Archive secure storage and sharing system based on hybrid block chain and implementation method

A technology of secure storage and sharing system, applied in the field of archives security storage and sharing system based on hybrid blockchain, it can solve the problems of malicious dissemination of archives, network congestion, and archive information leakage, so as to prevent content from being tampered with and improve the speed. Effect

Active Publication Date: 2021-03-23
QILU UNIV OF TECH
View PDF14 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, electronic files are not absolutely safe, there are cases of malicious people attacking and tampering with files, information leakage is extremely unsafe for files involving many personal privacy; if malicious people forge their identities to carry out illegal activities , will cause serious consequences;
[0005] Second, the storage of most electronic archives is centralized, and centralized storage has a single point of failure hidden danger, and with the growth of archive data, the storage cost increases accordingly;
[0006] Third, although electronic files are convenient to share, they are not safe. File owners do not have clear ownership of their own files. Without knowing it, files are easy to spread maliciously, resulting in the leakage of private information.
IPFS is based on content addressing. Any slight content change will cause a change in the hash. Although the possibility of file changes is avoided, the data is directly uploaded to IPFS. Through the leak of the file Hash, there is still the possibility of file information leakage.
The blockchain can only process 7 transactions per second, the throughput is low, and it is easy to cause serious network congestion, which has certain limitations for scenarios that require high throughput

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Archive secure storage and sharing system based on hybrid block chain and implementation method
  • Archive secure storage and sharing system based on hybrid block chain and implementation method
  • Archive secure storage and sharing system based on hybrid block chain and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] as attached figure 1 As shown, the file security storage and sharing system based on the hybrid block chain of the present invention, the system includes,

[0069] Storage layer, the storage layer is used to store shared files and protect files from tampering; the storage layer adopts IPFS;

[0070] The sharing layer is used to record the transaction information that occurs, provide proof for the traceability of the file sharing process, and is used to automatically perform identity authentication to ensure the safe sharing of files without the participation of a third party; the sharing layer includes multi-layer blocks Chain model and smart contracts on the blockchain;

[0071] The user layer is used to manage, update, view, and share files; the user layer is composed of participants. Participants include archives management institutions, archives managers, archives owners and archives visitors; among them, the archives management organization manages the archives o...

Embodiment 2

[0080] The implementation method of file security storage and sharing based on hybrid block chain of the present invention, the method is specifically as follows:

[0081] S1. Initialization: Build a multi-layer blockchain model based on Ethereum, initialize a main chain including the participation of leading nodes, and access nodes, group nodes and ordinary nodes to join the main chain through identity authentication;

[0082] S2. Identity registration and authentication: The leader node registers and authenticates the group nodes, access nodes, and ordinary nodes respectively. After the legal node is successfully registered, it obtains the corresponding node id, joins the corresponding chain, and obtains the private node distributed by Ethereum. key and public key; among them, the private key is stored locally;

[0083] S3, file encryption storage: first encrypt the file and then store the file, and double protect the storage of the file;

[0084] S4. File sharing: Access n...

Embodiment 3

[0113] as attached Figure 5 As shown, this embodiment takes the student file scenario as an example, and introduces the entire file sharing process as follows:

[0114] (1) The archives access unit issues an access application;

[0115] (2) Trigger the identity verification smart contract. After the verification is successful, the verification certificate and the access application will trigger the leader node permission smart contract together;

[0116] (3) After the corresponding leader node (school file management office) agrees, call the main file sharing contract to send the access application, verification certificate, and leader permission to the corresponding group node (the department manager corresponding to the student file) ;

[0117] (4) Access application, verification certificate, and leader permission trigger the file sharing smart contract on the sub-chain through the group node, and send the information to the corresponding ordinary node (student whose fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an archive secure storage and sharing system based on a hybrid block chain and an implementation method, belongs to the field of archive sharing, and aims to solve the technical problem of how to realize archive privacy protection, prevent archives from forging and tampering, enable authorized access of the archives, and improve the archive sharing speed. According to the technical scheme, the system comprises a storage layer which is used for storing shared files and protecting the files against tampering, and adopts an IPFS; a sharing layer which is used for recordinggenerated transaction information, providing evidences for tracing of the file sharing process, automatically executing identity authentication and guaranteeing safe sharing of files under the condition that no third party participates, and comprises a multi-layer block chain model and an intelligent contract on a block chain; and a user layer which is used for managing, updating, checking and sharing files, and is composed of participants. The method specifically comprises the following steps: initializing; identity registration and authentication; encrypting and storing the archives; and archive sharing.

Description

technical field [0001] The invention relates to the field of file sharing, in particular to a hybrid block chain-based file security storage and sharing system and implementation method. Background technique [0002] In recent years, with the progress of society and the development of science and technology, the storage methods of archives have also undergone a series of changes. From the initial paper storage to the current electronic archives, it is gradually developing in the direction of informationization. Paper files are the most common way of file storage. Most units have file storage departments, but there are many unavoidable disadvantages of paper files. For example, the storage of paper files has high environmental requirements, and the humid environment is easy to Paper files are illegible or even damaged. Because paper files are easy to forge and tamper, the security of files cannot be guaranteed. At the same time, paper files are also difficult to share, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/11G06F16/176G06F16/27G06F21/60G06F21/62G06F21/64
CPCG06F16/11G06F16/176G06F21/64G06F21/6227G06F21/602G06F16/27
Inventor 王泽鑫禹继国闫碧薇董安明
Owner QILU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products