CN111400748A - Block chain-based storage method - Google Patents

Block chain-based storage method Download PDF

Info

Publication number
CN111400748A
CN111400748A CN202010140076.XA CN202010140076A CN111400748A CN 111400748 A CN111400748 A CN 111400748A CN 202010140076 A CN202010140076 A CN 202010140076A CN 111400748 A CN111400748 A CN 111400748A
Authority
CN
China
Prior art keywords
node
block chain
block
transaction
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010140076.XA
Other languages
Chinese (zh)
Inventor
杨宁波
李�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Gaoshan Technology Co ltd
Original Assignee
Anhui Gaoshan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Gaoshan Technology Co ltd filed Critical Anhui Gaoshan Technology Co ltd
Priority to CN202010140076.XA priority Critical patent/CN111400748A/en
Publication of CN111400748A publication Critical patent/CN111400748A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a storage method based on a block chain, which belongs to the technical field of the block chain, and comprises the steps of carrying out identity public key identification on an object needing to store data, binding information and identity information which can be transmitted by the object in the block chain, uploading the data to each node of a distributed block chain network by the object, and carrying out information blocking in the network; constructing a created block in a block chain, connecting the created block with other blocks in the block chain by taking the block as a starting point in sequence, interacting the user with the block chain network through a public-private key pair by using the user as a network address, generating one transaction each time, digitally signing the transaction by using a private key, and broadcasting the transaction to a next hop node of the transaction; after receiving the transaction message, the surrounding nodes verify whether the message is valid, if not, the message is discarded, otherwise, the message is forwarded to the next hop node, and finally, the valid transaction message is transmitted to the whole block chain network to finish the storage of the data in the block chain.

Description

Block chain-based storage method
Technical Field
The invention relates to the technical field of block chains, in particular to a storage method based on a block chain.
Background
After the bit currency concept is proposed, the block chain is widely concerned as the underlying technology of the bit currency. In a narrow sense, a block chain is a string of data blocks containing transaction information which are generated by using a cryptographic method in a correlation mode, and the data blocks are connected in sequence according to time stamps to form a chain data structure; broadly, the blockchain technique is a completely new distributed infrastructure and computing approach that utilizes blockchain data structures to verify and store data, utilizes distributed node consensus algorithms to generate and update data, utilizes cryptography to secure data transmission and access, and utilizes intelligent contracts composed of automated script code to program and manipulate data. The block chain has the characteristics of decentralization, openness, autonomy, data tamper resistance, high transparency and the like, so that the block chain can be widely applied to the fields of securities trading, electronic commerce, social communication, file storage, existence certification, identity verification and the like.
In a big data era, data value comes from analysis and mining of data, the more data dimensions and the larger data size are, the larger the data can play, and the effect is always achieved, so that how to correctly evaluate the value of the data and avoid the leakage of precious data resources under the condition of no permission is always a problem troubling people.
Disclosure of Invention
The invention aims to solve the problems that the traditional data storage is not safe and reliable enough and the data is easy to leak and lose, and provides a storage method based on a block chain.
The invention achieves the aim through the following technical scheme, and a storage method based on a block chain comprises the following steps:
carrying out identity public key identification on an object needing to store data, binding information which can be transmitted by the object in a block chain and identity information together, uploading the data to each node of a distributed block chain network by the object, and carrying out information blocking in the network;
constructing a created block in a block chain, connecting the created block with other blocks in the block chain by taking the block as a starting point in sequence, interacting the user with the block chain network through a public-private key pair by using the user as a network address, generating one transaction each time, digitally signing the transaction by using a private key, and broadcasting the transaction to a next hop node of the transaction;
after receiving the transaction message, the surrounding nodes verify whether the message is valid, if not, the message is discarded, otherwise, the message is forwarded to the next hop node, and finally, the valid transaction message is transmitted to the whole block chain network to finish the storage of the data in the block chain.
Preferably, the method for identifying the object identity by the public key is to perform node initialization and service provider identity initialization on the device object, add a unique public-private key pair by an asymmetric encryption algorithm, and identify the object identity by the public-private key pair.
Preferably, the blocks of the block chain include an asset block function and a block voting function, wherein the asset block function includes the related content of the uploaded data, and the block voting function includes all the node voting for the new block to verify the reasonability of the new block.
Preferably, the time interval of the transaction message verification by the surrounding nodes is 5-10 minutes, the transaction message is collected and verified through a network, the node which is the most successful in verification is used as a candidate block according to the time sequence, the transaction information in the candidate block is detected, if the verification fails, the transaction information of the candidate block is discarded, otherwise, the transaction information of the candidate block is added into the block chain.
Preferably, the verification of the transaction information is performed by using a formula mechanism, and the verification method of the consensus mechanism is as follows:
① dividing the block chain into two nodes, ordinary node and professional accounting node, the node not participating accounting is called ordinary node, they can see the consensus process and need synchronization information, the node participating accounting is called super node, responsible for accounting, they are decided by ordinary node according to the ratio of ownership and benefit by voting;
② if there are N super nodes in the distribution network, it includes 1 main node and N-1 accounting nodes, the main node is elected by super node in turn;
③ at each billing time, the master node first initiates a proposal for the tile content, which is the final tile content issued once more than (2N +1)/3 billing nodes pass and agree to the proposal for this master node.
Compared with the prior art, the invention has the beneficial effects that:
the invention accesses the equipment needing the data last time into the block chain, stores the data through the nodes of the distribution network, can be suitable for mass data or fast-updating data storage, reduces the pressure of a storage server, and the block chain nodes can generate transaction information every time the data is uploaded, the transaction information is verified through a common recognition mechanism and then uploaded into the nodes, thereby ensuring the authenticity and reliability of the data, only reading the public and private key of the transaction information, encrypting the public and private key through an encryption algorithm, and effectively preventing the stored data information from being tampered.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A storage method based on a block chain comprises the following steps:
carrying out identity public key identification on an object needing to store data, binding information which can be transmitted by the object in a block chain and identity information together, uploading the data to each node of a distributed block chain network by the object, and carrying out information blocking in the network;
constructing a created block in a block chain, connecting the created block with other blocks in the block chain by taking the block as a starting point in sequence, interacting the user with the block chain network through a public-private key pair by using the user as a network address, generating one transaction each time, digitally signing the transaction by using a private key, and broadcasting the transaction to a next hop node of the transaction;
after receiving the transaction message, the surrounding nodes verify whether the message is valid, if not, the message is discarded, otherwise, the message is forwarded to the next hop node, and finally, the valid transaction message is transmitted to the whole block chain network to finish the storage of the data in the block chain.
The method for identifying the object identity by the public key comprises the steps of firstly carrying out node initialization and service provider identity initialization on an equipment object, then adding a unique public-private key pair through an asymmetric encryption algorithm, carrying out identity identification through the public-private key pair, carrying out encryption and decryption on data storage and transmission processes by using an asymmetric public-private key through the asymmetric encryption algorithm, saving a private key by a user, opening a public key for other people, and calculating a corresponding private key by other people through the public key, wherein a block of a block chain comprises an asset block function and a block voting function, in order to ensure that information data in the block is not tampered, the asset block function comprises related contents of uploaded data, the block voting function comprises voting of all nodes for a new block, the rationality of the new block is verified, and the time interval of transaction message verification by surrounding nodes is 5-10 minutes, and collecting and verifying the transaction messages through a network, taking the node with the highest successful verification as a candidate block according to the time sequence, detecting the transaction information in the candidate block, discarding the node if the verification fails, and otherwise adding the transaction information of the candidate block into a block chain.
The verification of the transaction information adopts a formula mechanism for verification, and the verification method of the consensus mechanism comprises the following steps:
① dividing the block chain into two nodes, ordinary node and professional accounting node, the node not participating accounting is called ordinary node, they can see the consensus process and need synchronization information, the node participating accounting is called super node, responsible for accounting, they are decided by ordinary node according to the ratio of ownership and benefit by voting;
② if there are N super nodes in the distribution network, it includes 1 main node and N-1 accounting nodes, the main node is elected by super node in turn;
③ at each billing time, the master node first initiates a proposal for the tile content, which is the final tile content issued once more than (2N +1)/3 billing nodes pass and agree to the proposal for this master node.
The working principle of the invention is as follows: the device which needs data last time is accessed into the block chain, the data stored through the nodes of the distribution network can be suitable for mass data or faster data storage, the pressure of a storage server is reduced, each time the data is uploaded, the block chain nodes can generate transaction information, the transaction information is verified through a consensus mechanism and then uploaded into the nodes, the authenticity and the reliability of the data are guaranteed, the transaction information can only be read through a public-private key, the public-private key is encrypted through an encryption algorithm, and the stored data information is effectively prevented from being tampered.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (5)

1. A storage method based on a block chain is characterized by comprising the following steps:
carrying out identity public key identification on an object needing to store data, binding information which can be transmitted by the object in a block chain and identity information together, uploading the data to each node of a distributed block chain network by the object, and carrying out information blocking in the network;
constructing a created block in a block chain, connecting the created block with other blocks in the block chain by taking the block as a starting point in sequence, interacting the user with the block chain network through a public-private key pair by using the user as a network address, generating one transaction each time, digitally signing the transaction by using a private key, and broadcasting the transaction to a next hop node of the transaction;
after receiving the transaction message, the surrounding nodes verify whether the message is valid, if not, the message is discarded, otherwise, the message is forwarded to the next hop node, and finally, the valid transaction message is transmitted to the whole block chain network to finish the storage of the data in the block chain.
2. The blockchain-based storage method according to claim 1, wherein the public key identifies the object identity by performing node initialization and service provider identity initialization on the device object, adding a unique public-private key pair through an asymmetric encryption algorithm, and identifying the device object by using the public-private key pair.
3. The blockchain-based storage method according to claim 1, wherein the blocks of the blockchain include asset block functions and block voting functions, wherein the asset block functions include related contents of uploaded data, and the block voting function includes voting of all nodes for a new block to verify the reasonableness of the new block.
4. The blockchain-based storage method according to claim 1, wherein the time interval of the transaction messages verified by the surrounding nodes is 5-10 minutes, the transaction messages are collected and verified through a network, the node which is the most verified in time sequence is used as a candidate block, the transaction information in the candidate block is detected, if the verification fails, the node is discarded, otherwise, the transaction information of the candidate block is added to the blockchain.
5. The blockchain-based storage method according to claim 4, wherein the verification of the transaction information is performed by using a formula mechanism, and the verification method of the consensus mechanism is as follows:
① dividing the block chain into two nodes, ordinary node and professional accounting node, the node not participating accounting is called ordinary node, they can see the consensus process and need synchronization information, the node participating accounting is called super node, responsible for accounting, they are decided by ordinary node according to the ratio of ownership and benefit by voting;
② if there are N super nodes in the distribution network, it includes 1 main node and N-1 accounting nodes, the main node is elected by super node in turn;
③ at each billing time, the master node first initiates a proposal for the tile content, which is the final tile content issued once more than (2N +1)/3 billing nodes pass and agree to the proposal for this master node.
CN202010140076.XA 2020-03-03 2020-03-03 Block chain-based storage method Withdrawn CN111400748A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010140076.XA CN111400748A (en) 2020-03-03 2020-03-03 Block chain-based storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010140076.XA CN111400748A (en) 2020-03-03 2020-03-03 Block chain-based storage method

Publications (1)

Publication Number Publication Date
CN111400748A true CN111400748A (en) 2020-07-10

Family

ID=71434447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010140076.XA Withdrawn CN111400748A (en) 2020-03-03 2020-03-03 Block chain-based storage method

Country Status (1)

Country Link
CN (1) CN111400748A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127894A (en) * 2021-03-03 2021-07-16 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127894A (en) * 2021-03-03 2021-07-16 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system
CN113127894B (en) * 2021-03-03 2022-09-30 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system

Similar Documents

Publication Publication Date Title
CN108092982B (en) Data storage method and system based on alliance chain
CN109409122B (en) File storage method, electronic device and storage medium
Hanifatunnisa et al. Blockchain based e-voting recording system design
CN111046352B (en) Identity information security authorization system and method based on block chain
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN108985100B (en) Block chain-based element security certification method, device, equipment and medium
CN1831865B (en) Electronic bank safety authorization system and method based on CPK
CN106972931A (en) A kind of method of certificate transparence in PKI
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
CN109377363B (en) Block chain-based Internet of things data transaction architecture and transaction security method thereof
CN101136750A (en) Network real-name system implementing method
CN111709749A (en) Traceable blockchain transaction system with conditional privacy protection
CN110717759A (en) Cross-chain anchored block chain heterogeneous system
CN109816386A (en) Data get through method on a kind of chain of the unified identity authentication based on block chain
CN114900290A (en) Data transaction model and privacy protection method based on block chain
CN110750541A (en) Data storage indexing system and method based on block chain
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
CN110147666A (en) Lightweight NFC identity identifying method, Internet of Things communications platform under scenes of internet of things
CN112769758A (en) Credible Internet of things gas meter based on block chain and credible method of local and cloud
CN110188572A (en) A kind of verification method and device for consuming voucher applied to block chain
CN108777673A (en) One kind carrying out Bidirectional identity authentication method in block chain
CN108496194A (en) A kind of method, server-side and the system of verification terminal legality
CN115147224A (en) Transaction data sharing method and device based on alliance chain
CN114913013A (en) House renting transaction system and house renting transaction method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200710