CN111338841A - Data processing method, device, equipment and storage medium - Google Patents
Data processing method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN111338841A CN111338841A CN201811556284.7A CN201811556284A CN111338841A CN 111338841 A CN111338841 A CN 111338841A CN 201811556284 A CN201811556284 A CN 201811556284A CN 111338841 A CN111338841 A CN 111338841A
- Authority
- CN
- China
- Prior art keywords
- data
- fragment
- blockchain
- backup
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 33
- 239000012634 fragment Substances 0.000 claims abstract description 462
- 238000012545 processing Methods 0.000 claims abstract description 130
- 238000013467 fragmentation Methods 0.000 claims abstract description 61
- 238000006062 fragmentation reaction Methods 0.000 claims abstract description 61
- 238000000034 method Methods 0.000 claims abstract description 56
- 238000012795 verification Methods 0.000 claims description 117
- 238000004422 calculation algorithm Methods 0.000 claims description 36
- 238000012544 monitoring process Methods 0.000 claims description 23
- 238000004590 computer program Methods 0.000 claims description 22
- 238000013500 data storage Methods 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 18
- 230000000694 effects Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 235000019800 disodium phosphate Nutrition 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 101000849522 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) 40S ribosomal protein S13 Proteins 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a data processing method, a device, equipment and a storage medium, wherein the method comprises the following steps: acquiring data to be processed and a data processing request, wherein the data processing request comprises a fragment number; performing data fragmentation processing on data to be processed according to the fragmentation number to obtain N pieces of fragmentation data, wherein the value of N is equal to the fragmentation number; and sending the N pieces of fragment data to the blockchain device, so that at least two data backup devices listen to the blockchain device to obtain the N pieces of fragment data in the blockchain device, wherein each data backup device is used for storing M pieces of fragment data in the N pieces of fragment data, and M is smaller than N. Storing the plurality of fragmented data into a plurality of data backup devices separately; further, the illegal equipment cannot acquire complete data of the data, and the data is prevented from being leaked or tampered; and, ensure that a single data backup device cannot steal the complete data content. The data storage security is guaranteed, and data are prevented from being stolen, leaked and tampered.
Description
Technical Field
The present application relates to data storage technologies, and in particular, to a data processing method, apparatus, device, and storage medium.
Background
As science and technology develops, more and more data needs to be stored and backed up. Data may be stored in various types of devices.
In the prior art, when data is stored, a local storage mode can be adopted; or, storing the data in the storage hardware, for example, storing the data in a mobile hard disk or a U disk; alternatively, the data is stored in a third party device, for example, by means of a mailbox or other online storage service.
However, in the prior art, data is stored locally or stored in storage hardware, which causes the problems of data theft and leakage; storing data in a third party device may also cause problems with data being tampered and leaked by the third party device. Therefore, data storage in the prior art is not safe, and the risk of data theft, leakage and tampering is high.
Disclosure of Invention
The application provides a data processing method, a data processing device, data processing equipment and a data processing storage medium, which are used for solving the problems that data storage is not safe, and the risk of data stealing, leakage and tampering is high.
In a first aspect, the present application provides a data processing method, including:
acquiring data to be processed and a data processing request, wherein the data processing request comprises a fragment number;
performing data fragmentation processing on the data to be processed according to the fragmentation number to obtain N fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1;
and sending the N pieces of fragment data to a blockchain device provided with an intelligent contract, so that at least two data backup devices monitor the blockchain device to obtain the N pieces of fragment data in the blockchain device, wherein each data backup device is used for storing M pieces of fragment data in the N pieces of fragment data, M is a positive integer greater than 1, and M is smaller than N.
Further, the data backup devices correspond to the fragment data one to one, and each data backup device is specifically configured to store the fragment data corresponding to the data backup device one to one.
Further, before sending the N pieces of sliced data to the blockchain device provided with the intelligent contract, the method further includes:
acquiring equipment information of each data backup equipment from blockchain equipment provided with intelligent contracts;
determining equipment information corresponding to each piece of fragment data according to a corresponding relation between preset piece of fragment data and the equipment information;
and determining the data backup equipment corresponding to each piece of fragment data according to the equipment information corresponding to each piece of fragment data.
Further, sending the N pieces of fragmented data to a blockchain device provided with an intelligent contract, so that at least two data backup devices monitor the blockchain device to obtain the N pieces of fragmented data in the blockchain device, including:
sending a data backup request to the blockchain device, so that each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device after acquiring the data backup request in the blockchain device, wherein the data backup key pair includes a data backup encryption key, and the data backup encryption key is used for encrypting the fragmented data corresponding to the data backup device;
monitoring and acquiring a data backup encryption key corresponding to each data backup device in the block chain device;
encrypting the fragment data corresponding to each data backup device by using a data backup encryption key corresponding to each data backup device to obtain encrypted fragment data corresponding to each data backup device;
and sending the encrypted fragment data corresponding to each data backup device to the blockchain device, so that each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted fragment data corresponding to the data backup device.
Further, the data backup key pair further includes a data backup decryption key, and the data backup decryption key is used for decrypting fragmented data corresponding to the data backup device; before sending the encrypted fragment data corresponding to each data backup device to the blockchain device, the method further includes:
calculating the fragmented data corresponding to the data backup device by adopting a Hash algorithm to obtain a first fingerprint of the fragmented data corresponding to the data backup device;
sending the encrypted fragment data corresponding to each data backup device to the blockchain device, so that each data backup device obtains the encrypted fragment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted fragment data corresponding to the data backup device, including:
and sending the encrypted fragment data corresponding to each data backup device and the first fingerprint of the fragment data corresponding to the data backup device to the blockchain device, so that after each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device and the first fingerprint of the fragment data corresponding to the data backup device, the encrypted fragment data corresponding to the data backup device is decrypted according to the data backup decryption key, and the decrypted fragment data is verified according to the first fingerprint and then stored.
Further, before sending the N pieces of sliced data to the blockchain device provided with the intelligent contract, the method further includes:
calculating each piece of sliced data by adopting a Hash algorithm to obtain a data address identifier and a verification password of each piece of sliced data, wherein the data address identifier is used for identifying the piece of sliced data, and the verification password is used for verifying the piece of sliced data;
each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data.
Further, after sending the N pieces of sliced data to a blockchain device provided with an intelligent contract, the method further includes:
acquiring a data retrieval request, wherein the data retrieval request is used for requesting to retrieve one piece of sliced data;
determining data backup equipment corresponding to the fragmented data according to a corresponding relation between pre-stored fragmented data and the data backup equipment;
sending the data retrieval request to the blockchain device, so that a data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sends the stored fragmented data to the blockchain device;
monitoring and acquiring fragment data in the block chain equipment;
and merging the acquired fragment data corresponding to each data backup device to obtain merged data.
Further, the monitoring and acquiring the fragmentation data in the blockchain device includes:
generating a first data retrieval key pair, wherein the first data retrieval key pair comprises a first data retrieval encryption key and a first data retrieval decryption key;
sending the first data retrieval encryption key to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the first data retrieval encryption key in the blockchain device, encrypts the stored fragmented data by using the first data retrieval encryption key to obtain encrypted fragmented data, and sends the encrypted fragmented data to the blockchain device for storage;
monitoring and acquiring encrypted fragment data in the block chain equipment;
and decrypting the encrypted fragment data by using the first data retrieval decryption key to obtain decrypted fragment data.
Further, if the data retrieval request includes an authentication password, before the monitoring and acquiring the encrypted fragment data in the blockchain device, the method further includes:
monitoring and acquiring a second data retrieval key pair in the blockchain device, wherein the second data retrieval key pair is generated for a data backup device corresponding to the fragmented data, and the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key;
the second data is used for retrieving an encryption key to encrypt the verification password to obtain an encrypted verification password;
and sending the encrypted verification password to the blockchain equipment, so that the data backup equipment corresponding to the fragmented data obtains the encrypted verification password in the blockchain equipment, retrieves a decryption key according to the second data to decrypt the encrypted verification password to obtain a decrypted verification password, and determines that the decrypted verification password is consistent with a prestored verification password.
Further, after decrypting the encrypted fragment data by using the first data retrieval decryption key to obtain decrypted fragment data, the method further includes:
acquiring a first fingerprint of the sliced data in the blockchain equipment;
calculating the decrypted fragment data by adopting a Hash algorithm to obtain a second fingerprint of the fragment data;
and if the first fingerprint is consistent with the second fingerprint, determining to store the decrypted fragment data.
Further, the data processing request further includes: and the data name of the data to be processed.
In a second aspect, the present application provides a data processing method, including:
acquiring M fragment data of N fragment data in block chain equipment provided with an intelligent contract, wherein the N fragment data are sent to the block chain equipment by a terminal, and are obtained after the terminal performs data fragment processing on data to be processed according to the acquired fragment number, M is a positive integer greater than 1, N is a positive integer greater than 1, M is smaller than N, and the value of N is equal to the fragment number;
and storing the M pieces of sliced data.
Further, storing the M pieces of sliced data includes:
generating a data backup key pair, wherein the data backup key pair comprises a data backup encryption key used for encrypting the fragmented data corresponding to the data backup device;
storing the data backup key pair sent to the block chain equipment provided with the intelligent contract, so that after the terminal monitors and acquires the data backup encryption key corresponding to the data backup equipment, the data backup encryption key is adopted to encrypt the fragment data corresponding to the data backup equipment, and the encrypted fragment data corresponding to the data backup equipment is obtained;
acquiring encrypted fragment data corresponding to data backup equipment in the blockchain equipment, wherein the encrypted fragment data is sent to the blockchain equipment by the terminal;
and storing the encrypted fragment data corresponding to the data backup device.
Further, the data backup key pair further includes a data backup decryption key, and the data backup decryption key is used for decrypting fragmented data corresponding to the data backup device; storing the encrypted fragment data corresponding to the data backup device, including:
acquiring encrypted fragment data corresponding to data backup equipment in the blockchain equipment and a first fingerprint of the fragment data corresponding to the data backup equipment, wherein the first fingerprint of the fragment data is sent to the blockchain equipment by the terminal;
decrypting the encrypted fragment data corresponding to the data backup equipment by using the data backup decryption key to obtain decrypted fragment data;
calculating the decrypted fragment data corresponding to the data backup device by adopting a Hash algorithm to obtain a third fingerprint of the fragment data;
and if the first fingerprint is consistent with the third fingerprint, storing the decrypted fragmented data corresponding to the data backup device.
Further, each piece of fragment data comprises data content of the piece of fragment data, a data address identifier of the piece of fragment data and a verification password of the piece of fragment data;
the data address identifier is used for identifying the fragment data, and the authentication password is used for authenticating the fragment data.
Further, after storing the M pieces of sliced data, the method further includes:
receiving a data retrieval request sent by the terminal device, wherein the data retrieval request is used for requesting to retrieve one piece of fragmented data;
and storing the fragment data into the blockchain device so that the terminal can acquire the fragment data in the blockchain device, and merging the acquired fragment data corresponding to each data backup device to obtain merged data.
Further, storing the fragment data in the blockchain device, so that the terminal obtains the fragment data in the blockchain device, includes:
obtaining a first data retrieval encryption key in the blockchain device, wherein the first data retrieval encryption key is sent to the blockchain device by the terminal, the first data retrieval encryption key is an encryption key in a first data retrieval key pair generated by the terminal, and the first data retrieval key pair further includes a first data retrieval decryption key;
encrypting the fragment data by using the first data retrieval encryption key to obtain encrypted fragment data;
and sending the encrypted fragment data to block chain equipment for storage, so that the terminal monitors and acquires the encrypted fragment data in the block chain equipment, and decrypting the encrypted fragment data by using the first data retrieval decryption key.
Further, if the data retrieval request includes an authentication password, the sending the encrypted fragment data to the blockchain device for storage includes:
generating a second data retrieval key pair, wherein the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key;
sending the second data retrieval key pair to the block chain equipment, so that the terminal monitors and acquires the second data retrieval key pair in the block chain equipment, encrypts the verification password by using the second data retrieval encryption key to obtain an encrypted verification password, and sends the encrypted verification password to the block chain equipment;
acquiring the encrypted verification password in the blockchain equipment;
decrypting the encrypted verification password by using the second data retrieval decryption key to obtain a decrypted verification password;
and if the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragment data to the blockchain equipment for storage.
In a third aspect, the present application provides a data processing apparatus, comprising:
the device comprises a first acquisition unit, a second acquisition unit and a processing unit, wherein the first acquisition unit is used for acquiring data to be processed and a data processing request, and the data processing request comprises a fragment number;
the fragmentation unit is used for carrying out data fragmentation processing on the data to be processed according to the fragmentation number to obtain N fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1;
a first sending unit, configured to send the N pieces of fragmented data to a blockchain device provided with an intelligent contract, so that at least two data backup devices monitor the blockchain device to obtain the N pieces of fragmented data in the blockchain device, where each data backup device is configured to store M pieces of fragmented data in the N pieces of fragmented data, M is a positive integer greater than 1, and M is smaller than N.
Further, the data backup devices correspond to the fragment data one to one, and each data backup device is specifically configured to store the fragment data corresponding to the data backup device one to one.
Further, the apparatus further comprises:
a second obtaining unit, configured to obtain device information of each data backup device from the blockchain device provided with the intelligent contract before the first sending unit sends the N pieces of sliced data to the blockchain device provided with the intelligent contract;
the device comprises a first determining unit, a second determining unit and a judging unit, wherein the first determining unit is used for determining the device information corresponding to each piece of fragment data according to the corresponding relation between the preset piece of fragment data and the device information;
and the second determining unit is used for determining the data backup device corresponding to each piece of the fragmented data according to the device information corresponding to each piece of the fragmented data.
Further, the first sending unit includes:
the first sending subunit sends a data backup request to the blockchain device, so that each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device after acquiring the data backup request in the blockchain device, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used for encrypting the sliced data corresponding to the data backup device;
the first obtaining subunit is configured to monitor and obtain a data backup encryption key corresponding to each data backup device in the block chain device;
the first encryption subunit is configured to encrypt the fragmented data corresponding to each data backup device by using a data backup encryption key corresponding to each data backup device, so as to obtain encrypted fragmented data corresponding to each data backup device;
and the second sending subunit is configured to send the encrypted fragment data corresponding to each data backup device to the blockchain device, so that each data backup device obtains the encrypted fragment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted fragment data corresponding to the data backup device.
Further, the data backup key pair further includes a data backup decryption key, and the data backup decryption key is used for decrypting fragmented data corresponding to the data backup device; the first sending unit further includes:
the first calculating subunit is configured to calculate, by using a hash algorithm, the fragmented data corresponding to the data backup device before the encrypted fragmented data corresponding to each data backup device is sent to the blockchain device by the second sending subunit, so as to obtain a first fingerprint of the fragmented data corresponding to the data backup device;
the second sending subunit is specifically configured to:
and sending the encrypted fragment data corresponding to each data backup device and the first fingerprint of the fragment data corresponding to the data backup device to the blockchain device, so that after each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device and the first fingerprint of the fragment data corresponding to the data backup device, the encrypted fragment data corresponding to the data backup device is decrypted according to the data backup decryption key, and the decrypted fragment data is verified according to the first fingerprint and then stored.
Further, the apparatus further comprises:
a calculating unit, configured to calculate each piece of sliced data by using a hash algorithm before the first sending unit sends the N pieces of sliced data to a blockchain device provided with an intelligent contract, to obtain a data address identifier and a verification password of each piece of sliced data, where the data address identifier is used to identify the piece of sliced data, and the verification password is used to verify the piece of sliced data;
each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data.
Further, the apparatus further comprises:
a third obtaining unit, configured to obtain a data retrieval request after the first sending unit sends the N pieces of sliced data to a blockchain device provided with an intelligent contract, where the data retrieval request is used to request to retrieve one piece of sliced data;
a third determining unit, configured to determine, according to a correspondence between pre-stored fragmented data and data backup devices, data backup devices corresponding to the fragmented data;
a second sending unit, configured to send the data retrieval request to the blockchain device, so that a data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sends the stored fragmented data to the blockchain device;
a fourth obtaining unit, configured to monitor and obtain fragmented data in the block chain device;
and the merging unit is used for merging the acquired fragment data corresponding to each data backup device to obtain merged data.
Further, the fourth obtaining unit includes:
a generation subunit configured to generate a first data retrieval key pair, wherein the first data retrieval key pair comprises a first data retrieval encryption key and a first data retrieval decryption key;
a third sending subunit, configured to send the first data retrieval encryption key to the blockchain device, so that a data backup device corresponding to the fragmented data obtains the first data retrieval encryption key in the blockchain device, encrypts the stored fragmented data with the first data retrieval encryption key to obtain encrypted fragmented data, and sends the encrypted fragmented data to the blockchain device for storage;
the second acquiring subunit is configured to monitor and acquire the encrypted fragment data in the block chain device;
and the decryption subunit is configured to decrypt the encrypted fragment data by using the first data retrieval decryption key to obtain decrypted fragment data.
Further, the data retrieval request includes an authentication password, and the fourth obtaining unit further includes:
a third obtaining subunit, configured to monitor and obtain a second data retrieval key pair in the blockchain device before the second obtaining subunit monitors and obtains the encrypted sliced data in the blockchain device, where the second data retrieval key pair is generated for the data backup device corresponding to the sliced data, and the second data retrieval key pair includes a second data retrieval encryption key and a second data retrieval decryption key;
the second encryption subunit is configured to encrypt the verification password by using the second data retrieval encryption key to obtain an encrypted verification password;
and the fourth sending subunit is configured to send the encrypted verification password to the blockchain device, so that the data backup device corresponding to the segment data obtains the encrypted verification password in the blockchain device, retrieves the decryption key according to the second data to decrypt the encrypted verification password, so as to obtain a decrypted verification password, and determines that the decrypted verification password is consistent with a pre-stored verification password.
Further, the fourth obtaining unit further includes:
a fourth obtaining subunit, configured to obtain a first fingerprint of the fragmented data in the block chain device after the decrypting subunit decrypts the encrypted fragmented data by using the first data retrieval decryption key to obtain decrypted fragmented data;
the second calculating subunit is configured to calculate the decrypted fragment data by using a hash algorithm to obtain a second fingerprint of the fragment data;
and the storage subunit is configured to determine to store the decrypted fragment data if it is determined that the first fingerprint and the second fingerprint are consistent.
Further, the data processing request further includes: and the data name of the data to be processed.
In a fourth aspect, the present application provides a data processing apparatus comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring M fragment data in N fragment data in block chain equipment provided with an intelligent contract, the N fragment data is sent to the block chain equipment by a terminal, the N fragment data is obtained after the terminal performs data fragment processing on data to be processed according to the acquired fragment number, M is a positive integer larger than 1, N is a positive integer larger than 1, M is smaller than N, and the value of N is equal to the fragment number;
and the storage unit is used for storing the M pieces of sliced data.
Further, the storage unit includes:
the generation subunit is configured to generate a data backup key pair, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used to encrypt fragmented data corresponding to the data backup device;
the first sending subunit is configured to store the data backup key pair sent to the block chain device provided with the intelligent contract, so that after the terminal monitors and obtains a data backup encryption key corresponding to the data backup device, the terminal encrypts the fragment data corresponding to the data backup device by using the data backup encryption key to obtain encrypted fragment data corresponding to the data backup device;
a first obtaining subunit, configured to obtain encrypted segment data corresponding to a data backup device in the blockchain device, where the encrypted segment data is sent to the blockchain device by the terminal;
and the storage subunit is used for storing the encrypted fragment data corresponding to the data backup device.
Further, the data backup key pair further includes a data backup decryption key, and the data backup decryption key is used for decrypting fragmented data corresponding to the data backup device; the storage subunit includes:
the receiving module is used for acquiring encrypted fragment data corresponding to data backup equipment in the blockchain equipment and first fingerprints of fragment data corresponding to the data backup equipment, wherein the first fingerprints of the fragment data are sent to the blockchain equipment by the terminal;
the decryption module is used for decrypting the encrypted fragment data corresponding to the data backup device by using the data backup decryption key to obtain decrypted fragment data;
the computing module is used for computing the decrypted fragment data corresponding to the data backup device by adopting a Hash algorithm to obtain a third fingerprint of the fragment data;
and the storage module is used for storing the decrypted fragmented data corresponding to the data backup device if the first fingerprint is determined to be consistent with the third fingerprint.
Further, each piece of fragment data comprises data content of the piece of fragment data, a data address identifier of the piece of fragment data and a verification password of the piece of fragment data;
the data address identifier is used for identifying the fragment data, and the authentication password is used for authenticating the fragment data.
Further, the apparatus further comprises:
a second receiving unit, configured to receive a data retrieval request sent by the terminal device after the storage unit stores the M fragmented data, where the data retrieval request is used to request to retrieve one fragmented data;
and the sending unit is used for storing the fragment data into the blockchain device so that the terminal can acquire the fragment data in the blockchain device and merge the acquired fragment data corresponding to each data backup device to obtain merged data.
Further, the sending unit includes:
a second obtaining subunit, configured to obtain a first data retrieval encryption key in the blockchain device, where the first data retrieval encryption key is sent by the terminal to the blockchain device, the first data retrieval encryption key is an encryption key in a first data retrieval key pair generated by the terminal, and the first data retrieval key pair further includes a first data retrieval decryption key;
the encryption subunit is configured to encrypt the fragmented data by using the first data retrieval encryption key to obtain encrypted fragmented data;
and the second sending subunit is configured to send the encrypted fragment data to the blockchain device for storage, so that the terminal monitors and obtains the encrypted fragment data in the blockchain device, and decrypts the encrypted fragment data by using the first data retrieval decryption key.
Further, if the data retrieving request includes an authentication password, the sending subunit is specifically configured to:
generating a second data retrieval key pair, wherein the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key;
sending the second data retrieval key pair to the block chain equipment, so that the terminal monitors and acquires the second data retrieval key pair in the block chain equipment, encrypts the verification password by using the second data retrieval encryption key to obtain an encrypted verification password, and sends the encrypted verification password to the block chain equipment;
acquiring the encrypted verification password in the blockchain equipment;
decrypting the encrypted verification password by using the second data retrieval decryption key to obtain a decrypted verification password;
and if the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragment data to the blockchain equipment for storage.
In a fifth aspect, the present application provides a data processing apparatus comprising means or units (means) for performing the steps of any of the methods of the first aspect above.
In a sixth aspect, the present application provides a data processing apparatus comprising a processor, a memory and a computer program, wherein the computer program is stored in the memory and configured to be executed by the processor to implement any of the methods of the first aspect.
In a seventh aspect, the present application provides a data processing apparatus comprising at least one processing element or chip arranged to perform any of the methods of the first aspect above.
In an eighth aspect, the present application provides a computer program for performing any of the methods of the first aspect above when executed by a processor.
In a ninth aspect, the present application provides a computer readable storage medium having stored thereon the computer program of the eighth aspect.
In a tenth aspect, the present application provides a data processing apparatus comprising means or units for performing the steps of any of the methods of the second aspect above.
In an eleventh aspect, the present application provides a data processing apparatus comprising a processor, a memory, and a computer program, wherein the computer program is stored in the memory and configured to be executed by the processor to implement any of the methods of the second aspect.
In a twelfth aspect, the present application provides a data processing device comprising at least one processing element or chip for performing any of the methods of the second aspect above.
In a thirteenth aspect, the present application provides a computer program for performing any of the methods of the second aspect above when executed by a processor.
In a fourteenth aspect, the present application provides a computer readable storage medium having stored thereon the computer program of the thirteenth aspect.
According to the data processing method, the data processing device, the data processing equipment and the storage medium, data to be processed and a data processing request are obtained, wherein the data processing request comprises a fragment number; performing data fragmentation processing on data to be processed according to the fragmentation number to obtain N pieces of fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1; and sending the N pieces of fragment data to a block chain device provided with an intelligent contract, so that at least two data backup devices monitor the block chain device to obtain the N pieces of fragment data in the block chain device, wherein each data backup device is used for storing M pieces of fragment data in the N pieces of fragment data, M is a positive integer greater than 1, and M is smaller than N. The data are fragmented to obtain a plurality of fragmented data, and then the fragmented data are stored in a plurality of data backup devices separately; further, the illegal equipment cannot acquire complete data of the data, and the data is prevented from being leaked or tampered; and, ensure that a single data backup device cannot steal the complete data content. The data storage security is guaranteed, and data are prevented from being stolen, leaked and tampered.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flowchart of a data processing method according to an embodiment of the present application;
fig. 2 is an interaction diagram of a data processing method according to an embodiment of the present application;
fig. 3 is an interaction diagram of another data processing method provided in an embodiment of the present application;
fig. 4 is a schematic flowchart of another data processing method provided in the embodiment of the present application;
fig. 5 is a signaling diagram of another data processing method according to an embodiment of the present application;
fig. 6 is a schematic flowchart of another data processing method according to an embodiment of the present application;
fig. 7 is a schematic flowchart of another data processing method according to an embodiment of the present application;
fig. 8 is a schematic flowchart of another data processing method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
FIG. 10 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The application has the specific application scenarios that: the manner of data storage provides the following. In the first way, data is stored in the local device, for example, the data may be encrypted and then stored in the local device; however, in the local storage mode, once the local device fails, the data stored in the local device is lost; moreover, although the local encryption storage mode can reduce the risk of data theft to some extent, the local encryption storage mode also faces the risk of loss due to local equipment failure; in addition, in the local encryption storage mode, the encrypted key may be lost or stolen. In the second mode, special storage hardware is adopted to store data, for example, a U shield and a mobile hard disk are adopted to store data; but once a storage hardware failure occurs, the data in the storage hardware is also lost. In the third mode, third-party equipment is entrusted to store data, such as common data stored by means of a mailbox, an online storage service and the like; (ii) a However, if a third-party device is attacked or internally monitored and stolen, the data loss or tampering problem also occurs.
The application provides a data processing method, a data processing device, a data processing apparatus and a storage medium, which aim to solve the above technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a data processing method according to an embodiment of the present application. As shown in fig. 1, the method includes:
In this embodiment, specifically, an execution subject of this embodiment is a terminal, or other device or apparatus that can execute this embodiment. The present embodiment is described with an execution body as a terminal. Application software can be set in the terminal and controlled to execute the method provided by the embodiment.
And the user inputs the fragment number into the terminal, and then the terminal generates a data processing request carrying the fragment number. The terminal obtains the data to be processed, for example, the user inputs the data to be processed into the terminal, or the terminal obtains the data to be processed from the network.
And 102, performing data fragmentation processing on data to be processed according to the fragmentation number to obtain N fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1.
In this embodiment, specifically, the number of the shards is N, and the terminal performs data sharding processing on the data to be processed to obtain N sharded data. For example, the terminal performs fragmentation processing on the data to obtain 5 pieces of fragmented data.
103, sending the N pieces of fragmented data to a blockchain device provided with an intelligent contract, so that at least two data backup devices listen to the blockchain device to obtain N pieces of fragmented data in the blockchain device, where each data backup device is used to store M pieces of fragmented data in the N pieces of fragmented data, M is a positive integer greater than 1, and M is smaller than N.
Optionally, the data backup devices correspond to the fragmented data one to one, and each data backup device is specifically configured to store the fragmented data corresponding to the data backup device one to one.
In this embodiment, specifically, the terminal may send the fragment data to the blockchain device provided with the intelligent contract first, and then each data backup device acquires the fragment data in the blockchain device by monitoring the blockchain device.
Wherein, the block chain (Blockchain) device is a device arranged on the block chain; the block chain equipment can adopt a block chain technology, verify the stored data by using a block chain type data structure, generate and update the data by using a distributed node consensus algorithm, and ensure the safety of data transmission and access by using a cryptology mode; blockchain technology is a method of programming and manipulating data using intelligent contracts composed of automated script code. A block chain device is provided with an intelligent Contract (Smart Contract), which is a computer protocol intended to propagate, verify, or execute contracts in an informational manner.
Specifically, the terminal sends the N pieces of fragment data to the block chain equipment for storage; and then at least two data backup devices acquire N pieces of fragment data in the blockchain device to store the N pieces of fragment data respectively, wherein each data backup device value stores part of the fragment data in the N pieces of fragment data. Preferably, the fragmented data and the data backup device are in one-to-one correspondence, and the data backup device is configured to store the fragmented data in one-to-one correspondence with the data backup device.
For example, the terminal divides the data into 5 pieces of fragment data, and the terminal sends the 5 pieces of fragment data to the blockchain device; the data backup device 1 acquires and stores 2 of the 5 fragmented data, the data backup device 2 acquires and stores 1 of the 5 fragmented data, and the data backup device 3 acquires and stores the remaining 2 of the 5 fragmented data.
For another example, the terminal divides the data into 5 pieces of fragment data, and the terminal sends the 5 pieces of fragment data to the blockchain device; and the 5 data backup devices acquire 1 piece of fragment data in the 5 pieces of fragment data in the blockchain device.
Fig. 2 is an interaction diagram of a data processing method according to an embodiment of the present application. As shown in fig. 2, the method includes:
step S11, the terminal obtains the data to be processed and the data processing request, wherein the data processing request includes the slicing number.
And step S12, the terminal performs data fragmentation processing on the data to be processed according to the fragmentation number to obtain N pieces of fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1.
And step S13, the terminal sends the N pieces of sliced data to the blockchain equipment provided with the intelligent contract.
And S14, at least two data backup devices listen to the blockchain device to acquire N pieces of sliced data in the blockchain device, wherein each data backup device is used for storing M pieces of sliced data in the N pieces of sliced data, M is a positive integer greater than 1, and M is smaller than N.
In this embodiment, specifically, steps S11 to S13 may refer to the steps provided in fig. 1, and are not described again.
In this embodiment, data to be processed and a data processing request are obtained, where the data processing request includes a slice number; performing data fragmentation processing on data to be processed according to the fragmentation number to obtain N pieces of fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1; and sending the N pieces of fragment data to a block chain device provided with an intelligent contract, so that at least two data backup devices monitor the block chain device to obtain the N pieces of fragment data in the block chain device, wherein each data backup device is used for storing M pieces of fragment data in the N pieces of fragment data, M is a positive integer greater than 1, and M is smaller than N. The data are fragmented to obtain a plurality of fragmented data, and then the fragmented data are stored in a plurality of data backup devices separately; further, the illegal equipment cannot acquire complete data of the data, and the data is prevented from being leaked or tampered; and, ensure that a single data backup device cannot steal the complete data content. The data storage security is guaranteed, and data are prevented from being stolen, leaked and tampered.
Fig. 3 is an interaction diagram of another data processing method according to an embodiment of the present application. As shown in fig. 3, the method includes:
step S21, the terminal obtains the data to be processed and the data processing request, wherein the data processing request includes the slicing number.
Wherein, the data processing request further comprises: data name of the data to be processed.
In this embodiment, specifically, the terminal obtains the data to be processed input by the user, or the terminal obtains the data to be processed from the network. The user inputs the number of the fragments and the data name of the data to be processed into the terminal, and then the terminal generates a data processing request according to the number of the fragments and the data name of the data to be processed.
And step S22, the terminal performs data fragmentation processing on the data to be processed according to the fragmentation number to obtain N pieces of fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1.
In this embodiment, specifically, the terminal performs data fragmentation processing on the data to be processed to obtain N pieces of fragmented data.
And step S23, the terminal acquires the device information of each data backup device from the blockchain device provided with the intelligent contract.
In this embodiment, specifically, the terminal queries device information of each data backup device from blockchain devices provided with the intelligent contract, where the device information includes at least one of the following: data backup device address, service provider name, service provider identification.
Step S24, the terminal determines device information corresponding to each piece of sliced data according to the correspondence between the preset piece of sliced data and the device information.
In this embodiment, specifically, a correspondence between fragmented data and device information is preset in the terminal, where one fragmented data corresponds to one device information; then, the terminal can determine the device information corresponding to each piece of sliced data.
Step S25, the terminal determines the data backup device corresponding to each piece of sliced data according to the device information corresponding to each piece of sliced data.
In this embodiment, specifically, since one piece of device information corresponds to one piece of data backup device, the terminal may determine the data backup device corresponding to each piece of fragmented data.
Alternatively, when steps S23-S25 are performed, the following manner may be adopted: and the terminal allocates a data backup device for each piece of fragment data in sequence according to the preset sequence relation of the data backup devices.
And step S26, the terminal calculates each piece of sliced data by adopting a Hash algorithm to obtain a data address identifier and a verification password of each piece of sliced data, wherein the data address identifier is used for identifying the piece of sliced data, and the verification password is used for verifying the piece of sliced data.
Each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data.
In this embodiment, specifically, the terminal uses a hash algorithm, and calculates each piece of sliced data and the initial password in the piece of sliced data by using a simple number combination to obtain the data address identifier and the verification password of each piece of sliced data. And each piece of fragment data comprises the data content of the piece of fragment data, the data address identification of the piece of fragment data and the authentication password of the piece of fragment data. Therefore, according to the Hash algorithm and the data combination, a plurality of data address identifications and verification passwords which are difficult to reversely associate and crack are generated according to the easily memorized data name and the initial password.
Wherein, the Hash Algorithm (Hash Algorithm) refers to: an input of an arbitrary length is converted into an output of a fixed length, and the obtained output value is a hash value.
Step S27a, the terminal sends a data backup request to the blockchain device.
In this embodiment, specifically, the terminal sends a data backup request to the blockchain device. Wherein one data backup request corresponds to one data backup device.
In step S27b, each data backup device obtains the data backup request in the blockchain device.
In this embodiment, specifically, each data backup device may monitor the blockchain device, and further obtain the data backup request.
Step S28, each data backup device generates a data backup key pair, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used to encrypt the fragmented data corresponding to the data backup device; the data backup key pair further comprises a data backup decryption key, and the data backup decryption key is used for decrypting the fragment data corresponding to the data backup device.
In this embodiment, specifically, each data backup device generates a data backup key pair according to an existing key generation algorithm, where the data backup key pair includes a data backup encryption key and a data backup decryption key, the data backup encryption key is used to encrypt the segment data corresponding to the data backup device, and the data backup decryption key is used to decrypt the segment data corresponding to the data backup device.
Wherein, the key pair related by the application is produced by adopting asymmetric encryption; asymmetric encryption (asymmetric encryption) refers to an encryption algorithm that uses different keys for encryption and decryption, also known as public-private key encryption.
In step S29, each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device.
In this embodiment, specifically, each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device for storage.
Step S210, the terminal monitors and obtains a data backup encryption key corresponding to each data backup device in the blockchain device.
In this embodiment, specifically, when the terminal monitors that the blockchain device has the data backup encryption key corresponding to the data backup device in a monitoring manner, the terminal obtains the data backup encryption key corresponding to each data backup device in the blockchain device.
Step S211, the terminal encrypts the segment data corresponding to each data backup device by using the data backup encryption key corresponding to each data backup device, so as to obtain encrypted segment data corresponding to each data backup device.
In this embodiment, specifically, since the terminal obtains the data backup encryption key corresponding to the data backup device, the terminal may perform encryption processing on the fragmented data corresponding to each data backup device by using the data backup encryption key corresponding to each data backup device.
Step S212, the terminal calculates the segment data corresponding to the data backup device by using a hash algorithm to obtain a first fingerprint of the segment data corresponding to the data backup device.
In this embodiment, specifically, the terminal calculates the segment data corresponding to each data backup device by using a simple digital combination by using a hash algorithm, so as to obtain a first fingerprint of the segment data corresponding to each data backup device.
Step S213a, the terminal sends the encrypted fragmented data corresponding to each data backup device to the blockchain device.
Wherein, step S213a specifically includes: and the terminal sends the encrypted fragment data corresponding to each data backup device and the first fingerprint of the fragment data corresponding to the data backup device to the blockchain device for storage.
Step S213b, each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device.
Wherein, step S213b specifically includes: each data backup device obtains the encrypted fragment data corresponding to the data backup device in the blockchain device and the first fingerprint of the fragment data corresponding to the data backup device.
In this embodiment, specifically, the terminal sends the encrypted fragment data and the first fingerprint of the fragment data corresponding to each data backup device to the blockchain device. Then, each data backup device acquires the encrypted fragment data and the first fingerprint of the fragment data corresponding to the data backup device in the blockchain device in a monitoring mode.
In step S214, each data backup device decrypts the encrypted segment data corresponding to the data backup device according to the data backup decryption key.
In this embodiment, specifically, each data backup device may directly store the encrypted fragment data corresponding to the data backup device. Or each data backup device has a data backup decryption key, and each data backup device may decrypt the encrypted fragment data corresponding to the data backup device by using the data backup decryption key to obtain decrypted fragment data.
And each data backup device may verify the decrypted fragmented data according to the first fingerprint of the fragmented data and then store the decrypted fragmented data. See the following steps for details.
Step S215, each data backup device calculates the decrypted fragment data corresponding to the data backup device by using a hash algorithm, so as to obtain a third fingerprint of the fragment data.
In this embodiment, specifically, after each data backup device decrypts the encrypted fragment data corresponding to the data backup device by using the data backup decryption key to obtain the decrypted fragment data, each data backup device calculates the decrypted fragment data corresponding to the data backup device by using a hash algorithm to obtain the third fingerprint of the fragment data.
Step S216, if each data backup device determines that the first fingerprint is consistent with the third fingerprint, store the decrypted fragment data corresponding to the data backup device.
In this embodiment, specifically, when each data backup device determines that the first fingerprint of the fragmented data is consistent with the third fingerprint, each data backup device determines to store the decrypted fragmented data corresponding to the data backup device, that is, each data backup device determines to backup the decrypted fragmented data corresponding to the data backup device. Therefore, the fingerprint of the fragmented data is verified, and the fragmented data stored by the data backup device is ensured to be correct.
And then, each data backup device sends a backup processing result to the blockchain device, wherein the backup processing result represents that the fragment data is successfully backed up. Then, the terminal acquires the backup processing result in a monitoring mode.
Step S217, if each data backup device determines that the first fingerprint is inconsistent with the third fingerprint, the data backup device sends a backup processing result to the terminal through the blockchain device, where the backup processing result represents that the fragmented data backup fails.
In this embodiment, specifically, when each data backup device determines that the first fingerprint and the third fingerprint of the fragmented data are not consistent, each data backup device sends a backup processing result to the blockchain device, where the backup processing result represents that the fragmented data fails to be backed up.
Then, the terminal acquires the backup processing result in a monitoring mode.
In this embodiment, data to be processed and a data processing request are obtained, where the data processing request includes a slice number; performing data fragmentation processing on data to be processed according to the fragmentation number to obtain N pieces of fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1; and sending the N pieces of fragment data to at least two data backup devices for storage through block chain devices provided with intelligent contracts, wherein each data backup device is used for storing M pieces of fragment data in the N pieces of fragment data, M is a positive integer greater than 1, and M is smaller than N. The data are fragmented to obtain a plurality of fragmented data, and then the fragmented data are stored in a plurality of data backup devices separately; further, the illegal equipment cannot acquire complete data of the data, and the data is prevented from being leaked or tampered; and, ensure that a single data backup device cannot steal the complete data content. The data storage security is guaranteed, and data are prevented from being stolen, leaked and tampered. And the data backup device generates an asymmetric key pair for the fragmented data, namely generates a data backup key pair, the data backup decryption key in the data backup key pair is stored by the data backup device, and the data backup device sends the data backup encryption key to the terminal through the block chain device, so that the terminal encrypts the fragmented data by using the data backup encryption key, thereby further preventing the data from being stolen and ensuring that an external attacker is difficult to steal or falsely defend the fragmented data.
Fig. 4 is a schematic flowchart of another data processing method according to an embodiment of the present application. As shown in fig. 4, the method includes:
step 201, obtaining data to be processed and a data processing request, where the data processing request includes a fragmentation number.
In this embodiment, specifically, an execution subject of this embodiment is a terminal, or other device or apparatus that can execute this embodiment. The present embodiment is described with an execution body as a terminal. Application software can be set in the terminal and controlled to execute the method provided by the embodiment.
This step can be referred to as step 101 in fig. 1, and is not described again.
Step 202, performing data fragmentation processing on the data to be processed according to the fragmentation number to obtain N fragmentation data, where a value of N is equal to the fragmentation number, and N is a positive integer greater than 1.
In this embodiment, specifically, this step may refer to step 102 in fig. 1, and is not described again.
In this embodiment, specifically, this step may refer to step 103 in fig. 1, and is not described again.
Step S204, a data retrieval request is obtained, wherein the data retrieval request is used for requesting to retrieve one piece of sliced data.
In this embodiment, specifically, a user sends a data address identifier of fragmented data to a terminal, and the terminal generates a data retrieving request according to the data address identifier of the fragmented data, where the data retrieving request is used to request to retrieve one fragmented data.
Step S205, determining a data backup device corresponding to the fragmented data according to a correspondence between the pre-stored fragmented data and the data backup device.
In this embodiment, specifically, the terminal stores a correspondence between pre-stored fragment data and data backup devices, and then the terminal may determine, according to the correspondence, that the data retrieval request is for requesting the data backup device corresponding to the requested fragment data.
Step S206, sending a data retrieval request to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sends the stored fragmented data to the blockchain device.
In this embodiment, specifically, the terminal sends a data retrieval request to the blockchain device, and then the data backup device corresponding to the fragmented data acquires the data retrieval request in a monitoring manner. And the data backup device corresponding to the fragment data determines the fragment data stored by the data backup device, and then sends the fragment data to the block chain device.
And step S207, monitoring and acquiring the fragment data in the block chain equipment.
In this embodiment, specifically, the terminal acquires the fragment data in the blockchain device in a monitoring manner.
And step S208, merging the acquired fragment data corresponding to each data backup device to obtain merged data.
In this embodiment, specifically, after the terminal repeats the step 201-207, the terminal may obtain each piece of fragment data; then, the terminal performs merging processing on each piece of sliced data to obtain merged data, and further obtains restored data.
In this embodiment, a data retrieval request is obtained, where the data retrieval request is used to request to retrieve one piece of sliced data; determining data backup equipment corresponding to the fragmented data according to the corresponding relation between the pre-stored fragmented data and the data backup equipment; sending a data retrieval request to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sending the stored fragmented data to the blockchain device; monitoring and acquiring fragment data in block chain equipment; and merging the acquired fragment data corresponding to each data backup device to obtain merged data. Therefore, the data retrieval request can be sent to each data backup device storing the fragmented data, so as to obtain the fragmented data corresponding to each data backup device; and furthermore, original data can be restored by adopting each piece of fragment data. The user is ensured to obtain the original data.
Fig. 5 is a signaling diagram of another data processing method according to an embodiment of the present application. As shown in fig. 5, the method includes:
step S31, the terminal obtains a data retrieving request, where the data retrieving request is used to request to retrieve one piece of sliced data.
In this embodiment, specifically, a user sends a data address identifier of fragmented data to a terminal, and the terminal generates a data retrieving request according to the data address identifier of the fragmented data, where the data retrieving request is used to request to retrieve one fragmented data.
And step S32, the terminal determines the data backup device corresponding to the fragmented data according to the corresponding relationship between the pre-stored fragmented data and the data backup device.
In this embodiment, specifically, the terminal stores a correspondence between pre-stored fragment data and data backup devices, and then the terminal may determine, according to the correspondence, that the data retrieval request is for requesting the data backup device corresponding to the requested fragment data.
Step S33a, the terminal sends a data retrieval request to the blockchain device.
Step S33b, the data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device.
In this embodiment, specifically, the terminal sends a data retrieval request to the blockchain device, and then the data backup device corresponding to the fragmented data may obtain the data retrieval request in a monitoring manner.
Step S34, the data backup device corresponding to the fragmented data generates a second data retrieval key pair, where the second data retrieval key pair includes a second data retrieval encryption key and a second data retrieval decryption key.
Step S35, the data backup device corresponding to the fragmented data sends the second data retrieval key pair to the blockchain device.
Step S36, the terminal monitors and obtains the second data retrieval key pair in the blockchain device.
Step S37, the terminal generates a first data retrieval key pair, wherein the first data retrieval key pair includes a first data retrieval encryption key and a first data retrieval decryption key.
In this embodiment, specifically, after acquiring the second data retrieval key pair in the block chain device, the terminal generates a first data retrieval key pair by using an existing key algorithm, where the first data retrieval key pair includes a first data retrieval encryption key and a first data retrieval decryption key.
And step S38, the terminal uses the second data to retrieve the encryption key to encrypt the verification password, so as to obtain the encrypted verification password.
In this embodiment, specifically, the terminal has already acquired the second data retrieval key pair in the block chain device, and the terminal may retrieve the encryption key according to the second data in the second data retrieval key pair to encrypt the verification password, so as to obtain the encrypted verification password.
In step S39a, the terminal sends the first data retrieval encryption key to the blockchain device.
Specifically, the terminal retrieves the encryption key and the encrypted authentication password from the first data and sends the first data to the blockchain device.
In step S39b, the data backup device corresponding to the fragmented data obtains the first data retrieval encryption key in the blockchain device.
Specifically, the data backup device corresponding to the fragmented data acquires the first data in the blockchain device and retrieves the encrypted key and the encrypted authentication password.
In this embodiment, specifically, the terminal retrieves the encrypted key and the encrypted verification password from the first data, and sends the first data to the blockchain device for storage. Then, the data backup device corresponding to the fragmented data acquires the first data retrieval encryption key and the encrypted verification password in a monitoring mode.
Step S310, the data backup device corresponding to the fragmented data decrypts the encrypted verification password by using the second data retrieval decryption key, so as to obtain the decrypted verification password.
In this embodiment, specifically, the data backup device corresponding to the fragmented data has the second data retrieval decryption key, and the data backup device corresponding to the fragmented data decrypts the encrypted verification password by using the second data retrieval decryption key.
Step S311, if the data backup device corresponding to the fragmented data determines that the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragmented data to the blockchain device for storage.
In this embodiment, specifically, a verification password is pre-stored in the data backup device corresponding to the fragmented data, and if it is determined that the decrypted verification password is consistent with the pre-stored verification password, the data backup device corresponding to the fragmented data may execute step S312.
In step S312, the data backup device corresponding to the fragmented data encrypts the fragmented data by using the first data retrieval encryption key to obtain the encrypted fragmented data.
In this embodiment, specifically, the data backup device corresponding to the fragmented data has the first data retrieval encryption key, so that the data backup device corresponding to the fragmented data may encrypt the fragmented data by using the first data retrieval encryption key.
Step 313, the data backup device corresponding to the fragment data sends the encrypted fragment data to the blockchain device for storage.
Step S314, the terminal monitors and obtains the encrypted fragment data in the blockchain device.
Step S315, the terminal decrypts the encrypted fragment data by using the first data retrieval decryption key.
In this embodiment, specifically, the terminal has a first data retrieval decryption key, and the encrypted fragment data is encrypted by using the first data retrieval encryption key, so that the terminal can decrypt the encrypted fragment data by using the first data retrieval decryption key to obtain the decrypted fragment data.
Step S316, the terminal obtains a first fingerprint of the fragment data in the blockchain device.
In this embodiment, specifically, the blockchain device stores the first fingerprint of each piece of fragment data, and the terminal may obtain the first fingerprint of the piece of fragment data in the blockchain device.
Step S317, the terminal calculates the decrypted fragment data by using a hash algorithm to obtain a second fingerprint of the fragment data.
In this embodiment, specifically, the terminal calculates the decrypted fragment data by using a hash algorithm to obtain a second fingerprint of the fragment data.
And step S318, if the terminal determines that the first fingerprint is consistent with the second fingerprint, the terminal determines to store the decrypted fragmented data.
In this embodiment, specifically, if the terminal determines that the first fingerprint and the second fingerprint are consistent, it determines that the decrypted fragmented data passes verification, and then the terminal determines to store the decrypted fragmented data. And if the terminal determines that the first fingerprint is inconsistent with the second fingerprint, determining that the decrypted fragment data does not pass the verification. Therefore, by verifying the fingerprint of the fragmented data, the retrieved fragmented data is ensured to be correct, and verification and accountability of the fragmented data are further realized.
Step S319, the terminal merges the acquired segment data corresponding to each data backup device to obtain merged data.
In this embodiment, specifically, by repeating the steps S31-S318, the terminal may obtain the fragment data corresponding to each data backup device. After the terminal acquires each piece of fragment data, the terminal may merge each piece of fragment data to obtain merged data.
In this embodiment, a data retrieval request is obtained, where the data retrieval request is used to request to retrieve one piece of sliced data; determining data backup equipment corresponding to the fragmented data according to the corresponding relation between the pre-stored fragmented data and the data backup equipment; sending a data retrieval request to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sending the stored fragmented data to the blockchain device; monitoring and acquiring fragment data in block chain equipment; and merging the acquired fragment data corresponding to each data backup device to obtain merged data. Therefore, the data retrieval request can be sent to each data backup device storing the fragmented data, so as to obtain the fragmented data corresponding to each data backup device; and furthermore, original data can be restored by adopting each piece of fragment data. The user is ensured to obtain the original data. And the fragment data is encrypted, and the authentication password of the fragment data is authenticated, so that the acquired fragment data can be ensured to be original fragment data.
Fig. 6 is a flowchart illustrating another data processing method according to an embodiment of the present application. As shown in fig. 6, the method includes:
step 301, obtaining M fragment data of N fragment data in a blockchain device provided with an intelligent contract, where the N fragment data is sent to the blockchain device by a terminal, and the N fragment data is obtained after the terminal performs data fragment processing on data to be processed according to the obtained fragment number, where M is a positive integer greater than 1, N is a positive integer greater than 1, M is smaller than N, and a value of N is equal to the fragment number.
And step 302, storing the M pieces of sliced data.
In this embodiment, the execution subject of this embodiment is the data backup device described above. The principle and technical effect can be seen in the embodiments shown in fig. 1-2, and are not described again.
Fig. 7 is a schematic flowchart of another data processing method according to an embodiment of the present application. As shown in fig. 7, the method includes:
step 401, obtaining M fragment data of N fragment data in a blockchain device provided with an intelligent contract, where the N fragment data is sent to the blockchain device by a terminal, and the N fragment data is obtained after the terminal performs data fragment processing on data to be processed according to the obtained number of fragments, M is a positive integer greater than 1, N is a positive integer greater than 1, M is smaller than N, and a value of N is equal to the number of fragments.
Step 402, generating a data backup key pair, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used for encrypting the fragmented data corresponding to the data backup device.
Step 403, storing the data backup key pair sent to the blockchain device with the intelligent contract, so that after the terminal monitors and obtains the data backup encryption key corresponding to the data backup device, the data backup encryption key is used to encrypt the fragment data corresponding to the data backup device, and the encrypted fragment data corresponding to the data backup device is obtained.
And step 404, acquiring encrypted fragment data corresponding to the data backup device in the blockchain device, wherein the encrypted fragment data is sent to the blockchain device by the terminal.
And step 405, storing the encrypted fragment data corresponding to the data backup device.
The data backup key pair also comprises a data backup decryption key, and the data backup decryption key is used for decrypting the fragment data corresponding to the data backup device; step 405 specifically includes:
step 4051, obtaining the encrypted fragment data corresponding to the data backup device in the blockchain device and a first fingerprint of the fragment data corresponding to the data backup device, where the first fingerprint of the fragment data is sent to the blockchain device by the terminal.
Step 4052, decrypting the encrypted fragment data corresponding to the data backup device by using the data backup decryption key to obtain decrypted fragment data.
Step 4053, calculating the decrypted fragment data corresponding to the data backup device by using a hash algorithm to obtain a third fingerprint of the fragment data.
Step 4054, if it is determined that the first fingerprint is consistent with the third fingerprint, storing the decrypted fragment data corresponding to the data backup device.
Each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data; the data address identification is used for identifying the fragment data, and the verification password is used for verifying the fragment data.
In this embodiment, the execution subject of this embodiment is the data backup device described above. The principle and technical effect can be seen from the embodiment shown in fig. 3, and are not described in detail.
Fig. 8 is a schematic flowchart of another data processing method according to an embodiment of the present application. As shown in fig. 8, the method includes:
And 502, storing the M pieces of sliced data.
Wherein, step 504 specifically includes:
step 5041, obtaining a first data retrieval encryption key in the blockchain device, where the first data retrieval encryption key is sent by the terminal to the blockchain device, the first data retrieval encryption key is an encryption key in a first data retrieval key pair generated by the terminal, and the first data retrieval key pair further includes a first data retrieval decryption key;
step 5042, encrypting the fragment data by using the first data retrieval encryption key to obtain encrypted fragment data;
step 5043, sending the encrypted fragment data to the blockchain device for storage, so that the terminal monitors and obtains the encrypted fragment data in the blockchain device, and decrypts the encrypted fragment data by using the first data retrieval decryption key.
Wherein, if the data retrieving request includes the verification password, step 5043 specifically includes the following steps:
generating a second data retrieval key pair, wherein the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key.
And sending the second data retrieval key pair to the blockchain equipment so that the terminal monitors and acquires the second data retrieval key pair in the blockchain equipment, encrypts the verification password by adopting the second data retrieval encryption key to obtain an encrypted verification password, and sends the encrypted verification password to the blockchain equipment.
And acquiring the encrypted authentication password in the blockchain equipment.
And the second data is used for retrieving the decryption secret key to decrypt the encrypted verification password to obtain the decrypted verification password.
And if the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragment data to the blockchain equipment for storage.
In this embodiment, the execution subject of this embodiment is the data backup device described above. The principle and technical effects can be seen in the embodiments shown in fig. 4-5, and are not described in detail.
Fig. 9 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application, and as shown in fig. 9, the apparatus according to the embodiment may include:
the first obtaining unit 51 is configured to obtain data to be processed and a data processing request, where the data processing request includes a slice number.
The fragmentation unit 52 is configured to perform data fragmentation processing on the data to be processed according to the fragmentation number to obtain N fragmentation data, where a value of N is equal to the fragmentation number, and N is a positive integer greater than 1.
The first sending unit 53 is configured to send the N pieces of fragment data to a blockchain device provided with an intelligent contract, so that at least two data backup devices listen to the blockchain device to obtain the N pieces of fragment data in the blockchain device, where each data backup device is configured to store M pieces of fragment data in the N pieces of fragment data, M is a positive integer greater than 1, and M is smaller than N.
The data processing apparatus of this embodiment can execute the data processing method provided in the embodiments shown in fig. 1-2 of this application, and the implementation principle and technical effect are similar, and are not described herein again.
Fig. 10 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application, and based on the embodiment shown in fig. 9, as shown in fig. 10, in the apparatus according to the embodiment of the present application, data backup devices correspond to fragmented data one to one, and each data backup device is specifically configured to store the fragmented data corresponding to the data backup device one to one.
The apparatus provided in this embodiment further includes:
the second obtaining unit 61 is configured to obtain device information of each data backup device from the blockchain device provided with the intelligent contract before the first sending unit 53 sends the N pieces of sliced data to the blockchain device provided with the intelligent contract.
The first determining unit 62 is configured to determine, according to a correspondence between preset fragmentation data and device information, device information corresponding to each fragmentation data.
The second determining unit 63 is configured to determine, according to the device information corresponding to each piece of fragmented data, a data backup device corresponding to each piece of fragmented data.
The first transmission unit 53 includes:
the first sending subunit 531 is configured to send a data backup request to the blockchain device, so that each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device after acquiring the data backup request in the blockchain device, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used to encrypt the fragmented data corresponding to the data backup device.
The first obtaining subunit 532 is configured to monitor and obtain a data backup encryption key corresponding to each data backup device in the blockchain device.
The first encrypting subunit 533 is configured to encrypt the fragment data corresponding to each data backup device by using the data backup encryption key corresponding to each data backup device, so as to obtain encrypted fragment data corresponding to each data backup device.
The second sending subunit 534 is configured to send the encrypted segment data corresponding to each data backup device to the blockchain device, so that each data backup device obtains the encrypted segment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted segment data corresponding to the data backup device.
The data backup key pair also comprises a data backup decryption key, and the data backup decryption key is used for decrypting the fragment data corresponding to the data backup device; the first sending unit 53 further includes:
the first calculating subunit 535 is configured to calculate, by using a hash algorithm, the fragmented data corresponding to the data backup device before the second sending subunit 534 sends the encrypted fragmented data corresponding to each data backup device to the blockchain device, so as to obtain the first fingerprint of the fragmented data corresponding to the data backup device.
The second sending subunit 534 is specifically configured to: and sending the encrypted fragment data corresponding to each data backup device and the first fingerprint of the fragment data corresponding to the data backup device to the blockchain device, so that after each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device and the first fingerprint of the fragment data corresponding to the data backup device, the encrypted fragment data corresponding to the data backup device is decrypted according to the data backup decryption key, and the decrypted fragment data is verified according to the first fingerprint and then stored.
The apparatus provided in this embodiment further includes:
the calculating unit 64 is configured to calculate each piece of sliced data by using a hash algorithm before the first sending unit 53 sends the N pieces of sliced data to the blockchain device provided with the intelligent contract, to obtain a data address identifier and a verification password of each piece of sliced data, where the data address identifier is used to identify the piece of sliced data, and the verification password is used to verify the piece of sliced data; each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data.
The apparatus provided in this embodiment further includes:
a third obtaining unit 65, configured to obtain a data retrieving request after the first sending unit 53 sends the N pieces of sliced data to the blockchain device provided with the intelligent contract, where the data retrieving request is used to request that one piece of sliced data be retrieved.
The third determining unit 66 is configured to determine a data backup device corresponding to the segment data according to a correspondence between pre-stored segment data and the data backup device.
A second sending unit 67, configured to send a data retrieval request to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sends the stored fragmented data to the blockchain device.
And a fourth obtaining unit 68, configured to listen to and obtain the sliced data in the blockchain device.
And a merging unit 69, configured to merge the obtained fragment data corresponding to each data backup device to obtain merged data.
The fourth acquisition unit 68 includes:
a generating subunit operable to generate a first data retrieval key pair, wherein the first data retrieval key pair comprises a first data retrieval encryption key and a first data retrieval decryption key.
And the third sending subunit is configured to send the first data retrieval encryption key to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the first data retrieval encryption key in the blockchain device, encrypts the stored fragmented data by using the first data retrieval encryption key to obtain encrypted fragmented data, and sends the encrypted fragmented data to the blockchain device for storage.
And the second acquisition subunit is used for monitoring and acquiring the encrypted fragment data in the blockchain device.
And the decryption subunit is configured to decrypt the encrypted fragment data by using the first data retrieval decryption key to obtain decrypted fragment data.
The data retrieval request includes an authentication password, and the fourth obtaining unit 68 further includes:
the third obtaining subunit is configured to, before the second obtaining subunit monitors and obtains the encrypted fragment data in the blockchain device, monitor and obtain a second data retrieval key pair in the blockchain device, where the second data retrieval key pair is generated for a data backup device corresponding to the fragment data, and the second data retrieval key pair includes a second data retrieval encryption key and a second data retrieval decryption key.
And the second encryption subunit is used for encrypting the verification password by using the second data to retrieve the encryption key so as to obtain the encrypted verification password.
And the fourth sending subunit is configured to send the encrypted verification password to the blockchain device, so that the data backup device corresponding to the segment data obtains the encrypted verification password in the blockchain device, retrieves the decryption key according to the second data to decrypt the encrypted verification password, so as to obtain a decrypted verification password, and determines that the decrypted verification password is consistent with the prestored verification password.
The fourth acquiring unit 68 further includes:
and the fourth acquiring subunit is configured to acquire the first fingerprint of the fragment data in the block chain device after the decrypting subunit decrypts the encrypted fragment data by using the first data retrieval decryption key to obtain the decrypted fragment data.
And the second calculating subunit is used for calculating the decrypted fragment data by adopting a hash algorithm to obtain a second fingerprint of the fragment data.
And the storage subunit is used for determining to store the decrypted fragmented data if the first fingerprint is determined to be consistent with the second fingerprint.
The data processing request also comprises: data name of the data to be processed.
The data processing apparatus of this embodiment can execute the data processing method provided in the embodiments shown in fig. 3 to 5 of this application, and the implementation principle and technical effect are similar, and are not described herein again.
Fig. 11 is a schematic structural diagram of another data processing apparatus provided in an embodiment of the present application, and as shown in fig. 11, the apparatus of the present embodiment may include:
the obtaining unit 71 is configured to obtain M pieces of fragment data of N pieces of fragment data in the blockchain device provided with the intelligent contract, where the N pieces of fragment data are sent to the blockchain device by the terminal, and the N pieces of fragment data are obtained after the terminal performs data fragment processing on data to be processed according to the obtained number of fragments, M is a positive integer greater than 1, N is a positive integer greater than 1, M is smaller than N, and a value of N is equal to the number of fragments.
And the storage unit 72 is used for storing the M pieces of sliced data.
The data processing apparatus of this embodiment can execute the data processing method provided in the embodiment shown in fig. 6 of this application, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 12 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application, and based on the embodiment shown in fig. 11, as shown in fig. 12, in the apparatus according to the present embodiment, a storage unit 72 includes:
the generating subunit 721 is configured to generate a data backup key pair, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used to encrypt the fragmented data corresponding to the data backup device.
The first sending subunit 722 is configured to store the data backup key pair sent to the blockchain device with the intelligent contract, so that after the terminal monitors and obtains the data backup encryption key corresponding to the data backup device, the terminal encrypts the segment data corresponding to the data backup device by using the data backup encryption key, and obtains the encrypted segment data corresponding to the data backup device.
The first obtaining subunit 723 is configured to obtain encrypted segment data corresponding to a data backup device in the blockchain device, where the encrypted segment data is sent to the blockchain device by a terminal.
The storage subunit 724 is configured to store the encrypted sliced data corresponding to the data backup device.
The data backup key pair also comprises a data backup decryption key, and the data backup decryption key is used for decrypting the fragment data corresponding to the data backup device; then store subunit 724, including:
the receiving module is used for acquiring the encrypted fragment data corresponding to the data backup device in the blockchain device and a first fingerprint of the fragment data corresponding to the data backup device, wherein the first fingerprint of the fragment data is sent to the blockchain device by the terminal.
And the decryption module is used for decrypting the encrypted fragment data corresponding to the data backup device by using the data backup decryption key to obtain the decrypted fragment data.
And the computing module is used for computing the decrypted fragment data corresponding to the data backup device by adopting a Hash algorithm to obtain a third fingerprint of the fragment data.
And the storage module is used for storing the decrypted fragment data corresponding to the data backup device if the first fingerprint is consistent with the third fingerprint.
Each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data; the data address identification is used for identifying the fragment data, and the verification password is used for verifying the fragment data.
The apparatus provided in this embodiment further includes:
a second receiving unit 81, configured to receive a data retrieving request sent by the terminal device after the storage unit 72 stores the M pieces of sliced data, where the data retrieving request is used to request to retrieve one piece of sliced data.
And the sending unit 82 is configured to store the fragment data in the blockchain device, so that the terminal obtains the fragment data in the blockchain device, and merge the obtained fragment data corresponding to each data backup device to obtain merged data.
The transmission unit 82 includes:
the second obtaining subunit 821 is configured to obtain a first data retrieval encryption key in the blockchain device, where the first data retrieval encryption key is sent by the terminal to the blockchain device, the first data retrieval encryption key is an encryption key in a first data retrieval key pair generated by the terminal, and the first data retrieval key pair further includes a first data retrieval decryption key.
And an encrypting subunit 822, configured to encrypt the sliced data by using the first data retrieval encryption key to obtain encrypted sliced data.
A second sending subunit 823, configured to send the encrypted fragment data to the blockchain device for storage, so that the terminal monitors and obtains the encrypted fragment data in the blockchain device, and decrypts the encrypted fragment data by using the first data retrieval decryption key.
If the data retrieval request includes the authentication password, the sending subunit 823 is specifically configured to: generating a second data retrieval key pair, wherein the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key; sending the second data retrieval key pair to the block chain equipment so that the terminal monitors and acquires the second data retrieval key pair in the block chain equipment, encrypting the verification password by adopting the second data retrieval encryption key to obtain an encrypted verification password, and sending the encrypted verification password to the block chain equipment; acquiring an encrypted verification password in blockchain equipment; decrypting the encrypted verification password by using the second data retrieval decryption key to obtain a decrypted verification password; and if the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragment data to the blockchain equipment for storage.
The data processing apparatus of this embodiment can execute the data processing method provided in the embodiments shown in fig. 7 to 8 of this application, and the implementation principle and technical effect are similar, and are not described herein again.
Fig. 13 is a schematic structural diagram of a data processing device provided in an embodiment of the present application, and as shown in fig. 13, an embodiment of the present application provides a data processing device, which may be used to execute actions or steps of the data processing device in the embodiments shown in fig. 1 or fig. 2, and specifically includes: a processor 2701, memory 2702, and a communication interface 2703.
The memory 2702 is used to store computer programs.
The processor 2701 is configured to execute the computer program stored in the memory 2702 to implement the actions of the data processing apparatus in the embodiment shown in fig. 1 or fig. 2, which are not described again.
Optionally, the data processing apparatus may further include a bus 2704. The processor 2701, the memory 2702, and the communication interface 2703 may be connected to each other via a bus 2704; bus 2704 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, for example. The bus 2704 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 13, but this is not intended to represent only one bus or type of bus.
In the embodiments of the present application, the above embodiments may be referred to and referred to by each other, and the same or similar steps and terms are not repeated.
Alternatively, part or all of the above modules may be implemented by being embedded in a chip of the data processing apparatus in the form of an integrated circuit. And they may be implemented separately or integrated together. That is, the above modules may be configured as one or more integrated circuits implementing the above methods, for example: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 2702 comprising instructions, executable by the processor 2701 of the data processing apparatus described above to perform the method described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, in which instructions, when executed by a processor of a data processing apparatus, enable the data processing apparatus to perform the above-described data processing method.
Fig. 14 is a schematic structural diagram of another data processing device provided in an embodiment of the present application, and as shown in fig. 14, an embodiment of the present application provides a data processing device, which may be used to execute actions or steps of the data processing device in the embodiments shown in fig. 1 or fig. 2, and specifically includes: a processor 2801, memory 2802, and a communication interface 2803.
A memory 2802 for storing computer programs.
The processor 2801 is configured to execute a computer program stored in the memory 2802 to implement the actions of the data processing device in the embodiment shown in fig. 1 or fig. 2, which are not described again.
Optionally, the data processing apparatus may further include a bus 2804. The processor 2801, the memory 2802, and the communication interface 2803 may be connected to one another by a bus 2804; the bus 2804 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 2804 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 14, but this is not intended to represent only one bus or type of bus.
In the embodiments of the present application, the above embodiments may be referred to and referred to by each other, and the same or similar steps and terms are not repeated.
Alternatively, part or all of the above modules may be implemented by being embedded in a chip of the data processing apparatus in the form of an integrated circuit. And they may be implemented separately or integrated together. That is, the above modules may be configured as one or more integrated circuits implementing the above methods, for example: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 2802 comprising instructions, executable by the processor 2801 of the data processing device described above to perform the method described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, in which instructions, when executed by a processor of a data processing apparatus, enable the data processing apparatus to perform the above-described data processing method.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, data processing device, or data center to another website, computer, data processing device, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. A computer-readable storage medium may be any available medium that can be accessed by a computer or a data processing device, data center, or the like that incorporates one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in the embodiments of the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (40)
1. A data processing method, comprising:
acquiring data to be processed and a data processing request, wherein the data processing request comprises a fragment number;
performing data fragmentation processing on the data to be processed according to the fragmentation number to obtain N fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1;
and sending the N pieces of fragment data to a blockchain device provided with an intelligent contract, so that at least two data backup devices monitor the blockchain device to obtain the N pieces of fragment data in the blockchain device, wherein each data backup device is used for storing M pieces of fragment data in the N pieces of fragment data, M is a positive integer greater than 1, and M is smaller than N.
2. The method according to claim 1, wherein the data backup devices are in one-to-one correspondence with the fragmented data, and each of the data backup devices is specifically configured to store the fragmented data in one-to-one correspondence with the data backup device.
3. The method of claim 1, further comprising, before sending the N pieces of sliced data to a blockchain device provided with an intelligent contract:
acquiring equipment information of each data backup equipment from blockchain equipment provided with intelligent contracts;
determining equipment information corresponding to each piece of fragment data according to a corresponding relation between preset piece of fragment data and the equipment information;
and determining the data backup equipment corresponding to each piece of fragment data according to the equipment information corresponding to each piece of fragment data.
4. The method according to claim 3, wherein sending the N pieces of sliced data to a blockchain device provided with an intelligent contract, so that at least two data backup devices listen to the blockchain device to obtain the N pieces of sliced data in the blockchain device, comprises:
sending a data backup request to the blockchain device, so that each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device after acquiring the data backup request in the blockchain device, wherein the data backup key pair includes a data backup encryption key, and the data backup encryption key is used for encrypting the fragmented data corresponding to the data backup device;
monitoring and acquiring a data backup encryption key corresponding to each data backup device in the block chain device;
encrypting the fragment data corresponding to each data backup device by using a data backup encryption key corresponding to each data backup device to obtain encrypted fragment data corresponding to each data backup device;
and sending the encrypted fragment data corresponding to each data backup device to the blockchain device, so that each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted fragment data corresponding to the data backup device.
5. The method according to claim 4, wherein the pair of data backup keys further includes a data backup decryption key, and the data backup decryption key is used for decrypting fragmented data corresponding to the data backup device; before sending the encrypted fragment data corresponding to each data backup device to the blockchain device, the method further includes:
calculating the fragmented data corresponding to the data backup device by adopting a Hash algorithm to obtain a first fingerprint of the fragmented data corresponding to the data backup device;
sending the encrypted fragment data corresponding to each data backup device to the blockchain device, so that each data backup device obtains the encrypted fragment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted fragment data corresponding to the data backup device, including:
and sending the encrypted fragment data corresponding to each data backup device and the first fingerprint of the fragment data corresponding to the data backup device to the blockchain device, so that after each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device and the first fingerprint of the fragment data corresponding to the data backup device, the encrypted fragment data corresponding to the data backup device is decrypted according to the data backup decryption key, and the decrypted fragment data is verified according to the first fingerprint and then stored.
6. The method of claim 1, further comprising, before sending the N pieces of sliced data to a blockchain device provided with an intelligent contract:
calculating each piece of sliced data by adopting a Hash algorithm to obtain a data address identifier and a verification password of each piece of sliced data, wherein the data address identifier is used for identifying the piece of sliced data, and the verification password is used for verifying the piece of sliced data;
each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data.
7. The method according to any one of claims 1-6, further comprising, after sending the N pieces of sliced data to a blockchain device provided with an intelligent contract:
acquiring a data retrieval request, wherein the data retrieval request is used for requesting to retrieve one piece of sliced data;
determining data backup equipment corresponding to the fragmented data according to a corresponding relation between pre-stored fragmented data and the data backup equipment;
sending the data retrieval request to the blockchain device, so that a data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sends the stored fragmented data to the blockchain device;
monitoring and acquiring fragment data in the block chain equipment;
and merging the acquired fragment data corresponding to each data backup device to obtain merged data.
8. The method of claim 7, wherein the listening and acquiring fragmented data in the blockchain device comprises:
generating a first data retrieval key pair, wherein the first data retrieval key pair comprises a first data retrieval encryption key and a first data retrieval decryption key;
sending the first data retrieval encryption key to the blockchain device, so that the data backup device corresponding to the fragmented data obtains the first data retrieval encryption key in the blockchain device, encrypts the stored fragmented data by using the first data retrieval encryption key to obtain encrypted fragmented data, and sends the encrypted fragmented data to the blockchain device for storage;
monitoring and acquiring encrypted fragment data in the block chain equipment;
and decrypting the encrypted fragment data by using the first data retrieval decryption key to obtain decrypted fragment data.
9. The method according to claim 8, wherein the data retrieval request includes an authentication password, and before the listening and acquiring the encrypted sliced data in the blockchain device, the method further comprises:
monitoring and acquiring a second data retrieval key pair in the blockchain device, wherein the second data retrieval key pair is generated for a data backup device corresponding to the fragmented data, and the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key;
the second data is used for retrieving an encryption key to encrypt the verification password to obtain an encrypted verification password;
and sending the encrypted verification password to the blockchain equipment, so that the data backup equipment corresponding to the fragmented data obtains the encrypted verification password in the blockchain equipment, retrieves a decryption key according to the second data to decrypt the encrypted verification password to obtain a decrypted verification password, and determines that the decrypted verification password is consistent with a prestored verification password.
10. The method of claim 8, further comprising, after decrypting the encrypted sliced data using the first data retrieval decryption key to obtain decrypted sliced data:
acquiring a first fingerprint of the sliced data in the blockchain equipment;
calculating the decrypted fragment data by adopting a Hash algorithm to obtain a second fingerprint of the fragment data;
and if the first fingerprint is consistent with the second fingerprint, determining to store the decrypted fragment data.
11. The method according to any one of claims 1-6, wherein the data processing request further comprises: and the data name of the data to be processed.
12. A data processing method, comprising:
acquiring M fragment data of N fragment data in block chain equipment provided with an intelligent contract, wherein the N fragment data are sent to the block chain equipment by a terminal, and are obtained after the terminal performs data fragment processing on data to be processed according to the acquired fragment number, M is a positive integer greater than 1, N is a positive integer greater than 1, M is smaller than N, and the value of N is equal to the fragment number;
and storing the M pieces of sliced data.
13. The method of claim 12, wherein storing the M pieces of tile data comprises:
generating a data backup key pair, wherein the data backup key pair comprises a data backup encryption key used for encrypting the fragmented data corresponding to the data backup device;
storing the data backup key pair sent to the block chain equipment provided with the intelligent contract, so that after the terminal monitors and acquires the data backup encryption key corresponding to the data backup equipment, the data backup encryption key is adopted to encrypt the fragment data corresponding to the data backup equipment, and the encrypted fragment data corresponding to the data backup equipment is obtained;
acquiring encrypted fragment data corresponding to data backup equipment in the blockchain equipment, wherein the encrypted fragment data is sent to the blockchain equipment by the terminal;
and storing the encrypted fragment data corresponding to the data backup device.
14. The method according to claim 13, wherein the pair of data backup keys further includes a data backup decryption key, and the data backup decryption key is used for decrypting fragmented data corresponding to the data backup device; storing the encrypted fragment data corresponding to the data backup device, including:
acquiring encrypted fragment data corresponding to data backup equipment in the blockchain equipment and a first fingerprint of the fragment data corresponding to the data backup equipment, wherein the first fingerprint of the fragment data is sent to the blockchain equipment by the terminal;
decrypting the encrypted fragment data corresponding to the data backup equipment by using the data backup decryption key to obtain decrypted fragment data;
calculating the decrypted fragment data corresponding to the data backup device by adopting a Hash algorithm to obtain a third fingerprint of the fragment data;
and if the first fingerprint is consistent with the third fingerprint, storing the decrypted fragmented data corresponding to the data backup device.
15. The method according to claim 12, wherein each of the fragmented data includes data content of the fragmented data, data address identification of the fragmented data, and authentication password of the fragmented data;
the data address identifier is used for identifying the fragment data, and the authentication password is used for authenticating the fragment data.
16. The method according to any one of claims 12-15, further comprising, after storing the M pieces of sliced data:
receiving a data retrieval request sent by the terminal device, wherein the data retrieval request is used for requesting to retrieve one piece of fragmented data;
and storing the fragment data into the blockchain device so that the terminal can acquire the fragment data in the blockchain device, and merging the acquired fragment data corresponding to each data backup device to obtain merged data.
17. The method according to claim 16, wherein storing the fragment data in the blockchain device to enable the terminal to obtain the fragment data in the blockchain device comprises:
obtaining a first data retrieval encryption key in the blockchain device, wherein the first data retrieval encryption key is sent to the blockchain device by the terminal, the first data retrieval encryption key is an encryption key in a first data retrieval key pair generated by the terminal, and the first data retrieval key pair further includes a first data retrieval decryption key;
encrypting the fragment data by using the first data retrieval encryption key to obtain encrypted fragment data;
and sending the encrypted fragment data to block chain equipment for storage, so that the terminal monitors and acquires the encrypted fragment data in the block chain equipment, and decrypting the encrypted fragment data by using the first data retrieval decryption key.
18. The method according to claim 17, wherein the data retrieval request includes an authentication password, and the sending the encrypted fragment data to a blockchain device for storage includes:
generating a second data retrieval key pair, wherein the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key;
sending the second data retrieval key pair to the block chain equipment, so that the terminal monitors and acquires the second data retrieval key pair in the block chain equipment, encrypts the verification password by using the second data retrieval encryption key to obtain an encrypted verification password, and sends the encrypted verification password to the block chain equipment;
acquiring the encrypted verification password in the blockchain equipment;
decrypting the encrypted verification password by using the second data retrieval decryption key to obtain a decrypted verification password;
and if the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragment data to the blockchain equipment for storage.
19. A data processing apparatus, comprising:
the device comprises a first acquisition unit, a second acquisition unit and a processing unit, wherein the first acquisition unit is used for acquiring data to be processed and a data processing request, and the data processing request comprises a fragment number;
the fragmentation unit is used for carrying out data fragmentation processing on the data to be processed according to the fragmentation number to obtain N fragmentation data, wherein the value of N is equal to the fragmentation number, and N is a positive integer greater than 1;
a first sending unit, configured to send the N pieces of fragmented data to a blockchain device provided with an intelligent contract, so that at least two data backup devices monitor the blockchain device to obtain the N pieces of fragmented data in the blockchain device, where each data backup device is configured to store M pieces of fragmented data in the N pieces of fragmented data, M is a positive integer greater than 1, and M is smaller than N.
20. The apparatus according to claim 19, wherein the data backup devices are in one-to-one correspondence with the fragmented data, and each of the data backup devices is specifically configured to store the fragmented data in one-to-one correspondence with the data backup device.
21. The apparatus of claim 19, further comprising:
a second obtaining unit, configured to obtain device information of each data backup device from the blockchain device provided with the intelligent contract before the first sending unit sends the N pieces of sliced data to the blockchain device provided with the intelligent contract;
the device comprises a first determining unit, a second determining unit and a judging unit, wherein the first determining unit is used for determining the device information corresponding to each piece of fragment data according to the corresponding relation between the preset piece of fragment data and the device information;
and the second determining unit is used for determining the data backup device corresponding to each piece of the fragmented data according to the device information corresponding to each piece of the fragmented data.
22. The apparatus of claim 21, wherein the first sending unit comprises:
the first sending subunit sends a data backup request to the blockchain device, so that each data backup device sends a data backup key pair corresponding to the data backup device to the blockchain device after acquiring the data backup request in the blockchain device, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used for encrypting the sliced data corresponding to the data backup device;
the first obtaining subunit is configured to monitor and obtain a data backup encryption key corresponding to each data backup device in the block chain device;
the first encryption subunit is configured to encrypt the fragmented data corresponding to each data backup device by using a data backup encryption key corresponding to each data backup device, so as to obtain encrypted fragmented data corresponding to each data backup device;
and the second sending subunit is configured to send the encrypted fragment data corresponding to each data backup device to the blockchain device, so that each data backup device obtains the encrypted fragment data corresponding to the data backup device in the blockchain device, and decrypts and stores the encrypted fragment data corresponding to the data backup device.
23. The apparatus according to claim 22, wherein the pair of data backup keys further includes a data backup decryption key, where the data backup decryption key is used to decrypt fragmented data corresponding to the data backup device; the first sending unit further includes:
the first calculating subunit is configured to calculate, by using a hash algorithm, the fragmented data corresponding to the data backup device before the encrypted fragmented data corresponding to each data backup device is sent to the blockchain device by the second sending subunit, so as to obtain a first fingerprint of the fragmented data corresponding to the data backup device;
the second sending subunit is specifically configured to:
and sending the encrypted fragment data corresponding to each data backup device and the first fingerprint of the fragment data corresponding to the data backup device to the blockchain device, so that after each data backup device acquires the encrypted fragment data corresponding to the data backup device in the blockchain device and the first fingerprint of the fragment data corresponding to the data backup device, the encrypted fragment data corresponding to the data backup device is decrypted according to the data backup decryption key, and the decrypted fragment data is verified according to the first fingerprint and then stored.
24. The apparatus of claim 19, further comprising:
a calculating unit, configured to calculate each piece of sliced data by using a hash algorithm before the first sending unit sends the N pieces of sliced data to a blockchain device provided with an intelligent contract, to obtain a data address identifier and a verification password of each piece of sliced data, where the data address identifier is used to identify the piece of sliced data, and the verification password is used to verify the piece of sliced data;
each piece of fragment data comprises data content of the piece of fragment data, data address identification of the piece of fragment data and a verification password of the piece of fragment data.
25. The apparatus of any one of claims 19-24, further comprising:
a third obtaining unit, configured to obtain a data retrieval request after the first sending unit sends the N pieces of sliced data to a blockchain device provided with an intelligent contract, where the data retrieval request is used to request to retrieve one piece of sliced data;
a third determining unit, configured to determine, according to a correspondence between pre-stored fragmented data and data backup devices, data backup devices corresponding to the fragmented data;
a second sending unit, configured to send the data retrieval request to the blockchain device, so that a data backup device corresponding to the fragmented data obtains the data retrieval request in the blockchain device, and sends the stored fragmented data to the blockchain device;
a fourth obtaining unit, configured to monitor and obtain fragmented data in the block chain device;
and the merging unit is used for merging the acquired fragment data corresponding to each data backup device to obtain merged data.
26. The apparatus of claim 25, wherein the fourth obtaining unit comprises:
a generation subunit configured to generate a first data retrieval key pair, wherein the first data retrieval key pair comprises a first data retrieval encryption key and a first data retrieval decryption key;
a third sending subunit, configured to send the first data retrieval encryption key to the blockchain device, so that a data backup device corresponding to the fragmented data obtains the first data retrieval encryption key in the blockchain device, encrypts the stored fragmented data with the first data retrieval encryption key to obtain encrypted fragmented data, and sends the encrypted fragmented data to the blockchain device for storage;
the second acquiring subunit is configured to monitor and acquire the encrypted fragment data in the block chain device;
and the decryption subunit is configured to decrypt the encrypted fragment data by using the first data retrieval decryption key to obtain decrypted fragment data.
27. The apparatus of claim 26, wherein the data retrieval request includes an authentication password, and wherein the fourth obtaining unit further includes:
a third obtaining subunit, configured to monitor and obtain a second data retrieval key pair in the blockchain device before the second obtaining subunit monitors and obtains the encrypted sliced data in the blockchain device, where the second data retrieval key pair is generated for the data backup device corresponding to the sliced data, and the second data retrieval key pair includes a second data retrieval encryption key and a second data retrieval decryption key;
the second encryption subunit is configured to encrypt the verification password by using the second data retrieval encryption key to obtain an encrypted verification password;
and the fourth sending subunit is configured to send the encrypted verification password to the blockchain device, so that the data backup device corresponding to the segment data obtains the encrypted verification password in the blockchain device, retrieves the decryption key according to the second data to decrypt the encrypted verification password, so as to obtain a decrypted verification password, and determines that the decrypted verification password is consistent with a pre-stored verification password.
28. The apparatus of claim 26, wherein the fourth obtaining unit further comprises:
a fourth obtaining subunit, configured to obtain a first fingerprint of the fragmented data in the block chain device after the decrypting subunit decrypts the encrypted fragmented data by using the first data retrieval decryption key to obtain decrypted fragmented data;
the second calculating subunit is configured to calculate the decrypted fragment data by using a hash algorithm to obtain a second fingerprint of the fragment data;
and the storage subunit is configured to determine to store the decrypted fragment data if it is determined that the first fingerprint and the second fingerprint are consistent.
29. The apparatus according to any of claims 19-24, wherein the data processing request further comprises: and the data name of the data to be processed.
30. A data processing apparatus, comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring M fragment data in N fragment data in block chain equipment provided with an intelligent contract, the N fragment data is sent to the block chain equipment by a terminal, the N fragment data is obtained after the terminal performs data fragment processing on data to be processed according to the acquired fragment number, M is a positive integer larger than 1, N is a positive integer larger than 1, M is smaller than N, and the value of N is equal to the fragment number;
and the storage unit is used for storing the M pieces of sliced data.
31. The apparatus of claim 30, wherein the storage unit comprises:
the generation subunit is configured to generate a data backup key pair, where the data backup key pair includes a data backup encryption key, and the data backup encryption key is used to encrypt fragmented data corresponding to the data backup device;
the first sending subunit is configured to store the data backup key pair sent to the block chain device provided with the intelligent contract, so that after the terminal monitors and obtains a data backup encryption key corresponding to the data backup device, the terminal encrypts the fragment data corresponding to the data backup device by using the data backup encryption key to obtain encrypted fragment data corresponding to the data backup device;
a first obtaining subunit, configured to obtain encrypted segment data corresponding to a data backup device in the blockchain device, where the encrypted segment data is sent to the blockchain device by the terminal;
and the storage subunit is used for storing the encrypted fragment data corresponding to the data backup device.
32. The apparatus according to claim 31, wherein the pair of data backup keys further includes a data backup decryption key, where the data backup decryption key is used to decrypt fragmented data corresponding to the data backup device; the storage subunit includes:
the receiving module is used for acquiring encrypted fragment data corresponding to data backup equipment in the blockchain equipment and first fingerprints of fragment data corresponding to the data backup equipment, wherein the first fingerprints of the fragment data are sent to the blockchain equipment by the terminal;
the decryption module is used for decrypting the encrypted fragment data corresponding to the data backup device by using the data backup decryption key to obtain decrypted fragment data;
the computing module is used for computing the decrypted fragment data corresponding to the data backup device by adopting a Hash algorithm to obtain a third fingerprint of the fragment data;
and the storage module is used for storing the decrypted fragmented data corresponding to the data backup device if the first fingerprint is determined to be consistent with the third fingerprint.
33. The apparatus according to claim 30, wherein each of the fragmented data includes data content of the fragmented data, data address identification of the fragmented data, and authentication password of the fragmented data;
the data address identifier is used for identifying the fragment data, and the authentication password is used for authenticating the fragment data.
34. The apparatus of any one of claims 30-33, further comprising:
a second receiving unit, configured to receive a data retrieval request sent by the terminal device after the storage unit stores the M fragmented data, where the data retrieval request is used to request to retrieve one fragmented data;
and the sending unit is used for storing the fragment data into the blockchain device so that the terminal can acquire the fragment data in the blockchain device and merge the acquired fragment data corresponding to each data backup device to obtain merged data.
35. The apparatus of claim 34, wherein the sending unit comprises:
a second obtaining subunit, configured to obtain a first data retrieval encryption key in the blockchain device, where the first data retrieval encryption key is sent by the terminal to the blockchain device, the first data retrieval encryption key is an encryption key in a first data retrieval key pair generated by the terminal, and the first data retrieval key pair further includes a first data retrieval decryption key;
the encryption subunit is configured to encrypt the fragmented data by using the first data retrieval encryption key to obtain encrypted fragmented data;
and the second sending subunit is configured to send the encrypted fragment data to the blockchain device for storage, so that the terminal monitors and obtains the encrypted fragment data in the blockchain device, and decrypts the encrypted fragment data by using the first data retrieval decryption key.
36. The apparatus according to claim 35, wherein the data retrieval request includes an authentication password, the sending subunit is specifically configured to:
generating a second data retrieval key pair, wherein the second data retrieval key pair comprises a second data retrieval encryption key and a second data retrieval decryption key;
sending the second data retrieval key pair to the block chain equipment, so that the terminal monitors and acquires the second data retrieval key pair in the block chain equipment, encrypts the verification password by using the second data retrieval encryption key to obtain an encrypted verification password, and sends the encrypted verification password to the block chain equipment;
acquiring the encrypted verification password in the blockchain equipment;
decrypting the encrypted verification password by using the second data retrieval decryption key to obtain a decrypted verification password;
and if the decrypted authentication password is consistent with the pre-stored authentication password, sending the encrypted fragment data to the blockchain equipment for storage.
37. A data processing apparatus, characterized by comprising: a processor, a memory, and a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any one of claims 1-11.
38. A data processing apparatus, characterized by comprising: a processor, a memory, and a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any one of claims 12-18.
39. A computer-readable storage medium, having stored thereon a computer program for execution by a processor to perform the method of any one of claims 1-11.
40. A computer-readable storage medium, having stored thereon a computer program for execution by a processor to perform the method of any one of claims 12-18.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811556284.7A CN111338841A (en) | 2018-12-19 | 2018-12-19 | Data processing method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811556284.7A CN111338841A (en) | 2018-12-19 | 2018-12-19 | Data processing method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111338841A true CN111338841A (en) | 2020-06-26 |
Family
ID=71183220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811556284.7A Pending CN111338841A (en) | 2018-12-19 | 2018-12-19 | Data processing method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111338841A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112685793A (en) * | 2020-12-25 | 2021-04-20 | 联想(北京)有限公司 | Data processing method, device and system based on block chain |
CN112818338A (en) * | 2021-01-22 | 2021-05-18 | 支付宝(杭州)信息技术有限公司 | Program running method and system |
CN113722684A (en) * | 2021-03-29 | 2021-11-30 | 宋捷 | Data tracing method and device, electronic equipment and computer readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664223A (en) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | A kind of distributed storage method, device, computer equipment and storage medium |
CN108681583A (en) * | 2018-05-11 | 2018-10-19 | 北京奇虎科技有限公司 | Data proof of possession method, apparatus and readable storage medium storing program for executing based on block chain |
-
2018
- 2018-12-19 CN CN201811556284.7A patent/CN111338841A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681583A (en) * | 2018-05-11 | 2018-10-19 | 北京奇虎科技有限公司 | Data proof of possession method, apparatus and readable storage medium storing program for executing based on block chain |
CN108664223A (en) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | A kind of distributed storage method, device, computer equipment and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112685793A (en) * | 2020-12-25 | 2021-04-20 | 联想(北京)有限公司 | Data processing method, device and system based on block chain |
CN112818338A (en) * | 2021-01-22 | 2021-05-18 | 支付宝(杭州)信息技术有限公司 | Program running method and system |
CN113722684A (en) * | 2021-03-29 | 2021-11-30 | 宋捷 | Data tracing method and device, electronic equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110493197B (en) | Login processing method and related equipment | |
CN109347835B (en) | Information transmission method, client, server, and computer-readable storage medium | |
CN110519260B (en) | Information processing method and information processing device | |
CN109150835B (en) | Cloud data access method, device, equipment and computer readable storage medium | |
CN106612180B (en) | Method and device for realizing session identification synchronization | |
EP3324572B1 (en) | Information transmission method and mobile device | |
EP1415430B1 (en) | A method and a system for processing information in an electronic device | |
CN110519309B (en) | Data transmission method, device, terminal, server and storage medium | |
CN110990827A (en) | Identity information verification method, server and storage medium | |
CN107317677B (en) | Secret key storage and equipment identity authentication method and device | |
CN109714176B (en) | Password authentication method, device and storage medium | |
CN110690956B (en) | Bidirectional authentication method and system, server and terminal | |
CN107733636B (en) | Authentication method and authentication system | |
CN111104691A (en) | Sensitive information processing method and device, storage medium and equipment | |
CN110677382A (en) | Data security processing method, device, computer system and storage medium | |
CN110971593B (en) | Database secure network access method | |
CN113114668A (en) | Information transmission method, mobile terminal, storage medium and electronic equipment | |
CN111338841A (en) | Data processing method, device, equipment and storage medium | |
CN108667800B (en) | Access authority authentication method and device | |
CN112968774B (en) | Method, device storage medium and equipment for encrypting and decrypting configuration file | |
CN111291398B (en) | Block chain-based authentication method and device, computer equipment and storage medium | |
CN110807210B (en) | Information processing method, platform, system and computer storage medium | |
US9245097B2 (en) | Systems and methods for locking an application to device without storing device information on server | |
KR20130100032A (en) | Method for distributting smartphone application by using code-signing scheme | |
CN109286495B (en) | DCP public key protection method and device and HDCP equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200626 |