Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain-based distributed trusted cloud node selection and verification method and system

A verification method and distributed technology, applied in the field of selection and verification of distributed trusted cloud nodes, can solve the problems of high participation cost and waste of storage resources in distributed cloud storage, so as to reduce participation cost and usage cost effect

Pending Publication Date: 2021-05-11
PUHUA YUNCHUANG TECH (BEIJING) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The main purpose of the present invention is to provide a method and system for selecting and verifying distributed trusted cloud nodes based on blockchain, aiming to solve the problem of waste of idle storage device storage resources and the participation cost of distributed cloud storage in related technologies. high technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based distributed trusted cloud node selection and verification method and system
  • Block chain-based distributed trusted cloud node selection and verification method and system
  • Block chain-based distributed trusted cloud node selection and verification method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0059] see figure 1 , in order to achieve the above purpose, in the first embodiment of the present invention, the selection and verification method 100 of distributed trusted cloud nodes based on blockchain includes the following steps:

[0060] S01. Select an idle storage device conforming to a preset interface specification as a node device;

[0061] In this embodiment, the node device only needs to be a hardware device meeting the general standard interface specification, which is connected to the Internet and has sufficient storage space. It can be a computer device with local disk, mobile hard disk, U disk or TF card, or an embedded device with sufficient storage space.

[0062] S02, generating a unique identification code and serial number according to the hardware features of the node device;

[0063] Specifically, the cloud platform will generate a unique identification code for each device added to the node network according to its hardware characteristics, and wil...

no. 2 example

[0071] see figure 2 , based on the blockchain-based distributed trusted cloud node selection and verification method 100 provided in the first embodiment of the present invention, the present invention provides another blockchain-based distributed trusted cloud node selection The sum verification method 200, whose steps S01-S05 are the same as those in the first embodiment, will not be described here one by one, but the difference is that it also includes the following steps:

[0072] S06. Obtain the slice file in all operations of the node device, and verify the authenticity of the slice file;

[0073] S07, when the slice file fails to pass the verification, send out a corresponding distortion alarm signal.

[0074] Although in the previous steps, the identification code and serial number of the node and the device connected to the node have been filed, but the relatively trusted node cannot provide absolutely credible slice files for the cloud platform.

[0075] The cloud...

no. 3 example

[0079] see image 3 , based on a blockchain-based distributed trusted cloud node selection and verification method 200 provided in the second embodiment of the present invention, the present invention provides another blockchain-based distributed trusted cloud node selection The sum verification method 300, whose steps S01-S07 are the same as those in the second embodiment, will not be described here one by one, but the difference is that it also includes the following steps:

[0080] S08. Obtain behavior data of all operations performed by the node device on the slice file, and determine whether the behavior data is healthy;

[0081] S09, when the behavior data increases positively, send reward points to the node device.

[0082] In order to reduce the participation cost of contributors during node selection, the performance restrictions on node hardware devices are relaxed, and some devices with low performance will inevitably affect the rapid transmission of sliced ​​files...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain-based distributed trusted cloud node selection and verification method and system. The method comprises the following steps: selecting idle storage equipment meeting a preset interface specification as node equipment; generating a unique identification code and a unique serial number according to the hardware characteristics of the node equipment; selecting the corresponding node equipment according to a screening rule; carrying out, by the screened node equipment, receiving and sending operation on the slice file according to the identification code; and carrying out, by the screened node equipment, storage operation on the slice file according to the serial number. According to the technical scheme, the effects that the nodes are relatively credible and the files are absolutely credible to a certain extent can be finally achieved.

Description

technical field [0001] The present invention relates to the field of block chain technology and distributed cloud storage technology, in particular to a method and system for selecting and verifying distributed trusted cloud nodes based on block chain. Background technique [0002] There are following concepts in the related art of the present invention: [0003] 1. Cloud storage technology. [0004] Cloud storage is a new concept extended and developed on the concept of cloud computing. It is an emerging network storage technology. A large number of different types of storage devices work together through application software to jointly provide data storage and business access systems. A typical cloud storage framework includes three core layers: storage layer, basic management layer, and application interface layer. [0005] The storage layer is the most basic part of cloud storage. The storage device can be an FC fiber channel storage device, an IP storage device such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L12/24G06F16/27G06F21/60G06F21/64G06Q40/04
CPCH04L67/10H04L67/1097H04L41/0893G06F16/27G06F21/602G06F21/64G06Q40/04H04L9/50
Inventor 翟红鹰
Owner PUHUA YUNCHUANG TECH (BEIJING) CO LTD