CN114221767A - File monitoring method for distributed network - Google Patents
File monitoring method for distributed network Download PDFInfo
- Publication number
- CN114221767A CN114221767A CN202111289513.5A CN202111289513A CN114221767A CN 114221767 A CN114221767 A CN 114221767A CN 202111289513 A CN202111289513 A CN 202111289513A CN 114221767 A CN114221767 A CN 114221767A
- Authority
- CN
- China
- Prior art keywords
- peer
- node
- file
- network
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 43
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000007246 mechanism Effects 0.000 claims description 9
- 239000000126 substance Substances 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000012552 review Methods 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 238000012550 audit Methods 0.000 claims description 3
- 238000013386 optimize process Methods 0.000 abstract description 2
- 230000008520 organization Effects 0.000 abstract description 2
- 238000012360 testing method Methods 0.000 abstract description 2
- 238000012795 verification Methods 0.000 abstract description 2
- 239000010410 layer Substances 0.000 description 14
- 238000010586 diagram Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000012792 core layer Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention relates to a file monitoring method of a distributed network. The verification test result of the file monitoring method for the distributed network shows that based on comparison of products of the same type, the file monitoring method for the distributed network has the advantages of more advanced organization structure, more optimized process and more reasonable program design, and the file monitoring efficiency is improved.
Description
Technical Field
The invention belongs to the technical field of computers, relates to an information processing technology, and particularly relates to a file monitoring method of a distributed network.
Background
With the rapid development of the internet and sharing concepts, the internet system also gradually goes up to the shared road; sharing of files between users is increasingly frequent; however, in the prior art, monitoring of distributed network files requires a neutralized control center; the workload of the control center is large, resulting in inefficient monitoring.
Disclosure of Invention
The invention relates to a file monitoring method of a distributed network, in the embodiment of the method, the distributed network comprises a plurality of nodes; the nodes comprise a first peer node and a second peer node; wherein the content of the first and second substances,
the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes; the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes; the second peer node may download files from the first peer node but limited or prohibited from uploading files; the first peer node is not limited to uploading or downloading files from the second peer node;
each first peer node monitors a plurality of second peer nodes; each monitored second peer node may also monitor a number of other second peer nodes;
the first peer node may be converted with the second peer node based on the node conversion rule.
The invention has the beneficial effect of providing a file monitoring method of a distributed network. The verification test result of the file monitoring method for the distributed network shows that based on comparison of products of the same type, the file monitoring method for the distributed network has the advantages of more advanced organization structure, more optimized process and more reasonable program design, executes logic and improves the file monitoring efficiency.
Drawings
FIG. 1 is a schematic diagram of a relationship between a network layer and nodes;
FIG. 2 is a schematic diagram of node monitoring logic;
figure 3 is a functional division diagram of the underlying protocol.
Detailed Description
The technical features of the different embodiments of the invention may be combined in any way in conformity with the gist of the invention, and therefore any specific embodiment should not be understood as limiting the scope of protection of the invention.
In some embodiments of the file monitoring methods of a distributed network, in embodiments of the methods, the distributed peer-to-peer network comprises a number of nodes; the nodes comprise a first peer node and a second peer node; wherein the content of the first and second substances,
the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes; the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes; the second peer node may download files from the first peer node but limited or prohibited from uploading files; the first peer node is not limited to uploading or downloading files from the second peer node;
each first peer node monitors a plurality of second peer nodes; each monitored second peer node may also monitor a number of other second peer nodes;
the first peer node may be converted with the second peer node based on the node conversion rule.
The term "distributed network" refers to a P2P network, i.e., a Peer-to-Peer computer network, is a distributed application architecture that distributes tasks and workloads among peers (peers), and is a networking or networking form of the Peer-to-Peer computing model at the application layer.
In some embodiments of the file monitoring method for the distributed network, the steps of monitoring, by the first peer node, the second peer node and the other second peer nodes by the second peer node are as follows:
A) downloading a file to be checked from a monitored second peer node;
B) carrying out Hash operation on the file to be audited to obtain a Hash value of the file to be audited;
C) matching the hash value of the file to be checked with the fingerprint database of the prohibited file to obtain a matching result;
D) processing is performed based on the matching result: if the matching result is that the file to be checked contains prohibited content, starting a punishment mechanism to punish a monitored second peer node; if the matching result is that the file to be audited does not contain prohibited content, taking the hash value of the file to be audited as the fingerprint of the security file; and uploading the fingerprint of the security file to a qualified file fingerprint library.
In some embodiments of the file monitoring method of the distributed network, the first peer node and the second peer node may also manually review files to be reviewed uploaded by other second peer nodes and obtain a review result; the first peer node performs processing based on the audit result: if the auditing result is that the file to be audited contains the prohibited content, starting a punishment mechanism to punish a second peer node, and carrying out hash operation on the prohibited file to obtain a hash value of the prohibited file; uploading the hash value of the prohibited file to a prohibited file fingerprint library;
and if the auditing result is that the file to be audited does not contain prohibited content, performing hash operation on the file to be audited to obtain a security file fingerprint, and uploading the security file fingerprint to a qualified file fingerprint library.
In some embodiments of a file monitoring method for a distributed network, the distributed peer-to-peer network includes a first peer-to-peer network and a second peer-to-peer network; wherein the content of the first and second substances,
uploading and downloading files in a peer-to-peer manner between first peer nodes in a first peer-to-peer network;
peer-to-peer uploading and downloading files between second peer nodes in a second peer-to-peer network;
in a hybrid network of a first peer-to-peer network and a second peer-to-peer network,
the first peer node is not limited to downloading files and uploading files from the second peer node;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
there are several first and second peer-to-peer networks.
In some embodiments of the file monitoring method of the distributed network, the steps of building the first peer-to-peer network by the first peer-to-peer node are as follows:
z1) connecting several other first peer nodes;
z2) creating a plurality of pairs of first peer-to-peer network private keys to distribute to other first peer nodes establishing connection relation;
z3) to be connected with other first peer nodes having the first peer-to-peer network private key.
In some embodiments of the file monitoring method for a distributed network, each first peer node possesses both a public key of the second peer network and a private key of the first peer network; each second peer node only possesses the public key of the second peer-to-peer network;
the public key of the second peer-to-peer network is configured for the distributed point-to-point network.
In some embodiments of the file monitoring method of the distributed network, the prohibited file fingerprint database is stored in each node of the first peer-to-peer network in a distributed manner; the prohibited document fingerprint library comprises a plurality of prohibited document fingerprints; file contents corresponding to the prohibited file fingerprints in the prohibited file fingerprint library cannot be copied and issued continuously in other nodes; the qualified file fingerprint database is stored in each node of the first peer-to-peer network and the second peer-to-peer network in a distributed mode; the qualified file fingerprint database comprises a plurality of safe file fingerprints;
all files in the first peer-to-peer network are files which are qualified through auditing; one part of the files in the second peer-to-peer network are files which are qualified through auditing, and the other part of the files are files which are not audited; in comparison, the files in the first peer-to-peer network have security guarantee, and a small amount of prohibited files may exist in the files which are not checked in the second peer-to-peer network; if the user of the node wants to download the file with the safety guarantee, the user can go to a first peer-to-peer network for downloading; if the user of the node can ignore the small number of prohibited files, the user can choose to download the files from the second peer-to-peer network.
In some embodiments of the file monitoring method for the distributed network, a monitoring node independent of the first peer-to-peer network and the second peer-to-peer network may be further configured in the distributed peer-to-peer network; the monitoring node is responsible for distributing private keys to a number of first peer nodes in the first peer-to-peer network.
In some embodiments of the file monitoring method of the distributed network, the distributed peer-to-peer network is further configured with a penalty mechanism; the punishment mechanism is to reduce the number of initial backup nodes of the monitored second node; if the monitored second node is punished for multiple times, the number of the initial backup nodes of the monitored second node is reduced for multiple times until the number is 0; the number of the initial backup nodes of each content publishing node is regulated according to the number of nodes which are closer to the content publishing node in the distributed network;
judging the distance between the node x and the node y, and performing exclusive OR (XOR) on the distance between the node x and the node y by binary operation, wherein d (x, y) is x ≦ y; when each node is provided with a monitoring program and a node conversion program, a node ID is randomly distributed; based on IPFS, a Kademlia binary state tree structure is adopted to code each node, and each node has a path which reaches from the tree root of the binary state tree along the shortest unique prefix of the node; the serial number of the number string formed by connecting the shortest unique prefix path in series is used as the node ID of the node;
a distributed hash table is commonly maintained in the distributed point-to-point network; the DHT entry contains a < key, value > pair; key is the hash value of the file; value is the node ID; key and value have the same value field, both 160 bits; < key, value > on 160-bit Hash, judging whether the distance between a first node x and a second node y is far or near by a binary arithmetic, and d (x, y) ═ x ≦ y; if the two binary bit results are the same, the XOR value of the two binary bit results is 0; if the two binary bit results are not the same, the XOR value of the two binary bit results is 1; searching along the direction of reducing the distance of the exclusive or value, starting to query from any network node, and reaching the result at most by only Log N step; and searching a plurality of nodes with close logical distance based on the distributed hash table and the binary arithmetic XOR.
In some embodiments of the file monitoring method of the distributed network, the node conversion rule is that when the backup nodes of the node are lower than a certain proportion of the number of the initial backup nodes, the node is converted into a second peer node; when the number of the backup nodes of the node is higher than a certain proportion of the number of the initial backup nodes, the node is converted into a first peer node.
In some embodiments of the file monitoring method for the distributed network, the distance between the first node x and the second node y is determined by xor operation, and d (x, y) ═ x ≦ y; when each node is provided with a monitoring program and a node conversion program, a node ID is randomly distributed; based on IPFS, a Kademlia binary state tree structure is adopted to code each node, and each node has a path which reaches from the tree root of the binary state tree along the shortest unique prefix of the node; the serial number of the number string formed by connecting the shortest unique prefix path in series is used as the node ID of the node;
a distributed hash table is commonly maintained in the distributed point-to-point network; the DHT entry contains a < key, value > pair; key is the hash value of the file; value is the node ID; key and value have the same value field, both 160 bits; < key, value > on 160-bit Hash, judging whether the distance between a first node x and a second node y is far or near by a binary arithmetic, and d (x, y) ═ x ≦ y; if the two binary bit results are the same, the XOR value of the two binary bit results is 0; if the two binary bit results are not the same, the XOR value of the two binary bit results is 1; searching along the direction of reducing the distance of the exclusive or value, starting to query from any network node, and reaching the result at most by only Log N step; and searching a plurality of nodes with close logical distance based on the distributed hash table and the binary arithmetic XOR.
The invention is further illustrated by the following more specific examples:
referring to fig. 1, a schematic diagram of a network layer and a node relationship of a file monitoring method of a distributed network according to this embodiment is shown; the distributed point-to-point network comprises a plurality of nodes; the nodes comprise a first peer node and a second peer node; the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes; the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes; the second peer node may download files from the first peer node but limited or prohibited from uploading files; the first peer node may download files from the second peer node and may also upload files; each first peer node monitors a plurality of second peer nodes;
each monitored second peer node may also monitor a number of other second peer nodes;
the distributed peer-to-peer network comprises a first peer-to-peer network and a second peer-to-peer network; wherein the content of the first and second substances,
uploading and downloading files in a peer-to-peer manner between first peer nodes in a first peer-to-peer network;
peer-to-peer uploading and downloading files between second peer nodes in a second peer-to-peer network;
in a hybrid network of a first peer-to-peer network and a second peer-to-peer network,
the first peer node is not limited to downloading files and uploading files from the second peer node;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
the distributed peer-to-peer network can be also provided with a monitoring node independent of the first peer-to-peer network and the second peer-to-peer network; the monitoring node is responsible for distributing private keys to a number of first peer nodes in the first peer-to-peer network.
Referring to fig. 2, a schematic diagram of a node monitoring logic of a file monitoring method of a distributed network according to this embodiment is shown; the steps of monitoring the second peer node by the first peer node and monitoring other second peer nodes by the second peer node are as follows:
A) downloading a file to be checked from a monitored second peer node;
B) carrying out Hash operation on the file to be audited to obtain a Hash value of the file to be audited;
C) matching the hash value of the file to be checked with the fingerprint database of the prohibited file to obtain a matching result;
D) processing is performed based on the matching result: if the matching result is that the file to be checked contains prohibited content, starting a punishment mechanism to punish a monitored second peer node; if the matching result is that the file to be audited does not contain prohibited content, taking the hash value of the file to be audited as the fingerprint of the security file; and uploading the fingerprint of the security file to a qualified file fingerprint library.
Referring to fig. 3, a bottom layer protocol function partition diagram of a file monitoring method for a distributed network according to this embodiment is shown; the functions of a bottom layer protocol of the distributed point-to-point network comprise an application layer, a content examination layer, a scheduling layer, a routing layer, a link layer and a network layer;
the application layer is also a core layer, can be said to be an implementation layer of all protocols, and is also an application program which runs, can realize network acceleration, data valuing, and also can realize the economic value of IPFS, so as to accelerate the ecological development of the distributed storage network;
the content review layer mainly has the function of reviewing the content of the file.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform functions by operating on input data and generating output.
To send interactions with a user, embodiments of the subject matter described in this specification can be implemented on a computer having: a display device, for example, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to a user; and a keyboard and a pointing device, such as a mouse or trackball, by which a user can communicate input to the computer. Other kinds of devices may also be used to send interactions with the user; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user may be received in any form, including acoustic, speech, or tactile input. In addition, the computer may interact with the user by sending documents to a device used by the user and receiving documents from the device; for example, by sending a web page to a web browser on the user's client device in response to a request received from the web browser.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features that may embody particular implementations of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in combination and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Claims (10)
1. A file monitoring method of a distributed network is characterized in that the distributed network comprises a plurality of nodes;
the nodes comprise a first peer node and a second peer node; wherein the content of the first and second substances,
the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes;
the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
the first peer node is not limited to uploading or downloading files from the second peer node;
each first peer node monitoring a number of the second peer nodes; each monitored second peer node may also monitor a number of other said second peer nodes;
the first peer node may be switched with the second peer node based on a node switching rule.
2. The method according to claim 1, wherein the steps of the first peer node monitoring the second peer node and the second peer node monitoring the other second peer nodes are as follows:
A) downloading a file to be checked from the monitored second peer node;
B) carrying out Hash operation on the file to be audited to obtain a Hash value of the file to be audited;
C) matching the hash value of the file to be audited with the fingerprint library of the prohibited file to obtain a matching result;
D) processing is performed based on the matching result: if the matching result is that the file to be checked contains prohibited content, starting a punishment mechanism to punish the monitored second peer node; if the matching result is that the file to be audited does not contain prohibited content, taking the hash value of the file to be audited as a security file fingerprint; and uploading the security file fingerprint to a qualified file fingerprint library.
3. The method according to claim 2, wherein the first peer node and the second peer node may also manually review the to-be-reviewed file uploaded by the other second peer node and obtain a review result; the first peer node performs processing based on the audit result: if the audit result indicates that the file to be audited contains prohibited content, a punishment mechanism is started to punish the second peer node uploading the file to be audited, and the prohibited file is subjected to hash operation to obtain a hash value of the prohibited file; uploading the hash value of the prohibited file to a fingerprint library of the prohibited file;
and if the auditing result is that the file to be audited does not contain prohibited content, performing hash operation on the file to be audited to obtain a security file fingerprint, and uploading the security file fingerprint to the qualified file fingerprint library.
4. The method of claim 2, wherein the distributed network is further configured with the penalty mechanism; the penalty mechanism is to reduce the number of initial backup nodes of the second node being monitored; if the monitored second node is punished for multiple times, the number of the backup nodes at the beginning of the monitored second node is reduced for multiple times until the number is 0; the initial backup node number of each content publishing node is specified according to the number of nodes which are closer to the content publishing node in the distributed network.
5. The method according to claim 1, wherein the node conversion rule is that when the number of the backup nodes of the node is lower than a certain proportion of the number of the initial backup nodes, the node is converted into the second peer node; and when the number of the backup nodes of the node is higher than a certain proportion of the number of the initial backup nodes, the node is converted into the first peer node.
6. The method of claim 4, wherein the distributed network comprises a first peer-to-peer network and a second peer-to-peer network; wherein the content of the first and second substances,
peer-to-peer uploading and downloading files between the first peer nodes within the first peer-to-peer network;
peer-to-peer uploading and downloading files between the second peer nodes within the second peer-to-peer network;
in a hybrid network of the first peer-to-peer network and the second peer-to-peer network,
the first peer node is not limited to downloading and uploading files from the second peer node;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
the first peer-to-peer network and the second peer-to-peer network are respectively provided with a plurality of networks.
7. The method according to claim 6, wherein the step of the first peer node building the first peer network is as follows:
z1) connecting a number of other said first peer nodes;
z2) creating a plurality of pairs of first peer-to-peer network private keys to be distributed to other first peer nodes establishing connection relations;
z3) to be connected to each other two by two with other first peer nodes having said first peer-to-peer network private key.
8. The method according to claim 7, wherein each of the first peer nodes possesses both a public key of the second peer network and a private key of the first peer network; each second peer node only owns the public key of the second peer network.
9. The method of claim 3, wherein the fingerprint library of prohibited files is stored in distributed manner in each node of the first peer-to-peer network; the prohibited document fingerprint library comprises a plurality of prohibited document fingerprints; file contents corresponding to the prohibited file fingerprints in the prohibited file fingerprint library cannot be copied and issued continuously in other nodes; the qualified file fingerprint libraries are simultaneously stored in distributed mode in each node of the first peer-to-peer network and the second peer-to-peer network; the qualified file fingerprint library comprises a plurality of secure file fingerprints.
10. The method according to claim 1, wherein a monitoring node independent from the first peer-to-peer network and the second peer-to-peer network is further configured in the distributed network; the monitoring node is responsible for distributing private keys to a plurality of the first peer nodes in the first peer-to-peer network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111289513.5A CN114221767A (en) | 2021-11-02 | 2021-11-02 | File monitoring method for distributed network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111289513.5A CN114221767A (en) | 2021-11-02 | 2021-11-02 | File monitoring method for distributed network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114221767A true CN114221767A (en) | 2022-03-22 |
Family
ID=80696433
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111289513.5A Pending CN114221767A (en) | 2021-11-02 | 2021-11-02 | File monitoring method for distributed network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114221767A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115329033A (en) * | 2022-10-14 | 2022-11-11 | 中国信息通信研究院 | Method, device, equipment and medium for supervising data uplink in block chain |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070208748A1 (en) * | 2006-02-22 | 2007-09-06 | Microsoft Corporation | Reliable, efficient peer-to-peer storage |
CN101232415A (en) * | 2007-01-22 | 2008-07-30 | 华为技术有限公司 | Equity network node visit apparatus, method and system |
US20120011200A1 (en) * | 2010-07-06 | 2012-01-12 | Roxbeam Media Network Corporation | Method and apparatus for data storage in a peer-to-peer network |
US20160337437A1 (en) * | 2015-05-14 | 2016-11-17 | Vmware, Inc. | Peer-to-peer network download optimization |
US9672122B1 (en) * | 2014-09-29 | 2017-06-06 | Amazon Technologies, Inc. | Fault tolerant distributed tasks using distributed file systems |
CN109783466A (en) * | 2018-12-25 | 2019-05-21 | 上海点对点科技有限公司 | A kind of document management apparatus and method of the distributed storage network based on block chain |
US20190320014A1 (en) * | 2018-04-16 | 2019-10-17 | Infrared5, Inc. | System and Method for Real-Time Secure Multimedia Streaming over a Decentralized Network |
US20200184097A1 (en) * | 2018-12-06 | 2020-06-11 | Sap Se | Data security in a peer-to-peer network |
CN111930706A (en) * | 2020-07-08 | 2020-11-13 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Distributed network file storage system and method based on remote call |
CN111949630A (en) * | 2020-08-10 | 2020-11-17 | 大连理工大学 | Distributed block chain storage method based on file review mechanism |
CN112347040A (en) * | 2020-09-30 | 2021-02-09 | 宇龙计算机通信科技(深圳)有限公司 | File management method, device, storage medium and terminal |
-
2021
- 2021-11-02 CN CN202111289513.5A patent/CN114221767A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070208748A1 (en) * | 2006-02-22 | 2007-09-06 | Microsoft Corporation | Reliable, efficient peer-to-peer storage |
CN101232415A (en) * | 2007-01-22 | 2008-07-30 | 华为技术有限公司 | Equity network node visit apparatus, method and system |
US20120011200A1 (en) * | 2010-07-06 | 2012-01-12 | Roxbeam Media Network Corporation | Method and apparatus for data storage in a peer-to-peer network |
US9672122B1 (en) * | 2014-09-29 | 2017-06-06 | Amazon Technologies, Inc. | Fault tolerant distributed tasks using distributed file systems |
US20160337437A1 (en) * | 2015-05-14 | 2016-11-17 | Vmware, Inc. | Peer-to-peer network download optimization |
US20190320014A1 (en) * | 2018-04-16 | 2019-10-17 | Infrared5, Inc. | System and Method for Real-Time Secure Multimedia Streaming over a Decentralized Network |
CN112470156A (en) * | 2018-04-16 | 2021-03-09 | 红外线5有限公司 | System and method for secure real-time multimedia streaming over decentralized networks |
US20200184097A1 (en) * | 2018-12-06 | 2020-06-11 | Sap Se | Data security in a peer-to-peer network |
CN109783466A (en) * | 2018-12-25 | 2019-05-21 | 上海点对点科技有限公司 | A kind of document management apparatus and method of the distributed storage network based on block chain |
CN111930706A (en) * | 2020-07-08 | 2020-11-13 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Distributed network file storage system and method based on remote call |
CN111949630A (en) * | 2020-08-10 | 2020-11-17 | 大连理工大学 | Distributed block chain storage method based on file review mechanism |
CN112347040A (en) * | 2020-09-30 | 2021-02-09 | 宇龙计算机通信科技(深圳)有限公司 | File management method, device, storage medium and terminal |
Non-Patent Citations (3)
Title |
---|
S R BALASUNDARAM 等: "An Optimal Data Placement Strategy for Improving System Performance of Massive Data Applications Using Graph Clustering", INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE * |
刘琦;: "浅谈P2P网络文件传输", 科教文汇(下旬刊), no. 01 * |
章明;施勇;薛质;: "对等网络文件传播模型及监控技术", 电信快报, no. 08 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115329033A (en) * | 2022-10-14 | 2022-11-11 | 中国信息通信研究院 | Method, device, equipment and medium for supervising data uplink in block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101220614B1 (en) | Peer to peer gateway | |
CN113572618A (en) | Fabric and IPFS combined decentralized storage system and data storage method thereof | |
Kryukov et al. | Decentralized data storages: Technologies of construction | |
CN114221767A (en) | File monitoring method for distributed network | |
Giakkoupis et al. | A scheme for load balancing in heterogenous distributed hash tables | |
Marozzo et al. | A peer-to-peer framework for supporting mapreduce applications in dynamic cloud environments | |
Nikolaidis et al. | Using distributed ledger technology to democratize neural network training | |
Chen et al. | Method for replica creation in data grids based on complex networks | |
Souza et al. | A semantic-based approach for data management in a P2P system | |
Song et al. | Towards modeling large-scale data flows in a multidatacenter computing system with petri net | |
Akbarinia et al. | Design and implementation of Atlas P2P architecture | |
Wang et al. | Exploring peer-to-peer locality in multiple torrent environment | |
Mastroianni et al. | A scalable super-peer approach for public scientific computation | |
CN115567550A (en) | File information data storage method based on block chain and national cryptographic algorithm | |
Marinković et al. | A distributed catalog for digitized cultural heritage | |
CN114138715A (en) | Family client-oriented cloud storage method and system | |
Yang et al. | A DHT-based infrastructure for content-based publish/subscribe services | |
Elwaer et al. | Optimizing data distribution in volunteer computing systems using resources of participants | |
Kodidala et al. | Big Data analysis of demand side management for Industrial IoT applications | |
de Vos et al. | DeScan: Censorship-resistant indexing and search for Web3 | |
KR102662399B1 (en) | Information notarization server, method and computer program for converting and managing safety management contents into distributed blocks | |
Haasn | Semantic technology and super-peer architecture for internet based distributed system resource discovery | |
Lisa et al. | Optimized Fusion Chain with Web3 Storage | |
Aebeloe | Decentralized Knowledge Graphs on the Web | |
Li | Research on the Application of Computer P2P Network Technology in Local Area Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |