CN114221767A - File monitoring method for distributed network - Google Patents

File monitoring method for distributed network Download PDF

Info

Publication number
CN114221767A
CN114221767A CN202111289513.5A CN202111289513A CN114221767A CN 114221767 A CN114221767 A CN 114221767A CN 202111289513 A CN202111289513 A CN 202111289513A CN 114221767 A CN114221767 A CN 114221767A
Authority
CN
China
Prior art keywords
peer
node
file
network
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111289513.5A
Other languages
Chinese (zh)
Inventor
陈霁红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhonghegu Investment Co ltd
Original Assignee
Beijing Zhonghegu Investment Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhonghegu Investment Co ltd filed Critical Beijing Zhonghegu Investment Co ltd
Priority to CN202111289513.5A priority Critical patent/CN114221767A/en
Publication of CN114221767A publication Critical patent/CN114221767A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention relates to a file monitoring method of a distributed network. The verification test result of the file monitoring method for the distributed network shows that based on comparison of products of the same type, the file monitoring method for the distributed network has the advantages of more advanced organization structure, more optimized process and more reasonable program design, and the file monitoring efficiency is improved.

Description

File monitoring method for distributed network
Technical Field
The invention belongs to the technical field of computers, relates to an information processing technology, and particularly relates to a file monitoring method of a distributed network.
Background
With the rapid development of the internet and sharing concepts, the internet system also gradually goes up to the shared road; sharing of files between users is increasingly frequent; however, in the prior art, monitoring of distributed network files requires a neutralized control center; the workload of the control center is large, resulting in inefficient monitoring.
Disclosure of Invention
The invention relates to a file monitoring method of a distributed network, in the embodiment of the method, the distributed network comprises a plurality of nodes; the nodes comprise a first peer node and a second peer node; wherein the content of the first and second substances,
the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes; the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes; the second peer node may download files from the first peer node but limited or prohibited from uploading files; the first peer node is not limited to uploading or downloading files from the second peer node;
each first peer node monitors a plurality of second peer nodes; each monitored second peer node may also monitor a number of other second peer nodes;
the first peer node may be converted with the second peer node based on the node conversion rule.
The invention has the beneficial effect of providing a file monitoring method of a distributed network. The verification test result of the file monitoring method for the distributed network shows that based on comparison of products of the same type, the file monitoring method for the distributed network has the advantages of more advanced organization structure, more optimized process and more reasonable program design, executes logic and improves the file monitoring efficiency.
Drawings
FIG. 1 is a schematic diagram of a relationship between a network layer and nodes;
FIG. 2 is a schematic diagram of node monitoring logic;
figure 3 is a functional division diagram of the underlying protocol.
Detailed Description
The technical features of the different embodiments of the invention may be combined in any way in conformity with the gist of the invention, and therefore any specific embodiment should not be understood as limiting the scope of protection of the invention.
In some embodiments of the file monitoring methods of a distributed network, in embodiments of the methods, the distributed peer-to-peer network comprises a number of nodes; the nodes comprise a first peer node and a second peer node; wherein the content of the first and second substances,
the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes; the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes; the second peer node may download files from the first peer node but limited or prohibited from uploading files; the first peer node is not limited to uploading or downloading files from the second peer node;
each first peer node monitors a plurality of second peer nodes; each monitored second peer node may also monitor a number of other second peer nodes;
the first peer node may be converted with the second peer node based on the node conversion rule.
The term "distributed network" refers to a P2P network, i.e., a Peer-to-Peer computer network, is a distributed application architecture that distributes tasks and workloads among peers (peers), and is a networking or networking form of the Peer-to-Peer computing model at the application layer.
In some embodiments of the file monitoring method for the distributed network, the steps of monitoring, by the first peer node, the second peer node and the other second peer nodes by the second peer node are as follows:
A) downloading a file to be checked from a monitored second peer node;
B) carrying out Hash operation on the file to be audited to obtain a Hash value of the file to be audited;
C) matching the hash value of the file to be checked with the fingerprint database of the prohibited file to obtain a matching result;
D) processing is performed based on the matching result: if the matching result is that the file to be checked contains prohibited content, starting a punishment mechanism to punish a monitored second peer node; if the matching result is that the file to be audited does not contain prohibited content, taking the hash value of the file to be audited as the fingerprint of the security file; and uploading the fingerprint of the security file to a qualified file fingerprint library.
In some embodiments of the file monitoring method of the distributed network, the first peer node and the second peer node may also manually review files to be reviewed uploaded by other second peer nodes and obtain a review result; the first peer node performs processing based on the audit result: if the auditing result is that the file to be audited contains the prohibited content, starting a punishment mechanism to punish a second peer node, and carrying out hash operation on the prohibited file to obtain a hash value of the prohibited file; uploading the hash value of the prohibited file to a prohibited file fingerprint library;
and if the auditing result is that the file to be audited does not contain prohibited content, performing hash operation on the file to be audited to obtain a security file fingerprint, and uploading the security file fingerprint to a qualified file fingerprint library.
In some embodiments of a file monitoring method for a distributed network, the distributed peer-to-peer network includes a first peer-to-peer network and a second peer-to-peer network; wherein the content of the first and second substances,
uploading and downloading files in a peer-to-peer manner between first peer nodes in a first peer-to-peer network;
peer-to-peer uploading and downloading files between second peer nodes in a second peer-to-peer network;
in a hybrid network of a first peer-to-peer network and a second peer-to-peer network,
the first peer node is not limited to downloading files and uploading files from the second peer node;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
there are several first and second peer-to-peer networks.
In some embodiments of the file monitoring method of the distributed network, the steps of building the first peer-to-peer network by the first peer-to-peer node are as follows:
z1) connecting several other first peer nodes;
z2) creating a plurality of pairs of first peer-to-peer network private keys to distribute to other first peer nodes establishing connection relation;
z3) to be connected with other first peer nodes having the first peer-to-peer network private key.
In some embodiments of the file monitoring method for a distributed network, each first peer node possesses both a public key of the second peer network and a private key of the first peer network; each second peer node only possesses the public key of the second peer-to-peer network;
the public key of the second peer-to-peer network is configured for the distributed point-to-point network.
In some embodiments of the file monitoring method of the distributed network, the prohibited file fingerprint database is stored in each node of the first peer-to-peer network in a distributed manner; the prohibited document fingerprint library comprises a plurality of prohibited document fingerprints; file contents corresponding to the prohibited file fingerprints in the prohibited file fingerprint library cannot be copied and issued continuously in other nodes; the qualified file fingerprint database is stored in each node of the first peer-to-peer network and the second peer-to-peer network in a distributed mode; the qualified file fingerprint database comprises a plurality of safe file fingerprints;
all files in the first peer-to-peer network are files which are qualified through auditing; one part of the files in the second peer-to-peer network are files which are qualified through auditing, and the other part of the files are files which are not audited; in comparison, the files in the first peer-to-peer network have security guarantee, and a small amount of prohibited files may exist in the files which are not checked in the second peer-to-peer network; if the user of the node wants to download the file with the safety guarantee, the user can go to a first peer-to-peer network for downloading; if the user of the node can ignore the small number of prohibited files, the user can choose to download the files from the second peer-to-peer network.
In some embodiments of the file monitoring method for the distributed network, a monitoring node independent of the first peer-to-peer network and the second peer-to-peer network may be further configured in the distributed peer-to-peer network; the monitoring node is responsible for distributing private keys to a number of first peer nodes in the first peer-to-peer network.
In some embodiments of the file monitoring method of the distributed network, the distributed peer-to-peer network is further configured with a penalty mechanism; the punishment mechanism is to reduce the number of initial backup nodes of the monitored second node; if the monitored second node is punished for multiple times, the number of the initial backup nodes of the monitored second node is reduced for multiple times until the number is 0; the number of the initial backup nodes of each content publishing node is regulated according to the number of nodes which are closer to the content publishing node in the distributed network;
judging the distance between the node x and the node y, and performing exclusive OR (XOR) on the distance between the node x and the node y by binary operation, wherein d (x, y) is x ≦ y; when each node is provided with a monitoring program and a node conversion program, a node ID is randomly distributed; based on IPFS, a Kademlia binary state tree structure is adopted to code each node, and each node has a path which reaches from the tree root of the binary state tree along the shortest unique prefix of the node; the serial number of the number string formed by connecting the shortest unique prefix path in series is used as the node ID of the node;
a distributed hash table is commonly maintained in the distributed point-to-point network; the DHT entry contains a < key, value > pair; key is the hash value of the file; value is the node ID; key and value have the same value field, both 160 bits; < key, value > on 160-bit Hash, judging whether the distance between a first node x and a second node y is far or near by a binary arithmetic, and d (x, y) ═ x ≦ y; if the two binary bit results are the same, the XOR value of the two binary bit results is 0; if the two binary bit results are not the same, the XOR value of the two binary bit results is 1; searching along the direction of reducing the distance of the exclusive or value, starting to query from any network node, and reaching the result at most by only Log N step; and searching a plurality of nodes with close logical distance based on the distributed hash table and the binary arithmetic XOR.
In some embodiments of the file monitoring method of the distributed network, the node conversion rule is that when the backup nodes of the node are lower than a certain proportion of the number of the initial backup nodes, the node is converted into a second peer node; when the number of the backup nodes of the node is higher than a certain proportion of the number of the initial backup nodes, the node is converted into a first peer node.
In some embodiments of the file monitoring method for the distributed network, the distance between the first node x and the second node y is determined by xor operation, and d (x, y) ═ x ≦ y; when each node is provided with a monitoring program and a node conversion program, a node ID is randomly distributed; based on IPFS, a Kademlia binary state tree structure is adopted to code each node, and each node has a path which reaches from the tree root of the binary state tree along the shortest unique prefix of the node; the serial number of the number string formed by connecting the shortest unique prefix path in series is used as the node ID of the node;
a distributed hash table is commonly maintained in the distributed point-to-point network; the DHT entry contains a < key, value > pair; key is the hash value of the file; value is the node ID; key and value have the same value field, both 160 bits; < key, value > on 160-bit Hash, judging whether the distance between a first node x and a second node y is far or near by a binary arithmetic, and d (x, y) ═ x ≦ y; if the two binary bit results are the same, the XOR value of the two binary bit results is 0; if the two binary bit results are not the same, the XOR value of the two binary bit results is 1; searching along the direction of reducing the distance of the exclusive or value, starting to query from any network node, and reaching the result at most by only Log N step; and searching a plurality of nodes with close logical distance based on the distributed hash table and the binary arithmetic XOR.
The invention is further illustrated by the following more specific examples:
referring to fig. 1, a schematic diagram of a network layer and a node relationship of a file monitoring method of a distributed network according to this embodiment is shown; the distributed point-to-point network comprises a plurality of nodes; the nodes comprise a first peer node and a second peer node; the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes; the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes; the second peer node may download files from the first peer node but limited or prohibited from uploading files; the first peer node may download files from the second peer node and may also upload files; each first peer node monitors a plurality of second peer nodes;
each monitored second peer node may also monitor a number of other second peer nodes;
the distributed peer-to-peer network comprises a first peer-to-peer network and a second peer-to-peer network; wherein the content of the first and second substances,
uploading and downloading files in a peer-to-peer manner between first peer nodes in a first peer-to-peer network;
peer-to-peer uploading and downloading files between second peer nodes in a second peer-to-peer network;
in a hybrid network of a first peer-to-peer network and a second peer-to-peer network,
the first peer node is not limited to downloading files and uploading files from the second peer node;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
the distributed peer-to-peer network can be also provided with a monitoring node independent of the first peer-to-peer network and the second peer-to-peer network; the monitoring node is responsible for distributing private keys to a number of first peer nodes in the first peer-to-peer network.
Referring to fig. 2, a schematic diagram of a node monitoring logic of a file monitoring method of a distributed network according to this embodiment is shown; the steps of monitoring the second peer node by the first peer node and monitoring other second peer nodes by the second peer node are as follows:
A) downloading a file to be checked from a monitored second peer node;
B) carrying out Hash operation on the file to be audited to obtain a Hash value of the file to be audited;
C) matching the hash value of the file to be checked with the fingerprint database of the prohibited file to obtain a matching result;
D) processing is performed based on the matching result: if the matching result is that the file to be checked contains prohibited content, starting a punishment mechanism to punish a monitored second peer node; if the matching result is that the file to be audited does not contain prohibited content, taking the hash value of the file to be audited as the fingerprint of the security file; and uploading the fingerprint of the security file to a qualified file fingerprint library.
Referring to fig. 3, a bottom layer protocol function partition diagram of a file monitoring method for a distributed network according to this embodiment is shown; the functions of a bottom layer protocol of the distributed point-to-point network comprise an application layer, a content examination layer, a scheduling layer, a routing layer, a link layer and a network layer;
the application layer is also a core layer, can be said to be an implementation layer of all protocols, and is also an application program which runs, can realize network acceleration, data valuing, and also can realize the economic value of IPFS, so as to accelerate the ecological development of the distributed storage network;
the content review layer mainly has the function of reviewing the content of the file.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform functions by operating on input data and generating output.
To send interactions with a user, embodiments of the subject matter described in this specification can be implemented on a computer having: a display device, for example, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to a user; and a keyboard and a pointing device, such as a mouse or trackball, by which a user can communicate input to the computer. Other kinds of devices may also be used to send interactions with the user; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user may be received in any form, including acoustic, speech, or tactile input. In addition, the computer may interact with the user by sending documents to a device used by the user and receiving documents from the device; for example, by sending a web page to a web browser on the user's client device in response to a request received from the web browser.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features that may embody particular implementations of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in combination and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.

Claims (10)

1. A file monitoring method of a distributed network is characterized in that the distributed network comprises a plurality of nodes;
the nodes comprise a first peer node and a second peer node; wherein the content of the first and second substances,
the first peer-to-peer node uploads and downloads files to and from other first peer-to-peer nodes;
the second peer-to-peer node uploads and downloads files to and from other second peer-to-peer nodes;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
the first peer node is not limited to uploading or downloading files from the second peer node;
each first peer node monitoring a number of the second peer nodes; each monitored second peer node may also monitor a number of other said second peer nodes;
the first peer node may be switched with the second peer node based on a node switching rule.
2. The method according to claim 1, wherein the steps of the first peer node monitoring the second peer node and the second peer node monitoring the other second peer nodes are as follows:
A) downloading a file to be checked from the monitored second peer node;
B) carrying out Hash operation on the file to be audited to obtain a Hash value of the file to be audited;
C) matching the hash value of the file to be audited with the fingerprint library of the prohibited file to obtain a matching result;
D) processing is performed based on the matching result: if the matching result is that the file to be checked contains prohibited content, starting a punishment mechanism to punish the monitored second peer node; if the matching result is that the file to be audited does not contain prohibited content, taking the hash value of the file to be audited as a security file fingerprint; and uploading the security file fingerprint to a qualified file fingerprint library.
3. The method according to claim 2, wherein the first peer node and the second peer node may also manually review the to-be-reviewed file uploaded by the other second peer node and obtain a review result; the first peer node performs processing based on the audit result: if the audit result indicates that the file to be audited contains prohibited content, a punishment mechanism is started to punish the second peer node uploading the file to be audited, and the prohibited file is subjected to hash operation to obtain a hash value of the prohibited file; uploading the hash value of the prohibited file to a fingerprint library of the prohibited file;
and if the auditing result is that the file to be audited does not contain prohibited content, performing hash operation on the file to be audited to obtain a security file fingerprint, and uploading the security file fingerprint to the qualified file fingerprint library.
4. The method of claim 2, wherein the distributed network is further configured with the penalty mechanism; the penalty mechanism is to reduce the number of initial backup nodes of the second node being monitored; if the monitored second node is punished for multiple times, the number of the backup nodes at the beginning of the monitored second node is reduced for multiple times until the number is 0; the initial backup node number of each content publishing node is specified according to the number of nodes which are closer to the content publishing node in the distributed network.
5. The method according to claim 1, wherein the node conversion rule is that when the number of the backup nodes of the node is lower than a certain proportion of the number of the initial backup nodes, the node is converted into the second peer node; and when the number of the backup nodes of the node is higher than a certain proportion of the number of the initial backup nodes, the node is converted into the first peer node.
6. The method of claim 4, wherein the distributed network comprises a first peer-to-peer network and a second peer-to-peer network; wherein the content of the first and second substances,
peer-to-peer uploading and downloading files between the first peer nodes within the first peer-to-peer network;
peer-to-peer uploading and downloading files between the second peer nodes within the second peer-to-peer network;
in a hybrid network of the first peer-to-peer network and the second peer-to-peer network,
the first peer node is not limited to downloading and uploading files from the second peer node;
the second peer node may download files from the first peer node but limited or prohibited from uploading files;
the first peer-to-peer network and the second peer-to-peer network are respectively provided with a plurality of networks.
7. The method according to claim 6, wherein the step of the first peer node building the first peer network is as follows:
z1) connecting a number of other said first peer nodes;
z2) creating a plurality of pairs of first peer-to-peer network private keys to be distributed to other first peer nodes establishing connection relations;
z3) to be connected to each other two by two with other first peer nodes having said first peer-to-peer network private key.
8. The method according to claim 7, wherein each of the first peer nodes possesses both a public key of the second peer network and a private key of the first peer network; each second peer node only owns the public key of the second peer network.
9. The method of claim 3, wherein the fingerprint library of prohibited files is stored in distributed manner in each node of the first peer-to-peer network; the prohibited document fingerprint library comprises a plurality of prohibited document fingerprints; file contents corresponding to the prohibited file fingerprints in the prohibited file fingerprint library cannot be copied and issued continuously in other nodes; the qualified file fingerprint libraries are simultaneously stored in distributed mode in each node of the first peer-to-peer network and the second peer-to-peer network; the qualified file fingerprint library comprises a plurality of secure file fingerprints.
10. The method according to claim 1, wherein a monitoring node independent from the first peer-to-peer network and the second peer-to-peer network is further configured in the distributed network; the monitoring node is responsible for distributing private keys to a plurality of the first peer nodes in the first peer-to-peer network.
CN202111289513.5A 2021-11-02 2021-11-02 File monitoring method for distributed network Pending CN114221767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111289513.5A CN114221767A (en) 2021-11-02 2021-11-02 File monitoring method for distributed network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111289513.5A CN114221767A (en) 2021-11-02 2021-11-02 File monitoring method for distributed network

Publications (1)

Publication Number Publication Date
CN114221767A true CN114221767A (en) 2022-03-22

Family

ID=80696433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111289513.5A Pending CN114221767A (en) 2021-11-02 2021-11-02 File monitoring method for distributed network

Country Status (1)

Country Link
CN (1) CN114221767A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115329033A (en) * 2022-10-14 2022-11-11 中国信息通信研究院 Method, device, equipment and medium for supervising data uplink in block chain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070208748A1 (en) * 2006-02-22 2007-09-06 Microsoft Corporation Reliable, efficient peer-to-peer storage
CN101232415A (en) * 2007-01-22 2008-07-30 华为技术有限公司 Equity network node visit apparatus, method and system
US20120011200A1 (en) * 2010-07-06 2012-01-12 Roxbeam Media Network Corporation Method and apparatus for data storage in a peer-to-peer network
US20160337437A1 (en) * 2015-05-14 2016-11-17 Vmware, Inc. Peer-to-peer network download optimization
US9672122B1 (en) * 2014-09-29 2017-06-06 Amazon Technologies, Inc. Fault tolerant distributed tasks using distributed file systems
CN109783466A (en) * 2018-12-25 2019-05-21 上海点对点科技有限公司 A kind of document management apparatus and method of the distributed storage network based on block chain
US20190320014A1 (en) * 2018-04-16 2019-10-17 Infrared5, Inc. System and Method for Real-Time Secure Multimedia Streaming over a Decentralized Network
US20200184097A1 (en) * 2018-12-06 2020-06-11 Sap Se Data security in a peer-to-peer network
CN111930706A (en) * 2020-07-08 2020-11-13 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Distributed network file storage system and method based on remote call
CN111949630A (en) * 2020-08-10 2020-11-17 大连理工大学 Distributed block chain storage method based on file review mechanism
CN112347040A (en) * 2020-09-30 2021-02-09 宇龙计算机通信科技(深圳)有限公司 File management method, device, storage medium and terminal

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070208748A1 (en) * 2006-02-22 2007-09-06 Microsoft Corporation Reliable, efficient peer-to-peer storage
CN101232415A (en) * 2007-01-22 2008-07-30 华为技术有限公司 Equity network node visit apparatus, method and system
US20120011200A1 (en) * 2010-07-06 2012-01-12 Roxbeam Media Network Corporation Method and apparatus for data storage in a peer-to-peer network
US9672122B1 (en) * 2014-09-29 2017-06-06 Amazon Technologies, Inc. Fault tolerant distributed tasks using distributed file systems
US20160337437A1 (en) * 2015-05-14 2016-11-17 Vmware, Inc. Peer-to-peer network download optimization
US20190320014A1 (en) * 2018-04-16 2019-10-17 Infrared5, Inc. System and Method for Real-Time Secure Multimedia Streaming over a Decentralized Network
CN112470156A (en) * 2018-04-16 2021-03-09 红外线5有限公司 System and method for secure real-time multimedia streaming over decentralized networks
US20200184097A1 (en) * 2018-12-06 2020-06-11 Sap Se Data security in a peer-to-peer network
CN109783466A (en) * 2018-12-25 2019-05-21 上海点对点科技有限公司 A kind of document management apparatus and method of the distributed storage network based on block chain
CN111930706A (en) * 2020-07-08 2020-11-13 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Distributed network file storage system and method based on remote call
CN111949630A (en) * 2020-08-10 2020-11-17 大连理工大学 Distributed block chain storage method based on file review mechanism
CN112347040A (en) * 2020-09-30 2021-02-09 宇龙计算机通信科技(深圳)有限公司 File management method, device, storage medium and terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
S R BALASUNDARAM 等: "An Optimal Data Placement Strategy for Improving System Performance of Massive Data Applications Using Graph Clustering", INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE *
刘琦;: "浅谈P2P网络文件传输", 科教文汇(下旬刊), no. 01 *
章明;施勇;薛质;: "对等网络文件传播模型及监控技术", 电信快报, no. 08 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115329033A (en) * 2022-10-14 2022-11-11 中国信息通信研究院 Method, device, equipment and medium for supervising data uplink in block chain

Similar Documents

Publication Publication Date Title
KR101220614B1 (en) Peer to peer gateway
CN113572618A (en) Fabric and IPFS combined decentralized storage system and data storage method thereof
Kryukov et al. Decentralized data storages: Technologies of construction
CN114221767A (en) File monitoring method for distributed network
Giakkoupis et al. A scheme for load balancing in heterogenous distributed hash tables
Marozzo et al. A peer-to-peer framework for supporting mapreduce applications in dynamic cloud environments
Nikolaidis et al. Using distributed ledger technology to democratize neural network training
Chen et al. Method for replica creation in data grids based on complex networks
Souza et al. A semantic-based approach for data management in a P2P system
Song et al. Towards modeling large-scale data flows in a multidatacenter computing system with petri net
Akbarinia et al. Design and implementation of Atlas P2P architecture
Wang et al. Exploring peer-to-peer locality in multiple torrent environment
Mastroianni et al. A scalable super-peer approach for public scientific computation
CN115567550A (en) File information data storage method based on block chain and national cryptographic algorithm
Marinković et al. A distributed catalog for digitized cultural heritage
CN114138715A (en) Family client-oriented cloud storage method and system
Yang et al. A DHT-based infrastructure for content-based publish/subscribe services
Elwaer et al. Optimizing data distribution in volunteer computing systems using resources of participants
Kodidala et al. Big Data analysis of demand side management for Industrial IoT applications
de Vos et al. DeScan: Censorship-resistant indexing and search for Web3
KR102662399B1 (en) Information notarization server, method and computer program for converting and managing safety management contents into distributed blocks
Haasn Semantic technology and super-peer architecture for internet based distributed system resource discovery
Lisa et al. Optimized Fusion Chain with Web3 Storage
Aebeloe Decentralized Knowledge Graphs on the Web
Li Research on the Application of Computer P2P Network Technology in Local Area Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination