CN106295406A - A kind of block chain that is used for is from safe storage system and method thereof - Google Patents
A kind of block chain that is used for is from safe storage system and method thereof Download PDFInfo
- Publication number
- CN106295406A CN106295406A CN201610665287.9A CN201610665287A CN106295406A CN 106295406 A CN106295406 A CN 106295406A CN 201610665287 A CN201610665287 A CN 201610665287A CN 106295406 A CN106295406 A CN 106295406A
- Authority
- CN
- China
- Prior art keywords
- file
- transaction
- data
- storage system
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a kind of for block chain from safe storage system and method thereof, including (1) finger daemon module, be arranged on client, for for file access services;(2) former data evolution module, for one redaction of former data creation for each access file;(3) besel, for getting off all data and former data recording, for tracing to the source and analyzing the access that any discomfort is suitable;(4) transaction data completeness maintaining module, for there is the invasion under besel monitors any time, system ensure that the integrity of the All Activity data at place is selected in invasion;(5) isolation module, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, and described transaction file can lose transaction data in phagocytic process, and the file after the unwitting access of user will not be allowed to be changed by invader.Use this block chain from safe storage system and method, the same files that recovery that can be the most complete is invaded.
Description
Technical field
The present invention relates to the transaction data safety problem of block chain, a kind of block chain from safe storage system and
Its method.
Background technology
The appearance of bit coin in 2009 brings a kind of subversive achievement--and block chain technology, block chain is a safety
Account book class data base, be made up of data block one by one, user can this constantly update upgrading platform search number
According to, for financial institution, block chain can accelerate trading processing process, reduce cost, reduce go-between, improve market see clearly
Power, increases business transparency.
Calculating and storage are two big basic tasks of computer system, along with the explosive increase of information, memory unit meeting
Experience direct-connected storage based on Single-Server, store to cluster grid based on LAN, finally develop into based on wide area network
Data grids, block chain technology is the least significant end of development at present, and the intrinsic speciality of this data storage medium includes intelligentized
Storage, storage service quality can ensure that applies offer service differentiation and performance guarantee for user, and storage is OO sea
Amount stores, and the network storage must assure that it is that secret is complete and safe, and existing the Internet does not also have well or side
Just way ensure the data in block chain transmitting procedure and preserve the confidentiality of data on a storage device, integrity, can
With property, non repudiation and the unfailing performance of whole network store system, the most in recent years block chain reliable computing technology
Generation, to the network storage safety higher requirement is proposed again.
Summary of the invention
It is an object of the invention to provide a kind of for block chain from safe storage system and method thereof, including: (1) is kept
Protect scheduler module, be arranged on client, be used for as file access services;(2) former data evolution module, for accessing literary composition for each
One redaction of the former data creation of part;(3) besel, for getting off all data and former data recording, except record is each
Planting outside the dominant write operation of amendment data, the access to file all can be recorded by updating the daily record of file every time,
For tracing to the source and analyzing the access that any discomfort is suitable;(4) transaction data completeness maintaining module, for occurring at any time
Invasion under besel monitors, system ensure that the integrity of the All Activity data at place is selected in invasion;(5) isolation mode
Block, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, described transaction file is at phagocytic process
In can lose transaction data, and the file after the unwitting access of user will not be allowed to be changed by invader.
Preferably, also include that a secondary transaction data recovers module, be used for recovering occur when invasion and find invasion
Between the transaction data that caused of legal change lose.
Preferably, last before transaction file can return to invasion reliably accesses, and single in checking
After the access log of transaction file, without finding unfavorable exception record, these transaction files can be by the most extensive
Multiple.
Preferably, carrying out recording transaction file in terms of time and space two, a kind of is to use former transaction based on daily record
Data time writing-method, the second is binary tree spatial registration method based on multi version daily record.
Preferably, the module that guarantee confidentiality is not provided from safe storage system of block chain, it is assumed that these are from safe magnetic
Dish and one use the transaction file server of standard authentication protocol to connect, and all are sent to this request from safe storage system
Need not extra certification and encryption.
Use this block chain from safe storage system, the transaction data literary composition that recovery that can be the most complete is invaded
Part.
The present invention's.
According to below in conjunction with the accompanying drawing detailed description to the specific embodiment of the invention, those skilled in the art will be brighter
Above-mentioned and other purposes, advantage and the feature of the present invention.
Accompanying drawing explanation
Describe some specific embodiments of the present invention the most by way of example, and not by way of limitation in detail.
Reference identical in accompanying drawing denotes same or similar parts or part.It should be appreciated by those skilled in the art that these
Accompanying drawing is not necessarily drawn to scale.The target of the present invention and feature will be apparent from view of the description below in conjunction with accompanying drawing,
In accompanying drawing:
Fig. 1 is that the block chain according to the embodiment of the present invention is from the structural representation of safe storage system.
Detailed description of the invention
Before carrying out the explanation of detailed description of the invention, the content discussed for apparent expression, first define
Some very important concepts.
Transaction: the essence of transaction is a relational data structure, comprises transaction participant's value Transfer in this data structure
Relevant information.These Transaction Informations are referred to as ledger of keeping accounts.Transaction need to create through three, verify, write block chain.Hand over
Easily have to pass through digital signature, it is ensured that the legitimacy of transaction.
Block: all of Transaction Information is deposited in block, a Transaction Information is exactly a record, as an independence
Record deposit in block chain.Block is made up of block head and data division, and block head field comprises each of block itself
Plant characteristic, the most previous block information, merkle value and timestamp etc..Wherein block head cryptographic Hash and block height are tag slots
The topmost two indices of block.Block primary identifier is its cryptographic hash, and one carries out two by SHA algorithm to block head
Secondary Hash calculation and the digital finger-print that obtains.The 32 byte cryptographic Hash produced are referred to as block cryptographic Hash, or block head Hash
Value, only block head are used for calculating.Block cryptographic Hash can uniquely, specifically identify a block, and any node leads to
Cross and simply block head is carried out Hash calculation can obtain this block cryptographic Hash independently.
Block chain: the data structure being chained up in order according to chain structure by block.Block chain is vertical just as one
Storehouse, first block is placed on other blocks as the first block at the bottom of stack, the most each block.When block writes
To change never after block chain, and backup on other block chain server.
Embodiment:
The confidentiality of any system the most all can be broken, and therefore primary goal is to prevent transaction data from being destroyed,
And by detection and the source of diagnosis capture invasion block catenary system.See Fig. 1, a kind of storing from safety for block chain
System, storage principle based on the distrust to host operating system, need some basic computings to manage file system, visitor
Family end installs a finger daemon module, serves file access.Should not provide from safe storage system and ensured arranging of confidentiality
Execute, it is assumed that these use the transaction file server of standard authentication protocol to connect from security disk and one, all be sent to
Extra certification and encryption should be need not from the request of safe storage system.
Block chain include former data evolution module from safe storage system, for for each access file former data create
Build a redaction.
And also include a besel, for all data and former data recording being got off, except recording various amendment
Outside the dominant write operation of data, the access to file all can be recorded by updating the daily record of file every time, so appoints
What unfavorable access can be traced to the source and analyzed, and once arranges besel, the most inevitable close to prison off guard during data
Depending on, thus get rid of invader in the way of not detectable, change data.Also include transaction data completeness maintaining module, for right
Invasion under besel monitors occurs at any time, and system ensure that the complete of the All Activity data at invasion point
Property, by detailed record, after block chain manager finds invasion, it is last that file can return to before invasion reliably
One access, additionally, after the access log verifying single transaction file, without finding unfavorable exception record, this
A little transaction files can intactly be recovered.
Also including isolation module, those are queried the in-problem transaction file of degree of belief and will be lost in phagocytic process
By from the interrupter of safe storage system, transaction data, guarantees that user can not receive these problematic files, and will not
File after allowing the unwitting access of user be changed by invader.
Can also include that a secondary transaction data recovers module, be used for recovering to occur when invasion and find between invasion
The transaction data that caused of legal change lose, thus improve transaction data availability, minimization of loss.
Being required for doing a daily record in view of accessing for each transaction file, the present embodiment was carried out in terms of time and space two
Record, a kind of is to use former transaction data chronography based on daily record, and the second is binary system based on multi version daily record
Tree spatial registration method.From the point of view of recovery time of transaction data after the invasion to certain a transaction file and recovery, should
System is obtained in that the speed improvement than legacy system more than about 1 times, and 100% recovers transaction data.
Although the present invention is described by reference to specific illustrative embodiment, but will not be by these embodiments
Restriction and only limited by accessory claim.Skilled artisan would appreciate that can be without departing from the present invention's
In the case of protection domain and spirit, embodiments of the invention can be modified and revise.
Claims (10)
1. one kind for block chain from safe storage system, it is characterised in that including:
(1) finger daemon module, is arranged on client, is used for as file access services;
(2) former data evolution module, for one redaction of former data creation for each access file;
(3) besel, for getting off all data and former data recording, except recording the dominant write operation of various amendment data
Outward, the access to file all can be recorded by updating the daily record of file every time, is used for tracing to the source and analyzing any discomfort
Suitable access;
(4) transaction data completeness maintaining module, for the invasion occurred at any time under besel monitors, system energy
Enough integrity ensureing to select the All Activity data at place to invasion;
(5) isolation module, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, described transaction literary composition
Part can lose transaction data in phagocytic process, and the file after the unwitting access of user will not be allowed to be changed by invader.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that: also include one
Secondary transaction data recovers module, the transaction that the legal change for recovering to occur when invasion and find between invasion is caused
Loss of data.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that:, described transaction
Last before file can return to invasion reliably accesses, and is verifying the access log of single transaction file
After, without finding unfavorable exception record, these transaction files can intactly be recovered.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that: from time and sky
Between two aspects carry out recording described transaction file, a kind of is to use former transaction data chronography based on daily record, the second
It it is binary tree spatial registration method based on multi version daily record.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that: described block chain
The module ensureing confidentiality is not provided from safe storage system, it is assumed that these use standard authentication association from security disk and one
The transaction file server of view connects, and all are sent to this and need not extra certification from the request of safe storage system and add
Close.
6. one kind for block chain from safe storage system, it is characterised in that comprise the steps:
(1) finger daemon module, is arranged on client, is used for as file access services;
(2) former data evolution module, for one redaction of former data creation for each access file;
(3) besel, for getting off all data and former data recording, except recording the dominant write operation of various amendment data
Outward, the access to file all can be recorded by updating the daily record of file every time, is used for tracing to the source and analyzing any discomfort
Suitable access;
(4) transaction data completeness maintaining module, for the invasion occurred at any time under besel monitors, system energy
Enough integrity ensureing to select the All Activity data at place to invasion;
(5) isolation module, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, described transaction literary composition
Part can lose transaction data in phagocytic process, and the file after the unwitting access of user will not be allowed to be changed by invader.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that: also include one
Secondary transaction data recovers module, the transaction that the legal change for recovering to occur when invasion and find between invasion is caused
Loss of data.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that:, described transaction
Last before file can return to invasion reliably accesses, and is verifying the access log of single transaction file
After, without finding unfavorable exception record, these transaction files can intactly be recovered.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that: from time and sky
Between two aspects carry out recording described transaction file, a kind of is to use former transaction data chronography based on daily record, the second
It it is binary tree spatial registration method based on multi version daily record.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that: described block
The module that guarantee confidentiality is not provided from method for secure storing of chain, it is assumed that these use standard authentication from security disk and one
The transaction file server of agreement connects, and all are sent to this and need not extra certification from the request of safe storage system and add
Close.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610665287.9A CN106295406A (en) | 2016-08-13 | 2016-08-13 | A kind of block chain that is used for is from safe storage system and method thereof |
PCT/CN2016/095580 WO2018032376A1 (en) | 2016-08-13 | 2016-08-16 | Self-securing storage system and method for block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610665287.9A CN106295406A (en) | 2016-08-13 | 2016-08-13 | A kind of block chain that is used for is from safe storage system and method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106295406A true CN106295406A (en) | 2017-01-04 |
Family
ID=57670625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610665287.9A Pending CN106295406A (en) | 2016-08-13 | 2016-08-13 | A kind of block chain that is used for is from safe storage system and method thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106295406A (en) |
WO (1) | WO2018032376A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN107329888A (en) * | 2017-05-31 | 2017-11-07 | 深圳前海微众银行股份有限公司 | Intelligent contract command code coverage rate computational methods and system |
CN107943833A (en) * | 2017-10-25 | 2018-04-20 | 华南农业大学 | A kind of storage of non-stop layer distributed document and search method based on block chain |
CN108521434A (en) * | 2018-05-29 | 2018-09-11 | 广西电网有限责任公司 | A kind of network security intrusion detecting system based on block chain technology |
CN109558064A (en) * | 2017-09-25 | 2019-04-02 | 航天信息股份有限公司 | A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain |
CN109829297A (en) * | 2017-11-23 | 2019-05-31 | 财团法人资讯工业策进会 | Monitoring device, method and its computer storage medium |
CN110019235A (en) * | 2017-12-29 | 2019-07-16 | 百度在线网络技术(北京)有限公司 | Data storage, restoration methods, device, equipment and medium based on block chain |
CN110163007A (en) * | 2019-04-23 | 2019-08-23 | 西安邮电大学 | Data integrity verification method, equipment and storage medium based on block chain |
CN110309166A (en) * | 2019-07-10 | 2019-10-08 | 中国电子科技集团公司第二十八研究所 | A kind of geographical altitude data polishing method traced to the source |
WO2020010763A1 (en) * | 2018-07-12 | 2020-01-16 | 中国科学院深圳先进技术研究院 | Blockchain spatio-temporal data querying method and system, and electronic apparatus |
CN114553488A (en) * | 2022-01-24 | 2022-05-27 | 四川华西集采电子商务有限公司 | Square encryption bidding method and system |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741064B (en) * | 2019-01-10 | 2023-05-05 | 广东工业大学 | Method and system for processing censoring attack, electronic equipment and storage medium |
CN110781531B (en) * | 2019-09-04 | 2023-04-07 | 安徽省粮油信息中心(安徽粮食批发交易市场管委会) | Tamper-proof grain depot data secure storage system and method |
CN111680111B (en) * | 2020-05-29 | 2023-09-01 | 泰康保险集团股份有限公司 | Billing method and device, computer equipment and computer readable storage medium |
CN113570384A (en) * | 2021-07-26 | 2021-10-29 | 大连民族大学 | Agricultural product tracing method and system based on block chain |
CN115437852B (en) * | 2022-11-07 | 2023-02-03 | 四川大学 | Rapid block chain system and method based on disaster recovery and file partition table |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101403988A (en) * | 2008-11-05 | 2009-04-08 | 中国科学院计算技术研究所 | File back-up system and method of computer system |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | ***通信集团河北有限公司 | Safety monitoring method and system |
CN102339321A (en) * | 2011-11-09 | 2012-02-01 | 上海盛霄云计算技术有限公司 | Network file system with version control and method using same |
CN104392405A (en) * | 2014-11-14 | 2015-03-04 | 杭州银江智慧医疗集团有限公司 | Electronic medical record safety system |
CN105844505A (en) * | 2016-03-17 | 2016-08-10 | 深圳市新世纪启航科技开发有限公司 | Method of carrying out digital currency trading through block chain technology |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8799247B2 (en) * | 2011-02-11 | 2014-08-05 | Purdue Research Foundation | System and methods for ensuring integrity, authenticity, indemnity, and assured provenance for untrusted, outsourced, or cloud databases |
CN102981945B (en) * | 2012-12-31 | 2016-02-10 | 北京京东世纪贸易有限公司 | A kind of unfailing performance supervisory system and method |
CN104281808B (en) * | 2014-09-25 | 2017-09-01 | 中国科学院信息工程研究所 | A kind of general Android malicious act detection methods |
CN105183609B (en) * | 2015-09-16 | 2017-03-15 | 焦点科技股份有限公司 | A kind of real-time monitoring system for being applied to software system and method |
-
2016
- 2016-08-13 CN CN201610665287.9A patent/CN106295406A/en active Pending
- 2016-08-16 WO PCT/CN2016/095580 patent/WO2018032376A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101403988A (en) * | 2008-11-05 | 2009-04-08 | 中国科学院计算技术研究所 | File back-up system and method of computer system |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | ***通信集团河北有限公司 | Safety monitoring method and system |
CN102339321A (en) * | 2011-11-09 | 2012-02-01 | 上海盛霄云计算技术有限公司 | Network file system with version control and method using same |
CN104392405A (en) * | 2014-11-14 | 2015-03-04 | 杭州银江智慧医疗集团有限公司 | Electronic medical record safety system |
CN105844505A (en) * | 2016-03-17 | 2016-08-10 | 深圳市新世纪启航科技开发有限公司 | Method of carrying out digital currency trading through block chain technology |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107329888A (en) * | 2017-05-31 | 2017-11-07 | 深圳前海微众银行股份有限公司 | Intelligent contract command code coverage rate computational methods and system |
CN107329888B (en) * | 2017-05-31 | 2019-10-18 | 深圳前海微众银行股份有限公司 | Intelligent contract operation code coverage rate calculation method and system |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN107241360B (en) * | 2017-08-04 | 2019-01-18 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN109558064A (en) * | 2017-09-25 | 2019-04-02 | 航天信息股份有限公司 | A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain |
CN109558064B (en) * | 2017-09-25 | 2022-06-07 | 航天信息股份有限公司 | Electronic invoice data chain synchronization method, device, medium and electronic equipment |
CN107943833A (en) * | 2017-10-25 | 2018-04-20 | 华南农业大学 | A kind of storage of non-stop layer distributed document and search method based on block chain |
CN109829297A (en) * | 2017-11-23 | 2019-05-31 | 财团法人资讯工业策进会 | Monitoring device, method and its computer storage medium |
CN109829297B (en) * | 2017-11-23 | 2022-04-19 | 财团法人资讯工业策进会 | Monitoring device, method and computer storage medium thereof |
CN110019235A (en) * | 2017-12-29 | 2019-07-16 | 百度在线网络技术(北京)有限公司 | Data storage, restoration methods, device, equipment and medium based on block chain |
CN110019235B (en) * | 2017-12-29 | 2021-08-17 | 百度在线网络技术(北京)有限公司 | Block chain based data storage and recovery method, device, equipment and medium |
CN108521434A (en) * | 2018-05-29 | 2018-09-11 | 广西电网有限责任公司 | A kind of network security intrusion detecting system based on block chain technology |
WO2020010763A1 (en) * | 2018-07-12 | 2020-01-16 | 中国科学院深圳先进技术研究院 | Blockchain spatio-temporal data querying method and system, and electronic apparatus |
CN110163007A (en) * | 2019-04-23 | 2019-08-23 | 西安邮电大学 | Data integrity verification method, equipment and storage medium based on block chain |
CN110163007B (en) * | 2019-04-23 | 2021-05-04 | 西安邮电大学 | Block chain-based data integrity verification method, equipment and storage medium |
CN110309166B (en) * | 2019-07-10 | 2021-10-01 | 中国电子科技集团公司第二十八研究所 | Traceable geographic elevation data completion method |
CN110309166A (en) * | 2019-07-10 | 2019-10-08 | 中国电子科技集团公司第二十八研究所 | A kind of geographical altitude data polishing method traced to the source |
CN114553488A (en) * | 2022-01-24 | 2022-05-27 | 四川华西集采电子商务有限公司 | Square encryption bidding method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2018032376A1 (en) | 2018-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106295406A (en) | A kind of block chain that is used for is from safe storage system and method thereof | |
US11829494B2 (en) | Distributed privately subspaced blockchain data structures with secure access restriction management | |
US10789597B2 (en) | Systems and methods for using a distributed ledger for data handling | |
CN106131048A (en) | A kind of non-trusted remote transaction file security for block chain stores system | |
CN106295401A (en) | A kind of read-only secure file storage system and method for block chain | |
CN106302720A (en) | A kind of for block chain Survivable storage system and method | |
US8321688B2 (en) | Secure and private backup storage and processing for trusted computing and data services | |
CN106055993A (en) | Encryption storage system for block chains and method for applying encryption storage system | |
US11907199B2 (en) | Blockchain based distributed file systems | |
JP2021518705A (en) | Runtime self-modification for blockchain ledger | |
US20100318782A1 (en) | Secure and private backup storage and processing for trusted computing and data services | |
CN106330452A (en) | Security network attachment device and method for block chain | |
CN109741162A (en) | The storage of personal collage-credit data, processing, sharing method and system based on block chain | |
US11082409B2 (en) | Verifying message authenticity with decentralized tamper-evident logs | |
EP3709568A1 (en) | Deleting user data from a blockchain | |
JP7358396B2 (en) | Secure dataset management | |
US20220329446A1 (en) | Enhanced asset management using an electronic ledger | |
US11868339B2 (en) | Blockchain based distributed file systems | |
CN106326752B (en) | A kind of program-controlled encryption document storage system and its method for block chain | |
WO2022116761A1 (en) | Self auditing blockchain | |
US20230129227A1 (en) | System and method for generating a table-driven mutable blockchain | |
US20230054904A1 (en) | Layered-Infrastructure Blockchain-Based System for Software License Distribution | |
Kumar et al. | Improved write access control and stronger freshness guarantee to outsourced data | |
Nagesh et al. | Cloud architectures encountering data security and privacy concerns—A review | |
Veloso | Automated support tool for forensics investigation on hard disk images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170104 |
|
WD01 | Invention patent application deemed withdrawn after publication |