Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secure data storage method and device based on alliance block chain

A data security storage and data storage technology, which is applied in the field of data security storage based on the alliance blockchain, can solve the problems of malicious tampering in the data center, opaque data sharing, centralized malicious attacks, etc., so that it is not easy to lose and improve the transparency of sharing , the effect of improving safety

Active Publication Date: 2017-08-25
GUANGDONG UNIV OF TECH
View PDF8 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the methods provided by the existing technology are based on the mode of centralized data storage. In this mode, there will be information security problems such as opaque data sharing, centralized malicious attacks, single-point failure of the master node, and malicious tampering of data in the data center.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data storage method and device based on alliance block chain
  • Secure data storage method and device based on alliance block chain
  • Secure data storage method and device based on alliance block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a flow chart of a data security storage method based on consortium blockchain provided by an embodiment of the present invention. Please refer to figure 1 , the specific steps of the data security storage method based on the alliance block chain include:

[0038] Step S10: After the data acquisition node obtains the grid data, it sends an upload request to the data storage node.

[0039] In this step, the data acquisition node is used to obtain grid data generated during grid operation, and the data needs to be stored in a data storage node for subsequent viewing of grid data by users. It can be understood that the data acquisition node needs to first send an upload request to the data storage node to request the data storage node to verify itself and agree to receive the grid data acquired by itself.

[0040] Step S11: the data storage node verifies whether the upload request is passed, and if so, executes step S12.

[0041] It can be understood that...

Embodiment 2

[0056] figure 2 It is a flow chart of another data security storage method based on consortium blockchain provided by the embodiment of the present invention. figure 2 In steps S10-S15 and figure 1 Same, no more details here.

[0057] Such as figure 2 As shown, as a preferred embodiment, it also includes:

[0058] Step S20: The target data storage node receives the grid data, and verifies whether the grid data meets the requirements, and if so, executes step S21.

[0059] The target data storage node can specifically verify whether the grid data is safe and effective. The main purpose is to ensure that all the grid data stored on the target data storage node are meaningful data that can correctly reflect the real situation of the grid system.

[0060] Step S21: The target data storage node stores the grid data in a local database.

[0061] It is understandable that the target data storage node stores the grid data of the data storage node in its own relatively safe and...

Embodiment 3

[0066] Corresponding to the data collection node storing the power grid data in the data storage node, this embodiment further provides a method for the target data collection node to access the power grid data of the data collection node. For specific steps, please refer to image 3 .

[0067] image 3 It is a flow chart of a power grid data access method based on consortium blockchain provided by an embodiment of the present invention. Such as image 3 As shown, on the basis of the foregoing embodiments, it also includes:

[0068] Step S30: the data acquisition node sets access conditions to control other target data acquisition nodes to access the grid data.

[0069] In this step, the access conditions may include: the target data collection node is within the range of allowed access nodes set by the data collection node, the grid data accessed by the target data collection node is within the grid data sharing range set by the data collection node, and the target data T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure data storage method and device based on an alliance block chain. The method comprises the following steps that a data collection node sends an uploading request to a data storage node after the data collection node obtains power grid data; after the data storage node authenticates the uploading request, the data storage node receives encrypted power grid data and decrypts the encrypted power grid data through an own private key in order to obtain power grid data; after the data storage node verifies that the power grid data conforms to requirements, the data storage node stores the power grid data into a local database; and the data storage node broadcasts the stored power grid data to other target data storage nodes. According to the method, the data sharing transparency of the power grid data is improved, and meanwhile, the stored power grid data is guaranteed to be difficult to lose, and the security of the power grid data is improved. In addition, the secure data storage device based on the alliance block chain also has the effects.

Description

technical field [0001] The invention relates to the field of power grid state monitoring, in particular to a data security storage method and device based on an alliance block chain. Background technique [0002] The smart grid integrates information and communication network technologies, uses sensor networks to collect real-time grid working data to monitor the operation of the grid, and dynamically adjusts the operating status of the grid according to the grid data. The smart grid needs real-time and reliable monitoring of the grid, timely detection and elimination of grid faults, and avoiding large-scale accidents. In the traditional smart grid, the data acquisition node monitors the operation of the grid equipment in real time, and regularly uploads the grid data from the adjacent data acquisition base station to a trusted central node for storage and sharing. Since grid data plays a vital role in reflecting the overall grid situation, a reliable storage system is requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0823H04L63/10H04L67/1097
Inventor 康嘉文余荣张浩川张泽航
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products