Block chain-based electronic data long-term storage system and method

文档序号:190927 发布日期:2021-11-02 浏览:27次 中文

阅读说明:本技术 一种基于区块链的电子数据长期保存系统及方法 (Block chain-based electronic data long-term storage system and method ) 是由 荚爱民 吕玉娟 于 2021-07-08 设计创作,主要内容包括:本发明公开了一种基于区块链技术的电子数据长期保存系统,包括应用服务器、备份服务器、数据库和数据审计模块,所述数据库用于存储数据,所述应用服务器用于对数据库内数据进行调用,所述备份服务器用于对数据库内的数据备份存储;所述应用服务器连接有防火墙,保证客户端的用户不能直接访问数据库上的数据,保证系统的安全;所述数据审计模块用于对数据库内的数据访问情况进行记录,防止数据库内的数据被篡改或被破坏。通过对数据存入、读取过程的监控,保证了数据存储过程中的真实性,从而便于数据的长期保存。(The invention discloses an electronic data long-term storage system based on a block chain technology, which comprises an application server, a backup server, a database and a data auditing module, wherein the database is used for storing data; the application server is connected with a firewall to ensure that a user at a client cannot directly access data on the database and ensure the safety of the system; the data auditing module is used for recording the data access condition in the database and preventing the data in the database from being tampered or damaged. The authenticity in the data storage process is ensured by monitoring the data storage and reading processes, so that the data can be conveniently stored for a long time.)

1. The electronic data long-term storage system based on the blockchain technology is characterized by comprising an application server, a backup server, a database and a data auditing module which are arranged in a blockchain, wherein the database is used for storing data, the application server is used for calling the data in the database, and the backup server is used for backing up and storing the data in the database; the application server is connected with a firewall to ensure that a user at a client cannot directly access data on the database and ensure the safety of the system; the data auditing module is used for recording the data access condition in the database and preventing the data in the database from being tampered or damaged.

2. A long-term electronic data storage method based on a block chain technology is characterized by comprising the following steps:

s1: data processing, namely, in uploading data, firstly checking the format of the data, processing the data which does not conform to the format, and converting the data into a storage format supported by a platform;

s2: data storage, namely identifying data needing to be stored for a long time by using a permanent identifier, and distinguishing the permanently stored data from short-term stored data;

s3: data backup, namely checking the data storage condition in a database and updating and backing up the data with the identifier;

s4: data access, namely verifying the identity of the client in the data access process to prevent the client from maliciously accessing the database;

s5: monitoring data, namely monitoring a database by using a data monitoring platform, wherein monitoring items comprise data formats, data access records, data access frequency and data change conditions;

s6: analyzing abnormal data, namely analyzing the monitoring data of the data monitoring platform, giving an alarm if the data in the database is abnormal, and stopping storing and reading the data in the database;

s7: troubleshooting, namely troubleshooting the reason of the abnormal condition and eliminating potential safety hazards;

s8: and after the data is recovered and the fault is eliminated, the abnormal data in the database is replaced by the backup data, so that the authenticity of the data stored for a long time is ensured.

3. The method as claimed in claim 2, wherein when the backup data is used to restore data in the database during data restoration, the identity of the administrator needs to be verified, so as to ensure the validity of the data transmission action of the backup data to the database and the security of the backup data.

4. The method as claimed in claim 2, wherein the formats supported by the platform include an unlimited upload data format, an upload data specified format and an upload data compliant with a feature standard.

5. A method for long-term storage of electronic data based on blockchain technology according to claim 2, wherein the authentication of the client comprises voice recognition, fingerprint recognition, and geo-spatial location authentication.

6. The method as claimed in claim 2, wherein after the backup data is updated, the data is compressed and encrypted to prevent the backup data from being read by an attack, thereby ensuring the security of the data.

7. The method as claimed in claim 2, wherein the processed data is sorted according to data format or stored separately according to date of storage.

Technical Field

The invention belongs to the technical field of data storage, and particularly relates to a long-term electronic data storage system and method based on a block chain.

Background

With the development of information technology, computer technology, electronic technology, and the like, a huge amount of electronic data such as member registration information of each business site, customer information in a bank, citizen identity information of a public security system, customer information of an insurance company, packages and customer information in a logistics field, and the like are generated. The important information needs to be stored for a long time, and also needs to be prevented from being tampered in the data access process, so that the safety of the information is guaranteed, which is an important technical problem.

However, in the prior art, a common data retention mode is database-type data storage, and in the storage process, phenomena such as data format change, data loss, malicious data tampering, data access abnormity and the like are easily caused, which further causes a distortion problem of stored data, and increases the difficulty of data storage, especially long-term storage. How to keep data for a long time and ensure the authenticity of the data in the storage process is an important technical problem to be solved at present.

Based on the above defects in the prior art, the present invention provides a system and a method for long-term storage of electronic data based on a block chain, which can not only store electronic data for a long time, but also ensure the security of the electronic data and ensure the low power consumption of the data in the storage process.

Disclosure of Invention

Aiming at the defects of the prior art, the invention aims to provide a long-term electronic data storage system and method based on a block chain, which ensure the authenticity in the data storage process by monitoring the data storage and reading processes, thereby facilitating the long-term storage of data; and the power consumption of the data information in the storage process can be reduced, and the energy consumption is reduced.

The invention provides the following technical scheme:

the electronic data long-term storage system based on the blockchain comprises an application server, a backup server, a database and a data auditing module, wherein the application server, the backup server, the database and the data auditing module are arranged on the blockchain, the database is used for storing data, the application server is used for calling the data in the database, and the backup server is used for backing up and storing the data in the database; the application server is connected with a firewall to ensure that a user at a client cannot directly access data on the database and ensure the safety of the system; the data auditing module is used for recording the data access condition in the database and preventing the data in the database from being tampered or damaged.

Preferably, the blockchain comprises a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer; the data layer comprises data blocks, hash functions, time stamps, encryption, chain structures, Merkle trees and the like; the network layer is connected with a network, a propagation mechanism, a verification mechanism and the like; the consensus layer comprises PoW, PoS, DPoS and the like; the incentive layer comprises an issuing mechanism and a distributing mechanism; the contract layer comprises script codes, an algorithm mechanism, intelligent contracts and the like; the application layer comprises an electronic data access terminal which needs long-term storage, can be read and modified and ensures safety.

Preferably, the data block is electronic data which needs to be stored for a long time, can be read and can be modified.

Preferably, the encryption is that the account identity information is encrypted and can be accessed only under the authorization of the data owner, so that the security of the data and the privacy of individuals are ensured.

Preferably, the consensus mechanism is a mechanism for achieving consensus among all nodes of the blockchain to identify the validity of a record. This is both a means of authentication and a means of tamper resistance. The block chain provides four different consensus mechanisms, is suitable for different application scenarios, and balances efficiency and safety.

Preferably, the intelligent contract is based on credible and non-falsifiable data in the blockchain, and automatically executes a predefined rule; the rule is a rule set by a manager of electronic data that needs to be stored for a long time.

Preferably, the connection network is the internet, and may be a wired or wireless network.

Preferably, a firewall is arranged between the backup server and the database.

Preferably, the database includes a plurality of databases, and the plurality of databases are distributed at different places, or may be at the same place to form a distributed database.

Preferably, the backup server corresponds to a plurality of databases one to one, and may also backup only important databases.

Preferably, the blocks of the block chain are linked by a hash algorithm, the next block contains the hash value of the previous block, and as the information communication expands, one block is successively connected with one block

Preferably, the application server, the backup server and the storage device for bearing the database are all placed in a cave, and heat dissipation is realized through low-temperature and natural wind environment in the cave, so that stable operation of the application server, the backup server and the bearing database is ensured, and energy consumption is reduced.

Preferably, the application server, the backup server and the storage device for bearing the database are all placed under water, heat dissipation is achieved through water, stable operation of the application server, the backup server and the storage device for bearing the database is guaranteed, and energy consumption is reduced.

Preferably, a first temperature sensor is arranged in the application server placed in the cave, so as to monitor the working temperature T1 of the application server in real time; a second temperature sensor is arranged in the backup server to monitor the working temperature T2 of the backup server in real time; a third temperature sensor is provided in the storage device to monitor the operating temperature T3 of the storage device in real time.

Preferably, a temperature and humidity sensor is arranged in the cave to monitor the temperature T and the humidity S in the cave environment.

Preferably, a fan is further arranged in the cave, and the fan is communicated with the outside of the cave through an air pipe; the air pipe is provided with a filter layer and a drying structure.

Preferably, the first temperature sensor, the second temperature sensor, the third temperature sensor, the temperature and humidity sensor and the fan are all connected with the controller. And the controller determines whether to start a fan or not according to the collected working temperature T1 of the application server, the working temperature T2 of the backup server, the working temperature T3 of the storage device and the temperature T and the humidity S in the cave environment and according to various preset threshold values corresponding to the parameters so as to improve the environmental parameters in the cave.

Preferably, the fan introduces outside air into the cave to improve the temperature and humidity of the environment in the cave, and the working temperature of the application server, the backup server and the storage device for bearing the database.

Preferably, the filter layer comprises a coarse filter layer, a fine filter layer and an adsorption layer; the coarse filter layer is a metal filter screen, and the aperture d1 of the coarse filter layer is 0.55-0.85 mm; the fine filtering layer is a cotton yarn filtering layer, and the aperture d2 is 0.12-0.50 mm; the adsorption layer is an activated carbon adsorption layer, and the specific surface area G of the adopted activated carbon powder is 560-750m2/g。

Preferably, in order to improve the filtering effect on the outside air, the pore size d1 of the coarse filter layer and the pore size d2 of the fine filter layer satisfy d 1. d2 of 0.12 to 0.39.

Preferably, in order to further improve the filtering effect on the outside air, the pore size d1 of the coarse filtering layer, the pore size d2 of the fine filtering layer, and the specific surface area G of the activated carbon of the adsorption layer satisfy the following relationship:

(d1/d2)·V=α·G1/2

wherein alpha is a relation coefficient and has a value range of 0.65-2.42; v is the wind speed in the wind pipe, and the unit is m/s.

Preferably, the drying structure comprises a filter layer provided with dry powder, the filter layer is a cotton yarn net, and the dry powder is arranged on the silk threads of cotton yarns; the dry powder is one of lime powder, charcoal powder and the like.

Preferably, the adsorption layer can dry air while filtering, and has double functions of filtering and drying.

Preferably, the filter layer is positioned in the direction of the air inlet of the drying structure; the drying structure further comprises a convex rib and a groove which are arranged on the side wall of the air pipe, the convex rib and the groove extend along the side wall of the air pipe, and the convex rib and the groove are arranged in parallel.

Preferably, the number of the convex ribs and the number of the grooves are 4.

The invention also discloses a long-term electronic data storage method based on the block chain, which comprises the following steps:

s1: data processing, namely, in uploading data, firstly checking the format of the data, processing the data which does not conform to the format, and converting the data into a storage format supported by a platform;

s2: data storage, namely identifying data needing to be stored for a long time by using a permanent identifier, and distinguishing the permanently stored data from short-term stored data;

s3: data backup, namely checking the data storage condition in a database and updating and backing up the data with the identifier;

s4: data access, namely verifying the identity of the client in the data access process to prevent the client from maliciously accessing the database;

s5: monitoring data, namely monitoring a database by using a data monitoring platform, wherein monitoring items comprise data formats, data access records, data access frequency, data change conditions, data access time and the like;

s6: analyzing abnormal data, namely analyzing the monitoring data of the data monitoring platform, giving an alarm if the data in the database is abnormal, and stopping storing and reading the data in the database;

s7: troubleshooting, namely troubleshooting the reason of the abnormal condition and eliminating potential safety hazards;

s8: and after the data is recovered and the fault is eliminated, the abnormal data in the database is replaced by the backup data, so that the authenticity of the data stored for a long time is ensured.

Preferably, in the data recovery, when the backup data is used to recover the data in the database, the identity of the administrator needs to be verified, so as to ensure the validity of the transmission action of the backup data to the database data and the security of the backup data.

Preferably, the formats supported by the platform include an unlimited uploading data format, an uploading data specified format and an uploading data meeting a characteristic standard.

Preferably, the authentication of the client comprises voice recognition, fingerprint recognition, and spatial geographic location authentication.

Preferably, after the backup data is updated, the data is compressed and encrypted, so that the backup data is prevented from being attacked and read, and the security of the data is ensured.

Preferably, the processed data is sorted and stored according to the format of the data or separately stored according to the storage date.

Preferably, the client stores data in the database, firstly, an application needs to be made to a manager, the manager sends a dynamic instruction password to the client, the client stores the data in the database by virtue of the dynamic instruction password, when the client needs to modify corresponding data, the client needs to make an application to the manager, the manager allows the client to modify the data, and the modified data is transmitted to the database and then is backed up and updated.

Preferably, the data auditing module is further configured to query the authority of the client, where the authority of the client includes reading data, modifying data and storing data, and when the client performs a corresponding operation, check whether the client has a corresponding authority, perform a next operation if the client has a corresponding authority, give a corresponding prompt if the client does not have a corresponding authority, and lock the account number and send an alarm if the client performs no-authority operation for multiple times.

Preferably, in the data backup, the data backup mode is divided into task backup and data backup at any time, and after the operation for a period of time, the data needs to be backed up in order to ensure the security of the data.

Preferably, in order to improve the performance of the system, the database is conceptually designed, and a conceptual model is established, wherein the method comprises the following steps:

step 1: determining a target and a range, concretizing the type of data and the management authority of an administrator, and processing a document formed in the storage and reading processes of the data;

step 2: merging concepts from top to bottom and from bottom to top, and defining attribute values of the concepts;

and step 3: the concept definition is perfected, and whether the table attribute and the actual state in the database are in optimal configuration is determined;

and 4, step 4: and establishing a database model, analyzing the requirements of the database through the flow of database design, and establishing a model diagram.

Compared with the prior art, the invention has the following beneficial effects:

(1) according to the long-term electronic data storage system and method based on the block chain, the data audit module is used for recording the data access condition in the database, so that the access condition is transparent, the data in the database can be managed in a targeted manner, and the data in the database can be effectively prevented from being tampered or damaged.

(2) The block chain-based long-term electronic data storage system and method can prevent the data in the database from being attacked by the outside by arranging the firewall, and ensure the safety in the system operation process and the authenticity in the data storage process.

(3) According to the long-term electronic data storage system and method based on the block chain, the controllability of data in the database is realized and the fault-tolerant rate of the database is improved by controlling the reading and modification of the data by the client through the manager.

(4) The long-term electronic data storage system and method based on the block chain are convenient for storing data in the database and managing the data through conceptual design of the database, and improve the stability of the system and the operating efficiency of the system.

(5) According to the long-term electronic data storage system and method based on the block chain, the first temperature sensor, the second temperature sensor, the third temperature sensor, the temperature and humidity sensor, the fan and the controller are connected, and the range and the relation of the aperture d1 of the coarse filter layer and the aperture d2 of the fine filter layer are set, so that the ambient air can be better filtered, the influence of dust is reduced, and the energy consumption can be reduced.

(6) According to the block chain-based electronic data long-term storage system and method, the pore diameter d1 of the coarse filter layer, the pore diameter d2 of the fine filter layer and the specific surface area G of the activated carbon of the adsorption layer are set to meet the requirement, so that the filtering effect on the outside air is further improved, the energy consumption is reduced, and the system crash is reduced.

Drawings

In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.

FIG. 1 is a schematic diagram of the system of the present invention.

FIG. 2 is a schematic flow diagram of the process of the present invention.

FIG. 3 is a schematic diagram of the conceptual modeling of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described in detail and completely with reference to the accompanying drawings. It is to be understood that the described embodiments are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.

Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.

The first embodiment is as follows:

as shown in fig. 1, a system for long-term preservation of electronic data based on a blockchain includes an application server, a backup server, a database, and a data auditing module, where the application server is arranged on the blockchain, the database is used to store data, the application server is used to call data in the database, and the backup server is used to backup and store data in the database; the application server is connected with a firewall, and the firewall is used for ensuring that a user of the client cannot directly access data on the database, providing a safety barrier for a data access process and ensuring the safety of the system; the data auditing module is used for recording the data access condition in the database, so that the condition of accessing the database can be checked, and the data in the database is effectively prevented from being tampered or damaged. A firewall is arranged between the backup server and the database, so that the safety in data backup and data recovery is ensured.

The block chain comprises a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer; the data layer comprises data blocks, hash functions, time stamps, encryption, chain structures, Merkle trees and the like; the network layer is connected with a network, a propagation mechanism, a verification mechanism and the like; the consensus layer comprises PoW, PoS, DPoS and the like; the incentive layer comprises an issuing mechanism and a distributing mechanism; the contract layer comprises script codes, an algorithm mechanism, intelligent contracts and the like; the application layer comprises an electronic data access terminal which needs long-term storage, can be read and modified and ensures safety.

The data block is electronic data that needs to be stored for a long period of time, can be read, and can be modified. The encryption is that the account identity information is encrypted and can be accessed only under the authorization of the data owner, so that the safety of data and the privacy of individuals are ensured.

The consensus mechanism is a mechanism for achieving consensus among all nodes of the blockchain to identify the validity of a record. This is both a means of authentication and a means of tamper resistance. The block chain provides four different consensus mechanisms, is suitable for different application scenarios, and balances efficiency and safety.

The intelligent contract is based on credible and non-falsifiable data in the block chain, and automatically executes a predefined rule; the rule is a rule set by a manager of electronic data that needs to be stored for a long time.

The connection network is the internet, and can be in a wired mode or a wireless mode.

And a firewall is arranged between the backup server and the database. The database comprises a plurality of databases which are distributed at different places, and can also be at the same place to form a distributed database. The backup server is in one-to-one correspondence with a plurality of databases, and can also only backup key databases.

Preferably, the blocks of the block chain are linked by a hash algorithm, the next block contains the hash value of the previous block, and as the information communication expands, one block is successively connected with one block

The application server, the backup server and the storage device for bearing the database are all placed in the cave, heat dissipation is achieved through the low-temperature and natural wind environment in the cave, stable operation of the application server, the backup server and the bearing database is guaranteed, and energy consumption is reduced.

Particularly, the application server, the backup server and the storage device for bearing the database are all placed under water, heat dissipation is achieved through water, stable operation of the application server, the backup server and the storage device for bearing the database is guaranteed, and energy consumption is reduced.

Example two

Different from the first embodiment, a first temperature sensor is arranged in the application server placed in the cave to monitor the working temperature T1 of the application server in real time; a second temperature sensor is arranged in the backup server to monitor the working temperature T2 of the backup server in real time; a third temperature sensor is provided in the storage device to monitor the operating temperature T3 of the storage device in real time.

And a temperature and humidity sensor is arranged in the cave to monitor the temperature T and the humidity S in the cave environment.

The fan is also arranged in the cave and is communicated with the outside of the cave through an air pipe; the air pipe is provided with a filter layer and a drying structure. The first temperature sensor, the second temperature sensor, the third temperature sensor, the temperature and humidity sensor and the fan are all connected with the controller. And the controller determines whether to start a fan or not according to the collected working temperature T1 of the application server, the working temperature T2 of the backup server, the working temperature T3 of the storage device and the temperature T and the humidity S in the cave environment and according to various preset threshold values corresponding to the parameters so as to improve the environmental parameters in the cave.

The fan guides outside air into the cave to improve the temperature and humidity of the environment in the cave and the working temperature of the application server, the backup server and the storage device for bearing the database.

Preferably, the filter layer comprises a coarse filter layer, a fine filter layer and an adsorption layer; the coarse filter layer is a metal filter screen, and the aperture d1 of the coarse filter layer is 0.55-0.85 mm; the fine filtering layer is a cotton yarn filtering layer, and the aperture d2 is 0.12-0.50 mm; the adsorption layer is an activated carbon adsorption layer, and the specific surface area G of the adopted activated carbon powder is 560-750m2/g。

Preferably, in order to improve the filtering effect on the outside air, the pore size d1 of the coarse filter layer and the pore size d2 of the fine filter layer satisfy d 1. d2 of 0.12 to 0.39.

Preferably, in order to further improve the filtering effect on the outside air, the pore size d1 of the coarse filtering layer, the pore size d2 of the fine filtering layer, and the specific surface area G of the activated carbon of the adsorption layer satisfy the following relationship:

(d1/d2)·V=α·G1/2

wherein alpha is a relation coefficient and has a value range of 0.65-2.42; v is the wind speed in the wind pipe, and the unit is m/s.

The drying structure comprises a filter layer provided with dry powder, the filter layer is a cotton yarn net, and the dry powder is arranged on silk threads of cotton yarns; the dry powder is one of lime powder, charcoal powder and the like. The adsorbed layer can also dry the air when playing filterable, plays the dual function of filtration and drying.

The filter layer is positioned in the direction of an air inlet of the drying structure; the drying structure further comprises a convex rib and a groove which are arranged on the side wall of the air pipe, the convex rib and the groove extend along the side wall of the air pipe, and the convex rib and the groove are arranged in parallel. The number of the convex ribs and the number of the grooves are 4.

By adopting the technical scheme of the invention, the power consumption of the same application server, the backup server and the storage device for bearing the database is reduced by 12.5-21.3%, the number of times of dead halt is reduced to zero, and the safety of electronic data is greatly improved.

EXAMPLE III

Referring to fig. 2, a method for long-term storage of electronic data based on a blockchain includes the following steps:

s1: data processing, namely firstly checking the format of data in the uploaded data, processing the data which does not conform to the format, converting the data into a storage format supported by a platform, unifying the data format in a database, and facilitating the storage and management of the data;

s2: data storage, namely identifying the data needing to be stored for a long time by using a permanent identifier, and distinguishing the permanently stored data from the short-term stored data so as to be convenient for managing the data needing to be stored for a long time;

s3: data backup, namely checking the data storage condition in a database and updating and backing up the data with the identifier;

s4: data access, namely verifying the identity of the client in the data access process to prevent the client from maliciously accessing the database;

s5: monitoring data, namely monitoring a database by using a data monitoring platform, wherein monitoring items comprise data formats, data access records, data access frequency and data change conditions;

s6: analyzing abnormal data, namely analyzing the monitoring data of the data monitoring platform, giving an alarm if the data in the database is abnormal, and stopping storing and reading the data in the database;

s7: troubleshooting, namely troubleshooting the reason of the abnormal condition and eliminating potential safety hazards;

s8: and after the data is recovered and the fault is eliminated, the abnormal data in the database is replaced by the backup data, so that the authenticity and the reliability of the data stored for a long time are ensured.

In data recovery, when data in a database is recovered by using backup data, the identity of an administrator needs to be verified, the validity of a data transmission action of the backup data to the database is ensured, and the safety of the backup data is ensured. And the administrator logs in the system by virtue of the account and the password to control the recovery of the data.

The formats supported by the platform comprise an unlimited uploading data format, an uploading data specified format and an uploading data meeting a characteristic standard. The uploaded data are processed uniformly by using the processing tool, so that the data are easily managed and stored, and the workload of data management is reduced. The processed data are stored in a classified mode according to the data format or stored separately according to the storage date, and therefore data management efficiency is improved.

In the system operation process, the backup data needs to be updated, after the backup data is updated, the data is compressed and encrypted, and an administrator manages the backup data by virtue of a secret key, so that the backup data is prevented from being attacked and read, and the safety of the data is ensured. In data backup, data backup modes are divided into task backup and data backup at any time, and after the data backup is operated for a period of time, the data needs to be backed up in order to ensure the safety of the data.

The identity verification of a client comprises voice recognition, fingerprint recognition and space geographic position authentication, the legality of the process of accessing a database and the traceability of the process of accessing data are guaranteed through the verification of the identity of the client, the security of a system is maintained, the client stores data into the database, firstly, an application needs to be made to a manager, the manager sends a dynamic instruction password to the client, the client stores data into the database by virtue of the dynamic instruction password, when the client needs to modify corresponding data, the application needs to be made to the manager, the data modification is carried out after the manager allows the data, and the modified data is transmitted to the database and then is backed up and updated.

The data auditing module is also used for inquiring the authority of the client, the authority of the client comprises reading data, modifying data and storing data, when the client carries out corresponding operation, whether the client has the corresponding authority is checked, if the client has the corresponding authority, the next step of operation is carried out, if the client does not have the corresponding authority, a corresponding prompt is given, and if the client still carries out multiple times of operation without the authority after the prompt, the account number is locked and a warning is sent.

Example four

A long-term electronic data storage method based on a block chain comprises the following steps:

s1: data processing, namely firstly checking the format of data in the uploaded data, processing the data which does not conform to the format, converting the data into a storage format supported by a platform, unifying the data format in a database, and facilitating the storage and management of the data;

s2: data storage, namely identifying the data needing to be stored for a long time by using a permanent identifier, and distinguishing the permanently stored data from the short-term stored data so as to be convenient for managing the data needing to be stored for a long time;

s3: data backup, namely checking the data storage condition in a database and updating and backing up the data with the identifier;

s4: data access, namely verifying the identity of the client in the data access process to prevent the client from maliciously accessing the database;

s5: monitoring data, namely monitoring a database by using a data monitoring platform, wherein monitoring items comprise data formats, data access records, data access frequency and data change conditions;

s6: analyzing abnormal data, namely analyzing the monitoring data of the data monitoring platform, giving an alarm if the data in the database is abnormal, and stopping storing and reading the data in the database;

s7: troubleshooting, namely troubleshooting the reason of the abnormal condition and eliminating potential safety hazards;

s8: and after the data is recovered and the fault is eliminated, the abnormal data in the database is replaced by the backup data, so that the authenticity of the data stored for a long time is ensured.

Referring to fig. 3, in order to improve the performance of the system, the database is conceptually designed and modeled, and the method includes:

step 1: determining a target and a range, concretizing the type of data and the management authority of an administrator, and processing a document formed in the storage and reading processes of the data;

step 2: merging concepts from top to bottom and from bottom to top, and defining attribute values of the concepts;

and step 3: the concept definition is perfected, and whether the table attribute and the actual state in the database are in optimal configuration is determined;

and 4, step 4: and establishing a database model, analyzing the requirements of the database through the flow of database design, and establishing a model diagram.

The database is conceptually designed to form view integration, great convenience is provided for the client to store access data and store data, and the application performance of the database is improved.

The device obtained by the technical scheme is a long-term electronic data storage system and method based on the block chain technology, and authenticity in the data storage process is guaranteed by monitoring the data storage and reading processes, so that long-term storage of data is facilitated. The data auditing module is used for recording the access condition of the data in the database, so that the access condition is transparent, the data in the database can be conveniently managed in a targeted manner, and the data in the database can be effectively prevented from being tampered or damaged.

The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and it will be apparent to those skilled in the art that various modifications and variations can be made in the present invention; any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于差分隐私和量化的联邦学习全局模型训练方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类