CN112861162B - Block chain storage safety guarantee system based on distributed storage - Google Patents
Block chain storage safety guarantee system based on distributed storage Download PDFInfo
- Publication number
- CN112861162B CN112861162B CN202110275121.7A CN202110275121A CN112861162B CN 112861162 B CN112861162 B CN 112861162B CN 202110275121 A CN202110275121 A CN 202110275121A CN 112861162 B CN112861162 B CN 112861162B
- Authority
- CN
- China
- Prior art keywords
- module
- user
- file
- storage
- receiving end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 claims abstract description 49
- 238000012545 processing Methods 0.000 claims abstract description 14
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 238000012546 transfer Methods 0.000 claims description 8
- 230000008030 elimination Effects 0.000 claims 1
- 238000003379 elimination reaction Methods 0.000 claims 1
- 238000011084 recovery Methods 0.000 abstract description 6
- 238000000034 method Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004321 preservation Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention relates to the technical field of computer distributed storage, and discloses a block chain storage safety guarantee system based on distributed storage, which comprises a user login module, wherein a transmitting end signal of the user login module is connected with a receiving end of a user information encryption module, a user information registration module and a receiving end of a user information recovery module, and the transmitting ends signal of the user information encryption module, the user information registration module and the user information recovery module are connected with a receiving end of a central processing module. According to the block chain storage safety guarantee system based on distributed storage, the user file encryption public key verification module is used for carrying out first verification, the user file encryption private key verification module is set for carrying out second verification, so that the protection function is more powerful, when the user file encryption private key verification module cannot pass, the file locking module locks the file, and the system can lock the file when the user file encryption private key verification module is not used by a user, so that user file data leakage is prevented.
Description
Technical Field
The invention relates to the technical field of computer distributed storage, in particular to a block chain storage security guarantee system based on distributed storage.
Background
Blockchains are a term of art in information technology. Essentially, the block chain technology is a shared database, data or information stored in the shared database has the characteristics of 'non-falsifiability', 'whole trace', 'traceability', 'disclosure transparency', 'collective maintenance', and the like, based on the characteristics, a solid 'trust' foundation is laid by the block chain technology, a reliable 'cooperation' mechanism is created, and the block chain technology has wide application prospect.
The existing blockchain storage safety cannot be guaranteed, and some people open stored files by mistake, so that the privacy of a user cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a block chain storage safety guarantee system based on distributed storage, which is used for solving the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the system comprises a user login module, wherein a user information encryption module, a user information registration module and a user information recovery module receiving end are connected with a user login module transmitting end signal, a center processing module receiving end is connected with a user information encryption module, a user information registration module and a user information recovery module transmitting end signal, an interstellar file system module receiving end is connected with a central processing module transmitting end signal, a secure shell protocol module receiving end is connected with an interstellar file system transmitting end signal, a secure shell protocol module transmitting end signal is connected with a hypertext transfer protocol module receiving end, a user space file system module receiving end is connected with a hypertext transfer protocol module transmitting end signal, and a block chain storage module is connected with a user space file system transmitting end signal.
Preferably, the transmitting end of the block chain storage module is in signal connection with the receiving ends of the user space file modification module, the user space file storage module and the user space file retrieving module.
Preferably, the transmitting end of the user space file modification module is in signal connection with the receiving ends of the user file encryption public key verification module and the user file encryption private key verification module, and the transmitting ends of the user file encryption public key verification module and the user file encryption private key verification module are in signal connection with the search positioning module and the redundancy removing module.
Preferably, the transmitting end of the user file encryption private key verification module is connected with the receiving ends of the file locking module and the file unlocking module in a signal manner.
Preferably, the user space file storage module transmitting end is in signal connection with a user file local storage module and a user file cloud storage module receiving end, and the user file cloud storage module transmitting end is in signal connection with a user file encryption public key module and a user file encryption private key module receiving end.
Preferably, the central processing module is one or more of a single chip microcomputer and a CPU.
Preferably, the transmitting end of the user file encryption public key verification module is in signal connection with the user file encryption private key verification module.
Preferably, the user file cloud storage module is one of a hundred-degree cloud disk and a messenger cloud.
Compared with the prior art, the invention provides a block chain storage security guarantee system based on distributed storage, which has the following beneficial effects:
1. according to the block chain storage safety guarantee system based on distributed storage, a user can be protected for the first time by setting the user file encryption public key module, so that outsiders can be prevented from opening files to snoop user privacy as much as possible.
2. According to the block chain storage security guarantee system based on distributed storage, a user can be secondarily protected by setting the user file encryption private key module, even if a hacker obtains the user file encryption public key module through a technical means to open a user folder, the user file encryption private key module set by the user can prevent outsiders from opening cloud storage files, and therefore the security of file data when the user uses is improved.
3. The block chain storage safety guarantee system based on distributed storage performs first verification through the user file encryption public key verification module, performs secondary verification through the user file encryption private key verification module, so that the protection function is more powerful, when the user file encryption private key verification module cannot pass, a file is locked by the file locking module until the user file encryption private key verification module passes through verification, the file unlocking module operates, so that the file is unlocked, and the system can lock the file when the user file encryption private key verification module is not used, so that user file data leakage is prevented.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed in the description of the embodiments will be briefly described below, it will be apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort to a person of ordinary skill in the art
FIG. 1 is a schematic diagram of the overall system of the present invention;
FIG. 2 is a schematic diagram of a system such as a central processing module and a user login module;
FIG. 3 is a schematic diagram illustrating the system configuration of the blockchain storage module of the present invention;
FIG. 4 is a schematic diagram illustrating the system configuration of the user space file modification module according to the present invention;
Fig. 5 is a schematic diagram of the cooperation of the system such as the user file encryption private key verification module.
In the figure: 1. a user login module; 2. a user information encryption module; 3. a user information registration module; 4. a user information retrieving module; 5. a central processing module; 6. an interstellar file system module; 7. a secure shell protocol module; 8. a hypertext transfer protocol module; 9. a user space file system module; 10. a blockchain storage module; 11. a user space file modification module; 111. a user file encryption public key verification module; 112. a user file encryption private key verification module; 1121. a file locking module; 1122. a file unlocking module; 113. searching and positioning modules; 114. a redundancy removing module; 12. a user space file storage module; 121. a local storage module of the user file; 122. a user file cloud storage module; 1221. a user file encryption public key module; 1222. a user file encryption private key module; 13. and a user space file retrieving module.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
Referring to fig. 1-5, the present invention provides a technical solution: the block chain storage safety guarantee system based on distributed storage comprises a user login module 1, wherein a transmitting end signal of the user login module 1 is connected with a receiving end of a user information encryption module 2, a user information registration module 3 and a receiving end of a user information recovery module 4, the transmitting ends of the user information encryption module 2, the user information registration module 3 and the user information recovery module 4 are connected with a receiving end of a central processing module 5, the central processing module 5 is one or more of a single chip microcomputer and a CPU, the transmitting end signal of the central processing module 5 is connected with a receiving end of an interstellar file system module 6, the transmitting end signal of the interstellar file system module 6 is connected with a receiving end of a security shell protocol module 7, the transmitting end signal of the security shell protocol module 7 is connected with a receiving end of a hypertext transfer protocol module 8, the transmitting end signal of the hypertext transfer protocol module 8 is connected with a receiving end of a user space file system module 9, the transmitting end signal of the user space file system module 9 is connected with the blockchain storage module 10, the transmitting end signal of the blockchain storage module 10 is connected with the receiving ends of the user space file modification module 11, the user space file storage module 12 and the user space file retrieving module 13, the transmitting end signal of the user space file modification module 11 is connected with the receiving ends of the user file encryption public key verification module 111 and the user file encryption private key verification module 112, the transmitting end signal of the user file encryption public key verification module 111 is connected with the user file encryption private key verification module 112, the transmitting end signal of the user file encryption public key verification module 111 and the user file encryption private key verification module 112 is connected with the search positioning module 113 and the redundancy removing module 114, the user file cloud storage module 122 is one of a hundred-degree cloud disk and a vacation micro cloud, the transmitting end of the user file encryption private key verification module 112 is connected with the file locking module 1121 and the file unlocking module 1122 in a signal manner, so that a user can be protected for the first time by setting the user file encryption public key module 1221, and further, an outsider can be prevented from opening a file to snoop user privacy, the transmitting end of the user space file preservation module 12 is connected with the user file local preservation module 121 and the receiving end of the user file cloud storage module 122 in a signal manner, the transmitting end of the user file cloud storage module 122 is connected with the user file encryption public key module 1221 and the receiving end of the user file encryption private key module 1222 in a signal manner, the user file encryption private key module 1222 can be protected for the second time by setting the user file encryption private key module 1222, even if a hacker obtains the user file encryption public key module 1221 through a technical means to open a user file folder, and the user file encryption private key module 1222 set by the user can be prevented from opening a cloud storage file, so that the safety of file data is improved when the user is used, the user file encryption public key verification module 111 is verified for the first time, the user file encryption private key verification module 112 is set for the second time, so that a protection function is stronger, and when the user file encryption private key verification module 112 is not verified by setting the user file encryption public key module 112, and the user file system is unlocked, and the user file system can be prevented from being unlocked when the user file encryption private key module is unlocked, and the user file is unlocked from being unlocked.
In the actual operation process, when the system is used, login can be carried out through the user login module 1, and simultaneously the user information encryption module 2 carries out encryption work on user information, if no user information exists, the user is registered through the set user information registration module 3, if the user login information is lost, the user login information can be retrieved through the set user information retrieval module 4, the data is uniformly transmitted to the interstar file system module 6 through the set central processing module 5, at this time, the user needs to confirm the security shell protocol module 7, the hypertext transfer protocol module 8 and the user space file system module 9, after the confirmation is passed, the information is transmitted to the inside of the block chain storage module 10, the user file local storage module 121 and the user file cloud storage module 122 can be independently selected through the user space file storage module 12, the encrypted public key obtained through the user file encryption public key module 1221 processing data is obtained after the storage, simultaneously the user file encryption private key module 1222 enables the user to set the encrypted private key, when the user file content needs to be modified or checked, the user file encryption public key verification module 111 carries out first verification, the user file encryption public key module 112 needs to be arranged, the user file protection private key protection module 112 is arranged, the user file protection module 112 is unlocked, the user file protection module 112 can be unlocked, the user file protection module is prevented from being locked, the user file protection module 112 can be unlocked, the user file protection module is unlocked, and the user file protection module is protected by the user file protection module is protected, when the user needs to modify, the user needs to locate a certain position or a certain keyword to locate the content, and the redundancy removing module 114 is arranged to locate the redundant repeated file data in the file, so that the redundant repeated file data can be selected and removed.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (2)
1. The block chain storage safety guarantee system based on distributed storage comprises a user login module (1), and is characterized in that: the system comprises a user login module (1), a user information encryption module (2), a user information registration module (3) and a user information retrieving module (4), wherein the user information encryption module (2), the user information registration module (3) and the user information retrieving module (4) are connected with a receiving end of a central processing module (5), the central processing module (5) is connected with a receiving end of an interstellar file system module (6) through a transmitting end signal, the interstellar file system module (6) is connected with a receiving end of a secure shell protocol module (7) through a transmitting end signal, the secure shell protocol module (7) is connected with a receiving end of a hypertext transfer protocol module (8), the hypertext transfer protocol module (8) is connected with a receiving end of a user space file system module (9), the transmitting end of the user space file system module (9) is connected with a block chain storage module (10), the transmitting end of the block chain storage module (10) is connected with a user space file modification module (11), the user space file storage module (12) is connected with a receiving end of a user space file storage module (13) through a transmitting end signal, the user space file (13) is authenticated by a receiving end of a user key (13) through a transmitting end signal, and the user key (11) is authenticated by a receiving end of the user file (11), the user file encryption public key verification module (111) transmitting end signal connection user file encryption private key verification module (112), user file encryption public key verification module (111) and user file encryption private key verification module (112) transmitting end signal connection search positioning module (113) and redundancy elimination module (114), user file cloud storage module (122) are hundred degree cloud disks or messenger micro clouds, user file encryption private key verification module (112) transmitting end signal connection file locking module (1121) and file unlocking module (1122) receiving end, user space file storage module (12) transmitting end signal connection user file local storage module (121) and user file cloud storage module (122) receiving end, user file cloud storage module (122) transmitting end signal connection user file encryption public key module (1221) and user file encryption private key module (1222) receiving end, user file encryption private key verification module (111) are set to carry out first verification, user file encryption private key verification module (112) are set to carry out second verification, user file encryption private key verification module (112) is connected to carry out locking module (1121) and unlocking file encryption key verification module (1122) can not be carried out when user file encryption private key verification module (112) passes through user file encryption key storage module (122) and user key storage module (122) transmitting end signal connection user file encryption public key verification module (122) can not be used to realize unlocking of the user file (1122) when the user file is unlocked.
2. The distributed storage-based blockchain storage security system of claim 1, wherein: the central processing module (5) is one or more of a singlechip and a CPU.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110275121.7A CN112861162B (en) | 2021-03-15 | 2021-03-15 | Block chain storage safety guarantee system based on distributed storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110275121.7A CN112861162B (en) | 2021-03-15 | 2021-03-15 | Block chain storage safety guarantee system based on distributed storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112861162A CN112861162A (en) | 2021-05-28 |
CN112861162B true CN112861162B (en) | 2024-05-03 |
Family
ID=75994457
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110275121.7A Active CN112861162B (en) | 2021-03-15 | 2021-03-15 | Block chain storage safety guarantee system based on distributed storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112861162B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055253A (en) * | 2017-12-06 | 2018-05-18 | 珠海格力电器股份有限公司 | A kind of software login validation method, apparatus and system |
CN108734029A (en) * | 2018-05-23 | 2018-11-02 | 陈萍 | A kind of approaches to IM and platform based on block chain and interspace file system |
CN108924092A (en) * | 2018-06-07 | 2018-11-30 | 北京航空航天大学 | Based on block chain can open arbitration distribution cloud storage method and system |
CN109194466A (en) * | 2018-10-29 | 2019-01-11 | 南开大学 | A kind of cloud data integrity detection method and system based on block chain |
CN109639406A (en) * | 2018-12-24 | 2019-04-16 | 国泰君安证券股份有限公司 | Efficient trust solution based on block chain and IPFS |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN110309663A (en) * | 2019-06-25 | 2019-10-08 | 湖南搜云网络科技股份有限公司 | Privacy authenticating method and system based on block chain |
CN110866273A (en) * | 2019-11-09 | 2020-03-06 | 北京工业大学 | Inter-enterprise standard consensus method based on block chain and interplanetary file system |
CN111552955A (en) * | 2020-04-29 | 2020-08-18 | 合肥井创数字科技有限公司 | Personal identity authentication method and device based on block chain and IPFS |
CN112235409A (en) * | 2020-10-19 | 2021-01-15 | 平安证券股份有限公司 | File uploading method and device, electronic equipment and computer readable storage medium |
CN112347188A (en) * | 2020-10-16 | 2021-02-09 | 零氪科技(北京)有限公司 | Authorization and access auditing system and method based on private chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11212347B2 (en) * | 2019-02-05 | 2021-12-28 | S&P Global Inc. | Private content storage with public blockchain metadata |
-
2021
- 2021-03-15 CN CN202110275121.7A patent/CN112861162B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055253A (en) * | 2017-12-06 | 2018-05-18 | 珠海格力电器股份有限公司 | A kind of software login validation method, apparatus and system |
CN108734029A (en) * | 2018-05-23 | 2018-11-02 | 陈萍 | A kind of approaches to IM and platform based on block chain and interspace file system |
CN108924092A (en) * | 2018-06-07 | 2018-11-30 | 北京航空航天大学 | Based on block chain can open arbitration distribution cloud storage method and system |
CN109194466A (en) * | 2018-10-29 | 2019-01-11 | 南开大学 | A kind of cloud data integrity detection method and system based on block chain |
CN109639406A (en) * | 2018-12-24 | 2019-04-16 | 国泰君安证券股份有限公司 | Efficient trust solution based on block chain and IPFS |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN110309663A (en) * | 2019-06-25 | 2019-10-08 | 湖南搜云网络科技股份有限公司 | Privacy authenticating method and system based on block chain |
CN110866273A (en) * | 2019-11-09 | 2020-03-06 | 北京工业大学 | Inter-enterprise standard consensus method based on block chain and interplanetary file system |
CN111552955A (en) * | 2020-04-29 | 2020-08-18 | 合肥井创数字科技有限公司 | Personal identity authentication method and device based on block chain and IPFS |
CN112347188A (en) * | 2020-10-16 | 2021-02-09 | 零氪科技(北京)有限公司 | Authorization and access auditing system and method based on private chain |
CN112235409A (en) * | 2020-10-19 | 2021-01-15 | 平安证券股份有限公司 | File uploading method and device, electronic equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112861162A (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7051766B2 (en) | Self-provisioning access control | |
US10154021B1 (en) | Securitization of temporal digital communications with authentication and validation of user and access devices | |
US5502766A (en) | Data enclave and trusted path system | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
US20070124270A1 (en) | System and methods for an identity theft protection bot | |
JP2016515784A5 (en) | ||
Divya et al. | Survey on various door lock access control mechanisms | |
CN106887060A (en) | Hotel guest room fingerprint door lock control system and method | |
US20210099304A1 (en) | Composite identity authentication method and composite identity authentication system using same | |
JP2018523444A (en) | Versatile long string authentication key | |
US20110162058A1 (en) | System and Method for Providing Convergent Physical/Logical Location Aware Access Control | |
US20110162064A1 (en) | System and Method for Providing Convergent Physical/Logical Location Aware Access Control | |
CN112861162B (en) | Block chain storage safety guarantee system based on distributed storage | |
US9262619B2 (en) | Computer system and method for protecting data from external threats | |
CN110492992A (en) | A kind of data encryption and transmission method based on radio RF recognition technology | |
US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
CN113347213A (en) | Trusted channel authentication system based on protection of sensitive data of evanescent member | |
CN112347492A (en) | Cut-in data encryption transmission decryption receiving method | |
TW201206138A (en) | Network device and log-on method thereof | |
CN110335373A (en) | Intelligent door lock and intelligent access control system | |
CN108133534A (en) | A kind of electric lock controller encryption method | |
Griffin | Biometric-based cybersecurity techniques | |
CN114117493A (en) | Computer safety protection system based on cloud calculates | |
Wang et al. | Design of Network Security Protection System for Internet of Vehicles under Electric Internet of Things Background | |
CN115550035A (en) | Intelligent power terminal safety authentication system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |