CN112861162B - Block chain storage safety guarantee system based on distributed storage - Google Patents

Block chain storage safety guarantee system based on distributed storage Download PDF

Info

Publication number
CN112861162B
CN112861162B CN202110275121.7A CN202110275121A CN112861162B CN 112861162 B CN112861162 B CN 112861162B CN 202110275121 A CN202110275121 A CN 202110275121A CN 112861162 B CN112861162 B CN 112861162B
Authority
CN
China
Prior art keywords
module
user
file
storage
receiving end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110275121.7A
Other languages
Chinese (zh)
Other versions
CN112861162A (en
Inventor
周明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Internet Online Cloud Computing Co ltd
Original Assignee
Shenzhen Internet Online Cloud Computing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Internet Online Cloud Computing Co ltd filed Critical Shenzhen Internet Online Cloud Computing Co ltd
Priority to CN202110275121.7A priority Critical patent/CN112861162B/en
Publication of CN112861162A publication Critical patent/CN112861162A/en
Application granted granted Critical
Publication of CN112861162B publication Critical patent/CN112861162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention relates to the technical field of computer distributed storage, and discloses a block chain storage safety guarantee system based on distributed storage, which comprises a user login module, wherein a transmitting end signal of the user login module is connected with a receiving end of a user information encryption module, a user information registration module and a receiving end of a user information recovery module, and the transmitting ends signal of the user information encryption module, the user information registration module and the user information recovery module are connected with a receiving end of a central processing module. According to the block chain storage safety guarantee system based on distributed storage, the user file encryption public key verification module is used for carrying out first verification, the user file encryption private key verification module is set for carrying out second verification, so that the protection function is more powerful, when the user file encryption private key verification module cannot pass, the file locking module locks the file, and the system can lock the file when the user file encryption private key verification module is not used by a user, so that user file data leakage is prevented.

Description

Block chain storage safety guarantee system based on distributed storage
Technical Field
The invention relates to the technical field of computer distributed storage, in particular to a block chain storage security guarantee system based on distributed storage.
Background
Blockchains are a term of art in information technology. Essentially, the block chain technology is a shared database, data or information stored in the shared database has the characteristics of 'non-falsifiability', 'whole trace', 'traceability', 'disclosure transparency', 'collective maintenance', and the like, based on the characteristics, a solid 'trust' foundation is laid by the block chain technology, a reliable 'cooperation' mechanism is created, and the block chain technology has wide application prospect.
The existing blockchain storage safety cannot be guaranteed, and some people open stored files by mistake, so that the privacy of a user cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a block chain storage safety guarantee system based on distributed storage, which is used for solving the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the system comprises a user login module, wherein a user information encryption module, a user information registration module and a user information recovery module receiving end are connected with a user login module transmitting end signal, a center processing module receiving end is connected with a user information encryption module, a user information registration module and a user information recovery module transmitting end signal, an interstellar file system module receiving end is connected with a central processing module transmitting end signal, a secure shell protocol module receiving end is connected with an interstellar file system transmitting end signal, a secure shell protocol module transmitting end signal is connected with a hypertext transfer protocol module receiving end, a user space file system module receiving end is connected with a hypertext transfer protocol module transmitting end signal, and a block chain storage module is connected with a user space file system transmitting end signal.
Preferably, the transmitting end of the block chain storage module is in signal connection with the receiving ends of the user space file modification module, the user space file storage module and the user space file retrieving module.
Preferably, the transmitting end of the user space file modification module is in signal connection with the receiving ends of the user file encryption public key verification module and the user file encryption private key verification module, and the transmitting ends of the user file encryption public key verification module and the user file encryption private key verification module are in signal connection with the search positioning module and the redundancy removing module.
Preferably, the transmitting end of the user file encryption private key verification module is connected with the receiving ends of the file locking module and the file unlocking module in a signal manner.
Preferably, the user space file storage module transmitting end is in signal connection with a user file local storage module and a user file cloud storage module receiving end, and the user file cloud storage module transmitting end is in signal connection with a user file encryption public key module and a user file encryption private key module receiving end.
Preferably, the central processing module is one or more of a single chip microcomputer and a CPU.
Preferably, the transmitting end of the user file encryption public key verification module is in signal connection with the user file encryption private key verification module.
Preferably, the user file cloud storage module is one of a hundred-degree cloud disk and a messenger cloud.
Compared with the prior art, the invention provides a block chain storage security guarantee system based on distributed storage, which has the following beneficial effects:
1. according to the block chain storage safety guarantee system based on distributed storage, a user can be protected for the first time by setting the user file encryption public key module, so that outsiders can be prevented from opening files to snoop user privacy as much as possible.
2. According to the block chain storage security guarantee system based on distributed storage, a user can be secondarily protected by setting the user file encryption private key module, even if a hacker obtains the user file encryption public key module through a technical means to open a user folder, the user file encryption private key module set by the user can prevent outsiders from opening cloud storage files, and therefore the security of file data when the user uses is improved.
3. The block chain storage safety guarantee system based on distributed storage performs first verification through the user file encryption public key verification module, performs secondary verification through the user file encryption private key verification module, so that the protection function is more powerful, when the user file encryption private key verification module cannot pass, a file is locked by the file locking module until the user file encryption private key verification module passes through verification, the file unlocking module operates, so that the file is unlocked, and the system can lock the file when the user file encryption private key verification module is not used, so that user file data leakage is prevented.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed in the description of the embodiments will be briefly described below, it will be apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort to a person of ordinary skill in the art
FIG. 1 is a schematic diagram of the overall system of the present invention;
FIG. 2 is a schematic diagram of a system such as a central processing module and a user login module;
FIG. 3 is a schematic diagram illustrating the system configuration of the blockchain storage module of the present invention;
FIG. 4 is a schematic diagram illustrating the system configuration of the user space file modification module according to the present invention;
Fig. 5 is a schematic diagram of the cooperation of the system such as the user file encryption private key verification module.
In the figure: 1. a user login module; 2. a user information encryption module; 3. a user information registration module; 4. a user information retrieving module; 5. a central processing module; 6. an interstellar file system module; 7. a secure shell protocol module; 8. a hypertext transfer protocol module; 9. a user space file system module; 10. a blockchain storage module; 11. a user space file modification module; 111. a user file encryption public key verification module; 112. a user file encryption private key verification module; 1121. a file locking module; 1122. a file unlocking module; 113. searching and positioning modules; 114. a redundancy removing module; 12. a user space file storage module; 121. a local storage module of the user file; 122. a user file cloud storage module; 1221. a user file encryption public key module; 1222. a user file encryption private key module; 13. and a user space file retrieving module.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
Referring to fig. 1-5, the present invention provides a technical solution: the block chain storage safety guarantee system based on distributed storage comprises a user login module 1, wherein a transmitting end signal of the user login module 1 is connected with a receiving end of a user information encryption module 2, a user information registration module 3 and a receiving end of a user information recovery module 4, the transmitting ends of the user information encryption module 2, the user information registration module 3 and the user information recovery module 4 are connected with a receiving end of a central processing module 5, the central processing module 5 is one or more of a single chip microcomputer and a CPU, the transmitting end signal of the central processing module 5 is connected with a receiving end of an interstellar file system module 6, the transmitting end signal of the interstellar file system module 6 is connected with a receiving end of a security shell protocol module 7, the transmitting end signal of the security shell protocol module 7 is connected with a receiving end of a hypertext transfer protocol module 8, the transmitting end signal of the hypertext transfer protocol module 8 is connected with a receiving end of a user space file system module 9, the transmitting end signal of the user space file system module 9 is connected with the blockchain storage module 10, the transmitting end signal of the blockchain storage module 10 is connected with the receiving ends of the user space file modification module 11, the user space file storage module 12 and the user space file retrieving module 13, the transmitting end signal of the user space file modification module 11 is connected with the receiving ends of the user file encryption public key verification module 111 and the user file encryption private key verification module 112, the transmitting end signal of the user file encryption public key verification module 111 is connected with the user file encryption private key verification module 112, the transmitting end signal of the user file encryption public key verification module 111 and the user file encryption private key verification module 112 is connected with the search positioning module 113 and the redundancy removing module 114, the user file cloud storage module 122 is one of a hundred-degree cloud disk and a vacation micro cloud, the transmitting end of the user file encryption private key verification module 112 is connected with the file locking module 1121 and the file unlocking module 1122 in a signal manner, so that a user can be protected for the first time by setting the user file encryption public key module 1221, and further, an outsider can be prevented from opening a file to snoop user privacy, the transmitting end of the user space file preservation module 12 is connected with the user file local preservation module 121 and the receiving end of the user file cloud storage module 122 in a signal manner, the transmitting end of the user file cloud storage module 122 is connected with the user file encryption public key module 1221 and the receiving end of the user file encryption private key module 1222 in a signal manner, the user file encryption private key module 1222 can be protected for the second time by setting the user file encryption private key module 1222, even if a hacker obtains the user file encryption public key module 1221 through a technical means to open a user file folder, and the user file encryption private key module 1222 set by the user can be prevented from opening a cloud storage file, so that the safety of file data is improved when the user is used, the user file encryption public key verification module 111 is verified for the first time, the user file encryption private key verification module 112 is set for the second time, so that a protection function is stronger, and when the user file encryption private key verification module 112 is not verified by setting the user file encryption public key module 112, and the user file system is unlocked, and the user file system can be prevented from being unlocked when the user file encryption private key module is unlocked, and the user file is unlocked from being unlocked.
In the actual operation process, when the system is used, login can be carried out through the user login module 1, and simultaneously the user information encryption module 2 carries out encryption work on user information, if no user information exists, the user is registered through the set user information registration module 3, if the user login information is lost, the user login information can be retrieved through the set user information retrieval module 4, the data is uniformly transmitted to the interstar file system module 6 through the set central processing module 5, at this time, the user needs to confirm the security shell protocol module 7, the hypertext transfer protocol module 8 and the user space file system module 9, after the confirmation is passed, the information is transmitted to the inside of the block chain storage module 10, the user file local storage module 121 and the user file cloud storage module 122 can be independently selected through the user space file storage module 12, the encrypted public key obtained through the user file encryption public key module 1221 processing data is obtained after the storage, simultaneously the user file encryption private key module 1222 enables the user to set the encrypted private key, when the user file content needs to be modified or checked, the user file encryption public key verification module 111 carries out first verification, the user file encryption public key module 112 needs to be arranged, the user file protection private key protection module 112 is arranged, the user file protection module 112 is unlocked, the user file protection module 112 can be unlocked, the user file protection module is prevented from being locked, the user file protection module 112 can be unlocked, the user file protection module is unlocked, and the user file protection module is protected by the user file protection module is protected, when the user needs to modify, the user needs to locate a certain position or a certain keyword to locate the content, and the redundancy removing module 114 is arranged to locate the redundant repeated file data in the file, so that the redundant repeated file data can be selected and removed.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (2)

1. The block chain storage safety guarantee system based on distributed storage comprises a user login module (1), and is characterized in that: the system comprises a user login module (1), a user information encryption module (2), a user information registration module (3) and a user information retrieving module (4), wherein the user information encryption module (2), the user information registration module (3) and the user information retrieving module (4) are connected with a receiving end of a central processing module (5), the central processing module (5) is connected with a receiving end of an interstellar file system module (6) through a transmitting end signal, the interstellar file system module (6) is connected with a receiving end of a secure shell protocol module (7) through a transmitting end signal, the secure shell protocol module (7) is connected with a receiving end of a hypertext transfer protocol module (8), the hypertext transfer protocol module (8) is connected with a receiving end of a user space file system module (9), the transmitting end of the user space file system module (9) is connected with a block chain storage module (10), the transmitting end of the block chain storage module (10) is connected with a user space file modification module (11), the user space file storage module (12) is connected with a receiving end of a user space file storage module (13) through a transmitting end signal, the user space file (13) is authenticated by a receiving end of a user key (13) through a transmitting end signal, and the user key (11) is authenticated by a receiving end of the user file (11), the user file encryption public key verification module (111) transmitting end signal connection user file encryption private key verification module (112), user file encryption public key verification module (111) and user file encryption private key verification module (112) transmitting end signal connection search positioning module (113) and redundancy elimination module (114), user file cloud storage module (122) are hundred degree cloud disks or messenger micro clouds, user file encryption private key verification module (112) transmitting end signal connection file locking module (1121) and file unlocking module (1122) receiving end, user space file storage module (12) transmitting end signal connection user file local storage module (121) and user file cloud storage module (122) receiving end, user file cloud storage module (122) transmitting end signal connection user file encryption public key module (1221) and user file encryption private key module (1222) receiving end, user file encryption private key verification module (111) are set to carry out first verification, user file encryption private key verification module (112) are set to carry out second verification, user file encryption private key verification module (112) is connected to carry out locking module (1121) and unlocking file encryption key verification module (1122) can not be carried out when user file encryption private key verification module (112) passes through user file encryption key storage module (122) and user key storage module (122) transmitting end signal connection user file encryption public key verification module (122) can not be used to realize unlocking of the user file (1122) when the user file is unlocked.
2. The distributed storage-based blockchain storage security system of claim 1, wherein: the central processing module (5) is one or more of a singlechip and a CPU.
CN202110275121.7A 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage Active CN112861162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110275121.7A CN112861162B (en) 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110275121.7A CN112861162B (en) 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage

Publications (2)

Publication Number Publication Date
CN112861162A CN112861162A (en) 2021-05-28
CN112861162B true CN112861162B (en) 2024-05-03

Family

ID=75994457

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110275121.7A Active CN112861162B (en) 2021-03-15 2021-03-15 Block chain storage safety guarantee system based on distributed storage

Country Status (1)

Country Link
CN (1) CN112861162B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055253A (en) * 2017-12-06 2018-05-18 珠海格力电器股份有限公司 A kind of software login validation method, apparatus and system
CN108734029A (en) * 2018-05-23 2018-11-02 陈萍 A kind of approaches to IM and platform based on block chain and interspace file system
CN108924092A (en) * 2018-06-07 2018-11-30 北京航空航天大学 Based on block chain can open arbitration distribution cloud storage method and system
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110866273A (en) * 2019-11-09 2020-03-06 北京工业大学 Inter-enterprise standard consensus method based on block chain and interplanetary file system
CN111552955A (en) * 2020-04-29 2020-08-18 合肥井创数字科技有限公司 Personal identity authentication method and device based on block chain and IPFS
CN112235409A (en) * 2020-10-19 2021-01-15 平安证券股份有限公司 File uploading method and device, electronic equipment and computer readable storage medium
CN112347188A (en) * 2020-10-16 2021-02-09 零氪科技(北京)有限公司 Authorization and access auditing system and method based on private chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11212347B2 (en) * 2019-02-05 2021-12-28 S&P Global Inc. Private content storage with public blockchain metadata

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055253A (en) * 2017-12-06 2018-05-18 珠海格力电器股份有限公司 A kind of software login validation method, apparatus and system
CN108734029A (en) * 2018-05-23 2018-11-02 陈萍 A kind of approaches to IM and platform based on block chain and interspace file system
CN108924092A (en) * 2018-06-07 2018-11-30 北京航空航天大学 Based on block chain can open arbitration distribution cloud storage method and system
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110866273A (en) * 2019-11-09 2020-03-06 北京工业大学 Inter-enterprise standard consensus method based on block chain and interplanetary file system
CN111552955A (en) * 2020-04-29 2020-08-18 合肥井创数字科技有限公司 Personal identity authentication method and device based on block chain and IPFS
CN112347188A (en) * 2020-10-16 2021-02-09 零氪科技(北京)有限公司 Authorization and access auditing system and method based on private chain
CN112235409A (en) * 2020-10-19 2021-01-15 平安证券股份有限公司 File uploading method and device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN112861162A (en) 2021-05-28

Similar Documents

Publication Publication Date Title
JP7051766B2 (en) Self-provisioning access control
US10154021B1 (en) Securitization of temporal digital communications with authentication and validation of user and access devices
US5502766A (en) Data enclave and trusted path system
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US20070124270A1 (en) System and methods for an identity theft protection bot
JP2016515784A5 (en)
Divya et al. Survey on various door lock access control mechanisms
CN106887060A (en) Hotel guest room fingerprint door lock control system and method
US20210099304A1 (en) Composite identity authentication method and composite identity authentication system using same
JP2018523444A (en) Versatile long string authentication key
US20110162058A1 (en) System and Method for Providing Convergent Physical/Logical Location Aware Access Control
US20110162064A1 (en) System and Method for Providing Convergent Physical/Logical Location Aware Access Control
CN112861162B (en) Block chain storage safety guarantee system based on distributed storage
US9262619B2 (en) Computer system and method for protecting data from external threats
CN110492992A (en) A kind of data encryption and transmission method based on radio RF recognition technology
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN113347213A (en) Trusted channel authentication system based on protection of sensitive data of evanescent member
CN112347492A (en) Cut-in data encryption transmission decryption receiving method
TW201206138A (en) Network device and log-on method thereof
CN110335373A (en) Intelligent door lock and intelligent access control system
CN108133534A (en) A kind of electric lock controller encryption method
Griffin Biometric-based cybersecurity techniques
CN114117493A (en) Computer safety protection system based on cloud calculates
Wang et al. Design of Network Security Protection System for Internet of Vehicles under Electric Internet of Things Background
CN115550035A (en) Intelligent power terminal safety authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant