CN111199044B - Data storage method, device and storage medium - Google Patents

Data storage method, device and storage medium Download PDF

Info

Publication number
CN111199044B
CN111199044B CN201811379545.2A CN201811379545A CN111199044B CN 111199044 B CN111199044 B CN 111199044B CN 201811379545 A CN201811379545 A CN 201811379545A CN 111199044 B CN111199044 B CN 111199044B
Authority
CN
China
Prior art keywords
file
block
contract
request
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811379545.2A
Other languages
Chinese (zh)
Other versions
CN111199044A (en
Inventor
宋科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201811379545.2A priority Critical patent/CN111199044B/en
Publication of CN111199044A publication Critical patent/CN111199044A/en
Application granted granted Critical
Publication of CN111199044B publication Critical patent/CN111199044B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The present disclosure provides a data storage method, apparatus and storage medium, wherein the method comprises: determining a first operation authority of the file based on the file configuration information; generating a first operation contract corresponding to the file; wherein the first operating contract comprises: a first operation right; storing a file, generating a first operation limiting block according to a first operation contract, and issuing the first operation limiting block in a block chain; obtaining a first operation contract based on the first operation restriction block; and obtaining a first operation authority from the first operation contract, and correspondingly operating the file based on the first operation authority and the operation request. The method, the device and the storage medium disclosed by the invention have the advantages that the anti-tampering characteristic of the block chain is utilized to store the operation authority of the file, and the operation is verified based on the operation limiting block, so that the control on the operation of all data is realized, the data tampering and the data embezzlement are avoided, and the authenticity and the usability of the stored file are effectively ensured.

Description

Data storage method, device and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a data storage method, an apparatus, and a storage medium.
Background
At present, an object storage system bears the storage task of a large amount of unstructured data, and a block storage and file system constructed based on object storage are two storage modes which are most widely used at present. At present, data of various industries show explosive growth, and in the face of the requirements of huge data quantity and data reliability, many companies select an object storage technology as a storage solution. The current object storage system only provides a traditional asymmetric encryption mode to protect data, and although the traditional asymmetric encryption mode has a certain protection effect on the data, the traditional object storage system cannot provide storage service with higher credibility.
Disclosure of Invention
In view of the above, an object of the present disclosure is to provide a data storage method, apparatus and storage medium.
According to an aspect of the present disclosure, there is provided a data storage method including: receiving a file storage request, and acquiring a file corresponding to the file storage request and file configuration information; determining a first operation authority of the file based on the file configuration information; generating a first operation contract corresponding to the file; wherein the first operating contract comprises: the first operation authority; storing the file, generating a first operation limiting block according to the first operation contract, and issuing the first operation limiting block in a block chain; receiving an operation request for the file, acquiring the first operation restriction block from the block chain, and acquiring the first operation contract based on the first operation restriction block; and obtaining the first operation authority from the first operation contract, and correspondingly operating the file based on the first operation authority and the operation request.
Optionally, generating a file block according to the file, and publishing the file block in a block chain; or storing the file in an object storage cluster.
Optionally, the performing, on the file, the corresponding operation based on the first operation permission and the operation request includes: and if the operation request is determined to be matched with the first operation authority, acquiring a file block corresponding to the file from the block chain, acquiring the file from the file block and performing corresponding operation according to the operation request.
Optionally, the performing, on the file, the corresponding operation based on the first operation permission and the operation request includes: if the operation request is determined not to be matched with the first operation authority, starting a consensus mechanism and sending a modification request to each node in the block chain; wherein the modification request comprises: a second operation authority corresponding to the operation request; each node of the block chain negotiates the modification request based on an intelligent contract; and correspondingly processing the file according to the second operation authority and based on the negotiation result.
Optionally, the correspondingly processing the file according to the second operation permission based on the negotiation result includes: if the negotiation result is the modification agreement, generating a second operation contract; wherein the second operating contract comprises: the second operation authority; generating a second operation limiting block according to the second operation contract, and issuing the second operation limiting block in a block chain so that each node in the block chain replaces the first operation limiting block with the second operation limiting block according to an intelligent contract; and acquiring the file block from the block chain, acquiring the file from the file block and operating according to the operation request.
Optionally, the generating a first operation contract corresponding to the file comprises: determining the storage node ID of the file block in the blockchain cluster according to a blockchain storage rule; adding the file ID of the file and the storage node ID to the first operation contract.
Optionally, the second operating contract comprises: the file ID and the storage node ID.
Optionally, the generating a file chunk according to the file includes: performing encryption operation on the file based on an encryption key, and adding the encryption key to the first operation contract; and generating the file block according to the encrypted file.
Optionally, obtaining the encryption key from the first operation contract; and acquiring the encrypted file from the file block and decrypting the encrypted file according to the encryption key.
According to another aspect of the present invention, there is provided a data storage device including: the information acquisition module is used for receiving a file storage request and acquiring a file corresponding to the file storage request and file configuration information; the permission determining module is used for determining a first operation permission of the file based on the file configuration information; generating a first operation contract corresponding to the file; wherein the first operating contract comprises: the first operation authority; the file storage module is used for storing the file; generating a first operation limiting block according to the first operation contract, and issuing the first operation limiting block in a block chain; a file operation module, configured to receive an operation request for the file, obtain the first operation restriction block from the block chain, and obtain the first operation contract based on the first operation restriction block; and obtaining the first operation authority from the first operation contract, and correspondingly operating the file based on the first operation authority and the operation request.
Optionally, the file storage module is configured to generate a file block according to the file, and publish the file block in a block chain; or storing the file in an object storage cluster.
Optionally, the file operating module is configured to, if it is determined that the operation request matches the first operation permission, obtain a file block corresponding to the file from the block chain, obtain the file from the file block, and perform a corresponding operation according to the operation request.
Optionally, the file operation module is configured to, if it is determined that the operation request does not match the first operation permission, start a consensus mechanism, and send a modification request to each node in the block chain; wherein the modification request comprises: a second operation authority corresponding to the operation request; wherein each node of the block chain negotiates the modification request based on an intelligent contract; and the file operation module is used for correspondingly processing the file according to the second operation authority and based on the negotiation result.
Optionally, the file operation module is further configured to generate a second operation contract if the negotiation result is that modification is agreed; wherein the second operating contract comprises: the second operation authority; generating a second operation limiting block according to the second operation contract, and issuing the second operation limiting block in a block chain so that each node in the block chain replaces the first operation limiting block with the second operation limiting block according to an intelligent contract; and acquiring the file block from the block chain, acquiring the file from the file block and operating according to the operation request.
Optionally, the authority determining module is configured to determine, according to a blockchain storage rule, a storage node ID of the file block in a blockchain cluster; adding the file ID of the file and the storage node ID to the first operation contract.
Optionally, the second operating contract comprises: the file ID and the storage node ID.
Optionally, the file storage module is configured to perform an encryption operation on the file based on an encryption key, and add the encryption key to the first operation contract; and generating the file block according to the encrypted file.
Optionally, the file operation module is further configured to obtain the encryption key from the first operation contract; and acquiring the encrypted file from the file block and decrypting the encrypted file according to the encryption key.
According to still another aspect of the present invention, there is provided a data storage apparatus comprising: a memory; and a processor coupled to the memory, the processor configured to perform the method as described above based on instructions stored in the memory.
According to yet another aspect of the present invention, there is provided a computer readable storage medium having stored thereon computer instructions for execution by a processor to perform the method as described above.
According to the data storage method, the data storage device and the data storage medium, the operation authority of the file is stored by utilizing the anti-tampering characteristic of the block chain, and the operation is verified based on the operation limiting block, so that the control over the operation of all data is achieved, and data tampering and data embezzlement are avoided; the safety and reliability of data operation are increased, the realization is simple, and the authenticity and the usability of the stored file are effectively ensured.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without inventive exercise.
FIG. 1 is a schematic flow chart diagram illustrating one embodiment of a data storage method according to the present disclosure;
FIG. 2 is a schematic flow chart diagram illustrating operations performed on stored files according to one embodiment of a data storage method of the present disclosure;
FIG. 3 is a schematic block diagram of one embodiment of a data storage device according to the present disclosure;
FIG. 4 is a block schematic diagram of another embodiment of a data storage device according to the present disclosure.
Detailed Description
The present disclosure now will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the disclosure are shown. The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure. The technical solution of the present disclosure is described in various aspects below with reference to various figures and embodiments.
Hereinafter, "first", "second", etc. are only descriptive differences and have no other special meanings.
Fig. 1 is a schematic flow chart diagram of an embodiment of a data storage method according to the present disclosure, as shown in fig. 1:
step 101, receiving a file storage request, and obtaining a file corresponding to the file storage request and file configuration information. The file configuration information includes operation authority for the file, and the like, for example, the operation authority may be that the file can only be queried and can not be modified, or the file can be queried and modified, and the like.
Step 102, determining a first operation authority of the file based on the file configuration information, and generating a first operation contract corresponding to the file. The first operation contract may contain a plurality of information, for example the first operation contract includes a first operation right.
Step 103, storing the file, generating a first operation restriction block according to the first operation contract, and issuing the first operation restriction block in the block chain.
There are many ways to store files. For example, a file chunk is generated from a file, the file chunk is distributed in a chunk chain, or the file is stored in an object storage cluster (the file is stored as an object).
Step 104, receiving an operation request for the file, obtaining a first operation restriction block from the block chain, and obtaining a first operation contract based on the first operation restriction block.
And 105, obtaining a first operation authority from the first operation contract, and correspondingly operating the file based on the first operation authority and the operation request.
The block chain technology is a common account book technology based on consensus, and has the characteristics of no center, no tamper property, openness and transparency and the like. The blockchain technology utilizes a blockchain data structure to verify and store data, utilizes a distributed node consensus algorithm to generate and update data, utilizes a cryptographic approach to secure data transmission and access, and utilizes an intelligent contract composed of automated script code to program and manipulate data, which is a completely new distributed infrastructure and computing approach.
In the data storage method in the above embodiment, a high-reliability storage service may be implemented based on a blockchain technique, and when a file storage request sent by an object storage client is received, a first operation restriction block corresponding to a file object is recorded by using the blockchain technique, where the first operation restriction block includes a first operation contract, and the first operation contract includes a first operation permission, that is, an executable operation on the file. When a user needs to execute a certain operation, the operation is verified based on the first operation limiting block, so that the control over the operation of all data is achieved, and data tampering and data embezzlement are avoided.
In one embodiment, it is determined whether the operation request sent by the user matches the first operation right. For example, if the operation request is to perform query operation on a file, and the first operation permission is that a user can only perform query operation on the file, the operation request is matched with the first operation permission; and if the operation request is to delete the file, the operation request is not matched with the first operation authority.
And if the operation request is matched with the first operation authority, acquiring a file block corresponding to the file from the block chain, acquiring the file from the file block, and performing corresponding operation according to the operation request, such as query operation and the like.
The general mechanism of the block chain, such as a public key/private key mechanism, a data signature and the like, can ensure the credibility of both information interaction parties and the credibility of transactions, and the adoption of a consensus mechanism of the block chain ensures the consistency and the non-tamper-ability of data.
And if the operation request does not match the first operation authority, starting a consensus mechanism and sending a modification request to each node in the block chain. The modification request includes: a second operation authority corresponding to the operation request, and the like, wherein the second operation authority may be an authority for deleting a file and the like. Each node of the block chain negotiates the modification request based on the intelligent contract, and correspondingly processes the file based on the negotiation result and according to the second operation authority.
An intelligent contract is a piece of code stored on a blockchain that can be triggered by an operation on the blockchain, and after triggering, the piece of code can read data from the blockchain or write data to the blockchain. An intelligent contract is a collection of code and data, and intelligent contracts can be of various kinds.
If the negotiation result of each node of the block chain for the second operation authority is to agree to modify the first operation authority, generating a second operation contract, wherein the second operation contract comprises: and a second operation right. And generating a second operation limiting block according to a second operation contract, issuing the second operation limiting block in the block chain, so that each node in the block chain replaces the first operation limiting block with the second operation limiting block according to the intelligent contract, and storing the operation limiting information of the file through the second operation limiting block. And acquiring the file blocks from the block chain, acquiring the files from the file blocks and operating according to the operation request.
And if the negotiation result of each node of the block chain on the second operation authority is that the first operation authority is not approved to be modified, the operation cannot be carried out according to the operation request. And when the operation is forbidden, the second operation restriction block cannot be linked up and is forbidden, so that the data access is effectively restricted.
The data storage method in the above embodiment can be implemented by modifying the source code of the object storage server, and the operation of the block chain is completely transparent to the user, so that the user does not need to perform additional research and development work due to the requirement on data security.
Fig. 2 is a schematic flowchart of an operation performed on a stored file according to an embodiment of the data storage method of the present disclosure, as shown in fig. 2:
step 201, receiving an operation request for a file, and obtaining a first operation authority from a first operation contract.
Step 202, judging whether the operation request is matched with the first operation authority, if so, entering step 203, and if not, entering step 205.
Step 203, a file block corresponding to the file is obtained from the block chain.
Step 204, obtaining the file from the file block and performing corresponding operation according to the operation request.
Step 205, starting a consensus mechanism, and sending a modification request to each node in the block chain, where the modification request includes: a second operation right corresponding to the operation request.
In step 206, each node of the blockchain negotiates a modification request based on an intelligent contract.
And step 207, if the negotiation result is that the modification is approved, generating a second operation contract, wherein the second operation contract comprises: and a second operation right.
And step 208, generating a second operation limiting block according to the second operation contract, and issuing the second operation limiting block in the block chain.
Step 209, obtain the file block from the block chain, obtain the file from the file block and operate according to the operation request.
In one embodiment, when generating a first operation contract corresponding to a file, determining storage node IDs of the file chunks in the blockchain cluster according to the blockchain storage rule, and adding the file IDs and the storage node IDs of the file to the first operation contract. The second operating contract comprises: file ID and storage node ID, etc.
When the file is uploaded, the object storage server uploads the object ID, the first operation authority, the storage cluster ID and the like which are obtained after the file is split into the objects as a first operation contract to the block chain cluster according to the operation limit of the configuration file on the file. When the uploaded file is operated, if the operation is not limited, the operation is normally carried out; if the operation is restricted, the object ID, the second operation right, and the storage cluster ID need to be uplink-operated, so that most nodes in the blockchain cluster can recognize the operation and the operation can be continued, i.e. the operation is normally prohibited.
When generating a file block according to a file, the file is encrypted based on an encryption key, the encryption key is added into a first operation contract, and the file block is generated according to the encrypted file. An encryption key is obtained from a first operation contract. And obtaining the encrypted file from the file block and decrypting the encrypted file according to the encryption key.
In one embodiment, as shown in FIG. 3, the present invention provides a data storage device 30 comprising: an information obtaining module 31, a permission determining module 32, a file storing module 33 and a file operating module 34. The information obtaining module 31 receives the file storage request, and obtains the file corresponding to the file storage request and the file configuration information. The authority determining module 32 determines a first operation authority of the file based on the file configuration information, and generates a first operation contract corresponding to the file; wherein the first operation contract comprises a first operation right and the like.
The file storage module 33 stores a file, generates a first operation restriction block according to a first operation contract, and issues the first operation restriction block in a block chain. The file operation module 34 receives an operation request for a file, acquires a first operation restriction block from the block chain, and obtains a first operation contract based on the first operation restriction block. The file operation module 34 obtains the first operation authority from the first operation contract, and performs corresponding operation on the file based on the first operation authority and the operation request.
In one embodiment, the file storage module 33 generates file chunks from the file, and publishes the file chunks in a chunk chain, or the file storage module 33 stores the file in the object storage cluster.
If the operation request is determined to match the first operation authority, the file operation module 34 obtains a file block corresponding to the file from the block chain, obtains the file from the file block, and performs a corresponding operation according to the operation request.
If the operation request is determined not to match the first operation permission, the file operation module 34 starts a consensus mechanism, and sends a modification request to each node in the blockchain, where the modification request includes: a second operation authority corresponding to the operation request, and the like; wherein each node of the blockchain negotiates the modification request based on the intelligent contract. The file operation module 34 processes the file accordingly based on the negotiation result and according to the second operation authority.
If the negotiation result is agreement to modify, the file operation module 34 generates a second operation contract, wherein the second operation contract comprises: second operating right, etc. The file operation module 34 generates a second operation restriction block according to a second operation contract, and issues the second operation restriction block in the blockchain, so that each node in the blockchain replaces the first operation restriction block with the second operation restriction block according to an intelligent contract. The file operation module 34 obtains the file block from the block chain, obtains the file from the file block and performs an operation according to the operation request.
The permission determination module 32 determines the storage node ID of the file block in the blockchain cluster according to the blockchain storage rule. The authority determination module 32 adds the file ID and the storage node ID of the file to the first operation contract. The second operating contract comprises: a file ID and a storage node ID.
The file storage module 33 performs an encryption operation on the file based on the encryption key, and adds the encryption key to the first operation contract. The file storage module 33 generates a file block from the encrypted file. The file operation module 34 obtains an encryption key from the first operation contract; and obtaining the encrypted file from the file block and decrypting the encrypted file according to the encryption key.
FIG. 4 is a block schematic diagram of another embodiment of a data storage device according to the present disclosure. As shown in fig. 4, the apparatus may include a memory 41, a processor 42, a communication interface 43, and a bus 44. The memory 41 is used for storing instructions, the processor 42 is coupled to the memory 41, and the processor 42 is configured to implement the data storage method described above based on the instructions stored by the memory 41.
The memory 41 may be a high-speed RAM memory, a non-volatile memory (non-volatile memory), or the like, and the memory 41 may be a memory array. The storage 41 may also be partitioned, and the blocks may be combined into virtual volumes according to certain rules. The processor 42 may be a central processing unit CPU, or an application Specific Integrated circuit asic, or one or more Integrated circuits configured to implement the data storage methods of the present disclosure.
In one embodiment, the present disclosure provides a computer-readable storage medium storing computer instructions that, when executed by a processor, implement a data storage method as in any one of the above embodiments.
The data storage method, the data storage device and the data storage medium in the embodiment store the operation authority of the file by using the anti-tampering characteristic of the block chain, and verify the operation based on the operation limiting block, so that the control of the operation of all data is achieved, and data tampering and data embezzlement are avoided; the safety and reliability of data operation are improved, the realization is simple, and the authenticity and the usability of the stored file are effectively ensured.
The method and system of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
The description of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to practitioners skilled in this art. The embodiment was chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (18)

1. A method of data storage, comprising:
receiving a file storage request, and acquiring a file corresponding to the file storage request and file configuration information;
determining a first operation authority of the file based on the file configuration information, and generating a first operation contract corresponding to the file; wherein the first operating contract comprises: the first operation authority;
storing the file, generating a first operation limiting block according to the first operation contract, and issuing the first operation limiting block in a block chain;
receiving an operation request for the file, acquiring the first operation restriction block from the block chain, and acquiring the first operation contract based on the first operation restriction block;
obtaining the first operation authority from the first operation contract, and performing corresponding operation on the file based on the first operation authority and the operation request, wherein the method comprises the following steps:
if the operation request is determined not to match the first operation authority, starting a consensus mechanism, and sending a modification request to each node in the blockchain so that each node of the blockchain negotiates the modification request based on an intelligent contract, wherein the modification request comprises: a second operation authority corresponding to the operation request; and (c) a second step of,
and correspondingly processing the file according to the second operation authority and based on the negotiation result.
2. The method of claim 1, the storing the file comprising:
generating a file block according to the file, and publishing the file block in a block chain; or the like, or a combination thereof,
storing the file in an object storage cluster.
3. The method of claim 2, wherein the operating the file accordingly based on the first operation permission and the operation request further comprises:
and if the operation request is determined to be matched with the first operation authority, acquiring a file block corresponding to the file from the block chain, acquiring the file from the file block and performing corresponding operation according to the operation request.
4. The method of claim 2, wherein the processing the file accordingly based on the negotiation result and according to the second operation right comprises:
if the negotiation result is the modification agreement, generating a second operation contract; wherein the second operating contract comprises: the second operation authority;
generating a second operation limiting block according to the second operation contract, and issuing the second operation limiting block in a block chain so that each node in the block chain replaces the first operation limiting block with the second operation limiting block according to an intelligent contract;
and acquiring the file block from the block chain, acquiring the file from the file block and operating according to the operation request.
5. The method of claim 4, wherein generating the first operation contract corresponding to the file comprises:
determining the storage node ID of the file block in the block chain cluster according to a block chain storage rule;
adding the file ID of the file and the storage node ID to the first operation contract.
6. The method of claim 5, wherein,
the second operating contract comprises: the file ID and the storage node ID.
7. The method of claim 2, the generating a file chunk from the file comprising:
performing encryption operation on the file based on an encryption key, and adding the encryption key into the first operation contract;
and generating the file block according to the encrypted file.
8. The method of claim 7, further comprising:
obtaining the encryption key from the first operation contract;
and acquiring the encrypted file from the file block and decrypting the encrypted file according to the encryption key.
9. A data storage device, comprising:
the information acquisition module is used for receiving a file storage request and acquiring a file corresponding to the file storage request and file configuration information;
the permission determining module is used for determining a first operation permission of the file based on the file configuration information; generating a first operation contract corresponding to the file; wherein the first operating contract comprises: the first operation authority;
the file storage module is used for storing the file; generating a first operation limiting block according to the first operation contract, and issuing the first operation limiting block in a block chain;
a file operation module, configured to receive an operation request for the file, obtain the first operation restriction block from the block chain, and obtain the first operation contract based on the first operation restriction block; obtaining the first operation authority from the first operation contract; if the operation request is determined not to match the first operation authority, starting a consensus mechanism, and sending a modification request to each node in the blockchain so that each node of the blockchain negotiates the modification request based on an intelligent contract, wherein the modification request comprises: a second operation authority corresponding to the operation request; and correspondingly processing the file according to the second operation authority based on the negotiation result.
10. The apparatus of claim 9, wherein,
the file storage module is used for generating a file block according to the file and publishing the file block in a block chain; or storing the file in an object storage cluster.
11. The apparatus of claim 10, wherein,
the file operation module is further configured to, if it is determined that the operation request matches the first operation permission, obtain a file block corresponding to the file from the block chain, obtain the file from the file block, and perform a corresponding operation according to the operation request.
12. The apparatus of claim 10, wherein,
the file operation module is also used for generating a second operation contract if the negotiation result is that the modification is agreed; wherein the second operating contract comprises: the second operation authority; generating a second operation limiting block according to the second operation contract, and issuing the second operation limiting block in a block chain so that each node in the block chain replaces the first operation limiting block with the second operation limiting block according to an intelligent contract; and acquiring the file block from the block chain, acquiring the file from the file block and operating according to the operation request.
13. The apparatus of claim 12, wherein,
the authority determining module is used for determining the storage node ID of the file block in the block chain cluster according to a block chain storage rule; adding the file ID of the file and the storage node ID to the first operation contract.
14. The apparatus of claim 13, wherein,
the second operating contract comprises: the file ID and the storage node ID.
15. The apparatus of claim 10, wherein,
the file storage module is used for carrying out encryption operation on the file based on an encryption key and adding the encryption key into the first operation contract; and generating the file block according to the encrypted file.
16. The apparatus of claim 15, wherein,
the file operation module is further configured to obtain the encryption key from the first operation contract; and acquiring the encrypted file from the file block and decrypting the encrypted file according to the encryption key.
17. A data storage device comprising:
a memory; and a processor coupled to the memory, the processor configured to perform the method of any of claims 1-8 based on instructions stored in the memory.
18. A computer-readable storage medium having stored thereon computer instructions for execution by a processor of the method of any one of claims 1 to 8.
CN201811379545.2A 2018-11-20 2018-11-20 Data storage method, device and storage medium Active CN111199044B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811379545.2A CN111199044B (en) 2018-11-20 2018-11-20 Data storage method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811379545.2A CN111199044B (en) 2018-11-20 2018-11-20 Data storage method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111199044A CN111199044A (en) 2020-05-26
CN111199044B true CN111199044B (en) 2022-06-17

Family

ID=70745859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811379545.2A Active CN111199044B (en) 2018-11-20 2018-11-20 Data storage method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111199044B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN108632268A (en) * 2018-04-28 2018-10-09 腾讯科技(深圳)有限公司 The method for authenticating and device, storage medium, electronic device that block chain accesses

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN108632268A (en) * 2018-04-28 2018-10-09 腾讯科技(深圳)有限公司 The method for authenticating and device, storage medium, electronic device that block chain accesses

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《Block Chain: An Innovative Research Area》;Supriya Manglekar等;《2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)》;20180818;第1-4页 *
《区块链开发之Go语言-文件系统》;linxinzhe;《https://cloud.tencent.com/developer/article/1089658》;20180410;第1-12页 *
《区块链技术及应用》;郭学沛等;《信息安全研究》;20180630;第4卷(第6期);第559-569页 *

Also Published As

Publication number Publication date
CN111199044A (en) 2020-05-26

Similar Documents

Publication Publication Date Title
US20200374126A1 (en) Method for storing an object on a plurality of storage nodes
JP2022507796A (en) Systems and methods implemented by computers that store data on the blockchain
KR20200011435A (en) Parameterizable Smart Contract
EP3652885B1 (en) Secure token passing via blockchains
CN117043772A (en) Block chain data separation
JP2023551124A (en) self-audit blockchain
CN111199044B (en) Data storage method, device and storage medium
CN114127724A (en) Integrity audit for multi-copy storage
CN113051622B (en) Index construction method, device, equipment and storage medium
CN113111396B (en) Method, system, device and medium for enhancing storage medium security
CN116192395A (en) Trusted system for distributed data storage
CN115098893A (en) Data storage method and device based on block chain
CN111130788B (en) Data processing method and system, data reading method and iSCSI server
JP6865338B1 (en) Information processing system
US20230259280A1 (en) Methods and system of preventing duplication of encrypted data
JOHANSSON et al. Using Blockchain Techniques to Create an Opinion-Based Whitelisting Procedure
Alm Nilsson et al. Using Blockchain Techniques to Create an Opinion-Based Whitelisting Procedure
CN116894010A (en) Resource state processing method and device, electronic equipment and storage medium
WO2022073584A1 (en) Method and computer system for pricing data storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200526

Assignee: Tianyiyun Technology Co.,Ltd.

Assignor: CHINA TELECOM Corp.,Ltd.

Contract record no.: X2024110000020

Denomination of invention: Data storage methods, devices, and storage media

Granted publication date: 20220617

License type: Common License

Record date: 20240315

EE01 Entry into force of recordation of patent licensing contract