CN113542439A - Distributed data storage access method and device - Google Patents

Distributed data storage access method and device Download PDF

Info

Publication number
CN113542439A
CN113542439A CN202111094377.4A CN202111094377A CN113542439A CN 113542439 A CN113542439 A CN 113542439A CN 202111094377 A CN202111094377 A CN 202111094377A CN 113542439 A CN113542439 A CN 113542439A
Authority
CN
China
Prior art keywords
entity
nodes
access
node
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111094377.4A
Other languages
Chinese (zh)
Other versions
CN113542439B (en
Inventor
林剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Spacetime Cloud Technology Co ltd
Original Assignee
Shenzhen Spacetime Cloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Spacetime Cloud Technology Co ltd filed Critical Shenzhen Spacetime Cloud Technology Co ltd
Priority to CN202111094377.4A priority Critical patent/CN113542439B/en
Publication of CN113542439A publication Critical patent/CN113542439A/en
Application granted granted Critical
Publication of CN113542439B publication Critical patent/CN113542439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2219Large Object storage; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/561Adding application-functional data or data for application control, e.g. adding metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention provides a distributed data storage access method and a distributed data storage access device, wherein an election committee comprising M nodes is randomly generated from N nodes, a unique block-out node is elected from the M nodes according to the election committee, the election committee elects from the N nodes to generate Y credible nodes, the Y credible nodes and the unique block-out node form a distributed storage block chain system together, and meta information of entity propaganda data is received based on the distributed storage block chain system; the unique block-out node carries out link storage on the meta-information of the entity propaganda material; receiving and analyzing a query statement of an access terminal based on a distributed storage block chain system; and providing a contact way for the access terminal to be connected with the entity data providing terminal according to the contact request of the access terminal so that the access terminal can be connected with the entity data providing terminal to obtain the private key, thereby effectively balancing the relationship of three aspects of data security, data value independent control and processing efficiency of a block chain system.

Description

Distributed data storage access method and device
Technical Field
The present invention relates to the field of distributed storage technologies, and in particular, to a distributed data storage access method and apparatus.
Background
The traditional entity transaction system generally comprises a transaction intermediary server, an access terminal and an entity data providing terminal. The access terminal and the entity data providing terminal register and log on the transaction intermediary server, so that the access terminal can search and select the entity under the line to a certain extent through the network, and the entity data providing terminal can popularize and publicize the entity information under the line.
However, due to market competition and user preference, there are often multiple transaction mediation servers, which results in the following problems to be solved:
first, the offline entities on each transaction broker server are limited, and the offline entity sharing by the respective transaction broker servers is not performed, which results in limited offline entities searched by the access terminal on a single broker server.
Second, whether it is the access end or the entity data providing end, if it is intended to cooperate with more intermediaries, it means that it is necessary to perform many complicated registration and login procedures on different intermediary servers, which not only increases the lease cost, but also continuously provides the own data to different intermediary servers, thus burying a huge hidden danger of information leakage.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a distributed data storage access method.
In a first aspect of the embodiments of the present invention, a distributed data storage access method is provided, including:
randomly generating an election committee comprising M nodes from the N nodes, and electing and generating a unique block-out node from the M nodes according to the election committee, wherein M and N are positive integers, and M is smaller than N;
the election committee elects to generate Y credible nodes from the N nodes, and the Y credible nodes and the unique block-out node form a distributed storage block chain system together, wherein Y is larger than M and smaller than N;
receiving meta-information of entity propaganda materials based on the distributed storage area blockchain system, wherein the meta-information of the entity propaganda materials only corresponds to an offline entity identity, and the entity propaganda materials are stored in an intermediary server and read by a private key provided by an entity data providing end;
according to the unique piece node, link storage is carried out on the meta information of the entity propaganda material;
receiving and analyzing a query statement of an access terminal based on the distributed storage block chain system, and acquiring the identity of the offline entity matched with the query statement;
and providing a contact way for the access terminal to be connected with the entity data providing terminal according to the contact request of the access terminal so that the access terminal can be connected with the entity data providing terminal to obtain the private key.
Optionally, in a possible implementation manner of the first aspect, providing, to the access terminal, a contact manner for interfacing with the entity data providing terminal according to the contact request of the access terminal includes:
acquiring a contact way of the access terminal to generate a dynamic verification code;
and providing the contact information of the entity data providing end to the access end according to the dynamic verification code.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
and acquiring access feedback of an access terminal after accessing the offline entity based on the distributed storage area block chain system.
Optionally, in a possible implementation manner of the first aspect, after obtaining access feedback after the access terminal accesses the offline entity based on the distributed storage block chain system, the method further includes:
forwarding the access feedback to a down-link verification node, wherein the down-link verification node verifies the access feedback to obtain a verification result;
and storing the verification result based on the distributed storage area blockchain system.
Optionally, in a possible implementation manner of the first aspect, after obtaining access feedback after the access terminal accesses the offline entity based on the distributed storage block chain system, the method further includes:
if the access feedback is negative feedback, forwarding the negative feedback to a down-link verification node, and verifying the negative feedback by the down-link verification node to obtain a verification result;
based on the distributed storage block chain system, the verification result is subjected to review processing, and the review result is obtained and is linked for storage;
and if the review result indicates that the negative feedback is true, triggering the intelligent contract to deduct the rights of the entity data provider, and if the review result indicates that the negative feedback is false, triggering the intelligent contract to deduct the rights of the access terminal.
Optionally, in a possible implementation manner of the first aspect, reviewing the verification result based on the distributed storage block chain system, and obtaining and linking the review result for storage includes:
carrying out review processing on the verification result based on Y trusted nodes to obtain a review result;
and packaging the review result according to the unique block-out node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage.
Optionally, in a possible implementation manner of the first aspect, reviewing the verification result based on the distributed storage block chain system, and obtaining and linking the review result for storage includes:
giving the unique block-out node verification right based on Y credible nodes;
according to the verification right of the only block outlet node, carrying out review processing on the verification result to obtain a review result;
and packaging the review result according to the unique block-out node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage.
Optionally, in a possible implementation manner of the first aspect, after obtaining access feedback after the access terminal accesses the offline entity based on the distributed storage block chain system, the method further includes:
giving the unique block-out node verification right based on Y credible nodes;
according to the verification right of the only block output node, performing verification processing on negative feedback in the access feedback to obtain a verification result;
packaging the verification result according to the unique block outlet node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage;
and if the verification result indicates that the negative feedback is true, triggering the intelligent contract to deduct the rights of the entity data provider, and if the verification result indicates that the negative feedback is false, triggering the intelligent contract to deduct the rights of the access terminal.
In a second aspect of the embodiments of the present invention, a distributed data storage access apparatus is provided, including:
the node module is used for randomly generating an election committee comprising M nodes from the N nodes and electing and generating a unique block output node from the M nodes according to the election committee, wherein M and N are positive integers, and M is smaller than N;
an election module, configured to generate Y trusted nodes from the N nodes by an election committee, and form a distributed storage block chain system together with the unique block-out node, where Y is greater than M and smaller than N;
the data module is used for receiving the meta-information of entity propaganda materials based on the distributed storage area blockchain system, wherein the meta-information of the entity propaganda materials only corresponds to the identity of the offline entity, and the entity propaganda materials are stored in the intermediary server and read by a private key provided by the entity data providing end;
the storage module is used for carrying out link storage on the meta-information of the entity propaganda material according to the unique block-out node;
the query module is used for receiving and analyzing a query statement of an access terminal based on the distributed storage area blockchain system and acquiring the identity of the offline entity matched with the query statement;
and the private key module is used for providing a contact way for the access terminal to connect the entity data providing terminal according to the contact request of the access terminal so that the access terminal can be connected with the entity data providing terminal to obtain the private key.
In a third aspect of the embodiments of the present invention, a distributed data storage access device is provided, including: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of the first aspect of the invention as well as various possible aspects of the first aspect.
A fourth aspect of the embodiments of the present invention provides a readable storage medium, in which a computer program is stored, the computer program being, when executed by a processor, configured to implement the method according to the first aspect of the present invention and various possible aspects of the first aspect.
The invention provides a distributed data storage access method and a distributed data storage access device, wherein a distributed storage block chain system consisting of Y trusted nodes and a unique block node is used for performing link storage on meta information of entity propaganda materials, receiving query statements of an access end and analyzing the query statements to obtain the offline entity identity matched with the query statements; then, according to the contact request of the access terminal, providing a contact way for the access terminal to be in contact with the entity data providing terminal so that the access terminal can be in contact with the entity data providing terminal to obtain the private key; the technical means jointly achieve the technical effects of improving the transaction throughput of the blockchain system, protecting the privacy of the entity data providing end and the privacy of the access end, and inseparably form the data processing efficiency and the privacy protection of the blockchain system into a technical whole to achieve better balance.
Drawings
FIG. 1 is a flow chart of a distributed data storage access method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a user side and a request side according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a distributed data storage access device according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a distributed data storage access device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, which is a flowchart illustrating a distributed data storage access method according to an embodiment of the present invention, an execution subject of the method shown in fig. 1 may be a software and/or hardware device. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method comprises steps S101 to S106, and specifically comprises the following steps:
s101, randomly generating an election committee comprising M nodes from the N nodes, and electing and generating a unique block output node from the M nodes according to the election committee, wherein M and N are positive integers, and M is smaller than N.
It is understood that, referring to fig. 2, the blockchain has a plurality of nodes, and in the embodiment, a unique block node is found from the plurality of nodes to pack data to form a block. Firstly, an election committee comprising M nodes needs to be generated randomly, then the election committee is utilized to elect and generate a unique block output node from the M nodes, and then the data is packaged by the unique block output node, so that the calculation amount is less than that of a packaging mode in the prior art, and the efficiency is improved to a greater extent.
In some embodiments, randomly generating an election committee comprising M nodes from among the N nodes may be selected according to a preset election model as follows:
firstly, setting the participating N nodes as follows:
Figure 263714DEST_PATH_IMAGE001
Figure 39909DEST_PATH_IMAGE002
is that
Figure 616384DEST_PATH_IMAGE003
The private key and the public key of (c),
Figure 746014DEST_PATH_IMAGE004
is that
Figure 655326DEST_PATH_IMAGE003
Signing the Message before the random number generation algorithm starts
Figure 274526DEST_PATH_IMAGE005
Has been broadcast to each node. Each wheel
Figure 275981DEST_PATH_IMAGE006
Information of broadcast
Figure 68356DEST_PATH_IMAGE007
Figure 533972DEST_PATH_IMAGE008
Is to let receive
Figure DEST_PATH_IMAGE009
Node of
Figure 559960DEST_PATH_IMAGE010
Is the basis for the information participating in the T-th round.
The above is the advance setting of the preset election model.
After the preset election model is set, each node is arranged at the T-th round
Figure 907764DEST_PATH_IMAGE011
Will suggest a fixed length
Figure 379197DEST_PATH_IMAGE012
Binary number of
Figure 699320DEST_PATH_IMAGE013
The choice of L depends on the total number of nodes n,
Figure 988219DEST_PATH_IMAGE014
each round based on the random number of this round
Figure 698686DEST_PATH_IMAGE015
And
Figure 272012DEST_PATH_IMAGE016
the first M nodes are selected by sorting the nodes in the following step P1. And generating random numbers of T +1 rounds through step P2
Figure 508958DEST_PATH_IMAGE017
. Each round of random numbers is a binary number of fixed length bits R.
It should be noted that the above is a framework of the preset election model.
It is understood that through the above rounds of random elections, the top M nodes can be selected as an election committee.
Therein, step P1 (random number according to current round)
Figure 578545DEST_PATH_IMAGE015
To pair
Figure 104204DEST_PATH_IMAGE018
Sorting) specifically includes:
each node receives and acknowledges all node-proposed
Figure 776494DEST_PATH_IMAGE019
According to the agreed Hash function Hash (the Hash function Hash can be selected according to the required Hash result length, the selection range of the Hash is not limited), wherein the agreed result length after the Hash is
Figure 8892DEST_PATH_IMAGE020
Figure 90461DEST_PATH_IMAGE021
Is any constant which can be agreed by the consensus network, and calculates:
Figure 900154DEST_PATH_IMAGE022
Figure 251501DEST_PATH_IMAGE023
Figure 400722DEST_PATH_IMAGE024
Figure 202325DEST_PATH_IMAGE025
wherein the content of the first and second substances,
Figure 109101DEST_PATH_IMAGE026
is an operation to remove the leftmost l bits of a binary number s,
Figure 827921DEST_PATH_IMAGE027
is the bitwise and operation of binary numbers a, b of the same length.
Figure DEST_PATH_IMAGE028
Figure 628386DEST_PATH_IMAGE029
Figure 335311DEST_PATH_IMAGE030
Wherein the content of the first and second substances,
Figure 57280DEST_PATH_IMAGE031
is an operation that shifts s left by r bits;
Figure 750429DEST_PATH_IMAGE032
is to remove the leftmost bit of the binary number s
Figure 172445DEST_PATH_IMAGE033
The operation of the bits is carried out,
Figure 925638DEST_PATH_IMAGE034
is the result of truncating the a-th bit to the b-1-th bit of s.
Finally according to
Figure 134902DEST_PATH_IMAGE035
Ascending sort selects the top M committees for the current round. If the same condition occurs, comparing
Figure 756377DEST_PATH_IMAGE036
The order is determined in the arrival sequence of most nodes, and the priority of the earlier average arrival time is higher.
Step P2 (combining the first and last bits sorted in P1 to form the random number for the next round)
Figure 406801DEST_PATH_IMAGE017
) The method specifically comprises the following steps:
in step P1, the Last node of the ascending sort is recorded at the same time, which is called that the corresponding generated node is Last, the First node of the ascending sort is First, and α is the mixing ratio:
Figure 455528DEST_PATH_IMAGE037
it will be appreciated that this step may generate random numbers for the T +1 round
Figure 653554DEST_PATH_IMAGE017
It should be noted that in the scheme, multiple rounds of random selection are adopted through a preset election model, M nodes are randomly selected from any N nodes to serve as a committee, all the N nodes have a selection participation process, and the selection process cannot be jointly controlled by a few participants to select a result.
S102, the election committee elects the N nodes to generate Y credible nodes, and the Y credible nodes and the unique block-out node form a distributed storage block chain system together, wherein Y is larger than M and smaller than N.
It can be understood that the scheme forms a distributed storage block chain system, the distributed storage block chain system is composed of Y trusted nodes and a unique block outlet node, and subsequent data is stored by using the distributed storage block chain system.
S103, receiving the meta-information of the entity propaganda material based on the distributed storage area blockchain system, wherein the meta-information of the entity propaganda material only corresponds to the offline entity identity, and the entity propaganda material is stored in the intermediary server and is read by a private key provided by the entity data providing end.
The entity propaganda material can be propaganda materials such as pictures and videos, which are carriers for introducing offline entities in detail, and usually have a larger data size. After the visitor at the access end obtains the entity propaganda material, the visitor at the access end can realize the technical effects of more intuitively knowing the offline entity and improving the entity screening efficiency.
It should be noted that in the present solution, the screened Y trusted nodes and the only block-out node jointly form a distributed storage block chain system, and the distributed storage block chain system is used to process data.
And S104, performing link storage on the meta information of the entity propaganda material according to the unique block-out node.
The unique block-out node is selected by multiple screening in the distributed storage block chain system, and only acquires the meta-information of the entity propaganda materials, so that a large amount of entity propaganda materials are prevented from entering the block chain system to be processed, and the efficiency of the block chain system is improved. Wherein, each entity propaganda material meta-information corresponds to each entity propaganda material one by one, and the visitor can know the general view of a certain entity propaganda material by inquiring the entity propaganda material meta-information.
It should be noted that the entity collateral meta-information is a data structure with a smaller size than the entity collateral, and can be used as an abstract of a certain entity collateral.
It should be noted that the entity propaganda material is stored in the intermediate server, and read by the private key provided by the entity data providing end, so that the meta information of the entity propaganda material and the entity propaganda material are smartly and separately stored, and the storage pressure of the block chain system is reduced. Meanwhile, the entity propaganda materials can be accessed and read only by the private key of the data provider, so that the value control of the data provider on the entity propaganda materials can be realized, and the data security is ensured. The network resource waste caused by the public display of the traditional entity propaganda materials and the occurrence of undesirable network behaviors such as random embezzlement can be avoided, and the purpose of purifying the network is realized.
S105, receiving and analyzing a query statement of an access terminal based on the distributed storage block chain system, and acquiring the identity of the offline entity matched with the query statement.
Specifically, the block chain system receives the query statement at the access end, and analyzes the query statement to obtain the identity of the offline entity matched with the query statement. Wherein the manner of receiving and parsing the query statement may be a technical approach that is mature in the prior art. Taking the receiving of the query sentence as an example, the query may be performed by text or voice.
It should be noted that, a query statement may retrieve meta-information of multiple entity publicity materials that meet semantics, and then find the identity of the offline entity that matches the needs of the visitor.
And S106, providing a contact mode for the access terminal to be connected with the entity data providing terminal according to the contact request of the access terminal, so that the access terminal can be connected with the entity data providing terminal to obtain the private key.
It should be noted that, after finding the identity of the offline entity matching the requirement, the access end may request the blockchain system to acquire the contact information of the data provider of the offline entity to contact the data provider, and access the entity publicity information stored in the intermediary server through the private key provided by the data provider, thereby implementing the early-stage network screening before accessing the offline entity and improving the house renting efficiency.
It should be noted that, in this embodiment, the entity data provider only needs to register in the blockchain system, and does not need to register in each intermediary server, so that the complicated procedures can be reduced, data leakage can be avoided, and the data can be prevented from being used commercially or even illegally when the data is not allowed.
In addition, the entity data providing end can control the use state of the entity data under the control line through the private key, and the entity propaganda data can be inquired and retrieved by visitors on the block chain system through the meta-information of the entity propaganda data, so that the purpose that the data is generated by the visitors and the visitors benefit is fully realized.
It should be noted that the visitors can track the offline entities matching their own needs through the blockchain system without registering on various rental agency platforms one by one, which not only prevents personal data from being improperly used, but also makes rental more efficient and easier.
It is noted that, due to the simplification of the network communication procedures of the entity data provider and the access terminal, the network resources, for example, the bandwidth, are also greatly saved.
In a preferred embodiment, the step of providing the access terminal with the contact information of the data providing terminal of the docking entity according to the contact request of the access terminal includes:
acquiring a contact way of an access terminal to generate a dynamic verification code;
and providing the contact information of the entity data providing end to the access end according to the dynamic verification code.
It should be noted that, in the preferred embodiment, the distributed storage area block chain system acquires the contact way of the access terminal, generates the dynamic verification code, and sends the generated dynamic verification code to the access terminal for input confirmation, and the distributed storage area block chain system provides the contact way of the entity data providing terminal to the access terminal according to the dynamic verification code.
On the basis of the above embodiment, in order to supervise between the access terminal and the entity data providing terminal, the distributed data storage access method further includes: and acquiring access feedback of an access terminal after accessing the offline entity based on the distributed storage area block chain system.
It can be understood that, after the access terminal accesses the offline entity, there may be a situation that the entity data providing terminal is satisfied or not satisfied, and the distributed storage block chain system may obtain the access feedback storage, and the subsequent judgment of the user.
In practical applications, the access feedback may include positive feedback and negative feedback, and in order to ensure the accuracy of the access feedback, the present embodiment provides three verification manners for the access feedback, which are specifically as follows:
mode 1:
after the access feedback of the access terminal after accessing the offline entity is obtained based on the distributed storage block chain system, the method further comprises the following steps:
forwarding the access feedback to a down-link verification node, wherein the down-link verification node verifies the access feedback to obtain a verification result;
and storing the verification result based on the distributed storage area blockchain system.
It can be understood that the embodiment uses the down-link authentication node to authenticate the access feedback, obtain the authentication result, and then store the authentication result in the distributed storage area blockchain system for storage. And the verification result can be true or false, and the verification is performed by the down-link verification node so as to supervise the access end which uploads the access feedback and prevent the access end from performing malicious feedback.
Mode 2:
after the access feedback of the access terminal after accessing the offline entity is obtained based on the distributed storage block chain system, the method further comprises the following steps:
if the access feedback is negative feedback, forwarding the negative feedback to a down-link verification node, and verifying the negative feedback by the down-link verification node to obtain a verification result;
based on the distributed storage block chain system, the verification result is subjected to review processing, and the review result is obtained and is linked for storage;
and if the review result indicates that the negative feedback is true, triggering the intelligent contract to deduct the rights of the entity data provider, and if the review result indicates that the negative feedback is false, triggering the intelligent contract to deduct the rights of the access terminal.
It can be understood that, in the embodiment, only negative feedback in the access feedback is verified, thereby preventing malicious feedback of the access terminal and reducing the verified data volume.
It should be noted that, in the present embodiment, after the verification node performs the preliminary verification, the distributed storage block chain system is used for performing the verification again, that is, the review processing described above, so that the accuracy of the verification result is improved, and the misjudgment is prevented.
Mode 2.1:
in order to realize the review in the mode 2, the method carries out review processing on the verification result based on Y trusted nodes to obtain a review result; and packaging the review result according to the unique block-out node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage.
It can be understood that, in the present embodiment, the verification result is subjected to a review process by using Y trusted nodes in the distributed storage block chain system to obtain a review result, and the review result is subjected to a packaging uplink operation based on the only block node, so as to ensure the correctness of the review result.
In addition, the method adopts Y trusted nodes in the plurality of nodes to carry out the review processing, and ensures the correctness of the review result and simultaneously prevents the calculation amount of the distributed storage block chain system from being too high.
Mode 2.2:
in order to implement the review in the mode 2, the method gives the unique block-out node verification right based on Y trusted nodes; according to the verification right of the only block outlet node, carrying out review processing on the verification result to obtain a review result; and packaging the review result according to the unique block-out node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage.
It can be understood that, in the present embodiment, the verification result is re-checked by using the unique outgoing block node in the distributed storage block chain system to obtain the re-check result, and the re-check result is packed and linked up based on the unique outgoing block node, so as to ensure the correctness of the re-check result.
In addition, the method adopts the only block-out node in the plurality of nodes to carry out the review processing, thereby ensuring the correctness of the review result and greatly reducing the calculation amount of the distributed storage block chain system.
Mode 3:
after the access feedback of the access terminal after accessing the offline entity is obtained based on the distributed storage block chain system, the method further comprises the following steps:
giving the unique block-out node verification right based on Y credible nodes;
according to the verification right of the only block output node, performing verification processing on negative feedback in the access feedback to obtain a verification result;
packaging the verification result according to the unique block outlet node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage;
and if the verification result indicates that the negative feedback is true, triggering the intelligent contract to deduct the rights of the entity data provider, and if the verification result indicates that the negative feedback is false, triggering the intelligent contract to deduct the rights of the access terminal.
It can be understood that, in the present embodiment, the unique outgoing block node in the distributed storage block chain system is adopted to directly perform verification processing on the negative feedback in the access feedback, and the review result is subjected to packaging uplink based on the unique outgoing block node, so as to ensure the correctness of the review result.
The unique block-out node has the verification right given by the Y credible nodes, and only the unique block-out node is needed to verify the negative feedback, so that the correctness of the verification result is ensured, and the calculation amount is further reduced.
Referring to fig. 3, which is a schematic diagram illustrating a result of a distributed data storage access apparatus according to an embodiment of the present invention, the distributed data storage access apparatus includes:
the node module is used for randomly generating an election committee comprising M nodes from the N nodes and electing and generating a unique block output node from the M nodes according to the election committee, wherein M and N are positive integers, and M is smaller than N;
an election module, configured to generate Y trusted nodes from the N nodes by an election committee, and form a distributed storage block chain system together with the unique block-out node, where Y is greater than M and smaller than N;
the data module is used for receiving the meta-information of entity propaganda materials based on the distributed storage area blockchain system, wherein the meta-information of the entity propaganda materials only corresponds to the identity of the offline entity, and the entity propaganda materials are stored in the intermediary server and read by a private key provided by the entity data providing end;
the storage module is used for carrying out link storage on the meta-information of the entity propaganda material according to the unique block-out node;
the query module is used for receiving and analyzing a query statement of an access terminal based on the distributed storage area blockchain system and acquiring the identity of the offline entity matched with the query statement;
and the private key module is used for providing a contact way for the access terminal to connect the entity data providing terminal according to the contact request of the access terminal so that the access terminal can be connected with the entity data providing terminal to obtain the private key.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, which is a schematic diagram of a hardware structure of a distributed data storage access device according to an embodiment of the present invention, the distributed data storage access device 40 includes: a processor 41, memory 42 and computer programs; wherein
A memory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
A processor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, the memory 42 may be separate or integrated with the processor 41.
When the memory 42 is a device independent of the processor 41, the apparatus may further include:
a bus 43 for connecting the memory 42 and the processor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A distributed data storage access method, comprising:
randomly generating an election committee comprising M nodes from the N nodes, and electing and generating a unique block-out node from the M nodes according to the election committee, wherein M and N are positive integers, and M is smaller than N;
the election committee elects to generate Y credible nodes from the N nodes, and the Y credible nodes and the unique block-out node form a distributed storage block chain system together, wherein Y is larger than M and smaller than N;
receiving meta-information of entity propaganda materials based on the distributed storage area blockchain system, wherein the meta-information of the entity propaganda materials only corresponds to an offline entity identity, and the entity propaganda materials are stored in an intermediary server and read by a private key provided by an entity data providing end;
according to the unique piece node, link storage is carried out on the meta information of the entity propaganda material;
receiving and analyzing a query statement of an access terminal based on the distributed storage block chain system, and acquiring the identity of the offline entity matched with the query statement;
and providing a contact way for the access terminal to be connected with the entity data providing terminal according to the contact request of the access terminal so that the access terminal can be connected with the entity data providing terminal to obtain the private key.
2. The method according to claim 1, wherein providing the access terminal with a contact means for interfacing with the entity data provider according to the contact request of the access terminal comprises:
acquiring a contact way of the access terminal to generate a dynamic verification code;
and providing the contact information of the entity data providing end to the access end according to the dynamic verification code.
3. The method of claim 1, further comprising:
and acquiring access feedback of an access terminal after accessing the offline entity based on the distributed storage area block chain system.
4. The method of claim 3, after obtaining the access feedback after the accessing end accesses the offline entity based on the distributed blockchain system, further comprising:
forwarding the access feedback to a down-link verification node, wherein the down-link verification node verifies the access feedback to obtain a verification result;
and storing the verification result based on the distributed storage area blockchain system.
5. The method of claim 3, after obtaining the access feedback after the accessing end accesses the offline entity based on the distributed blockchain system, further comprising:
if the access feedback is negative feedback, forwarding the negative feedback to a down-link verification node, and verifying the negative feedback by the down-link verification node to obtain a verification result;
based on the distributed storage block chain system, the verification result is subjected to review processing, and the review result is obtained and is linked for storage;
and if the review result indicates that the negative feedback is true, triggering the intelligent contract to deduct the rights of the entity data provider, and if the review result indicates that the negative feedback is false, triggering the intelligent contract to deduct the rights of the access terminal.
6. The method of claim 5, wherein reviewing the verification result based on the distributed storage blockchain system, obtaining review results and storing the review results in a linked manner, comprises:
carrying out review processing on the verification result based on Y trusted nodes to obtain a review result;
and packaging the review result according to the unique block-out node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage.
7. The method of claim 5, wherein reviewing the verification result based on the distributed storage blockchain system, obtaining review results and storing the review results in a linked manner, comprises:
giving the unique block-out node verification right based on Y credible nodes;
according to the verification right of the only block outlet node, carrying out review processing on the verification result to obtain a review result;
and packaging the review result according to the unique block-out node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage.
8. The method of claim 5, after obtaining the access feedback after the accessing end accesses the offline entity based on the distributed blockchain system, further comprising:
giving the unique block-out node verification right based on Y credible nodes;
according to the verification right of the only block output node, performing verification processing on negative feedback in the access feedback to obtain a verification result;
packaging the verification result according to the unique block outlet node to form a current block, and broadcasting the current block to all nodes in the distributed storage block chain system for link storage;
and if the verification result indicates that the negative feedback is true, triggering the intelligent contract to deduct the rights of the entity data provider, and if the verification result indicates that the negative feedback is false, triggering the intelligent contract to deduct the rights of the access terminal.
9. A distributed data storage access device, comprising:
the node module is used for randomly generating an election committee comprising M nodes from the N nodes and electing and generating a unique block output node from the M nodes according to the election committee, wherein M and N are positive integers, and M is smaller than N;
an election module, configured to generate Y trusted nodes from the N nodes by an election committee, and form a distributed storage block chain system together with the unique block-out node, where Y is greater than M and smaller than N;
the data module is used for receiving the meta-information of entity propaganda materials based on the distributed storage area blockchain system, wherein the meta-information of the entity propaganda materials only corresponds to the identity of the offline entity, and the entity propaganda materials are stored in the intermediary server and read by a private key provided by the entity data providing end;
the storage module is used for carrying out link storage on the meta-information of the entity propaganda material according to the unique block-out node;
the query module is used for receiving and analyzing a query statement of an access terminal based on the distributed storage area blockchain system and acquiring the identity of the offline entity matched with the query statement;
and the private key module is used for providing a contact way for the access terminal to connect the entity data providing terminal according to the contact request of the access terminal so that the access terminal can be connected with the entity data providing terminal to obtain the private key.
10. A readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 8.
CN202111094377.4A 2021-09-17 2021-09-17 Distributed data storage access method and device Active CN113542439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111094377.4A CN113542439B (en) 2021-09-17 2021-09-17 Distributed data storage access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111094377.4A CN113542439B (en) 2021-09-17 2021-09-17 Distributed data storage access method and device

Publications (2)

Publication Number Publication Date
CN113542439A true CN113542439A (en) 2021-10-22
CN113542439B CN113542439B (en) 2021-12-07

Family

ID=78092830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111094377.4A Active CN113542439B (en) 2021-09-17 2021-09-17 Distributed data storage access method and device

Country Status (1)

Country Link
CN (1) CN113542439B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109165353A (en) * 2018-09-25 2019-01-08 安徽灵图壹智能科技有限公司 A kind of rent a house information retrieval method and system based on block chain
US20200026699A1 (en) * 2018-07-20 2020-01-23 True Blockchain Technology Ltd. Highly Performant Decentralized Public Ledger with Hybrid Consensus
WO2020038105A1 (en) * 2018-08-24 2020-02-27 阿里巴巴集团控股有限公司 Blockchain-based data storage method and apparatus
CN111292098A (en) * 2020-01-15 2020-06-16 北京航空航天大学 Trusted service supply chain-oriented block chain consensus mechanism construction method
CN111327565A (en) * 2018-12-13 2020-06-23 北京果仁宝软件技术有限责任公司 Block chaining and deblocking method and system
CN112734507A (en) * 2019-10-14 2021-04-30 上海旺链信息科技有限公司 House lease distribution method, distribution system and storage medium based on block chain
US20210203503A1 (en) * 2017-10-20 2021-07-01 Hewlett Packard Enterprise Development Lp Permissions from entities to access information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210203503A1 (en) * 2017-10-20 2021-07-01 Hewlett Packard Enterprise Development Lp Permissions from entities to access information
US20200026699A1 (en) * 2018-07-20 2020-01-23 True Blockchain Technology Ltd. Highly Performant Decentralized Public Ledger with Hybrid Consensus
WO2020038105A1 (en) * 2018-08-24 2020-02-27 阿里巴巴集团控股有限公司 Blockchain-based data storage method and apparatus
CN109165353A (en) * 2018-09-25 2019-01-08 安徽灵图壹智能科技有限公司 A kind of rent a house information retrieval method and system based on block chain
CN111327565A (en) * 2018-12-13 2020-06-23 北京果仁宝软件技术有限责任公司 Block chaining and deblocking method and system
CN112734507A (en) * 2019-10-14 2021-04-30 上海旺链信息科技有限公司 House lease distribution method, distribution system and storage medium based on block chain
CN111292098A (en) * 2020-01-15 2020-06-16 北京航空航天大学 Trusted service supply chain-oriented block chain consensus mechanism construction method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
钟晓宏: "https://www.jianshu.com/p/7c03fe85e5f4 区块链出块节点激励方案", 《简书》 *

Also Published As

Publication number Publication date
CN113542439B (en) 2021-12-07

Similar Documents

Publication Publication Date Title
CN107566124B (en) Hash operation-based consensus establishing method, block chain system and storage medium
KR102566892B1 (en) Blockchain consensus method, device and system
CN108494775B (en) Method for preventing network attack by using legal data or tampering legal data
CN108769230B (en) Transaction data storage method, device, server and storage medium
CN110177124B (en) Identity authentication method based on block chain and related equipment
US20210303633A1 (en) Shard hashing
CN110505228B (en) Edge cloud architecture-based big data processing method, system, medium and device
CN111523890A (en) Data processing method and device based on block chain, storage medium and equipment
WO2021022875A1 (en) Distributed data storage method and system
CN113055188A (en) Data processing method, device, equipment and storage medium
CN110059981B (en) Trust degree evaluation method and device and terminal equipment
CN112527420A (en) Interface data flow processing method and device, computer equipment and medium
CN116405929B (en) Secure access processing method and system suitable for cluster communication
WO2023016429A1 (en) Binary consensus method and apparatus capable of revoting, electronic device, and storage medium
CN112436997A (en) Chat room message distribution method, message distribution system and electronic equipment
CN112134883A (en) Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products
CN112291277A (en) Malicious software detection method, device, equipment and storage medium
CN108809929B (en) Rural financial system based on block chain technology
CN113542439B (en) Distributed data storage access method and device
CN110990413B (en) Block chain data storage device and rapid storage method thereof
CN110071966B (en) Block chain networking and data processing method based on cloud platform
CN112261427A (en) Malicious node identification method and device and electronic equipment
CN107277640A (en) Interactive approach, device and storage medium based on live platform
CN113556405B (en) Distributed management method and device for private information
CN112131602A (en) Method and device for quickly expanding trust relationship between nodes based on trusted computing and related products

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant