CN111586109A - Block chain cloud storage user data deduplication solution - Google Patents
Block chain cloud storage user data deduplication solution Download PDFInfo
- Publication number
- CN111586109A CN111586109A CN202010306636.4A CN202010306636A CN111586109A CN 111586109 A CN111586109 A CN 111586109A CN 202010306636 A CN202010306636 A CN 202010306636A CN 111586109 A CN111586109 A CN 111586109A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- block chain
- file
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
- G06F16/1748—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
A solution for removing duplication of block chain cloud storage user data is totally divided into five steps, namely, step A: the client side establishes a block chain client side operation environment and a downloading operation frame through an application establishing unit in the PC; and B: a client cuts and fragments a file to be uploaded by an application fragment cutting unit in the client; c, the client performs Hash processing on the data after the slicing through an application data processing unit in the client and uploads the data to be submitted through a block chain; step D, the cloud block chain storage node checks the Hash list submitted by the client and filters the stored file fragmentation information according to the Hash value; and E, the data processing unit of the client is a file fragment Hash value to generate a Merkle tree root, and a Merkle tree verification method is adopted to verify whether the data stored in the block chain by the client is complete and available. The invention can efficiently solve the backtracking of the historical version of the user data and greatly improve the deduplication efficiency of the user data. Based on the above, the invention has good application prospect.
Description
Technical Field
The invention relates to the field of block chain application, in particular to a block chain cloud storage user data deduplication solution.
Background
The cloud storage refers to that a large number of different types of storage devices in a network are collected through virtualization software to cooperatively work through cluster application, a grid technology or a distributed file system, and the functions of data storage and service access are provided for the outside, so that management and use of virtualized storage resources are realized.
At present, manufacturers providing centralized cloud storage and cloud computing, such as hundredth cloud disks, Tencent micro clouds, Ali clouds and the like, still use the traditional centralized service mode, the centralized cloud storage service is easy to realize and popularize, but the centralized cloud storage service has obvious defects, the construction of a centralized platform needs to consume a large amount of manpower and material resources, the operation cost is high, and the centralized platform needs to be continuously expanded and strengthened to meet the speed requirement of data exchange and sharing along with the increase of the cloud storage requirement in a network. More importantly, based on the traditional centralized service mode, in practical application, the user data deduplication efficiency is low, and meanwhile, the backtracking and tracking of the historical version of the user file data are not supported, so that certain limitations exist.
Disclosure of Invention
In order to overcome the defects that a large amount of manpower and material resources are consumed for building a centralized platform, the operation cost is high, the user data deduplication efficiency is low and the backtracking and the tracking of the historical version of the user file data are not supported in the existing cloud storage due to the adoption of a centralized service mode, the block chain based cloud storage user data deduplication solution is provided, has natural decentralized characteristics as a basis based on a block chain technology, adopts five steps altogether, realizes intercommunication and mutual trust among network nodes through a consensus algorithm, can efficiently solve the backtracking of the historical version of the user data by adopting data fragmentation and data Hash (Hash function algorithm), and greatly improves the user data deduplication efficiency.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a solution for removing duplication of block chain cloud storage user data is characterized by comprising five steps: the client side establishes a block chain client side operation environment and a downloading operation frame through an application establishing unit in the PC; and B: a client cuts and fragments a file to be uploaded through an application fragment cutting unit in the client, wherein in specific application, the fragment cutting unit of the client calls a Split (function) method and divides the file according to a division standard provided by a block chain; c, the client carries out Hash (Hash function) processing on the data after being cut and sliced by an application data processing unit in the client and uploads and submits the data through a block chain; step D, the cloud block chain storage node checks a Hash (Hash function) list submitted by the client, and filters the stored file fragmentation information according to the Hash value; and E, the data processing unit of the client is a file fragment Hash value to generate a Merkle tree root, and a Merkle tree verification method is adopted to verify whether the data stored in the block chain by the client is complete and available.
In the step A, the client side directly interacts with the block chain network, so that the whole cloud storage system achieves decentralized distributed autonomy; the client stores two parts of a Hash value and a data text in the block chain, the Hash value is stored in a consensus node in the block chain, and the data text is stored in a storage node in the block chain.
In the step B, the client cuts and segments the stored data, and the size and the number of the segments are dynamically adjusted according to the size of the user data and the block chain network.
In step C, an input of an arbitrary length (also called a pre-mapped pre-image) is converted into an output of a fixed length by a hash algorithm, and the output of the fixed length is a hash value.
In the step D, the client submits a Hash list of the file fragments to a consensus node in the block chain network, and the consensus node broadcasts data; the storage node which is responsible for storing in the block chain receives the broadcast data and compares the broadcast data with the locally stored data, if the same data exist, the storage node notifies the consensus node, the consensus node receives the data and notifies the client, the client data processing unit processes and filters the existing fragment data in the block chain, and the client does not need to upload again; the consensus node compares the Hash value of each fragment file, and the file fragments with the same Hash value cannot be stored repeatedly, so that the space for storing the files is greatly reduced, the files are more similar, the duplication rate is higher, and the backtracking of the historical version of the user data is realized.
In the step E, the Merkle tree can directly download and immediately verify a branch of the Merkle tree, in practical application, the file can be cut into small data blocks, if a block of data is damaged, the data block can be downloaded again only to meet the requirement, if the file is very large, the Merkle tree can download a branch at a time and then immediately verify the branch, and if the branch is verified, the client can download the data.
The invention has the beneficial effects that: the method is based on the block chain technology and has natural decentralized characteristics as a foundation, under the combined action of corresponding application units of a client and the like, the five steps are adopted altogether, intercommunication and mutual trust among network nodes are realized through a consensus algorithm, and by adopting data fragmentation and data Hash (Hash function algorithm), the backtracking of historical versions of user data can be efficiently solved, and the user data deduplication efficiency is greatly improved. Based on the above, the invention has good application prospect.
Drawings
The invention is further illustrated below with reference to the figures and examples.
FIG. 1 is a diagram illustrating the definition of a file structure in the blockchain technique according to the present invention.
FIG. 2 is a diagram illustrating Merkle tree root generation in the blockchain technique of the present invention.
FIG. 3 is a diagram of Merkle tree nodes in the block chain technique of the present invention.
Fig. 4 is a schematic diagram of a user file uploading process according to the present invention.
FIG. 5 is a block diagram illustration of the workflow of the present invention.
Detailed Description
As shown in fig. 5, a solution for deduplication of block chain cloud storage user data is divided into five steps, where step a: the client side builds a block chain client side running environment and a downloading running frame through an application building unit in the PC, wherein a Visual Studio Code (editor) development tool needs to be downloaded, the client side is developed by using node.js (JavaScript running environment based on Chrome V8 engine), an Eclipse (extensible development platform) development tool, a JDK1.8 (software development kit) and a Java language development block chain are downloaded. In the step A, the client side directly interacts with the blockchain network, so that the whole cloud storage system achieves decentralized distributed autonomy; the client stores two parts of a Hash value and a data text in the block chain, the Hash value is stored in a consensus node in the block chain, and the data text is stored in a storage node in the block chain.
Shown in fig. 5, step B: in specific application, the fragment cutting unit of the client calls a Split (function) method to cut the file according to a cutting standard provided by a block chain. In step B, the client performs fragmentation on the stored data (for example, the total file is 100M, and the file is divided into 10 fragments with a size of 10M by fragmentation), and the size and the number of the fragments are dynamically adjusted according to the user data size and the block chain network.
In the step C, the client performs Hash (Hash function) processing on the data after being cut and segmented by an application data processing unit in the client, and uploads and submits the data by a block chain; the Hash process encodes as follows: const { SHA256} — require ('crypto-js'); var hash SHA256(message). In step C, Hash is carried out on the data after fragmentation, the Hash is generally translated into Hash, input with any length (also called pre-mapping pre-image) is converted into output with fixed length through a Hash algorithm, and the output with fixed length is a Hash value; the above-described transformation is a kind of compression mapping, i.e., the space of the hash value is usually much smaller than the space of the inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from the hash value; in short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length. In the embodiment, a third generation secure hash algorithm SHA-3 (also called Keccak algorithm) is adopted for calculation, Keccak adopts an innovative 'sponge engine' hash message text, and has the advantage of high speed, and the average speed under an Intel core 2 processor is 12.5 cycles per byte; the method also has the advantages of simple design and convenient hardware implementation; keccak applications have been able to withstand a minimum complexity of 2N attack (where N is the size of the hash), with a wide margin of security, and third party cryptanalysis has shown to date no serious weaknesses in Keccak.
In step D, as shown in fig. 5, the cloud blockchain storage node checks a Hash (Hash function) list submitted by the client, and filters the stored file fragmentation information according to the Hash value. In the step D, the client submits a Hash list of the file fragments to a consensus node in the block chain network, and the consensus node broadcasts data; the storage node responsible for storing in the block chain receives the broadcast data and compares the broadcast data with the locally stored data, and if the same data exist, the storage node notifies the consensus node; the consensus node receives the data to inform the client, and the client data processing unit processes and filters the existing fragments in the block chain without uploading again; for example: a user A stores 100M files, a user B stores 100M files, and the traditional file storage mode directly stores the respective 100M files of the user A and the user B, and the total is 200M files.
In the step E shown in FIG. 5, the data processing unit of the client is a file fragment Hash value, a Merkle tree root is generated, and a Merkle tree verification method is adopted to verify whether the data stored in the block chain by the client is complete and available. Merkle tree in step 5: dividing data into small data blocks at the bottommost layer, wherein corresponding hashes correspond to the data blocks, but moving upwards, combining two adjacent hashes into a character string instead of directly calculating root hashes, and calculating the hashes of the character string, so that a sub-hash is obtained after splicing every two hashes, if the total number of the hashes at the bottommost layer is singular, a single-body hash is inevitably generated at last, and the situation directly performs hash calculation on the sub-hashes, so that the sub-hashes can be obtained; further, the same way is still used for pushing up, a smaller number of new primary hashes can be obtained, finally, an inverted tree is necessarily formed, and when the position of the tree root is reached, the generation is provided with one root hash, which is called as a Merkle tree root by the field personnel. The Merkle tree can be directly downloaded and a branch of the Merkle tree can be immediately verified. Because the root of the Merkle tree can cut the file into small chunks, if a chunk of data is corrupted, it is sufficient to download this chunk of data again only, if the file is very large, the Merkle tree can download one branch at a time and then verify this branch immediately, if the branch verifies, the data can be downloaded.
As shown in fig. 1, 2, 3 and 4, the specific implementation process of the present invention is as follows: 1, building a block chain client operation environment and a downloading operation frame, and directly interacting a client block chain network to enable the whole cloud storage system to achieve decentralized distributed autonomy; the client stores two parts of a Hash value and a data text in the block chain, the Hash value and the Merkel tree root are stored in the consensus node in the block chain, and the data text is stored in each storage node in the block chain; different users or the same user, the files with the same Hash value are fragmented, only one copy of the files is stored in the storage node, the purpose of removing the duplicate of the user data is achieved, and the backtracking of the historical version of the user data can be realized; and the user data is subjected to data integrity verification through a Merkle tree verification method. And 2, the client performs block chaining encapsulation on the Hash list and the Merkle tree root (see the home color part in FIG. 1) of the data to be stored, and establishes a block chain for each common node to facilitate management of the stored data. 3, checking whether the network storage data packet is complete and available for the block for storing the data by a Merkel tree checking method; the construction method of the Merkel tree is shown in FIGS. 2 and 3. As shown in fig. 4, the process of uploading files by the client is as follows: the client performs Hash on the fragmented data and stores a Hash value into a Hash list; the Hash list adopts a Merkle tree to generate tree root HASH; the client submits the Hash list and the tree root Hash after the file fragmentation to a block chain network, the block chain network broadcasts the Hash list submitted by the client in the block chain network, and each storage node receives the Hash list broadcasted by the block chain and compares the locally stored Hash value; for the existing Hash value, broadcasting the Hash value to the block chain network, and informing the client side of the block chain receiving the Hash value existing in the block chain network; the client filters out the Hash in the existing block chain storage node, and only submits the fragment data corresponding to the Hash value which is not stored to the storage node. After the fragmented data is successfully stored, the client submits the Hash list and the tree root HASH to a block chain network, and the block chain network packs the data to generate blocks and connects the blocks to a main chain. And finishing uploading the user data.
As shown in fig. 1, 2, 3, 4, and 5, the present invention has a natural decentralized feature as a basis based on a block chain technology, and under the combined action of corresponding application units of a client, the present invention totally adopts five steps, realizes intercommunication and mutual trust between network nodes through a consensus algorithm, and adopts data fragmentation and data Hash (Hash function algorithm), so as to efficiently solve backtracking of a historical version of user data, and greatly improve the deduplication efficiency of the user data.
While there have been shown and described what are at present considered to be the essential features of the invention and advantages thereof, it will be apparent to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, but is capable of other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (6)
1. A solution for removing duplication of block chain cloud storage user data is characterized by comprising five steps: the client side establishes a block chain client side operation environment and a downloading operation frame through an application establishing unit in the PC; and B: a client cuts and fragments a file to be uploaded through an application fragment cutting unit in the client, wherein in specific application, the fragment cutting unit of the client calls a Split method and divides the file according to a division standard provided by a block chain; c, the client performs Hash processing on the data after the slicing through an application data processing unit in the client and uploads the data to be submitted through a block chain; step D, the cloud block chain storage node checks the Hash list submitted by the client and filters the stored file fragmentation information according to the Hash value; and E, the data processing unit of the client is a file fragment Hash value to generate a Merkle tree root, and a Merkle tree verification method is adopted to verify whether the data stored in the block chain by the client is complete and available.
2. The blockchain cloud storage user data deduplication solution of claim 1, wherein in the step a, the client directly interacts with the blockchain network, so that the whole cloud storage system achieves decentralized distributed autonomy; the client stores two parts of a Hash value and a data text in the block chain, the Hash value is stored in a consensus node in the block chain, and the data text is stored in a storage node in the block chain.
3. The solution of claim 1, wherein in step B, the client performs fragmentation on the stored data, and the size and number of the fragmentation are dynamically adjusted according to the user data size and the blockchain network.
4. The solution of claim 1, wherein in step C, an input with an arbitrary length is converted into an output with a fixed length by a hash algorithm, and the output with the fixed length is a hash value.
5. The solution of claim 1, wherein in step D, the client submits a Hash list of file fragments to a consensus node in the blockchain network, and the consensus node broadcasts data; the storage node which is responsible for storing in the block chain receives the broadcast data and compares the broadcast data with the locally stored data, if the same data exist, the storage node notifies the consensus node, the consensus node receives the data and notifies the client, the client data processing unit processes and filters the existing fragment data in the block chain, and the client does not need to upload again; the consensus node compares the Hash value of each fragment file, and the file fragments with the same Hash value cannot be stored repeatedly, so that the space for storing the files is greatly reduced, the files are more similar, the duplication rate is higher, and the backtracking of the historical version of the user data is realized.
6. The solution of claim 1, wherein in step E, the Merkle tree can directly download and immediately verify a branch of the Merkle tree, in practical applications, the file can be cut into small data blocks, if a piece of data is damaged, the data block can be downloaded again only to meet the requirement, if the file is very large, the Merkle tree can download a branch at a time, and then immediately verify the branch, and if the branch is verified, the client can download the data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010306636.4A CN111586109B (en) | 2020-04-17 | 2020-04-17 | Block chain cloud storage user data deduplication solution method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010306636.4A CN111586109B (en) | 2020-04-17 | 2020-04-17 | Block chain cloud storage user data deduplication solution method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111586109A true CN111586109A (en) | 2020-08-25 |
CN111586109B CN111586109B (en) | 2023-04-28 |
Family
ID=72122453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010306636.4A Active CN111586109B (en) | 2020-04-17 | 2020-04-17 | Block chain cloud storage user data deduplication solution method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111586109B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112181297A (en) * | 2020-09-24 | 2021-01-05 | 普华云创科技(北京)有限公司 | Distributed file slice generation and storage system and control method thereof |
CN113961149A (en) * | 2021-10-29 | 2022-01-21 | 国网江苏省电力有限公司营销服务中心 | Multi-state data storage system and storage method for power information system |
CN115085900A (en) * | 2022-08-22 | 2022-09-20 | 四川汉唐云分布式存储技术有限公司 | Homomorphic encryption method based on distributed storage |
WO2023029917A1 (en) * | 2021-08-31 | 2023-03-09 | 华为技术有限公司 | Data fragmentation method and apparatus, and electronic device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106534317A (en) * | 2016-11-17 | 2017-03-22 | 杭州云象网络技术有限公司 | Disaster recovery cloud storage system construction method based on block chain technology |
CN109829326A (en) * | 2018-11-20 | 2019-05-31 | 西安电子科技大学 | Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain |
EP3496332A1 (en) * | 2017-12-07 | 2019-06-12 | NEC Laboratories Europe GmbH | Method and system for securely sharing validation information using blockchain technology |
KR101993293B1 (en) * | 2018-10-05 | 2019-09-30 | 비즈플레이 주식회사 | System and method for processing expense data based on blockchain and computer program for the same |
CN110310203A (en) * | 2019-06-21 | 2019-10-08 | 普洛斯科技(重庆)有限公司 | A kind of block chain method of commerce and device |
CN110399338A (en) * | 2019-04-13 | 2019-11-01 | 西安电子科技大学 | Distributed document directory system and method, cloud storage service device based on block chain |
CN110647503A (en) * | 2019-10-09 | 2020-01-03 | 重庆特斯联智慧科技股份有限公司 | Distributed storage method and device |
CN110912937A (en) * | 2019-12-23 | 2020-03-24 | 杭州中科先进技术研究院有限公司 | Block chain-based digital certificate storage platform and certificate storage method |
-
2020
- 2020-04-17 CN CN202010306636.4A patent/CN111586109B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106534317A (en) * | 2016-11-17 | 2017-03-22 | 杭州云象网络技术有限公司 | Disaster recovery cloud storage system construction method based on block chain technology |
EP3496332A1 (en) * | 2017-12-07 | 2019-06-12 | NEC Laboratories Europe GmbH | Method and system for securely sharing validation information using blockchain technology |
KR101993293B1 (en) * | 2018-10-05 | 2019-09-30 | 비즈플레이 주식회사 | System and method for processing expense data based on blockchain and computer program for the same |
CN109829326A (en) * | 2018-11-20 | 2019-05-31 | 西安电子科技大学 | Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain |
CN110399338A (en) * | 2019-04-13 | 2019-11-01 | 西安电子科技大学 | Distributed document directory system and method, cloud storage service device based on block chain |
CN110310203A (en) * | 2019-06-21 | 2019-10-08 | 普洛斯科技(重庆)有限公司 | A kind of block chain method of commerce and device |
CN110647503A (en) * | 2019-10-09 | 2020-01-03 | 重庆特斯联智慧科技股份有限公司 | Distributed storage method and device |
CN110912937A (en) * | 2019-12-23 | 2020-03-24 | 杭州中科先进技术研究院有限公司 | Block chain-based digital certificate storage platform and certificate storage method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112181297A (en) * | 2020-09-24 | 2021-01-05 | 普华云创科技(北京)有限公司 | Distributed file slice generation and storage system and control method thereof |
WO2023029917A1 (en) * | 2021-08-31 | 2023-03-09 | 华为技术有限公司 | Data fragmentation method and apparatus, and electronic device |
CN113961149A (en) * | 2021-10-29 | 2022-01-21 | 国网江苏省电力有限公司营销服务中心 | Multi-state data storage system and storage method for power information system |
CN113961149B (en) * | 2021-10-29 | 2024-01-26 | 国网江苏省电力有限公司营销服务中心 | Polymorphic data storage system and method for electric power information system |
CN115085900A (en) * | 2022-08-22 | 2022-09-20 | 四川汉唐云分布式存储技术有限公司 | Homomorphic encryption method based on distributed storage |
Also Published As
Publication number | Publication date |
---|---|
CN111586109B (en) | 2023-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111586109A (en) | Block chain cloud storage user data deduplication solution | |
US20150237113A1 (en) | Method and system for file transmission | |
CN103916479B (en) | Cloud synchronous local area network accelerating system based on working group document | |
CN110009201B (en) | Electric power data link system and method based on block chain technology | |
CN106161633B (en) | Transmission method and system for packed files based on cloud computing environment | |
CN112615899A (en) | Large file transmission method, device and system | |
CN104573064B (en) | A kind of data processing method under big data environment | |
CN111428271A (en) | Block chain cloud storage user data security solution method | |
US10210164B2 (en) | Systems and methods for data archival | |
Akter et al. | Performance analysis of personal cloud storage services for mobile multimedia health record management | |
CN104378234A (en) | Cross-data-center data transmission processing method and system | |
CN112416396B (en) | Application program updating method and system | |
CN104219298A (en) | Cluster system and data backup method thereof | |
US20230106697A1 (en) | Commit sets in a kubernetes environment | |
CN111984611A (en) | Online automatic processing and sharing method for power grid information model and application end | |
CN109062501A (en) | A kind of Dropbox polymerization based on IDA algorithm | |
Zhuang et al. | Optimizing information leakage in multicloud storage services | |
CN108897497B (en) | Centerless data management method and device | |
Huang et al. | Real-time energy data compression strategy for reducing data traffic based on smart grid AMI networks | |
CN111162938A (en) | Data processing system and method | |
US10348828B2 (en) | Method and apparatus for optimizing data transfers utilizing machine learning | |
CN114138715A (en) | Family client-oriented cloud storage method and system | |
CN114925044A (en) | Data synchronization method, device and equipment based on cloud storage and storage medium | |
CN114866533A (en) | File uploading method and device and electronic equipment | |
KR102425039B1 (en) | Apparatus and method for compressing data in distributed deep-learning environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |