Block chain-based distributed trusted cloud node selection and verification method and system
A verification method and distributed technology, applied in the field of selection and verification of distributed trusted cloud nodes, can solve the problems of high participation cost and waste of storage resources in distributed cloud storage, so as to reduce participation cost and usage cost effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0059] see figure 1 , in order to achieve the above purpose, in the first embodiment of the present invention, the selection and verification method 100 of distributed trusted cloud nodes based on blockchain includes the following steps:
[0060] S01. Select an idle storage device conforming to a preset interface specification as a node device;
[0061] In this embodiment, the node device only needs to be a hardware device meeting the general standard interface specification, which is connected to the Internet and has sufficient storage space. It can be a computer device with local disk, mobile hard disk, U disk or TF card, or an embedded device with sufficient storage space.
[0062] S02, generating a unique identification code and serial number according to the hardware features of the node device;
[0063] Specifically, the cloud platform will generate a unique identification code for each device added to the node network according to its hardware characteristics, and wil...
no. 2 example
[0071] see figure 2 , based on the blockchain-based distributed trusted cloud node selection and verification method 100 provided in the first embodiment of the present invention, the present invention provides another blockchain-based distributed trusted cloud node selection The sum verification method 200, whose steps S01-S05 are the same as those in the first embodiment, will not be described here one by one, but the difference is that it also includes the following steps:
[0072] S06. Obtain the slice file in all operations of the node device, and verify the authenticity of the slice file;
[0073] S07, when the slice file fails to pass the verification, send out a corresponding distortion alarm signal.
[0074] Although in the previous steps, the identification code and serial number of the node and the device connected to the node have been filed, but the relatively trusted node cannot provide absolutely credible slice files for the cloud platform.
[0075] The cloud...
no. 3 example
[0079] see image 3 , based on a blockchain-based distributed trusted cloud node selection and verification method 200 provided in the second embodiment of the present invention, the present invention provides another blockchain-based distributed trusted cloud node selection The sum verification method 300, whose steps S01-S07 are the same as those in the second embodiment, will not be described here one by one, but the difference is that it also includes the following steps:
[0080] S08. Obtain behavior data of all operations performed by the node device on the slice file, and determine whether the behavior data is healthy;
[0081] S09, when the behavior data increases positively, send reward points to the node device.
[0082] In order to reduce the participation cost of contributors during node selection, the performance restrictions on node hardware devices are relaxed, and some devices with low performance will inevitably affect the rapid transmission of sliced files...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


