WO2022150961A1 - Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage - Google Patents

Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2022150961A1
WO2022150961A1 PCT/CN2021/071245 CN2021071245W WO2022150961A1 WO 2022150961 A1 WO2022150961 A1 WO 2022150961A1 CN 2021071245 W CN2021071245 W CN 2021071245W WO 2022150961 A1 WO2022150961 A1 WO 2022150961A1
Authority
WO
WIPO (PCT)
Prior art keywords
monitoring
node
detected
storage
nodes
Prior art date
Application number
PCT/CN2021/071245
Other languages
English (en)
Chinese (zh)
Inventor
王毅
马佳玲
陈洁欣
廖竞
罗秋明
毛睿
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2021/071245 priority Critical patent/WO2022150961A1/fr
Publication of WO2022150961A1 publication Critical patent/WO2022150961A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring

Definitions

  • the present application relates to the field of blockchain technology, and in particular, to a blockchain security monitoring method, device, electronic device and storage medium.
  • blockchain storage is a trend in the future development of the storage industry.
  • how to verify the correctness of users' stored data and the reliability of storage nodes is a very important issue.
  • a data strip is usually randomly selected in the blockchain, and the blockchain nodes corresponding to the data strip are randomly monitored for security.
  • the present application provides a blockchain security monitoring method, device, electronic device and storage medium to solve the defects of the prior art such as low reliability.
  • a first aspect of the present application provides a blockchain security monitoring method, including:
  • monitoring resources are allocated for each stored data block, so as to perform security monitoring on the nodes to be detected.
  • selecting the node to be detected according to the confidence, monitoring frequency and usage of the storage node corresponding to the data stripe to be detected includes:
  • each trusted storage node with the same monitoring priority update the monitoring priority of each trusted storage node based on the descending sorting result of the usage of each trusted storage node;
  • a node to be detected is selected from the reliability storage nodes.
  • it further includes: in the storage nodes corresponding to the data stripes to be detected, screening new nodes that are newly added within a preset time;
  • a new node to be detected is selected from the new nodes
  • monitoring resources are allocated to each stored data block, so as to perform security monitoring of the new node to be detected.
  • selecting a new node to be detected from the new nodes based on the monitoring frequency and joining time of each new node including:
  • a new node to be detected is selected from the new nodes.
  • the monitoring resources are allocated to each stored data block, so that the nodes to be detected are allocated monitoring resources.
  • Security monitoring including:
  • the access frequency of the storage data block determine the data block level corresponding to the storage data block
  • monitoring resources are allocated to each storage data block, so as to perform security monitoring on the node to be detected.
  • the method before selecting the node to be detected according to the confidence, monitoring frequency and usage of the storage node corresponding to the data stripe to be detected, the method further includes:
  • the confidence of each storage node is calculated according to the historical monitoring records.
  • a second aspect of the present application provides a blockchain security monitoring device, including:
  • an acquisition module used to acquire the data strip to be detected and the total amount of preset monitoring resources
  • a determination module configured to select a node to be detected according to the confidence, monitoring frequency and usage of the storage node corresponding to the data strip to be detected;
  • the monitoring module is configured to allocate monitoring resources for each stored data block based on the preset monitoring resource allocation rules and the preset total amount of monitoring resources and according to the access frequency of the stored data blocks in the nodes to be detected, so as to ensure the security of the nodes to be detected monitor.
  • the determining module is specifically used for:
  • each trusted storage node with the same monitoring priority update the monitoring priority of each trusted storage node based on the descending sorting result of the usage of each trusted storage node;
  • a node to be detected is selected from the reliability storage nodes.
  • the determining module is further used for:
  • a new node to be detected is selected from the new nodes
  • monitoring resources are allocated to each stored data block, so as to perform security monitoring of the new node to be detected.
  • the determining module is specifically used for:
  • a new node to be detected is selected from the new nodes.
  • the monitoring module is specifically used for:
  • the access frequency of the storage data block determine the data block level corresponding to the storage data block
  • monitoring resources are allocated to each storage data block, so as to perform security monitoring on the node to be detected.
  • the determining module is further used for:
  • the confidence of each storage node is calculated according to the historical monitoring records.
  • the determining module is further used for:
  • a third aspect of the present application provides an electronic device, including: at least one processor and a memory;
  • the memory stores computer-executable instructions
  • the at least one processor executes computer-implemented instructions stored in the memory to cause the at least one processor to perform the methods described above in the first aspect and various possible designs of the first aspect.
  • a fourth aspect of the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when a processor executes the computer-executable instructions, the first aspect and the first Aspects various possible designs of the described method.
  • the blockchain security monitoring method, device, electronic device and storage medium provided by this application by obtaining the data strip to be detected and the total amount of preset monitoring resources; and usage, select the node to be detected; based on the preset monitoring resource allocation rules and the preset total amount of monitoring resources, according to the access frequency of the stored data block in the node to be detected, allocate monitoring resources for each stored data block to the node to be detected Conduct safety monitoring.
  • the nodes to be detected are selected according to the confidence, detection frequency and usage of each storage node, and monitoring resources are allocated according to the access frequency of each storage data block in the node, which balances the monitoring of each storage node.
  • the frequency of monitoring resources is reasonably allocated, which improves the reliability of security monitoring results and lays a foundation for improving the security of the blockchain storage system.
  • FIG. 1 is a schematic structural diagram of a blockchain security monitoring system based on an embodiment of the application
  • FIG. 2 is a schematic flowchart of a blockchain security monitoring method provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a blockchain security monitoring device provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • a data strip is usually randomly selected in the blockchain, and the blockchain nodes corresponding to the data strip are randomly monitored for security.
  • the security monitoring of blockchain nodes is carried out based on the existing technology, some nodes may be monitored frequently, while some nodes cannot be monitored for a long time, which is not conducive to Ensure the reliability of safety monitoring results.
  • the blockchain security monitoring method, device, electronic device and storage medium obtained the data stripe to be detected and the total amount of preset monitoring resources; according to the storage node corresponding to the data stripe to be detected Based on the preset monitoring resource allocation rules and the preset total amount of monitoring resources, according to the access frequency of the stored data blocks in the nodes to be detected, the monitoring nodes are allocated to each stored data block. resources for security monitoring of nodes to be detected.
  • the nodes to be detected are selected according to the confidence, detection frequency and usage of each storage node, and monitoring resources are allocated according to the access frequency of each storage data block in the node, which balances the monitoring of each storage node.
  • the frequency of monitoring resources is reasonably allocated, which improves the reliability of security monitoring results and lays a foundation for improving the security of the blockchain storage system.
  • the blockchain security monitoring method, device, electronic device, and storage medium provided by the embodiments of this application are suitable for security monitoring of storage nodes in a blockchain storage system.
  • FIG. 1 it is a schematic structural diagram of the blockchain security monitoring system based on the embodiment of the application, which mainly includes a blockchain storage system, a monitoring sequence construction device, and an area for performing security monitoring on the blockchain storage system.
  • Blockchain security monitoring device Specifically, a monitoring sequence construction device can be used to randomly select data strips in the blockchain storage system, and store the data strips in sequence according to the selection order to construct a monitoring sequence. Detecting data strips, determining nodes to be detected and new nodes to be detected according to the extracted data strips to be detected, and further filling the selected nodes to be detected into the monitoring sequence, and sequentially performing safety monitoring on the nodes in the monitoring sequence .
  • the embodiments of the present application provide a blockchain security monitoring method, which is used for security monitoring of storage nodes in a blockchain storage system.
  • the execution body of the embodiment of the present application is an electronic device, such as a server, a desktop computer, a notebook computer, a tablet computer, and other electronic devices that can be used for security monitoring.
  • FIG. 2 a schematic flowchart of a blockchain security monitoring method provided by an embodiment of the present application, the method includes:
  • Step 201 Acquire the data strip to be detected and the total amount of preset monitoring resources.
  • the preset total amount of monitoring resources may specifically refer to the set number of security monitoring per hour, also called the number of audits, which may be specifically set according to the actual situation, which is not limited in this embodiment of the present application.
  • Step 202 Select a node to be detected according to the confidence, monitoring frequency and usage of the storage node corresponding to the data strip to be detected.
  • the monitoring frequency refers to the number of times of being monitored, that is, the number of times of being audited within the preset security monitoring period.
  • the blockchain area storage system includes trusted storage nodes and untrusted storage nodes, which can be distinguished according to the confidence of the storage nodes.
  • security monitoring is usually only performed on trusted storage nodes. Therefore, the node to be detected can be selected among the trusted storage nodes.
  • a storage node with a lower monitoring frequency may be selected as the node to be detected.
  • the usage of each storage node can also be comprehensively considered, so as to select the nodes to be detected that most require security monitoring.
  • Step 203 Based on the preset monitoring resource allocation rule and the preset total amount of monitoring resources, and according to the access frequency of the stored data blocks in the nodes to be detected, monitoring resources are allocated to each stored data block, so as to perform security monitoring on the nodes to be detected.
  • monitoring resources may be allocated to each storage data block in proportion to allocate monitoring resources reasonably. Specifically, it refers to the number of security monitoring allocated to each storage node, that is, the number of audits allocated to each storage node.
  • the method further includes:
  • Step 301 in the storage nodes corresponding to the data stripes to be detected, filter new nodes that are newly added within a preset time;
  • Step 302 based on the monitoring frequency and joining time of each new node, select a new node to be detected from the new nodes;
  • Step 303 Based on a preset monitoring resource allocation rule and a preset total amount of monitoring resources, and according to the monitoring frequency of the stored data blocks in the new node to be detected, allocate monitoring resources to each stored data block, so as to perform security monitoring on the new node to be detected.
  • a common new node screening method may be used to screen new nodes among the multiple storage storage nodes corresponding to the data stripes to be detected.
  • the new node with the lowest monitoring frequency can be selected as the new node to be detected. If there are multiple new nodes with the lowest monitoring frequency, among these new nodes with the lowest monitoring frequency, the new node with the earliest joining time is selected. The node is a new node on the side to be detected.
  • the monitoring priority corresponding to each new node may be determined according to the ascending sorting result of the monitoring frequency corresponding to each new node; for each new node with the same monitoring priority, based on According to the order of the joining time of each new node, the monitoring priority of each new node is updated; according to the updated monitoring priority of each new node, a new node to be detected is selected from the new nodes.
  • the monitoring priority is divided for the new node. If the monitoring priority of multiple new nodes is the highest at the same time, that is, the monitoring frequency of multiple new nodes is tied for the lowest, then these new nodes are sorted again according to the joining time of each new node corresponding to the monitoring priority, that is, the The monitoring priority of each new node is updated, and finally the new node with the lowest monitoring frequency and the earliest joining time is selected as the new node to be detected.
  • selecting the node to be detected (step 202 ) according to the confidence, monitoring frequency and usage of the storage node corresponding to the data stripe to be detected may include:
  • Step 2021 according to the confidence level of the storage node, filter the trusted storage node in the storage node;
  • Step 2022 Determine the monitoring priority corresponding to each trusted storage node according to the ascending sorting result of the monitoring frequencies of the trusted storage nodes;
  • Step 2023 for each trusted storage node with the same monitoring priority, update the monitoring priority of each trusted storage node based on the descending sorting result of the usage of each trusted storage node;
  • Step 2024 according to the updated monitoring priority of each trusted storage node, select a node to be detected from the trusted storage nodes.
  • the monitoring priority is divided for the trusted storage nodes. If the monitoring priority of multiple trusted storage nodes is the highest at the same time, that is, the monitoring frequency of multiple trusted storage nodes is tied for the lowest, then according to the usage of each trusted storage node corresponding to the monitoring priority, The trusted storage nodes are sorted again, that is, the monitoring priority of each trusted storage node is updated, and finally the trusted storage node with the lowest monitoring frequency and the largest usage is selected as the node to be detected.
  • the first total amount of monitoring resources corresponding to the node to be detected may be determined based on a preset monitoring resource allocation rule and a preset total amount of monitoring resources; the storage data may be determined according to the access frequency of the stored data blocks.
  • the first total amount of monitoring resources is to allocate monitoring resources to each storage data block to perform security monitoring on nodes to be detected.
  • the data block level of the storage data block with lower access frequency may be determined as the first level
  • the data block level of the storage data block with normal access frequency may be determined as the second level
  • the data block of the storage data block with higher access frequency may be determined as the second level.
  • the block level is determined to be level three. If the number of third-level storage data blocks in the node to be detected is m, the number of second-level storage data blocks is k, and the number of first-level storage data blocks is t.
  • the number of times that each trusted storage node is audited every d days can be defined as adNumperw, and its calculation formula is:
  • adNumperw blAdNum*24*d/blNum
  • blAdNum represents the total number of audit times per hour of all trusted storage nodes, and blNum represents the number of trusted storage nodes in the data strip to be detected.
  • the total number of audit times per hour of all trusted storage nodes can be calculated according to the following formula:
  • blAdNum numperh*blNum/(blNum+newNum)
  • numperh represents the total amount of preset monitoring resources
  • newNum represents the number of new nodes in the data strip to be detected.
  • the secondary storage data block that defines the normal access frequency is allocated x 2 audit times every d days, that is, the allocated monitoring resources are x 2 :
  • the secondary storage data block with lower access frequency is defined, and the number of audits allocated every d days is x 3 , that is, the allocated monitoring resources are x 3 :
  • the allocation is carried out in units of d days.
  • the first x 1 time is to select the third-level storage data block
  • the next x 2 times are to select the second-level storage data block
  • the last x 3 times are to select the first-level storage data block.
  • the storage data block is selected according to the access frequency, and the security monitoring is performed first if the access frequency is high.
  • the second total amount of monitoring resources corresponding to the new node to be detected may be determined based on a preset monitoring resource allocation rule and a preset total amount of monitoring resources;
  • the access frequency of the data blocks determines the data block level corresponding to the storage data block; according to the data block level corresponding to each storage data block and the number of storage data blocks contained in each data block level, the resource allocation ratio of each storage data block is determined; according to The resource allocation ratio of each storage data block and the total amount of the second monitoring resources are used to allocate monitoring resources for each storage data block, so as to perform security monitoring on the new node to be detected.
  • newadNumperw the number of times each new node is audited every d days (the second total amount of monitoring resources)
  • newadNumperw the number of times each new node is audited every d days
  • newAdNum represents the total number of audit times per hour of all new nodes
  • newNum represents the number of trusted storage nodes in the data strip to be detected.
  • the total number of audits per hour for all new nodes can be calculated according to the following formula:
  • newAdNum numperh*newNum/(blNum+newNum)
  • numperh represents the total amount of preset monitoring resources
  • blNum represents the number of trusted storage nodes in the data strip to be detected.
  • the sum of the resource allocation ratios corresponding to each data block level may be 1.
  • security monitoring may be performed on the obtained storage data blocks with few monitoring resources first.
  • the second total amount of monitoring resources corresponding to the new node to be detected may be determined based on the preset monitoring resource allocation rule and the preset total amount of monitoring resources; the second total amount of monitoring resources is equally divided into Each storage data block in the new node to be detected.
  • the security monitoring sequence of each stored data block is determined, and specifically, the security monitoring may be performed on the stored data block with high access frequency first.
  • the Methods before selecting the node to be detected according to the confidence, monitoring frequency and usage of the storage node corresponding to the data stripe to be detected, the Methods also include:
  • Step 401 obtaining historical monitoring records of each storage node
  • Step 402 Calculate the confidence of each storage node based on a preset confidence calculation rule and historical monitoring records.
  • the confidence level stConflevel of the storage node can be calculated according to the following formula:
  • stConflevel the number of times the storage node has passed the audit in the last d days/the total number of audits of the storage node in the last d days.
  • the number of audits passed in the last d days and the total number of audits in the last d days can be obtained according to the historical monitoring records.
  • trusted storage node is defined as:
  • the untrusted storage node is defined as:
  • the time interval between the current node to be detected and the previous historical monitoring time is not is less than the preset time threshold; if so, abandon the current node to be detected.
  • the preset time threshold may be one hour. If it is determined that the last security monitoring time of the currently selected node to be detected is less than one hour away from the current time, in order to avoid multiple security monitoring of a certain storage node in a short period of time ( Audit), and other storage nodes do not have the opportunity for security monitoring for a long time, they will abandon the current node to be detected, and re-select a new node to be detected.
  • an embodiment of the present application provides a monitoring sequence construction device that can construct a monitoring sequence, specifically constructing a stripe sequence with a length of n, wherein the data strip is also called stripe, and the stripe sequence is taken each time.
  • the first to be audited is defined as N
  • the maximum storage stripe sequence space provided by the audit center is defined as adSpace. Since the storage space of each audit center may be different, if adSpace is set to a fixed value Obviously unreasonable, because the audit center does not only store stripe sequences, but also other contents, it is impossible to fill the storage space of the entire audit center. This method will use half of the storage space of the audit center, so it is possible to obtain The calculation formula of adSpace is:
  • N adSpace/stripe size (n ⁇ N)
  • the stripe sequence of the audit center needs to be filled.
  • the node to be detected and the new node to be detected selected in the above embodiment may be filled into the stripe sequence.
  • the filling method is: when the user saves the file, a random stripe of a segment is randomly selected and added to the stripe queue.
  • the random method of the segment is:
  • stripe number (current unix timestamp) mod (the number of stripes divided by the segment)
  • the data to be stored by the user will first be divided into segments (segments) of the same size, and then each segment is encrypted and divided into smaller data stripes (stripes), and each stripe is passed through Erasure After Encoding, it is divided into several data blocks (share) and stored in different storage nodes. And in the process of splitting, a segment number is allocated to each segment, and a stripe number is allocated to each stripe.
  • the above random selection method is only an exemplary random selection method, and other random selection methods may also be adopted, which are not limited in the embodiments of the present application.
  • fill the selected stripe into the stripe sequence and the number of fillings shall not exceed N.
  • a new filling strategy is adopted. Specifically, the above embodiment can be used. The selected nodes to be detected, new nodes to be detected and storage data blocks are filled into the stripe sequence.
  • the blockchain security monitoring method obtains the data strip to be detected and the total amount of preset monitoring resources; Detecting nodes; based on the preset monitoring resource allocation rules and the preset total amount of monitoring resources, and according to the access frequency of the stored data blocks in the nodes to be detected, allocating monitoring resources to each stored data block, so as to perform security monitoring on the nodes to be detected.
  • the nodes to be detected are selected according to the confidence, detection frequency and usage of each storage node, and monitoring resources are allocated according to the access frequency of each storage data block in the node, which balances the monitoring of each storage node.
  • the frequency of monitoring resources is reasonably allocated, which improves the reliability of security monitoring results and lays a foundation for improving the security of the blockchain storage system.
  • the security monitoring can also be performed on the newly added new node, which further improves the reliability of the obtained security monitoring result.
  • the trusted storage node can be audited first, and the new node can be audited later, so that the data stored by the user can be verified as soon as possible, and at the same time, the new node can be audited.
  • the embodiments of the present application provide a blockchain security monitoring device, which is used to execute the blockchain security monitoring method provided by the above embodiments.
  • the blockchain security monitoring device 30 includes an acquisition module 301 , a determination module 302 and a monitoring module 303 .
  • the acquisition module is used to acquire the data strip to be detected and the total amount of preset monitoring resources; the determination module is used to select the node to be detected according to the confidence, monitoring frequency and usage of the storage node corresponding to the data strip to be detected The monitoring module is used to allocate monitoring resources for each stored data block based on the preset monitoring resource allocation rules and the preset total amount of monitoring resources and according to the access frequency of the stored data blocks in the nodes to be detected, so as to monitor the security of the nodes to be detected. .
  • the determining module is specifically used for:
  • each trusted storage node with the same monitoring priority update the monitoring priority of each trusted storage node based on the descending sorting result of the usage of each trusted storage node;
  • a node to be detected is selected from the trusted storage nodes.
  • the determining module is further configured to:
  • a new node to be detected is selected from the new nodes
  • monitoring resources are allocated to each stored data block, so as to perform security monitoring on the new node to be detected.
  • the determining module is specifically used for:
  • a new node to be detected is selected from the new nodes.
  • the monitoring module is specifically used for:
  • the access frequency of the storage data block determine the data block level corresponding to the storage data block
  • monitoring resources are allocated to each storage data block, so as to perform security monitoring on the node to be detected.
  • the determining module is further configured to:
  • the confidence of each storage node is calculated.
  • the determining module is further configured to:
  • the blockchain security monitoring device provided by the embodiment of the present application is used to execute the blockchain security monitoring method provided by the above-mentioned embodiment, and the implementation method and principle are the same, and are not repeated here.
  • the embodiment of the present application provides an electronic device for executing the blockchain security monitoring method provided by the above embodiment.
  • the electronic device 40 includes: at least one processor 41 and a memory 42;
  • the memory stores computer-executable instructions; at least one processor executes the computer-executable instructions stored in the memory, so that the at least one processor executes the blockchain security monitoring method provided in the above embodiment.
  • An electronic device provided by an embodiment of the present application is used to execute the blockchain security monitoring method provided by the above-mentioned embodiment, and its implementation manner is the same as the principle, which will not be repeated.
  • Embodiments of the present application provide a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the processor executes the computer-executable instructions, the blockchain security monitoring method provided in any of the above embodiments is implemented.
  • the storage medium containing the computer-executable instructions of the embodiments of the present application can be used to store the computer-executable instructions of the blockchain security monitoring method provided in the foregoing embodiments.

Abstract

La présente invention concerne un procédé et un appareil de surveillance de sécurité de chaîne de blocs, un dispositif électronique et un support de stockage. Le procédé comprend les étapes consistant à obtenir une bande de données à détecter et une quantité totale prédéfinie de ressources de surveillance (201) ; à sélectionner, en fonction du niveau de confiance, de la fréquence de surveillance et de la quantité d'utilisation d'un nœud de stockage correspondant à ladite bande de données, un nœud à détecter (202) ; et à attribuer, sur la base d'une règle d'attribution de ressource de surveillance prédéfinie et de la quantité totale prédéfinie de ressources de surveillance, une ressource de surveillance pour chaque bloc de données de stockage en fonction des fréquences d'accès des blocs de données de stockage dans le nœud à détecter, de manière à effectuer une surveillance de sécurité sur ledit nœud Dans le procédé, grâce à la sélection, en fonction du niveau de confiance, de la fréquence de surveillance et de la quantité d'utilisation de chaque nœud de stockage, du nœud à détecter, et, en outre, à l'attribution des ressources de surveillance en fonction de la fréquence d'accès de chaque bloc de données de stockage dans le nœud, la fréquence de surveillance de chaque nœud de stockage est équilibrée, et les ressources de surveillance sont raisonnablement attribuées, ce qui permet d'améliorer la fiabilité d'un résultat de surveillance de sécurité, et de poser une fondation pour améliorer la sécurité d'un système de stockage à chaîne de blocs.
PCT/CN2021/071245 2021-01-12 2021-01-12 Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage WO2022150961A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/071245 WO2022150961A1 (fr) 2021-01-12 2021-01-12 Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/071245 WO2022150961A1 (fr) 2021-01-12 2021-01-12 Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage

Publications (1)

Publication Number Publication Date
WO2022150961A1 true WO2022150961A1 (fr) 2022-07-21

Family

ID=82446373

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/071245 WO2022150961A1 (fr) 2021-01-12 2021-01-12 Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage

Country Status (1)

Country Link
WO (1) WO2022150961A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235806A (zh) * 2017-12-28 2018-06-29 深圳达闼科技控股有限公司 安全访问区块链的方法、装置、系统、存储介质及电子设备
CN109033859A (zh) * 2018-08-03 2018-12-18 苏州市千尺浪信息科技服务有限公司 一种基于区块链技术的信息安全存储系统
CN109284624A (zh) * 2018-09-03 2019-01-29 佛山科学技术学院 一种基于区块链存储的数据安全隔离方法及装置
US20200195448A1 (en) * 2019-06-03 2020-06-18 Alibaba Group Holding Limited Blockchain ledger authentication
CN111355705A (zh) * 2020-02-08 2020-06-30 西安电子科技大学 一种基于区块链的数据审计与安全去重云存储系统、方法
CN112001730A (zh) * 2020-08-25 2020-11-27 徐鹏飞 基于区块链和数字货币的数据安全检测方法及云计算中心

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235806A (zh) * 2017-12-28 2018-06-29 深圳达闼科技控股有限公司 安全访问区块链的方法、装置、系统、存储介质及电子设备
CN109033859A (zh) * 2018-08-03 2018-12-18 苏州市千尺浪信息科技服务有限公司 一种基于区块链技术的信息安全存储系统
CN109284624A (zh) * 2018-09-03 2019-01-29 佛山科学技术学院 一种基于区块链存储的数据安全隔离方法及装置
US20200195448A1 (en) * 2019-06-03 2020-06-18 Alibaba Group Holding Limited Blockchain ledger authentication
CN111355705A (zh) * 2020-02-08 2020-06-30 西安电子科技大学 一种基于区块链的数据审计与安全去重云存储系统、方法
CN112001730A (zh) * 2020-08-25 2020-11-27 徐鹏飞 基于区块链和数字货币的数据安全检测方法及云计算中心

Similar Documents

Publication Publication Date Title
US8751657B2 (en) Multi-client storage system and storage system management method
US10230601B1 (en) Systems and methods for integrated modeling and performance measurements of monitored virtual desktop infrastructure systems
US20180121909A1 (en) System and method to dynamically setup a private sub-blockchain based on agility of transaction processing
WO2018014566A1 (fr) Procédé et appareil d'équilibrage de charge, support de stockage lisible par ordinateur et système associé
JP6881575B2 (ja) 資源割当システム、管理装置、方法およびプログラム
KR102290540B1 (ko) 네임스페이스/스트림 관리
CN106469018B (zh) 分布式存储系统的负载监控方法及设备
US8682850B2 (en) Method of enhancing de-duplication impact by preferential selection of master copy to be retained
US20180225147A1 (en) Resource allocation method and apparatus
WO2022134471A1 (fr) Procédé et appareil de gestion de nœud de chaîne de blocs, dispositif informatique et support d'enregistrement
US9063668B1 (en) Distributed memory allocation in multi-threaded programs
JP5324914B2 (ja) ストレージリソースを割り振る方法および装置
WO2014046885A2 (fr) Identification de simultanéité pour le traitement de workflows à phases multiples
CN104320271B (zh) 一种网络设备安全评估方法及装置
CN110134338A (zh) 一种分布式存储系统及其数据冗余保护方法和相关设备
Goel et al. Approximate majorization and fair online load balancing
WO2022150961A1 (fr) Procédé et appareil de surveillance de sécurité de chaîne de blocs, dispositif électronique et support de stockage
CN114154166A (zh) 异常数据识别方法、装置、设备和存储介质
CN117076127A (zh) 一种算力调度的处理方法、装置及介质
US10846143B2 (en) Predicting capacity of shared virtual machine resources
CN112783722B (zh) 一种区块链安全监测方法、装置、电子设备及存储介质
CN109960565B (zh) 云平台、基于云平台的虚拟机调度方法及装置
CN104850658B (zh) 一种数据填充方法及系统
TW201439916A (zh) 虛擬系統之系統資源管理方法
CN113518086A (zh) 网络攻击预测的方法、装置及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21918179

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30.10.2023)