Unlock instant, AI-driven research and patent intelligence for your innovation.

Credible outsourcing storage method based on a block chain

A blockchain and trusted technology, applied in the direction of secure communication devices, transmission systems, payment circuits, etc.

Active Publication Date: 2019-03-19
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, how to choose a decentralized system that supports privacy-preserving query and verification operations is a big challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible outsourcing storage method based on a block chain
  • Credible outsourcing storage method based on a block chain
  • Credible outsourcing storage method based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0067] In order to evaluate the performance of the present invention, this embodiment deploys the Ethereum test network (Ganache) locally, and executes the algorithm involved in this solution in the test network. In Ganache, the blockchain block time is set to 0. Therefore, when evaluating system performance, there is no need to consider the impact of the complex network and mining time in Ethereum. In this embodiment, the data sender / receiver program runs on a computer configured with AMD Althlon M320 (2.1GHz) processor, 4GB RAM, Manjaro operating system, and 802.11bgn wireless network card. The Ganache network runs on a computer configured with a 4-core AMD A10-5800k (3.8GHz) processor, 8GB RAM, Windows 10 operating system, and a Gigabit Ethernet adapter. Both key and index sizes are set to 32 bytes. As shown in Table 1, the experiment uses three different (w i ,ind i ) to the database. In addition, the experiment runs the pseudo-random number generator function F P an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credible outsourcing storage method based on a block chain. The credible outsourcing storage method comprises four links of system initialization, data user data content searching, data owner adding and data content deleting. Different from a traditional storage mode of outsourcing a cloud end, the index is stored in an Ethereum, and the encrypted file is outsourced to the cloud end or an interstellar file system (IPFS), so that the completeness and reliability of a retrieval result are ensured. According to the method, the characteristic that the block chain is distributed and credible under the public network is fully utilized, and efficient retrieval, addition, deletion and other operations are supported by deploying the contract in the Ethereum.

Description

technical field [0001] The invention relates to safe data storage technology, in particular to a trusted outsourcing storage method based on blockchain. Background technique [0002] Today, cloud computing brings great convenience to individuals or organizations with limited resources due to its great flexibility and low overhead, and has drawn great attention from academia and industry. Specifically, the data owner outsources his / her database to the cloud and relies on the cloud to provide storage and query services for himself or other potential users. While the benefits of this behavior are huge, it can have security and privacy concerns. To ensure data confidentiality, an effective and straightforward approach is to encrypt data before outsourcing, while employing searchable symmetric encryption (SSE) schemes in the cloud to provide efficient encrypted data search capabilities. By using these solutions, data owners can protect data confidentiality by outsourcing encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/06H04L9/32
CPCG06Q20/065H04L9/3213
Inventor 姜顺荣吴子晗王良民段梦杰邬海琴陈向益
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD