Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Tamper-proof data storage method, device and system based on blockchain

A data storage device and data storage technology, applied in data processing applications, digital data protection, electronic digital data processing, etc., can solve problems such as forged log records, insufficient protection, and tampering with a single log file

Inactive Publication Date: 2019-11-12
NANJING NARI GROUP CORP +4
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] For the above three methods, the hardware cost of method (1) is high, and the protection of the backup server has become a new problem; method (2) also introduces a new protection object, namely the log hash value; method (3 ) are easily forged by internal personnel with relevant permissions
And when using method (2) or method, there is a problem that tampering with a single log file will not affect other log files
[0011] Therefore, although these three methods have strengthened the protection of the log system to a certain extent, the protection is still not sufficient for the growing attack technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proof data storage method, device and system based on blockchain
  • Tamper-proof data storage method, device and system based on blockchain
  • Tamper-proof data storage method, device and system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] In the embodiment of the present invention, the original data is set as log information, and the collection of the log information uses the original interface of each system, and the review of the log involves users and log examiners. In other embodiments of the present invention, the The above data can also be set to other types of data as required.

[0099] In the embodiment of the present invention, it is first necessary to collect and process the logs generated by user behavior, store them in the log library in chronological order, and then present the log data to the log examiners in the form of a list. In addition, it is also necessary to ensure the storage security of the log, so the log must be tamper-proof. The specific method in the embodiment of the present invention is: when storing the log to the log library, the log needs to be stored in a block chain, and the log at every other section is used as a log block (ie block), and the log blocks are linked befor...

Embodiment 2

[0128] The difference between the embodiment of the present invention and embodiment 1 is:

[0129] The method also includes: chain verification, which is used to implement log review, specifically including the following steps:

[0130] Based on the input start date and end date, filter out the corresponding block set;

[0131] For any block in the block set, calculate the hash value hash3 of the block; decrypt the hash value hash4 of the saved block from the signature information of the next block of the block; compare hash3 with hash4, if the two are the same, it indicates that the block has not been tampered with.

[0132] specifically:

[0133] A. Based on the input start date S and end date E, filter out the corresponding data blocks SA, ..., EA; in the actual application process, the start date S and end date E may be input by auditors, When the input start date S and end date E are received, the corresponding blocks are automatically screened out. This implementatio...

Embodiment 3

[0144] The difference between the embodiment of the present invention and embodiment 1 or 2 is:

[0145] The method also includes Merkle root verification for implementing log inspection, specifically:

[0146] Based on the input start date and end date, filter out the corresponding block set;

[0147] List the block corresponding to the merkle root of the leaf node with the hash value of a certain block in the block set;

[0148] For any block randomly selected from the block, compare the merkle1 saved in the block with the calculated merkle2 of the block. If the two are inconsistent, the block corresponding to the root leaf node of the merkle One or more of the blocks have been tampered with.

[0149] More specifically: based on the input start date S and end date E, filter out the corresponding data block SA, ..., EA; in the actual application process, the start date S and end date E can be input by auditors Yes, when the input start date S and end date E are received, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tamper-proof data storage method, device and system based on a block chain, and the method comprises the steps: storing original data as blocks, and enabling all blocks to belinked into the block chain; wherein original data is stored in the block body; wherein the block head comprises a version number, signature information, a random number set and a Merkle root; wherein the signature information is generated by encrypting a hash value generated by performing hash operation on a previous block; wherein the random number set comprises N elements, and the elements arerandom block version numbers or set values; and when the random number group element is the version number corresponding to the block, the leaf node of the Merkle root is the hash value of the corresponding block, otherwise, the leaf node of the Merkle root is the hash value of the set value. During data review, chain verification can be carried out through block signature information, and merkleroot verification can be carried out through merkle roots to verify whether the data is tampered or not. According to the method, whether the data is tampered or not is verified through the stored data, hardware does not need to be additionally added, the time cost for tampering the data is very high, and the credibility of data auditing can be effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of data storage, and in particular relates to a block chain-based tamper-proof data storage method, device and system. Background technique [0002] Blockchain is a decentralized protocol that uses existing cryptography and consensus algorithms to store data securely. For example, the most widely used digital currency transaction data now ensures that transaction information cannot be tampered with. Its basic storage structure is a chained data structure in chronological order. The transaction confirmation on the blockchain is completed by all nodes on the blockchain, and the consensus algorithm ensures that all nodes reach a consensus without centralized management. , to ensure the consistency of the main chain data. However, when using decentralized blockchain technology to apply log tamper-proof, decentralized redundant backup is contrary to the centralized management concept of logs, which is not condu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64G06F21/62G06Q40/04
CPCG06F21/64G06F21/6218G06Q40/04G06F2221/2107
Inventor 徐睿杨华飞郑立刘坤马锋游佳陈梦娴蔡怡挺池晓金戴文博张子谦
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products