CN110177092A - A kind of electronic data based on block chain is credible method for down loading - Google Patents

A kind of electronic data based on block chain is credible method for down loading Download PDF

Info

Publication number
CN110177092A
CN110177092A CN201910427646.0A CN201910427646A CN110177092A CN 110177092 A CN110177092 A CN 110177092A CN 201910427646 A CN201910427646 A CN 201910427646A CN 110177092 A CN110177092 A CN 110177092A
Authority
CN
China
Prior art keywords
file
user
electronic data
block chain
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910427646.0A
Other languages
Chinese (zh)
Inventor
孙国梓
冒小乐
李华康
陈鼎洁
王纪涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201910427646.0A priority Critical patent/CN110177092A/en
Publication of CN110177092A publication Critical patent/CN110177092A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention proposes a kind of credible method for down loading of the electronic data based on block chain, include: user propose file download request, system judge user require downloading file whether be user oneself upload file, in this way, user can be downloaded without authorization if not, user needs to authorize;One corresponding sequence code of each user is assigned, file to be authorized serial number and account with power of attorney are inputted, needs the sequence code of the file downloaded and user itself to establish corresponding relationship user on the first chain, the first chain is written into authorization message;The serial number of the file according to required for user goes locating file on the second chain to store burst information, and after having downloaded file fragmentation, system is sent to user after reconfiguring file fragmentation.The present invention is solved the problems, such as that the centralization of existing electronic data method for down loading is serious, data omission is complicated, is improved using the safety of user data by the sliced distributed storage of management and electronic data to user's download permission.

Description

A kind of electronic data based on block chain is credible method for down loading
Technical field
The present invention relates to a kind of credible method for down loading of the electronic data based on block chain, belong to block chain and deposit card technology neck Domain.
Background technique
The electronic data method for down loading of mainstream is all based on centralization node at present, is in fact exactly some electronic evidences It is stored in online server, its mode is similar to current " Dropbox ", as long as electronic data needs are read, just to system Central server issues request, and server will be downloaded data according to request.It is protected with common paper document and picture It deposits and compares, the electronization of data, which saves, is more suitable for currently advanced Internet era, and electronic data downloading mode is not only fitted It is wider with range and more comprehensively and efficient.
Electronic data downloading at present is primarily present following problem:
(1) electronic data downloading process risk is very big, and data need to handle by centralized system or administrator, data A possibility that being tampered is very high.
(2) service process is made slow progress, and under efficiency, is obtained data side and is needed to send the requests to centralized system or pipe Reason person carries out etc. to be processed.
Summary of the invention
The present invention proposes a kind of credible method for down loading of the electronic data based on block chain, above-mentioned based on centralization for solving The problem of electronic data method for down loading bring risk of node is big, process is slow, low efficiency.
The present invention provides a kind of credible method for down loading of the electronic data based on block chain, comprising the following steps:
Step 1, user propose that file download request, system judge that user requires whether the file of downloading is what user oneself uploaded File enters step 3, if not, user needs to authorize, enters step 2 if so, user can be downloaded without authorization;
Step 2 assigns each one corresponding sequence code of user, file to be authorized serial number and account with power of attorney is inputted, in the first chain On need the sequence code of the file downloaded and user itself to establish corresponding relationship the user, the first chain is written into authorization message;
The serial number of step 3, the file according to required for user goes locating file on the second chain to store burst information, downloads good text After part fragment, system is sent to user after reconfiguring file fragmentation.
As further technical solution of the present invention, user is needed into the file downloaded on the first chain described in step 2 Corresponding relationship is established with the sequence code of user itself to specifically include:
File relative indexing fileIndex and account address address to be authorized is read,
Judge whether fileIndex is less than the number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
The file that absolute indices are index is increased into all listed files possessed of user address.
Further, step 3 specifically includes:
File to be downloaded is inquired,
Judge whether file belongs to user node,
If so, file and its burst information are read from block chain,
Each user node downloading file fragmentation is gone to according to burst information,
File is rebuild using file fragmentation
If not, user is reminded not have permission.
Further, reading file and its burst information from block chain specifically include:
File relative indexing fileIndex and fragment relative indexing recordIndex is read, judges whether fileIndex is less than The number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
Judge whether recordIndex is less than the fragment number of this file,
If so, exporting corresponding file fragmentation information;
If not, terminating.
Further, in the step 3, system Contracts Definitions File, Record, Member and User tetra- structural bodies Variable,
File stores the key message of electronic data file, the write-in for electronic data information;
Record stores the key message of electronic data file fragment, the acquisition for electronic data information;
Member stores subscriber data, the authorization for electronic data;
User stores electronic data file, for the update of user information and the acquisition of user information.
Further, affairs are executed using Asynchronous Request mode (sendAsync ()) in the step 3.
Further, the storage of file fragmentation described in step 3 information includes: that slicing files store path, slicing files are deposited Storage host ip, the fragment quantity for storing the fragment.
The invention adopts the above technical scheme compared with prior art, has following technical effect that the present invention provides one Kind of the credible method for down loading of electronic data based on block chain passes through the sliced of management to user's download permission and electronic data Distributed storage solves the problems, such as that the centralization of existing electronic data method for down loading is serious, data omission is complicated, makes user The safety of data is improved.The electronic data corresponding information of wherein each client can be recorded within a block, due to Transparence that block chain technology itself has, can not distort, convenient for tracing to the source the characteristics of, each electronic data storage information traces It can look into, the problems such as more convenient user's monitoring data safety.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the credible method for down loading of electronic data based on block chain proposed by the present invention;
Fig. 2 is the flow diagram of step 2 of the present invention;
Fig. 3 is the sequence code foundation pair for the file and user itself for needing to download by user on the first chain in step 2 of the present invention The flow diagram that should be related to;
Fig. 4 is the flow diagram of step 3 of the present invention;
Fig. 5 is the flow diagram for reading file and its burst information in step 3 of the present invention from block chain.
Specific embodiment
With reference to the accompanying drawing and technical solution of the present invention is described in detail in specific embodiment, described herein Specific example be used only for explaining the present invention, but be not intended as restriction of the invention.
As shown in Figure 1, being implemented the invention proposes a kind of credible method for down loading of the electronic data based on block chain Journey is as follows:
Step 1, user propose that file download request, system judge that user requires whether the file of downloading is what user oneself uploaded File enters step 3, if not, user needs to authorize, enters step 2 if so, user can be downloaded without authorization;
System will do it corresponding secret protection for the data of personal user, to the data of user can be arranged certain permission into Row access control, to guarantee the credible and secure downloading of data.It, can be to being when certain user needs to download other people user data System proposes the demand of oneself, and system can corresponding account carries out data access entitlement on block chain by user, and user just may be used To carry out the operation such as data downloading to data.
Further, the data that user uploads are because be to be related to individual subscriber privacy, general user itself Data, only user itself can carry out data and check, download, and other users are that lack of competence carries out this operation.
As shown in Fig. 2, step 2, each one corresponding sequence code of user of imparting, input file to be authorized serial number and authorization User is needed the sequence code of the file downloaded and user itself to establish corresponding relationship, by authorization message by account on the first chain The first chain is written;
As shown in figure 3, needing the sequence code of the file downloaded and user itself to establish corresponding relationship tool user on the first chain Body includes:
File relative indexing fileIndex and account address address to be authorized is read,
Judge whether fileIndex is less than the number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
The file that absolute indices are index is increased into all listed files possessed of user address.
It is exactly that system can will need the document number that authorize and authorized user from corresponding on block chain when user authorizes Account be public key of the user on chain, corresponding mapping relations will be established between the two, only by corresponding serial number text Corresponding relationship is established between part and authorized user, user can just possess permission and go to check and download to be authorized to file.When awarding After the information progress system operation for weighing file, when system will need the file information authorized to be written to system block, then file is weighed Limit authorization just finishes.
The serial number of step 3, the file according to required for user goes locating file on the second chain to store burst information, downloading After good file fragmentation, system is sent to user after reconfiguring file fragmentation.
As shown in figure 4, specifically including:
File to be downloaded is inquired,
Judge whether file belongs to user node,
If so, file and its burst information are read from block chain,
Each user node downloading file fragmentation is gone to according to burst information,
File is rebuild using file fragmentation
If not, user is reminded not have permission.
As shown in figure 5, above-mentioned reading file and its burst information from block chain specifically include:
File relative indexing fileIndex and fragment relative indexing recordIndex is read, judges whether fileIndex is less than The number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
Judge whether recordIndex is less than the fragment number of this file,
If so, exporting corresponding file fragmentation information;
If not, terminating.
User, can be immediately to certain part of text of system request downloading user oneself needs when needing certain part of data file Part, user can find at system front end interface oneself needs to download the corresponding serial number of file, then when user is according to file When serial number issues the file download demand of user oneself to system, system it is corresponding in area to find out file according to the serial number of file Data information on block chain simultaneously navigates to file and is stored in corresponding data information on block.
According to the file data storage location information saved in data information, the main IP including data file storage The routing information of location and data file storage.After system gets data file location information, data file and automatic is found File needed for downloading carries out the automatic decoding operation of data file simultaneously.
User can anywhere or anytime be downloaded the data of user, can access the number of files that user is stored immediately According to.The control of the access privilege according to set by system, user can be stored in the data in system to oneself and carry out user Data downloading.And address when being uploaded according to the information of uploader at that time and user records, and downloads user data.And work as user Need to obtain storing in the data in system for other users, needing to obtain corresponding data permission to data just can be right Data carry out inquiry operation to obtain data information.
In the design process to system download function, system Contracts Definitions File, Record, Member and User tetra- A structural body variable stores the key message of electronic data file, the key message of electronic data file fragment, Yong Huzi respectively All relationships of material and electronic data file.Based on aforementioned four variable, write-in, the electronics of electronic data information have successively been write The acquisition of data information, the authorization of electronic data, the update of user information and the acquisition of user information.In view of Ethereum number It is slower according to the speed of write-in, it is easy to influence user experience, therefore execute affairs using Asynchronous Request mode (sendAsync ()).
When user proposes down operation request to system, system will carry out data interaction with system intelligence contract, first First system can judge the permission of user, judge the extent of competence whether file that user needs to download is downloaded in user It is interior.If it is determined that file is the Downloadable file of user, system will go to read data directory position corresponding to file, according to text The call number of number of packages evidence goes to obtain the call number for the position that file fragmentation is stored, and judges whether file index is less than user data The data fragmentation number that file is stored, if it is less, getting the absolute indices position of file storage location.According to absolute rope The information for drawing position finds the absolute of IP address that the data information that data are stored includes document storage server and file storage Path, electronic data required for downloading user according to these information.
What block chain was established is a kind of common recognition mechanism of decentralization, and this common recognition mechanism combines digital encryption and wins Opinion is played chess, so that participant need not voluntarily form the trusted context mutually restrained in the case where the constraint of any external forced.This The believable environment of kind eliminates the necessity of the control outside centralization authorization, establishes on the basis of mutual mistrust, solves Full of virtual credit and governing problem with anonymous network world.
This patent completes writing and disposing for data download function contract by system author, and encapsulates in systems.? User's ownership rule that they freely define wherein is set up, data check that the downloading right to use, mode of doing business and state convert letter Number.Intelligent contract is a kind of trade agreement that can be deployed on block chain, and the trigger condition of contract, rule and event information can To preset.Contract is once deployed in block chain, by automatic execution and provides corresponding feedback information according to trigger condition. System data downloads real-time update, accurate to execute, low human intervention and low running cost.
In conclusion the present invention provides a kind of credible method for down loading of the electronic data based on block chain, by user The management of download permission and the sliced distributed storage of electronic data, solve the center of existing electronic data method for down loading Change serious, data omission complexity problem, is improved using the safety of user data.In the electronic data of wherein each client Corresponding information can all be recorded the transparence within a block, having due to block chain technology itself, can not distort, convenient for what is traced to the source The problems such as feature, each electronic data storage information retrospect can look into, more convenient user's monitoring data safety.
The above, the only specific embodiment in the present invention, but scope of protection of the present invention is not limited thereto, appoints What is familiar with the people of the technology within the technical scope disclosed by the invention, it will be appreciated that expects transforms or replaces, and should all cover Within scope of the invention, therefore, the scope of protection of the invention shall be subject to the scope of protection specified in the patent claim.

Claims (7)

1. a kind of electronic data based on block chain is credible method for down loading, which comprises the following steps:
Step 1, user propose that file download request, system judge that user requires whether the file of downloading is what user oneself uploaded File enters step 3, if not, user needs to authorize, enters step 2 if so, user can be downloaded without authorization;
Step 2 assigns each one corresponding sequence code of user, file to be authorized serial number and account with power of attorney is inputted, in the first chain On need the sequence code of the file downloaded and user itself to establish corresponding relationship the user, the first chain is written into authorization message;
The serial number of step 3, the file according to required for user goes locating file on the second chain to store burst information, downloads good text After part fragment, system is sent to user after reconfiguring file fragmentation.
2. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, which is characterized in that step It needs the sequence code for the file and user itself downloaded to establish corresponding relationship user on the first chain described in 2 to specifically include:
File relative indexing fileIndex and account address address to be authorized is read,
Judge whether fileIndex is less than the number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
The file that absolute indices are index is increased into all listed files possessed of user address.
3. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, which is characterized in that step 3 specifically include:
File to be downloaded is inquired,
Judge whether file belongs to user node,
If so, file and its burst information are read from block chain,
Each user node downloading file fragmentation is gone to according to burst information,
File is rebuild using file fragmentation
If not, user is reminded not have permission.
4. the credible method for down loading of a kind of electronic data based on block chain according to claim 3, which is characterized in that described File is read from block chain and its burst information specifically includes:
File relative indexing fileIndex and fragment relative indexing recordIndex is read, judges whether fileIndex is less than The number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
Judge whether recordIndex is less than the fragment number of this file,
If so, exporting corresponding file fragmentation information;
If not, terminating.
5. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, it is characterised in that: described In step 3, system Contracts Definitions File, Record, Member and User tetra- structural body variables,
File stores the key message of electronic data file, the write-in for electronic data information;
Record stores the key message of electronic data file fragment, the acquisition for electronic data information;
Member stores subscriber data, the authorization for electronic data;
User stores electronic data file, for the update of user information and the acquisition of user information.
6. the credible method for down loading of a kind of electronic data based on block chain according to claim 5, it is characterised in that: described Affairs are executed using Asynchronous Request mode (sendAsync ()) in step 3.
7. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, which is characterized in that step The storage of file fragmentation described in 3 information includes: slicing files store path, slicing files storage host ip and stores the fragment Fragment quantity.
CN201910427646.0A 2019-05-22 2019-05-22 A kind of electronic data based on block chain is credible method for down loading Pending CN110177092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910427646.0A CN110177092A (en) 2019-05-22 2019-05-22 A kind of electronic data based on block chain is credible method for down loading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910427646.0A CN110177092A (en) 2019-05-22 2019-05-22 A kind of electronic data based on block chain is credible method for down loading

Publications (1)

Publication Number Publication Date
CN110177092A true CN110177092A (en) 2019-08-27

Family

ID=67691799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910427646.0A Pending CN110177092A (en) 2019-05-22 2019-05-22 A kind of electronic data based on block chain is credible method for down loading

Country Status (1)

Country Link
CN (1) CN110177092A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113722684A (en) * 2021-03-29 2021-11-30 宋捷 Data tracing method and device, electronic equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107579958A (en) * 2017-08-15 2018-01-12 中国联合网络通信集团有限公司 Data managing method, apparatus and system
CN107979590A (en) * 2017-11-02 2018-05-01 财付通支付科技有限公司 Data sharing method, client, server, computing device and storage medium
CN109165190A (en) * 2018-07-11 2019-01-08 南京邮电大学 A kind of electronic data based on block chain intelligence contract deposits card method
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107579958A (en) * 2017-08-15 2018-01-12 中国联合网络通信集团有限公司 Data managing method, apparatus and system
CN107979590A (en) * 2017-11-02 2018-05-01 财付通支付科技有限公司 Data sharing method, client, server, computing device and storage medium
CN109165190A (en) * 2018-07-11 2019-01-08 南京邮电大学 A kind of electronic data based on block chain intelligence contract deposits card method
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冒小乐等: "基于区块链的电子数据存证的设计与实现", 《中兴通讯技术》 *
孙国梓等: "基于区块链技术的电子数据存证系统", 《西安邮电大学学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113722684A (en) * 2021-03-29 2021-11-30 宋捷 Data tracing method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US10771240B2 (en) Dynamic blockchain system and method for providing efficient and secure distributed data access, data storage and data transport
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
CN106503574B (en) Block chain safe storage method
van Beek et al. Digital forensics as a service: Game on
JP4999751B2 (en) Data sharing techniques
CN105678189B (en) Data file encryption storage and retrieval system and method
CN105378649B (en) More permissions data safety and access
CN102843366B (en) A kind of network resource accession authority control method and device
US20180285839A1 (en) Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
JP4759513B2 (en) Data object management in dynamic, distributed and collaborative environments
WO2018032374A1 (en) Encrypted storage system for block chain and method using same
DE202018002074U1 (en) System for secure storage of electronic material
CN101484927A (en) Method for encrypting and decrypting shared encrypted files
CN105453105A (en) File security management apparatus and management method for system protection
CN105978683A (en) Secure data parser method and system
WO2007008806A2 (en) Secure clipboard function
EP2272021A1 (en) Secure data cache
US10536276B2 (en) Associating identical fields encrypted with different keys
WO2019008548A1 (en) Method, computer system and computer program product for managing personal data
CN109858272A (en) Blacklist data processing system based on block chain
CN117235810A (en) Log safe storage and efficient query method based on blockchain
CN116542637B (en) Government platform safety control method based on computer
CN112000632A (en) Ciphertext sharing method, medium, sharing client and system
Atan et al. Formulating a security layer of cloud data storage framework based on multi agent system architecture
CN110177092A (en) A kind of electronic data based on block chain is credible method for down loading

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190827