CN115118734A - File sharing method, device and equipment - Google Patents

File sharing method, device and equipment Download PDF

Info

Publication number
CN115118734A
CN115118734A CN202210809702.9A CN202210809702A CN115118734A CN 115118734 A CN115118734 A CN 115118734A CN 202210809702 A CN202210809702 A CN 202210809702A CN 115118734 A CN115118734 A CN 115118734A
Authority
CN
China
Prior art keywords
file
subfiles
subfile
sharing
identifications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210809702.9A
Other languages
Chinese (zh)
Inventor
于宝成
王�义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Information Technology Co Ltd
Original Assignee
Jingdong Technology Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Information Technology Co Ltd filed Critical Jingdong Technology Information Technology Co Ltd
Priority to CN202210809702.9A priority Critical patent/CN115118734A/en
Publication of CN115118734A publication Critical patent/CN115118734A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The application provides a file sharing method, a device and equipment, wherein the method comprises the following steps: the method comprises the steps that a first device carries out fragmentation processing on a first file to be shared to obtain a plurality of subfiles; the method comprises the steps that a first device determines subfile identifications of a plurality of subfiles; correspondingly storing the subfile identifications of the subfiles and the subfiles to block chain nodes by the first equipment; the first device determines sharing information and sends the sharing information to a sharing server, the sharing information comprises a file name of the first file and a file identifier of the first file, and the sharing server is used for sharing the first file. The security of file sharing is improved.

Description

File sharing method, device and equipment
Technical Field
The present application relates to the field of communications, and in particular, to a method, an apparatus, and a device for sharing a file.
Background
The user can share files through the file server. For example, a user may upload a shared file to a file server, and other users may obtain the shared file through the file server.
In the related art, after a user uploads a shared file to a file server, a storage address of the shared file in the file server may be obtained. The user can share the storage address with other users, so that the other users can acquire the shared file from the file server according to the storage address. However, in the above process, if the storage address of the shared file in the file server is stolen, all the persons who acquire the storage address can acquire the shared file, which results in low security of storing the shared file.
Disclosure of Invention
The application provides a file sharing method, a file sharing device and file sharing equipment, and the safety of shared file storage is improved.
In a first aspect, an embodiment of the present application provides a file sharing method, including:
the method comprises the steps that a first device carries out fragmentation processing on a first file to be shared to obtain a plurality of subfiles;
the first device determining subfile identifications of the plurality of subfiles;
the first device correspondingly stores the subfile identifications of the subfiles and the subfiles to the block chain nodes;
the first device determines sharing information and sends the sharing information to a sharing server, wherein the sharing information comprises a file name of the first file and a file identifier of the first file, and the sharing server is used for sharing the first file.
In one possible implementation, the determining, by the first device, the subfile identities of the plurality of subfiles includes:
the first device determines a file identifier of the first file;
the first device acquires file numbers of the plurality of subfiles;
and the first equipment respectively combines the file identification and the file numbers of the plurality of subfiles to obtain the subfile identifications of the plurality of subfiles.
In a possible implementation, the determining, by the first device, the file identifier of the first file includes:
and the first equipment performs hash operation on the first file to obtain a file identifier of the first file.
In a possible implementation manner, the fragmenting, by the first device, the first file to be shared to obtain a plurality of subfiles includes:
the first equipment encrypts the first file through a first secret key to obtain an encrypted file;
and the first device performs fragmentation processing on the encrypted file to obtain the plurality of subfiles.
In a possible implementation manner, the fragmenting, by the first device, the encrypted file to obtain the multiple subfiles includes:
the first device determines a fragmentation threshold N and a subfile number M, wherein M and N are integers greater than 1 respectively, and N is the minimum number of subfiles required for recovering the first file;
and the first device performs fragmentation processing on the encrypted file according to the M and the N to obtain the plurality of subfiles.
In one possible embodiment, the method further comprises:
the first device stores the file identifier of the first file, the subfile identifiers of the subfiles, the fragmentation threshold and the first secret key to the block chain node.
In one possible embodiment, the shared information further includes subfile identifications of the plurality of subfiles, the fragmentation threshold, and the first key.
In a second aspect, an embodiment of the present application provides a file sharing method, including:
in response to a downloading operation of a first file, acquiring subfile identifications of a plurality of first subfiles by a second device, wherein the first file comprises the plurality of first subfiles;
the second equipment acquires the plurality of first subfiles from the block chain node according to the subfile identifications of the plurality of first subfiles;
and the second equipment carries out aggregation processing on the plurality of first subfiles to obtain the first file.
In one possible implementation, the obtaining, by the second device, the subfile identities of the plurality of first subfiles includes:
the second device obtains a file identifier and a fragmentation threshold N of the first file, wherein N is an integer greater than 1, and N is the minimum number of subfiles required for recovering the first file;
and the second device acquires the subfile identifications of the first subfiles according to the file identification of the first file and the fragmentation threshold value N.
In a possible implementation manner, the obtaining, by the second device, the subfile identities of the plurality of first subfiles according to the file identity of the first file and the fragmentation threshold N includes:
the second device acquires subfile identifications of a plurality of subfiles of the first file from the block chain node or the shared server according to the file identification of the first file;
and the second equipment randomly selects N sub-file identifications from the plurality of sub-file identifications, and determines the N sub-file identifications as the sub-file identifications of the plurality of first sub-files.
In a possible implementation manner, the aggregating, by the second device, the plurality of first subfiles to obtain the first file includes:
the second equipment determines the file numbers of the first subfiles for the subfile identifications of the first subfiles;
the second equipment determines the sequence of the first subfiles according to the file numbers of the first subfiles;
and the second equipment carries out aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first subfiles to obtain the first file.
In one possible embodiment, the plurality of first subfiles are encrypted files; the second device performs aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first files to obtain the first file, and the aggregation processing includes:
the second device acquires a first secret key, wherein the first secret key is used for encrypting the first file by the first device;
the second equipment carries out aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first files to obtain an encrypted file;
and the second equipment decrypts the encrypted file according to the first secret key to obtain the first file.
In a third aspect, an embodiment of the present application provides a file sharing apparatus, including: a fragmentation module, a first determination module, a storage module, a second determination module and a sending module, wherein,
the fragmentation module is used for carrying out fragmentation processing on a first file to be shared to obtain a plurality of subfiles;
the first determining module is configured to determine subfile identifications of the plurality of subfiles;
the storage module is used for correspondingly storing the subfile identifications of the subfiles and the subfiles to the block chain link points;
the second determining module is used for determining shared information;
the sending module is configured to send the shared information to a sharing server, where the shared information includes a file name of the first file and a file identifier of the first file, and the sharing server is configured to share the first file.
In a possible implementation manner, the first determining module is specifically configured to:
determining a file identifier of the first file;
acquiring file numbers of the plurality of subfiles;
and respectively combining the file identification and the file numbers of the plurality of subfiles to obtain the subfile identifications of the plurality of subfiles.
In a possible implementation manner, the first determining module is specifically configured to:
and carrying out Hash operation on the first file to obtain a file identifier of the first file.
In a possible implementation, the fragmentation module is specifically configured to:
encrypting the first file through a first secret key to obtain an encrypted file;
and carrying out fragmentation processing on the encrypted file to obtain the plurality of subfiles.
In a possible implementation, the fragmentation module is specifically configured to:
determining a fragmentation threshold N and a subfile number M, wherein M and N are integers greater than 1 respectively, and N is the minimum number of subfiles required for recovering the first file;
and according to the M and the N, carrying out fragmentation processing on the encrypted file to obtain the plurality of subfiles.
In one possible embodiment, the storage module is further configured to:
and storing the file identifier of the first file, the subfile identifiers of the subfiles, the fragmentation threshold and the first secret key to the block chain node.
In one possible embodiment, the shared information further includes subfile identifications of the plurality of subfiles, the fragmentation threshold, and the first key.
In a fourth aspect, an embodiment of the present application provides a file sharing apparatus, including: a first acquisition module, a second acquisition module, and an aggregation module, wherein,
the first obtaining module is configured to obtain subfile identifiers of a plurality of first subfiles in response to a downloading operation of a first file, where the first file includes the plurality of first subfiles;
the second obtaining module is configured to obtain the plurality of first subfiles from a block chain node according to the subfile identifiers of the plurality of first subfiles;
the aggregation module is configured to aggregate the plurality of first subfiles to obtain the first file.
In a possible implementation manner, the first obtaining module is specifically configured to:
acquiring a file identifier and a fragmentation threshold N of the first file, wherein N is an integer greater than 1 and is the minimum number of subfiles required for recovering the first file;
and acquiring the subfile identifications of the plurality of first subfiles according to the file identification of the first file and the fragmentation threshold value N.
In a possible implementation manner, the first obtaining module is specifically configured to:
acquiring subfile identifications of a plurality of subfiles of the first file from the block chain node or the shared server according to the file identification of the first file;
and randomly selecting N sub-file identifications from the plurality of sub-file identifications, and determining the N sub-file identifications as the sub-file identifications of the plurality of first sub-files.
In a possible implementation, the aggregation module is specifically configured to:
determining the file numbers of the plurality of first subfiles according to the subfile identifications of the plurality of first subfiles;
determining the sequence of the plurality of first subfiles according to the file numbers of the plurality of first subfiles;
and according to the sequence of the first subfiles, performing aggregation processing on the first subfiles to obtain the first file.
In one possible embodiment, the plurality of first subfiles are encrypted files; the aggregation module is specifically configured to:
acquiring a first secret key, wherein the first secret key is used for encrypting the first file;
according to the sequence of the first sub-files, performing aggregation processing on the first sub-files to obtain an encrypted file;
and decrypting the encrypted file according to the first secret key to obtain the first file.
In a fifth aspect, an embodiment of the present application provides a file sharing device, including: a processor, a memory;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory, causing the processor to perform the method of any of the first aspects.
In a sixth aspect, an embodiment of the present application provides a file sharing device, including: a processor, a memory;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory, causing the processor to perform the method of any of the second aspects.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the method according to any one of the first aspect.
In an eighth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium implements the method according to any one of the second aspects.
In a ninth aspect, the present application provides a computer program product, which is characterized by a computer program, and the computer program is used for implementing the method of any one of the first aspect when being executed by a processor.
In a tenth aspect, an embodiment of the present application provides a computer program product, which is characterized by comprising a computer program, and when the computer program is executed by a processor, the computer program implements the method described in any one of the second aspects.
According to the file sharing method, the file sharing device and the file sharing equipment provided by the embodiment of the application, when first equipment needs to share a first file, the first equipment carries out fragmentation processing on the first file to be shared to obtain a plurality of subfiles, subfile identifications of the subfiles are determined, and the subfile identifications of the subfiles and the subfiles are correspondingly stored to block chain nodes; the first device also determines sharing information and sends the sharing information to the sharing server so that the sharing server shares the first file. When a shared first file needs to be downloaded through second equipment, in response to a downloading operation of the first file, the second equipment acquires subfile identifications of a plurality of first subfiles, the first file comprises the plurality of first subfiles, the plurality of first subfiles are acquired in a block chain node according to the subfile identifications of the plurality of first subfiles, and aggregation processing is performed on the plurality of first subfiles to obtain the first file. The first file can be recovered only when a plurality of subfiles in the first file are leaked by carrying out fragmentation processing on the first file; and the safety of the block chain storage is higher, so that the possibility of leakage of the subfiles is lower, and the safety of the shared file storage is improved.
Drawings
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a file sharing method according to an embodiment of the present disclosure;
fig. 3A is a schematic diagram of a sub-file provided in an embodiment of the present application;
FIG. 3B is a schematic diagram of another subfile provided by an embodiment of the present application;
fig. 4 is a schematic flowchart of another file sharing method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another file sharing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a file sharing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another file sharing apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a file sharing device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a file sharing device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element identified by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application. Referring to fig. 1, the system includes a blockchain node, a sharing server, a sharing device, and a shared device. The sharing device and the shared device may be user terminals, for example, devices such as mobile phones and computers.
When a user needs to share a file, the user can send the shared file to the block link node through the sharing device and send the sharing information of the shared file to the sharing server, so that other users can view the sharing information of the shared file in the sharing server. When other users need to download the shared file, the other users can inquire the shared information of the shared file in the shared server through the shared device, and download the shared file in the block link point through the shared information.
In the related art, sharing of a shared file is realized by a storage address of the shared file in a file server. When the storage address of the shared file leaks, the shared file may leak. That is, the security of the shared file storage is low in the related art.
In the embodiment of the application, when the first file is shared, the first file is divided into a plurality of subfiles, the subfiles are stored to the block chain nodes, and the shared information of the subfiles is stored to the shared server. When other users need to download the first file, the sharing information can be obtained through the sharing server, and the first file is obtained at the block link point through the sharing information. The first file can be recovered only when a plurality of subfiles in the first file are leaked by carrying out fragmentation processing on the first file; and the safety of the block chain storage is higher, so that the possibility of leakage of the subfiles is lower, and the safety of the shared file storage is improved.
The embodiments shown in the present application will be described in detail below with reference to specific examples. It should be noted that the following embodiments may exist independently or may be combined with each other, and description of the same or similar contents is not repeated in different embodiments.
Next, a process of sharing the first file by the first device will be described with reference to the embodiment shown in fig. 2.
Fig. 2 is a schematic flowchart of a file sharing method according to an embodiment of the present application. Referring to fig. 2, the method may include:
s201, the first device carries out fragmentation processing on a first file to be shared to obtain a plurality of subfiles.
The first device is a device to be subjected to file sharing, for example, the first device may be a sharing device in the embodiment of fig. 1. The first device may be a user terminal such as a mobile phone or a computer.
The first file may be a video, a picture, or other types of files.
The first device stores a first file, and the user may upload the first file in the first device before sharing the first file.
When a user needs to share a first file through a first device, a sharing instruction may be first input into the first device, and the first device executes S201 according to the sharing instruction. For example, a file sharing application may be installed in the first device, and a user may input a sharing instruction in the first device through the file sharing application.
The subfile is a portion of the first file. The different subfiles may or may not include overlapping data. The relationship between the first file and the subfiles is described below with reference to fig. 3A-3B.
Fig. 3A is a schematic diagram of a sub-file according to an embodiment of the present disclosure. Referring to fig. 3A, the first file and 5 sub-files are included, and the 5 sub-files are denoted as sub-file 1, sub-file 2, sub-file 3, sub-file 4, and sub-file 5, respectively. In the 5 sub-files, no overlapping data is included in each of the two sub-files.
In fig. 3A, since there is no overlapping data in different subfiles, when the first file is restored according to the subfiles, it is necessary to restore the first file according to all the subfiles. For example, 5 sub-files according to fig. 3A are needed to recover the first file.
Fig. 3B is a schematic diagram of another subfile provided in this embodiment of the present application. Referring to fig. 3B, the first file and 5 sub-files are included, and the 5 sub-files are denoted as sub-file 1, sub-file 2, sub-file 3, sub-file 4, and sub-file 5, respectively. In the 5 sub-files, there is overlapping data in every two adjacent sub-files.
In fig. 3B, since the different subfiles have overlapping data, when the first file is restored according to the subfiles, the first file can be restored according to a part of the subfiles. For example, the first file may need to be recovered from subfile 1, subfile 3, and subfile 5 in fig. 3A.
S202, the first device determines subfile identifications of the subfiles.
The subfile identifier is used to uniquely identify a subfile. That is, a unique subfile can be obtained according to the subfile identifier.
The subfile identification may be determined by: the first equipment determines the file identification of the first file, acquires the file numbers of the subfiles, and respectively combines the file identification and the file numbers of the subfiles to obtain the subfile identifications of the subfiles.
The hash operation may be performed on the first file to obtain a file identifier of the first file. For example, the first file may be hashed with a Secure Hash Algorithm (Secure Hash Algorithm)256 to obtain a file identifier of the first file.
The file numbers of the plurality of subfiles may be sequentially incremented from 0. For example, the file reference number may be: 0. 1, 2, 3, ….
For any subfile, the subfile identifier of the subfile may include a file identifier of the first file and a file number of the subfile, and the file identifier of the first file and the file number of the subfile may be divided by a preset delimiter, where the preset delimiter may be ": "," - ", and the like. For example, if the file identifier of the first file is UID, and the numbers of the plurality of subfiles are 0, 1, 2, 3, etc., respectively, the subfile identifiers of the plurality of subfiles are UID:0, UID:1, UID:2, UID:3, etc., respectively.
S203, the first device correspondingly stores the subfile identifications of the subfiles and the subfiles to the block chain node.
The subfile identifications and corresponding subfiles may be stored to blockchain nodes in KV pairs. Correspondingly, the subfile identifier may be K, and the corresponding subfile is obtained by querying in the block chain node.
S204, the first device determines the shared information and sends the shared information to a shared server.
The sharing information comprises a file name of the first file and a file identifier of the first file, and the sharing server is used for sharing the first file.
After the sharing information received by the sharing server, the sharing information is stored locally. In this way, other devices may query the shared server for the shared information.
According to the file sharing method provided by the embodiment of the application, when first equipment needs to share a first file, the first equipment carries out fragmentation processing on the first file to be shared to obtain a plurality of subfiles, subfile identifications of the subfiles are determined, and the subfile identifications of the subfiles and the subfiles are correspondingly stored to block chain link points; the first device also determines sharing information and sends the sharing information to the sharing server so that the sharing server shares the first file. The first file can be recovered only when a plurality of subfiles in the first file are leaked by carrying out fragmentation processing on the first file; and the safety of the block chain storage is higher, so that the possibility of leakage of the subfiles is lower, and the safety of the shared file storage is improved.
With the embodiment shown in fig. 2, the first device implements sharing the first file. Next, a process of the second device accessing the first file shared by the first device will be described with reference to fig. 4.
Fig. 4 is a flowchart illustrating another file sharing method according to an embodiment of the present application. Referring to fig. 4, the method may include:
s401, responding to the downloading operation of the first file, and the second device obtains the subfile identifications of the first subfiles.
After the first device shares the first file, the second device may query the sharing server for sharing information of the first file. The method includes the steps that shared information of a first file is obtained through inquiry of a second device, the second device can display the shared information of the first file on a display screen, the second device can also display a downloading control of the first file, and a user can click the downloading control to trigger downloading operation of the first file.
The first file includes a plurality of subfiles. The plurality of first subfiles are part or all of the plurality of subfiles, i.e., the first file also includes the plurality of first subfiles. If the fragmentation mode of the first file is as shown in fig. 3A, it is determined that the first subfile is all of the plurality of subfiles. If the fragmentation manner of the first file is as shown in fig. 3B, the first subfile is a part of a plurality of subfiles.
The subfile identifications of the first subfiles may be obtained in a variety of ways, including the following two cases:
in case 1, the plurality of first subfiles are all subfiles in the first file.
The block chain node or the sharing server stores the subfile identifications of a plurality of subfiles in the first file. In a block chain node or a sharing server, the file identification of the first file and the subfile identifications of the plurality of subfiles are correspondingly stored.
In this case, the file identifier of the first file may be obtained, and in the block chain node or the shared server, the subfile identifiers of the plurality of subfiles corresponding to the first file are obtained according to the file identifier query of the first file.
In case 2, the plurality of first subfiles are partial subfiles in the first file.
In this case, the subfile identifications of the plurality of first subfiles may be obtained by: the second device obtains the file identifier and the fragmentation threshold value N of the first file, and obtains the subfile identifiers of the plurality of first subfiles according to the file identifier and the fragmentation threshold value N of the first file.
Where N is an integer greater than 1, and N is the minimum number of subfiles required to recover the first file. Namely, the first file can be recovered according to the N sub-files. N is less than the number of all subfiles included in the first file.
Optionally, the second device may obtain, according to the file identifier of the first file, the subfile identifiers of the multiple subfiles of the first file in the block chain node or the shared server, randomly select N subfile identifiers from the multiple subfile identifiers, and determine the N subfile identifiers as the subfile identifiers of the multiple first subfiles.
For example, if the first file includes 10 sub-files and N is 8, the second device may obtain sub-file identifiers of 10 sub-files in a block chain node or a sharing server according to the identifier of the first file, obtain 10 sub-file identifiers, and randomly select 8 sub-file identifiers from the 10 sub-file identifiers to determine that the 8 sub-file identifiers are sub-file identifiers of the plurality of first sub-files.
In this case, the first file can be recovered according to the partial sub-files, so that the efficiency and reliability of recovering the first file are high.
S402, the second device obtains the first subfiles from the block chain node according to the subfile identifications of the first subfiles.
For each first subfile, the corresponding first subfile is obtained by querying in the block chain node according to the subfile identifier of the first subfile.
And S403, the second device performs aggregation processing on the plurality of first subfiles to obtain a first file.
The second device may splice the plurality of first subfiles according to the sequence of the plurality of first subfiles in the first file to obtain the first file.
In the embodiment shown in fig. 4, when a shared first file needs to be downloaded through the second device, in response to a download operation of the first file, the second device obtains subfile identifiers of a plurality of first subfiles, where the first file includes the plurality of first subfiles, obtains the plurality of first subfiles in the block chain node according to the subfile identifiers of the plurality of first subfiles, and performs aggregation processing on the plurality of first subfiles to obtain the first file. In the process, when a user needs to download a shared first file, the second device needs to acquire a plurality of first subfiles at block chain nodes through shared information and aggregate the plurality of first subfiles to obtain the first file.
On the basis of any of the above embodiments, the following describes in detail the process of sharing the first file by the first device and acquiring the first file by the second device with reference to the embodiment shown in fig. 5.
Fig. 5 is a flowchart illustrating another file sharing method according to an embodiment of the present application. Referring to fig. 5, the method may include:
s501, the first device encrypts the first file through the first secret key to obtain an encrypted file.
Optionally, the first file may be encrypted by using an Advanced Encryption Standard (AES) Encryption algorithm. In this case, a first key (salt) of the AES algorithm may be generated first, and the first file may be encrypted by the first key to obtain an encrypted file.
The first file may be encrypted by other encryption algorithms, for example, a Message-Digest Algorithm (MD) 5 Algorithm or the like.
S502, the first device determines a fragmentation threshold value N and the number M of subfiles.
Wherein M and N are integers greater than 1, respectively, and N is the minimum number of subfiles required to recover the first file. N is less than or equal to M.
S503, the first device performs fragmentation processing on the encrypted file according to the M and the N to obtain a plurality of subfiles.
The encrypted file may be fragmented according to the sizes of M and N. For example, the larger the difference between M and N, the more repetitive content between different subfiles; the smaller the difference between M and N, the less content is duplicated between different subfiles.
S504, the first device determines the file identification of the first file.
The file identification of the first file may uniquely indicate the first file. The file identifier of the first file can be obtained by performing hash operation on the first file, and the file identifier which can uniquely indicate the first file can also be obtained by numbering the first file.
S505, the first device acquires the file numbers of the plurality of subfiles.
The plurality of subfiles can be numbered according to the positions of the subfiles in the first file, and file numbers of the plurality of subfiles are obtained.
For example, the first file is sliced to obtain 5 sub-files, and the 5 sub-files are sequentially arranged from front to back in the first file, so that the file numbers of the 5 sub-files may be: 0. 1, 2, 3 and 4.
S506, the first device respectively combines the file identification and the file numbers of the plurality of subfiles to obtain the subfile identifications of the plurality of subfiles.
For example, assuming that the file identifier of the first file is pg202201010830 and the file identifiers of the subfiles are 0, 1, 2, 3, and 4, respectively, the subfile identifiers of the subfiles are: pg202201010830:0, pg202201010830:1, pg202201010830:2, pg202201010830:3, pg202201010830: 4.
S507, the first device sends the subfile identifications of the subfiles and the subfiles to the block chain nodes.
After the block chain node receives the subfile identifications and the subfiles of the subfiles, the block chain node correspondingly stores the subfile identifications and the subfiles.
For any subfile, a KV pair may be generated according to the subfile identifier of the subfile and the subfile, and the KV pair is stored to the blockchain node. For example, assuming there are 5 sub-files, 5 KV pairs are generated and stored to the blockchain node.
S508, the first device sends the file identification of the first file, the subfile identifications of the subfiles, the fragmentation threshold and the first secret key to the block chain node.
After the block chain node receives the file identifier of the first file, the subfile identifiers of the subfiles, the fragmentation threshold and the first secret key, the block chain node stores the file identifier of the first file, the subfile identifiers of the subfiles, the fragmentation threshold and the first secret key.
The KV pair may be generated according to the file identifier of the first file, the subfile identifiers of the multiple subfiles, the fragmentation threshold, and the first key, and stored to the blockchain node. And K is the file identifier of the first file, and V comprises the subfile identifiers of a plurality of subfiles, a fragmentation threshold and a first key.
S509, the first device determines shared information.
The sharing information comprises a file name of the first file and a file identification of the first file.
S510, the first device sends sharing information to a sharing server.
After receiving the shared information, the sharing server stores the shared information and shares the shared information, so that other devices can inquire the shared information in the sharing server.
S511, responding to the downloading operation of the first file, and the second equipment acquires the file identifier of the first file from the sharing server.
After the sharing server shares the sharing information, the user can query the sharing server through the second device to obtain the file name of the first file, and the second device can also display the file name of the first file. If the user needs to download the first file, the user may input the download operation of the first file in the second device, for example, the second device may display the download connection of the first file, and the user may input the download operation of the first file by clicking the download link.
After the second device obtains the downloading operation of the first file, the second device may request the sharing server to obtain the file identifier of the first file according to the file name of the first file.
S512, the second device obtains subfile identifications, a fragmentation threshold value N and a first secret key of a plurality of subfiles of the first file from the block chain node according to the file identification of the first file.
The second device may send an acquisition request to the block link point, where the acquisition request includes a file identifier of the first file. The block chain node may query, according to the file identifier of the first file in the acquisition request, subfile identifiers, the fragmentation threshold N, and the first key of the multiple subfiles of the first file, and send the subfile identifiers, the fragmentation threshold N, and the first key of the multiple subfiles of the first file to the second device.
S513, the second device randomly selects N sub-file identifications from the plurality of sub-file identifications, and determines the N sub-file identifications as the sub-file identifications of the plurality of first sub-files.
And S514, the second device acquires the plurality of first subfiles from the block chain node according to the subfile identifications of the plurality of first subfiles.
If the subfile identifier and the corresponding subfile are stored in the block chain link point in the form of KV pairs, the second device may query and acquire the corresponding first subfiles in the block chain node with the plurality of subfile identifiers as K, respectively.
And S515, the second device performs aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first subfiles to obtain the encrypted file.
The order of the plurality of first subfiles may be determined based on the number of the plurality of first subfiles.
The duplicate content in the plurality of first subfiles can be subjected to duplicate removal processing, and the subfiles subjected to duplicate removal processing are subjected to splicing processing to obtain the encrypted file. The encrypted file is a file obtained by encrypting the first file.
S516, the second device decrypts the encrypted file according to the first secret key to obtain the first file.
In the embodiment shown in fig. 5, when the first device needs to share the first file, the first device performs fragmentation processing on the first file to be shared to obtain a plurality of subfiles, determines subfile identifiers of the plurality of subfiles, and correspondingly stores the subfile identifiers of the plurality of subfiles and the plurality of subfiles to the block link points; the first device also determines sharing information and sends the sharing information to the sharing server so that the sharing server shares the first file. When a shared first file needs to be downloaded through a second device, in response to a downloading operation of the first file, the second device obtains subfile identifications of a plurality of first subfiles, the first file comprises the plurality of first subfiles, the plurality of first subfiles are obtained in a block chain node according to the subfile identifications of the plurality of first subfiles, and aggregation processing is carried out on the plurality of first subfiles to obtain the first file. By carrying out fragmentation processing on the first file, the first file can be recovered only when a plurality of subfiles in the first file are leaked; and the safety of the block chain storage is higher, so that the possibility of leakage of the subfiles is lower, and the safety of the shared file storage is improved.
Fig. 6 is a schematic structural diagram of a file sharing device according to an embodiment of the present application. Referring to fig. 6, the file sharing apparatus 10 may include: a fragmentation module 11, a first determination module 12, a storage module 13, a second determination module 14 and a sending module 15, wherein,
the fragmentation module 11 is configured to perform fragmentation processing on a first file to be shared to obtain a plurality of subfiles;
the first determining module 12 is configured to determine subfile identifications of the plurality of subfiles;
the storage module 13 is configured to store the subfile identifications of the plurality of subfiles and the plurality of subfiles to the block link points correspondingly;
the second determining module 14 is configured to determine shared information;
the sending module 15 is configured to send the shared information to a sharing server, where the shared information includes a file name of the first file and a file identifier of the first file, and the sharing server is configured to share the first file.
The file sharing apparatus provided in the embodiment of the present application may implement the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects thereof are similar, and are not described herein again.
In a possible implementation, the first determining module 12 is specifically configured to:
determining a file identifier of the first file;
acquiring file numbers of the plurality of subfiles;
and respectively combining the file identification and the file numbers of the plurality of subfiles to obtain the subfile identifications of the plurality of subfiles.
In a possible implementation, the first determining module 12 is specifically configured to:
and carrying out Hash operation on the first file to obtain a file identifier of the first file.
In a possible embodiment, the slicing module 11 is specifically configured to:
encrypting the first file through a first secret key to obtain an encrypted file;
and carrying out fragmentation processing on the encrypted file to obtain the plurality of subfiles.
In a possible embodiment, the slicing module 11 is specifically configured to:
determining a fragmentation threshold N and a subfile number M, wherein M and N are integers greater than 1 respectively, and N is the minimum number of subfiles required for recovering the first file;
and according to the M and the N, carrying out fragmentation processing on the encrypted file to obtain the plurality of subfiles.
In a possible embodiment, the storage module 13 is further configured to:
and storing the file identifier of the first file, the subfile identifiers of the subfiles, the fragmentation threshold and the first secret key to the block chain node.
In one possible embodiment, the shared information further includes subfile identifications of the plurality of subfiles, the fragmentation threshold, and the first key.
The file sharing apparatus provided in the embodiment of the present application may implement the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects thereof are similar, and are not described herein again.
Fig. 7 is a schematic structural diagram of another file sharing device according to an embodiment of the present application. Referring to fig. 7, the file sharing apparatus 20 may include: a first obtaining module 21, a second obtaining module 22 and an aggregation module 23, wherein,
the first obtaining module 21 is configured to, in response to a downloading operation on a first file, obtain subfile identifiers of a plurality of first subfiles, where the first file includes the plurality of first subfiles;
the second obtaining module 22 is configured to obtain the plurality of first subfiles from a blockchain node according to the subfile identifiers of the plurality of first subfiles;
the aggregation module 23 is configured to aggregate the plurality of first subfiles to obtain the first file.
The file sharing apparatus provided in the embodiment of the present application may implement the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects thereof are similar, and are not described herein again.
In a possible implementation, the first obtaining module 21 is specifically configured to:
acquiring a file identifier and a fragmentation threshold N of the first file, wherein N is an integer greater than 1 and is the minimum number of subfiles required for recovering the first file;
and acquiring the subfile identifications of the plurality of first subfiles according to the file identification of the first file and the fragmentation threshold value N.
In a possible implementation, the first obtaining module 21 is specifically configured to:
acquiring subfile identifications of a plurality of subfiles of the first file from the block chain node or the shared server according to the file identification of the first file;
and randomly selecting N sub-file identifications from the plurality of sub-file identifications, and determining the N sub-file identifications as the sub-file identifications of the plurality of first sub-files.
In a possible embodiment, the polymerization module 23 is specifically configured to:
determining the file numbers of the plurality of first subfiles according to the subfile identifications of the plurality of first subfiles;
determining the sequence of the plurality of first subfiles according to the file numbers of the plurality of first subfiles;
and according to the sequence of the first subfiles, performing aggregation processing on the first subfiles to obtain the first file.
In one possible implementation, the plurality of first subfiles are encrypted files; the aggregation module 23 is specifically configured to:
acquiring a first secret key, wherein the first secret key is used for encrypting the first file;
according to the sequence of the first sub-files, performing aggregation processing on the first sub-files to obtain an encrypted file;
and decrypting the encrypted file according to the first secret key to obtain the first file.
The file sharing device provided in the embodiment of the present application may implement the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects are similar, which are not described herein again.
Fig. 8 is a schematic structural diagram of a file sharing device according to an embodiment of the present application. Referring to fig. 8, the file sharing device 30 may include: memory 31, processor 32. Illustratively, the memory 31, the processor 32, and the various parts are interconnected by a bus 33.
The memory 31 is used for storing program instructions;
the processor 32 is configured to execute the program instructions stored in the memory to enable the configuration information generating device 30 to execute the file sharing method shown in the embodiment of fig. 2 or 5.
The file sharing device 30 may be the first device in the above-described method embodiments.
The file sharing device shown in the embodiment of fig. 8 may execute the technical solution shown in the above method embodiment, and the implementation principle and beneficial effects are similar, which are not described herein again.
Fig. 9 is a schematic structural diagram of a file sharing device according to an embodiment of the present application. Referring to fig. 9, the file sharing device 40 may include: memory 41, processor 42. Illustratively, the memory 41, the processor 42, and the various parts are interconnected by a bus 43.
Memory 41 is used to store program instructions;
the processor 42 is configured to execute the program instructions stored in the memory to cause the configuration information generating device 40 to execute the file sharing method shown in the embodiment of fig. 4 or 5.
The file sharing device 40 may be the second device in the above-described method embodiments.
The file sharing device shown in the embodiment of fig. 9 may execute the technical solution shown in the above method embodiment, and the implementation principle and the beneficial effect are similar, which are not described herein again.
An embodiment of the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is used for implementing the file sharing method.
Embodiments of the present application may also provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the file sharing method may be implemented.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The aforementioned program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications can be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.
In this application, the terms "include," "includes," and variations thereof may refer to non-limiting inclusions; the term "or" and variations thereof may mean "and/or". The terms "first," "second," and the like in this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. In the present application, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.

Claims (17)

1. A method for sharing a file, comprising:
the method comprises the steps that a first device carries out fragmentation processing on a first file to be shared to obtain a plurality of subfiles;
the first device determining subfile identifications of the plurality of subfiles;
the first device correspondingly stores the subfile identifications of the subfiles and the subfiles to the block chain nodes;
the first device determines sharing information and sends the sharing information to a sharing server, wherein the sharing information comprises a file name of the first file and a file identifier of the first file, and the sharing server is used for sharing the first file.
2. The method of claim 1, wherein the first device determining subfile identities of the plurality of subfiles comprises:
the first device determines a file identifier of the first file;
the first device acquires file numbers of the plurality of subfiles;
and the first equipment respectively combines the file identification and the file numbers of the plurality of subfiles to obtain the subfile identifications of the plurality of subfiles.
3. The method of claim 2, wherein the first device determining the file identification of the first file comprises:
and the first equipment performs hash operation on the first file to obtain a file identifier of the first file.
4. The method according to any one of claims 1 to 3, wherein the fragmenting, by the first device, the first file to be shared to obtain a plurality of subfiles includes:
the first equipment encrypts the first file through a first secret key to obtain an encrypted file;
and the first device performs fragmentation processing on the encrypted file to obtain the plurality of subfiles.
5. The method according to claim 4, wherein the first device performs fragmentation processing on the encrypted file to obtain the plurality of subfiles, and the method comprises:
the first device determines a fragmentation threshold N and a subfile number M, wherein M and N are integers greater than 1 respectively, N is less than or equal to M, and N is the minimum number of subfiles required for recovering the first file;
and the first device performs fragmentation processing on the encrypted file according to the M and the N to obtain the plurality of subfiles.
6. The method of claim 5, further comprising:
the first device stores the file identifier of the first file, the subfile identifiers of the subfiles, the fragmentation threshold and the first secret key to the block chain node.
7. The method of claim 5, wherein the shared information further comprises a subfile identification of the plurality of subfiles, the fragmentation threshold, and the first key.
8. A method for sharing a file, comprising:
in response to the downloading operation of the first file, the second device acquires subfile identifications of a plurality of first subfiles, wherein the first file comprises the first subfiles;
the second equipment acquires the plurality of first subfiles from the block chain node according to the subfile identifications of the plurality of first subfiles;
and the second equipment carries out aggregation processing on the plurality of first subfiles to obtain the first file.
9. The method of claim 8, wherein obtaining subfile identities for a plurality of first subfiles by the second device comprises:
the second device obtains a file identifier and a fragmentation threshold N of the first file, wherein N is an integer greater than 1, and N is the minimum number of subfiles required for recovering the first file;
and the second device acquires the subfile identifications of the first subfiles according to the file identification of the first file and the fragmentation threshold value N.
10. The method according to claim 9, wherein the obtaining, by the second device, the subfile identities of the first subfiles according to the file identity of the first file and the fragmentation threshold N comprises:
the second device acquires subfile identifications of a plurality of subfiles of the first file from the block chain node or the shared server according to the file identification of the first file;
and the second equipment randomly selects N sub-file identifications from the plurality of sub-file identifications, and determines the N sub-file identifications as the sub-file identifications of the plurality of first sub-files.
11. The method according to any one of claims 8-10, wherein the aggregating the plurality of first subfiles by the second device to obtain the first file comprises:
the second equipment determines the file numbers of the first subfiles for the subfile identifications of the first subfiles;
the second equipment determines the sequence of the first subfiles according to the file numbers of the first subfiles;
and the second equipment carries out aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first subfiles to obtain the first file.
12. The method of claim 11, wherein the plurality of first subfiles are encrypted files; the second device performs aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first files to obtain the first file, and the aggregation processing includes:
the second equipment acquires a first secret key, wherein the first secret key is used for encrypting the first file by the first equipment;
the second equipment carries out aggregation processing on the plurality of first subfiles according to the sequence of the plurality of first files to obtain an encrypted file;
and the second equipment decrypts the encrypted file according to the first secret key to obtain the first file.
13. A file sharing apparatus, comprising: a fragmentation module, a first determination module, a storage module, a second determination module and a sending module, wherein,
the fragmentation module is used for carrying out fragmentation processing on a first file to be shared to obtain a plurality of subfiles;
the first determining module is configured to determine subfile identifications of the plurality of subfiles;
the storage module is used for correspondingly storing the subfile identifications of the subfiles and the subfiles to the block chain link points;
the second determining module is used for determining shared information;
the sending module is configured to send the shared information to a sharing server, where the shared information includes a file name of the first file and a file identifier of the first file, and the sharing server is configured to share the first file.
14. A file sharing apparatus, comprising: a first acquisition module, a second acquisition module, and an aggregation module, wherein,
the first obtaining module is configured to obtain subfile identifiers of a plurality of first subfiles in response to a downloading operation of a first file, where the first file includes the plurality of first subfiles;
the second obtaining module is configured to obtain the multiple first subfiles from a block chain node according to the subfile identifiers of the multiple first subfiles;
the aggregation module is configured to aggregate the plurality of first subfiles to obtain the first file.
15. A file sharing apparatus, comprising: a processor, a memory;
the memory stores computer-executable instructions;
the processor executing the computer-executable instructions stored by the memory causes the processor to perform the method of any of claims 1 to 7 or the method of any of claims 8 to 12.
16. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, perform the method of any one of claims 1 to 7 or the method of any one of claims 8 to 12.
17. A computer program product, comprising a computer program which, when executed by a processor, performs the method of any one of claims 1 to 7 or the method of any one of claims 8 to 12.
CN202210809702.9A 2022-07-11 2022-07-11 File sharing method, device and equipment Pending CN115118734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210809702.9A CN115118734A (en) 2022-07-11 2022-07-11 File sharing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210809702.9A CN115118734A (en) 2022-07-11 2022-07-11 File sharing method, device and equipment

Publications (1)

Publication Number Publication Date
CN115118734A true CN115118734A (en) 2022-09-27

Family

ID=83332998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210809702.9A Pending CN115118734A (en) 2022-07-11 2022-07-11 File sharing method, device and equipment

Country Status (1)

Country Link
CN (1) CN115118734A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770154A (en) * 2017-09-22 2018-03-06 中国科学院信息工程研究所 Block chain reliable data storage method, terminal and system based on cloud storage
US20190342084A1 (en) * 2018-05-03 2019-11-07 International Business Machines Corporation Blockchain for on-chain management of off-chain storage
CN110493344A (en) * 2019-08-22 2019-11-22 视联动力信息技术股份有限公司 Document down loading method and device
CN110784463A (en) * 2019-10-24 2020-02-11 深圳市超算科技开发有限公司 File storage and access method and system based on block chain
WO2020050656A1 (en) * 2018-08-24 2020-03-12 Samsung Electronics Co., Ltd. Method and device for processing file
CN111104386A (en) * 2019-11-04 2020-05-05 北京海益同展信息科技有限公司 File storage method, terminal and storage medium
CN111262822A (en) * 2018-12-03 2020-06-09 中国电信股份有限公司 File storage method, device, block link point and system
CN111814210A (en) * 2019-12-31 2020-10-23 北京骑胜科技有限公司 Method and device for processing file, storage medium and electronic equipment
WO2020259635A1 (en) * 2019-06-27 2020-12-30 深圳前海微众银行股份有限公司 Method and apparatus for sharing blockchain data
CN112256663A (en) * 2020-10-30 2021-01-22 深圳壹账通智能科技有限公司 Block chain based distributed file storage method and system
CN113505098A (en) * 2021-06-18 2021-10-15 清华大学 File sharing system, method and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770154A (en) * 2017-09-22 2018-03-06 中国科学院信息工程研究所 Block chain reliable data storage method, terminal and system based on cloud storage
US20190342084A1 (en) * 2018-05-03 2019-11-07 International Business Machines Corporation Blockchain for on-chain management of off-chain storage
WO2020050656A1 (en) * 2018-08-24 2020-03-12 Samsung Electronics Co., Ltd. Method and device for processing file
CN111262822A (en) * 2018-12-03 2020-06-09 中国电信股份有限公司 File storage method, device, block link point and system
WO2020259635A1 (en) * 2019-06-27 2020-12-30 深圳前海微众银行股份有限公司 Method and apparatus for sharing blockchain data
CN110493344A (en) * 2019-08-22 2019-11-22 视联动力信息技术股份有限公司 Document down loading method and device
CN110784463A (en) * 2019-10-24 2020-02-11 深圳市超算科技开发有限公司 File storage and access method and system based on block chain
CN111104386A (en) * 2019-11-04 2020-05-05 北京海益同展信息科技有限公司 File storage method, terminal and storage medium
CN111814210A (en) * 2019-12-31 2020-10-23 北京骑胜科技有限公司 Method and device for processing file, storage medium and electronic equipment
CN112256663A (en) * 2020-10-30 2021-01-22 深圳壹账通智能科技有限公司 Block chain based distributed file storage method and system
CN113505098A (en) * 2021-06-18 2021-10-15 清华大学 File sharing system, method and storage medium

Similar Documents

Publication Publication Date Title
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
CN109948347B (en) Data storage method and device, server and readable storage medium
CN113032357A (en) File storage method and device and server
CN106599723B (en) File encryption method and device and file decryption method and device
EP3598714A1 (en) Method, device, and system for encrypting secret key
US20130290731A1 (en) Systems and methods for storing and verifying security information
CN109768978B (en) Method and related device for obfuscating data
CN110912920A (en) Data processing method, apparatus and medium
KR101979267B1 (en) Encryption systems based on cloud storage and method thereof
CN107315967B (en) Data matching method and device and computer readable storage medium
CN108197439A (en) A kind of file encrypting method, device and server
Meye et al. A secure two-phase data deduplication scheme
CN113127895A (en) Cloud data protection method based on distributed storage
CN109934013B (en) Data protection method and device
CN115225409A (en) Cloud data safety deduplication method based on multi-backup joint verification
CN108229192A (en) A kind of file decryption method, apparatus and client
EP2930962B1 (en) Encryption/decryption method, system and device
US20130290732A1 (en) Systems and methods for storing and verifying security information
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
GB2574076A (en) Distributed data storage
CN112818404A (en) Data access permission updating method, device, equipment and readable storage medium
CN112948896A (en) Signature information verification method and information signature method
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN115118734A (en) File sharing method, device and equipment
CN116166749A (en) Data sharing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination