CN111177080B - Knowledge graph storage and verification method based on block chain and IPFS - Google Patents

Knowledge graph storage and verification method based on block chain and IPFS Download PDF

Info

Publication number
CN111177080B
CN111177080B CN201911417194.4A CN201911417194A CN111177080B CN 111177080 B CN111177080 B CN 111177080B CN 201911417194 A CN201911417194 A CN 201911417194A CN 111177080 B CN111177080 B CN 111177080B
Authority
CN
China
Prior art keywords
file
hash value
ipfs
file index
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911417194.4A
Other languages
Chinese (zh)
Other versions
CN111177080A (en
Inventor
黑新宏
尹欣悦
王一川
谢国
朱赫
田钰滢
马冰
朱磊
杜延宁
姬文江
宋昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Technology
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN201911417194.4A priority Critical patent/CN111177080B/en
Publication of CN111177080A publication Critical patent/CN111177080A/en
Application granted granted Critical
Publication of CN111177080B publication Critical patent/CN111177080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F16/137Hash-based
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a knowledge graph storage and verification method based on a block chain and an IPFS, which specifically comprises the following steps: firstly, exporting a process file of a knowledge graph from a graph database, calculating a file hash value, storing the process file into an IPFS interplanetary file system, comparing a file index hash value returned by the IPFS with a previously calculated hash value, and storing the file index hash value and the previously calculated hash value into a block chain if the file index hash value and the previously calculated hash value are equal to each other, so that the safety of the process file is ensured. And storing the file index hash value into a block chain through the processes of data packaging, signature, block packaging, block broadcasting and the like, inquiring the file index hash value in the block chain, comparing the file index hash value with the file index hash value obtained from the IPFS before, and entering a file processing module if the file index hash value is the same as the file index hash value, otherwise entering a file warning module. By combining the block chain and the IPFS, the knowledge graph can be reliably and quickly stored, and the safety and traceability of the knowledge graph process file are ensured.

Description

Knowledge graph storage and verification method based on block chain and IPFS
Technical Field
The invention belongs to the technical field of file encryption storage, and particularly relates to a knowledge graph storage and verification method based on a block chain and an IPFS.
Background
With the development and application of artificial intelligence technology, knowledge maps become an important branch of artificial intelligence, and knowledge engineering is successfully applied in a big data environment. The knowledge map is a knowledge base which expresses concepts and entities in the objective world and the relationship between the concepts and the entities in the form of a map, and is one of the basic technologies of intelligent services such as semantic search, intelligent question answering, decision support and the like. Knowledge-graphs, which aim to identify, discover, and infer complex relationships between things and concepts from data, are computable models of things relationships. The construction of the knowledge graph relates to the technologies of knowledge modeling, relation extraction, graph storage, relation reasoning, entity fusion and the like.
With the rapid development of information and communication technology, the internet has penetrated almost all aspects of people's life, such as production, trade, communication, learning, entertainment, etc., and revolutionary changes have occurred in many fields. Blockchains are the underlying technology for bitcoins. It is proposed in bitcoin by Satoshi Nakamoto: a peer-to-peer electronic cash system as a decentralized tamper-resistant and untrusted peer-to-peer transaction system. Although the digital currency bitcoin has been evaluated differently, the blockchain technology has received increasing attention as a core technology of the bitcoin. Its features can be interpreted as: (1) Decentralization, i.e., not paying attention to any party in the transaction. The decentralized mode can improve efficiency and reduce cost. And (2) trusted. Each transaction information is forced to be recorded by each node participating in the transaction through an intelligent contract (a digital code protocol, which is executed by the node participating in the intelligent contract), so that the integrity of the whole ledger information is ensured. Therefore, the blockchain can solve the trust problem of the pain point, namely each node, of the current internet. And (3) a distributed structure. A blockchain can be seen as a kind of distributed database. (4) non-tamper-proof property. The block chaining is a chained data structure that combines data blocks in a sequential manner according to a time order, and cryptographically ensures that data stored in the blocks is not tamper-proof.
IPFS is a distributed file system based on content addressable, peer-to-peer hypermedia. The file information uploaded in the IPFS can be permanently saved and can not be deleted like files stored in a web network are deleted irregularly. And simultaneously, the IPFS combines the distributed hash table and the Merckel tree file storage, and returns a unique file index hash value to the client according to the file content, so that the file can be quickly and efficiently found and obtained in the IPFS network according to the file index hash value. Therefore, by combining IPFS with the blockchain, an efficient and reliable file storage mode can be realized.
Because the key application of the knowledge graph is to query and infer knowledge, the modeling stage of the knowledge graph becomes particularly important, and if the following problems occur in the modeling process, wrong inference results can occur. If the source data of the information acquisition is wrong; the information extraction caused by the ambiguity of the entity and the relationship is wrong; errors occur in entity linking and knowledge merging processes, and the like. And the knowledge graph is generally large in magnitude order, so that the error data position in the modeling stage is difficult to simply trace. Meanwhile, the safety problem also exists in the process of constructing the knowledge graph. For example, before the knowledge is updated, the process file for constructing the map is illegally tampered or lost, so that the security of the file cannot be guaranteed. The method stores the process files for constructing the knowledge graph into the block chain, and ensures the safety and traceability of the process files. The periodic files are reliably stored in the block chain, and under the condition that errors occur in reasoning or the safety problem occurs in the files, the process files in a certain period can be obtained from the chain as required, so that repeated work such as map rebuilding is avoided, and the problems are effectively solved.
Disclosure of Invention
The invention aims to provide a reliable process file storage and verification method in the process of constructing a knowledge graph. The problem of safe storage and verification of the knowledge graph is solved.
The invention adopts the technical scheme that a knowledge graph storage and verification method based on a block chain and an IPFS is provided. The method is implemented according to the following steps:
step 1, exporting the constructed knowledge graph from a graph database. And carrying out hash encryption on the derived file to form a file hash value.
Step 2, transmitting the file obtained in the step 1 to an interplanetary file system IPFS to obtain a unique file index hash value;
step 3, comparing the hash value of the file obtained in the step 1 with the hash value of the file index obtained in the step 2, comparing the consistency of the two hash values and judging whether the file has a security problem in the process of transferring the file into the IPFS;
step 4, if the two hash values are the same, uploading the file index hash value obtained in the step 2 to a block chain to obtain a block hash value and a transaction number at the moment;
step 5, when a certain entity or a construction process file of a relationship needs to be inquired, a needed file index hash value can be obtained by searching a block hash value or uploading a date;
and 6, comparing the file index hash value obtained in the step 5 with the file hash value obtained in the step 2, comparing the two hash values, and judging whether the security problem exists in the process of transferring the file into the block chain.
And 7, using the file index hash value obtained in the step 5 to obtain a corresponding process file from the IPFS, and performing modification operation on the file.
The present invention is also characterized in that,
step 1, the format of the file is any one of csv and json. Because a knowledge graph may contain multiple entities or relationships, each of which is a separate document, multiple documents may be exported.
And 2, storing a plurality of knowledge graph process files exported in the step 1 into the IPFS. The IPFS file system splits a file into a plurality of blocks with the size of 256KB, conducts SHA2-256 function calculation encryption on the content of each block respectively, merges and encapsulates block hashes into a multi-Hash format, and conducts Base58 encoding conversion to form a unique file index hash value. And finally, uploading the original data of the file and the file index hash value to the IPFS node.
Step 3 is specifically implemented according to the following steps:
and 3.1, packaging the file hash value obtained in the step 1 into a multi-hash format, and performing Base58 encoding conversion to form a hash value beginning with the format of 'Qm' which is the same as the file index hash value.
And 3.2, comparing the hash values in the same format, and if the hash values are the same, indicating that the process file has no security problem in the process of transmitting the process file into the IPFS node. If the hash values are different, the file security warning module is started, and the file security warning module is started, wherein the file security warning module is used for sending the file to the file security warning module.
Step 4 is specifically implemented according to the following steps:
step 4.1, because the hash value of the file index of the uplink at each time is more and is easy to be confused, when an intelligent contract is written, a block chain corehdb database is followed in a key-value form in a writeHash function, in order to ensure the uniqueness of the key, a system timestamp is set as the key, the value is set as a map structure, the key in the map is the value stored for the second time of the day, and the value is the hash value of the file index stored at a certain time.
And 4.2, packaging data such as the file index hash value, the time stamp and the like, and signing by using a private key of a user. And interacting the nodes and the block chains through an intelligent contract, uploading data to a certain node of the block chain, and after the signature is verified by the nodes, packaging the blocks and broadcasting the blocks to all the nodes. And finally returning the block hash value and the transaction number of the generated block. The hash value and transaction number of the generated chunk are the guarantee that the file is encrypted in the blockchain.
And 5, performing corresponding function definition on the file index hash value of a certain day acquired from the block chain in the intelligent contract. If a timestamp of a certain day is input in a chain code interaction stage through a queryHash function, a block chain can return to a file index hash value stored before a client after being retrieved in the corehDB.
And 6, comparing the hash values indexed by the two files, if the hash values are the same, indicating that the process file has no security problem in the process of transferring the process file into the block chain, and entering a file processing module. If the hash values are different, the file security warning module is started, and the file security warning module is started, wherein the file security warning module is used for sending the file to the file security warning module.
The beneficial effect of the invention is that,
a knowledge graph storage and verification method based on a block chain and an IPFS stores a process file for constructing a knowledge graph into the block chain, and meets the requirements of safe storage, quick reading and traceability of the process file. The storage of the knowledge graph has the advantages of reliability, practicability, traceability of file contents and the like.
Drawings
FIG. 1 is a flow chart of a knowledge graph storage and validation method based on blockchains and IPFS of the present invention;
FIG. 2 is a system architecture diagram of a knowledge-graph storage and validation method based on blockchains and IPFS of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention discloses a knowledge graph storage and verification method based on a block chain and an IPFS (Internet protocol file system), wherein a flow chart is shown in figure 1, and a system architecture diagram is shown in figure 2. The method is implemented according to the following steps:
step 1, the format of the file is any one of csv and json. Because a knowledge graph may contain multiple entities or relationships, each of which is a separate document, multiple documents may be exported.
And 2, storing a plurality of knowledge graph process files exported in the step 1 into the IPFS. The IPFS file system splits a file into a plurality of blocks with the size of 256KB, respectively carries out SHA2-256 function calculation encryption on the content of each block, merges and encapsulates block hashes into a multi-hash format, and carries out Base58 code conversion to form a unique file index hash value. And finally, uploading the original data of the file and the file index hash value to the IPFS node. As shown in fig. 2.
Step 3 is specifically implemented according to the following steps:
and 3.1, packaging the file hash value obtained in the step 1 into a multi-hash format, and performing Base58 encoding conversion to form a hash value beginning with the format of 'Qm' which is the same as the file index hash value.
And 3.2, comparing the hash values in the same format, and if the hash values are the same, indicating that the process file has no security problem in the process of transmitting the process file into the IPFS node. If the hash values are different, the file security warning module is started, and the file security warning module is started, wherein the file security warning module is used for sending the file to the file security warning module.
Step 4 is implemented according to the following steps:
step 4.1, because the hash value of the file index of the uplink at each time is more and is easy to confuse, when an intelligent contract is written, in a writeHash function, the data base of the block chain coredb is in a key-value form, in order to ensure the uniqueness of the key, the system timestamp is set as the key, the value is set as a map structure, the key in the map is the value stored for the second time of the day, and the value is the hash value of the file index stored at a certain time.
And 4.2, packaging data such as the file index hash value, the timestamp and the like, and signing by using a private key of a user. And interacting the nodes and the block chain through the intelligent contract, and uploading the data to a certain node of the block chain. As shown in fig. 2. After the nodes verify the signatures, the blocks are packaged and broadcast to all nodes. And finally returning the block hash value and the transaction number of the generated block. The hash value and transaction number of the generated chunk are the guarantee that the file is encrypted in the blockchain.
And 5, performing corresponding function definition on the file index hash value of a certain day acquired from the block chain in the intelligent contract. If a queryHash function is used, a timestamp of a certain day is input in a chain code interaction stage, and after the block chain is searched in the corehDB, the block chain returns a file index hash value stored before to the client.
And 6, comparing the two file index hash values, if the hash values are the same, indicating that the process file has no security problem in the process of transferring the process file into the block chain, and entering a file processing module. If the hash values are different, the file security warning module is started, and the file security warning module is started, wherein the file security warning module is used for warning the file security.
Example (b):
the research method following the patent takes the example of storing the knowledge graph of the information of the movie actors into a block chain, and the application process is described specifically as follows: and importing data of the film, the actors and the relationship between the film and the actors into the database to manufacture a knowledge map of the film information. And deriving a knowledge graph from the graph database, and storing the knowledge graph in a csv file format. Storing the exported csv file into an IPFS node, and acquiring a unique file index hash value returned by the IPFS: qmeeUSH2K4jeDHQCkDeGH7D2uUxz6HCNE4WTPClg4iU26Y. And meanwhile, packaging the obtained csv file into a plurality of hash values after hash encryption, and performing Base58 encoding conversion to form a file hash value and keep the file hash value in a local database. And comparing the file hash value with the file index hash value, and if the file hash value and the file index hash value are equal, storing the file index hash value into the block chain. Taking alliance block chain Hyperhedger Fabric as an example, an intelligent contract which accords with the environment of the example is compiled. After the block chain environment is built, an intelligent contract is installed and instantiated on a node, a file index HASH value is stored in a block chain through a writeHash function of an invoke interface, and HASH PUBLISHED is returned, namely uploading is successful. The hash value stored at the command terminal for a certain date of the query, such as '{ "Args" [ "invoke", "query", "timestamp" ] }'. With the queryhhash function of the invoke interface, "HASH SHOWED" is returned and displayed as "< timestamp >: qmeeUSH2K4jeDHQCkDeGH7D2uUxz6HCNE4WTPClg4iU 26Y'. And comparing the file index hash value displayed by the terminal with the file index hash value returned by the IPFS before, if the file index hash value is correct, entering the next file processing work, and if the file index hash value is wrong, indicating that malicious damage exists in the process of storing the file index hash value into the block chain, entering a file warning module.

Claims (6)

1. A knowledge graph storage and verification method based on a block chain and an IPFS is characterized by comprising the following steps:
step 1, exporting a constructed knowledge graph from a graph database, and carrying out hash encryption on an exported file to form a file hash value;
step 2, transmitting the file obtained in the step 1 to an interplanetary file system IPFS to obtain a unique file index hash value;
step 3, comparing the hash value of the file obtained in the step 1 with the hash value of the file index obtained in the step 2, and comparing the two hash values;
step 4, if the two hash values are the same, uploading the file index hash value obtained in the step 2 to a block chain to obtain a block hash value and a transaction number at the moment;
in the step 4, the method is specifically implemented according to the following steps:
step 4.1, because the hash value of the file index of the uplink at each time is more and is easy to confuse, when an intelligent contract is written, in a writeHash function, the data base of the block chain coredb is in a key-value form, in order to ensure the uniqueness of the key, the system timestamp is set as the key, the value is set as a map structure, the key in the map is the value stored for the second time of the day, and the value is the hash value of the file index stored at a certain time;
step 4.2, data such as the file index hash value, the timestamp and the like are packaged, and a private key of a user is used for signing; interacting the nodes and the block chains through intelligent contracts, uploading data to a certain node of the block chains, packaging the blocks and broadcasting the blocks to all the nodes after the signature of the node is verified; finally, returning the block hash value and the transaction number of the generated block; generating a hash value and a transaction number of the block as a guarantee that the file is encrypted in the block chain;
step 5, when a certain entity or a construction process file of a relationship needs to be inquired, a needed file index hash value can be obtained by searching a block hash value or uploading a date;
step 6, comparing the file index hash value obtained in the step 5 with the file index hash value obtained in the step 2, comparing the two hash values, and judging whether the file transmission process has a security problem or not;
and 7, using the file index hash value obtained in the step 5 to obtain a corresponding process file from the IPFS, and performing change operation on the file.
2. The knowledge graph storage and verification method based on blockchains and IPFS according to claim 1, wherein in the step 1, the format of the file is any one of csv and json; because a knowledge graph may contain multiple entities or relationships, each of which is a separate document, multiple documents may be exported.
3. The method for knowledge-graph storage and validation based on blockchains and IPFS according to claim 1, wherein in the step 2, a plurality of knowledge-graph process files derived after the step 1 are stored in the IPFS; the IPFS file system splits a file into a plurality of blocks with the size of 256KB, respectively carries out SHA2-256 function calculation encryption on the content of each block, merges and encapsulates block hash into a multi-Hash format, and then carries out Base58 code conversion to form a unique file index hash value; and finally, uploading the original data of the file and the file index hash value to the IPFS node.
4. The knowledge graph storage and validation method based on a blockchain and IPFS as claimed in claim 1, wherein in said step 3, the following steps are specifically performed:
step 3.1, packaging the file hash value obtained in the step 1 into a multi-hash format and performing Base58 code conversion to form a hash value beginning with a format of 'Qm' which is the same as the file index hash value;
and 3.2, comparing the hash values in the same format, and if the hash values are the same, indicating that the process file has no security problem in the process of transmitting the process file into the IPFS node. If the hash values are different, the file security warning module is started, and the file security warning module is started;
5. the method according to claim 1, wherein in step 5, corresponding function definition is also performed in the intelligent contract for the file index hash value of a day obtained from the blockchain; if a queryHash function is used, a timestamp of a certain day is input in a chain code interaction stage, and after the block chain is searched in the corehDB, the block chain returns a file index hash value stored before to the client.
6. The method according to claim 1, wherein in step 6, the two file index hash values are compared, and if the hash values are the same, it indicates that the process file has no security problem during the process of being transferred into the blockchain, and the process file enters the file processing module; if the hash values are different, the file security warning module is started, and the file security warning module is started, wherein the file security warning module is used for warning the file security.
CN201911417194.4A 2019-12-31 2019-12-31 Knowledge graph storage and verification method based on block chain and IPFS Active CN111177080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911417194.4A CN111177080B (en) 2019-12-31 2019-12-31 Knowledge graph storage and verification method based on block chain and IPFS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911417194.4A CN111177080B (en) 2019-12-31 2019-12-31 Knowledge graph storage and verification method based on block chain and IPFS

Publications (2)

Publication Number Publication Date
CN111177080A CN111177080A (en) 2020-05-19
CN111177080B true CN111177080B (en) 2023-04-11

Family

ID=70657774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911417194.4A Active CN111177080B (en) 2019-12-31 2019-12-31 Knowledge graph storage and verification method based on block chain and IPFS

Country Status (1)

Country Link
CN (1) CN111177080B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711607B (en) * 2020-05-20 2022-04-22 西安理工大学 Block chain-based flow type micro-service trusted loading and verifying method
CN111641707B (en) * 2020-05-29 2021-09-17 兰州理工大学 Block chain-based digital copyright protection method
CN111797068A (en) * 2020-07-21 2020-10-20 浙江同善人工智能技术有限公司 Internet of things data management system and method based on block chain and IPFS
CN111917861A (en) * 2020-07-28 2020-11-10 广东工业大学 Knowledge storage method and system based on block chain and knowledge graph and application thereof
CN112214456B (en) * 2020-11-05 2022-05-10 深圳市瀚兰区块链地产有限公司 House property data processing method and device and electronic equipment
CN113064898A (en) * 2021-04-06 2021-07-02 北京瑞卓喜投科技发展有限公司 Retrieval method and device based on miniature index of contract on chain and electronic equipment
CN113139814B (en) * 2021-04-13 2023-03-14 广东工业大学 Ceramic production transaction traceability system
CN115277668B (en) * 2021-04-29 2024-04-23 南京理工大学 Cloud file dynamic integrity protection and verification method based on Ethernet and interstellar file systems
CN113434094A (en) * 2021-07-08 2021-09-24 山东中科好靓科技有限公司 Data file storage and extraction method based on IPFS
CN113535661A (en) * 2021-07-30 2021-10-22 天津光电通信技术有限公司 Distributed shared file management method and device based on block chain technology
WO2023004807A1 (en) * 2021-07-30 2023-02-02 西门子股份公司 Knowledge management system, method and apparatus, electronic device, and storage medium
CN114756837B (en) * 2022-06-16 2022-08-30 湖北长江传媒数字出版有限公司 Block chain-based digital content tracing method and system
CN115529136B (en) * 2022-08-16 2024-02-23 云南师范大学 Internet of things-oriented lightweight blockchain design method based on attribute access control
CN115271554A (en) * 2022-09-27 2022-11-01 北京共识数信科技有限公司 Method, system and medium for analyzing commissioning service quality map based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
CN109753825A (en) * 2019-01-09 2019-05-14 篱笆墙网络科技有限公司 The storage of backup file, backup document down loading method and system
CN110008194A (en) * 2019-03-01 2019-07-12 上海七印信息科技有限公司 A kind of rapid file acquisition methods based on block chain and interspace file system IPFS
CN110109874A (en) * 2019-05-13 2019-08-09 北京共识数信科技有限公司 A kind of non-stop layer distributed document retrieval method based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
CN109753825A (en) * 2019-01-09 2019-05-14 篱笆墙网络科技有限公司 The storage of backup file, backup document down loading method and system
CN110008194A (en) * 2019-03-01 2019-07-12 上海七印信息科技有限公司 A kind of rapid file acquisition methods based on block chain and interspace file system IPFS
CN110109874A (en) * 2019-05-13 2019-08-09 北京共识数信科技有限公司 A kind of non-stop layer distributed document retrieval method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的高校文件存储系统的探究;梁志勇;《电脑与电信》;20180310(第03期);全文 *

Also Published As

Publication number Publication date
CN111177080A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN111177080B (en) Knowledge graph storage and verification method based on block chain and IPFS
EP4035050B1 (en) Consensus protocol for blockchain dag structure
CN110033243B (en) Main chain evidence storing method, system and storage medium based on block chain intelligent contract
US11582042B2 (en) Industrial data verification using secure, distributed ledger
CN108377272B (en) Method and system for managing terminal of Internet of things
CN108985364B (en) Verification method and device for stamped file, computer equipment and storage medium
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN111461751B (en) Real estate information chain organization method based on block chain, historical state tracing method and device
CN112287033B (en) Data synchronization method, equipment and computer readable storage medium
CN111340483A (en) Data management method based on block chain and related equipment
CN113986143A (en) Block chain log storage-oriented high-reliability low-overhead data storage method
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
Wen et al. Evidence and trust: IoT collaborative security mechanism
CN113205345A (en) Agricultural product certificate tracing system based on Ether house block chain technology and tracing method thereof
CN110445765B (en) Data sharing method based on block chain, terminal device and medium
EP4018596A1 (en) Pruning entries in tamper-evident data stores
CN112883431A (en) Method for operating IT asset data on data management platform
CN112906069B (en) Trusted computing method for blockchain registration management process
US12010213B2 (en) Pruning entries in tamper-evident data stores
CN116760632B (en) Data processing method, device, equipment and readable storage medium
CN114095518B (en) Scientific and technological data right-determining and tracking protection method based on multi-level committee consensus
CN117709979A (en) Textile traceability system and method based on blockchain
Wu et al. Using Smart Contracts to Improve Searchable Symmetric Encryption
CN114328590A (en) Transaction execution method, device, equipment and storage medium
CN117874778A (en) Block chain certification method, block chain tracing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant