CN112989111A - Video storage management method and system based on block chain - Google Patents
Video storage management method and system based on block chain Download PDFInfo
- Publication number
- CN112989111A CN112989111A CN202110423846.6A CN202110423846A CN112989111A CN 112989111 A CN112989111 A CN 112989111A CN 202110423846 A CN202110423846 A CN 202110423846A CN 112989111 A CN112989111 A CN 112989111A
- Authority
- CN
- China
- Prior art keywords
- data
- video data
- video
- information acquisition
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 claims abstract description 44
- 238000012795 verification Methods 0.000 claims abstract description 35
- 230000008569 process Effects 0.000 claims abstract description 24
- 238000007781 pre-processing Methods 0.000 claims abstract description 5
- 230000005540 biological transmission Effects 0.000 claims description 94
- 238000013500 data storage Methods 0.000 claims description 36
- 239000010410 layer Substances 0.000 claims description 26
- 230000003993 interaction Effects 0.000 claims description 16
- 150000001875 compounds Chemical class 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 6
- 239000011229 interlayer Substances 0.000 claims description 6
- 230000004044 response Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 claims description 3
- 230000015556 catabolic process Effects 0.000 abstract 1
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/71—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Data Mining & Analysis (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention provides a video storage management method and a video storage management system based on a block chain, wherein the method specifically comprises the following steps: receiving video data uploaded by a video information acquisition group; preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain; when the video data is requested to be read, verifying the request information, and granting the read authority after the verification is successful. The video data is stored through the block chain with the distributed characteristic, the non-writable tamper property of the data is guaranteed, and the data security is realized. On the other hand, the calculation amount of the block chain in the process of updating the stored data is greatly reduced by combining with cloud storage, and meanwhile, the system breakdown phenomenon caused by damage of the central node is avoided due to the characteristics of the distributed block chain, so that the robustness of the system is improved.
Description
Technical Field
The invention relates to a video storage management method and a video storage management system based on a block chain, in particular to the field of H04B.
Background
With the development of computer technology, data storage brings great convenience for later-stage data search and evidence. However, in the prior art, the security of data backup becomes a primary problem, no matter the data backup is self-storage or cloud storage, the encryption is easy to crack, so that a hacker can easily crack the data backup, and meanwhile, the hidden danger of tampering of internal personnel can also occur for enterprise-type data backup, so that the difficulty is brought to later-stage data search.
Disclosure of Invention
The purpose of the invention is as follows: a video storage management method and system based on a block chain are provided to solve the above problems in the prior art.
The technical scheme is as follows: in a first aspect, a video storage management method based on a block chain is provided, where the method specifically includes the following steps:
receiving video data uploaded by a video information acquisition group;
preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain;
when the video data is requested to be read, verifying the request information, and granting a reading permission after successful verification;
the method comprises the following steps that at least one information acquisition device forms a video information acquisition group, and acquired video data are transmitted to an edge node server through a base station;
the edge node server stores the video data to a local database, uploads the preprocessed video data to a cloud end according to bandwidth allocated according to needs, and deletes the data in the local database after receiving confirmation information that the cloud end confirms that the storage is finished.
In some implementation manners of the first aspect, according to the on-demand allocation manner, when the video data is transmitted to the cloud, the bandwidth allocation partitioning information acquisition device transmits the video data to the edge node server, and the edge node server transmits the video data to the cloud.
When the video data is transmitted from the information acquisition device to the edge node server, if the total bandwidth in the cloud is B, the bandwidth allocated to the ith edge node server according to the weight is:
in the formula, B represents the total bandwidth in the cloud;the number of information acquisition equipment connected with the ith edge node server is represented; dig represents the total number of information collecting apparatuses.
According to the probability of successful transmission and the probability of transmission failure when the information acquisition equipment transmits data, the probability of successful transmission and the probability of transmission failure of all the information acquisition equipment of the edge node server, the probability of idle traditional channels between the information acquisition equipment and the cloud end, and the time consumed in the transmission process of video data, the proportion of the transmission medium occupied by the ith information acquisition equipment in the total transmission medium is obtained:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;the transmission rate of a physical layer of the ith information acquisition device is represented;representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;represents the smallest transmission window;a physical layer constant is represented by a physical layer constant,indicating the time required for the i-th information collecting device to successfully transmit a data packet.
According to the proportionThe probability that the signal acquisition equipment occupies the transmission medium in proportion to the total transmission medium and only competes for the transmission medium can be obtainedIn connection with, due toThe relationship with the contention window is:
the proportion of the transmission medium occupied by the information acquisition device in the total transmission medium can be obtained according to the contention window parameter, so that the effective bandwidth of the effective bandwidth value required by the connection of one edge node server with the information acquisition device is as follows:
introduced Lagrange non-negative multiplierObtaining the optimized bandwidth of any information acquisition equipment, namely the size of the optimal bandwidth of the information acquisition equipment:
In the formula (I), the compound is shown in the specification,、、is a predetermined constant, andis a minimization distortion function;represents a coding rate;representing the frame rate of the video file.
In some implementations of the first aspect, the video data is pre-processed into the block chain by: firstly, a video data storage interval is created in advance, and a cache address of the video data is read; secondly, acquiring and coding each frame according to the time sequence; thirdly, storing the coded video data into the video data storage interval; when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval; finally, the video data storage intervals form a video data transmission queue according to the time sequence.
In the coding process, the depth is predicted through the correlation degree of the inter-layer, space and time, the coded depth is coded under the condition of removing the depth with low possibility, the intra-frame mode is skipped on the premise that whether the residual coefficient obeys Gaussian distribution or not is judged, the left and right or up and down division is carried out on the residual coefficient obtained by the depth coding, and whether the depth coding is terminated in advance is judged according to the significance of the difference.
In some implementations of the first aspect, the video data is pre-processed into a block chain by:
creating a video data storage interval;
reading a cache address of the video data;
acquiring and coding each frame according to the time sequence;
storing the encoded video data into the video data storage interval;
when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval;
the video data storage intervals form a video data transmission queue according to a time sequence, and after hash encryption is carried out on each of the adjacent video data storage intervals, the hash encryption is carried out on every two adjacent video data storage intervals until a final hash value is obtained;
and storing the final hash value as a video abstract value into the block chain.
In some realizations of the first aspect, the block chain is formed of at least one block; the block comprises a block head and a block body; the block header comprises a hash value of a previous block, a timestamp, a Merkle root and a number of a current block; the block body includes detailed information of video data in the form of a Merkle tree. The purposes of 'compressing' and preventing falsification of transaction information are achieved while video data is verified and summarized quickly.
In some implementations of the first aspect, the video data request validation process is completed by the user node, the cloud storage node, the proxy node, and the blockchain; the user nodes are owners of original video data and are further divided into data request nodes and data response nodes; the cloud storage node is a node for realizing cloud data storage; the agent node is used for deploying intelligent contracts, maintaining data requests and responding to the data requests.
In some implementations of the first aspect, the process of requesting the video data to be read further comprises:
the data request node sends video data request information to a data response node through an intelligent contract deployed by the agent node;
the intelligent contract generates an identity certificate of the data request node and returns the identity certificate to the data request node;
the data request node applies for video data reading permission to the cloud storage node according to the identity certificate;
the cloud storage node verifies the identity certificate, and sends the video data requested by the data request node to the data request node after the verification is successful;
the data request node receives video data sent by the cloud storage node and verifies the validity, and when the verification result is valid, a successful downloading message is broadcast;
the implementation process is logged into the blockchain.
In some implementations of the first aspect, the data interaction between the nodes involves encryption and decryption of data, and data signing and signature verification during the process of the video data being requested to be read.
The encryption is to encrypt the data by using a public key; and the decryption is to decrypt the data by using a private key after receiving the encrypted data.
The signature is a data signature by using a private key; and the signature verification is to utilize the public key to verify the signature of the data after the signature is received.
The public key is set to correspond to the private key and is used for generating an address for data interaction and encrypting data in the data transmission process to finish the data interaction.
The private key is arranged in the data signature to verify the identity of the private key to nodes except the private key.
In some implementation manners of the first aspect, in a process that the video data is requested to be read, the cloud storage node verifies and signs the signed identification information in a block chain by using a public key of a data request node; the signed identification information is identification information formed by the data request node through self private key signature;
when the verification result is that the verification information is passed, the cloud storage node returns verification information carrying the cloud storage node signature to the data request node; otherwise, the data request fails;
the data request node verifies the received verification information;
when the verification passes, data interaction is carried out through a data transmission path; otherwise, the data request fails.
In a second aspect, there is provided a block link point, the node comprising:
a memory arranged to store a computer program;
a processor arranged to execute the computer program in the memory to implement any one of the method steps.
In a third aspect, a blockchain-based video storage management system is provided, which includes at least one blockchain node. The blockchain node is arranged to perform any one of the method steps.
Has the advantages that: the invention provides a video storage management method and system based on a block chain.A lightweight verifiable protection system based on the block chain is used for placing acquired data in cloud storage and placing a data abstract value in the block chain, so that the problem of small data storage space is solved; meanwhile, due to the characteristics of the distributed block chains, the system collapse phenomenon caused by the damage of the central node is avoided, and the robustness of the system is improved; the data covering the time stamp form a traceable data string after being encrypted by the hash function, and whether the data is tampered or not can be quickly verified by comparing hash values, so that the accuracy of the data is guaranteed. On the other hand, due to the realization of the decentralized blockchain, the data on the blockchain is more public and transparent, and the common management of multiple platforms and multiple units is more facilitated.
Drawings
FIG. 1 is a flow chart of data processing according to an embodiment of the present invention.
FIG. 2 is a block diagram of a block of a recording medium according to an embodiment of the present invention.
Detailed Description
According to the video storage management method and system based on the block chain, the video storage based on the block chain technology is realized, and the reliability, the automation and the convenience of a large amount of data in the transmission and storage process are ensured. In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In an embodiment, a video storage management method based on a block chain is provided, as shown in fig. 1, the method specifically includes the following steps:
receiving video data uploaded by a video information acquisition group;
preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain;
when the video data is requested to be read, verifying the request information, and granting the read authority after the verification is successful.
In a further embodiment, at least one information acquisition device forms a video information acquisition group, and the information acquisition device records the corresponding surrounding environment in real time in a video data mode. Each information acquisition group is connected with one base station, and data interaction is carried out between the base station and the edge node server.
Specifically, the information acquisition device uploads the acquired video data to the edge node server through the base station, the edge node server is connected with the local database, and the received video data are stored in the local database.
Meanwhile, the edge node server preprocesses the video data and transmits the processed video data to the cloud and the block chain, and when the confirmation information of successful uploading of the cloud is received, the video data information stored in the local database is deleted. Therefore, the storage pressure of the local database is reduced while the video data is stored for a long time.
In a further embodiment, the video data is pre-processed into a block chain by: firstly, a video data storage interval is created in advance, and a cache address of the video data is read; secondly, acquiring and coding each frame according to the time sequence; thirdly, storing the coded video data into the video data storage interval; when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval; finally, video data storage intervals form a video data transmission queue according to a time sequence, as shown in fig. 2, after hash encryption is respectively performed on adjacent video data storage intervals, hash encryption is performed on every two adjacent video data storage intervals until a final hash value is obtained, and the final hash value is stored in the block chain as a video digest value. By compression coding the video data, the method can weaken redundant information, and simultaneously achieve the purposes of occupying less resources and acquiring more data transmission quantity.
Specifically, on the premise that the quality of the reconstructed video can meet the requirement by using the visual retention, the video data is greatly compressed in the allowable minimum distortion range by using a lossy video compression mode, so that the condition that the frequency band is limited in the transmission process is relieved.
In the coding process, the depth is predicted through the correlation degree of the inter-layer, space and time, the coded depth is coded under the condition of removing the depth with low possibility, the intra-frame mode is skipped on the premise of judging whether the residual coefficient obeys Gaussian distribution, the residual coefficient obtained by depth coding is divided left and right or up and down, whether the depth coding is stopped in advance is judged according to the significance of the difference, and therefore the coding efficiency is improved and the rapid coding is realized.
Firstly, predicting the depth of a current coding unit; secondly, coding by adopting an interlayer mode; thirdly, judging whether the current interlayer mode is the optimal mode; if the judgment result is negative, adopting an intra-frame coding mode, and continuously judging whether the current depth is the optimal depth, otherwise, directly judging whether the current depth is the optimal depth; finally, when the judgment result is yes, stopping depth coding; otherwise, returning to the interlayer coding, and continuing the loop iteration.
When a large amount of video data are transmitted to the cloud, the data transmission delay or transmission failure problem is often caused due to the collision of the data in the transmission channel and the error of the transmission channel, and on the other hand, the possibility of data tampering is enhanced through long-time data processing, so that the reliability of the initial data is not high. The invention solves the problems by the way that the base station and the edge node server assist the user to transmit and process the video data and allocate the bandwidth according to the needs.
In a further embodiment, effective bandwidths required by all video information acquisition devices are estimated through an optimized bandwidth allocation method, and in practical application, according to the bandwidth size in a network, the optimal bandwidth size required by different information acquisition devices is obtained under the condition that the actual bandwidth is not exceeded.
Specifically, the bandwidth allocation includes the division between the cloud and the edge node server and the division between the edge node server and each information acquisition device. When there are N edge node servers, if the total bandwidth in the cloud is B, the bandwidth allocated to the ith edge node server according to the weight is:
in the formula, B represents the total bandwidth in the cloud;the number of information acquisition equipment connected with the ith edge node server is represented; dig represents the total number of information collecting apparatuses.
When each edge node server distributes the acquired bandwidth to the information acquisition equipment connected with the edge node server, the bandwidth is reasonably distributed under the condition of ensuring the minimum loss of video image quality according to the performance of each information acquisition equipment. Dividing the data transmission in the information acquisition equipment into an application layer, a connection layer and a physical layer, and when the transmission rate of the physical layer of the ith information acquisition equipment isThe video encoding rate of the application layer isIn time, the channel width occupied by the information acquisition equipment is:
then there are:
in the formula (I), the compound is shown in the specification,the effective bandwidth value required by all information acquisition equipment connected with an edge node server is represented;the number of information acquisition equipment connected with the ith edge node server is represented;the channel width occupied by the ith information acquisition equipment is represented, and the value range is [0,1 ]]。
And optimizing the effective bandwidth value required by the information acquisition equipment according to the error rate of the transmission channel, the collision rate of a plurality of files in the transmission process and different file lengths. The reason for the transmission failure of the information acquisition equipment is mainly caused by channel errors, and when the probability that the ith information acquisition equipment competes for the transmission medium with other information acquisition equipment isWhen the probability of transmission failure isThe probability of successful transmission isNamely:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;indicating the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices. Therefore, the probability of successful transmission of all the information acquisition devices in the ith edge node server is as follows:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;indicating the probability of successful transmission of the ith information acquisition device. When no file is uploaded in the edge node server, namely the transmission channel is idle, the probability is as follows:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;indicating the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices. Combining the idle probability and the successful transmission probability of the transmission channel, the probability of transmission failure of all the information acquisition devices connected with the ith edge node server is as follows:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;indicating the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices.
The time consumed for each information acquisition device to successfully transmit a data packet isThe time consumed for transmission failure isWhen it is used, orderIf the transmission time of all the information acquisition devices connected to the ith edge node server is successful, the time duration is:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;representing the successful transmission probability of all information acquisition equipment in the ith edge node server;the transmission rate of a physical layer of the ith information acquisition device is represented;representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT meterIndicating the time length required for receiving the acknowledgement frame; XT represents an inter-coordination gap.
The duration of transmission failure of all the information acquisition devices connected with the ith edge node server is as follows:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented; the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;representing the probability of transmission failure of all information acquisition equipment connected with the ith edge node server;the transmission rate of a physical layer of the ith information acquisition device is represented;representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;indicating the smallest transmission window.
To sum up, the ith information acquisition device occupies the proportion of the transmission medium in the total transmission mediumComprises the following steps:
namely:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;the transmission rate of a physical layer of the ith information acquisition device is represented;representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;represents the smallest transmission window;a physical layer constant is represented by a physical layer constant,indicating the time required for the i-th information collecting device to successfully transmit a data packet.
According to the proportionThe probability that the signal acquisition equipment occupies the transmission medium in proportion to the total transmission medium and only competes for the transmission medium can be obtainedIn connection with, due toThe relationship with the contention window is:
therefore, the proportion of the transmission medium occupied by the information acquisition device in the total transmission medium can be obtained according to the contention window parameter, so that the effective bandwidth of the effective bandwidth value required by the edge node server for connecting the information acquisition device is as follows:
according to the introduced Lagrange non-negative multiplierObtaining the optimized bandwidth of any information acquisition device, namely:
in the formula (I), the compound is shown in the specification,representing post-optimization resultsTime with bandwidth occupied by information collecting equipment) Gathering;the effective bandwidth represents the effective bandwidth value required by an edge node server for connecting the information acquisition equipment;the bandwidth required by the ith information acquisition device is represented;、、is a preset constant; n represents the number of edge node servers;represents a coding rate;representing the frame rate of the video file.
In the case of a distributed network, the network,corresponding to a fixed and uniqueValues, obtained from the partial derivatives:
In the formula (I), the compound is shown in the specification,、、is a predetermined constant, andis a minimization distortion function;represents a coding rate;representing the frame rate of the video file.
Under the limitation of limited network bandwidth, the problem that transmission occupied time is inconsistent with actual occupied time due to interference conditions in practical application can be better solved by distributing proper bandwidth for different information acquisition devices.
The block chain for storing the video summary data information further comprises a block head and a block body, wherein the block head comprises a hash value of a previous block, a time stamp, a Merkle root and the number of a current block; the block body comprises detailed video data information in a Merkle tree form, namely data information generated in the process of obtaining the video abstract value. Meanwhile, as shown in table 1, the block chain further includes a public key address of the video owner, a preset video name, a video number, a video date, a start time of the video, and an end time of the video end.
Table 1 data content in blockchain
Video owner address | Video name | Video summary value | Video numbering | Date of video | Video start time | Video end time |
(32 bit address) | Hebaodan | (Hash value) | 0001 | 20210406 | 123111 | 134111 |
In a further embodiment, the video data request validation process is completed by the user node, the cloud storage node, the proxy node, and the blockchain. The user nodes are owners of original video data and are further divided into data request nodes and data response nodes; the cloud storage node is a node for realizing cloud data storage; the agent node is used for deploying the intelligent contract, maintaining the data request and responding the data request. And according to the intelligent contract, the data request node and the cloud storage node carry out the identification of the video data reading authority through verification.
Specifically, in the process of requesting to read the video data, the agent node deploys an intelligent contract used as a basis for data interaction, and the data request node sends video data request information to the data response node through the intelligent contract deployed by the agent node.
And the intelligent contract generates the identification of the data request node and returns the identification to the data request node. After receiving the identification information, the data request node packs the data information by using the public key address of the data request node, signs the packed data by using the private key of the data request node, and sends the signed data information to the cloud storage node for verification.
And after receiving the signed data information, the cloud storage node decrypts the information by using the public key of the data request node, compares the information with the identification information stored in the block chain, and returns verification information containing the public key address of the cloud storage node and the public key address of the data request node to the data request node when the verification result is that the verification information passes.
And the data request node receives the verification information sent by the cloud storage node and verifies the validity, and when the verification result is valid, video data transmission is carried out through the data transmission channel.
And after the downloading transmission process is finished, the data request node broadcasts a downloading success message and records the realization process into the block chain.
The intelligent contract is used as a promise in an electronic form and is used for limiting between a data requester and a requested person, and when a preset starting condition is met, the intelligent contract is automatically started. The data interaction process recorded in the intelligent contract is recorded in the blockchain at the same time, so that the data generated in the data interaction process can be viewed in the blockchain. The intelligent contract has non-tamper property, and when a problem occurs, the intelligent contract is destroyed; meanwhile, the block chain has the characteristic of distribution, so that the intelligent contract has stability, and the condition that the intelligent contract fails can not be caused when a single node goes wrong.
In a further embodiment, the public key corresponds to the private key, and in the data transmission process, the public key is used for generating an address for data interaction and encrypting data to complete the data interaction; the private key is in the data signature and is set to verify the identity of itself to nodes other than itself. Since the generation process of the secret key is irreversible, the private key cannot be deduced through the public key, and thus the data is not usurgable and privacy is guaranteed.
In a further embodiment, in the process of interaction between the data request node and the cloud storage node, after the cloud storage node receives the identity information of the data request node, the public key of the data request node is used for verifying and signing the signed identity information in the block chain. The signed identification information is identification information formed by the data request node through self private key signature.
When the verification result is that the verification information is passed, the cloud storage node returns verification information carrying the cloud storage node signature to the data request node; otherwise, the data request fails.
Subsequently, the data request node verifies the received verification information; when the verification passes, data interaction is carried out through a data transmission path; otherwise, the data request fails.
In one embodiment, a block link point is provided, comprising:
a memory arranged to store a computer program;
a processor arranged to execute the computer program in the memory to implement any one of the method steps.
In one embodiment, a blockchain based video storage management system is provided, the system comprising at least one blockchain node; the blockchain node is arranged to perform any one of the method steps.
As noted above, while the present invention has been shown and described with reference to certain preferred embodiments, it is not to be construed as limited thereto. Various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A video storage management method based on a block chain is characterized by comprising the following steps:
receiving video data uploaded by a video information acquisition group;
preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain;
when the video data is requested to be read, verifying the request information, and granting a reading permission after successful verification;
the method comprises the following steps that at least one information acquisition device forms a video information acquisition group, and acquired video data are transmitted to an edge node server through a base station;
the edge node server stores the video data to a local database, uploads the preprocessed video data to a cloud end according to bandwidth allocated according to needs, and deletes the data in the local database after receiving confirmation information that the cloud end confirms that the storage is finished.
2. The method according to claim 1, wherein the video storage management method based on block chain,
according to the mode of distribution according to needs, when the video data are transmitted to the cloud end, the bandwidth distribution division information acquisition equipment transmits the video data to the edge node server, and the edge node server transmits the video data to the cloud end;
when the video data is transmitted from the information acquisition device to the edge node server, if the total bandwidth in the cloud is B, the bandwidth allocated to the ith edge node server according to the weight is:
in the formula, B represents the total bandwidth in the cloud;the number of information acquisition equipment connected with the ith edge node server is represented; dig represents the total number of information acquisition devices;
according to the probability of successful transmission and the probability of transmission failure when the information acquisition equipment transmits data, the probability of successful transmission and the probability of transmission failure of all the information acquisition equipment of the edge node server, the probability of idle traditional channels between the information acquisition equipment and the cloud end, and the time consumed in the transmission process of video data, the proportion of the transmission medium occupied by the ith information acquisition equipment in the total transmission medium is obtained:
in the formula (I), the compound is shown in the specification,the number of information acquisition equipment connected with the ith edge node server is represented;the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;the transmission rate of a physical layer of the ith information acquisition device is represented;representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;represents the smallest transmission window;a physical layer constant is represented by a physical layer constant,the time required for the ith information acquisition device to successfully transmit a data packet is represented;
according to the proportionThe probability that the signal acquisition equipment occupies the transmission medium in proportion to the total transmission medium and only competes for the transmission medium can be obtainedIn connection with, due toThe relationship with the contention window is:
the proportion of the transmission medium occupied by the information acquisition device in the total transmission medium can be obtained according to the contention window parameter, so that the effective bandwidth of the effective bandwidth value required by the connection of one edge node server with the information acquisition device is as follows:
introduced Lagrange non-negative multiplierObtaining the optimized bandwidth of any information acquisition equipment, namely the size of the optimal bandwidth of the information acquisition equipment:
3. The method according to claim 1, wherein the video storage management method based on block chain,
the video data is preprocessed and stored in a block chain, and the process comprises the following steps:
creating a video data storage interval;
reading a cache address of the video data;
acquiring and coding each frame according to the time sequence;
storing the encoded video data into the video data storage interval;
when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval;
the video data storage intervals form a video data transmission queue according to a time sequence, and after hash encryption is carried out on each of the adjacent video data storage intervals, the hash encryption is carried out on every two adjacent video data storage intervals until a final hash value is obtained;
and storing the final hash value as a video abstract value into the block chain.
4. The method according to claim 1, wherein the video storage management method based on block chain,
the video data is stored in a block chain through preprocessing, and the process comprises the following steps: firstly, a video data storage interval is created in advance, and a cache address of the video data is read; secondly, acquiring and coding each frame according to the time sequence; thirdly, storing the coded video data into the video data storage interval; when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval; finally, video data storage intervals form a video data transmission queue according to a time sequence;
in the coding process, the depth is predicted through the correlation degree of the inter-layer, space and time, the coded depth is coded under the condition of removing the depth with low possibility, the intra-frame mode is skipped on the premise that whether the residual coefficient obeys Gaussian distribution or not is judged, the left and right or up and down division is carried out on the residual coefficient obtained by the depth coding, and whether the depth coding is terminated in advance is judged according to the significance of the difference.
5. The method according to claim 1, wherein the video storage management method based on block chain,
completing a video data request verification process by a user node, a cloud storage node, a proxy node and a block chain; the user nodes are owners of original video data and are further divided into data request nodes and data response nodes; the cloud storage node is a node for realizing cloud data storage; the agent node is used for deploying intelligent contracts, maintaining data requests and responding to the data requests.
6. The method according to claim 5, wherein the video storage management method based on block chain,
the process of requesting to read the video data is further as follows:
the data request node sends video data request information to a data response node through an intelligent contract deployed by the agent node;
the intelligent contract generates an identity certificate of the data request node and returns the identity certificate to the data request node;
the data request node applies for video data reading permission to the cloud storage node according to the identity certificate;
the cloud storage node verifies the identity certificate, and sends the video data requested by the data request node to the data request node after the verification is successful;
the data request node receives video data sent by the cloud storage node and verifies the validity, and when the verification result is valid, a successful downloading message is broadcast;
the implementation process is logged into the blockchain.
7. The method according to claim 5, wherein the video storage management method based on block chain,
during the process that the video data is requested to be read, data interaction among nodes relates to encryption and decryption of the data, and data signing and signature verification;
the encryption is to encrypt the data by using a public key; the decryption is to decrypt the data by using a private key after receiving the encrypted data;
the signature is a data signature by using a private key; the verification is that after the signed data is received, the public key is used for verifying the data;
the public key is set to correspond to the private key and is used for generating an address for data interaction and encrypting data to finish the data interaction in the data transmission process;
the private key is arranged in the data signature to verify the identity of the private key to nodes except the private key.
8. The method according to claim 5, wherein the video storage management method based on block chain,
in the process that the video data is requested to be read, the cloud storage node checks and signs the signed identity information in a block chain by using a public key of the data request node; the signed identification information is identification information formed by the data request node through self private key signature;
when the verification result is that the verification information is passed, the cloud storage node returns verification information carrying the cloud storage node signature to the data request node; otherwise, the data request fails;
the data request node verifies the received verification information;
when the verification passes, data interaction is carried out through a data transmission path; otherwise, the data request fails.
9. A block link point, comprising:
a memory arranged to store a computer program;
a processor arranged to execute the computer program in the memory to carry out the method steps of any of claims 1 to 8.
10. A video storage management system based on a block chain is characterized by comprising at least one block chain node;
the blockchain node is arranged to perform the method steps of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110423846.6A CN112989111B (en) | 2021-04-20 | 2021-04-20 | Video storage management method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110423846.6A CN112989111B (en) | 2021-04-20 | 2021-04-20 | Video storage management method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112989111A true CN112989111A (en) | 2021-06-18 |
CN112989111B CN112989111B (en) | 2021-09-10 |
Family
ID=76341323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110423846.6A Active CN112989111B (en) | 2021-04-20 | 2021-04-20 | Video storage management method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112989111B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113556406A (en) * | 2021-09-22 | 2021-10-26 | 深圳时空云科技有限公司 | Distributed network communication method and device |
CN113572790A (en) * | 2021-09-18 | 2021-10-29 | 深圳时空云科技有限公司 | Distributed processing method and device for private information |
CN117728962A (en) * | 2024-02-18 | 2024-03-19 | 深圳码隆智能科技有限公司 | Signature transmission method for ensuring storage consistency of multi-level video data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326337A (en) * | 2018-09-06 | 2019-02-12 | 西安电子科技大学 | Electronic medical record storage and shared model and method based on block chain |
CN110046649A (en) * | 2019-03-12 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of multimedia messages prison broadcasting method, apparatus and system based on block chain |
CN110909143A (en) * | 2019-11-26 | 2020-03-24 | 太平金融科技服务(上海)有限公司 | Video frequency testament generation method, device, computer equipment and storage medium |
CN111405241A (en) * | 2020-02-21 | 2020-07-10 | 中国电子技术标准化研究院 | Edge calculation method and system for video monitoring |
CN111523133A (en) * | 2020-04-24 | 2020-08-11 | 远光软件股份有限公司 | Block chain and cloud data collaborative sharing method |
KR102153673B1 (en) * | 2019-12-18 | 2020-09-08 | 제주대학교 산학협력단 | Method, system and recordable medium for storing and transmission processing of intelligent CCTV video data using the edge blockchain |
CN111737762A (en) * | 2020-06-28 | 2020-10-02 | 江苏恒宝智能系统技术有限公司 | Data management method, device and system based on block chain technology |
CN111901128A (en) * | 2020-09-29 | 2020-11-06 | 成都清渟科技有限公司 | Method and system for protecting data safety of water purification equipment based on block chain |
-
2021
- 2021-04-20 CN CN202110423846.6A patent/CN112989111B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109326337A (en) * | 2018-09-06 | 2019-02-12 | 西安电子科技大学 | Electronic medical record storage and shared model and method based on block chain |
CN110046649A (en) * | 2019-03-12 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of multimedia messages prison broadcasting method, apparatus and system based on block chain |
CN110909143A (en) * | 2019-11-26 | 2020-03-24 | 太平金融科技服务(上海)有限公司 | Video frequency testament generation method, device, computer equipment and storage medium |
KR102153673B1 (en) * | 2019-12-18 | 2020-09-08 | 제주대학교 산학협력단 | Method, system and recordable medium for storing and transmission processing of intelligent CCTV video data using the edge blockchain |
CN111405241A (en) * | 2020-02-21 | 2020-07-10 | 中国电子技术标准化研究院 | Edge calculation method and system for video monitoring |
CN111523133A (en) * | 2020-04-24 | 2020-08-11 | 远光软件股份有限公司 | Block chain and cloud data collaborative sharing method |
CN111737762A (en) * | 2020-06-28 | 2020-10-02 | 江苏恒宝智能系统技术有限公司 | Data management method, device and system based on block chain technology |
CN111901128A (en) * | 2020-09-29 | 2020-11-06 | 成都清渟科技有限公司 | Method and system for protecting data safety of water purification equipment based on block chain |
Non-Patent Citations (1)
Title |
---|
王倩: "面向监测领域的智能云存储网关系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113572790A (en) * | 2021-09-18 | 2021-10-29 | 深圳时空云科技有限公司 | Distributed processing method and device for private information |
CN113556406A (en) * | 2021-09-22 | 2021-10-26 | 深圳时空云科技有限公司 | Distributed network communication method and device |
CN113556406B (en) * | 2021-09-22 | 2021-12-07 | 深圳时空云科技有限公司 | Distributed network communication method and device |
CN117728962A (en) * | 2024-02-18 | 2024-03-19 | 深圳码隆智能科技有限公司 | Signature transmission method for ensuring storage consistency of multi-level video data |
CN117728962B (en) * | 2024-02-18 | 2024-06-11 | 深圳码隆智能科技有限公司 | Signature transmission method for ensuring storage consistency of multi-level video data |
Also Published As
Publication number | Publication date |
---|---|
CN112989111B (en) | 2021-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112989111B (en) | Video storage management method and system based on block chain | |
CN112073379B (en) | Lightweight Internet of things security key negotiation method based on edge calculation | |
CN109766673B (en) | Alliance type audio and video copyright block chain system and audio and video copyright chaining method | |
CN112910840A (en) | Medical data storage and sharing method and system based on alliance blockchain | |
CN110784461B (en) | Safe 6LoWPAN communication method and system based on block chain | |
CN106549933B (en) | Data transmission system and method of block chain | |
CN102223374B (en) | Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence | |
CN108737071B (en) | WLAN (Wireless local area network) mesh secure access method based on block chain | |
CN109218981B (en) | Wi-Fi access authentication method based on position signal feature common recognition | |
CN103067363B (en) | Index conversion method for public data integrity checking | |
CN111831974B (en) | Interface protection method, device, electronic equipment and storage medium | |
CN111371543B (en) | Internet of things equipment access control method based on double-block chain structure | |
CN114499894B (en) | File storage and reading method and system in block chain network | |
CN109104476B (en) | Electric power information safety system based on block chain | |
CN115567312B (en) | Alliance chain data authority management system and method capable of meeting various scenes | |
CN114254398B (en) | Block chain-based federated learning system and parameter aggregation method | |
CN114528565B (en) | Sensitive data efficient uplink algorithm based on blockchain | |
CN112035896A (en) | Electronic contract deposit certificate system based on transaction mode | |
CN112583772A (en) | Data acquisition and storage platform | |
CN113596777A (en) | Intelligent networking automobile anonymous identity authentication system and method based on block chain | |
CN112733198A (en) | Block chain light node data acquisition method and device | |
CN114461730B (en) | Self-adaptive block data compression method based on remainder system | |
CN115484030B (en) | Enterprise tax data sharing method and system based on Internet of things technology | |
CN113055160B (en) | Intelligent education safety protection method and system based on Kerberos identity authentication protocol | |
CN115580431A (en) | Private data access control method based on alliance chain intelligent contract |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A blockchain based video storage management method and system Granted publication date: 20210910 Pledgee: Chengdong Branch of Nanjing Bank Co.,Ltd. Pledgor: Nanjing bailence Intelligent Technology Co.,Ltd. Registration number: Y2024980014845 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |