CN109740375B - Sharing and publishing method of original audio works - Google Patents

Sharing and publishing method of original audio works Download PDF

Info

Publication number
CN109740375B
CN109740375B CN201811566897.9A CN201811566897A CN109740375B CN 109740375 B CN109740375 B CN 109740375B CN 201811566897 A CN201811566897 A CN 201811566897A CN 109740375 B CN109740375 B CN 109740375B
Authority
CN
China
Prior art keywords
network
storage
block
file
file block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811566897.9A
Other languages
Chinese (zh)
Other versions
CN109740375A (en
Inventor
王群华
黎富德
魏万晓
王翔
张谅
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yoostar Technology Co ltd
Original Assignee
Yoostar Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yoostar Technology Co ltd filed Critical Yoostar Technology Co ltd
Priority to CN201811566897.9A priority Critical patent/CN109740375B/en
Publication of CN109740375A publication Critical patent/CN109740375A/en
Application granted granted Critical
Publication of CN109740375B publication Critical patent/CN109740375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention is applicable to the field of audio file storage and encryption technology improvement, and provides a sharing and publishing method of a creative audio work, which comprises the following steps: s1, generating a plurality of duplicate source file blocks of an original audio work, and dividing each duplicate source file block into small file blocks; s2, generating an encrypted file block from each small file block by using double multi-encryption, and storing the relation between the encrypted file block and a decryption method and a decryption key by using the file block and a decryption list; s3, the creator of the audio work grasps the file blocks and the decryption list, and the encrypted file blocks are randomly scattered on network storage nodes in the network through peer-to-peer network transmission. Supporting the original creator of the work to share and release own work on the peer-to-peer network and obtaining corresponding income; the management cost and the pumping cost of the platform are reduced, so that the cost of originators is reduced; and the purchase expenditure of storage space and bandwidth is saved.

Description

Sharing and publishing method of original audio works
Technical Field
The invention belongs to the field of audio file storage and encryption technology improvement, and particularly relates to a sharing and publishing method and system of a creative audio work.
Background
Conventional audio files are typically stored on a local computer or server. There are some risks such as 1) storage failure, computer failure can result in data loss and failure to provide service; 2) Malware, hackers, etc. may destroy and reveal files; 3) After the legitimate user reuses the audio file, a copy may be made. This copy may be compromised (both intentional and unintentional) resulting in the file being stolen.
For audio content originated by individuals or small and medium-sized enterprises, it is common to distribute the content through various platforms. The platform incurs high costs and the revenues of the originators are compressed. This condition is unfavorable for the enthusiasm of the sponsor, and has a great inhibition effect on innovation. At the same time, the security of the work is entirely platform dependent. If the platform has a vulnerability or is attacked. The work of the original would be directly at risk of leakage.
Disclosure of Invention
The invention aims to provide a sharing and publishing method of original audio works, which aims to solve the technical problems.
The invention is realized in such a way that a sharing and publishing method of a creative audio work comprises the following steps:
s1, generating a plurality of duplicate source file blocks of an original audio work, and dividing each duplicate source file block into small file blocks;
s2, generating an encrypted file block from each small file block by using double multi-encryption, and storing the relation between the encrypted file block and a decryption method and a decryption key by using the file block and a decryption list;
s3, the creator of the audio work grasps the file blocks and the decryption list, and the encrypted file blocks are randomly scattered on network storage nodes in the network through peer-to-peer network transmission.
The invention further adopts the technical scheme that: the sharing and publishing method further comprises the following steps:
s4, when the work user needs to consume the work, the file list and the decryption information are requested from the audio work originators, and the corresponding audio work assets are paid.
The invention further adopts the technical scheme that: in the step S1, additional content is generated for each small file block, where the additional content includes a file block number, a digital watermark, and information for checking HASH values.
The invention further adopts the technical scheme that: in the step S2, a plurality of encryption algorithms are used to encrypt each small file block with different keys and encryption algorithms, and the file block uses the encryption algorithms, which are determined by the first four bits of the HASH value of the block.
The invention further adopts the technical scheme that: the step S3 comprises the following steps:
and S31, after the network storage node stores data, the network verifier verifies whether the storage is valid, if so, the network pays a certain audio work asset to the network storage node as a reward, and if the network verifier verifies that a certain encrypted file block is stored with a change, a request for re-storage is sent.
The invention further adopts the technical scheme that: the storage competition in the storage in S3 includes the steps of:
s321, the original creator of the audio work checks whether the file block and the decryption list have encrypted file blocks to be released to the network for storage, if so, the network verifier sends out the encrypted file block storage requirement with the block ID of A, and waits for the response of a network storage node;
s322, competing the encryption file block storage requirement with the block ID of the network storage node Y as A;
s323, the network verifier judges whether to give the file block and decryption list to the network storage node Y for storage according to the reputation value of the network storage node Y, if yes, the next step is executed, and if no, the step S321 is returned;
s324, after the network freezes the network storage node Y credit value guarantee, the network storage node starts to store the block, and the encrypted file block is released and stored through network broadcasting.
The invention further adopts the technical scheme that: after the network storage node stores the encrypted file block, the network verifier continuously verifies the storage of the encrypted file block, and the verification comprises the following steps:
SA1, a network verifier requests a verification HASH value of an encrypted file block with a block ID x from an audio work originators and stores the verification HASH value as HASH1;
SA2, a network verifier requests the content value of an encrypted file block with the serial number of block ID x from a network storage node, calculates the check HASH value of the block and stores the check HASH value as HASH2;
SA3, the network verifier compares HASH1 and HASH2 to judge whether the two are equal, if the two are equal, broadcasting verification is correct in the network, the network distributes rewards to the network storage nodes, the network verifier obtains verification workload rewards and executes the next step, if the two are not equal, broadcasting verification in the network does not pass, the network does not distribute rewards to the network storage nodes, and the network verifier obtains the verification workload rewards and executes the next step;
and SA4, the network storage node feeds back the storage condition to the encrypted file block with the ID x of the creator of the audio work according to the verification condition.
The invention further adopts the technical scheme that: the audio work creator uses the file block and the decryption list to maintain all the encrypted file block storage addresses, decryption algorithms and decryption keys.
The invention further adopts the technical scheme that: and when the audio work originators store, establishing storage intelligent contracts with the network storage nodes, and agreeing on the storage time, the storage cost, the frozen amount and the credit value.
The invention further adopts the technical scheme that: and the network verifier verifies and judges whether the storage of the network storage node is successful, if the verification is not successful, the network verifier sends out a message for reducing the reputation value of the network storage node, and if the verification is successful, the network verifier sends out a message for improving the reputation value of the network storage node.
The beneficial effects of the invention are as follows: supporting the original creator of the work to share and release own work on the peer-to-peer network and obtaining corresponding income; the management cost and the pumping cost of the platform are reduced, so that the cost of originators is reduced; the original creator has complete control right on own works, and does not worry about copyright loss and infringement; the purchasing expenditure of the storage space and the bandwidth is saved; the multiple copies are stored in the peer-to-peer network, files are not lost, and the files are not easy to attack by DDOS; double multi-encryption ensures confidentiality of the file and prevents theft. The use of digital watermarks ensures that a compromised person can be traced.
Drawings
FIG. 1 is a block diagram of an original audio work file provided by an embodiment of the present invention.
Fig. 2 is a schematic diagram of generating an encrypted file block according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of decentralized storage of encrypted file blocks according to an embodiment of the present invention.
Fig. 4 is a flow chart of a competitive storage process according to an embodiment of the present invention.
FIG. 5 is a flow chart of a storage verification process provided by an embodiment of the present invention.
Fig. 6 is a schematic diagram of a download and decryption list provided by an embodiment of the present invention.
Detailed Description
Double many: multiple encryption methods and multiple key encryption.
Netstorage network storage node: a device for storing files.
NetVerifier network verifier: the storage of the network, the transaction, etc. is verified.
The producer origin of the audio work: the rights to the audio file are entitled to the rights and benefits of the response.
The ProductConsumer work user: a consumer of an audio work.
FbDecryptList file block and decryption list: when a user ProductConsumer requests to consume file content, the ProductOriginator generates the table for it with a list of file blocks and their corresponding decryption methods and passwords.
AudioAsset audio work asset: an asset replacement with interchange and use value in the present network.
sourceFileBlock Source doclet block: small file blocks divided from the original audio file, the blocks being the same size, with numbers and digital watermarks.
EnFileBlock encrypts the file block: the sourceFileBlock uses the encrypted file blocks obtained after double multi-encryption. An audio file is divided into small blocks of the same size. The tiles are encrypted with different encryption methods and passwords and randomly stored scattered on the netstorage.
1-6, the sharing and publishing method of the original audio works provided by the invention firstly generates a plurality of copies according to the original works, divides each copy into a source small file block (Source File Block) and adds a digital watermark. And then generating an encrypted file block (EnFileBlock) by using double multi-encryption, and storing the relationship between the EnFileBlock and a decryption method and a decryption key by using the file block and a decryption list (FbDecryptList). FbDecryptList is held by the creator (producer origin) of the audio work. EnFileBlock is transmitted over a peer-to-peer network, randomly dispersed across network storage nodes (NetStorages). Netstorage pays out a storage resource that the network rewards with audio work assets AudioAsset. When a product consumer (product consumer) wants to consume a product, the product consumer requests a file list and decryption information from the product origin and pays out the corresponding AudioAsset as needed.
The network includes network storage nodes (netstorage), audio work originators (productsigners), work users (producConsumers), network verifiers, and other entities (netverifiers). ProductOriginator, productConsumer, netStorager, netVerifier are involved in various transactions on the network, and in order to ensure honesty, these entities all have corresponding reputation values and freeze certain guarantees as required. When the reputation value drops to a certain extent, participation in certain activities will be restricted and frozen assurance will not be received.
The producer origin is the right to the audio file, enjoying rights and revenue rights to the response. The ProductConsumer is the consumer of the audio work. NetStorager is a node that stores files.
NetVerifier verifies the storage, transactions, etc. of the network.
The producer origin divides the original audio work into small file blocks (SourceFileBlock). The blocks are the same size. Contains the divided original content (sourceContent), and appends additional content (AttachedContent) containing the file block number, digital watermark, and HASH check value.
The producer origin then encrypts the sourceContent of sourceFileBlock by double multiple encryption, attaching Attacedcontent to form an encrypted File Block (EnFileBlock).
EnFileBlock is stored randomly dispersed on NetStorager.
The producer origin uses a file block and decryption list (FbDecryptList) to hold the storage locations of all the enfileblocks, file block list, decryption method and password.
When the ProductConsumer needs to consume the audio work, a request is made to the ProductOriginator. The producer origin generates a storage location, a file block list, a decryption method and a password of a complete work through the FbDecryptList, encrypts the complete work and sends the encrypted complete work to the producer consumer. The ProductConsumer requests and receives all EnFileBlock via the peer-to-peer network according to the received information, and then decrypts and recovers the original file
An audio work asset (AudioAsset) is an asset replacement that has value in exchange and use over the present network. NetStorager provides a storage service and gets AudioAsset as a reward. The product consumer consumes the content of the work and pays a certain AudioAsset to the product origin. AudioAsset is transferred in the network and netstorage also provides billing functions. Accounting success will also get a certain AudioAsset as a reward.
A. File block partitioning
The ProductOriginator divides the original audio work file into a plurality of source file blocks Source FileBlock, as shown in FIG. 1. Each copy is subdivided into doclet blocks sourccontent. Additional content atachedcontent is then generated for each sourccontent. The atachedcontent contains information such as file block number, digital watermark and check HASH value.
After SourceFileBlock is generated, double multi-encryption is performed on SourceContents of the SourceFileBlock. Each sourceContent is encrypted with a different key and encryption algorithm. Using 16 encryption algorithms, 0:aes128, 1:aes192, 2:aes256, 3:des, 4:3des, 5:sm4, 6:rc2, 7:rc4, 8:rc5, 9:tdea, 10:blowfish, 11:idea, 12:skip, 13:twofish, 14:serpent, 15:mars. Which encryption algorithm is specifically used for the file block is determined by the first four bits of the check HASH value of the block, and the specific correspondence is shown in fig. 2. A random key is set for each encryption, respectively.
The sourceContent is encrypted and then combined with Attacedcontent to form EnFileBlock. The producer origin stores information such as a file block number, an encryption algorithm, a secret key, etc. in a file block and decryption list (FbDecryptList). When a consumer requests use of an audio work, the producer origin will generate a complete list of file chunks and corresponding decryption methods and keys for it via FbDecryptList. FbDecryptList should be kept secret and is held by the ProductOriginator.
EnFileBlock storage method
The present invention uses a dedicated peer-to-peer P2P network to store the EnFileBlock data file blocks. EnFileBlock may be randomly stored on top of multiple nodes. A set of enfileblocks that can restore the entire work file should not be stored on one netstorage node, but rather be distributed across different netstorage nodes for storage, as shown in fig. 3. Multiple redundancy can be achieved in this way, and reliability of storage is improved.
The producer origin maintains a memory list of the EnFileBlock, and can grasp where all files of itself are stored.
The netstorage node verifies the validity of the storage once the data is stored, and once the data is verified to be valid, the network pays a certain AudioAsset to the netstorage node as a reward.
If NetVerifier verifies that some EnFileBlock stores changes, then a request to re-store is issued. NetStorager can choose whether to accept the request based on the request.
The correctness of the storage is ensured by the excitation.
Competing stores
The storage requirement is issued by the ProductOriginator, netStorager contends for storage, the process of which is shown in FIG. 4.
1) The producer origin checks whether the FbDecryptList has an EnFileBlock to be issued to the network for storage, if the EnFileBlock with the block ID of A is found to be required for storage, the NetVerifier sends the EnFileBlock storage requirement with the block ID of A, and waits for the response of the NetStorager;
2) NetStorager Y contends for EnFileBlock storage requirement with block ID A;
3) NetVerifier decides whether to give NetStorager Y to store according to its own FbDecryptList and NetStorager reputation values. Go to 4) if agreeing to NetStorager Y), otherwise return to 1);
4) Network freezing NetStorager reputation value guarantee;
5) The NetStorager starts a storage block and correctly stores the EnFileBlock through network broadcasting;
storage verification process
After NetStorager stores EnFileBlock, netVerifier continuously verifies its store. See if the correct storage is provided. The verification process is shown in fig. 5.
1) NetVerifier requests from the product origin the check HASH value of EnFileBlock with block ID x, saved as HASH1.
2) NetVerifier requests the content value of EnFileBlock with the number of block ID x from NetStorager, calculates the check HASH value of the block, and stores the check HASH value as HASH2.
3) NetVerifier compares HASH1 and HASH2, and if the two are equal, goes to step 4), and if the two are not equal, goes to step 5;
4) The network broadcasts that the verification is correct, and the network issues rewards to the NetStorager, and the NetVerifier also obtains the verification workload rewards.
5) Broadcasting verification in the network is not passed, the network does not issue rewards to the NetStorager any more, and the NetVerifier obtains verification workload rewards.
6) NetStorager notifies ProductOriginator ID that the EnFileBlock store of x has failed.
C. Decryption of files
The producer consumer must obtain the encryption algorithm and password from the producer origin at the time of consuming the audio file.
The ProductOriginator maintains all EnFileBlock storage addresses, decryption algorithms, and decryption keys using the FbDecryptList person. When a node needs to use a file, the producer origin generates a download and decryption list for it, as shown in fig. 6, and then sends it to the requester.
After the product Consumer obtains the list, downloading the corresponding EnFileBlock according to the address, decompressing according to the method, recovering the decrypted data, and consuming the audio file.
Consumption of the audio file by the ProductConsumer requires payment of AudioAsset.
D. Intelligent contract
The ProductOriginator establishes a storage smart contract with NetStorager at storage time. The contract will agree that: stored time, stored cost, frozen amount, reputation value, etc.
The ProducConsumer establishes a consumption contract with the ProducOriginator when consuming the work. Contract convention: file, fee, etc. consumed.
The intelligent contract is stored on a public chain such as Ethereum.
E.ProducConsumer reputation value management
NetVerifier validates the netstorage of netstorage. If the verification is not passed, a message for reducing the reputation value of the NetStorager is sent out. Other netverifiers may also verify the verification.
Only a part of the file blocks are compromised, and the security of the whole file is not threatened. Because only part of the content is compromised, the other parts are still in a secure state. The main risk of document disclosure is focused on the ProductConsumer. Because the ProductConsumer obtains the decryption method and password for the entire complete file block. Therefore, there is a need to monitor the ProductConsumer, and there is a way to find and prove who revealed the file.
The producer origin generates the digital watermark of the audio file with the private key. The other nodes do not know the location of the watermark embedding. The ProductOriginator holds the ProductConsumer of each request password. According to the digital watermark of the leaked file, the user can find out who is leaked out. If there is a node compromised, the ProductOriginator can provide evidence and the NetVerifier can verify. After verification, the divulger may be penalized, the reputation of the ProducConsumer lowered, and frozen funds stripped.
There are multiple computers in the network that act as network storage nodes (netstorage). Company C is the creator (producer origin) of the audio work. An average individual, as a production consumer, obtains and consumes audio content. Some computers exist in the network as an entity (NetVerifier) such as a verifier. ProductOriginator, productConsumer, netStorager, netVerifier are involved in various transactions on the network with an initial reputation value of 80.
The producer origin divides the Audio file Audio1 work into 59 small file blocks (sourcefileblocks). The blocks of SourceFileBlock are all 1M in size, with 0 filled at the end of the last small file to ensure that it is just 1M in size.
Company C calculates a file block number (1-59), digital watermark, and HASH check value for each small file block and combines them into additional content (AttachedContent). Then, the sourceContent of the sourceFileBlock is encrypted by double multiple encryption, and an Attacedcontent is attached to form an encrypted file block (EnFileBlock).
EnFileBlock is randomly distributed and stored on 25 NetStorager computers.
Company C uses a file block and decryption list (FbDecryptList) to store the storage locations, file block list, decryption method, and password of all enfileblocks.
A. File block partitioning
Company C as a producer origin divides the Audio1 frequency work file into a plurality of source file blocks SourceFileBlock. Each copy is subdivided into 59 doclet blocks sourccontent. Additional content atachedcontent is then generated for each sourccontent. Attacedcontent contains information such as file block numbers (1-59), digital watermarks, and check HASH values.
After SourceFileBlock is generated, double multi-encryption is performed on SourceContents of the SourceFileBlock. Each sourceContent is encrypted with a different key and encryption algorithm. Using 16 encryption algorithms, 0:aes128, 1:aes192, 2:aes256, 3:des, 4:3des, 5:sm4, 6:rc2, 7:rc4, 8:rc5, 9:tdea, 10:blowfish, 11:idea, 12:skip, 13:twofish, 14:serpent, 15:mars. Which encryption algorithm is specifically used for the file block is determined by the first four bits of the check HASH value of the block, and the specific correspondence is shown in fig. 2. A random key is set for each encryption, respectively.
The sourceContent is encrypted and then combined with Attacedcontent to form EnFileBlock. The producer origin stores information such as the file block number, encryption algorithm, secret key, etc. in the file block and decryption list FbDecryptList.
EnFileBlock storage method
The EnFileBlock data file block is stored using a dedicated peer-to-peer P2P network. EnFileBlock may be randomly stored on top of multiple nodes. A set of enfileblocks that can restore the entire work file should not be stored on one netstorage node, but rather be distributed across different netstorage nodes for storage, as shown in fig. 3. Multiple redundancy can be achieved in this way, and reliability of storage is improved. However, a netstorage does not have all the enfileblocks that can fully restore the original file, thus improving security.
The producer origin maintains a memory list of the EnFileBlock, how many copies of the file, how many file blocks are stored in what locations, respectively, and what encryption algorithm and key are used are all known by the producer origin.
Computers in the network as netstorage nodes once store data, netverifiers (also computers in the network) verify the validity of the store, and once the verification is valid, the network pays AudioAsset as a prize for the netstorage nodes 1 in number.
If NetVerifier verifies that some EnFileBlock stores changes, then a request to re-store is issued. NetStorager can choose whether to accept the request based on the request.
Competing stores
The storage requirement is issued by company C's product origin, the network computer netstorage competing for storage, the process of which is shown in fig. 4.
1) The producer checks whether the FbDecryptList has EnFileBlock to be issued to the network for storage, if the EnFileBlock with the block ID of A is found to be required for storage, the NetVerifier sends the EnFileBlock storage requirement with the block ID of A, one block is willing to pay 0.1 AudioAsset, the storage period is 8 months, and the response of the NetStorager is waited;
2) NetStorager Y contends for EnFileBlock storage requirement with block ID A;
3) NetVerifier decides whether to give NetStorager Y to store if the reputation value is greater than 90 based on its own FbDecryptList and NetStorager reputation values. Go to 4) if agreeing to NetStorager Y), otherwise return to 1);
4) Network frozen netstorage reputation value guarantees 10 AudioAsset;
5) The NetStorager starts a storage block and correctly stores the EnFileBlock through network broadcasting;
storage verification process
After the network computer NetStorager stores EnFileBlock, the computer acting as NetVerifier continuously verifies its storage. See if the correct storage is provided. The verification process is shown in fig. 5.
1) NetVerifier requests the check HASH value of EnFileBlock for the block (e.g., ID 1256) from the product origin, which is saved as HASH1.
2) NetVerifier requests the content value of EnFileBlock numbered 1256 from NetStorager, calculates the check HASH value of the block, and saves it as HASH2.
3) NetVerifier compares HASH1 and HASH2, and if the two are equal, goes to step 4), and if the two are not equal, goes to step 5;
4) The network broadcasts that the verification is correct, and the network issues an AudioAsset reward of 0.01 to the netstorage, and the NetVerifier itself also obtains the verification workload reward.
5) Broadcasting verification in the network is not passed, the network does not issue rewards to NetStorager any more, and NetVerifier also obtains the AudioAsset of 0.01 of verification workload rewards.
6) NetStorager notifies ProductOriginator ID that the EnFileBlock store of 1256 has failed.
C. Decryption of files
The producer consumer must obtain the encryption algorithm and password from the producer origin at the time of consuming the audio file.
The ProductOriginator maintains all EnFileBlock storage addresses, decryption algorithms, and decryption keys using the FbDecryptList person. When a node needs to use a file, the producer origin generates a download and decryption list for it, as shown in fig. 6, and then sends it to the requester.
After the product Consumer obtains the list, downloading the corresponding EnFileBlock according to the address, decompressing according to the method, recovering the decrypted data, and consuming the audio file.
Consumption of the audio file by the ProductConsumer requires payment of AudioAsset.
D. Intelligent contract
The ProductOriginator establishes a storage smart contract with NetStorager at storage time. The contract will agree that: stored time, stored cost, frozen amount, reputation value, etc.
The ProducConsumer establishes a consumption contract with the ProducOriginator when consuming the work. Contract convention: file, fee, etc. consumed.
The intelligent contract is stored on a public chain such as Ethereum.
E.ProducConsumer reputation value management
NetVerifier validates the netstorage of netstorage. If the verification is not passed, a message for reducing the reputation value of the NetStorager is sent out. Other netverifiers may also verify the verification.
Only a part of the file blocks are compromised, and the security of the whole file is not threatened. Because only part of the content is compromised, the other parts are still in a secure state. The main risk of document disclosure is focused on the ProductConsumer. Because the ProductConsumer obtains the decryption method and password for the entire complete file block. Therefore, there is a need to monitor the ProductConsumer, and there is a way to find and prove who revealed the file.
The producer origin generates the digital watermark of the audio file with the private key. The other nodes do not know the location of the watermark embedding. The ProductOriginator holds the ProductConsumer of each request password. According to the digital watermark of the leaked file, the user can find out who is leaked out. If there is a node compromised, the ProductOriginator can provide evidence and the NetVerifier can verify. After verification, the divulger may be penalized, the reputation of the ProducConsumer lowered (10 decreases each time), and frozen funds stripped.
Through the work of the parts, the storage and consumption of the audio works are realized, and originators do not need to worry about leakage, and can also ensure that benefits can be obtained. The participating stored computers can also receive corresponding rewards. Because of the reputation and the guaranty constraints, the computers participating in the storage must honest provide service, otherwise they are penalized and reimbursed for the original's loss. The user who consumes the file can obtain the decryption method after successful payment, and can consume. At the same time he is also constrained by reputation values, assurance. The network verifier can obtain benefits by providing verification services, and can encourage him to participate in the maintenance of the network. The parties involved are thus constrained and are guaranteed to be able to obtain the expected benefits. The whole system can normally operate.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (9)

1. A method of sharing and distributing a creative audio work, the method comprising the steps of:
s1, generating a plurality of duplicate source file blocks of an original audio work, and dividing each duplicate source file block into small file blocks;
s2, generating an encrypted file block from each small file block by using double multi-encryption, and storing the relation between the encrypted file block and a decryption method and a decryption key by using a file block and a decryption list, wherein the double multi-encryption is a multi-encryption method and a multi-key encryption;
s3, the creator of the audio work grasps the file blocks and the decryption list, and the encrypted file blocks are randomly scattered on network storage nodes in the network through peer-to-peer network transmission;
the storage competition in the storage in S3 includes the steps of:
s321, the creator of the audio work checks whether the file block and the decryption list have encrypted file blocks to be released to the network for storage, if so, the network verifier sends out the encrypted file block storage requirement with the block ID of A, and waits for the response of a network storage node;
s322, competing the encryption file block storage requirement with the block ID of the network storage node Y as A;
s323, the network verifier judges whether to give the file block and decryption list to the network storage node Y for storage according to the reputation value of the network storage node Y, if yes, the next step is executed, and if no, the step S321 is returned;
s324, after the network freezes the network storage node Y credit value guarantee, the network storage node starts to store the block, and the encrypted file block is released and stored through network broadcasting.
2. The method of sharing and distributing a creative audio work according to claim 1, further comprising the steps of:
s4, when the work user needs to consume the work, the file list and the decryption information are requested from the audio work originators, and the corresponding audio work assets are paid.
3. The method of sharing and distributing a creative audio work according to claim 2, wherein in the step S1, additional contents are generated for each small file block, and the additional contents include file block numbers, digital watermarks and information for checking HASH values.
4. The method according to claim 3, wherein the step S2 uses a plurality of encryption algorithms to encrypt each small file block with different keys and encryption algorithms, and the specific encryption algorithm used for the file block is determined by the first four bits of the HASH value of the block.
5. The method for sharing and distributing a creative audio work according to claim 4, wherein the step S3 includes the steps of:
and S31, after the network storage node stores data, the network verifier verifies whether the storage is valid, if so, the network pays a certain audio work asset to the network storage node as a reward, and if the network verifier verifies that a certain encrypted file block is stored with a change, a request for re-storage is sent.
6. The method of sharing and distributing a creative audio work according to claim 5, wherein the network storage node stores the encrypted file blocks and the network verifier continuously verifies the storage, the verification comprising the steps of:
SA1, a network verifier requests a verification HASH value of an encrypted file block with a block ID x from an audio work originators and stores the verification HASH value as HASH1;
SA2, a network verifier requests the content value of an encrypted file block with the serial number of block ID x from a network storage node, calculates the check HASH value of the block and stores the check HASH value as HASH2;
SA3, the network verifier compares HASH1 and HASH2 to judge whether the two are equal, if the two are equal, broadcasting verification is correct in the network, the network distributes rewards to the network storage nodes, the network verifier obtains verification workload rewards and executes the next step, if the two are not equal, broadcasting verification in the network does not pass, the network does not distribute rewards to the network storage nodes, and the network verifier obtains the verification workload rewards and executes the next step;
and SA4, the network storage node feeds back the storage condition to the encrypted file block with the ID x of the creator of the audio work according to the verification condition.
7. The method of sharing and distributing an original audio work according to claim 6, wherein the original of the audio work maintains all of the encrypted file block storage addresses, decryption algorithms and decryption keys using file blocks and a decryption list.
8. The method of claim 7, wherein the audio work originator establishes a storage intelligent contract with a network storage node at the time of storage, agreeing to the time of storage, the cost of storage, the amount of freezing, and the reputation value.
9. The method of claim 8, wherein the network verifier verifies the storage of the network storage node to determine if the verification fails, and if the verification fails, the network storage node reputation value is raised.
CN201811566897.9A 2018-12-19 2018-12-19 Sharing and publishing method of original audio works Active CN109740375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811566897.9A CN109740375B (en) 2018-12-19 2018-12-19 Sharing and publishing method of original audio works

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811566897.9A CN109740375B (en) 2018-12-19 2018-12-19 Sharing and publishing method of original audio works

Publications (2)

Publication Number Publication Date
CN109740375A CN109740375A (en) 2019-05-10
CN109740375B true CN109740375B (en) 2023-07-28

Family

ID=66360888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811566897.9A Active CN109740375B (en) 2018-12-19 2018-12-19 Sharing and publishing method of original audio works

Country Status (1)

Country Link
CN (1) CN109740375B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851798B (en) * 2020-01-15 2020-04-21 支付宝(杭州)信息技术有限公司 Block chain-based audio work authorization method, device and equipment
CN111641609B (en) * 2020-05-18 2023-07-14 中科易贺(江苏)区块链高科技有限公司 System and method for tracing information
CN112835855A (en) * 2021-02-22 2021-05-25 北京众享比特科技有限公司 File storage method and system based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1341240A (en) * 1999-12-20 2002-03-20 大日本印刷株式会社 Distributed data archive device and system
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works
US9990511B1 (en) * 2015-11-20 2018-06-05 Symantec Corporation Using encrypted backup to protect files from encryption attacks
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10491378B2 (en) * 2016-11-16 2019-11-26 StreamSpace, LLC Decentralized nodal network for providing security of files in distributed filesystems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1341240A (en) * 1999-12-20 2002-03-20 大日本印刷株式会社 Distributed data archive device and system
US9990511B1 (en) * 2015-11-20 2018-06-05 Symantec Corporation Using encrypted backup to protect files from encryption attacks
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Individual Encryption and Watermarking for Protecting Video on the Networks;Xiaofeng Li et al.;《2009 Second International Symposium on Information Science and Engineering》;20100415;第400-402页 *
一种支持信息检索的安全网络文件存储模型;朱蔚恒等;《计算机工程与科学》;20091015(第10期);第27-29,55页 *
区块链关键技术中的数据一致性研究;翟社平 等;《计算机技术与发展》;20180930;第94-100页 *

Also Published As

Publication number Publication date
CN109740375A (en) 2019-05-10

Similar Documents

Publication Publication Date Title
CN109033855B (en) Data transmission method and device based on block chain and storage medium
JP7281514B2 (en) Blockchain-enforced methods for control and distribution of digital content
EP3404891B1 (en) Method and system for distributing digital content in peer-to-peer network
US20220278851A1 (en) Systems and methods for managing digital rights
CN109697365B (en) Information processing method, block chain node and electronic equipment
Cucurull et al. Distributed immutabilization of secure logs
WO2020103566A1 (en) Blockchain certificate storage method and apparatus, and computer device
US20190036895A1 (en) Data distribution over nodal elements
US10417392B2 (en) Device-independent management of cryptographic information
WO2019204094A1 (en) Systems and methods for decentralized content distribution
CN109740375B (en) Sharing and publishing method of original audio works
US20220086187A1 (en) Decentralized digital content distribution system and process using block chains and encrypted peer-to-peer network
EP4379569A1 (en) Data sharing method and electronic device
Li et al. Deduplication with blockchain for secure cloud storage
US7640438B2 (en) System and method for protected content rendering
Li et al. Blockchain-based secure and reliable distributed deduplication scheme
US20040025014A1 (en) Secure internet-scale eventing
CN112231751A (en) Data transmission system and method based on block chain
CN111160888B (en) Payment method based on zero knowledge proof
Yao et al. Privacy preserving DRM solution with content classification and superdistribution
CN116264860A (en) Threshold encryption of broadcast content
Ramani et al. Blockchain for digital rights management
CN113688394B (en) Block chain-based outsourcing computing system and method in safe and trusted execution environment
EP4191944A1 (en) Methods and devices for content distribution with distributed rights management
EP4191976A1 (en) Methods and devices for content distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant