CN117834656B - Edge computing cross-domain synchronization method and system - Google Patents

Edge computing cross-domain synchronization method and system Download PDF

Info

Publication number
CN117834656B
CN117834656B CN202410252372.7A CN202410252372A CN117834656B CN 117834656 B CN117834656 B CN 117834656B CN 202410252372 A CN202410252372 A CN 202410252372A CN 117834656 B CN117834656 B CN 117834656B
Authority
CN
China
Prior art keywords
data
target
synchronization
node
synchronized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410252372.7A
Other languages
Chinese (zh)
Other versions
CN117834656A (en
Inventor
邓韫
郑皓桦
刘海锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Youkegu Technology Co ltd
Original Assignee
Guangzhou Youkegu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Youkegu Technology Co ltd filed Critical Guangzhou Youkegu Technology Co ltd
Priority to CN202410252372.7A priority Critical patent/CN117834656B/en
Publication of CN117834656A publication Critical patent/CN117834656A/en
Application granted granted Critical
Publication of CN117834656B publication Critical patent/CN117834656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

The application provides a cross-domain synchronization method and a cross-domain synchronization system for edge calculation; the edge computing cross-domain synchronization method comprises the following steps: generating a first target master node according to the preamble master node generated in the previous data synchronization stage, so as to acquire a target receiving node and an initial synchronization list through the first target master node, and signing preset data in the initial synchronization list to acquire the target synchronization list; carrying out local synchronization on the target synchronization list through the target receiving node, and taking the target receiving node as a second target master node; and then judging whether the data in the target synchronization list is signed or not, and acquiring target data to be synchronized in the target synchronization list through the second target master node to perform global synchronization when the signature is completed. The application dynamically selects the node with higher data processing capability as the main node, and updates the main node based on the data similarity, thereby being beneficial to ensuring the quick and safe matching and synchronization of the whole network data and improving the operation efficiency of the system.

Description

Edge computing cross-domain synchronization method and system
Technical Field
The present application relates to the field of edge computing synchronization technologies, and in particular, to a method and a system for edge computing cross-domain synchronization.
Background
With the continuous progress of chip technology and integrated circuit technology, the performance of intelligent devices is continuously improved while the miniaturization of intelligent devices is developed, and more edge devices have relatively excessive computing power, so that the technical field of edge computing is generated. In general, edge devices are typically networked in a relatively loose distributed topology, and the efficiency of data transmission and synchronization between the edge devices is relatively low, thereby affecting the computing efficiency of the entire system. At present, scholars have proposed that edge computing nodes can be divided into a plurality of subfields according to different functions or performances, and then data synchronization is performed by taking the subfields as basic units. As for a specific synchronization strategy, no more reliable and efficient algorithm exists at present.
At present, some scholars propose that a global node can be selected from the whole system to serve as a relay scheduling node for data synchronization, each subdomain or node with data synchronization requirement needs to apply for the global node before data synchronization, and then the global node performs scheduling allocation operation in the data synchronization process. The method has the outstanding advantages that the algorithm is simple, and errors are not easy to occur in system design and code writing; however, the system has the defects of poor safety, easy attack of malicious nodes on the main node, overlarge data processing capacity of the global node and easy downtime, thereby causing paralysis of the system. Therefore, it is necessary to design an edge computing synchronization algorithm that combines security and efficiency.
Disclosure of Invention
The application provides an edge computing cross-domain synchronization method and system for solving the technical problems that the existing edge computing cross-domain synchronization method is poor in system security, a main node is easy to attack by malicious nodes, and in addition, the data processing capacity of a global node is too large and is easy to downtime, so that system paralysis is caused.
Specifically, the application provides an edge computing cross-domain synchronization method, which comprises the following steps:
s100: in response to the data synchronization request signal, a first target master node is generated from a preamble master node generated in a previous data synchronization stage.
S200: and acquiring a target receiving node and an initial synchronization list through the first target master node, and signing preset data in the initial synchronization list to acquire the target synchronization list.
S300: and locally synchronizing the target synchronization list through the target receiving node, and taking the target receiving node as a second target master node.
S400: judging whether the data in the target synchronous list is signed, if so, turning to step S500; otherwise, the process returns to step S200.
S500: and acquiring target data to be synchronized in a target synchronization list through the second target master node, and performing global synchronization on the target data to be synchronized.
Further, the step S100 includes:
Generating a first random seed through a preamble master node, acquiring a first tuple according to the current data synchronization times, the preamble master node and the first random seed, and transmitting the first tuple to a preset node.
And acquiring a second random seed based on the first tuple, and generating a second tuple according to the current data synchronization times, the preamble master node, the preset node, the first random seed and the second random seed.
And signing the second tuple to generate a first target signature, generating a third tuple based on the first target signature and the second random seed, and simultaneously transmitting the third tuple to the preamble master node.
Further, the step S100 further includes:
And generating a third random seed through the preamble master node, generating a fourth tuple according to the third tuple and the third random seed, and signing the fourth tuple to obtain a second target signature.
And acquiring a first target master node according to the second target signature, generating a fifth tuple according to the third tuple, the third random seed and the second target signature, and transmitting the fifth tuple to a preset node.
Further, the step S200 includes:
and acquiring a target receiving node from the preset node through the first target main node, generating a sixth tuple according to the first target main node and the current data synchronization times, and sending the sixth tuple to the target receiving node.
And acquiring the first data to be synchronized and transmitting the first data to be synchronized to the first target master node.
And comparing the first data to be synchronized with preset data through the first target main node so as to acquire the same data, including data, intersecting data and irrelevant data of the first data to be synchronized and the preset data.
Further, the step S200 further includes:
And generating a first synchronization index according to the same data, the contained data, the intersected data and the irrelevant data, and generating a second synchronization index according to the first synchronization index.
Wherein, the first synchronization index =Second synchronization index =/>
The said、/>、/>And/>Respectively identical data, containing data, intersecting data and irrelevant data,/>、/>、/>And/>D is the first data to be synchronized, M is the number of target receiving nodes; r i,j denotes a first synchronization index, i denotes an order of neighboring subfields, and j denotes an order of target receiving nodes.
Further, the step S200 further includes:
and acquiring a final receiving node according to the second synchronization index and the target receiving node.
Dividing first data to be synchronized into preset sub-data through a first target main node, and generating an initial synchronization list according to the sub-data.
And sending the initial synchronization list to a final receiving node.
Further, the step S200 further includes:
And acquiring second data to be synchronized according to the first data to be synchronized, and comparing the first data to be synchronized with the second data to be synchronized through the second target main node to acquire consistent sub-data as first signature data and inconsistent sub-data as second signature data.
The first signature data and the second signature data are respectively signed to generate a target synchronization list based on the initial synchronization list.
Further, after the step S300 is performed, the method further includes:
And acquiring data which is not subjected to signature operation in the target synchronous list by the second target receiving node as first data to be synchronized.
Further, the step S500 of obtaining the target data to be synchronized includes:
and acquiring sub-data, the number of which is larger than a first preset number, in the target synchronization list as first target data to be synchronized, and acquiring sub-data, the number of which is larger than a second preset number and the difference value between the average value of the data sizes and the data size of the first target data to be synchronized is smaller than a preset difference value, as second target data to be synchronized.
And generating target data to be synchronized based on the first target data to be synchronized and the second target data to be synchronized.
Based on the same conception, the application also provides an edge computing cross-domain synchronization system, which comprises:
the generation module is used for: for generating a first target master node in response to a data synchronization request signal from a preamble master node generated in a previous data synchronization stage.
A first acquisition module: the method comprises the steps of acquiring a target receiving node and an initial synchronization list through the first target main node, and signing preset data in the initial synchronization list to acquire the target synchronization list.
And a second acquisition module: and the target receiving node is used for carrying out local synchronization on the target synchronization list through the target receiving node and is used as a second target master node.
And a judging module: the method comprises the steps of judging whether the data in the target synchronous list is signed, and if so, transferring to a synchronous module; otherwise, returning to the first acquisition module.
And a synchronization module: and the second target master node is used for acquiring target data to be synchronized in a target synchronization list and performing global synchronization on the target data to be synchronized.
Compared with the prior art, the application has the beneficial effects that:
The application realizes a safe and efficient data synchronization algorithm of the edge computing system, and is particularly suitable for edge computing scenes which are large in network scale and are composed of heterogeneous devices; the existing edge calculation data synchronization algorithm usually needs to preset a global relay scheduling node, is insufficient in safety and has downtime risk, and the data flow is too concentrated and the peak performance is low, so that the method is not suitable for edge calculation scenes with high requirements on stability and instantaneity, particularly commercial scenes; according to the application, the node with higher data processing capacity is dynamically selected as the main node by the cryptographic digital signature algorithm, and the main node is updated based on the data similarity, so that the quick and safe matching and synchronization of the whole network data are ensured, and the operation efficiency of the whole system is improved.
Drawings
Fig. 1 is a flowchart of an edge computing cross-domain synchronization method according to the present application.
FIG. 2 is a system frame diagram of the edge computing cross-domain synchronization method described in FIG. 1.
Detailed Description
The application provides an edge computing cross-domain synchronization method and system, which are used for solving the technical problems that the existing edge computing cross-domain synchronization method is poor in system safety, a main node is easily attacked by malicious nodes, and in addition, the data processing amount of a global node is too large and is easily downtime, so that the system is paralyzed.
The application relates to a method and a system for edge computing cross-domain synchronization, which are described in further detail below with reference to specific embodiments and drawings.
Examples
Referring to fig. 1, the present application provides a method for edge computing cross-domain synchronization, comprising the following steps:
s100: in response to the data synchronization request signal, a first target master node is generated from a preamble master node generated in a previous data synchronization stage.
Further, the step S100 includes:
Generating a first random seed through a preamble master node, acquiring a first tuple according to the current data synchronization times, the preamble master node and the first random seed, and transmitting the first tuple to a preset node.
In this embodiment, in response to a data synchronization request signal of a preset subfield, a first random seed is generated according to a master node generated in a previous stage of the preset subfield, that is, the preamble master node yTo obtain a first tupleAnd sending the message to all nodes in a preset sub-domain, namely the preset nodes.
Wherein,The initial value is 0 for the number of times the entire system has completed synchronization.
And acquiring a second random seed based on the first tuple, and generating a second tuple according to the current data synchronization times, the preamble master node, the preset node, the first random seed and the second random seed.
In this embodiment, the other node x in the preset sub-domain receives the first random seedThereafter, a second random seed/>, is generated. And signing the second tuple to generate a first target signature, generating a third tuple based on the first target signature and the second random seed, and simultaneously transmitting the third tuple to the preamble master node.
In this embodiment, the private key is used for the second tupleAnd signing to generate a first target signature q.
When a second random seed is foundLeading/>, leading binary number of first target signature qThe sum of bits is greater than the default value, then the third tuple/>And sending the message to the preamble master node.
Further, the step S100 further includes:
And generating a third random seed through the preamble master node, generating a fourth tuple according to the third tuple and the third random seed, and signing the fourth tuple to obtain a second target signature.
In this embodiment, the preamble master node counts all third tuples meeting the requirements in a default time period, and then generates a third random seedAnd for the fourth tuple/>And signing to generate a second target signature g.
And acquiring a first target master node according to the second target signature, generating a fifth tuple according to the third tuple, the third random seed and the second target signature, and transmitting the fifth tuple to a preset node.
In this embodiment, the leading master node that minimizes the second target signature g becomes the new master node, and the first target master node, and the fifth tupleAnd sending the message to all nodes in a preset sub-domain, namely the preset nodes.
Wherein the fifth tuple may be referred to as an election result tuple.
It should be noted that, through the algorithm, a new node with higher data processing capability can be selected, excessive operation time is not consumed, nodes inside and outside the preset subdomain are ensured not to learn the election result in advance, probability of the subdomain main node being attacked by the external node is reduced, and safety is improved.
S200: and acquiring a target receiving node and an initial synchronization list through the first target master node, and signing preset data in the initial synchronization list to acquire the target synchronization list.
Further, the step S200 includes:
and acquiring a target receiving node from the preset node through the first target main node, generating a sixth tuple according to the first target main node and the current data synchronization times, and sending the sixth tuple to the target receiving node.
In this embodiment, the first target master node x randomly selects M receiving nodes (i.e., the target receiving nodes) from each neighboring subfield (N neighboring subfields), and tuples the synchronization signal, i.e., the sixth tupleTo each target receiving node.
It should be noted that x in the embodiment of step S200 refers to the first target master node, and is different from the other nodes x described in the embodiment of step S100.
And acquiring the first data to be synchronized and transmitting the first data to be synchronized to the first target master node.
In the present embodiment, the firstFirst/>, of the adjacent subfieldsIndividual target receiving node/>The local data to be synchronized (namely the first data to be synchronized) are sent to a first target master node x, and the sent data areWherein/>Is the receiving node/>Local data not yet acknowledged synchronously,/>Is the receiving node/>Couple tuple/>Is a signature of (a).
Wherein,Is a list structure, and each element of the list stores asynchronous sub-data independent of each other.
And comparing the first data to be synchronized with preset data through the first target main node so as to acquire the same data, including data, intersecting data and irrelevant data of the first data to be synchronized and the preset data.
In this embodiment, the first target master node x will synchronize the local data D (also a list) to be synchronized with the received dataComparing, and recording the completely consistent data quantity in the two sub-data as/>The data amount which is the inclusion relation is/>The data volume with the intersection relationship is/>The data volume is completely irrelevant is/>
Further, the step S200 further includes:
And generating a first synchronization index according to the same data, the contained data, the intersected data and the irrelevant data, and generating a second synchronization index according to the first synchronization index.
Wherein, the first synchronization index =Second synchronization index =/>
Wherein the first synchronization index is a first target master node x and a target receiving nodeThe second sync index refers to the sync index of the neighbor subfield i with the current subfield.
The said、/>、/>And/>The same data, the contained data, the intersected data and the irrelevant data, respectively, are the same as described above/>、/>、/>And/>、/>、/>And/>D is the first data to be synchronized, M is the number of target receiving nodes; r i,j denotes a first synchronization index, i denotes an order of neighboring subfields, and j denotes an order of target receiving nodes.
Further, the step S200 further includes:
and acquiring a final receiving node according to the second synchronization index and the target receiving node.
In this embodiment, the first target master node x uses the adjacent sub-domain with the largest second synchronization index as the final receiving sub-domain, and uses the node with the largest second synchronization index in the sub-domain as the final receiving node
Dividing first data to be synchronized into preset sub-data through a first target main node, and generating an initial synchronization list according to the sub-data.
In this embodiment, the first target master node x divides the local data D to be synchronized (i.e. the first data to be synchronized) into U mutually independent sub-data, the firstThe individual subdata are denoted as D [ t ]. Simultaneously generating an initial synchronization list V, each element V [ t ] of V storing a tuple/>Wherein/>Is the first target master node x pair sub-dataIs a signature of (a).
And sending the initial synchronization list to a final receiving node.
In the present embodiment, the initial synchronization list V is issued to the final receiving node. To this end, the signature count obtained for each subsection of data D is 1.
Further, the step S200 further includes:
And acquiring second data to be synchronized according to the first data to be synchronized, and comparing the first data to be synchronized with the second data to be synchronized through the second target main node to acquire consistent sub-data as first signature data and inconsistent sub-data as second signature data.
In this embodiment, the final receiving nodeAfter receiving the initial synchronization list V, the local data D to be synchronized and the local data/>, to be synchronized are obtained(I.e. the second data to be synchronized) and then initially expanding the size of the list V toWherein/>Is/>And D, the number of the sub-data inconsistent with D, and putting all the inconsistent sub-data and the signature of the receiving node into an extension element of the list V.
The first signature data and the second signature data are respectively signed to generate a target synchronization list based on the initial synchronization list.
In this embodiment, for consistent sub-data, the final receiving nodeThen they are signed separately and the signature is placed in the element corresponding to the initial synchronization list V. I.e. for the original inconsistent data/>, in DThe structure of element V [ t ] is still/>; For consistent sub-data D [ t ], the structure of element V [ t ] is/>,/>Is a nodePair/>Is a signature of (a); for/>Newly added inconsistent data/>The structure of the element V [ U+a ] is,/>,/>Is/>Is inconsistent with D, is/areIs the receiving node/>Pair/>Is a signature of (a).
After the corresponding signature is completed, a target synchronous list is further obtained.
So far, the signature count obtained by the data consistent part in the data D to be synchronized is 2, and the inconsistent parts are all 1.
S300: and locally synchronizing the target synchronization list through the target receiving node, and taking the target receiving node as a second target master node.
In this embodiment, the final receiving nodeThe target synchronous list is sent to all nodes which sign the data in the target synchronous list, and the final receiving node/>Acting as a new master node x, the second target master node.
It should be noted that the master node x is different from the first target master node x in the embodiment of step S200, and is also different from the other nodes x described in the embodiment of step S100.
Further, after the step S300 is performed, the method further includes:
And acquiring data which is not subjected to signature operation in the target synchronous list by the second target receiving node as first data to be synchronized.
In this embodiment, all data to be synchronized in the target synchronization list V is used as new data to be synchronized D.
S400: judging whether the data in the target synchronous list is signed, if so, turning to step S500; otherwise, the process returns to step S200.
S500: and acquiring target data to be synchronized in a target synchronization list through the second target master node, and performing global synchronization on the target data to be synchronized.
Further, the step S500 of obtaining the target data to be synchronized includes:
and acquiring sub-data, the number of which is larger than a first preset number, in the target synchronization list as first target data to be synchronized, and acquiring sub-data, the number of which is larger than a second preset number and the difference value between the average value of the data sizes and the data size of the first target data to be synchronized is smaller than a preset difference value, as second target data to be synchronized.
In this embodiment, the second target master node of each preset subdomain performs statistical processing on the target synchronization list V, and the subdata meeting the following requirements is used as final confirmed synchronization data.
If the number of signature of the sub data D [ t ] exceeds half of the number of subdomains, D [ t ] meets the requirement, and the obtained D [ t ] is the first target data to be synchronized; otherwise, if there is signed sub-dataSatisfy/>And such/>Quantity exceeds a default value/>And all/>Average value of data size and/>The difference in data size is less than a given default value/>And D [ t ] also meets the requirement, and the obtained D [ t ] is the second target data to be synchronized.
In practical development, the degree of importance of Dt may be adjustedAnd/>Is of a size of (a) and (b).
And generating target data to be synchronized based on the first target data to be synchronized and the second target data to be synchronized.
In this embodiment, all obtained dt are target data to be synchronized, and each second target master node synchronizes list elements vt corresponding to all data dt that are finally obtained and confirmed to all nodes in a preset subdomain.
And then all nodes of all preset subdomains carry out global synchronization on the target data to be synchronized.
Examples
The application also provides an edge computing cross-domain synchronization system, which comprises:
the generation module is used for: for generating a first target master node in response to a data synchronization request signal from a preamble master node generated in a previous data synchronization stage.
A first acquisition module: the method comprises the steps of acquiring a target receiving node and an initial synchronization list through the first target main node, and signing preset data in the initial synchronization list to acquire the target synchronization list.
And a second acquisition module: and the target receiving node is used for carrying out local synchronization on the target synchronization list through the target receiving node and is used as a second target master node.
And a judging module: the method comprises the steps of judging whether the data in the target synchronous list is signed, and if so, transferring to a synchronous module; otherwise, returning to the first acquisition module.
And a synchronization module: and the second target master node is used for acquiring target data to be synchronized in a target synchronization list and performing global synchronization on the target data to be synchronized.
In summary, the present application provides a method and a system for edge computing cross-domain synchronization; firstly, responding to a data synchronization request signal, and generating a first target master node according to a preamble master node generated in a previous data synchronization stage; then, acquiring a target receiving node and an initial synchronization list through the first target master node, and signing preset data in the initial synchronization list to acquire a target synchronization list; the target receiving node performs local synchronization on the target synchronization list, and the target receiving node is used as a second target master node; and then judging whether the data in the target synchronization list is signed or not, so that when the signature is finished, the target data to be synchronized in the target synchronization list is obtained through the second target master node, and global synchronization is carried out on the target data to be synchronized. According to the application, the node with higher data processing capacity is dynamically selected as the main node by the cryptographic digital signature algorithm, and the main node is updated based on the data similarity, so that the quick and safe matching and synchronization of the whole network data are ensured, and the operation efficiency of the whole system is improved.
Although the illustrative embodiments have been described herein with reference to the accompanying drawings, it is to be understood that the above illustrative embodiments are merely exemplary and are not intended to limit the scope of the present application thereto. Various changes and modifications may be made therein by one of ordinary skill in the art without departing from the scope and spirit of the application. All such changes and modifications are intended to be included within the scope of the present application as set forth in the appended claims.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another device, or some features may be omitted or not performed.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
While the application has been described in conjunction with the specific embodiments above, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, all such alternatives, modifications, and variations are included within the spirit and scope of the following claims.

Claims (3)

1. An edge computing cross-domain synchronization method is characterized by comprising the following steps:
s100: responding to the data synchronization request signal, and generating a first target master node according to the preamble master node generated in the previous data synchronization stage;
Generating a first random seed through a preamble master node, acquiring a first tuple according to the current data synchronization times, the preamble master node and the first random seed, and transmitting the first tuple to a preset node;
Acquiring a second random seed based on the first tuple, and generating a second tuple according to the current data synchronization times, the preamble master node, a preset node, the first random seed and the second random seed;
Signing the second tuple to generate a first target signature, generating a third tuple based on the first target signature and a second random seed, and simultaneously transmitting the third tuple to a preamble master node;
Generating a third random seed through the preamble master node, generating a fourth tuple according to the third tuple and the third random seed, and signing the fourth tuple to obtain a second target signature;
Acquiring a first target master node according to the second target signature, generating a fifth tuple according to the third tuple, the third random seed and the second target signature, and transmitting the fifth tuple to a preset node;
S200: acquiring a target receiving node and an initial synchronization list through the first target master node, and signing preset data in the initial synchronization list to acquire a target synchronization list;
The method comprises the steps that a target receiving node is obtained from a preset node through a first target main node, a sixth tuple is generated according to the first target main node and the current data synchronization times, and the sixth tuple is sent to the target receiving node;
acquiring first data to be synchronized, and transmitting the first data to be synchronized to a first target master node;
comparing the first data to be synchronized with preset data through the first target main node to obtain the same data, including data, intersecting data and irrelevant data of the first data to be synchronized and the preset data;
generating a first synchronization index according to the same data, the contained data, the intersected data and the irrelevant data, and generating a second synchronization index according to the first synchronization index;
Wherein, the first synchronization index = Second synchronization index =/>
The said、/>、/>And/>Respectively identical data, containing data, intersecting data and irrelevant data,/>、/>、/>AndIs a constant which is arbitrarily larger than zero, D is first data to be synchronized, M is the number of target receiving nodes,/>, andRepresenting a first synchronization index, i representing the order of neighboring subfields, j representing the order of target receiving nodes;
Acquiring a final receiving node according to the second synchronization index and the target receiving node;
dividing first data to be synchronized into preset sub-data through a first target main node, and generating an initial synchronization list according to the sub-data;
Transmitting the initial synchronization list to a final receiving node;
Acquiring second data to be synchronized according to the first data to be synchronized, and comparing the first data to be synchronized with the second data to be synchronized through the second target main node to acquire consistent sub-data as first signature data and inconsistent sub-data as second signature data;
respectively signing the first signature data and the second signature data to generate a target synchronization list based on the initial synchronization list;
S300: locally synchronizing the target synchronization list through the target receiving node, and taking the target receiving node as a second target master node;
s400: judging whether the data in the target synchronous list is signed, if so, turning to step S500; otherwise, returning to the step S200;
S500: acquiring target data to be synchronized in a target synchronization list through the second target master node, and performing global synchronization on the target data to be synchronized;
The method comprises the steps of obtaining sub-data, of which the number of completed signatures is larger than a first preset number, in a target synchronization list to serve as first target data to be synchronized, and obtaining sub-data, of which the number of completed signatures is larger than a second preset number and the difference value between the average value of the data sizes and the data size of the first target data to be synchronized is smaller than a preset difference value, as second target data to be synchronized;
and generating target data to be synchronized based on the first target data to be synchronized and the second target data to be synchronized.
2. The edge computing cross-domain synchronization method according to claim 1, further comprising, after performing step S300:
And acquiring data which is not subjected to signature operation in the target synchronous list by the second target receiving node as first data to be synchronized.
3. A system employing the edge computing cross-domain synchronization method of any of claims 1-2, the system comprising:
the generation module is used for: the first target master node is used for responding to the data synchronization request signal and generating a first target master node according to the preamble master node generated in the previous data synchronization stage;
Generating a first random seed through a preamble master node, acquiring a first tuple according to the current data synchronization times, the preamble master node and the first random seed, and transmitting the first tuple to a preset node;
Acquiring a second random seed based on the first tuple, and generating a second tuple according to the current data synchronization times, the preamble master node, a preset node, the first random seed and the second random seed;
Signing the second tuple to generate a first target signature, generating a third tuple based on the first target signature and a second random seed, and simultaneously transmitting the third tuple to a preamble master node;
Generating a third random seed through the preamble master node, generating a fourth tuple according to the third tuple and the third random seed, and signing the fourth tuple to obtain a second target signature;
Acquiring a first target master node according to the second target signature, generating a fifth tuple according to the third tuple, the third random seed and the second target signature, and transmitting the fifth tuple to a preset node;
A first acquisition module: the method comprises the steps that a target receiving node and an initial synchronization list are obtained through a first target main node, and preset data in the initial synchronization list are signed to obtain a target synchronization list;
The method comprises the steps that a target receiving node is obtained from a preset node through a first target main node, a sixth tuple is generated according to the first target main node and the current data synchronization times, and the sixth tuple is sent to the target receiving node;
acquiring first data to be synchronized, and transmitting the first data to be synchronized to a first target master node;
comparing the first data to be synchronized with preset data through the first target main node to obtain the same data, including data, intersecting data and irrelevant data of the first data to be synchronized and the preset data;
generating a first synchronization index according to the same data, the contained data, the intersected data and the irrelevant data, and generating a second synchronization index according to the first synchronization index;
Wherein, the first synchronization index = Second synchronization index =/>
The said、/>、/>And/>Respectively identical data, containing data, intersecting data and irrelevant data,/>、/>、/>AndIs a constant which is arbitrarily larger than zero, D is first data to be synchronized, M is the number of target receiving nodes,/>, andRepresenting a first synchronization index, i representing the order of neighboring subfields, j representing the order of target receiving nodes;
Acquiring a final receiving node according to the second synchronization index and the target receiving node;
dividing first data to be synchronized into preset sub-data through a first target main node, and generating an initial synchronization list according to the sub-data;
Transmitting the initial synchronization list to a final receiving node;
Acquiring second data to be synchronized according to the first data to be synchronized, and comparing the first data to be synchronized with the second data to be synchronized through the second target main node to acquire consistent sub-data as first signature data and inconsistent sub-data as second signature data;
respectively signing the first signature data and the second signature data to generate a target synchronization list based on the initial synchronization list;
and a second acquisition module: the target receiving node is used for carrying out local synchronization on the target synchronization list and is used as a second target master node;
And a judging module: the method comprises the steps of judging whether the data in the target synchronous list is signed, and if so, transferring to a synchronous module; otherwise, returning to the first acquisition module;
And a synchronization module: the method comprises the steps that target data to be synchronized in a target synchronization list are obtained through a second target master node, and global synchronization is carried out on the target data to be synchronized;
The method comprises the steps of obtaining sub-data, of which the number of completed signatures is larger than a first preset number, in a target synchronization list to serve as first target data to be synchronized, and obtaining sub-data, of which the number of completed signatures is larger than a second preset number and the difference value between the average value of the data sizes and the data size of the first target data to be synchronized is smaller than a preset difference value, as second target data to be synchronized;
and generating target data to be synchronized based on the first target data to be synchronized and the second target data to be synchronized.
CN202410252372.7A 2024-03-06 2024-03-06 Edge computing cross-domain synchronization method and system Active CN117834656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410252372.7A CN117834656B (en) 2024-03-06 2024-03-06 Edge computing cross-domain synchronization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410252372.7A CN117834656B (en) 2024-03-06 2024-03-06 Edge computing cross-domain synchronization method and system

Publications (2)

Publication Number Publication Date
CN117834656A CN117834656A (en) 2024-04-05
CN117834656B true CN117834656B (en) 2024-06-11

Family

ID=90506319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410252372.7A Active CN117834656B (en) 2024-03-06 2024-03-06 Edge computing cross-domain synchronization method and system

Country Status (1)

Country Link
CN (1) CN117834656B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045820A1 (en) * 2016-09-07 2018-03-15 华为技术有限公司 File synchronization method, device, and system
CN108810100A (en) * 2018-05-22 2018-11-13 郑州云海信息技术有限公司 A kind of electoral machinery of host node, device and equipment
CN110336707A (en) * 2019-08-07 2019-10-15 卓尔智联(武汉)研究院有限公司 Block chain common recognition device, method and computer readable storage medium
CN111274317A (en) * 2020-01-07 2020-06-12 书生星际(北京)科技有限公司 Method and device for synchronizing multi-node data and computer equipment
CN112804313A (en) * 2020-12-31 2021-05-14 杭州雾联科技有限公司 Data synchronization method, device, equipment and medium based on cross-domain edge node
CN114726871A (en) * 2022-03-22 2022-07-08 阿里巴巴(中国)有限公司 Data synchronization method, device and network system
CN115720227A (en) * 2022-11-15 2023-02-28 杭州钛度科技有限公司 Election method and device for consensus nodes of block chain and electronic equipment
CN117061512A (en) * 2023-08-10 2023-11-14 ***通信集团广东有限公司 Distributed information management method and system based on big data
CN117439998A (en) * 2022-07-12 2024-01-23 华侨大学 Alliance chain consensus protocol optimization method oriented to Internet of things

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113190622B (en) * 2021-03-16 2022-08-09 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045820A1 (en) * 2016-09-07 2018-03-15 华为技术有限公司 File synchronization method, device, and system
CN108810100A (en) * 2018-05-22 2018-11-13 郑州云海信息技术有限公司 A kind of electoral machinery of host node, device and equipment
CN110336707A (en) * 2019-08-07 2019-10-15 卓尔智联(武汉)研究院有限公司 Block chain common recognition device, method and computer readable storage medium
CN111274317A (en) * 2020-01-07 2020-06-12 书生星际(北京)科技有限公司 Method and device for synchronizing multi-node data and computer equipment
CN112804313A (en) * 2020-12-31 2021-05-14 杭州雾联科技有限公司 Data synchronization method, device, equipment and medium based on cross-domain edge node
CN114726871A (en) * 2022-03-22 2022-07-08 阿里巴巴(中国)有限公司 Data synchronization method, device and network system
CN117439998A (en) * 2022-07-12 2024-01-23 华侨大学 Alliance chain consensus protocol optimization method oriented to Internet of things
CN115720227A (en) * 2022-11-15 2023-02-28 杭州钛度科技有限公司 Election method and device for consensus nodes of block chain and electronic equipment
CN117061512A (en) * 2023-08-10 2023-11-14 ***通信集团广东有限公司 Distributed information management method and system based on big data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"融合区块链和Rsync的边缘节点数据同步";梁任纲;何倩;刘鹏;蒋明;《桂林电子科技大学学报》;20211225;第41卷(第06期);全文 *
基于区块链和边缘计算的智慧农业***;林波;杨睿哲;杨兆鑫;金凯;***;;情报工程;20180615(第03期);全文 *

Also Published As

Publication number Publication date
CN117834656A (en) 2024-04-05

Similar Documents

Publication Publication Date Title
JP4117144B2 (en) Peer-to-peer name resolution protocol (PNRP) and multi-level cache for use therewith
CN110198233B (en) Block chain consensus method and system based on trusted execution environment and directed acyclic graph
US7257711B2 (en) Efficient authenticated dictionaries with skip lists and commutative hashing
CN110213038B (en) Method and system for forming consensus of block chain
CN108985740B (en) Method for realizing high-performance consensus algorithm
WO2023016426A1 (en) Asynchronous binary agreement method and apparatus, and electronic device and storage medium
CN113826355A (en) Short transaction identifier collision detection and coordination
CN109919760A (en) Byzantine failure tolerance common recognition algorithm based on voting mechanism
CN115278737B (en) Data acquisition method of 5G network
CN113572762A (en) Controllable sharing method and system based on Internet of things data
CN117834656B (en) Edge computing cross-domain synchronization method and system
CN1409837A (en) System and method for fault-tolerant clock synchronization using interactive convergence
Xu et al. Occam: A secure and adaptive scaling scheme for permissionless blockchain
CN111667264B (en) Block data transmission method and device, electronic equipment and nonvolatile computer storage medium
CN115878729B (en) Node block storage allocation optimization method and system based on alliance chain
CN111258623A (en) Server and method for providing application and file, user terminal and computer readable storage medium
CN116405179A (en) Building networking data management method based on block chain slicing and DAG
CN114745102B (en) Lightweight and extensible blockchain system based on edge calculation
CN114928446A (en) Efficient consensus method for large-scale nodes
CN114461730A (en) Adaptive block data compression method based on remainder system
CN115021945B (en) Block chain transaction processing method and system
CN114900319A (en) Block chain transaction verification method and system
CN117376137A (en) Block chain node slicing method, equipment and storage medium
CN115297131B (en) Sensitive data distributed storage method based on consistent hash
CN115102955B (en) Method for storing and updating out-of-chain data based on chameleon hash function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant