Blockchain data security storage framework and method
A technology of data security storage and block chain, which is applied in the field of data security storage to achieve the effect of saving storage resources, improving efficiency, and increasing data throughput
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] This embodiment provides a blockchain data security storage framework for the edge layer, and the framework includes: a perception layer, an edge layer and a cloud layer.
[0031] The perception layer is used to collect power grid status data; the perception layer includes multiple data collectors, and each data collector acts as a client in the blockchain system; the clients can communicate with each other through wired or wireless communication channels ; The client includes RAM, computing hardware, data acquisition equipment, signal transmitter, signal receiver and data processing device; the client has a unique address identification, and the client can support the generation of public key and private key .
[0032] The edge layer is used to receive and store the grid status data; the edge layer includes a plurality of edge nodes as the carrier of the blockchain, each of which is a blockchain node in the blockchain network, and the blockchain Nodes are divided into...
Embodiment 2
[0038] This embodiment provides a multi-block chain architecture method for data security storage at the edge layer, which improves the data security during and after storage of the data at the edge layer, and improves the resistance to network attacks; at the same time This method solves the problem of too many nodes in the case of a single blockchain, and the time spent sharing data and consensus is too long.
[0039]The present invention is mainly to solve the data security after the data uploaded by the bottom sensor in the smart grid to the edge layer and stored, and the following technical solutions are adopted to realize:
[0040] The data safe storage method includes the following steps:
[0041] The client submits a storage request message to the execution node group. After the execution node group receives the storage request, it verifies the identity information of the requester, and after confirming its authority, the main execution node adds the received message t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


