[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112788122A - Block chain based distributed trusted cloud node selection and verification method and system - Google Patents

Block chain based distributed trusted cloud node selection and verification method and system Download PDF

Info

Publication number
CN112788122A
CN112788122A CN202011628519.6A CN202011628519A CN112788122A CN 112788122 A CN112788122 A CN 112788122A CN 202011628519 A CN202011628519 A CN 202011628519A CN 112788122 A CN112788122 A CN 112788122A
Authority
CN
China
Prior art keywords
node
node equipment
block chain
module
selecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011628519.6A
Other languages
Chinese (zh)
Inventor
翟红鹰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Puhua Yunchuang Technology Beijing Co ltd
Original Assignee
Puhua Yunchuang Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Puhua Yunchuang Technology Beijing Co ltd filed Critical Puhua Yunchuang Technology Beijing Co ltd
Priority to CN202011628519.6A priority Critical patent/CN112788122A/en
Publication of CN112788122A publication Critical patent/CN112788122A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a block chain-based distributed trusted cloud node selection and verification method and system. The method comprises the following steps: selecting idle storage equipment which meets a preset interface specification as node equipment; generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment; selecting corresponding node equipment according to a screening rule; the screened node equipment carries out receiving and sending operation of the slicing file according to the identification code; and the screened node equipment performs storage operation of the slice file according to the serial number. The technical scheme of the invention can finally achieve the effects of relative credibility of the nodes and absolute credibility of the files to a certain degree.

Description

Block chain based distributed trusted cloud node selection and verification method and system
Technical Field
The invention relates to the field of a block chain technology and a distributed cloud storage technology, in particular to a block chain-based distributed trusted cloud node selection and verification method and system.
Background
The following concepts exist in the related art of the present invention:
1. cloud storage technology.
Cloud storage is a new concept extended and developed on the cloud computing (cloud computing) concept, is an emerging network storage technology, and refers to a system which integrates a large number of various types of storage devices in a network through application software to cooperatively work through functions such as cluster application, network technology or distributed file system and the like, and provides data storage and service access functions to the outside. A typical cloud storage framework includes three core hierarchies: the system comprises a storage layer, a basic management layer and an application interface layer.
The storage tier is the most basic part of cloud storage. The storage device may be an FC fibre channel storage device, an IP storage device such as NAS and iSCSI, or a DAS storage device such as SCSI or SAS. A unified storage device management system is arranged on the storage device, and can realize logic virtualization management and multilink redundancy management of the storage device, and state monitoring and fault maintenance of hardware devices.
The basic management layer is the most core part of the cloud storage and is the most difficult part to realize in the cloud storage. The basic management layer realizes cooperative work among a plurality of storage devices in cloud storage through technologies such as clustering, a distributed file system and grid computing, so that the plurality of storage devices can provide the same service to the outside and provide stronger and better data access performance. The CDN content delivery system and the data encryption technology ensure that data in the cloud storage cannot be accessed by unauthorized users, meanwhile, the data in the cloud storage cannot be lost through various data backup and disaster recovery technologies and measures, and the safety and stability of the cloud storage are ensured.
The application interface layer is the most flexible and changeable part of the cloud storage. Different cloud storage operation units can develop different application service interfaces according to actual service types and provide different application services. Such as video surveillance application platforms, IPTV and video-on-demand application platforms, network hard disk application platforms, remote data backup application platforms, and the like. Any authorized user can log in the cloud storage system through a standard public application interface to enjoy the cloud storage service. The cloud storage has different operation units, and the access types and access means provided by the cloud storage are different.
2. Block chaining techniques.
Blockchain technology began in the middle school and is now a global development hotspot. The blockchain technology is a brand new distributed infrastructure and computing mode that uses blockchain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to secure data transmission and access, and uses intelligent contracts composed of automated script codes to program and manipulate data.
Generally, a blockchain system consists of a data layer, a network layer, a consensus layer, a stimulus layer, a contract layer, and an application layer. The data layer encapsulates a bottom layer data block, basic data such as related data encryption and time stamp and a basic algorithm; the network layer comprises a distributed networking mechanism, a data transmission mechanism, a data verification mechanism and the like; the consensus layer mainly encapsulates various consensus algorithms of the network nodes; the incentive layer integrates economic factors into a block chain technology system, and mainly comprises an economic incentive issuing mechanism, an economic incentive distributing mechanism and the like; the contract layer mainly encapsulates various scripts, algorithms and intelligent contracts and is the basis of the programmable characteristic of the block chain; the application layer encapsulates various application scenarios and cases of the blockchain. In the model, a chained block structure based on a timestamp, a consensus mechanism of distributed nodes, economic excitation based on consensus computing power and a flexible programmable intelligent contract are the most representative innovation points of the block chain technology.
3. P2P peer-to-peer networking technology.
The P2P network is a peer-to-peer network. A Peer-to-Peer computer network is a distributed application architecture that distributes tasks and workloads among peers (peers), and is a networking or networking form of the Peer-to-Peer computing model formed at the application layer. "Peer" has the meaning of "Peer, partner, Peer" in English. Thus, literally, P2P may be understood as a peer-to-peer computing or peer-to-peer network. Some media in the country translate P2P into "peer-to-peer" or "end-to-end". The academic community is collectively called Peer-to-Peer networking (Peer-to-Peer computing) or Peer-to-Peer computing (Peer-to-Peer computing), which can be defined as: participants of the network share a portion of the hardware resources (processing power, storage power, network connectivity, printers, etc.) they own, which provide services and content over the network and which can be accessed directly by other Peer nodes (peers) without going through intermediate entities. The participants in this network are both providers (servers) and acquirers (clients) of resources, services and content.
In the related art, distributed cloud storage devices popular in the market are high-standard hardware products produced by service providers. If a user wants to contribute to the spare network bandwidth, the user needs to invest a large amount of financial resources to purchase hardware equipment to participate.
Therefore, there is a need to provide a new method and system for selecting and checking a distributed trusted cloud node based on a block chain to solve the above technical problems.
Disclosure of Invention
The invention mainly aims to provide a selection and verification method and a system of distributed trusted cloud nodes based on a block chain, and aims to solve the technical problems that in the related technology, the storage resources of idle storage equipment are idle and wasted, and the participation cost of distributed cloud storage is too high.
In order to achieve the above object, the method for selecting and checking a distributed trusted cloud node based on a block chain provided by the present invention comprises the following steps:
selecting idle storage equipment which meets a preset interface specification as node equipment;
generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment;
selecting corresponding node equipment according to a screening rule;
the screened node equipment carries out receiving and sending operation of the slicing file according to the identification code;
and the screened node equipment performs storage operation of the slice file according to the serial number.
Preferably, the method further comprises the following steps:
acquiring the slice files in all operations of the node equipment, and checking the authenticity of the slice files;
and when the slice file is not verified, sending a corresponding distortion alarm signal.
Preferably, the method further comprises the following steps:
acquiring behavior data of all operations of the node equipment on the slice file, and judging whether the behavior data is benign to increase;
transmitting reward points to the node device when the behavioral data is benign growing.
Preferably, the step of selecting the corresponding node device according to the screening rule specifically includes:
and counting the reward points of the node equipment, and selecting the corresponding node equipment according to the counting condition of the reward points.
Preferably, the method further comprises the following steps:
and responding to the transaction request, and performing circulation transaction on the reward points among the node devices.
In order to solve the above technical problem, the present invention further provides a block chain-based distributed trusted cloud node selection and verification system, including:
the node selection module is used for selecting idle storage equipment which meets a preset interface specification as node equipment;
the node trusted module is used for generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment;
the screening module is used for selecting the corresponding node equipment according to a screening rule;
the receiving and sending module is used for receiving and sending the sliced file by the screened node equipment according to the identification code;
and the storage module is used for storing the slice file by the node equipment after screening according to the serial number.
Preferably, the system further comprises a file checking module;
the file checking module is used for acquiring the slice files in all operations of the node equipment and checking the authenticity of the slice files;
and when the slice file is not verified, sending a corresponding distortion alarm signal.
Preferably, the mobile terminal further comprises a behavioral uplink module;
the behavior uplink module is used for acquiring behavior data of all operations of the node equipment on the slice file and judging whether the behavior data is benign to increase;
transmitting reward points to the node device when the behavioral data is benign growing.
Preferably, the screening module is specifically configured to:
and counting the reward points of the node equipment, and selecting the corresponding node equipment according to the counting condition of the reward points.
Preferably, the system further comprises a transaction module;
the transaction module is used for responding to transaction requests and conducting circulation transaction on reward points among the node devices.
According to the block chain-based distributed credible cloud node selection and verification method and system, the vacant network bandwidth and storage resources of the nodes are integrated, so that benefits are brought to the node contributors, and a cloud storage service with lower price is provided for storage users. The participation cost of the node contributors is reduced, and the use cost of service users is also reduced.
The invention can utilize the low-price storage equipment such as a computer idle by a user, a local disk of the computer, a mobile hard disk, a U disk, a TF card and the like when the node is selected, thereby reducing the participation cost of the node contributors and further reducing the use cost of a service user. But the relative credibility of the nodes and the absolute credibility of the files are also ensured by utilizing the block chain technology.
Drawings
Fig. 1 is a flowchart of a first embodiment of a method for selecting and checking a distributed trusted cloud node based on a block chain according to the present invention;
fig. 2 is a flowchart of a second embodiment of a method for selecting and checking a distributed trusted cloud node based on a block chain according to the present invention;
fig. 3 is a flowchart illustrating a third embodiment of a method for selecting and checking a distributed trusted cloud node based on a block chain according to the present invention;
fig. 4 is a flowchart illustrating a fourth embodiment of a method for selecting and checking a distributed trusted cloud node based on a block chain according to the present invention;
fig. 5 is an architecture diagram of a block chain-based distributed trusted cloud node selection and verification system provided by the present invention.
The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a block chain-based distributed trusted cloud node selection and verification method.
First embodiment
Referring to fig. 1, to achieve the above object, in a first embodiment of the present invention, a method 100 for selecting and checking a distributed trusted cloud node based on a block chain includes the following steps:
s01, selecting idle storage equipment which meets the preset interface specification as node equipment;
in this embodiment, the node device only needs to be a hardware device that meets the interface specification of the universal standard, and the device is connected to the internet and has a sufficient storage space. The storage device can be a computer device with a local disk, a mobile hard disk, a U disk or a TF card, and can also be an embedded device with enough storage space.
S02, generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment;
specifically, the cloud platform generates a unique identification code for each device added to the node network according to hardware characteristics of the device, and also generates a serial number for a storage device (such as a local disk, a usb disk, and the like) connected to the node.
It can be understood that, in subsequent work, only the node with the unique identification code can be added into the node network to receive and send the slice file of the cloud platform, and only the serial number is qualified to store the slice file through the storage device of the cloud platform.
S03, selecting the corresponding node device according to the screening rule;
in this embodiment, the filtering rule is a user preset rule for comparing and selecting node devices. For example, node devices are ranked by score according to relevant behavior.
S04, the screened node equipment receives and transmits the slicing file according to the identification code;
it should be understood that the transceiving operation referred to in this embodiment, i.e. the receiving and sending operation, may also be referred to as an uploading and downloading operation.
And S05, the screened node equipment performs storage operation of the slice file according to the serial number.
Second embodiment
Referring to fig. 2, based on a block chain-based method 100 for selecting and checking a distributed trusted cloud node according to a first embodiment of the present invention, the present invention provides another block chain-based method 200 for selecting and checking a distributed trusted cloud node, where steps S01 to S05 of the method are the same as those of the first embodiment, and are not described herein again, and the difference is that the method further includes the following steps:
s06, acquiring the slice file in all operations of the node equipment, and checking the authenticity of the slice file;
s07, when the slice file is not verified, a corresponding distortion alarm signal is issued.
Although the nodes and the devices connected with the nodes are already recorded with identification codes and serial numbers in the previous steps, the relatively trusted nodes cannot provide absolutely trusted slice files for the cloud platform.
The cloud platform also needs to check the authenticity of data of each slice file to be issued or collected.
For the authenticity of file data, digest algorithms such as MD5, SHA1, SHA256 and the like can be used for comparison to ensure that the data stored by the trusted node cannot lose authenticity due to tampering by malicious nodes or packet loss in network transmission.
For example: when the slicing file is issued or collected, the sender simultaneously sends the MD5 value of the slicing file, and the receiver checks the consistency of the file content and the MD5 value (or checks the SHA1 and SHA256 values according to the service requirement). The method is used for ensuring that the data stored by the trusted node cannot lose authenticity due to tampering by a malicious node or packet loss in network transmission.
Third embodiment
Referring to fig. 3, based on a method 200 for selecting and checking a distributed trusted cloud node based on a block chain according to a second embodiment of the present invention, the present invention provides another method 300 for selecting and checking a distributed trusted cloud node based on a block chain, where steps S01 to S07 of the method are the same as those of the second embodiment, and are not described herein again, and the difference is that the method further includes the following steps:
s08, acquiring behavior data of all operations of the node equipment on the slice file, and judging whether the behavior data is benign to increase;
s09, sending reward points to the node device when the behavior data is benign growing.
In order to reduce the participation cost of contributors during node selection, the performance limit on node hardware equipment is relaxed, and some equipment with low performance inevitably affects the rapid transmission of the slice files in the whole node network.
By using the block chain technology, the behavior data (such as the online time of the nodes, the stability of the network, the size of the storage space, the command response rate, the size of the network bandwidth and the authenticity of the transmitted data) of the uploaded and downloaded slice files of each node are recorded. For nodes with good performance data, the cloud platform allocates more data storage and transmission rights, so that the cloud platform is rewarded with more points to stimulate node contributors to provide more credible hardware devices for the whole node network.
In this embodiment, the step S03 specifically includes:
and counting the reward points of the node equipment, and selecting the corresponding node equipment according to the counting condition of the reward points.
For contributors who provide trusted nodes, the cloud platform will give certain platform credit rewards after issuing or collecting the slice files to its nodes.
The contributors can exchange points for cloud storage services provided by the cloud platform, and can sell the points to other persons or organizations needing to purchase the cloud services.
When the cloud platform issues or collects the slice files, the nodes with good performance data are preferentially selected, and more data storage and transmission rights are distributed to the nodes. For example: the node behavior data of the contributor A is 80 minutes, the node behavior data of the contributor B is 20 minutes, the cloud platform issues more slicing files to the node of the contributor A, and more slicing files are collected from the node of the contributor A when the slicing files are collected. Contributor a can receive more bonus points. By the method, contributors providing nodes with good behavior data can acquire more points, so that the contributors of the nodes are stimulated to provide more credible hardware equipment for the whole node network.
Fourth embodiment
Referring to fig. 4, based on the method 300 for selecting and checking a distributed trusted cloud node based on a block chain according to the third embodiment of the present invention, the present invention provides another method 400 for selecting and checking a distributed trusted cloud node based on a block chain, where steps S01 to S09 of the method are the same as those of the third embodiment, and are not described herein again, and the difference is that:
also comprises the following steps:
and S10, responding to the transaction request, and performing circulation transaction on the reward points among the node devices.
The contributors can exchange the points for the cloud storage service provided by the cloud platform, and the points can be sold to other people or organizations needing to purchase the cloud service, so that the transaction circulation of the points is increased, and the public credibility of the points is improved.
The invention provides a block chain-based distributed trusted cloud node selection and verification method, which has the following innovation points:
the innovation point is as follows: the nodes are relatively credible, and the files are absolutely credible. The unique identification code is generated for the equipment in the node network, and the serial number is generated for the storage equipment connected with the node, and the node is relatively credible after being put on record. The MD5, SHA1 and SHA256 are used for comparing the summaries of the uploaded and downloaded slice files, so that the absolute credibility of the files is guaranteed.
The innovation point is two: the participation cost is low, and the participation degree of the contributors is high. The performance limit on node hardware equipment is properly relaxed, the participation cost of contributors is reduced, and the participation degree is improved. And a block chain technology is applied, node behavior data are recorded, and higher point reward is provided for high-quality credible nodes, so that contributors are driven to provide higher-performance hardware equipment.
The invention also provides a system for selecting and checking the distributed credible cloud nodes based on the block chain.
Referring to fig. 5, to achieve the above object, in an embodiment of the present invention, a system for selecting and checking a distributed trusted cloud node based on a block chain includes:
the node selection module is used for selecting idle storage equipment which meets a preset interface specification as node equipment;
in this embodiment, the node device only needs to be a hardware device that meets the interface specification of the universal standard, and the device is connected to the internet and has a sufficient storage space. The storage device can be a computer device with a local disk, a mobile hard disk, a U disk or a TF card, and can also be an embedded device with enough storage space.
The node trusted module is used for generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment;
specifically, the cloud platform generates a unique identification code for each device added to the node network according to hardware characteristics of the device, and also generates a serial number for a storage device (such as a local disk, a usb disk, and the like) connected to the node.
It can be understood that, in subsequent work, only the node with the unique identification code can be added into the node network to receive and send the slice file of the cloud platform, and only the serial number is qualified to store the slice file through the storage device of the cloud platform.
The screening module is used for selecting the corresponding node equipment according to a screening rule;
in this embodiment, the filtering rule is a user preset rule for comparing and selecting node devices. For example, node devices are ranked by score according to relevant behavior.
The receiving and sending module is used for receiving and sending the sliced file by the screened node equipment according to the identification code;
it should be understood that the transceiving operation referred to in this embodiment, i.e. the receiving and sending operation, may also be referred to as an uploading and downloading operation.
And the storage module is used for storing the slice file by the node equipment after screening according to the serial number.
As a preferred mode of this embodiment, the block chain-based distributed trusted cloud node selection and verification system further includes a file verification module;
the file checking module is used for acquiring the slice files in all operations of the node equipment and checking the authenticity of the slice files;
and when the slice file is not verified, sending a corresponding distortion alarm signal.
Although the nodes and the devices connected with the nodes are already provided with identification codes and serial numbers in the modules, the relatively trusted nodes cannot provide absolutely trusted slice files for the cloud platform.
The cloud platform also needs to check the authenticity of data of each slice file to be issued or collected.
For the authenticity of file data, digest algorithms such as MD5, SHA1, SHA256 and the like can be used for comparison to ensure that the data stored by the trusted node cannot lose authenticity due to tampering by malicious nodes or packet loss in network transmission.
For example: when the slicing file is issued or collected, the sender simultaneously sends the MD5 value of the slicing file, and the receiver checks the consistency of the file content and the MD5 value (or checks the SHA1 and SHA256 values according to the service requirement). The method is used for ensuring that the data stored by the trusted node cannot lose authenticity due to tampering by a malicious node or packet loss in network transmission.
As a preferred mode of this embodiment, the system for selecting and checking a distributed trusted cloud node based on a block chain further includes a chain behavior module;
the behavior uplink module is used for acquiring behavior data of all operations of the node equipment on the slice file and judging whether the behavior data is benign to increase;
transmitting reward points to the node device when the behavioral data is benign growing.
In order to reduce the participation cost of contributors during node selection, the performance limit on node hardware equipment is relaxed, and some equipment with low performance inevitably affects the rapid transmission of the slice files in the whole node network.
By using the block chain technology, the behavior data (such as the online time of the nodes, the stability of the network, the size of the storage space, the command response rate, the size of the network bandwidth and the authenticity of the transmitted data) of the uploaded and downloaded slice files of each node are recorded. For nodes with good performance data, the cloud platform allocates more data storage and transmission rights, so that the cloud platform is rewarded with more points to stimulate node contributors to provide more credible hardware devices for the whole node network.
Specifically, the screening module is specifically configured to:
and counting the reward points of the node equipment, and selecting the corresponding node equipment according to the counting condition of the reward points.
For contributors who provide trusted nodes, the cloud platform will give certain platform credit rewards after issuing or collecting the slice files to its nodes.
The contributors can exchange points for cloud storage services provided by the cloud platform, and can sell the points to other persons or organizations needing to purchase the cloud services.
When the cloud platform issues or collects the slice files, the nodes with good performance data are preferentially selected, and more data storage and transmission rights are distributed to the nodes. For example: the node behavior data of the contributor A is 80 minutes, the node behavior data of the contributor B is 20 minutes, the cloud platform issues more slicing files to the node of the contributor A, and more slicing files are collected from the node of the contributor A when the slicing files are collected. Contributor a can receive more bonus points. By the method, contributors providing nodes with good behavior data can acquire more points, so that the contributors of the nodes are stimulated to provide more credible hardware equipment for the whole node network.
As a preferred mode of this embodiment, the system for selecting and verifying a distributed trusted cloud node based on a block chain further includes a transaction module;
the transaction module is used for responding to transaction requests and conducting circulation transaction on reward points among the node devices.
The contributors can exchange the points for the cloud storage service provided by the cloud platform, and the points can be sold to other people or organizations needing to purchase the cloud service, so that the transaction circulation of the points is increased, and the public credibility of the points is improved.
The invention provides a block chain-based distributed trusted cloud node selection and verification system, which has the following innovation points:
the innovation point is as follows: the nodes are relatively credible, and the files are absolutely credible. The unique identification code is generated for the equipment in the node network, and the serial number is generated for the storage equipment connected with the node, and the node is relatively credible after being put on record. The MD5, SHA1 and SHA256 are used for comparing the summaries of the uploaded and downloaded slice files, so that the absolute credibility of the files is guaranteed.
The innovation point is two: the participation cost is low, and the participation degree of the contributors is high. The performance limit on node hardware equipment is properly relaxed, the participation cost of contributors is reduced, and the participation degree is improved. And a block chain technology is applied, node behavior data are recorded, and higher point reward is provided for high-quality credible nodes, so that contributors are driven to provide higher-performance hardware equipment.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a computer-readable storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions for enabling a terminal device to enter the method according to the embodiments of the present invention.
In the description herein, references to the description of the term "one embodiment," "another embodiment," or "first through xth embodiments," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, method steps, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A distributed credible cloud node selection and verification method based on a block chain is characterized by comprising the following steps:
selecting idle storage equipment which meets a preset interface specification as node equipment;
generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment;
selecting corresponding node equipment according to a screening rule;
the screened node equipment carries out receiving and sending operation of the slicing file according to the identification code;
and the screened node equipment performs storage operation of the slice file according to the serial number.
2. The method for block chain based distributed trusted cloud node selection and verification according to claim 1, further comprising the steps of:
acquiring the slice files in all operations of the node equipment, and checking the authenticity of the slice files;
and when the slice file is not verified, sending a corresponding distortion alarm signal.
3. The method for block chain based distributed trusted cloud node selection and verification according to claim 2, further comprising the steps of:
acquiring behavior data of all operations of the node equipment on the slice file, and judging whether the behavior data is benign to increase;
transmitting reward points to the node device when the behavioral data is benign growing.
4. The method for selecting and verifying the distributed trusted cloud nodes based on the blockchain according to claim 3, wherein the step of selecting the corresponding node device according to the screening rule specifically includes:
and counting the reward points of the node equipment, and selecting the corresponding node equipment according to the counting condition of the reward points.
5. The method for block chain based distributed trusted cloud node selection and verification according to claim 4, further comprising the steps of:
and responding to the transaction request, and performing circulation transaction on the reward points among the node devices.
6. A system for selecting and checking distributed trusted cloud nodes based on a block chain is characterized by comprising:
the node selection module is used for selecting idle storage equipment which meets a preset interface specification as node equipment;
the node trusted module is used for generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment;
the screening module is used for selecting the corresponding node equipment according to a screening rule;
the receiving and sending module is used for receiving and sending the sliced file by the screened node equipment according to the identification code;
and the storage module is used for storing the slice file by the node equipment after screening according to the serial number.
7. The block chain based distributed trusted cloud node selection and verification system of claim 1, further comprising a file verification module;
the file checking module is used for acquiring the slice files in all operations of the node equipment and checking the authenticity of the slice files;
and when the slice file is not verified, sending a corresponding distortion alarm signal.
8. The block chain based distributed trusted cloud node selection and verification system of claim 7, further comprising a chain of activities module;
the behavior uplink module is used for acquiring behavior data of all operations of the node equipment on the slice file and judging whether the behavior data is benign to increase;
transmitting reward points to the node device when the behavioral data is benign growing.
9. The block chain-based distributed trusted cloud node selection and verification system of claim 8, wherein the screening module is specifically configured to:
and counting the reward points of the node equipment, and selecting the corresponding node equipment according to the counting condition of the reward points.
10. The blockchain-based distributed trusted cloud node selection and verification system of claim 9, further comprising a transaction module;
the transaction module is used for responding to transaction requests and conducting circulation transaction on reward points among the node devices.
CN202011628519.6A 2020-12-30 2020-12-30 Block chain based distributed trusted cloud node selection and verification method and system Pending CN112788122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011628519.6A CN112788122A (en) 2020-12-30 2020-12-30 Block chain based distributed trusted cloud node selection and verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011628519.6A CN112788122A (en) 2020-12-30 2020-12-30 Block chain based distributed trusted cloud node selection and verification method and system

Publications (1)

Publication Number Publication Date
CN112788122A true CN112788122A (en) 2021-05-11

Family

ID=75754646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011628519.6A Pending CN112788122A (en) 2020-12-30 2020-12-30 Block chain based distributed trusted cloud node selection and verification method and system

Country Status (1)

Country Link
CN (1) CN112788122A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113435307A (en) * 2021-06-23 2021-09-24 国网天津市电力公司 Operation and maintenance method, system and storage medium based on visual identification technology

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194718A (en) * 2018-08-09 2019-01-11 玄章技术有限公司 A kind of block chain network and its method for scheduling task
US20190158593A1 (en) * 2017-11-17 2019-05-23 Bank Of America Corporation System for generating distributed cloud data storage on disparate devices
CN110011981A (en) * 2019-03-15 2019-07-12 湖北工程学院 A blockchain-based trusted cloud storage method and system
CN110365766A (en) * 2019-07-12 2019-10-22 全链通有限公司 Cloud storage method, equipment and computer readable storage medium based on block chain
CN110399338A (en) * 2019-04-13 2019-11-01 西安电子科技大学 Blockchain-based distributed file indexing system and method, cloud storage server
CN110633578A (en) * 2019-08-26 2019-12-31 苏州全时空信息技术有限公司 Intelligent shared cloud storage method and system
CN111611598A (en) * 2020-04-16 2020-09-01 浪潮云信息技术股份公司 A method, device and medium for realizing a secure distributed cloud storage service based on blockchain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190158593A1 (en) * 2017-11-17 2019-05-23 Bank Of America Corporation System for generating distributed cloud data storage on disparate devices
CN109194718A (en) * 2018-08-09 2019-01-11 玄章技术有限公司 A kind of block chain network and its method for scheduling task
CN110011981A (en) * 2019-03-15 2019-07-12 湖北工程学院 A blockchain-based trusted cloud storage method and system
CN110399338A (en) * 2019-04-13 2019-11-01 西安电子科技大学 Blockchain-based distributed file indexing system and method, cloud storage server
CN110365766A (en) * 2019-07-12 2019-10-22 全链通有限公司 Cloud storage method, equipment and computer readable storage medium based on block chain
CN110633578A (en) * 2019-08-26 2019-12-31 苏州全时空信息技术有限公司 Intelligent shared cloud storage method and system
CN111611598A (en) * 2020-04-16 2020-09-01 浪潮云信息技术股份公司 A method, device and medium for realizing a secure distributed cloud storage service based on blockchain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113435307A (en) * 2021-06-23 2021-09-24 国网天津市电力公司 Operation and maintenance method, system and storage medium based on visual identification technology

Similar Documents

Publication Publication Date Title
CN110417558B (en) Signature verification method and device, storage medium and electronic device
US8843637B2 (en) Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage nodes
US20190036895A1 (en) Data distribution over nodal elements
US10977088B2 (en) Selecting a resource manager to satisfy a service request
Conner et al. A trust management framework for service-oriented environments
TWI387284B (en) Method and system for credit-based peer-to-peer storage, and computer storage medium for recording related instructions thereon
CN106506668B (en) A method of object storage is realized based on distributed storage
CN102947797A (en) Online service access controls using scale out directory features
CN113505354B (en) Data processing method, device and storage medium
CN104008028A (en) Intelligent mobile terminal data storage and backup method and system based on multi-cloud storage
KR102500069B1 (en) Method and apparatus for providing a multiplayer room, and device and medium
CN110266872A (en) Management-control method, device and the cloud address book system of address book data
CN113360458B (en) Distributed file storage sharing system based on alliance chain
US11057209B2 (en) Methods and systems that efficiently and securely store data
CN103533087A (en) Cloud service platform middleware and cloud uploading method
CN111476572A (en) Data processing method and device based on block chain, storage medium and equipment
CN110138881A (en) A kind of distributed memory system and its storage method
CN111353172B (en) Hadoop cluster big data access method and system based on block chain
Arslan et al. Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming
CN114553912A (en) Health file sharing method, system, equipment and storage medium based on block chain
CN112448946A (en) Log auditing method and device based on block chain
CN101977243A (en) Cloud data storage distribution (CDSD)
CN112788122A (en) Block chain based distributed trusted cloud node selection and verification method and system
Li et al. SoK: Decentralized storage network
Jogdand et al. CSaaS-a multi-cloud framework for secure file storage technology using open ZFS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210511

WD01 Invention patent application deemed withdrawn after publication