CN109101830A - Real time data safety protecting method and system based on block chain - Google Patents

Real time data safety protecting method and system based on block chain Download PDF

Info

Publication number
CN109101830A
CN109101830A CN201811018376.XA CN201811018376A CN109101830A CN 109101830 A CN109101830 A CN 109101830A CN 201811018376 A CN201811018376 A CN 201811018376A CN 109101830 A CN109101830 A CN 109101830A
Authority
CN
China
Prior art keywords
data
block chain
memory node
real time
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811018376.XA
Other languages
Chinese (zh)
Inventor
杨屹
丁煦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Sunstone Technology Co Ltd
Original Assignee
Anhui Sunstone Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Sunstone Technology Co Ltd filed Critical Anhui Sunstone Technology Co Ltd
Priority to CN201811018376.XA priority Critical patent/CN109101830A/en
Publication of CN109101830A publication Critical patent/CN109101830A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of real time data safety protecting methods and system based on block chain, method includes the following steps: S1, data reception node receive data information;S2, data are encrypted using data desensitization technology;S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types;S5, data storage secret code key is generated.The invention also discloses a kind of real time data security protection systems based on block chain, including data reception module, data memory module, block chain memory module and data processing module.Real time data safety protecting method and system based on block chain of the invention, it is stored by segmented data and is stored in different types of memory node for what data information was distributed, and be encrypted by storage information of the block chain technology to data information, there is high safety.

Description

Real time data safety protecting method and system based on block chain
Technical field
The present invention relates to block chain technical field of memory, specifically a kind of real time data security protection side based on block chain Method and system.
Background technique
Data be stored in Internet era occupy and its consequence, it is more next with the arrival of big data era More data informations is derivative and goes out.In data storage technology, the disadvantage of hardware store is increasingly highlighted, and hardware store is deposited Storage capacity makes what its drawback showed to be more and more obvious.And the technical application of cloud storage also has the disadvantage carried out by server End, a large amount of servers bring huge disappear using the containment and resource use that will carry out to the development of Internet technology gradually Consumption.
The advantage that block chain technology stores data is decentralization, uses internet terminal as memory node, builds The shared storage mode of decentralization has been found, the distributed storage of data source solves the drawbacks of hardware store and cloud storage, Solve the problems, such as that lack of memory capacity, Information Security be not high for data storage.
Prior art CN107193490A provides a kind of distributed data-storage system and method based on block chain, should Method, which includes: data inputting module, calculates data content to data memory module logging data content, and using hash algorithm It takes passages, there are on block chain;Data memory module receives data content, and transfers corresponding extracts, storage and extracts one The data content of cause;When carrying out data query, data memory module lookup storage is queried data content, and transfers and the number According to the corresponding extracts of content, returned and corresponding extracts is consistent is queried data content to query node.The technology is a little Distributed storage is carried out to data by block chain technology, reliable management and the safety for realizing information are shared, and pass through extracts Data preparation is carried out, the efficiency of data storage is improved.But the technology is calculated in data storage procedure by hash algorithm Obtained data extract, and storing data is taken passages, and has carried out encryption to data information to a certain extent, conceals specific Data content, but the premise to develop in advance in the network information, cipher mode is excessively single, and Information Security is not high.
Summary of the invention
The purpose of the present invention is to provide a kind of real time data safety protecting methods and system based on block chain, to solve There are data encryption mode lists for the existing data safety guard technology based on block chain technology mentioned above in the background art The not high problem of Information Security caused by one.
To achieve the above object, the invention provides the following technical scheme:
A kind of real time data safety protecting method based on block chain, method includes the following steps:
S1, data reception node receive data information;
S2, data are encrypted using data desensitization technology;
S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;
S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types;
S5, data storage secret code key is generated.
Preferably, the S2 is encrypted data to specifically include and calculate using including Hash using data desensitization technology Data information is encrypted in the computational algorithm of method.
Preferably, the S3 is segmented encrypted data according to timestamp and data type by block chain technology Formula processing specifically includes:
S31, the timestamp for extracting data information;
S32, the data type for obtaining data information;
S33, segmented processing is carried out to data according to data type;
S34, the striping order for generating and recording each segment data.
Preferably, the S5 generates data storage secret code key and specifically includes:
S51, data sectional type, the sequence of timestamp and segment data are read;
S52, according to the sequence of segment data to each memory node carry out sequence arrangement;
S53, the data memory node dendrogram for sequentially generating data information, and secret is generated according to dendrogram and timestamp Code key.
More preferably, the S52 specifically includes each memory node progress sequence arrangement according to the sequence of segment data:
S521, primary storage node of the corresponding data memory node of segment data as the data information at first is chosen;
S522, memory node successively arranged according to striping order and memory node;
S523, when striping order grade is identical, by memory node arranged in parallel.
The invention also discloses a kind of real time data security protection systems based on block chain, comprising:
Data reception module, for receiving data information;
Data memory module, for storing the data slot of variant type;
Block chain memory module, for carrying out encryption and segment processing to the received data information of data reception module;
Data processing module, the segmented data for carrying out to block chain memory module carry out the generation of secret code key, and It is that data are inquired and read by the segment stored in secret secret key pair data memory module.
Preferably, the data reception module includes several data reception nodes, establishes equity between data reception node Connection, mutually opposite operation information carries out the disclosure of legitimate verification and stores the opening of information.
Preferably, the data memory module includes several data memory nodes, establishes equity between data memory node Connection, is disclosed and is opened to data information with each other, and each data memory node corresponds to a kind of Stored Data Type and deposits The data slot of the type is stored up to complete the section type storage of data information.
Preferably, the block chain memory module includes several block chain storage units, which is used for Data information is encrypted according to hash algorithm, is segmented according to data information type, and record segment data Sequentially.
Preferably, the data processing module includes several data processing units and query unit, the data processing unit The sequence of data sectional type, timestamp and segment data for recording to block chain memory module is combined processing, and According to the sequence of segment data to each memory node carry out sequence arrangement, the corresponding data memory node of segment data at first is chosen Memory node, striping order are arranged according to striping order and memory node as the primary storage node of the data information, and successively When grade is identical, by memory node arranged in parallel, the data memory node dendrogram of data information is sequentially generated, and according to tree-shaped Figure and timestamp generate secret code key, and query unit is used to match memory node dendrogram according to secret code key and inquires and read Data information.
Compared with prior art, the beneficial effects of the present invention are:
1) present invention carries out segmented processing to data information according to data extract type by hash algorithm, and by data It is stored in matched type memory node, realizes data information distributed storage and specifies data memory node, to rear Phase reading data has specific directive property, improves data access efficiency;
It is 2) of the invention by carrying out the generation of secret code key according to timestamp, segmented sequence and segmented type to data, It improves the complexity of code key, and the code key generated by tree-shaped schema, the step of complicated code key cracks, improves data Safety.
Detailed description of the invention
Fig. 1 is that the present invention is based on the flow charts of the real time data safety protecting method of block chain;
Fig. 2 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S2 of block chain;
Fig. 3 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S3 of block chain;
Fig. 4 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S5 of block chain;
Fig. 5 is that the present invention is based on the specific steps flow charts of the real time data safety protecting method S52 of block chain;
Fig. 6 is that the present invention is based on the structural schematic diagrams of the real time data security protection system of block chain;
Fig. 7 is to be formed to illustrate the present invention is based on the tree-shaped code key of the real time data safety protecting method of block chain and system Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of real time data safety protecting method based on block chain, method includes the following steps:
S1, data reception node receive data information.
S2, data are encrypted using data desensitization technology;As shown in Fig. 2, it is specifically included using including breathing out Data information is encrypted in the computational algorithm of uncommon algorithm.
S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;Such as Shown in Fig. 3, the specific steps of which are as follows:
S31, the timestamp for extracting data information;
S32, the data type for obtaining data information;
S33, segmented processing is carried out to data according to data type;
S34, the striping order for generating and recording each segment data.
S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types.
S5, data storage secret code key is generated;As shown in figure 4, the specific steps of which are as follows:
S51, data sectional type, the sequence of timestamp and segment data are read;
S52, according to the sequence of segment data to each memory node carry out sequence arrangement;As shown in figure 5, it is specifically included:
S521, primary storage node of the corresponding data memory node of segment data as the data information at first is chosen;
S522, memory node successively arranged according to striping order and memory node;
S523, when striping order grade is identical, by memory node arranged in parallel.
S53, the data memory node dendrogram for sequentially generating data information, and secret is generated according to dendrogram and timestamp Code key.
A kind of real time data security protection system based on block chain as shown in FIG. 6, comprising:
Data reception module, for receiving data information;
Data memory module, for storing the data slot of variant type;
Block chain memory module, for carrying out encryption and segment processing to the received data information of data reception module;
Data processing module, the segmented data for carrying out to block chain memory module carry out the generation of secret code key, and It is that data are inquired and read by the segment stored in secret secret key pair data memory module.
Data reception module includes several data reception nodes, establishes peer to peer connection between data reception node, mutually opposite Operation information carries out the disclosure of legitimate verification and stores the opening of information.
Data memory module includes several data memory nodes, peer to peer connection is established between data memory node, with each other Data information is disclosed and is opened, each data memory node corresponds to a kind of Stored Data Type and stores the number of the type The section type storage of data information is completed according to segment.
Block chain memory module includes several block chain storage units, which is used for according to hash algorithm Data information is encrypted, is segmented according to data information type, and records the sequence of segment data.
Data processing module includes several data processing units and query unit, which is used for block chain The sequence of data sectional type, timestamp and segment data that memory module records is combined processing, and according to segment data Sequence to each memory node carry out sequence arrangement, choose the corresponding data memory node of segment data at first and believe as the data The primary storage node of breath, and memory node is successively arranged according to striping order and memory node, it, will when striping order grade is identical Memory node arranged in parallel sequentially generates the data memory node dendrogram of data information, and raw according to dendrogram and timestamp At secret code key, query unit is used to match memory node dendrogram according to secret code key and inquires and read data information.
As shown in Figure 7, wherein n is positive integer.The segment 1 of striping order first is stored in memory node 1, is segmented suitable The segment 2 of sequence second is stored in memory node 2, and the segment 3 of striping order third is stored in memory node 3, is segmented side by side The segment 4 of sequence third is stored in storage 4, wherein memory node 3 and memory node 4 are located at the same layer of dendrogram Grade ... is until composition is complete tree-shaped after the data information is fully deployed according to data sectional type, timestamp and striping order Figure.Secret code key is generated by the dendrogram, by combining memory node type feature, timestamp and the striping order transferred Form code key.The code key is individually corresponding for each different data information institute, and there are high Information Securities, pacify to data Full protection has fabulous safeguard measure.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (10)

1. a kind of real time data safety protecting method based on block chain, which is characterized in that method includes the following steps:
S1, data reception node receive data information;
S2, data are encrypted using data desensitization technology;
S3, segmented processing is carried out according to timestamp and data type to encrypted data by block chain technology;
S4, the memory node that the data slot after segmentation is carried out to classified and stored to corresponding types;
S5, data storage secret code key is generated.
2. a kind of real time data safety protecting method based on block chain according to claim 1, which is characterized in that described S2 is encrypted data using data desensitization technology and specifically includes using the computational algorithm including hash algorithm to data Information is encrypted.
3. a kind of real time data safety protecting method based on block chain according to claim 1, which is characterized in that described S3 carries out segmented processing according to timestamp and data type to encrypted data by block chain technology and specifically includes:
S31, the timestamp for extracting data information;
S32, the data type for obtaining data information;
S33, segmented processing is carried out to data according to data type;
S34, the striping order for generating and recording each segment data.
4. a kind of real time data safety protecting method based on block chain according to claim 1, which is characterized in that described S5 generates data storage secret code key and specifically includes:
S51, data sectional type, the sequence of timestamp and segment data are read;
S52, according to the sequence of segment data to each memory node carry out sequence arrangement;
S53, the data memory node dendrogram for sequentially generating data information, and it is secret according to dendrogram and timestamp generation secret Key.
5. a kind of real time data safety protecting method based on block chain according to claim 4, which is characterized in that described S52 specifically includes each memory node progress sequence arrangement according to the sequence of segment data:
S521, primary storage node of the corresponding data memory node of segment data as the data information at first is chosen;
S522, memory node successively arranged according to striping order and memory node;
S523, when striping order grade is identical, by memory node arranged in parallel.
6. a kind of real time data security protection system based on block chain characterized by comprising
Data reception module, for receiving data information;
Data memory module, for storing the data slot of variant type;
Block chain memory module, for carrying out encryption and segment processing to the received data information of data reception module;
Data processing module, the segmented data for carrying out to block chain memory module carries out the generation of secret code key, and passes through The segment stored in secret secret key pair data memory module is that data are inquired and read.
7. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that described Data reception module includes several data reception nodes, establishes peer to peer connection between data reception node, mutually opposite operation information It carries out the disclosure of legitimate verification and stores the opening of information.
8. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that described Data memory module includes several data memory nodes, and peer to peer connection is established between data memory node, with each other logarithm it is believed that Breath is disclosed and is opened, each data memory node correspond to a kind of Stored Data Type and store the data slot of the type with Complete the section type storage of data information.
9. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that described Block chain memory module includes several block chain storage units, the block chain storage unit be used for according to hash algorithm logarithm it is believed that Breath is encrypted, and is segmented according to data information type, and records the sequence of segment data.
10. a kind of real time data security protection system based on block chain according to claim 6, which is characterized in that institute Stating data processing module includes several data processing units and query unit, which is used to store mould to block chain The sequence of data sectional type, timestamp and segment data that block records is combined processing, and according to the sequence of segment data To each memory node carry out sequence arrangement, master of the corresponding data memory node of segment data as the data information at first is chosen Memory node, and memory node is successively arranged according to striping order and memory node, when striping order grade is identical, storage is saved Point arranged in parallel sequentially generates the data memory node dendrogram of data information, and generates secret according to dendrogram and timestamp Code key, query unit are used to match memory node dendrogram according to secret code key and inquire and read data information.
CN201811018376.XA 2018-09-03 2018-09-03 Real time data safety protecting method and system based on block chain Pending CN109101830A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811018376.XA CN109101830A (en) 2018-09-03 2018-09-03 Real time data safety protecting method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811018376.XA CN109101830A (en) 2018-09-03 2018-09-03 Real time data safety protecting method and system based on block chain

Publications (1)

Publication Number Publication Date
CN109101830A true CN109101830A (en) 2018-12-28

Family

ID=64864816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811018376.XA Pending CN109101830A (en) 2018-09-03 2018-09-03 Real time data safety protecting method and system based on block chain

Country Status (1)

Country Link
CN (1) CN109101830A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492432A (en) * 2018-11-08 2019-03-19 安徽太阳石科技有限公司 Real time data safety protecting method and system based on block chain
CN109886040A (en) * 2019-01-24 2019-06-14 北京融链科技有限公司 Data processing method, device, storage medium and processor
CN110084059A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 A kind of method, apparatus and computer equipment of banking system data configuration block chain
CN110086607A (en) * 2019-03-13 2019-08-02 深圳壹账通智能科技有限公司 It is switched fast method, apparatus, computer equipment and the storage medium of deployment key
CN110209532A (en) * 2019-06-03 2019-09-06 高田 A kind of block chain big data security processing system and method
CN110224817A (en) * 2019-05-29 2019-09-10 中国人民大学 A kind of software popularization intelligent service system and method based on block chain technology
CN110245190A (en) * 2019-06-11 2019-09-17 南京荣链科技有限公司 A kind of block data fragmented storage method, terminal and medium
CN111131465A (en) * 2019-12-26 2020-05-08 深圳创客区块链技术有限公司 Block chain-based Internet of things data processing method and device and server
CN111259425A (en) * 2020-01-16 2020-06-09 广东京信软件科技有限公司 Smart city data safety management system
CN111538786A (en) * 2020-04-24 2020-08-14 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device
CN113010920A (en) * 2021-04-01 2021-06-22 浙江永旗区块链科技有限公司 Block chain data safety protection system and protection method thereof
CN113282908A (en) * 2020-02-19 2021-08-20 网联科技股份有限公司 Validity verification method
CN113360501A (en) * 2021-06-04 2021-09-07 永旗(北京)科技有限公司 Block chain-based distributed data storage method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182525A (en) * 2014-08-27 2014-12-03 李岩 Electronic record management device applying multimedia files with copyright protection function and applying state encryption algorithm
CN105117402A (en) * 2015-07-16 2015-12-02 中国人民大学 Log data fragmentation method based on segment order-preserving Hash and log data fragmentation device based on segment order-preserving Hash
US20160142204A1 (en) * 2014-11-13 2016-05-19 Teascom UK Ltd System and method for generating a cryptographic key
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182525A (en) * 2014-08-27 2014-12-03 李岩 Electronic record management device applying multimedia files with copyright protection function and applying state encryption algorithm
US20160142204A1 (en) * 2014-11-13 2016-05-19 Teascom UK Ltd System and method for generating a cryptographic key
CN105117402A (en) * 2015-07-16 2015-12-02 中国人民大学 Log data fragmentation method based on segment order-preserving Hash and log data fragmentation device based on segment order-preserving Hash
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492432A (en) * 2018-11-08 2019-03-19 安徽太阳石科技有限公司 Real time data safety protecting method and system based on block chain
CN109886040B (en) * 2019-01-24 2021-06-22 北京融链科技有限公司 Data processing method, data processing device, storage medium and processor
CN109886040A (en) * 2019-01-24 2019-06-14 北京融链科技有限公司 Data processing method, device, storage medium and processor
CN110086607A (en) * 2019-03-13 2019-08-02 深圳壹账通智能科技有限公司 It is switched fast method, apparatus, computer equipment and the storage medium of deployment key
CN110084059A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 A kind of method, apparatus and computer equipment of banking system data configuration block chain
CN110224817A (en) * 2019-05-29 2019-09-10 中国人民大学 A kind of software popularization intelligent service system and method based on block chain technology
CN110209532A (en) * 2019-06-03 2019-09-06 高田 A kind of block chain big data security processing system and method
CN110245190A (en) * 2019-06-11 2019-09-17 南京荣链科技有限公司 A kind of block data fragmented storage method, terminal and medium
CN111131465A (en) * 2019-12-26 2020-05-08 深圳创客区块链技术有限公司 Block chain-based Internet of things data processing method and device and server
CN111131465B (en) * 2019-12-26 2023-01-13 深圳创客区块链技术有限公司 Internet of things data processing method and device based on block chain and server
CN111259425A (en) * 2020-01-16 2020-06-09 广东京信软件科技有限公司 Smart city data safety management system
CN113282908A (en) * 2020-02-19 2021-08-20 网联科技股份有限公司 Validity verification method
CN111538786A (en) * 2020-04-24 2020-08-14 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device
CN113010920A (en) * 2021-04-01 2021-06-22 浙江永旗区块链科技有限公司 Block chain data safety protection system and protection method thereof
CN113010920B (en) * 2021-04-01 2022-07-12 浙江永旗区块链科技有限公司 Block chain data safety protection system and protection method thereof
CN113360501A (en) * 2021-06-04 2021-09-07 永旗(北京)科技有限公司 Block chain-based distributed data storage method and system

Similar Documents

Publication Publication Date Title
CN109101830A (en) Real time data safety protecting method and system based on block chain
CN109492432A (en) Real time data safety protecting method and system based on block chain
Jiang et al. Catchsync: catching synchronized behavior in large directed graphs
CN107196934A (en) A kind of cloud data managing method based on block chain
CN106203146B (en) Big data safety management system
CN113326317A (en) Block chain evidence storing method and system based on isomorphic multi-chain architecture
CN109711836A (en) A kind of storage method of transaction, storage network and electronic equipment
CN107171812A (en) It is a kind of based on block chain without key signature infrastructure construction method
CN110413652B (en) Big data privacy retrieval method based on edge calculation
CN108039943A (en) A kind of encryption searching method that can verify that
CN110750541B (en) Block chain-based data storage indexing system and method
CN108805710A (en) A kind of distribution type electric energy method of commerce based on block chain intelligence contract technology
CN109117096A (en) Distributed data storage method and system based on block chain
CN112738035B (en) Block chain technology-based vertical federal model stealing defense method
Pandey et al. VoteChain: A Blockchain based e-voting system
CN109639436A (en) The data property held verification method and terminal device based on salt figure
CN112732695A (en) Cloud storage data security deduplication method based on block chain
CN113360501A (en) Block chain-based distributed data storage method and system
CN112699123A (en) Method and system for verifying existence and integrity of data in data storage system
US20220239465A1 (en) Blockchain-based data management of distributed binary objects
CN114580011A (en) Power facility security situation sensing method and system based on federal privacy training
CN111259425A (en) Smart city data safety management system
Zhu et al. A novel covert timing channel based on bitcoin messages
Gao et al. Similarity-based deduplication and secure auditing in IoT decentralized storage
Ouyang et al. Blockchain-assisted verifiable and secure remote sensing image retrieval in cloud environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181228

RJ01 Rejection of invention patent application after publication