TWI710238B - Synchronous deletion method of distributed storage system - Google Patents

Synchronous deletion method of distributed storage system Download PDF

Info

Publication number
TWI710238B
TWI710238B TW107145526A TW107145526A TWI710238B TW I710238 B TWI710238 B TW I710238B TW 107145526 A TW107145526 A TW 107145526A TW 107145526 A TW107145526 A TW 107145526A TW I710238 B TWI710238 B TW I710238B
Authority
TW
Taiwan
Prior art keywords
data
host
list
control unit
storage system
Prior art date
Application number
TW107145526A
Other languages
Chinese (zh)
Other versions
TW202025691A (en
Inventor
葉羅堯
盧沛怡
洪嘉賢
Original Assignee
財團法人國家實驗研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 財團法人國家實驗研究院 filed Critical 財團法人國家實驗研究院
Priority to TW107145526A priority Critical patent/TWI710238B/en
Publication of TW202025691A publication Critical patent/TW202025691A/en
Application granted granted Critical
Publication of TWI710238B publication Critical patent/TWI710238B/en

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本發明係一種分散式儲存系統之同步刪除方法,其提供一第一主機存取至少一第一資料後,在區塊鏈網路上會對應建有一第一資料列表與一第二資料列表,以對應於第一主機之資料變動,再藉由第一資料列表與第二資料列表更新一第二主機。藉此,利用區塊鏈技術上的不可破壞特性,以保持第一資料列表與第二資料列表持續存在,因而第二主機所存取之第二資料在第一主機更動後仍然一致。The present invention is a synchronous deletion method for a distributed storage system. After a first host accesses at least one first data, a first data list and a second data list are correspondingly built on the blockchain network to Corresponding to the data change of the first host, a second host is updated by the first data list and the second data list. In this way, the indestructible feature of the blockchain technology is used to maintain the continuous existence of the first data list and the second data list, so that the second data accessed by the second host remains the same after the first host is changed.

Description

分散式儲存系統之同步刪除方法Synchronous deletion method of distributed storage system

本發明為關於一種網路資料系統及其資料處理方法,特別是有關於一種分散式儲存系統之同步刪除方法。 The present invention relates to a network data system and a data processing method thereof, in particular to a synchronous deletion method of a distributed storage system.

分散式系統是一組電腦,透過網路相互連接傳遞訊息與通訊後並協調彼此之間的運算行為而形成一個系統整體,在此一系統架構內,電腦之間彼此進行互動以實現一個共同的運算結果,因此,需要進行大量計算的工程資料分割成小塊資料後,由分散式系統內的多台電腦分別計算,再由主導的電腦將所有運算結果統一合併得出一資料結論。分散式系統的例子來自有所不同的面向服務的架構,大型多人線上遊戲,對等網路應用。 A distributed system is a group of computers that are connected to each other through the network to transmit information and communication and coordinate their computing behaviors to form a system as a whole. In this system architecture, computers interact with each other to achieve a common The calculation results, therefore, the engineering data that requires a large number of calculations are divided into small pieces of data, and then calculated separately by multiple computers in the distributed system, and then the dominant computer combines all the calculation results to reach a data conclusion. Examples of distributed systems come from different service-oriented architectures, massively multiplayer online games, and peer-to-peer network applications.

隨著分散式系統的演進,以及對於資料的儲存方式雲端化,進一步發展出分散式檔案系統(英語:Distributed file system,DFS)是一種允許資料透過網路在多台主機上分享的資料系統,可讓多機器上的多使用者分享資料和儲存空間。分散式檔案系統中,客戶端並非直接存取底層的資料儲存區段,而是透過網路之特定通訊協定和網路上的伺服器溝通,以讓客戶端和伺服器端都能根據存取控制清單或是授權,來限制對於資料系統的存取。 With the evolution of distributed systems and the cloudification of data storage methods, the distributed file system (English: Distributed file system, DFS) has been further developed, which is a data system that allows data to be shared on multiple hosts through the network. Allows multiple users on multiple machines to share data and storage space. In a distributed file system, the client does not directly access the underlying data storage section, but communicates with the server on the network through the specific communication protocol of the network, so that the client and the server can be controlled according to the access List or authorization to restrict access to the data system.

基於點對點技術的演進,遂發展出星際檔案系統(InterPlanetary File System,IPFS),它是一個由全球數千台電腦組成的點對點(P2P)超媒體協定,為分散式網路的技術之一。在IPFS,這個資料系統中,資料被儲存在網路上的複數個網路節點所組成的IPFS,該些個網路節點之間為對等關係,每一個資料都可以被計算出唯一的雜湊(Hash)值,透過分散式雜湊表(英語:distributed hash table,DHT)的演算法,可將被計算出的Hash值定位資料在眾多的網路節點上的位址,因此IPFS概念就像一大堆資料散佈在複數個節點中,存取資料的 時候透過DHT演算法找到資料在網路上的網路節點位址進行存取。IPFS優點在於即使是原先網路節點終止服務了、被駭客入侵了,或是伺服器遭遇天災變故了,使用者依舊能自不同的網路節點找出使用者所需的內容。 Based on the evolution of peer-to-peer technology, the InterPlanetary File System (IPFS) was developed, which is a peer-to-peer (P2P) hypermedia protocol composed of thousands of computers around the world, and is one of the technologies of distributed networks. In IPFS, this data system, data is stored in the IPFS composed of multiple network nodes on the network. The network nodes are peer-to-peer, and each data can be calculated as a unique hash ( Hash) value, through the distributed hash table (English: distributed hash table, DHT) algorithm, the calculated hash value can be calculated to locate the address of the data on many network nodes, so the IPFS concept is like a big The pile of data is scattered among multiple nodes, and the data access When using DHT algorithm to find the network node address on the network for access. The advantage of IPFS is that even if the original network node terminates its service, is hacked, or the server encounters a natural disaster, users can still find what the user needs from different network nodes.

隨著區塊鏈的風行,分散式檔案系統亦是發展至搭配區塊鏈技術,尤以去中心化的對等P2P架構概念之IPFS更是被廣泛應用,但是區塊鏈系統特性通常資料寫入後,不可篡改及「刪除」,但於現實應用中,刪除的議題是經常需要的,而刪除資料的確認亦是分散式檔案系統的難題之一,經資料分散儲存之後,難以像傳統集中式檔案系統針對每一步存取做確認,尤以分散式檔案系統的資料傳輸媒介為網路傳輸介面,且網路傳輸資料竄改較難以預防的情況下,分散式檔案系統基於去中心化架構下,每一系統節點的資料刪除與否較難以確認。另外,現行許多區塊鏈相關應用系統為儲存大量資料,將搭配「分散式儲存系統」(如:IPFS、Ethereum Swarm),然而此類儲存系統具有分散式的特性,故大多無法具有「刪除資料」之功能。 With the popularity of blockchain, distributed file systems are also developed to match blockchain technology. In particular, the decentralized peer-to-peer P2P architecture concept of IPFS is widely used, but the characteristics of blockchain systems are usually written After entering, it cannot be tampered with and "deleted", but in real applications, the topic of deletion is often needed, and the confirmation of deleted data is also one of the problems of the distributed file system. After the data is distributed and stored, it is difficult to be like traditional centralized The distributed file system confirms each step of access, especially when the data transmission medium of the distributed file system is the network transmission interface, and the network transmission data tampering is difficult to prevent, the distributed file system is based on a decentralized architecture , It is difficult to confirm whether the data of each system node is deleted or not. In addition, many current blockchain-related application systems will be equipped with "distributed storage systems" (such as IPFS, Ethereum Swarm) to store large amounts of data. However, such storage systems have decentralized characteristics, so most of them cannot have "delete data". "Function.

現今為保護分散式儲存系統中的資料,發展出多種保護機制,例如:麻省理工學院(MIT)的媒體實驗室與業界針對數位文憑共同開發的Blockcerts Wallet可針對文件撤銷而提供撤銷功能,其中主要以「撤銷列表」為核心,進行證書撤銷功能,並非針對數位文件本身進行刪除。除此之外,分散式儲存系統下每一節點之間的資料複製,亦是基於網路傳輸介面作為資料傳輸媒介的情況下,較難以確認資料是否已被複製。 Nowadays, in order to protect the data in the distributed storage system, a variety of protection mechanisms have been developed. For example, the Blockcerts Wallet jointly developed by the Massachusetts Institute of Technology (MIT) Media Lab and the industry for digital diplomas can provide a revocation function for file revocation. It mainly uses the "revocation list" as the core to carry out the certificate revocation function, not to delete the digital file itself. In addition, the data replication between each node in the distributed storage system is also based on the network transmission interface as the data transmission medium. It is difficult to confirm whether the data has been copied.

本發明之一目的,在於提供一種分散式儲存系統之同步刪除方法,其針對分散式儲存系統於各網路節點上的主機提供資料更新之功能,以確保各網路節點上的主機正確執行資料同步與刪除。 An object of the present invention is to provide a synchronous deletion method for a distributed storage system, which provides a data update function for the hosts on each network node of the distributed storage system to ensure that the hosts on each network node execute data correctly Sync and delete.

本發明之一目的,在於提供一種分散式儲存系統之同步刪除方法,其針對分散式儲存系統的各主機提供資料刪除之功能,以確保各主機正確執行資料刪除。 An object of the present invention is to provide a synchronous deletion method for a distributed storage system, which provides a data deletion function for each host of the distributed storage system to ensure that each host executes data deletion correctly.

為了達到上述之目的,本發明之一實施例係揭示一種分散式儲存系統之同步刪除方法,其中第一主機儲存有複數個第一資料與第二主機儲存有複數個第二資料,第一主機與第二主機分別儲存第一原始列表與第二原始列表,且對應於一區塊鏈內容之一索引資料列表,第一主機先依據一第一原始列表新增或刪除至少一異動資料,產生一第一更新列表;之後第一主機依據第一更新列表更新區塊鏈內容之索引資料列表上;依據該第一更新列表更新該索引資料列表並產生一異動資料列表;以及,該第二主機依據該異動資料列表比對該第二原始列表,以刪除該些個第二資料之至少一第二異動資料。如此使用者可透過該異動資料列表,以讓第二主機確實刪除資料,因而避免第一主機與第二主機所儲存的資料未一致。 In order to achieve the above objective, an embodiment of the present invention discloses a synchronous deletion method of a distributed storage system, wherein a first host stores a plurality of first data and a second host stores a plurality of second data, the first host The first original list and the second original list are respectively stored with the second host, and correspond to an index data list of a blockchain content. The first host first adds or deletes at least one transaction data according to a first original list to generate A first update list; then the first host updates the index data list of the blockchain content according to the first update list; updates the index data list according to the first update list and generates a change data list; and, the second host The second original list is compared according to the change data list to delete at least one second change data of the second data. In this way, the user can use the change data list to allow the second host to delete the data, thereby avoiding the inconsistency of the data stored by the first host and the second host.

本發明提供一實施例,其中該第一主機與該第二主機設置於相同網域或不同網域。 The present invention provides an embodiment, wherein the first host and the second host are set in the same network domain or different network domains.

本發明提供一實施例,其中於於產生一第一更新列表並上傳至一區塊鏈上之步驟中,該第一主機進一步產生一第一驗證資料並上傳至一稽核控制單元,且更進一步執行提供一第二驗證資料至該稽核控制單元;以及該稽核控制單元依據該第一驗證資料與該第二驗證資料稽核該第二主機。 The present invention provides an embodiment, wherein in the step of generating a first update list and uploading it to a blockchain, the first host further generates a first verification data and uploads it to an audit control unit, and further Performing providing a second verification data to the audit control unit; and the audit control unit audits the second host according to the first verification data and the second verification data.

本發明提供一實施例,該稽核控制單元進一步依據一資料期限資料稽核該第二主機。 The present invention provides an embodiment in which the audit control unit further audits the second host according to a data period data.

本發明提供一實施例,更包含,依據該第二更新列表比較該第二原始列表,當該第二原始列表不同於該第二更新列表時,第二主機對應刪除第二異動資料。 The present invention provides an embodiment that further includes comparing the second original list according to the second update list, and when the second original list is different from the second update list, the second host correspondingly deletes the second transaction data.

本發明提供一實施例,其為同步刪除方法進一步包含一步驟,其為一第三主機接收廣播之該區塊鏈內容,未執行該異動資料列表之比對。 The present invention provides an embodiment in which the synchronous deletion method further includes a step in which a third host receives the broadcasted blockchain content without performing the comparison of the abnormal data list.

1:分散式儲存系統 1: Distributed storage system

10:第一主機 10: First host

12:第一監控程式 12: The first monitoring program

14:第一儲存空間 14: The first storage space

20:第二主機 20: second host

22:第二監控程式 22: The second monitoring program

24:第二儲存空間 24: second storage space

26:安全模組 26: Security module

30:區塊鏈內容 30: Blockchain content

32:索引資料列表 32: Index data list

34:異動資料列表 34: List of transaction data

36:執行列表 36: Execution list

38:稽核控制單元 38: Audit Control Unit

40:資料期限列表 40: List of data deadlines

42:稽核列表 42: Audit List

50:第三主機 50: Third host

52:第三監控程式 52: The third monitoring program

54:第三儲存空間 54: third storage space

A:區塊鏈網路 A: Blockchain network

NET1:第一網路 NET1: the first network

NET2:第二網路 NET2: second network

S1:第一安全模組 S1: The first safety module

S2:第二安全模組 S2: The second safety module

S3:第三安全模組 S3: Third Security Module

T1:第一原始列表 T1: First original list

T2:第二原始列表 T2: second original list

U1:第一更新列表 U1: First update list

U2:第二更新列表 U2: Second update list

V1:第一驗證資料 V1: First verification data

V2:第二驗證資料 V2: Second verification data

第一圖:其係本發明之一實施例之流程圖; 第二圖:其係本發明之一實施例之系統示意圖;第三圖:其係本發明之一實施例之部分流程圖;第四圖:其係本發明之另一實施例之流程圖;第五圖:其係本發明之另一實施例之系統示意圖;第六圖:其係本發明之另一實施例之部分流程圖;第七圖:其係本發明之另一實施例之流程圖;第八圖:其係本發明之另一實施例之部分流程圖;以及第九圖:其係本發明之另一實施例之系統示意圖。 Figure 1: It is a flowchart of an embodiment of the present invention; Figure 2: It is a system schematic diagram of an embodiment of the present invention; Figure 3: It is a partial flowchart of an embodiment of the present invention; Figure 4: It is a flowchart of another embodiment of the present invention; Figure 5: It is a system diagram of another embodiment of the present invention; Figure 6: It is a partial flowchart of another embodiment of the present invention; Figure 7: It is a process flow of another embodiment of the present invention Figure; Figure eight: it is a partial flowchart of another embodiment of the present invention; and Figure ninth: it is a system schematic diagram of another embodiment of the present invention.

為使 貴審查委員對本發明之特徵及所達成之功效有更進一步之瞭解與認識,謹佐以較佳之實施例及配合詳細之說明,說明如後: In order to enable your reviewer to have a further understanding and understanding of the features of the present invention and the effects achieved, the preferred embodiments and detailed descriptions are provided, as follows:

在下文中,將藉由圖式來說明本發明之各種實施例來詳細描述本發明。然而本發明之概念可能以許多不同型式來體現,且不應解釋為限於本文中所闡述之例式性實施例。 Hereinafter, various embodiments of the present invention will be described in detail through the use of drawings. However, the concept of the present invention may be embodied in many different forms, and should not be construed as being limited to the exemplary embodiments described herein.

本發明為一種分散式儲存系統之同步刪除方法,其提供使用者藉由區塊鏈網路上建立資料列表,以在分散式儲存系統架構下,可各主機於同步之後維持資料一致性。 The present invention is a synchronous deletion method for a distributed storage system, which provides a user to create a data list on a blockchain network, so that under the distributed storage system architecture, each host can maintain data consistency after synchronization.

首先,請參閱第一圖,其為本發明之一實施例之流程圖。如圖所示,本發明之分散式儲存系統之同步刪除方法,其步驟包含:步驟S1:將複數個資料儲存為一第一主機之複數個第一資料與一第二主機之複數個第二資料,該第一主機與該第二主機分別建立一第一原始列表與一第二原始列表;步驟S3:依據該第一原始列表更新該些個第一資料之至少一第一異動資料,產生一第一更新列表;步驟S5:依據該第一更新列表更新一索引資料列表與產生一異動資料列表於該區塊鏈內容中,以廣播該區塊鏈內容;以及 步驟S7:該第二主機依據該異動資料列表比對該第二原始列表,以更新該些個第二資料之至少一第二異動資料。 First of all, please refer to the first figure, which is a flowchart of an embodiment of the present invention. As shown in the figure, the synchronous deletion method of the distributed storage system of the present invention includes the following steps: Step S1: Store a plurality of data as a plurality of first data of a first host and a plurality of second data of a second host Data, the first host and the second host respectively create a first original list and a second original list; step S3: update at least one first transaction data of the first data according to the first original list to generate A first update list; step S5: update an index data list according to the first update list and generate a change data list in the blockchain content to broadcast the blockchain content; and Step S7: The second host compares the second original list with the change data list to update at least one second change data of the second data.

接著說明為達成本發明之分散式儲存系統,請參閱第二圖,其為本發明之一實施例之系統示意圖,如第二圖所示;本發明之分散式儲存系統1,包含一第一主機10、一第二主機20與一區塊鏈內容30,除此之外,本發明之分散式儲存系統1更可進一步包含一第一網路NET1,其為一內部網路,第一主機10與第二主機20同為設置於第一網路NET1中。其中,第一主機10具有一第一監控程式12與一第一儲存空間14,第二主機20具有一第二監控程式22與一第二儲存空間24,第一主機10與第二主機20分別設有一第一安全模組S1與一第二安全模組S2,第一監控程式12建立於第一安全模組S1內,第二監控程式22建立於第二安全模組S2內,區塊鏈內容30具有一索引資料列表32與一異動資料列表34,藉由第一安全模組S1與第二安全模組S2,使第一監控程式12與第二監控程式22具不可竄改性質。 The following describes the distributed storage system in order to achieve the present invention, please refer to the second figure, which is a system diagram of an embodiment of the present invention, as shown in the second figure; the distributed storage system 1 of the present invention includes a first Host 10, a second host 20, and a blockchain content 30. In addition, the distributed storage system 1 of the present invention may further include a first network NET1, which is an internal network, and the first host 10 and the second host 20 are set in the first network NET1. Among them, the first host 10 has a first monitoring program 12 and a first storage space 14, the second host 20 has a second monitoring program 22 and a second storage space 24, the first host 10 and the second host 20 are respectively There is a first security module S1 and a second security module S2. The first monitoring program 12 is built in the first security module S1, and the second monitoring program 22 is built in the second security module S2. Blockchain The content 30 has an index data list 32 and a transaction data list 34. The first security module S1 and the second security module S2 make the first monitoring program 12 and the second monitoring program 22 non-mutable.

此外,區塊鏈內容30進一步具有一執行列表36。第一主機10與第二主機20分別為一區塊鏈網路A之一網路節點(圖未示)上而建立區塊鏈內容30。區塊鏈網路A為一私有鏈網路、一聯盟鏈網路或一公有鏈網路上。第一主機10與第二主機20在分別於區塊鏈網路A具有對應之網路節點,並各自於第一安全模組S1與第二安全模組S2內具有自己專屬並具唯一性的私鑰(Privacy Key)。 In addition, the blockchain content 30 further has an execution list 36. The first host 10 and the second host 20 are respectively a network node (not shown in the figure) of a blockchain network A to create the blockchain content 30. The blockchain network A is a private chain network, a consortium chain network or a public chain network. The first host 10 and the second host 20 respectively have corresponding network nodes in the blockchain network A, and each has its own exclusive and unique in the first security module S1 and the second security module S2 Private key (Privacy Key).

如步驟S1所示,將複數個資料在第一主機10儲存為複數個第一資料於第一儲存空間14,並將該些個資料在第二主機20儲存為第二資料於第二儲存空間24,而讓第一主機10與第二主機20分別對應建立一第一原始列表T1與一第二原始列表T2,且第一原始列表T1與第二原始列表T2對應於區塊鏈內容30之索引資料列表32;如步驟S3所示,本實施例為第一主機10針對其第一儲存空間14中所儲存之第一資料進行異動,例如:新增一文件資料至第一儲存空間14或刪除第一儲存空間14內之其中一資料,因此,第一主機10將其一第一原始列表T1依據異動之資料產生一第一更新列表U1,第一原始列表T1對應於第一主機10之全部原始之第一資料,第一更新列表U1對應於第一主機10經異動後之全部第一 資料,即該些的第一資料之未異動資料與異動資料,第一監控程式12隨即因第一主機10之資料異動而將第一更新列表U1上傳至對應網路節點上的區塊鏈內容30,其中第一監控程式12更可進一步將對應之一第一驗證資料V1上傳至區塊鏈網路30之對應節點上。如步驟S5所示,區塊鏈內容30為透過第一監控程式12因第一更新列表U1而相當於更新區塊鏈內容30之索引資料列表32,並針對步驟S3所異動之資料及第一更新列表U1產生異動資料列表34於區塊鏈內容30,因而第一主機10即透過區塊鏈網路A上對應之網路節點廣播區塊鏈內容30,藉此讓相同區塊鏈上的其他網路節點,亦擁有更新後的區塊鏈內容30,因此,因此其他網路獲得更新後之區塊鏈內容30,即索引資料列表32對應於第一主機10之第一儲存空間14中於更新後所儲存之全部資料,異動資料列表34對應於第一主機10之第一儲存空間14中被異動之資料。如步驟S7所示,因第二主機20對應於區塊鏈網路A之其中一網路節點,且第二主機20之第二監控程式22為監控第二儲存空間24中的資料,如此第二主機20於對應網路節點獲得更新後之區塊鏈內容30,並依據區塊鏈內容30之索引資料列表32與異動資料列表34,比對第二原始列表T2,以產生一第二更新列表U2,第二主機20藉由第二原始資料列表T2與第二更新列表U2之比對第二儲存空間24中的資料,以刪除資料,例如:依據第二原始資料列表T2與第二更新列表U2之比對刪除對應之資料,其中第二監控程式22為依據第二儲存空間24中的資料之刪除而上傳一第二驗證資訊V2至區塊鏈內容30上。 As shown in step S1, store a plurality of data in the first host 10 as a plurality of first data in the first storage space 14, and store the data in the second host 20 as second data in the second storage space 24. Let the first host 10 and the second host 20 respectively establish a first original list T1 and a second original list T2, and the first original list T1 and the second original list T2 correspond to the block chain content 30 Index data list 32; as shown in step S3, in this embodiment, the first host 10 performs a change with respect to the first data stored in the first storage space 14, for example: adding a file data to the first storage space 14 or One of the data in the first storage space 14 is deleted. Therefore, the first host 10 generates a first update list U1 from its first original list T1 based on the changed data. The first original list T1 corresponds to the first host 10 All the original first data, the first update list U1 corresponds to all the first hosts 10 after the transaction Data, that is, the unchanged data and the changed data of the first data, the first monitoring program 12 then uploads the first update list U1 to the blockchain content on the corresponding network node due to the data change of the first host 10 30. The first monitoring program 12 can further upload a corresponding one of the first verification data V1 to the corresponding node of the blockchain network 30. As shown in step S5, the block chain content 30 is equivalent to the index data list 32 of the block chain content 30 updated due to the first update list U1 through the first monitoring program 12, and is based on the data changed in step S3 and the first The update list U1 generates the transaction data list 34 in the blockchain content 30, so the first host 10 broadcasts the blockchain content 30 through the corresponding network node on the blockchain network A, thereby allowing the users on the same blockchain Other network nodes also have the updated blockchain content 30. Therefore, other networks obtain the updated blockchain content 30, that is, the index data list 32 corresponds to the first storage space 14 of the first host 10 Of all the data stored after the update, the changed data list 34 corresponds to the changed data in the first storage space 14 of the first host 10. As shown in step S7, because the second host 20 corresponds to one of the network nodes of the blockchain network A, and the second monitoring program 22 of the second host 20 monitors the data in the second storage space 24, so The second host 20 obtains the updated blockchain content 30 at the corresponding network node, and compares the second original list T2 with the index data list 32 and the transaction data list 34 of the blockchain content 30 to generate a second update List U2, the second host 20 compares the data in the second storage space 24 with the second original data list T2 and the second update list U2 to delete the data, for example: according to the second original data list T2 and the second update The comparison of the list U2 deletes the corresponding data, wherein the second monitoring program 22 uploads a second verification information V2 to the blockchain content 30 according to the deletion of the data in the second storage space 24.

如第三圖所示,步驟S7進一步包含:步驟S72:判斷是否刪除資料;步驟S74:繼續監控;以及步驟S76:刪除資料。 As shown in the third figure, step S7 further includes: step S72: determining whether to delete the data; step S74: continuing to monitor; and step S76: deleting the data.

如步驟S72所示,第二監控程式22針對第二原始列表T2與第二更新列表U2監測第二主機20之第二儲存空間24中所有資料,而判斷第二儲存空間24是否刪除資料,當第二更新列表U2無不同於第二原始列表T2時,執行步驟S74,當第二更新列表U2不同於第二原始列表T2且需刪除資料時,執行步驟S76。 如步驟S74所示,第二主機20不需新增資料時,由於第二主機20繼續監控第二儲存空間24所儲存之資料。如步驟S76所示,第二更新列表U2不同於第二原始列表T2刪除資料時,由於第二更新列表U2中為列舉刪除資料,而讓第二主機20亦是刪除第二儲存空間24中對應之資料。 As shown in step S72, the second monitoring program 22 monitors all data in the second storage space 24 of the second host 20 for the second original list T2 and the second updated list U2, and determines whether the second storage space 24 deletes the data. When the second update list U2 is not different from the second original list T2, step S74 is executed. When the second update list U2 is different from the second original list T2 and data needs to be deleted, step S76 is executed. As shown in step S74, when the second host 20 does not need to add data, the second host 20 continues to monitor the data stored in the second storage space 24. As shown in step S76, when the second update list U2 is different from the second original list T2 when deleting data, since the second update list U2 lists deleted data, the second host 20 also deletes the corresponding data in the second storage space 24的信息。 Information.

此外,具監控權限之任一主機依據區塊鏈內容30之執行列表36判斷第二主機20之資料更新狀態,進一步同時藉由執行列表36判斷第一主機10是否持續更新,以透過第一監控程式12擷取第一儲存空間14中的資料列表。另外,異動資料列表34更可設置多重數位簽署文件,當異動資料列表34列舉刪除之資料時,區塊鏈網路30不會將未完成數位簽署文件的刪除資料列舉於異動資料列表34,因而讓第二監控程式22不刪除對應資料。 In addition, any host with monitoring authority determines the data update status of the second host 20 according to the execution list 36 of the blockchain content 30, and further determines whether the first host 10 is continuously updated by the execution list 36 at the same time, so as to pass the first monitoring The program 12 retrieves the data list in the first storage space 14. In addition, the transaction data list 34 can also be configured with multiple digitally signed documents. When the transaction data list 34 lists deleted data, the blockchain network 30 will not list the deleted data of the incomplete digitally signed documents in the transaction data list 34. Therefore, Let the second monitoring program 22 not delete the corresponding data.

以下將說明本發明之另一實施例之分散式儲存系統之同步刪除方法之流程,請參閱第四圖,本發明之步驟流程包含如下:步驟S11:將複數個資料儲存為一第一主機之複數個第一資料與一第二主機之複數個第二資料,該第一主機與該第二主機分別建立一第一原始列表與一第二原始列表;步驟S13:依據該第一原始列表更新該些個第一資料之至少一第一異動資料,產生一第一更新列表;以及步驟S15:依據該第一更新列表更新一索引資料列表與產生一異動資料列表於該區塊鏈內容中,以廣播該區塊鏈內容;步驟S17:該第二主機依據該異動資料列表比對該第二原始列表,以刪除該些個第二資料之至少一第二異動資料;步驟S19:提供第二驗證資料至稽核控制單元;以及步驟S21:稽核控制單元依據第一驗證資料與第二驗證資料稽核第二主機。 The flow of the synchronous deletion method of the distributed storage system of another embodiment of the present invention will be described below. Please refer to the fourth figure. The step flow of the present invention includes the following: Step S11: Store a plurality of data as a first host A plurality of first data and a plurality of second data of a second host, the first host and the second host respectively establish a first original list and a second original list; step S13: update according to the first original list At least one first change data of the first data generates a first update list; and step S15: update an index data list according to the first update list and generate a change data list in the blockchain content, To broadcast the blockchain content; Step S17: The second host compares the second original list according to the list of transaction data to delete at least one second transaction data of the second data; Step S19: Provide a second The verification data is sent to the audit control unit; and step S21: the audit control unit audits the second host according to the first verification data and the second verification data.

並請參閱第五圖,第二圖與第五圖之差異在於第二主機20進一步設有一安全模組26,區塊鏈內容30進一步設有一稽核控制單元38與一資料期限列表40。再者,第一主機10與第二主機20分別位於第一網路NET1與第二網路 NET2,因此對於第一主機10而言,第二主機20位於外部網路,在區塊鏈網路A中,可由任一主機取得稽核權限,而執行稽核控制單元38,以稽核第二主機20之第二儲存空間24。 Please refer to the fifth figure. The difference between the second figure and the fifth figure is that the second host 20 is further provided with a security module 26, and the blockchain content 30 is further provided with an audit control unit 38 and a data expiration list 40. Furthermore, the first host 10 and the second host 20 are respectively located in the first network NET1 and the second network NET2. Therefore, for the first host 10, the second host 20 is located on the external network. In the blockchain network A, any host can obtain the audit authority, and the audit control unit 38 is executed to audit the second host 20 The second storage space 24.

於步驟S11至步驟S17中,其執行方式同於上述步驟S1至步驟S7所述之資料刪除之技術,因此不再贅述,如步驟S13所示,在第一主機10新增或刪除第一儲存空間14之異動資料時,第一主機10之第一監控程式12會產生第一驗證資料V1並同步至區塊鏈內容30中,如步驟S19所示,步驟S17除了讓第二監控程式22依據第二更新列表U2不同於第二原始列表T2對第二儲存空間24所儲存之第二資料進行資料之刪除之外,第二主機20進一步對應產生一第二驗證資料V2並同步至區塊鏈內容30中。如步驟S21所示,稽核控制單元38依據第一驗證資料V1與第二驗證資料V2稽核第二主機20之第二儲存空間24中所有資料,再者,稽核控制單元38進一步依據索引資料列表32與異動資料列表34產生資料期限列40,並透過資料期限列表40稽核第二主機20之第二儲存空間24中所儲存之全部資料,以確認第二儲存空間24是否儲存過期資料。 In step S11 to step S17, the execution method is the same as the data deletion technique described in step S1 to step S7 above, so it will not be repeated here. As shown in step S13, add or delete the first storage in the first host 10. When the space 14 changes data, the first monitoring program 12 of the first host 10 will generate the first verification data V1 and synchronize it to the blockchain content 30. As shown in step S19, in step S17, except for the second monitoring program 22 to follow The second updated list U2 is different from the second original list T2 in that it deletes the second data stored in the second storage space 24. The second host 20 further generates a second verification data V2 and synchronizes it to the blockchain. Content 30. As shown in step S21, the audit control unit 38 audits all data in the second storage space 24 of the second host 20 according to the first authentication data V1 and the second authentication data V2. Furthermore, the audit control unit 38 further according to the index data list 32 The data period list 40 is generated with the change data list 34, and all the data stored in the second storage space 24 of the second host 20 are checked through the data period list 40 to confirm whether the second storage space 24 stores expired data.

於步驟S21中,並請一併參閱第六圖,本發明之分散式儲存系統之同步刪除方法於步驟S21中進一步包含:步驟S212:判斷資料是否最新儲存狀態;步驟S214:繼續監控;以及步驟S216:同步刪除資料。 In step S21, please also refer to the sixth figure. The synchronous deletion method of the distributed storage system of the present invention further includes in step S21: Step S212: Determine whether the data is in the latest storage state; Step S214: Continue monitoring; and Step S216: Delete data synchronously.

於步驟S212之中,稽核控制單元38依據第一驗證資料V1與第二驗證資料V2判斷第二儲存空間24所儲存之資料是否對應於第一儲存空間14所儲存之資料而為最新儲存狀態,當資料為最新狀態時,執行步驟S214,當判斷其中一資料為已被更動之資料時,接續執行步驟S216;於步驟S214中,第二監控程式24會持續監控第二主機20之第二儲存空間24。於步驟S216中,稽核控制單元38稽核第二主機20上非最新狀態後,稽核控制單元38遂控制發送請求訊息至安全模組26,以讓安全模組26進行資料刪除。除此之外,進一步更可讓稽核控制單元38判斷其中一資料於資料期限列表40上是否過期資料,稽核控制單元38 遂發送請求訊息至安全模組26,以驅使安全模組26進行資料刪除,而讓第二儲存空間24中的資料為最新狀態,例如:第二主機20刪除第二儲存空間24所有資料,以讓第二主機20與第一主機10所儲存之資料達成一致。 In step S212, the audit control unit 38 determines whether the data stored in the second storage space 24 corresponds to the data stored in the first storage space 14 and is in the latest storage state according to the first verification data V1 and the second verification data V2. When the data is in the latest state, step S214 is executed. When it is determined that one of the data is the data that has been changed, step S216 is continued; in step S214, the second monitoring program 24 will continue to monitor the second storage of the second host 20 Space 24. In step S216, after the audit control unit 38 audits the non-updated status on the second host 20, the audit control unit 38 controls to send a request message to the security module 26 to allow the security module 26 to delete data. In addition, the audit control unit 38 can further determine whether one of the data is out of date on the data expiration list 40, and the audit control unit 38 Then it sends a request message to the security module 26 to drive the security module 26 to delete the data and make the data in the second storage space 24 the latest state. For example, the second host 20 deletes all data in the second storage space 24 to The data stored in the second host 20 and the first host 10 are agreed.

此外,區塊鏈網路30更可進一步設有一稽核列表42而存取第一驗證資料V1與第二驗證資料V2,每當第一主機10完成一次資料刪除時,第一監控程式12或第一安全模組S1即會產生第一驗證資料V1至區塊鏈內容30,以儲存在稽核列表42,每當第二主機20完成一次資料刪除時,第二監控程式22或第二安全模組S2即會產生第二驗證資料V2至區塊鏈內容30,以儲存在稽核列表42,稽核控制單元38即可藉由稽核列表42稽核資料期限列表40或執行列表36上的資料更新是否確實執行,因而避免人工稽核,而減少人工比對操作,同時提高資料安全性。以上所述之第一儲存空間14所儲存之第一資料與第二儲存空間24所儲存之第二資料為星際檔案系統(InterPlanetary File System,IPFS)之系統架構下的資料。 In addition, the blockchain network 30 can further have an audit list 42 to access the first verification data V1 and the second verification data V2. Whenever the first host 10 completes a data deletion, the first monitoring program 12 or A security module S1 will generate the first verification data V1 to the blockchain content 30 to be stored in the audit list 42. Whenever the second host 20 completes a data deletion, the second monitoring program 22 or the second security module S2 will generate the second verification data V2 to the blockchain content 30 to be stored in the audit list 42, and the audit control unit 38 can use the audit list 42 to verify whether the data update on the audit data period list 40 or the execution list 36 is actually executed Therefore, manual audits are avoided, manual comparison operations are reduced, and data security is improved. The above-mentioned first data stored in the first storage space 14 and the second data stored in the second storage space 24 are data under the system architecture of the InterPlanetary File System (IPFS).

請參閱第七圖,其為本發明之另一實施例之流程圖。本發明之步驟流程包含如下:步驟S31:將複數個資料儲存為一第一主機之複數個第一資料與一第二主機之複數個第二資料,該第一主機與該第二主機分別建立一第一原始列表與一第二原始列表;步驟S33:依據該第一原始列表更新該些個第一資料之至少一第一異動資料,產生一第一更新列表;以及步驟S35:依據該第一更新列表更新一索引資料列表與產生一異動資料列表於該區塊鏈內容中,以廣播該區塊鏈內容;步驟S37:該第二主機依據該異動資料列表比對該第二原始列表,以刪除該些個第二資料之至少一第二異動資料;步驟S39:提供第二驗證資料至稽核控制單元;以及步驟S41:稽核控制單元依據第一驗證資料與第二驗證資料稽核第二主機。 Please refer to Figure 7, which is a flowchart of another embodiment of the present invention. The step process of the present invention includes the following: Step S31: Store a plurality of data as a plurality of first data of a first host and a plurality of second data of a second host, the first host and the second host are created separately A first original list and a second original list; step S33: update at least one first transaction data of the first data according to the first original list to generate a first update list; and step S35: according to the first data An update list updates an index data list and generates a transaction data list in the blockchain content to broadcast the blockchain content; step S37: the second host compares the second original list according to the transaction data list, To delete at least one second transaction data of the second data; step S39: provide the second verification data to the audit control unit; and step S41: the audit control unit audit the second host according to the first verification data and the second verification data .

步驟S31至步驟S39同於上述步驟S11至步驟S19,因此不再贅述。步驟S41與步驟S21之差異在於步驟S41進一步包含自毀功能。請一併參閱第五圖,本發明之稽核控制單元38為依據稽核列表42上的第一驗證資料V1與第二驗證資料V2稽核第二主機20,當第一驗證資料V1不同於第二驗證資料V2時,稽核控制單元38會對第二主機20發出資料刪除請求訊息,以請求第二安全模組S2或其中的第二監控程式22對應執行資料刪除,如第八圖所示,於步驟S41中進一步包含:步驟S412:判斷資料是否最新儲存狀態;步驟S414:繼續監控;步驟S416:請求刪除資料;步驟S418:是否完成刪除;步驟S420:繼續監控;步驟S422:是否刪除資料已請求3次;以及步驟S424:驅使主機離線。 Steps S31 to S39 are the same as the above steps S11 to S19, so they will not be described again. The difference between step S41 and step S21 is that step S41 further includes a self-destruct function. Please also refer to the fifth figure. The audit control unit 38 of the present invention audits the second host 20 according to the first verification data V1 and the second verification data V2 on the audit list 42. When the first verification data V1 is different from the second verification data V1 When the data is V2, the audit control unit 38 sends a data deletion request message to the second host 20 to request the second security module S2 or the second monitoring program 22 therein to execute the data deletion accordingly, as shown in the eighth figure, in step S41 further includes: Step S412: Determine whether the data is in the latest storage state; Step S414: Continue to monitor; Step S416: Request to delete the data; Step S418: Whether to complete the deletion; Step S420: Continue to monitor; Step S422: Whether to delete the data has been requested 3 And step S424: drive the host offline.

於步驟S412至步驟S416,同於步驟S212至步驟S216,因此不再贅述,於步驟S418中,稽核控制單元38為進一步稽核第二主機20是否完成資料之同步刪除,當完成時,執行步驟S420,當未完成時,執行步驟S422;於步驟S420中,第二監控程式24會持續監控第二主機20之第二儲存空間24;於步驟S422中,會判斷稽核控制單元38發送同步刪除資料之請求訊息是否已達3次,當未達3次時,執行步驟S416,當已達3次時,執行步驟S424;於步驟S424中,稽核控制單元38於執行列表36中標註第二主機20應離線,因此第二監控程式22將會依據執行列表36所標註之第二主機20應離線而清除第二儲存空間24中所儲存之第二資料,以讓應離線之第二主機20停止後續動作,而讓應離線之第二主機20確實於區塊鏈網路A上離線。 Steps S412 to S416 are the same as steps S212 to S216, so they will not be repeated. In step S418, the audit control unit 38 further audits whether the second host 20 has completed the synchronization deletion of data, and when it is completed, executes step S420 , When it is not completed, perform step S422; in step S420, the second monitoring program 24 will continue to monitor the second storage space 24 of the second host 20; in step S422, it will be determined that the audit control unit 38 sends a synchronous deletion data Whether the request message has reached 3 times, when it has not reached 3 times, perform step S416, when it has reached 3 times, perform step S424; in step S424, the audit control unit 38 marks the second host 20 response in the execution list 36 Offline, therefore, the second monitoring program 22 will clear the second data stored in the second storage space 24 according to the second host 20 marked in the execution list 36 that should be offline, so that the second host 20 that should be offline stops subsequent actions , And let the second host 20 that should go offline actually go offline on the blockchain network A.

以上所述之第一主機10與第二主機20分別具有對應區塊鏈網路30之一私鑰,分別夾帶於第一主機10與第二主機20於區塊鏈網路30上的節點存取資料,而避免資料竄改,以及提供資料正確性的確認。此外,本發明之第一 主機10與第二主機20於第一安全模組S1與第二安全模組S2中的第一監控程式12與第二監控程式22皆具有自毀功能,其依據稽核控制單元38發出一同步刪除之相同請求訊息至第一主機10或第二主機20三次之後,稽核控制單元38於執行列表36上標註該主機應離線,因此當對應之監控程式於區塊鏈網路A之對應網路節點上讀取到該主機應離線之標註時,應離線之該主機隨即被安全模組中的監控程式刪除對應儲存空間中的全部資料,以讓應離線之該主機停止後續動作,而讓應離線之該主機確實於區塊鏈網路A上離線。 The first host 10 and the second host 20 described above each have a private key corresponding to the blockchain network 30, which is respectively carried by the first host 10 and the second host 20 to be stored in the nodes on the blockchain network 30. Obtain data, avoid data tampering, and provide confirmation of data correctness. In addition, the first The first monitoring program 12 and the second monitoring program 22 in the first security module S1 and the second security module S2 of the host 10 and the second host 20 both have a self-destruct function, which is based on the audit control unit 38 issuing a synchronous deletion After the same request message arrives at the first host 10 or the second host 20 three times, the audit control unit 38 indicates that the host should be offline on the execution list 36, so when the corresponding monitoring program is on the corresponding network node of the blockchain network A When it reads that the host should be offline, the host that should be offline is immediately deleted by the monitoring program in the security module to delete all the data in the corresponding storage space, so that the host that should be offline stops subsequent actions, and the host should be offline The host is indeed offline on blockchain network A.

請參閱第九圖,其為本發明之另一實施例之系統示意圖。其中第五圖與第九圖之差異在於第九圖進一步設有一第三主機50,第三主機50具有一第三監控程式52與一第三儲存空間54,第三監控程式52設於一第三安全模組S3中。由於第三主機50為應離線之主機,因此第三主機50於第一主機10執行步驟S35後,並未接續執行步驟S37中接收到廣播之區塊鏈內容30,以比對異動資料列表34執行同步刪除。 Please refer to Figure 9, which is a schematic diagram of a system according to another embodiment of the present invention. The difference between the fifth figure and the ninth figure is that the ninth figure further has a third host 50, the third host 50 has a third monitoring program 52 and a third storage space 54, and the third monitoring program 52 is located in a first Three security module S3. Since the third host 50 is a host that should go offline, the third host 50 does not continue to execute the blockchain content 30 received in step S37 after the first host 10 executes step S35 to compare the transaction data list 34 Perform synchronous deletion.

綜上所述,本發明為一種分散式儲存系統之同步刪除方法,其提供監控程式作為自動輔助監測各主機中的儲存空間,因而達成以下功效:1.透過資料列表,提供對應資料更新;2.確保各節點IPFS內容之一致性;以及3.透過自動稽核機制,減少人員比對操作,同時提高安全性。 In summary, the present invention is a synchronous deletion method for a distributed storage system, which provides a monitoring program as an automatic auxiliary monitoring storage space in each host, thereby achieving the following effects: 1. Provide corresponding data updates through the data list; 2. .Ensure the consistency of the IPFS content of each node; and 3. Through the automatic audit mechanism, reduce personnel comparison operations and improve security.

惟以上所述者,僅為本發明之較佳實施例而已,並非用來限定本發明實施之範圍,舉凡依本發明申請專利範圍所述之形狀、構造、特徵及精神所為之均等變化與修飾,均應包括於本發明之申請專利範圍內。 However, the above are only the preferred embodiments of the present invention, and are not used to limit the scope of implementation of the present invention. For example, the shapes, structures, features and spirits described in the scope of the patent application of the present invention are equally changed and modified. , Should be included in the scope of patent application of the present invention.

本發明係實為依據有新穎性、進步性及可供產業利用者,應符合我國專利法所規定之專利申請要件無疑,爰依法提出發明專利申請,祈 鈞局早日賜准專利,至感為禱。 The invention is based on the fact that it is novel, progressive, and available for industrial use. It should meet the patent application requirements stipulated by the Chinese Patent Law. No doubt, I filed an invention patent application in accordance with the law. I hope that the Bureau will grant the patent as soon as possible. prayer.

Claims (7)

一種分散式儲存系統之同步刪除方法,其步驟包含:將複數個資料儲存為一第一主機之複數個第一資料與一第二主機之複數個第二資料,該第一主機與該第二主機分別建立一第一原始列表與一第二原始列表,該第一原始列表與該第二原始列表對應於一區塊鏈內容之一索引資料列表;該第一主機依據該第一原始列表更新該些個第一資料之至少一第一異動資料,產生一第一更新列表;依據該第一更新列表更新該索引資料列表與產生一異動資料列表於該區塊鏈內容中,以廣播該區塊鏈內容;及該第二主機依據該異動資料列表比對該第二原始列表,以刪除該些個第二資料之至少一第二異動資料,進一步,該至少一第一異動資料對應該至少一第二異動資料。 A method for synchronous deletion of a distributed storage system. The steps include: storing a plurality of data as a plurality of first data of a first host and a plurality of second data of a second host, the first host and the second host The host separately creates a first original list and a second original list, the first original list and the second original list corresponding to an index data list of a blockchain content; the first host updates according to the first original list At least one first change data of the first data, generate a first update list; update the index data list according to the first update list and generate a change data list in the blockchain content to broadcast the zone Block chain content; and the second host compares the second original list with the transaction data list to delete at least one second transaction data of the second data. Further, the at least one first transaction data corresponds to at least One second transaction data. 如申請專利範圍第1項所述之分散式儲存系統之同步刪除方法,其中該第一主機與該第二主機設置於相同網域或不同網域。 The synchronous deletion method of the distributed storage system described in the first item of the scope of patent application, wherein the first host and the second host are set in the same network domain or different network domains. 如申請專利範圍第1項所述之分散式儲存系統之同步刪除方法,其中於產生一第一更新列表之步驟中,該第一主機進一步產生一第一驗證資料並上傳至一稽核控制單元,該同步刪除方法之步驟更包含:提供一第二驗證資料至該稽核控制單元;以及該稽核控制單元依據該第一驗證資料與該第二驗證資料稽核該第二主機。 For example, in the synchronous deletion method of the distributed storage system described in the scope of patent application, in the step of generating a first update list, the first host further generates a first verification data and uploads it to an audit control unit, The steps of the synchronous deletion method further include: providing a second verification data to the audit control unit; and the audit control unit audits the second host according to the first verification data and the second verification data. 如申請專利範圍第3項所述之分散式儲存系統之同步刪除方法,其中於該稽核控制單元依據該第一驗證資料與該第二驗證資料稽核該第二主機之步驟中,該稽核控制單元進一步依據一資料期限資料稽核該第二主機。 For example, in the synchronous deletion method of the distributed storage system described in item 3 of the scope of patent application, in the step of the audit control unit auditing the second host according to the first authentication data and the second authentication data, the audit control unit The second host is further audited based on a data period data. 如申請專利範圍第1項所述之分散式儲存系統之同步刪除方法,更包含: 當該稽核控制單元依據該第一驗證資料與該第二驗證資料稽核該第二主機且發送相同之資料刪除請求訊息已達三次時,該稽核控制單元於一執行列表上標註該第二主機應離線;以及該第二主機依據該執行列表刪除該些個第二資料。 The synchronous deletion method of the distributed storage system described in item 1 of the scope of patent application further includes: When the audit control unit audits the second host according to the first verification data and the second verification data and has sent the same data deletion request message three times, the audit control unit marks the second host on an execution list. Offline; and the second host deletes the second data according to the execution list. 如申請專利範圍第1項所述之分散式儲存系統之同步刪除方法,更包含:依據該第二更新列表比較該第二原始列表,當該第二原始列表不同於該第二更新列表且需刪除該第二異動資料時,該第二主機對應刪除該第二異動資料。 For example, the synchronous deletion method of the distributed storage system described in item 1 of the scope of patent application further includes: comparing the second original list according to the second update list, and when the second original list is different from the second update list and needs When deleting the second transaction data, the second host correspondingly deletes the second transaction data. 如申請專利範圍第1項所述之分散式儲存系統之同步刪除方法,更包含:一第三主機接收廣播之該區塊鏈內容,未執行該異動資料列表之比對。For example, the synchronous deletion method of the distributed storage system described in item 1 of the scope of patent application further includes: a third host receives the broadcasted content of the blockchain without performing the comparison of the abnormal data list.
TW107145526A 2018-12-17 2018-12-17 Synchronous deletion method of distributed storage system TWI710238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107145526A TWI710238B (en) 2018-12-17 2018-12-17 Synchronous deletion method of distributed storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107145526A TWI710238B (en) 2018-12-17 2018-12-17 Synchronous deletion method of distributed storage system

Publications (2)

Publication Number Publication Date
TW202025691A TW202025691A (en) 2020-07-01
TWI710238B true TWI710238B (en) 2020-11-11

Family

ID=73005007

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107145526A TWI710238B (en) 2018-12-17 2018-12-17 Synchronous deletion method of distributed storage system

Country Status (1)

Country Link
TW (1) TWI710238B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI742868B (en) * 2020-09-30 2021-10-11 智匯融通科技股份有限公司 Distributed storage platform device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170264428A1 (en) * 2016-03-08 2017-09-14 Manifold Technology, Inc. Data storage system with blockchain technology
CN107247749A (en) * 2017-05-25 2017-10-13 阿里巴巴集团控股有限公司 A kind of database positioning determines method, consistency verification method and device
TWM565353U (en) * 2018-06-04 2018-08-11 中國信託金融控股股份有限公司 Credit management system based on distributed ledger
TW201832100A (en) * 2017-02-17 2018-09-01 香港商阿里巴巴集團服務有限公司 Block chain system, and data storage method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170264428A1 (en) * 2016-03-08 2017-09-14 Manifold Technology, Inc. Data storage system with blockchain technology
TW201832100A (en) * 2017-02-17 2018-09-01 香港商阿里巴巴集團服務有限公司 Block chain system, and data storage method and apparatus
CN107247749A (en) * 2017-05-25 2017-10-13 阿里巴巴集团控股有限公司 A kind of database positioning determines method, consistency verification method and device
TWM565353U (en) * 2018-06-04 2018-08-11 中國信託金融控股股份有限公司 Credit management system based on distributed ledger

Also Published As

Publication number Publication date
TW202025691A (en) 2020-07-01

Similar Documents

Publication Publication Date Title
Christidis et al. Blockchains and smart contracts for the internet of things
CN108846776B (en) Digital copyright protection method based on block chain technology
CN106796688B (en) Permission control method, device and system of block chain and node equipment
KR102144302B1 (en) Copyright management method and system
JP6389350B2 (en) Transaction processing apparatus, transaction processing method, and program therefor
US10079880B2 (en) Automatic identification of invalid participants in a secure synchronization system
CN109766673A (en) A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method
US8505065B2 (en) Access control policy in a weakly-coherent distributed collection
JP2018166000A (en) Hierarchical network system, and node and program used in the same
CN110537355A (en) Consensus based on secure blockchains
KR20190136245A (en) Method for managing content based on blockchain and system performing the method
JP2020521343A (en) Field Programmable Gate Array-Based Reliable Execution Environment for Use in Blockchain Networks
WO2017109140A1 (en) Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction
US10810863B2 (en) Distributed security system over multiple sites
JP7432443B2 (en) Migration support system, migration support method, and nodes
US11847099B2 (en) Synchronizing content
JP2023515369A (en) Distributed database
CN115606150A (en) Multi-layer communication network
TWI710238B (en) Synchronous deletion method of distributed storage system
Esmaili et al. A distributed blockchain-based video sharing system with copyright, integrity, and immutability
US9569461B2 (en) Distributed data authority system
KR102294569B1 (en) Block Chain Management System To Build Block Chain Network
US11416449B2 (en) Method of synchronous deletion for distributed storage system
JP2011522337A (en) Method of synchronizing software modules of computer system distributed to server cluster, application to synchronization system and data storage
KR102089853B1 (en) Block Chain System for Synchronizing Data between Heterogeneous Networks and Method for Controlling the same