Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Redundant data encoding method for untrusted environment and storage medium

A technology of redundant data and encoding method, applied in the field of information security, can solve the problems of increasing the confirmation storage delay time, unable to guarantee data reliability, affecting data reading performance, etc., to ensure continuous reliability, high reliability, high The effect of read and write performance

Active Publication Date: 2020-07-31
HUAZHONG UNIV OF SCI & TECH
View PDF15 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, there are still problems with the Filecoin solution. For example, when data is written, the storage node can only perform the copy encoding process when it collects sector-sized data. When the data is smaller than a given size, the delay time for confirming storage is greatly increased, and the data cannot be guaranteed. Reliability; secondly, when data is read, it must be decoded before reading the data, which affects the performance of data reading; finally, after a storage node loses data, it is necessary to select a new storage node to obtain a copy from the copy storage node , and then decode the copy data, and finally perform the copy process encoding on the data again to complete the repair. A total of three steps are required, which reduces the speed of data repair and affects data reliability; finally, Filecoin's solution supports copy redundancy and deletes codes. Redundancy is not friendly, reducing storage utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Redundant data encoding method for untrusted environment and storage medium
  • Redundant data encoding method for untrusted environment and storage medium
  • Redundant data encoding method for untrusted environment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0049] In the present invention, the terms "first", "second" and the like (if any) in the present invention and drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.

[0050] Before explaining the technical scheme of the present invention in detail, the delay function used in the present invention is briefly introduced as follows...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a redundant data encoding method for an untrusted environment and a storage medium. The method includes the steps: enabling a client to process the original data according to aredundancy strategy to generate redundant data; calculating an anti-parallel delay function to generate a sector space; carrying out the exclusive OR on the sector space and redundant data to obtaincoded data, carrying out the fragmentation on original data and the coded data, selecting a data ownership proving scheme to generate verification labels for the data fragments, sending the data fragments and the verification labels to a plurality of storage nodes, and sending the corresponding relation between fragment indexes and the storage nodes to auditing nodes; determining a storage node where the original data fragment is located through the auditing node, and performing data reading. Based on the encoding scheme, operations such as writing, reading, repairing and verifying of the dataare supported in an untrusted environment, and meanwhile, the integrity and reliability of the data are ensured.

Description

technical field [0001] The invention belongs to the field of information security, and more specifically relates to a redundant data encoding method and a storage medium used in an untrustworthy environment. Background technique [0002] Due to cost considerations, cloud storage has become the preferred solution for many enterprises and personal data storage, which can save operation and maintenance costs and construction costs, and data reliability is guaranteed by cloud storage service providers. However, there are many problems in storing data in cloud storage. First, data is transparent and centralized to cloud storage providers, which may leak data. Second, due to the high construction cost of data centers, the price of cloud storage is not high. Not cheap. With the development of blockchain technology and P2P technology, it is possible to establish a decentralized storage network. Anyone can access the network to provide services or purchase storage space. However, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60H04L29/08
CPCG06F21/6218G06F21/602H04L67/1097
Inventor 方俊涛向程万胜刚董子豪尚方平何旭斌谢长生
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products