2021-06-22 | 北京融链科技有限公司 | Data processing method, data processing device, storage medium and processor |
CN109886040A (en) * | 2019-01-24 | 2019-06-14 | 北京融链科技有限公司 | Data processing method, device, storage medium and processor |
CN110086607A (en) * | 2019-03-13 | 2019-08-02 | 深圳壹账通智能科技有限公司 | It is switched fast method, apparatus, computer equipment and the storage medium of deployment key |
CN110084059A (en) * | 2019-03-21 | 2019-08-02 | 深圳壹账通智能科技有限公司 | A kind of method, apparatus and computer equipment of banking system data configuration block chain |
CN110224817A (en) * | 2019-05-29 | 2019-09-10 | 中国人民大学 | A kind of software popularization intelligent service system and method based on block chain technology |
CN110209532A (en) * | 2019-06-03 | 2019-09-06 | 高田 | A kind of block chain big data security processing system and method |
CN110245190A (en) * | 2019-06-11 | 2019-09-17 | 南京荣链科技有限公司 | A kind of block data fragmented storage method, terminal and medium |
CN111131465A (en) * | 2019-12-26 | 2020-05-08 | 深圳创客区块链技术有限公司 | Block chain-based Internet of things data processing method and device and server |
CN111131465B (en) * | 2019-12-26 | 2023-01-13 | 深圳创客区块链技术有限公司 | Internet of things data processing method and device based on block chain and server |
CN111259425A (en) * | 2020-01-16 | 2020-06-09 | 广东京信软件科技有限公司 | Smart city data safety management system |
CN113282908A (en) * | 2020-02-19 | 2021-08-20 | 网联科技股份有限公司 | Validity verification method |
CN111538786A (en) * | 2020-04-24 | 2020-08-14 | 上海简苏网络科技有限公司 | Block chain data desensitization and tracing storage method and device |
CN113010920A (en) * | 2021-04-01 | 2021-06-22 | 浙江永旗区块链科技有限公司 | Block chain data safety protection system and protection method thereof |
CN113010920B (en) * | 2021-04-01 | 2022-07-12 | 浙江永旗区块链科技有限公司 | Block chain data safety protection system and protection method thereof |
CN113360501A (en) * | 2021-06-04 | 2021-09-07 | 永旗(北京)科技有限公司 | Block chain-based distributed data storage method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109101830A (en) | Real time data safety protecting method and system based on block chain | |
CN109492432A (en) | Real time data safety protecting method and system based on block chain | |
Jiang et al. | Catchsync: catching synchronized behavior in large directed graphs | |
CN107196934A (en) | A kind of cloud data managing method based on block chain | |
CN106203146B (en) | Big data safety management system | |
CN113326317A (en) | Block chain evidence storing method and system based on isomorphic multi-chain architecture | |
CN109711836A (en) | A kind of storage method of transaction, storage network and electronic equipment | |
CN107171812A (en) | It is a kind of based on block chain without key signature infrastructure construction method | |
CN110413652B (en) | Big data privacy retrieval method based on edge calculation | |
CN108039943A (en) | A kind of encryption searching method that can verify that | |
CN110750541B (en) | Block chain-based data storage indexing system and method | |
CN108805710A (en) | A kind of distribution type electric energy method of commerce based on block chain intelligence contract technology | |
CN109117096A (en) | Distributed data storage method and system based on block chain | |
CN112738035B (en) | Block chain technology-based vertical federal model stealing defense method | |
Pandey et al. | VoteChain: A Blockchain based e-voting system | |
CN109639436A (en) | The data property held verification method and terminal device based on salt figure | |
CN112732695A (en) | Cloud storage data security deduplication method based on block chain | |
CN113360501A (en) | Block chain-based distributed data storage method and system | |
CN112699123A (en) | Method and system for verifying existence and integrity of data in data storage system | |
US20220239465A1 (en) | Blockchain-based data management of distributed binary objects | |
CN114580011A (en) | Power facility security situation sensing method and system based on federal privacy training | |
CN111259425A (en) | Smart city data safety management system | |
Zhu et al. | A novel covert timing channel based on bitcoin messages | |
Gao et al. | Similarity-based deduplication and secure auditing in IoT decentralized storage | |
Ouyang et al. | Blockchain-assisted verifiable and secure remote sensing image retrieval in cloud environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181228 |
|
RJ01 | Rejection of invention patent application after publication |