Blockchain cloud storage user data security solution

A technology of user data and solutions, applied in the field of blockchain applications, can solve problems such as hackers that cannot be ignored, achieve the effects of reducing the risk of data loss and complete data theft, good application prospects, and convenient management of stored data

Pending Publication Date: 2020-07-17
上海坤仪金科信息技术有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, cloud storage servers have already become the target of hackers, because there are infinite user data on the server, and the hijacking of such large user group services is an important source of black income, which means that the security of the server directly affects users For the security of uploaded data, the reliability of V2V migration is quite high with the support of server virtualization technology. Most cloud storage vendors have prepared security protection solutions, but the existence of hackers cannot be ignored. As a centralized deployment enterprise solution, there is a Fixed IP is actually a living target, it is only a matter of time before it is broken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain cloud storage user data security solution
  • Blockchain cloud storage user data security solution
  • Blockchain cloud storage user data security solution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Figure 5 As shown in , a blockchain cloud storage user data security solution is divided into four steps. Step A: The client builds the blockchain client operating environment and downloads the operating framework through the application construction unit in the PC. In step A, you need to download the Visual Studio Code (editor) development tool, use Node.js (JavaScript operating environment based on Chrome V8 engine) to develop the client, download the Eclipse (extensible development platform) development kit), use the Java language to develop blockchain.

[0019] Figure 5 As shown in , Step B: The client uses the multi-signature technology based on zero-knowledge consensus to perform multi-signature through the application unit in the client. In step B, in the multi-signature, the key pair used is asymmetric encryption, and the process of generating the key does not need to be known between nodes, and only needs to use the unified verification machine of the whole...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A blockchain cloud storage user data security solution includes four steps: step A, a client constructs a blockchain client operation environment and downloads an operation framework through an application construction unit in a PC; b, the client performs multi-signature by adopting a multi-signature technology based on zero knowledge consensus through an application unit in the client; c, the client cuts, fragments and encrypts the to-be-uploaded data through an application fragment cutting unit in the client; and step D, when the client downloads the file in the cloud storage system, whetherthe data stored in the blockchain by the client is complete and available or not is verified by adopting a Merkle tree verification method. Based on the fact that the blockchain technology has natural decentralization characteristics, the method totally adopts four steps, achieves scattered storage of data, reduces risks of data loss and complete data stealing, prevents data from being maliciously tampered by a center node, and effectively achieves the effect that cloud storage data of users is safer. Based on the above, the method has a good application prospect.

Description

technical field [0001] The invention relates to the field of block chain application technology, in particular to a block chain cloud storage user data security solution. Background technique [0002] Cloud storage refers to the collection of a large number of different types of storage devices in the network through virtualization software to work together through cluster applications, grid technology or distributed file systems, and jointly provide data storage and business access functions to the outside world. The management and use of resources ensures data security and saves storage space. [0003] In recent years, many Internet companies have commercialized cloud storage services, such as Baidu Cloud Disk, Tencent Weiyun, and Alibaba Cloud, which are well-known in China. The cloud storage system widely used at present is a typical centralized system, that is, the corresponding Internet company builds a software platform, configures a large number of servers and virtu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/64
CPCG06F21/6245G06F21/602G06F21/64
Inventor 王路垠姚海凡
Owner 上海坤仪金科信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products