Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

P2P storage system coding method based on Reed-Solomon code

A technology of storage system and encoding method, which is applied in the field of peer-to-peer network, can solve problems such as leakage, inability to completely delete data, and failure to protect user data privacy, so as to achieve the effect of ensuring security and reliability

Inactive Publication Date: 2008-06-04
PEKING UNIV
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Since the data is stored on other people's machines for a long time, if the key is lost or the traditional encryption algorithm is found to have weaknesses, attackers can discover other users' private data through the data stored on their machines
(2) Even if a user finds that his data is threatened by security (such as leaking the key or the strength of the encryption algorithm is found to be insufficient), he cannot completely delete the data stored on the attacker's machine to minimize his own losses
However, in this encoding method, since the original fragments are not encoded, the user can see the original fragments stored on the local machine by other users, so this encoding does not protect the privacy of user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • P2P storage system coding method based on Reed-Solomon code
  • P2P storage system coding method based on Reed-Solomon code
  • P2P storage system coding method based on Reed-Solomon code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in more detail through specific embodiments below in conjunction with the accompanying drawings, but these embodiments should not be construed as limiting the present invention.

[0035] 1. Generate encryption matrix G

[0036] 1) Galois field:

[0037] In order to prevent the result of the operation from exceeding the range that the computer can express, all our operations are defined on the Galois field, and the addition, subtraction, multiplication, and division on the Galois field are closed, and one has 2 L The Galois field of elements is denoted as GF(2 L ).

[0038] 2) Cauchy matrix:

[0039] In order to enable any m fragments among the redundant r×m fragments to be able to decode the original data, it is necessary to require that the sub-matrix formed by any m rows of the matrix G is linearly independent. The Cauchy matrix satisfies this property, and the definition of the Cauchy matrix is ​​given below:

[0040] {x ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A coding method based on a point-to-point storage system comprises the following encryption steps that: 1) an encryption matrix G is generated according to a key entered by the user and a redundancy r required by the user; 2) the original data is coded into the encrypted data fragments, the number of which is the product of r multiplied by m; 3) the fragments are named and different fragments are made to have the independent names, which are distributed into the point-to-point storage system; and the following decryption steps that: 4) when the user wants to read the data, the name of the data fragment is regenerated and the m fragments are collected from the point-to-point system according to the name of the fragment; and 5) a decryption matrix D<-1> corresponding to the encryption matrix G is constructed according to the key and the original data can be obtained through decryption. Combined with the characteristics and the bottom protocols of the P2P storage system, the invention can simultaneously ensure the security and reliability of the data and solve the defect of the present technical proposal in the application of the P2P storage system.

Description

technical field [0001] The invention belongs to the field of point-to-point network technology, and specifically relates to a data encoding method suitable for a point-to-point storage system, which can ensure high data security and reliability, and at the same time has relatively small calculation overhead. Background technique [0002] Peer-to-peer (P2P) storage system is a distributed file storage system based on peer-to-peer network. Users store data on other user nodes through the network instead of local hard disks. The status of each node is equal. A node is not only a client who uses the system to access files, but also a server that provides storage space resources in the system. In this way, a large-scale storage system can be built by collecting and utilizing idle resources of users. In recent years, many peer-to-peer storage systems have emerged internationally, such as [OCEANSTORE][CFS][PAST][FAESITE] and so on. [0003] In a P2P storage system, user data is s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30G06F17/30
Inventor 田敬杨智代亚非
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products