CN116232600A - Block chain-based data security storage method and system - Google Patents

Block chain-based data security storage method and system Download PDF

Info

Publication number
CN116232600A
CN116232600A CN202211675743.XA CN202211675743A CN116232600A CN 116232600 A CN116232600 A CN 116232600A CN 202211675743 A CN202211675743 A CN 202211675743A CN 116232600 A CN116232600 A CN 116232600A
Authority
CN
China
Prior art keywords
data
hash
stored
node
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211675743.XA
Other languages
Chinese (zh)
Inventor
龙榜
李晖
胡梅贤
李天国
许刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Farben Information Technology Co ltd
Original Assignee
Shenzhen Farben Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Farben Information Technology Co ltd filed Critical Shenzhen Farben Information Technology Co ltd
Priority to CN202211675743.XA priority Critical patent/CN116232600A/en
Publication of CN116232600A publication Critical patent/CN116232600A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data security storage method and system based on a block chain, wherein the method comprises the following steps: s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using the private key to obtain the encrypted storage data. S2, uploading the encrypted storage data to the IPFS node by a user; s3, the IPFS node calculates and returns a hash label to the user; s4, the user verifies the correctness of the hash label; s5, the user sends the hash label to the block chain node for uplink; s6, verifying the hash label by the block chain node. The invention can store the data to be stored in the IPFS node in the form of the ciphertext, even if an attacker obtains the hash tag and the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored under the condition of no symmetric key of the user. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.

Description

Block chain-based data security storage method and system
Technical Field
The invention relates to the technical field of data security, in particular to a data security storage method and system based on a blockchain.
Background
Data security refers to protection of data in the processes of collection, processing, storage, retrieval, transmission, exchange, display, diffusion and the like, and ensures that the data is authorized to be used in a legal way and is not illegally counterfeited, stolen, tampered, deleted or repudiated in all links, and confidentiality, authenticity, integrity and non-repudiation of data information are ensured. The core of the data security is to ensure that the data can be highly controllable in all stages of the full life cycle, and various threat factors are isolated as far as possible through technical protection and efficient management. The existing data security market is in a growth period, and with the increase of the number and the continuous deterioration of the properties of data leakage events, the acceleration of the digital transformation of enterprises, the landing of new technologies such as the Internet of things and the like, the importance of data security is increasing.
Storage is gaining increasing attention as an important part of the full cycle of data security. At present, the storage of a lot of data such as log data relies on a database or local files, and potential threats exist in terms of data security and storage.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a data security storage method and system based on a block chain, which can prevent data from being stolen and tampered and improve the security.
First aspect:
the invention provides a data security storage method based on a block chain, which comprises the following steps:
s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using a private key to obtain encrypted storage data.
S2, uploading the encrypted storage data to an IPFS node by a user;
s3, the IPFS node calculates the encrypted storage data and returns a hash tag to the user;
s4, the user verifies the correctness of the hash label;
s5, sending the hash label to a block chain node for uplink;
s6, verifying the hash label by the block chain node.
Preferably, in step S1, if the data to be stored is text type information, the text type information is converted into text character strings, and the text character strings are calculated according to a first type of hash encryption algorithm to obtain hash values.
Preferably, in step S1, if the data to be stored is image type information, the image type information is converted into an image character string, and the image character string is calculated according to a hash encryption algorithm of a second type to obtain a hash value.
Preferably, the step S3 specifically includes: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
Preferably, the step S5 specifically includes: assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
Second aspect:
the invention provides a data security storage system based on a block chain, which comprises the following components:
the preprocessing module is used for selecting a corresponding hash encryption algorithm according to the type of the data to be stored to calculate the data to be stored to obtain a hash value; and signing the hash value by using a private key to obtain encrypted storage data.
The user uploading module is used for uploading the encrypted storage data to the IPFS node;
the tag return module is used for carrying out IPFS node calculation on the encrypted storage data and returning a hash tag to a user;
a user verification module for verifying the correctness of the hash tag,
the uplink module is used for transmitting the hash tag to a blockchain node for uplink;
and the block chain verification module is used for verifying the hash tag through the block chain node.
Preferably, if the data to be stored is text type information, the preprocessing module converts the text type information into text character strings, and calculates the text character strings according to a first type of hash encryption algorithm to obtain hash values.
Preferably, if the data to be stored is image type information, the preprocessing module converts the image type information into an image character string, and calculates the image character string according to a hash encryption algorithm of a second type to obtain a hash value.
Preferably, the tag return module is specifically configured to:
after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
Preferably, the uplink module is specifically configured to:
assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
The beneficial effects of the invention are as follows:
the data to be stored may be stored in the IPFS node in the form of a ciphertext, even if the attacker obtains the hash tag and the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored without the user symmetric key. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
FIG. 1 is a flowchart of a method for securely storing data based on a blockchain according to an embodiment of the present invention;
fig. 2 is a flowchart of a data secure storage system based on blockchain according to a second embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention pertains.
As shown in fig. 1, an embodiment of the present invention provides a data secure storage method based on a blockchain, including the steps of:
s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using the private key to obtain the encrypted storage data.
S2, uploading the encrypted storage data to the IPFS node by a user;
s3, the IPFS node calculates the encrypted storage data and returns a hash tag to the user;
s4, the user verifies the correctness of the hash label;
s5, the user sends the hash label to the block chain node for uplink;
s6, verifying the hash label by the block chain node.
Specifically, in step S1, if the data to be stored is text type information, the text type information is converted into text character strings, and the text character strings are calculated according to a first type of hash encryption algorithm to obtain hash values. The first type of hash encryption algorithm may be any one of an MD5 algorithm, a SHA1 algorithm, and a SHA224 algorithm.
In step S1, if the data to be stored is image type information, the image type information is converted into an image character string, and the image character string is calculated according to a hash encryption algorithm of a second type to obtain a hash value. The second type of hash encryption algorithm may be any one of SHA256 algorithm, SHA384 algorithm, SHA512 algorithm.
The first type of hash encryption algorithm may be the same algorithm as the second type of hash encryption algorithm, or may be a different algorithm. Generally, the data of the image type information will be larger than the data of the text type information, and based on this, in the embodiment of the present invention, the hash value length obtained by adopting the hash encryption algorithm of the second type is larger than that of the hash encryption algorithm of the first type.
When the embodiment of the invention calculates the hash value of the data to be stored in different types, different types of hash encryption algorithms are adopted, so that the workload of calculating the hash value can be reduced.
Further, the step S3 specifically includes: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using a hash encryption algorithm, and returns the hash tag to a user.
Specifically, after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, and if the verification is passed, it indicates that the encrypted storage data is not forged or tampered in the transmission process, otherwise, the IPFS node will give up the uploading request and return a failure message to the user. The embodiment of the invention ensures the authenticity of the encrypted stored data by utilizing the characteristics of quick forward direction, difficult reverse direction of the hash algorithm, non-repudiation, integrity and the like of the digital signature.
The step S4 specifically comprises the following steps: after receiving the data transmitted by the IPFS, the user decrypts the data by using the user private key to obtain the hash tag. And then, the user sends a query request to any one node of the IPFS network by using the hash tag, and verifies whether the encrypted storage data is stored in the IPFS network.
The step S5 specifically comprises the following steps: assembling the hash label into a transaction structure in the block chain body to obtain transaction data; and transmitting the transaction data to the blockchain node for data uplink operation.
The transaction data may include, among other things, a public key of the user, a transaction data generation timestamp, a hash tag of the transaction data, and a digital signature of the hash tag.
In step S6, the blockchain node verifies the hash-tag using the user' S public key and, after verification passes, broadcasts transaction data to other nodes in the blockchain network.
The embodiment of the invention provides a data security storage method based on a blockchain, which can store data to be stored in an IPFS node in a ciphertext mode, even if an attacker obtains a hash tag and obtains the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored under the condition of no symmetric key of a user. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Example two
An embodiment of the present invention provides a data secure storage system based on a blockchain, as shown in fig. 2, including:
the preprocessing module is used for selecting a corresponding hash encryption algorithm according to the type of the data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using the private key to obtain the encrypted storage data.
The user uploading module is used for uploading the encrypted storage data to the IPFS node;
the tag return module is used for performing IPFS node calculation on the encrypted storage data and returning a hash tag to a user;
a user verification module for verifying the correctness of the hash tag,
the uplink module is used for transmitting the hash tag to a blockchain node for uplink;
and the block chain verification module is used for verifying the hash tag through the block chain node.
Specifically, if the data to be stored is text type information, converting the text type information into text character strings, and calculating the text character strings according to a first type of hash encryption algorithm to obtain hash values. The first type of hash encryption algorithm may be any one of an MD5 algorithm, a SHA1 algorithm, and a SHA224 algorithm.
If the data to be stored is the image type information, converting the image type information into an image character string, and calculating the image character string according to a second type of hash encryption algorithm to obtain a hash value. The second type of hash encryption algorithm may be any one of SHA256 algorithm, SHA384 algorithm, SHA512 algorithm.
The first type of hash encryption algorithm may be the same algorithm as the second type of hash encryption algorithm, or may be a different algorithm. Generally, the data of the image type information will be larger than the data of the text type information, and based on this, in the embodiment of the present invention, the hash value length obtained by adopting the hash encryption algorithm of the second type is larger than that of the hash encryption algorithm of the first type.
When the embodiment of the invention calculates the hash value of the data to be stored in different types, different types of hash encryption algorithms are adopted, so that the workload of calculating the hash value can be reduced.
Further, the tag return module is specifically configured to: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using a hash encryption algorithm, and returns the hash tag to a user.
Specifically, after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, and if the verification is passed, it indicates that the encrypted storage data is not forged or tampered in the transmission process, otherwise, the IPFS node will give up the uploading request and return a failure message to the user. The embodiment of the invention ensures the authenticity of the encrypted stored data by utilizing the characteristics of quick forward direction, difficult reverse direction of the hash algorithm, non-repudiation, integrity and the like of the digital signature.
The user authentication module is specifically used for: after receiving the data transmitted by the IPFS, the user decrypts the data by using the user private key to obtain the hash tag. And then, the user sends a query request to any one node of the IPFS network by using the hash tag, and verifies whether the encrypted storage data is stored in the IPFS network.
The uplink module is specifically used for: assembling the hash label into a transaction structure in the block chain body to obtain transaction data; and transmitting the transaction data to the blockchain node for data uplink operation.
The transaction data may include, among other things, a public key of the user, a transaction data generation timestamp, a hash tag of the transaction data, and a digital signature of the hash tag.
The block chain verification module is specifically configured to: the blockchain node uses the user's public key to authenticate the hash tag and, after authentication passes, broadcasts transaction data to other nodes in the blockchain network.
The embodiment of the invention provides a data security storage system based on a blockchain, which can store data to be stored in an IPFS node in a ciphertext mode, even if an attacker obtains a hash tag and obtains the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored under the condition of no symmetric key of a user. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (10)

1. The data security storage method based on the block chain is characterized by comprising the following steps:
s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; signing the hash value by using a private key to obtain encrypted storage data;
s2, uploading the encrypted storage data to an IPFS node by a user;
s3, the IPFS node calculates the encrypted storage data and returns a hash tag to the user;
s4, the user verifies the correctness of the hash label;
s5, sending the hash label to a block chain node for uplink;
s6, verifying the hash label by the block chain node.
2. The method according to claim 1, wherein in step S1, if the data to be stored is text type information, the text type information is converted into text character strings, and the text character strings are calculated according to a first type of hash encryption algorithm to obtain hash values.
3. The method according to claim 1, wherein in step S1, if the data to be stored is image type information, the image type information is converted into an image character string, and the image character string is calculated according to a second type of hash encryption algorithm to obtain a hash value.
4. The blockchain-based data secure storage method of claim 1, wherein the step S3 specifically includes: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
5. The blockchain-based data secure storage method of claim 1, wherein the step S5 specifically includes: assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
6. A blockchain-based data secure storage system, comprising:
the preprocessing module is used for selecting a corresponding hash encryption algorithm according to the type of the data to be stored to calculate the data to be stored to obtain a hash value; signing the hash value by using a private key to obtain encrypted storage data;
the user uploading module is used for uploading the encrypted storage data to the IPFS node;
the tag return module is used for carrying out IPFS node calculation on the encrypted storage data and returning a hash tag to a user;
a user verification module for verifying the correctness of the hash tag,
the uplink module is used for transmitting the hash tag to a blockchain node for uplink;
and the block chain verification module is used for verifying the hash tag through the block chain node.
7. The blockchain-based data secure storage system of claim 6, wherein if the data to be stored is text-based information, the preprocessing module converts the text-based information into text strings, and calculates the text strings according to a first type of hash encryption algorithm to obtain hash values.
8. The blockchain-based data secure storage system of claim 6, wherein if the data to be stored is image type information, the preprocessing module converts the image type information into an image string, and calculates the image string according to a second type of hash encryption algorithm to obtain a hash value.
9. The blockchain-based data secure storage system of claim 6, wherein the tag return module is specifically configured to:
after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
10. The blockchain-based data secure storage system of claim 6, wherein the uplink module is specifically configured to:
assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
CN202211675743.XA 2022-12-26 2022-12-26 Block chain-based data security storage method and system Pending CN116232600A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211675743.XA CN116232600A (en) 2022-12-26 2022-12-26 Block chain-based data security storage method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211675743.XA CN116232600A (en) 2022-12-26 2022-12-26 Block chain-based data security storage method and system

Publications (1)

Publication Number Publication Date
CN116232600A true CN116232600A (en) 2023-06-06

Family

ID=86583394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211675743.XA Pending CN116232600A (en) 2022-12-26 2022-12-26 Block chain-based data security storage method and system

Country Status (1)

Country Link
CN (1) CN116232600A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117395474A (en) * 2023-12-12 2024-01-12 法序(厦门)信息科技有限公司 Locally stored tamper-resistant video evidence obtaining and storing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117395474A (en) * 2023-12-12 2024-01-12 法序(厦门)信息科技有限公司 Locally stored tamper-resistant video evidence obtaining and storing method and system
CN117395474B (en) * 2023-12-12 2024-02-27 法序(厦门)信息科技有限公司 Locally stored tamper-resistant video evidence obtaining and storing method and system

Similar Documents

Publication Publication Date Title
US10296248B2 (en) Turn-control rewritable blockchain
AU2017269736B2 (en) Multiple-link cryptologic blockchain
US11949789B2 (en) Blockchain-enabled computing
Holt et al. Logcrypt: forward security and public verification for secure audit logs
Accorsi BBox: A distributed secure log architecture
US20040006692A1 (en) Method and system for assuring an original
CN111898164B (en) Data integrity auditing method supporting label block chain storage and query
CN1717896A (en) Long-term secure digital signatures
EP0676109A1 (en) Method of extending the validity of a cryptographic certificate
CN114651248A (en) Random node selection for licensed blockchains
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN112732695B (en) Cloud storage data security deduplication method based on block chain
CN111461622B (en) Block chain-based warehouse credit rating, result acquisition and verification method and device
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN102419809A (en) Safe, efficient and universal method for proving original value of electronic document
CN111881109B (en) Database mergeable ledgers
CN112906056A (en) Cloud storage key security management method based on block chain
CN110851848B (en) Privacy protection method for symmetric searchable encryption
CN103326856A (en) Cloud storage data responsibility confirmation structure and method based on two-way digital signature
CN116232600A (en) Block chain-based data security storage method and system
JP2005275761A (en) Disclosure monitoring method and computer system
JP3788976B2 (en) Data registration system, data registration method and program
US7574607B1 (en) Secure pipeline processing
CN114826607B (en) Edge computing node compression method based on block chain and lightweight storage system
CN116366259A (en) Public verifiable Boolean search system and method for ciphertext data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination