CN110177092A - A kind of electronic data based on block chain is credible method for down loading - Google Patents
A kind of electronic data based on block chain is credible method for down loading Download PDFInfo
- Publication number
- CN110177092A CN110177092A CN201910427646.0A CN201910427646A CN110177092A CN 110177092 A CN110177092 A CN 110177092A CN 201910427646 A CN201910427646 A CN 201910427646A CN 110177092 A CN110177092 A CN 110177092A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- electronic data
- block chain
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention proposes a kind of credible method for down loading of the electronic data based on block chain, include: user propose file download request, system judge user require downloading file whether be user oneself upload file, in this way, user can be downloaded without authorization if not, user needs to authorize;One corresponding sequence code of each user is assigned, file to be authorized serial number and account with power of attorney are inputted, needs the sequence code of the file downloaded and user itself to establish corresponding relationship user on the first chain, the first chain is written into authorization message;The serial number of the file according to required for user goes locating file on the second chain to store burst information, and after having downloaded file fragmentation, system is sent to user after reconfiguring file fragmentation.The present invention is solved the problems, such as that the centralization of existing electronic data method for down loading is serious, data omission is complicated, is improved using the safety of user data by the sliced distributed storage of management and electronic data to user's download permission.
Description
Technical field
The present invention relates to a kind of credible method for down loading of the electronic data based on block chain, belong to block chain and deposit card technology neck
Domain.
Background technique
The electronic data method for down loading of mainstream is all based on centralization node at present, is in fact exactly some electronic evidences
It is stored in online server, its mode is similar to current " Dropbox ", as long as electronic data needs are read, just to system
Central server issues request, and server will be downloaded data according to request.It is protected with common paper document and picture
It deposits and compares, the electronization of data, which saves, is more suitable for currently advanced Internet era, and electronic data downloading mode is not only fitted
It is wider with range and more comprehensively and efficient.
Electronic data downloading at present is primarily present following problem:
(1) electronic data downloading process risk is very big, and data need to handle by centralized system or administrator, data
A possibility that being tampered is very high.
(2) service process is made slow progress, and under efficiency, is obtained data side and is needed to send the requests to centralized system or pipe
Reason person carries out etc. to be processed.
Summary of the invention
The present invention proposes a kind of credible method for down loading of the electronic data based on block chain, above-mentioned based on centralization for solving
The problem of electronic data method for down loading bring risk of node is big, process is slow, low efficiency.
The present invention provides a kind of credible method for down loading of the electronic data based on block chain, comprising the following steps:
Step 1, user propose that file download request, system judge that user requires whether the file of downloading is what user oneself uploaded
File enters step 3, if not, user needs to authorize, enters step 2 if so, user can be downloaded without authorization;
Step 2 assigns each one corresponding sequence code of user, file to be authorized serial number and account with power of attorney is inputted, in the first chain
On need the sequence code of the file downloaded and user itself to establish corresponding relationship the user, the first chain is written into authorization message;
The serial number of step 3, the file according to required for user goes locating file on the second chain to store burst information, downloads good text
After part fragment, system is sent to user after reconfiguring file fragmentation.
As further technical solution of the present invention, user is needed into the file downloaded on the first chain described in step 2
Corresponding relationship is established with the sequence code of user itself to specifically include:
File relative indexing fileIndex and account address address to be authorized is read,
Judge whether fileIndex is less than the number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
The file that absolute indices are index is increased into all listed files possessed of user address.
Further, step 3 specifically includes:
File to be downloaded is inquired,
Judge whether file belongs to user node,
If so, file and its burst information are read from block chain,
Each user node downloading file fragmentation is gone to according to burst information,
File is rebuild using file fragmentation
If not, user is reminded not have permission.
Further, reading file and its burst information from block chain specifically include:
File relative indexing fileIndex and fragment relative indexing recordIndex is read, judges whether fileIndex is less than
The number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
Judge whether recordIndex is less than the fragment number of this file,
If so, exporting corresponding file fragmentation information;
If not, terminating.
Further, in the step 3, system Contracts Definitions File, Record, Member and User tetra- structural bodies
Variable,
File stores the key message of electronic data file, the write-in for electronic data information;
Record stores the key message of electronic data file fragment, the acquisition for electronic data information;
Member stores subscriber data, the authorization for electronic data;
User stores electronic data file, for the update of user information and the acquisition of user information.
Further, affairs are executed using Asynchronous Request mode (sendAsync ()) in the step 3.
Further, the storage of file fragmentation described in step 3 information includes: that slicing files store path, slicing files are deposited
Storage host ip, the fragment quantity for storing the fragment.
The invention adopts the above technical scheme compared with prior art, has following technical effect that the present invention provides one
Kind of the credible method for down loading of electronic data based on block chain passes through the sliced of management to user's download permission and electronic data
Distributed storage solves the problems, such as that the centralization of existing electronic data method for down loading is serious, data omission is complicated, makes user
The safety of data is improved.The electronic data corresponding information of wherein each client can be recorded within a block, due to
Transparence that block chain technology itself has, can not distort, convenient for tracing to the source the characteristics of, each electronic data storage information traces
It can look into, the problems such as more convenient user's monitoring data safety.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the credible method for down loading of electronic data based on block chain proposed by the present invention;
Fig. 2 is the flow diagram of step 2 of the present invention;
Fig. 3 is the sequence code foundation pair for the file and user itself for needing to download by user on the first chain in step 2 of the present invention
The flow diagram that should be related to;
Fig. 4 is the flow diagram of step 3 of the present invention;
Fig. 5 is the flow diagram for reading file and its burst information in step 3 of the present invention from block chain.
Specific embodiment
With reference to the accompanying drawing and technical solution of the present invention is described in detail in specific embodiment, described herein
Specific example be used only for explaining the present invention, but be not intended as restriction of the invention.
As shown in Figure 1, being implemented the invention proposes a kind of credible method for down loading of the electronic data based on block chain
Journey is as follows:
Step 1, user propose that file download request, system judge that user requires whether the file of downloading is what user oneself uploaded
File enters step 3, if not, user needs to authorize, enters step 2 if so, user can be downloaded without authorization;
System will do it corresponding secret protection for the data of personal user, to the data of user can be arranged certain permission into
Row access control, to guarantee the credible and secure downloading of data.It, can be to being when certain user needs to download other people user data
System proposes the demand of oneself, and system can corresponding account carries out data access entitlement on block chain by user, and user just may be used
To carry out the operation such as data downloading to data.
Further, the data that user uploads are because be to be related to individual subscriber privacy, general user itself
Data, only user itself can carry out data and check, download, and other users are that lack of competence carries out this operation.
As shown in Fig. 2, step 2, each one corresponding sequence code of user of imparting, input file to be authorized serial number and authorization
User is needed the sequence code of the file downloaded and user itself to establish corresponding relationship, by authorization message by account on the first chain
The first chain is written;
As shown in figure 3, needing the sequence code of the file downloaded and user itself to establish corresponding relationship tool user on the first chain
Body includes:
File relative indexing fileIndex and account address address to be authorized is read,
Judge whether fileIndex is less than the number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
The file that absolute indices are index is increased into all listed files possessed of user address.
It is exactly that system can will need the document number that authorize and authorized user from corresponding on block chain when user authorizes
Account be public key of the user on chain, corresponding mapping relations will be established between the two, only by corresponding serial number text
Corresponding relationship is established between part and authorized user, user can just possess permission and go to check and download to be authorized to file.When awarding
After the information progress system operation for weighing file, when system will need the file information authorized to be written to system block, then file is weighed
Limit authorization just finishes.
The serial number of step 3, the file according to required for user goes locating file on the second chain to store burst information, downloading
After good file fragmentation, system is sent to user after reconfiguring file fragmentation.
As shown in figure 4, specifically including:
File to be downloaded is inquired,
Judge whether file belongs to user node,
If so, file and its burst information are read from block chain,
Each user node downloading file fragmentation is gone to according to burst information,
File is rebuild using file fragmentation
If not, user is reminded not have permission.
As shown in figure 5, above-mentioned reading file and its burst information from block chain specifically include:
File relative indexing fileIndex and fragment relative indexing recordIndex is read, judges whether fileIndex is less than
The number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
Judge whether recordIndex is less than the fragment number of this file,
If so, exporting corresponding file fragmentation information;
If not, terminating.
User, can be immediately to certain part of text of system request downloading user oneself needs when needing certain part of data file
Part, user can find at system front end interface oneself needs to download the corresponding serial number of file, then when user is according to file
When serial number issues the file download demand of user oneself to system, system it is corresponding in area to find out file according to the serial number of file
Data information on block chain simultaneously navigates to file and is stored in corresponding data information on block.
According to the file data storage location information saved in data information, the main IP including data file storage
The routing information of location and data file storage.After system gets data file location information, data file and automatic is found
File needed for downloading carries out the automatic decoding operation of data file simultaneously.
User can anywhere or anytime be downloaded the data of user, can access the number of files that user is stored immediately
According to.The control of the access privilege according to set by system, user can be stored in the data in system to oneself and carry out user
Data downloading.And address when being uploaded according to the information of uploader at that time and user records, and downloads user data.And work as user
Need to obtain storing in the data in system for other users, needing to obtain corresponding data permission to data just can be right
Data carry out inquiry operation to obtain data information.
In the design process to system download function, system Contracts Definitions File, Record, Member and User tetra-
A structural body variable stores the key message of electronic data file, the key message of electronic data file fragment, Yong Huzi respectively
All relationships of material and electronic data file.Based on aforementioned four variable, write-in, the electronics of electronic data information have successively been write
The acquisition of data information, the authorization of electronic data, the update of user information and the acquisition of user information.In view of Ethereum number
It is slower according to the speed of write-in, it is easy to influence user experience, therefore execute affairs using Asynchronous Request mode (sendAsync ()).
When user proposes down operation request to system, system will carry out data interaction with system intelligence contract, first
First system can judge the permission of user, judge the extent of competence whether file that user needs to download is downloaded in user
It is interior.If it is determined that file is the Downloadable file of user, system will go to read data directory position corresponding to file, according to text
The call number of number of packages evidence goes to obtain the call number for the position that file fragmentation is stored, and judges whether file index is less than user data
The data fragmentation number that file is stored, if it is less, getting the absolute indices position of file storage location.According to absolute rope
The information for drawing position finds the absolute of IP address that the data information that data are stored includes document storage server and file storage
Path, electronic data required for downloading user according to these information.
What block chain was established is a kind of common recognition mechanism of decentralization, and this common recognition mechanism combines digital encryption and wins
Opinion is played chess, so that participant need not voluntarily form the trusted context mutually restrained in the case where the constraint of any external forced.This
The believable environment of kind eliminates the necessity of the control outside centralization authorization, establishes on the basis of mutual mistrust, solves
Full of virtual credit and governing problem with anonymous network world.
This patent completes writing and disposing for data download function contract by system author, and encapsulates in systems.?
User's ownership rule that they freely define wherein is set up, data check that the downloading right to use, mode of doing business and state convert letter
Number.Intelligent contract is a kind of trade agreement that can be deployed on block chain, and the trigger condition of contract, rule and event information can
To preset.Contract is once deployed in block chain, by automatic execution and provides corresponding feedback information according to trigger condition.
System data downloads real-time update, accurate to execute, low human intervention and low running cost.
In conclusion the present invention provides a kind of credible method for down loading of the electronic data based on block chain, by user
The management of download permission and the sliced distributed storage of electronic data, solve the center of existing electronic data method for down loading
Change serious, data omission complexity problem, is improved using the safety of user data.In the electronic data of wherein each client
Corresponding information can all be recorded the transparence within a block, having due to block chain technology itself, can not distort, convenient for what is traced to the source
The problems such as feature, each electronic data storage information retrospect can look into, more convenient user's monitoring data safety.
The above, the only specific embodiment in the present invention, but scope of protection of the present invention is not limited thereto, appoints
What is familiar with the people of the technology within the technical scope disclosed by the invention, it will be appreciated that expects transforms or replaces, and should all cover
Within scope of the invention, therefore, the scope of protection of the invention shall be subject to the scope of protection specified in the patent claim.
Claims (7)
1. a kind of electronic data based on block chain is credible method for down loading, which comprises the following steps:
Step 1, user propose that file download request, system judge that user requires whether the file of downloading is what user oneself uploaded
File enters step 3, if not, user needs to authorize, enters step 2 if so, user can be downloaded without authorization;
Step 2 assigns each one corresponding sequence code of user, file to be authorized serial number and account with power of attorney is inputted, in the first chain
On need the sequence code of the file downloaded and user itself to establish corresponding relationship the user, the first chain is written into authorization message;
The serial number of step 3, the file according to required for user goes locating file on the second chain to store burst information, downloads good text
After part fragment, system is sent to user after reconfiguring file fragmentation.
2. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, which is characterized in that step
It needs the sequence code for the file and user itself downloaded to establish corresponding relationship user on the first chain described in 2 to specifically include:
File relative indexing fileIndex and account address address to be authorized is read,
Judge whether fileIndex is less than the number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
The file that absolute indices are index is increased into all listed files possessed of user address.
3. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, which is characterized in that step
3 specifically include:
File to be downloaded is inquired,
Judge whether file belongs to user node,
If so, file and its burst information are read from block chain,
Each user node downloading file fragmentation is gone to according to burst information,
File is rebuild using file fragmentation
If not, user is reminded not have permission.
4. the credible method for down loading of a kind of electronic data based on block chain according to claim 3, which is characterized in that described
File is read from block chain and its burst information specifically includes:
File relative indexing fileIndex and fragment relative indexing recordIndex is read, judges whether fileIndex is less than
The number of files that user possesses,
If not, terminate,
If so, the absolute indices index of file is obtained,
Judge whether recordIndex is less than the fragment number of this file,
If so, exporting corresponding file fragmentation information;
If not, terminating.
5. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, it is characterised in that: described
In step 3, system Contracts Definitions File, Record, Member and User tetra- structural body variables,
File stores the key message of electronic data file, the write-in for electronic data information;
Record stores the key message of electronic data file fragment, the acquisition for electronic data information;
Member stores subscriber data, the authorization for electronic data;
User stores electronic data file, for the update of user information and the acquisition of user information.
6. the credible method for down loading of a kind of electronic data based on block chain according to claim 5, it is characterised in that: described
Affairs are executed using Asynchronous Request mode (sendAsync ()) in step 3.
7. the credible method for down loading of a kind of electronic data based on block chain according to claim 1, which is characterized in that step
The storage of file fragmentation described in 3 information includes: slicing files store path, slicing files storage host ip and stores the fragment
Fragment quantity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427646.0A CN110177092A (en) | 2019-05-22 | 2019-05-22 | A kind of electronic data based on block chain is credible method for down loading |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427646.0A CN110177092A (en) | 2019-05-22 | 2019-05-22 | A kind of electronic data based on block chain is credible method for down loading |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110177092A true CN110177092A (en) | 2019-08-27 |
Family
ID=67691799
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910427646.0A Pending CN110177092A (en) | 2019-05-22 | 2019-05-22 | A kind of electronic data based on block chain is credible method for down loading |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110177092A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113722684A (en) * | 2021-03-29 | 2021-11-30 | 宋捷 | Data tracing method and device, electronic equipment and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107257340A (en) * | 2017-06-19 | 2017-10-17 | 阿里巴巴集团控股有限公司 | A kind of authentication method, authentication data processing method and equipment based on block chain |
CN107579958A (en) * | 2017-08-15 | 2018-01-12 | 中国联合网络通信集团有限公司 | Data managing method, apparatus and system |
CN107979590A (en) * | 2017-11-02 | 2018-05-01 | 财付通支付科技有限公司 | Data sharing method, client, server, computing device and storage medium |
CN109165190A (en) * | 2018-07-11 | 2019-01-08 | 南京邮电大学 | A kind of electronic data based on block chain intelligence contract deposits card method |
CN109493042A (en) * | 2018-10-24 | 2019-03-19 | 南京邮电大学 | A kind of intelligent contract possessing access control function is credible to deposit card method and system |
-
2019
- 2019-05-22 CN CN201910427646.0A patent/CN110177092A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107257340A (en) * | 2017-06-19 | 2017-10-17 | 阿里巴巴集团控股有限公司 | A kind of authentication method, authentication data processing method and equipment based on block chain |
CN107579958A (en) * | 2017-08-15 | 2018-01-12 | 中国联合网络通信集团有限公司 | Data managing method, apparatus and system |
CN107979590A (en) * | 2017-11-02 | 2018-05-01 | 财付通支付科技有限公司 | Data sharing method, client, server, computing device and storage medium |
CN109165190A (en) * | 2018-07-11 | 2019-01-08 | 南京邮电大学 | A kind of electronic data based on block chain intelligence contract deposits card method |
CN109493042A (en) * | 2018-10-24 | 2019-03-19 | 南京邮电大学 | A kind of intelligent contract possessing access control function is credible to deposit card method and system |
Non-Patent Citations (2)
Title |
---|
冒小乐等: "基于区块链的电子数据存证的设计与实现", 《中兴通讯技术》 * |
孙国梓等: "基于区块链技术的电子数据存证系统", 《西安邮电大学学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113722684A (en) * | 2021-03-29 | 2021-11-30 | 宋捷 | Data tracing method and device, electronic equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10771240B2 (en) | Dynamic blockchain system and method for providing efficient and secure distributed data access, data storage and data transport | |
CN106127075B (en) | Encryption method can search for based on secret protection under a kind of cloud storage environment | |
CN106503574B (en) | Block chain safe storage method | |
van Beek et al. | Digital forensics as a service: Game on | |
JP4999751B2 (en) | Data sharing techniques | |
CN105678189B (en) | Data file encryption storage and retrieval system and method | |
CN105378649B (en) | More permissions data safety and access | |
CN102843366B (en) | A kind of network resource accession authority control method and device | |
US20180285839A1 (en) | Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network | |
JP4759513B2 (en) | Data object management in dynamic, distributed and collaborative environments | |
WO2018032374A1 (en) | Encrypted storage system for block chain and method using same | |
DE202018002074U1 (en) | System for secure storage of electronic material | |
CN101484927A (en) | Method for encrypting and decrypting shared encrypted files | |
CN105453105A (en) | File security management apparatus and management method for system protection | |
CN105978683A (en) | Secure data parser method and system | |
WO2007008806A2 (en) | Secure clipboard function | |
EP2272021A1 (en) | Secure data cache | |
US10536276B2 (en) | Associating identical fields encrypted with different keys | |
WO2019008548A1 (en) | Method, computer system and computer program product for managing personal data | |
CN109858272A (en) | Blacklist data processing system based on block chain | |
CN117235810A (en) | Log safe storage and efficient query method based on blockchain | |
CN116542637B (en) | Government platform safety control method based on computer | |
CN112000632A (en) | Ciphertext sharing method, medium, sharing client and system | |
Atan et al. | Formulating a security layer of cloud data storage framework based on multi agent system architecture | |
CN110177092A (en) | A kind of electronic data based on block chain is credible method for down loading |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190827 |