CN112187834A - Block chain network node service system based on safe storage - Google Patents

Block chain network node service system based on safe storage Download PDF

Info

Publication number
CN112187834A
CN112187834A CN202011371091.1A CN202011371091A CN112187834A CN 112187834 A CN112187834 A CN 112187834A CN 202011371091 A CN202011371091 A CN 202011371091A CN 112187834 A CN112187834 A CN 112187834A
Authority
CN
China
Prior art keywords
storage
data
network node
module
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011371091.1A
Other languages
Chinese (zh)
Inventor
杨国忠
王君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Rongzer Information Technology Co Ltd
Original Assignee
Jiangsu Rongzer Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Rongzer Information Technology Co Ltd filed Critical Jiangsu Rongzer Information Technology Co Ltd
Priority to CN202011371091.1A priority Critical patent/CN112187834A/en
Publication of CN112187834A publication Critical patent/CN112187834A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a block chain network node service system based on safe storage, which relates to a block chain network node and belongs to the technical field of block chain network node service; the system comprises a data acquisition module, a data processing module, a data storage module, a server, a security detection module, a network node, a statistical module, an inquiry module and a registration login module; the data acquisition module is used for acquiring storage data stored in the network node by a user and sending the storage data to the data processing module; the data processing module identifies stored data to obtain a node address and processes the node address, and the registration login module is used for submitting personal information for registration through a mobile phone terminal and sending the personal information which is successfully registered to the server for storage; the personal information includes name, age, and identification number.

Description

Block chain network node service system based on safe storage
Technical Field
The invention relates to a block chain network node, in particular to a block chain network node service system based on safe storage, and belongs to the technical field of block chain network node service.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
The data storage object comprises temporary files generated in the processing process of the data stream or information needing to be searched in the processing process. Data is recorded in a certain format on a storage medium inside or outside the computer. The data store is named, which is to reflect the constituent meaning of the information features. The data flow reflects data flowing in the system and shows the characteristics of dynamic data; the data store reflects data that is static in the system, characterizing static data.
The existing data storage does not perform one-to-one data confidentiality aiming at a user, does not generate a special data extraction code aiming at the information of the data storage, and performs data security storage and extraction.
Therefore, a block chain network node service system based on safe storage is provided.
Disclosure of Invention
The invention aims to provide a block chain network node service system based on safe storage, which is used for solving the problems that the existing data storage does not carry out one-to-one data confidentiality aiming at users, does not generate a special data extraction code aiming at the information of the data storage, and carries out safe storage and extraction of data.
The purpose of the invention can be realized by the following technical scheme:
a block chain network node service system based on safe storage comprises a data acquisition module, a data processing module, a data storage module, a server, a safety detection module, a network node, a statistic module, an inquiry module and a registration login module;
the data acquisition module is used for acquiring storage data stored in the network node by a user and sending the storage data to the data processing module; the data processing module identifies the stored data to obtain a node address and processes the node address, and the specific processing steps are as follows:
the method comprises the following steps: marking the node address as i, i =1, … …, n; the stored data characteristics are labeled Wji, j =1, 2, … …,5;W1iIndicating the size of the stored data, W2iIndicating the storage time, W3iIndicating the storage time length; w4iRepresenting a storage format; w5iRepresenting a stored data name;
step two: processing the storage data of the network node, acquiring a plurality of data storage devices corresponding to the node address of the network node, and marking the data storage devices as primary selection storage devices;
step three: setting a storage threshold value corresponding to each primary selection storage device, and acquiring a block distribution value U corresponding to the network nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i
Step four: comparing the stored values of the network nodes with a value BiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected;
step five: marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk
Step six: using formulas
Figure 708215DEST_PATH_IMAGE001
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected;
step seven: marking the storage device to be selected with the largest distributed storage value as a selected storage device, sending the storage data to the selected storage device by the data processing module for storage, increasing the number of the stored data of the network node stored by the selected storage device by one, setting the storage number of the selected storage device as the block chain number of the network node, and sending the node address and the block chain number corresponding to the network node to the server by the data processing module;
the server receives the storage data of the network node and the block chain number sent by the data processing module and then combines the block chain number according to the time sequence to obtain a data extraction chain number of the network node; and sending the data extraction chain number to a mobile phone terminal of a user; the data storage module is used for storing network node storage data and comprises a plurality of data storage devices.
Preferably, the registration login module is used for submitting personal information for registration through a mobile phone terminal and sending the personal information which is successfully registered to the server for storage; the personal information includes name, age, and identification number.
Preferably, the query module is configured to query the stored data of the network node by the user through the mobile phone terminal, and the specific query steps are as follows:
s1: a user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user;
s2: the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number;
s3: the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
Preferably, the statistical module is used for collecting the position, the storage number and the remaining storage space of the data storage device in the data storage module and sending the position, the storage number and the remaining storage space to the server.
Preferably, the server further includes a network node calculation module, and the network node calculation module is configured to calculate a block distribution value of the network node, and the specific calculation steps are as follows:
obtaining the total number of the stored data orders of the network node, and recording as Gi(ii) a Cleaning network nodesThe total number of deposits is marked Hi
Using formula Ui=Gi×b8+HiObtaining the block distribution value U corresponding to the network node by the x b7i(ii) a Wherein b7 and b8 are both preset proportionality coefficients;
and the network node calculation module sends the block distribution value corresponding to the network node to the server for storage.
Preferably, the security detection module is configured to detect the secure storage of the blockchain network node, and a specific detection process includes the following steps:
w1: calculating a digital abstract of a storage file in a block chain network node through a Hash algorithm;
w2: comparing the digital abstract obtained by calculation with a digital abstract of a corresponding file in a digital abstract database;
w3: counting the proportion of the number of the digital abstracts to the total number of the files, which is different from the comparison result of the digital abstracts and the digital abstracts database, and marking the number as Ej;
q4: by the formula
Figure 180785DEST_PATH_IMAGE002
Acquiring a virus threat coefficient B which is a fixed value of a preset proportionality coefficient; wherein Vj is the operating speed;
q5: when the virus threat coefficient B is less than or equal to the preset virus threat coefficient, the safety detection module does not respond; when the virus threat coefficient is larger than a preset virus threat coefficient, the safety detection module sends a virus attack instruction to the server;
q6: and sending the virus threat coefficient and the record for sending the virus attack instruction to a data storage module through a server.
Preferably, the block chain network node service process based on the secure storage comprises the following steps:
a, processing the storage data of the network node through a data processing module, acquiring a plurality of data storage devices corresponding to the node address of the network node, and marking the data storage devices as primary selection storage devices; setting a storage threshold value corresponding to each primary selection storage device to acquire the networkBlock distribution value U corresponding to nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i
Step B, comparing the stored comparison value B of the network nodeiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected; marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk
Step C, using a formula
Figure 356552DEST_PATH_IMAGE003
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected; marking the storage device to be selected with the largest distributed storage value as a selected storage device, sending the storage data to the selected storage device by the data processing module for storage, increasing the number of the stored data of the network node stored by the selected storage device by one, setting the storage number of the selected storage device as the block chain number of the network node, and sending the node address and the block chain number corresponding to the network node to the server by the data processing module;
step D: a user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user; the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number; the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
Compared with the prior art, the invention has the beneficial effects that:
1. the data acquisition module is used for acquiring storage data stored in the network node by a user and sending the storage data to the data processing module; the data processing module identifies the stored data to obtain and process a node address, marks the node address as i, and marks the characteristics of the stored data as Wji and W1iIndicating the size of the stored data, W2iIndicating the storage time, W3iIndicating the storage time length; w4iRepresenting a storage format; w5iRepresenting a stored data name; processing the storage data of the network node, acquiring a plurality of data storage devices corresponding to the node address of the network node, and marking the data storage devices as primary selection storage devices; setting a storage threshold value corresponding to each primary selection storage device, and acquiring a block distribution value U corresponding to the network nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i(ii) a Comparing the stored values of the network nodes with a value BiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected; marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk(ii) a Using formulas
Figure 281782DEST_PATH_IMAGE004
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected; marking the storage device to be selected with the maximum distributed storage value as the selected storage device, sending the storage data to the selected storage device by the data processing module for storage, increasing the number of the stored data of the network node stored by the selected storage device by one, and storing the selected storage deviceThe storage number of the device is the block chain number of the network node, and the data processing module sends the node address and the block chain number corresponding to the network node to the server.
2. The safety detection module is used for detecting the safety storage of the block chain network node and calculating a digital abstract of a storage file in the block chain network node through a Hash algorithm; comparing the digital abstract obtained by calculation with a digital abstract of a corresponding file in a digital abstract database; counting the proportion of the number of the digital abstracts to the total number of the files, which is different from the comparison result of the digital abstracts and the digital abstracts database, and marking the number as Ej; by the formula
Figure 568407DEST_PATH_IMAGE005
Acquiring a virus threat coefficient B which is a fixed value of a preset proportionality coefficient; when the virus threat coefficient B is less than or equal to the preset virus threat coefficient, the safety detection module does not respond; when the virus threat coefficient is larger than a preset virus threat coefficient, the safety detection module sends a virus attack instruction to the server; and sending the virus threat coefficient and the record for sending the virus attack instruction to a data storage module through a server.
3. A user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user; the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number; the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A network node refers to a computer or other device connected to a network having an independent address and having the function of transmitting or receiving data. The nodes may be workstations, clients, network users or personal computers, servers, printers and other network-connected devices. Each workstation, server, terminal device, network device, i.e. the device having its own unique network address, is a network node. The whole network is composed of a great number of network nodes, and the network nodes are connected by communication lines to form a certain geometrical relationship, namely a computer network topology.
Referring to fig. 1, a block chain network node service system based on secure storage includes a data acquisition module, a data processing module, a data storage module, a server, a security detection module, a network node, a statistics module, an inquiry module, and a registration module;
the data acquisition module is used for acquiring storage data stored in the network node by a user and sending the storage data to the data processing module; the data processing module identifies the stored data to obtain a node address and processes the node address, and the specific processing steps are as follows:
the method comprises the following steps: marking the node address as i, i =1, … …, n; the stored data characteristics are labeled Wji, j =1, 2, … …, 5; w1iIndicating the size of the stored data, W2iIndicating the storage time, W3iIndicating the storage time length; w4iRepresenting a storage format; w5iRepresenting a stored data name;
step two: processing the storage data of the network node, acquiring a plurality of data storage devices corresponding to the node address of the network node, and marking the data storage devices as primary selection storage devices;
step three: setting a storage threshold value corresponding to each primary selection storage device, and acquiring a block distribution value U corresponding to the network nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i
Step four: comparing the stored values of the network nodes with a value BiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected;
step five: marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk
Step six: using formulas
Figure 629904DEST_PATH_IMAGE006
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected;
step seven: marking the storage device to be selected with the largest distributed storage value as a selected storage device, sending the storage data to the selected storage device by the data processing module for storage, increasing the number of the stored data of the network node stored by the selected storage device by one, setting the storage number of the selected storage device as the block chain number of the network node, and sending the node address and the block chain number corresponding to the network node to the server by the data processing module;
the server receives the storage data of the network node and the block chain number sent by the data processing module and then combines the block chain number according to the time sequence to obtain a data extraction chain number of the network node; and sending the data extraction chain number to a mobile phone terminal of a user; the data storage module is used for storing network node storage data and comprises a plurality of data storage devices.
The registration login module is used for submitting personal information for registration through a mobile phone terminal by a user and sending the personal information which is successfully registered to the server for storage; the personal information includes name, age, and identification number.
The query module is used for a user to query the stored data of the network node through a mobile phone terminal, and comprises the following specific query steps:
s1: a user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user;
s2: the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number;
s3: the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
The statistical module is used for acquiring the position, the storage number and the residual storage space of the data storage equipment in the data storage module and sending the position, the storage number and the residual storage space to the server.
The server also comprises a network node calculation module, wherein the network node calculation module is used for calculating the block distribution value of the network node, and the specific calculation steps are as follows:
obtaining the total number of the stored data orders of the network node, and recording as Gi(ii) a Marking the clearing total number of the network node as Hi
Using formula Ui=Gi×b8+HiObtaining the block distribution value U corresponding to the network node by the x b7i(ii) a Wherein b7 and b8 are both preset proportionality coefficients;
and the network node calculation module sends the block distribution value corresponding to the network node to the server for storage.
The security detection module is used for detecting the security storage of the blockchain network node, and the specific detection process comprises the following steps:
w1: calculating a digital abstract of a storage file in a block chain network node through a Hash algorithm;
w2: comparing the digital abstract obtained by calculation with a digital abstract of a corresponding file in a digital abstract database;
w3: counting the proportion of the number of the digital abstracts to the total number of the files, which is different from the comparison result of the digital abstracts and the digital abstracts database, and marking the number as Ej;
q4: by the formula
Figure 914255DEST_PATH_IMAGE007
Acquiring a virus threat coefficient B which is a fixed value of a preset proportionality coefficient; wherein Vj is the operating speed;
q5: when the virus threat coefficient B is less than or equal to the preset virus threat coefficient, the safety detection module does not respond; when the virus threat coefficient is larger than a preset virus threat coefficient, the safety detection module sends a virus attack instruction to the server;
q6: and sending the virus threat coefficient and the record for sending the virus attack instruction to a data storage module through a server.
The above formulas are all calculated by taking the numerical value of the dimension, the formula is a formula which obtains the latest real situation by acquiring a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
The working principle of the invention is as follows: the block chain network node service process based on the safe storage comprises the following steps:
step A, processing the storage data of the network node through a data processing module to obtain the network nodeThe plurality of data storage devices corresponding to the node address of (1) are marked as primary selection storage devices; setting a storage threshold value corresponding to each primary selection storage device, and acquiring a block distribution value U corresponding to the network nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i
Step B, comparing the stored comparison value B of the network nodeiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected; marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk
Step C, using a formula
Figure 890563DEST_PATH_IMAGE008
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected; marking the storage device to be selected with the largest distributed storage value as a selected storage device, sending the storage data to the selected storage device by the data processing module for storage, increasing the number of the stored data of the network node stored by the selected storage device by one, setting the storage number of the selected storage device as the block chain number of the network node, and sending the node address and the block chain number corresponding to the network node to the server by the data processing module;
step D: a user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user; the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number; the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (7)

1. A block chain network node service system based on safe storage is characterized by comprising a data acquisition module, a data processing module, a data storage module, a server, a safety detection module, a network node, a statistic module, an inquiry module and a registration login module;
the security detection module is used for detecting the security storage of the block chain network node, and the specific detection process comprises the following steps:
w1: calculating a digital abstract of a storage file in a block chain network node through a Hash algorithm;
w2: comparing the digital abstract obtained by calculation with a digital abstract of a corresponding file in a digital abstract database;
w3: counting the proportion of the number of the digital abstracts to the total number of the files, which is different from the comparison result of the digital abstracts and the digital abstracts database, and marking the number as Ej;
q4: by the formula
Figure 728070DEST_PATH_IMAGE001
Acquiring a virus threat coefficient B which is a fixed value of a preset proportionality coefficient; wherein Vj is the operating speed;
q5: when the virus threat coefficient B is less than or equal to the preset virus threat coefficient, the safety detection module does not respond; when the virus threat coefficient is larger than a preset virus threat coefficient, the safety detection module sends a virus attack instruction to the server;
q6: and sending the virus threat coefficient and the record for sending the virus attack instruction to a data storage module through a server.
2. A block chain network node service system based on secure storage according to claim 1, wherein the registration login module is configured to submit personal information through a mobile phone terminal for registration and send the personal information that is successfully registered to the server for storage; the personal information includes name, age, and identification number.
3. A block chain network node service system based on secure storage according to claim 1, wherein the query module is configured to query the storage data of the network node through a mobile phone terminal, and the specific query steps are as follows:
s1: a user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user;
s2: the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number;
s3: the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
4. A block chain network node service system based on secure storage as claimed in claim 1, wherein the statistics module is configured to collect and send the location, storage number and remaining storage space of the data storage device in the data storage module to the server.
5. The system according to claim 1, wherein the server further includes a network node calculation module, and the network node calculation module is configured to calculate a block distribution value of the network node, and the specific calculation steps are as follows:
obtaining the total number of the stored data orders of the network node, and recording as Gi(ii) a Marking the clearing total number of the network node as Hi
Using formula Ui=Gi×b8+HiObtaining the block distribution value U corresponding to the network node by the x b7i(ii) a Wherein b7 and b8 are both preset proportionality coefficients;
and the network node calculation module sends the block distribution value corresponding to the network node to the server for storage.
6. A block chain network node service system based on secure storage according to claim 1, wherein the data collection module is configured to collect the storage data stored in the network node by the user and send the storage data to the data processing module; the data processing module identifies the stored data to obtain the node address and processes the node address, and the specific processing steps are as follows:
the method comprises the following steps: marking the node address as i, i =1, … …, n; the stored data characteristics are labeled Wji, j =1, 2, … …, 5; w1iIndicating the size of the stored data, W2iIndicating the storage time, W3iIndicating the storage time length;W4irepresenting a storage format; w5iRepresenting a stored data name;
step two: processing the storage data of the network node, acquiring a plurality of data storage devices corresponding to the node address of the network node, and marking the data storage devices as primary selection storage devices;
step three: setting a storage threshold value corresponding to each primary selection storage device, and acquiring a block distribution value U corresponding to the network nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i(ii) a b1 is a preset coefficient fixed value;
step four: comparing the stored values of the network nodes with a value BiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected;
step five: marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk
Step six: using formulas
Figure 214546DEST_PATH_IMAGE002
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected;
step seven: marking the storage device to be selected with the largest distributed storage value as a selected storage device, sending the storage data to the selected storage device by the data processing module for storage, increasing the number of the stored data of the network node stored by the selected storage device by one, setting the storage number of the selected storage device as the block chain number of the network node, and sending the node address and the block chain number corresponding to the network node to the server by the data processing module;
the server receives the storage data of the network node and the block chain number sent by the data processing module and then combines the block chain number according to the time sequence to obtain a data extraction chain number of the network node; and sending the data extraction chain number to a mobile phone terminal of a user; the data storage module is used for storing network node storage data and comprises a plurality of data storage devices.
7. A secure storage based blockchain network node servicing system according to claim 1, wherein the secure storage based blockchain network node servicing procedure comprises the steps of:
a, processing the storage data of the network node through a data processing module, acquiring a plurality of data storage devices corresponding to the node address of the network node, and marking the data storage devices as primary selection storage devices; setting a storage threshold value corresponding to each primary selection storage device, and acquiring a block distribution value U corresponding to the network nodei(ii) a Using formula Bi=UiObtaining the stored comparison value B of the network node by x B1i
Step B, comparing the stored comparison value B of the network nodeiPerforming difference calculation with the storage threshold value of the primary selection storage device, taking an absolute value, and taking the primary selection storage device with the absolute value smaller than a preset value as a storage device to be selected; marking the storage devices to be selected as Fk, wherein k =1, … … and n; setting the residual storage space of the storage device to be selected as NFk(ii) a Calculating the distance difference between the position of the storage device to be selected and the node address of the network node to obtain the area distribution distance, and marking the area distribution distance as DFk
Step C, using a formula
Figure 37008DEST_PATH_IMAGE003
Obtaining and obtaining distributed storage value P of to-be-selected storage deviceFk(ii) a Wherein b2, b3 and b4 are all preset proportionality coefficients, MFkStoring data quantity for stored network nodes of the network nodes corresponding to the storage equipment to be selected; marking the selected storage device with the maximum distributed storage value as the selected storage device, and storing the selected storage device by the data processing moduleData are sent to a selected storage device for storage, the number of the stored data of the network node stored by the selected storage device is increased by one, the storage number of the selected storage device is the block chain number of the network node, and a data processing module sends the node address and the block chain number corresponding to the network node to a server;
step D: a user inputs a query instruction through a mobile phone terminal and sends the query instruction to a query module, and the query module receives the query instruction and acquires personal information of the user; the query module sends the personal information of the user to the server, the server outputs a data extraction chain number input signal after receiving a query instruction, and the user inputs the data extraction chain number; the server sequentially acquires the data extraction chain numbers from the data storage module according to the block chain numbers to store the storage data corresponding to the block chain numbers, and then sends the corresponding storage data to the query module; and the query module receives the stored data and sends the stored data to the corresponding mobile phone terminal.
CN202011371091.1A 2020-11-30 2020-11-30 Block chain network node service system based on safe storage Pending CN112187834A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011371091.1A CN112187834A (en) 2020-11-30 2020-11-30 Block chain network node service system based on safe storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011371091.1A CN112187834A (en) 2020-11-30 2020-11-30 Block chain network node service system based on safe storage

Publications (1)

Publication Number Publication Date
CN112187834A true CN112187834A (en) 2021-01-05

Family

ID=73918220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011371091.1A Pending CN112187834A (en) 2020-11-30 2020-11-30 Block chain network node service system based on safe storage

Country Status (1)

Country Link
CN (1) CN112187834A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113011798A (en) * 2021-05-24 2021-06-22 江苏荣泽信息科技股份有限公司 Product detection information processing system based on block chain
CN113362024A (en) * 2021-06-03 2021-09-07 广州康辰科技有限公司 Application program development multi-module collaboration system based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324552A (en) * 2013-06-06 2013-09-25 西安交通大学 Two-stage single-instance data de-duplication backup method
CN107070943A (en) * 2017-05-05 2017-08-18 兰州理工大学 Industry internet intrusion detection method based on traffic characteristic figure and perception Hash
US20200213106A1 (en) * 2018-12-28 2020-07-02 Green It Korea Co., Ltd. Security service providing apparatus and method for supporting lightweight security scheme
CN111461620A (en) * 2020-04-09 2020-07-28 中振区块链(深圳)有限公司 Block chain-based distributed storage method and device for logistics data
CN111625595A (en) * 2020-04-28 2020-09-04 鼎链数字科技(深圳)有限公司 Block chain management method, system and storage medium based on self-starting crawler technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324552A (en) * 2013-06-06 2013-09-25 西安交通大学 Two-stage single-instance data de-duplication backup method
CN107070943A (en) * 2017-05-05 2017-08-18 兰州理工大学 Industry internet intrusion detection method based on traffic characteristic figure and perception Hash
US20200213106A1 (en) * 2018-12-28 2020-07-02 Green It Korea Co., Ltd. Security service providing apparatus and method for supporting lightweight security scheme
CN111461620A (en) * 2020-04-09 2020-07-28 中振区块链(深圳)有限公司 Block chain-based distributed storage method and device for logistics data
CN111625595A (en) * 2020-04-28 2020-09-04 鼎链数字科技(深圳)有限公司 Block chain management method, system and storage medium based on self-starting crawler technology

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113011798A (en) * 2021-05-24 2021-06-22 江苏荣泽信息科技股份有限公司 Product detection information processing system based on block chain
CN113011798B (en) * 2021-05-24 2021-08-13 江苏荣泽信息科技股份有限公司 Product detection information processing system based on block chain
CN113362024A (en) * 2021-06-03 2021-09-07 广州康辰科技有限公司 Application program development multi-module collaboration system based on block chain

Similar Documents

Publication Publication Date Title
CN107579956B (en) User behavior detection method and device
CN110417721B (en) Security risk assessment method, device, equipment and computer readable storage medium
CN111181901B (en) Abnormal flow detection device and abnormal flow detection method thereof
CN106888194A (en) Intelligent grid IT assets security monitoring systems based on distributed scheduling
CN109218304B (en) Network risk blocking method based on attack graph and co-evolution
CN111404914A (en) Ubiquitous power Internet of things terminal safety protection method under specific attack scene
CN112187834A (en) Block chain network node service system based on safe storage
CN115021997B (en) Network intrusion detection system based on machine learning
CN114615016B (en) Enterprise network security assessment method and device, mobile terminal and storage medium
CN114363064B (en) Dynamic data encryption strategy system for service adaptation of Internet of things
CN113706100B (en) Real-time detection and identification method and system for Internet of things terminal equipment of power distribution network
CN110933115A (en) Analysis object behavior abnormity detection method and device based on dynamic session
CN106203164B (en) Information security big data resource management system based on trust computing and cloud computing
CN113159866A (en) Method for building network user trust evaluation model in big data environment
CN115001934A (en) Industrial control safety risk analysis system and method
CN113988183A (en) Computer network data flow monitoring system and method
CN113868509A (en) Science and technology policy data information consultation service system based on cloud computing
CN108833442A (en) A kind of distributed network security monitoring device and its method
CN113506096B (en) Inter-system interface method based on industrial internet identification analysis system
Harbola et al. Improved intrusion detection in DDoS applying feature selection using rank & score of attributes in KDD-99 data set
CN111709021B (en) Attack event identification method based on mass alarms and electronic device
CN116155581A (en) Network intrusion detection method and device based on graph neural network
Dong et al. Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet.
CN114969450A (en) User behavior analysis method, device, equipment and storage medium
Zhou et al. Fingerprinting IIoT devices through machine learning techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105

RJ01 Rejection of invention patent application after publication