Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File damage prevention method based on block chain and erasure code

A blockchain and erasure code technology, which is applied in the field of file anti-corruption based on blockchain and erasure code, can solve problems such as the inability of files to be used normally, the corresponding relationship between files is disordered, and the storage cost soaring, so as to avoid The risk of malicious tampering, the effect of increasing security, and ensuring security

Pending Publication Date: 2019-07-16
TSINGHUA TONGFANG CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Question 1. Files are stored in the file system. If the file system is a traditional file system, then a file is stored in one location as a whole
[0008] Question 2. According to question 1, if the file is encrypted, once the hacker has the key, he can tamper with the content of the file
Since the storage location of the file has not changed, but the content of the file has changed, this change cannot be detected by the file system itself.
Even if the file has been backed up before, it is difficult to find that the file has been tampered with, so the file will not be restored in time, resulting in the tampered file being used all the time
[0009] Question 3. According to Question 1, once a hacker deletes a file, if the file has not been backed up in time before, the hacker’s deletion operation will cause the file to be permanently lost
[0010] Question 4. According to Question 1, even if the file name uses a naming method that is not very readable, if a random code is used to name it, there will generally be a centralized file management system to record the difference between the random code file name and the actual file name. Correspondence
At this time, even if the hacker cannot intrude into the file storage node to tamper with or delete the file, the disorder of the file correspondence in the file management system will cause the file to be unable to be used normally.
[0011] Question 5. With multi-copy storage, the storage cost will increase dramatically, and the above-mentioned questions 1, 2 and 3 still exist
With the offline backup scheme, due to the time difference between file generation and file backup, if a file is maliciously tampered with or deleted within this time difference, it will be permanent and unrecoverable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File damage prevention method based on block chain and erasure code
  • File damage prevention method based on block chain and erasure code
  • File damage prevention method based on block chain and erasure code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0143] File storage method, see figure 1 , The detailed steps are as follows:

[0144] 1) Combine erasure coding technology to divide the file into N file blocks.

[0145] Erasure codes use RS codes, and the parameters (n, m) are uniformly configured according to the system. The parameter n indicates how many copies of the original file are to be divided, and the parameter m indicates how many check file blocks are required. A file is divided by the RS code with the parameter (n, m), and the number of file blocks after division is n+m. Among the n+m file blocks, only any n data blocks are needed to restore the entire file. For example, if it is configured as (6,3), it means that the file will be divided into 6 parts, and 3 check file blocks are required, so 9 file blocks will be generated in the end. Up to 3 file blocks are allowed to be destroyed in these 9 file blocks. Within this number range, the entire file can be restored.

[0146] 2) Digitally sign each file block with a p...

Embodiment 2

[0163] For the steps of file reading provided by the present invention, see 2. The detailed steps are described as follows:

[0164] 1) Read the file ledger on the blockchain to find out the information of all file blocks of the file.

[0165] Use the private key of the elliptic curve encryption algorithm to decrypt the file ledger on the blockchain. In the transactions data structure of the block body, find all the records whose FileName field is the file name that needs to be read. For example, the FileName field is ABIS_20180603123540_2051_000. All records of dat, and finally the record with the largest Version value is filtered out.

[0166] 2) Find and return all file blocks in the distributed storage system according to the file block information.

[0167] In the query result of the above step 1), obtain each file block from the corresponding storage node through the P2P protocol or through the RPC protocol according to the values ​​of the BlockName and BlockLocation fields.

[0...

Embodiment 3

[0185] For the method of restoring a tampered file provided by the present invention, see 3. The detailed steps are as follows:

[0186] 1) It is found that the digital signature of the file block is incorrect.

[0187] In Embodiment 2, if the digital signature of a certain file block is found to be incorrect, it means that the file block has been tampered with, and the file block cannot be used.

[0188] 2) Mark the file block as invalid, and execute step 11) simultaneously.

[0189] The file block with incorrect digital signature is recorded in a list in the memory, and the file block is regarded as missing by the system. The system executes step 11) at the same time and sends out an alarm message.

[0190] 3) Enable erasure code to recover the file block.

[0191] Using erasure coding technology, the file block with incorrect digital signature is recovered through the correct file block, and the file block in the original state is obtained.

[0192] 4) The system randomly generates a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file damage prevention method based on a block chain and erasure codes, and relates to the field of computer information management systems. Parts related to encryption in the file all adopt an asymmetric encryption algorithm; the method comprises steps of constructing a distributed storage system; dividing one file into a plurality of file blocks containing erasure codes, wherein each file block is an independent file which is randomly stored on different PC servers after being encrypted; constructing a file management system based on the block chain; encrypting datain the metadata account book by using a public key, wherein contents can be decrypted and read only by using a private key. The method comprises five parts, namely (1) file storage, (2) file reading,(3) tampered file recovery, (4) missing file block recovery and (5) file block recovery on a fault storage node. Compared with the prior art, the method has the advantages that the tamper resistanceof the block chain and the data protection technology of the erasure code are combined, and the safety of file storage is greatly improved through a systematic solution.

Description

Technical field [0001] The invention relates to the field of computer information management systems, in particular to a file anti-corruption method based on block chains and erasure codes. Background technique [0002] In a system that generates a large number of files, such as Internet log retention systems, video surveillance systems, billing systems, etc., these systems generate data files all the time, and these data files will be stored in a storage system. In order to prevent these files from being accidentally damaged, in the prior art, there are mainly the following ways to protect the files. [0003] For file storage media level protection. In a storage node, the storage system will take some redundancy protection measures, such as RAID-5 for disks and redundant backup for storage controllers. These protection measures protect that when the storage media fails and becomes unavailable, the files stored on these storage media can still be read normally. [0004] For file s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/10G06F11/14G06F21/64
CPCG06F11/1004G06F11/1469G06F21/64
Inventor 何朝民夏宗春
Owner TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products