• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    2019-02-22 07:32:54ZhiliangDengYongjunRenYepengLiuXiangYinZixuanShenandHyeJinKim
    Computers Materials&Continua 2019年1期

    Zhiliang Deng , Yongjun Ren , Yepeng Liu , Xiang Yin, Zixuan Shen and Hye-Jin Kim

    Abstract: Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However,in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management.Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the information security theory and subdivides the trustworthiness into the authenticity, integrity, usability, and reliability of electronic records in cloud storage.Moreover, this paper proposes the technology framework of preservation for trusted electronic records. Also, the technology of blockchain, proofs of retrievability, the open archival information system model and erasure code are adopted to protect these four security attributes, to guarantee the credibility of the electronic record.

    Keywords: Trusted electronic record, blockchain, cloud storage.

    1 Introduction

    Electronic records, produced in production and living activities, have shown rapid growth all over the world, and have gradually become the primary source of recording human activities and an essential source of information resources. Electronic records as a memory of social activities not only has the function of saving data but also has the evidence value[Xie, Wang, Ma et al. (2017a, 2017b); Wang, Xu and Pei (2017)]. However, due to the separation of the carrier and the information of electronic records, and the characteristics of being easy to change, flowing and vulnerable to the environment, many users are questioned on their originality, integrity, and evidentiary value. Thus, how to ensure the credibility of electronic records has become the research focus of electronic records [Xie,Wang, Ma et al. (2017a, 2017b); Qian (2014)].

    Cloud storage eliminates the need for electronic record managers to physically install physical storage devices, paying only for the actually used storage. Moreover, the day-today maintenance of electronic records storage is the responsibility of the cloud storage provider, which significantly reduces the storage cost of electronic record managers [Ren,Shen, Wang et al. (2015); He, Yu, Zhang et al. (2017); Jiang, Zeadally, Ma et al. (2017)].Also, cloud storage provides an electronic record integration service that allows users to access data from any network device, significantly expanding the sharing of electronic records and facilitating the management of the full lifecycle of electronic records [Shen,Zhou, Chen et al. (2017); Wei, Zhang and Ma (2018); Li, Niu, Kumari et al. (2018)].Compared with the traditional storage methods, formed a considerable advantage, cloud storage will become the mainstream storage. However, in the cloud storage environment,the administrator of the electronic record loses the physical control over the electronic record, making it easier to copy the electronic record and tampering with the contents. Also,cloud storage servers may be intentionally deleted electronic records to save costs, resulting in irreparable damage to the owners of electronic records [Ren, Shen, Liu et al. (2016); Ge,Susilo, Wang et al. (2017); Shi, Wei, Wang et al. (2017)].

    The Blockchain is the core support technology of digital cryptographic currency system represented by bitcoin. The core advantage of blockchain technology is its decentralization.It can implement point-to-point transactions based on decentralized credit in distributed systems where nodes do not trust each other by means of data encryption, time-stamping,distributed consensus and economic incentives, coordination and collaboration, so as to provide solutions to the prevalent issues of centralized agencies such as high cost, low efficiency and data storage unsafety [Yuan and Wang (2016); Jiang, Wei, Fu et al. (2016)].Because of the excellent nature of blockchain-based solutions and the urgency of using blockchain as a trusted preservation solution to electronic records, there is a need for professionals to be more confident about the credibility of the technology of electronic records. Therefore, this article focuses on whether blockchain technology can indeed achieve this goal.

    2 Related work

    2.1 Trusted record

    The concept of trusted electronic records originated earlier; representative ideas are:Professor Jiazhen Liu from Wuhan University pointed out: Trusted electronic record described the facts and events refer to the content of the electronic record is reliable,dependable and accurate. Moreover, the accuracy and truth of the content depending on the completeness of the record, the procedural control over the record formation, and the author’s reliability. His primary concern is the content’s credibility. Ronald Jantz of Rutgers University presented a conceptual framework of trustworthiness and pointed out that trustworthiness should be maintained throughout the life of the electronic record.

    InterPARES (International Cooperation Project to Ensure the Permanent Authenticity of Electronic Records), a large-scale international cooperation project, aims to study how to ensure the authenticity of electronic records for a long time. InterPARES has now entered the fourth phase of “InterPARES Trust” to explore the feasibility of electronic records under the network environment Permanent and trusted the phase as the theme [Xie, Wang,Ma et al. (2017a, 2017b); Wang, Xu and Pei (2017); Zeng, Dai, Li et al.(2018)].

    International Standard ISO 16175 [ISO (2010)] (Information and documentation-Principles and functional requirements for records in electronic office environments) is a required standard devised by the international standard ISO 15489 for trusted electronic records. The standard is consists of three parts. The first part is an overview of ISO 16175.The second part consists of digital record management system guidelines and functional requirements of the ISO 16175. The third part is the ISO16175-3, which is a business system that provides record management guidelines and functional requirements. ISO 16175 sets forth the guiding principles and functional requirements for record management in an electronic office environment, as well as the specifications for designing electronic record management systems and business systems. ISO 16175 provides a stable demand for trusted electronic record management.

    International Standard ISO/TR 26122 [ISO (2008)] (Work Process Analysis for Records)is a front-end control standard based on ISO 15489 for the establishment of a classification scheme for trusted electronic records. The standard provides two dimensions of the analytical work processed from the perspective of record creation, capture, and control,namely the job function analysis dimension and the workflow order analysis dimension. In the analysis of job functions, the standard provides the necessary steps of functional analysis, defines the analysis of job functions, business activities, business disposal methods and the establishment of functional analysis based on record classification scheme requirements. For the workflow sequence analysis, the standard provides the overall requirements of workflow analysis, defines the order of business processes in the workflow.Moreover, the results are analyzed, and the rules on how to identify and analyze variables provide controls in the workflow sequence.

    Trusted electronic records are trustworthy and evidence-based. To realize the historical mission entrusted to the preservation of human memory, we need to manage and protect electronic records in the right way as emphasized in UNESCO’s Joint declaration on archives. The correct way is to build management technology of trusted electronic record that is based on the standard practice of humanity and in conformity with the objective laws governing the management of records so that the evidence value of the electronic record can be maintained permanently. The system project is complicated and arduous and bound to become a historical research topic in the field of international records. Therefore,it is vital to pay full attention to explore and study the management of trusted electronic records.

    2.2 Blockchain

    The blockchain has the following five characteristics [Qian, Shao, Zhu et al. (2018); Wang,Xu and Pei (2017); He, Kumar, Wang et al. (2017); He, Yu and Zhang (2017)]. Firstly, it is decentralized. The validation, bookkeeping, storage, maintenance, and transmission of data in blockchain are based on a distributed system structure. It uses pure mathematical methods instead of central institutions to build trust relationships between distributed nodes,thus forming a decentralized and trustworthy distributed system. Secondly, the blockchain is the time series data. Blockchain stores data in a chained block structure with timestamping (add a time dimension to the data) with strong verifiability and traceability. The third is standard maintenance. The blockchain system uses a specific economic incentive mechanism to ensure that all nodes in the distributed system can participate in the data block verification process (such as mining in Bitcoin). The system picks up specific nodes by consensus algorithms to add new blocks to the blockchain. The fourth is programmability. Blockchain technology provides a flexible scripting code system that allows users to create advanced smart contracts, currencies, or other off-center. Finally, it is safe and trusted. Blockchain technology uses the principle of asymmetric cryptography to encrypt the data. At the same time, with the aid of the workload of each node in the distributed system, it can prove the mighty computing power formed by consensus algorithms to resist the external attacks. Moreover, it ensures the data in blockchain cannot be tampered with and cannot be forged. Thus, it has a higher safety. The infrastructure model of blockchain technology is shown in Fig. 1.

    Figure 1: Architecture of blockchain

    In general, the blockchain system consists of the data layer, network layer, consensus layer,incentive layer, contract layer, and application layer [Zhu, Gao, Shen et al. (2017); Wu, Li and Jiang (2017)]. In blockchain, the data layer encapsulates the underlying data blocks and related data encryption and time stamping techniques. Network layer includes distributed networking mechanism, data propagation mechanism, and data verification mechanism. Consensus layer encapsulates network nodes of various types of consensus algorithms. Incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives. The contract layer encapsulates all kinds of scripts, algorithms, and smart contracts, which are the foundations for the programmable features of the blockchain. The application layer encapsulates various application scenarios and cases of the blockchain. In the model, the timestamp-based chain block structure, the consensus mechanism of distributed nodes, the economic incentive based on consensus power and the flexible and programmable smart contract are the most representative technology innovations of blockchain [Wang, Xu and Pei (2017)].

    3 Problem statement

    In the article, we define trusted electronic records as electronic records that are authentic,integrity, usable, and reliable according to the information security theory. They have evidence and trustworthiness. The four characteristics are the essential nature that electronic records must possess. Moreover, they are also the basis of trusted electronic records. The conceptual framework is shown in Fig. 2.

    Figure 2: Essential attributes of trusted electronic records

    3.1 Authenticity

    Authenticity shall satisfy the correspondence of the record with the purpose of its text. The formation and transmission of the record coincide with its established formation and sender.Moreover, the formations or transmissions of the record are consistent with the fixed time.To ensure the authenticity of electronic records, corresponding policies and procedures need to be formulated to control the formation, collection, circulation, custody and disposal of electronic records so as to ensure that the creators, participants, and custodians of the electronic records are trustworthy, and prevent unauthorized tampering with the record,delete, use and hide, to ensure that the record is also accurate and reliable at the same time.

    3.2 Integrity

    Integrity refers to the record is complete and unaltered. The integrity of electronic records requires that the content, logical structure and background information of each electronic record be complete and must protect the circulation from being tampered. Metadata is the best solution for protecting the integrity of records. Also, records should be established throughout the life cycle of scientific and rational procedures and guidelines. The content should include user authentication, monitoring, authorization destruction, record annotation, tracking audit, system disaster recovery and other aspects to ensure that electronic records are entirely trusted.

    3.3 Reliability

    Reliability refers to the content of the record is trusted, can accurately reflect the affairs,activities or facts, and the follow-up affairs or activities can be based on its process.Reliability requires that electronic records, as a manifestation of factual activity, are trustworthy, based on the completeness of the record’s form, and the control over the record formation process. The source of the recording environment is the crucial fact to ensure record reliable, including reliable formation, reliable generation system, reliable formation process, and reliable application software.

    3.4 Usability

    Usability refers to the record can be found, retrieved, displayed and understood. The availability of electronic records indicates that the records are directly related to the business activities and business processes that formed them. Therefore, trusted electronic records require that the electronic records contain the background information on the formation and utilization of the records in terms of “usability”, so as to restore the authenticity of the business activities record, and at the same time, the proficiency of the function and role of this record in the context of significant business activities allows users to determine their trustworthy value.

    3.5 Evidence value

    Archives, the original record of decision-making, action, and memory, are the reliable evidence of administrative, cultural and intellectual activities. The user thinks the record is the only reliable evidence, which shows that the user makes sure that the evidentiary nature of the electronic record. Based on ensuring the authenticity, completeness, reliability, and usability of electronic records, the ultimate value of accurate records is precisely the goal of trusted electronic records.

    To sum up, the authenticity of electronic records makes the electronic records become the recording form and original evidence of transactional activity worthy of users’ reliance.The integrity and reliability of electronic records ensure that the users only trust the contents of electronic records. The availability of the electronic records ensures that the user can understand the use of the trust. It can be said that trusted electronic records with integrated quality based on the four physical attributes of authenticity, completeness,reliability, and usability of electronic records. The evidence integration goals are the activities of pursuing the intrinsic value of electronic records.

    4 Preliminaries

    4.1 Open archival information system

    4.1.1 OAIS model

    The Open Archival Information System (OAIS) model is the most widely accepted international standard for the long-term preservation of digital information. It provides the necessary framework for the construction of trusted data storage and provides the most reference for the long-term preservation of electronic records [Wu, Li and Jiang (2017)].The Standard guarantee essential contributions of OAIS are as follows. According to the characteristics of digital information and laws of life movement, six basic functional models are provided, and the information objects that need to be stored for a long time are classified in detail according to their functions. The proposed information model has the following significant reference value.

    Figure 3: OAIS model

    Receive.

    It means that OAIS receives submittal information package (SIP) from the information producer and prepares the content so that the submitted information can be stored and managed in the file system. The function includes: receiving and submitting the information package for quality confirmation, generating an archive information package(AIP) conforming to the file system data format and file standard, extracting the description information from the archive information package for storing in the file database, and coordinating the storage of the file and data management which changed.

    File storage.

    It mainly to store, maintain and retrieve archive information package. This includes receiving archived packets from the ingest function, saving them to the storage system,managing the storage system’s organization, updating the media that holds the file information, performing routine checks and maintenance, and providing disaster recovery ability and provide archive information package to achieve file extraction.

    Data management.

    The purpose of data management is to implant, maintain, and access management information that identifies and records descriptive information about archival holdings and the archival system. This functionality includes managing the archive database(maintaining definitions of conceptual models and views in the database, maintaining referential integrity of the system, etc.), performing database updates (loading new descriptive information or archive management data), providing query capabilities to management data to produce results Set, and generate query reports from these search result sets.

    Administration.

    For the overall file system to provide management. The primary functions include negotiating with the information producer to decide on the submission of the agreement,the submission of the information to be checked to ensure that the submission is in accordance with the file standard, the system software environment is configured and managed, as well as monitoring and improving the file system health and record, report the contents of the file to transplant and modify, establish and maintain file standards, provide customer support, stimulate storage requests and other functions.

    Preservation planning.

    It mainly to monitor the environment of OAIS, provide recommendations to ensure longterm preservation of information stored in OAIS program, even after the original computer environment degradation, it can still be accessed by the corresponding target user (DC).The primary functions include assessing what is stored in the file system, periodically providing archival information advice and porting current file holdings, advising on file system standards and policies, monitoring service environment and target user (DC)service needs and knowledge Background changes. It also includes templates for designing information packages (IP), providing design assistance and detailed evaluations, and professionalizing these templates to create a specific commit and archive information packages, developing migration plans, developing migration software prototypes and corresponding test plans achieve management functions such as transplantation goals.

    Access.

    The goal is to support consumers so that consumers can determine, understand, locate, and access information stored in OAIS so that consumers can request and receive information products. The function includes communicating with consumers and receiving requests,managing and controlling specific specially protected information to restrict their access,coordinating the execution of the request to achieve the complete response of the request,and sending the result set of the distributed information package to the consumers.

    4.1.2 Information packages in OAIS

    OAIS proposed the concept of an Information Package to illustrate the filing process of archivists to OAIS and the distribution of OAIS to archivists. A packet is a container containing two kinds of information objects called Content Information and Preservation Description Information (PDI). The content information and the save description information are encapsulated and identified by the packaged information, and the information packet needs to be described by the description information so that the packaged information can be understood and discovered.

    OAIS makes a distinction between the packets submitted to it, the packets it stores, and the packets it distributes to other consumers. These packets are called the Submission Information Package (SIP), the archive packet Archival Information Package (AIP) and Dissemination Information Package (DIP).

    (1) The submission packet (SIP) is a packet provided by the information producer to OAIS.Its format and details are usually the results of negotiations between producers and the OAIS system. Most submission packets usually consist of some content information and related save description information, but it may require multiple submission packets to form complete content information and corresponding save description information to form further an archive information package, one submission packet may also include information that needs to be included in multiple archive packets. The packaging information (PI) corresponding to the submitted package usually exists in some form.

    (2) In OAIS, one or more commit packages need to be converted into one or more archive packages for saving. Archive information package has a complete set of saving description information and related content information. A submission packet may also consist of several other submission packets. Archiving package information (PI) requires compliance with OAIS internal standards and subject to OAIS management.

    (3) At the request of the consumer, OAIS needs to provide all or a portion of the content of an archived package to the consumer in the form of a distribution package (DIP). A distribution package may also include multiple archive packages, but does not necessarily have a complete save description. The packaging information (PI) to distribute a package needs to somehow appear in a way that allows the consumer to discern the desired information. Depending on the distribution media and the needs of consumers, packaging information can exist in many ways.

    4.2 Erasure code

    Erasure code technology is used more and more in large-scale storage system design due to its strong fault tolerance and high space utilization. For example, RAID (redundant array of independent disks), Robustore and OceanStoreetc are all fault-tolerant storage systems based on erasure codes.

    Erasure code [Wang, Xu and Pei (2017); Wang, Zhao and Hou (2012); Liu, Feng and Li(2014)] can be represented by triplets (n, k, k’), wheren>k’≥k. An (n, k, k’)-erasure code divides a data objectOof sizeMintokdata blocks o1,o2, ...,okof sizeM/k, then these data blocks are operated through the corresponding coding algorithm to obtainncoding blocksc1,c2, ...,cn, and ensure that anyk’bits of thencode blocks can be decoded to recover the original data objectO.

    At present, the erasure code adopted by the storage system is linear, and the article only focuses on the linear erasure code. As shown in Eq. 1, in the linear erasure code, each coding block cican be expressed as a linear combination of all the data blocks, where gij∈Fq, Fqis a Galois Field containingqelements.

    As with the encoding process, in the case of linear erasure codes, the repair of a failed block is also done by linearly combining the available blocks. The specific error-correcting code design dictates the choice of available blocks and the calculation of the corresponding combination coefficients. For example, for a standard RS code,kblocks need to be downloaded to repair any one block. For instance, most recently introduced improved error correction codes, such as locally repairable code [Fu, Wen, Ma et al. (2018)]. The number of blocks required for repair in most failure cases is less thank, which is higher thankin the case of multiple failures.

    4.3 Proofs of retrievability

    For the first time, Juels and Kaliski [Juels and Kaliski (2017)] proposed proofs of retrievability (POR) in a cloud storage environment to ensure the recoverability of cloud storage data. Compared to the provable data possession (PDP) [Ren, Shen, Wang et al.(2015); Juels and Kaliski Jr (2007)] only to ensure the integrity of the data, POR data recovery is more stringent. To tolerate a certain percentage of lost or corrupted data, POR uses error-correcting code technology to encode the data and recover the data by adding redundancy. The (n, k, d)-erasure code is chosen, where the minimum distancedis an even number, meaning that its error correction capability isd/2. The data processing algorithm includes the following steps.

    (1) Coding and Encryption: The dataMis divided intobblocks (bis a multiple ofk), and the erasure code is calculated for everykdata blocks. The redundant data generated here is also divided to the same length as the original data block. The resulting encoded data isM',which containsbn/kdata blocks mi’. Then encrypt each data block mi’using symmetric encryption technique to obtain mi”.

    (2) Generate Sentinels: Generateηrandom “sentinels” using a one-way function that has the same length as the data block and can, therefore, be considered a dummy data block.(3) Replacement: Replace the data blocks generated in Steps 1 and 2 with the following permutation algorithm and send the permuted complete data to the cloud storage server.When performing an integrity query, the verifier checks that the random sentinels, which are well-preserved, rather than directly querying and validating the real data block to determine the integrity (recoverability) of the cloud data. Since there are a total ofηrandom sentinels, the scheme can only allow a limited number of (η/ktimes) non-intersecting integrity verifications, if each integrity query checksksentinels. The following is a brief review of the POR scheme based on computational Diffie-Hellman problems and then explores its advantages over previous schemes. The data processing algorithm first encodesMto obtainM’, and then every block ofM’ is divided intospieces, that is, mi= (mi,1,mi,2, ..., mi,s). Calculate the metadata σifor each data block mias follows:

    Where μ =(μ1,μ2,…,μs) and metadata σ is as responseP:

    Validating the responsePrequires bilinear pairings to be performed twice:

    Here,vis the user's public key corresponding toα.

    Whereαis the private key of the user and uj(1≤j≤s) is a parameter randomly selected from the bilinear groupG. The factor containedin metadata σihere also supports aggregation operations, so the cloud storage server can generate partially aggregated responses during the integrity verification phase. The algorithm also signs the data name,the number of data blocks and the parameter ujto obtain the data labelτ.

    To verify the integrity of the data, the verifier submits a query challengeC={(i, vi)},containing the randomly chosen data block number i and the corresponding coefficient vi.The cloud server calculates aggregated data blocks.

    5 Trusted record preservation based on blockchain

    5.1 Overall of our mechanism

    Blockchain-based solutions work by comparing the hash of the original digitally signed hash with the digitally signed hash stored on the blockchain. Any change in the protocol of the original digital record or protocol in the log or a small change in the implementation of the various components will cause the corresponding entries in the blockchain to change.Since digitally signed versions on the blockchain cannot be reverse-engineered to produce copies of the original record, the original must always be retained so that the original can be re-hashed and digitally signed for comparison. According to ISO 14721, the organization and level of investment in retaining originals should not be overlooked.Trustworthy digital repositories and additional elements such as technical, policy and institutional capabilities should be established for record keeping, record storage, data management, access, disseminate and migrate to new media and forms. However, there is not much research on how to deal with the preservation of original records. To solve the problem, the OAIS model which is based on cloud storage architecture to store the original record is proposed in the paper. To ensure the integrity of electronic records in cloud storage, we use the traditional PDP or POR to periodically check the integrity of the original records stored on the cloud servers. To further improve the reliability of the original records, we adopt erasure code technology. When the original records in cloud storage are defected or even lost, the redundant record blocks in erasure code are utilized to recover the missing record. The use of erasure code technology will ensure the reliability of the original records.

    Figure 4: Technical guarantee of trusted electronic records

    5.2 Electronic records based on regeneration code

    The reproduction code is used to encode the original electronic record in the article. Storing record encoding tonnodes, each node storing an encoded record of sizeα. When one node fails,dnodes (k≤d≤n-1) of the remainingn-1 nodes are connected, and record sizeβ(β≤α)is downloaded from each node to be repaired. Thednodes that help to fix are called Help Nodes, and the total data downloaddβfor repair is called Repair Bandwidth. Achieve the minimum bandwidthdby increasing the amount of storage per node, and the minimum bandwidth regeneration point (MBR) can be obtained from the following expression:

    Here,Brefers to the size of the source record,αrefers to the storage overhead of nodes,βis the communication overhead of failover,drefers to the number of surviving nodes, andkrefers to the number of nodes needed for record reconstruction.

    Accordingly, the regenerative code generation matrix M hasnαrows andBcolumns, andnα row vectors correspond to thenαredundant data blocks. Ifnnodes corresponding to the generated evidence M are divided intonsub-matrices Mi(i=1,...,n) according to rows, each sub-matrix corresponds to one cloud storage service and M=[M1,M2, ...,Mn]T. Miis a generator matrix of redundant data blocks in theith cloud storage service, that is,αredundant data blocks (E(i?1)α+1,…, Eiα) in the cloud storage serviceiare equal to the product of the submatrix Miand the (D1,D2, ...,DB) of the original record block, i.e.

    The regenerative code is also the MDS code and must also meet the MDS nature. Then all the redundant record blocks in anykofncloud storage can recover the original record.Similarly, the matrix rank formed by combining anyksub-matrixes innsub-matrices Miis equal toB, and then the MDS property is satisfied.

    Figure 5: Coding, regeneration and reconstruction of electronic record based on regeneration code

    5.3 Repair of electronic record

    Encoded record with MDS properties allow for up ton-kcloud storage services to simultaneously lose data, but only one case of a cloud storage service losing its stored redundant data block (n=d+1) is discussed here. Supposing that the cloud storage service number of the redundant record block lost isi, the redundant record blocks (E(i?1)α+1,…,Eiα) in the cloud storage are lost and a generator matrix Miis no longer available. The record restoration process includes: generating a repair of the sub-matrix Miand repairing the redundant record block. Generating a submatrix repair will generate a new Mi’instead of an unavailable Miso that the MDS properties of the generator matrix will continue to be maintained. The pre-restoration generator matrix will be denoted asMand the post generator will be denoted asM'. The repair of the redundant record blocks will really repair the redundant record blocks, and the successful repair of the previous generation sub-matrix ensures that the redundant record blocks to be generated also meet the MDS nature.

    The idea of repairing Miis to findβrow vectors fromdparticipating sub-matrices (M1, ...,Mi?1,Mi+1, ...,Mn), combine thesedβrow vectors linearly intoα.The new sub-matrix Mi'of the row vector is used to replace the originally failed Miso that the new generator matrix Mi'satisfies the MDS property. The specific steps are as follows:

    (1) At first, downloads the metadata file Fmetaof the record from any cloud storage service to obtain theMandn, k, α, β, d, Band other parameters for encoding;

    (2) Sub-matrix Mito randomly selectdβrow vectors from the remainingd=n-1submatrices to form aCM(candidate matrix), and each sub-matrix randomly selectsβrow vectors;

    (3) Randomly generate aα×dβrepair matrix is used to combine candidate matrices CM into new sub-matrices Mi’;

    (4) The new sub-matrixMi'is the product of the repair matrix and the candidate matrix,that is,

    (5) Replacing the original sub-matrix Miwith Mi’, if the MDS property of the new generated matrix Miafter the replacement is maintained, the sub-matrix restoration is successful; if the MDS property is not maintained, returning to Step (2). The next round of repair attempts and reselects the candidate matrix and the repair matrix to generate a new sub-matrix Mi’until it satisfies the MDS properties of the newly generated M’.

    5.4 Trusted records preservation based on OAIS in blockchain under cloud storage

    The maximum amount of information that can be stored by each node in the current blockchain is 2 MB, which cannot meet the storage requirements of massive original electronic records. So, we propose storing the hash value of the original record address in each node of the blockchain instead of the original record itself; while the original record is stored using the existing cloud storage mechanism.

    According to the OAIS model, the owner of the record generates SIP, AIP and DIP, and the corresponding metadata, from the encoded electronic record obtained in the previous section. The article proposes storing these parts in a cloud storage server, storing the hash value of the storage address in the recording layer of each chunk and building Merkle hash trees.

    Figure 6: Trusted records preservation in blockchain

    5.5 Record storage as transaction

    Store transactions allow participants to store blocks of records. Stores need to enter chunks c, their certifiers σ1,…,σn, the client's public key pku. Storage is included in-store deals,disappear from the network and can no longer be spent. This payment is necessary to avoid a denial of service attack because an attacker can upload an arbitrary amount of data blocks free of charge, surpassing the available storage space on the network. Moreover,repayments are the form of protection against inflation. As the number of available decreases, the value of the remaining increases as only limited exist at any one time.

    The miner can choose to store the chunk together with its authenticator so that a PoR can be created on that chunk to generate a new chunk. Moreover, the miner needs to store the public pkuof the transaction issuer for verification. The miners do not need to store all the files and may not even be able to do that. The motivation for storing files is economical, as storage allows you to tap into new blocks in the blockchain and collect mining rewards. Of course, the storage guarantee can be increased arbitrarily by applying the appropriate delete code on the file to be uploaded. In addition to these financial incentives, there is no further mechanism to increase storage assurance.

    Chunk storage time is linearly dependent on the amount spent on the issue of the store's transaction. After the storage time has elapsed, the block containing the PoR for that particular block is no longer considered valid. Assuming that most miners do not accept such blocks, there is no incentive to store the blocks. Blockchain has provided loose time synchronization so that all miners can agree on when the required shelf life will be.

    6 Conclusion

    The paper analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the information security theory and subdivides the trustworthiness into the authenticity, integrity, usability, and reliability of electronic records in cloud storage. Moreover, the technology of blockchain, proofs of retrievability,the open archival information system model and erasure code are adopted to protect these four security attributes, to guarantee the credibility of the electronic record.

    Acknowledgment:This work is supported by the NSFC (No. 61772280, 61772454,6171101570, and 61702236), Natural Science Foundation of Jiangsu Province under grant No. BK20150460, the Changzhou Sci&Tech Program (No. CJ20179027), and the PAPD fund from NUIST. Prof. Hye-Jin Kim is the corresponding author.

    日韩制服骚丝袜av| 中文精品一卡2卡3卡4更新| 亚洲精品成人久久久久久| eeuss影院久久| 亚洲怡红院男人天堂| 各种免费的搞黄视频| 欧美精品国产亚洲| 嫩草影院精品99| 久久久久久久精品精品| 欧美xxxx黑人xx丫x性爽| 久久久久网色| 麻豆精品久久久久久蜜桃| 国产精品伦人一区二区| 亚洲av在线观看美女高潮| 老女人水多毛片| 午夜精品一区二区三区免费看| 精品久久久久久久人妻蜜臀av| 尾随美女入室| 一个人看的www免费观看视频| 成年女人看的毛片在线观看| 日韩人妻高清精品专区| 国产黄频视频在线观看| 成人国产麻豆网| 大码成人一级视频| 一级毛片电影观看| 久久97久久精品| 国产亚洲精品久久久com| 亚洲天堂国产精品一区在线| 波野结衣二区三区在线| 亚洲欧洲国产日韩| 女人十人毛片免费观看3o分钟| 免费看av在线观看网站| 中国美白少妇内射xxxbb| 亚洲一区二区三区欧美精品 | 禁无遮挡网站| av女优亚洲男人天堂| 少妇熟女欧美另类| 成人鲁丝片一二三区免费| 亚洲精品乱码久久久v下载方式| 国产乱人偷精品视频| 国产色婷婷99| 亚洲性久久影院| 夫妻性生交免费视频一级片| 午夜福利网站1000一区二区三区| 2021天堂中文幕一二区在线观| 亚洲美女视频黄频| 国产国拍精品亚洲av在线观看| av一本久久久久| 黄色视频在线播放观看不卡| 国产欧美日韩精品一区二区| av网站免费在线观看视频| 自拍欧美九色日韩亚洲蝌蚪91 | 精品少妇久久久久久888优播| 欧美3d第一页| 麻豆成人av视频| 日本与韩国留学比较| 青春草亚洲视频在线观看| 亚洲欧美日韩另类电影网站 | 人妻制服诱惑在线中文字幕| 亚洲熟女精品中文字幕| 观看美女的网站| 超碰97精品在线观看| 麻豆成人av视频| 国产真实伦视频高清在线观看| 深爱激情五月婷婷| 国产中年淑女户外野战色| 成人午夜精彩视频在线观看| 亚洲一区二区三区欧美精品 | h日本视频在线播放| 在线观看一区二区三区| 午夜福利视频精品| 日日啪夜夜爽| 99精国产麻豆久久婷婷| 最近最新中文字幕免费大全7| 久久久久九九精品影院| 国产精品麻豆人妻色哟哟久久| 全区人妻精品视频| 亚洲精品乱久久久久久| 国产精品嫩草影院av在线观看| 国产成人精品一,二区| 大话2 男鬼变身卡| 2018国产大陆天天弄谢| 乱系列少妇在线播放| 久久久精品免费免费高清| 22中文网久久字幕| 国产亚洲最大av| 免费在线观看成人毛片| 中国美白少妇内射xxxbb| 国产一区二区三区av在线| 午夜亚洲福利在线播放| 麻豆乱淫一区二区| 精品久久久噜噜| 不卡视频在线观看欧美| 欧美最新免费一区二区三区| 男人舔奶头视频| 菩萨蛮人人尽说江南好唐韦庄| 噜噜噜噜噜久久久久久91| 亚洲婷婷狠狠爱综合网| 黄色视频在线播放观看不卡| 丝瓜视频免费看黄片| 国产精品国产av在线观看| 三级男女做爰猛烈吃奶摸视频| 国产黄频视频在线观看| xxx大片免费视频| 亚洲色图综合在线观看| 乱系列少妇在线播放| 日本午夜av视频| 中文精品一卡2卡3卡4更新| 国产av国产精品国产| 亚洲欧美一区二区三区国产| 久久精品国产a三级三级三级| 欧美人与善性xxx| av播播在线观看一区| 一级毛片电影观看| av卡一久久| 免费看av在线观看网站| h日本视频在线播放| 七月丁香在线播放| 麻豆成人午夜福利视频| 国产精品不卡视频一区二区| 婷婷色综合大香蕉| 王馨瑶露胸无遮挡在线观看| 久久久久久久亚洲中文字幕| 国产高潮美女av| 精品一区在线观看国产| 国产v大片淫在线免费观看| 亚洲经典国产精华液单| 各种免费的搞黄视频| 精品人妻熟女av久视频| 国产毛片在线视频| 日韩不卡一区二区三区视频在线| 春色校园在线视频观看| 国产欧美日韩精品一区二区| 日韩欧美精品v在线| 视频中文字幕在线观看| 久久精品国产亚洲av天美| 肉色欧美久久久久久久蜜桃 | 91狼人影院| 亚洲欧洲国产日韩| 日韩亚洲欧美综合| 午夜免费男女啪啪视频观看| 亚洲成人中文字幕在线播放| 精品久久久精品久久久| 可以在线观看毛片的网站| 只有这里有精品99| 男男h啪啪无遮挡| 老女人水多毛片| 欧美精品人与动牲交sv欧美| 午夜亚洲福利在线播放| 老师上课跳d突然被开到最大视频| 我的老师免费观看完整版| 亚洲国产欧美人成| 国产精品一区www在线观看| 新久久久久国产一级毛片| 久久久久久久久久成人| 男的添女的下面高潮视频| 男女下面进入的视频免费午夜| 97在线视频观看| 国产亚洲精品久久久com| 直男gayav资源| 搞女人的毛片| 精品熟女少妇av免费看| 日韩精品有码人妻一区| 在线观看国产h片| 男插女下体视频免费在线播放| 亚洲精品国产av蜜桃| 国产成人一区二区在线| 日韩av不卡免费在线播放| 又粗又硬又长又爽又黄的视频| 男男h啪啪无遮挡| 91精品国产九色| 91精品一卡2卡3卡4卡| 日本黄大片高清| 免费av毛片视频| 亚洲欧美日韩卡通动漫| 干丝袜人妻中文字幕| 另类亚洲欧美激情| 亚洲av日韩在线播放| 高清日韩中文字幕在线| 丝袜美腿在线中文| 蜜桃亚洲精品一区二区三区| 日韩在线高清观看一区二区三区| 亚洲av欧美aⅴ国产| 精品午夜福利在线看| 能在线免费看毛片的网站| 99热这里只有精品一区| 亚洲在久久综合| 国内少妇人妻偷人精品xxx网站| 在线观看三级黄色| 插阴视频在线观看视频| 国产久久久一区二区三区| 看免费成人av毛片| 亚洲精品,欧美精品| 搡老乐熟女国产| 亚洲人与动物交配视频| 成年女人在线观看亚洲视频 | 精品久久久精品久久久| 伊人久久国产一区二区| 一个人看的www免费观看视频| 日韩中字成人| 在线观看美女被高潮喷水网站| 一级黄片播放器| 亚洲av中文字字幕乱码综合| 国产午夜福利久久久久久| 免费电影在线观看免费观看| 精品久久久久久久末码| 熟妇人妻不卡中文字幕| 国产毛片a区久久久久| 日本午夜av视频| 嫩草影院新地址| 韩国高清视频一区二区三区| 人人妻人人看人人澡| 亚洲精品亚洲一区二区| a级毛片免费高清观看在线播放| 亚洲欧美中文字幕日韩二区| 真实男女啪啪啪动态图| 熟女电影av网| 七月丁香在线播放| 美女cb高潮喷水在线观看| 精品人妻一区二区三区麻豆| 黄色日韩在线| www.色视频.com| 亚洲高清免费不卡视频| 亚洲久久久久久中文字幕| 看免费成人av毛片| 日韩伦理黄色片| 91精品伊人久久大香线蕉| 午夜精品国产一区二区电影 | 99热网站在线观看| 亚洲精品影视一区二区三区av| 在线亚洲精品国产二区图片欧美 | 中文欧美无线码| 超碰av人人做人人爽久久| 男女无遮挡免费网站观看| 国产熟女欧美一区二区| 最新中文字幕久久久久| 69av精品久久久久久| 国产91av在线免费观看| 黄色日韩在线| 成人国产av品久久久| 成人一区二区视频在线观看| 日韩av不卡免费在线播放| 久久久精品94久久精品| 久久久久性生活片| 色5月婷婷丁香| 久久国产乱子免费精品| 午夜免费鲁丝| 久久久久久久国产电影| 国产男女超爽视频在线观看| 一本色道久久久久久精品综合| 2021少妇久久久久久久久久久| 国产成人a区在线观看| av在线蜜桃| 欧美另类一区| 美女高潮的动态| 看免费成人av毛片| 久久99热这里只有精品18| 日韩免费高清中文字幕av| 男人添女人高潮全过程视频| 国产免费一级a男人的天堂| 2018国产大陆天天弄谢| 在线免费观看不下载黄p国产| 亚洲无线观看免费| 亚洲精品成人久久久久久| 国产成人a∨麻豆精品| 欧美成人午夜免费资源| 国产熟女欧美一区二区| 国产男人的电影天堂91| 在线免费观看不下载黄p国产| 亚洲性久久影院| 少妇被粗大猛烈的视频| 性色avwww在线观看| 国产淫语在线视频| 亚洲av国产av综合av卡| 狂野欧美激情性xxxx在线观看| 少妇熟女欧美另类| 高清视频免费观看一区二区| 欧美亚洲 丝袜 人妻 在线| 综合色丁香网| 久久久久久久国产电影| 国产有黄有色有爽视频| 精品久久国产蜜桃| 欧美丝袜亚洲另类| 黄色配什么色好看| 日韩不卡一区二区三区视频在线| 春色校园在线视频观看| 午夜视频国产福利| 欧美日韩视频精品一区| av卡一久久| 天堂网av新在线| 亚洲精品日韩在线中文字幕| 亚洲精品久久午夜乱码| 免费黄网站久久成人精品| 在线天堂最新版资源| 九色成人免费人妻av| 狂野欧美白嫩少妇大欣赏| 十八禁网站网址无遮挡 | 欧美97在线视频| 亚洲精品日韩在线中文字幕| 18禁在线播放成人免费| 97精品久久久久久久久久精品| 亚洲国产精品999| 少妇人妻 视频| 国产亚洲精品久久久com| 国产精品国产av在线观看| 精品久久久久久久久亚洲| 一本久久精品| 成年女人在线观看亚洲视频 | 秋霞在线观看毛片| 国产欧美亚洲国产| 中国三级夫妇交换| 久久人人爽人人片av| 岛国毛片在线播放| 国产成人91sexporn| 水蜜桃什么品种好| 国产欧美亚洲国产| 免费av毛片视频| 亚洲av免费高清在线观看| av专区在线播放| 免费观看a级毛片全部| 一区二区三区乱码不卡18| 精品久久久久久久人妻蜜臀av| av免费观看日本| 久久韩国三级中文字幕| 丝袜喷水一区| 男人舔奶头视频| 亚洲精品久久午夜乱码| 伊人久久国产一区二区| 欧美精品人与动牲交sv欧美| 亚洲av一区综合| 亚洲精品一区蜜桃| 国产乱人视频| 嫩草影院新地址| 久久久久久久亚洲中文字幕| 国产精品偷伦视频观看了| 97热精品久久久久久| 秋霞伦理黄片| 久久精品国产自在天天线| 在线 av 中文字幕| 日韩国内少妇激情av| 高清日韩中文字幕在线| 日韩一区二区三区影片| 黄色日韩在线| 国产视频首页在线观看| 成人亚洲精品av一区二区| 国产免费福利视频在线观看| 天美传媒精品一区二区| 国产成人精品一,二区| 欧美日韩视频精品一区| 国内精品宾馆在线| 天天一区二区日本电影三级| 我的女老师完整版在线观看| 99热全是精品| 成人免费观看视频高清| 一边亲一边摸免费视频| 九九爱精品视频在线观看| 五月伊人婷婷丁香| 中文字幕制服av| 美女主播在线视频| 欧美极品一区二区三区四区| 日韩精品有码人妻一区| 国产久久久一区二区三区| 亚洲美女视频黄频| 日日啪夜夜爽| 成人国产av品久久久| 日韩欧美精品v在线| 色视频www国产| 国产精品偷伦视频观看了| 边亲边吃奶的免费视频| 免费观看的影片在线观看| 夜夜看夜夜爽夜夜摸| 一本久久精品| 亚洲欧美一区二区三区黑人 | 舔av片在线| 国产亚洲av片在线观看秒播厂| 久久99蜜桃精品久久| 一二三四中文在线观看免费高清| 在线观看一区二区三区激情| 亚洲成人精品中文字幕电影| 国产在视频线精品| 特级一级黄色大片| 国产男人的电影天堂91| 极品教师在线视频| 国产永久视频网站| 大片免费播放器 马上看| 亚洲精品一二三| 亚洲av免费在线观看| 如何舔出高潮| 欧美精品一区二区大全| 午夜福利视频精品| 免费av观看视频| 丰满人妻一区二区三区视频av| 国产精品蜜桃在线观看| 亚洲av国产av综合av卡| 一本一本综合久久| 伦理电影大哥的女人| 18禁在线播放成人免费| 日本熟妇午夜| 六月丁香七月| 亚洲国产高清在线一区二区三| 日本欧美国产在线视频| 永久免费av网站大全| 乱系列少妇在线播放| 亚洲精品视频女| 99热全是精品| 亚洲成人中文字幕在线播放| 亚洲不卡免费看| 亚洲伊人久久精品综合| 亚洲av成人精品一区久久| 午夜激情久久久久久久| 国产精品国产av在线观看| 欧美性感艳星| 久久久久国产网址| 亚洲精品久久午夜乱码| 国产精品人妻久久久久久| 一边亲一边摸免费视频| 97超碰精品成人国产| 在线观看三级黄色| 国产久久久一区二区三区| 国产伦精品一区二区三区视频9| 中文字幕人妻熟人妻熟丝袜美| 日韩三级伦理在线观看| 国产在线男女| 日本av手机在线免费观看| 黄色一级大片看看| 能在线免费看毛片的网站| 日本-黄色视频高清免费观看| 国产片特级美女逼逼视频| 亚洲精品乱码久久久久久按摩| 久久久久性生活片| 欧美bdsm另类| 国产综合懂色| 男女边吃奶边做爰视频| 国产成人一区二区在线| 天天躁日日操中文字幕| 欧美三级亚洲精品| 最近的中文字幕免费完整| 久久99蜜桃精品久久| 亚洲国产成人一精品久久久| 色吧在线观看| 日韩欧美一区视频在线观看 | 精品午夜福利在线看| 久热这里只有精品99| 亚洲最大成人av| 国产一区二区三区综合在线观看 | 欧美高清性xxxxhd video| 亚洲综合色惰| 久热这里只有精品99| 欧美性感艳星| 亚洲av二区三区四区| 高清欧美精品videossex| av网站免费在线观看视频| 国产精品一二三区在线看| 精品国产乱码久久久久久小说| 亚洲天堂国产精品一区在线| 国国产精品蜜臀av免费| 久久鲁丝午夜福利片| 18禁在线无遮挡免费观看视频| 亚洲欧美一区二区三区黑人 | 一区二区三区乱码不卡18| 永久免费av网站大全| 国产精品国产三级国产专区5o| 日韩中字成人| 国产成人a区在线观看| 91久久精品国产一区二区三区| 特级一级黄色大片| 能在线免费看毛片的网站| 日韩欧美 国产精品| 国产69精品久久久久777片| 男女下面进入的视频免费午夜| 久久久a久久爽久久v久久| 久久久久久久午夜电影| 九草在线视频观看| 男人和女人高潮做爰伦理| 日日啪夜夜撸| 国产久久久一区二区三区| 大码成人一级视频| 日日摸夜夜添夜夜添av毛片| 在线观看免费高清a一片| 水蜜桃什么品种好| 大香蕉久久网| 色视频在线一区二区三区| 在线播放无遮挡| 久久久成人免费电影| 伊人久久精品亚洲午夜| 婷婷色综合大香蕉| 成人鲁丝片一二三区免费| 午夜福利高清视频| 最近2019中文字幕mv第一页| 九九在线视频观看精品| 国模一区二区三区四区视频| 波野结衣二区三区在线| 一二三四中文在线观看免费高清| 欧美极品一区二区三区四区| 亚洲伊人久久精品综合| 中文字幕人妻熟人妻熟丝袜美| 最近最新中文字幕免费大全7| 丝袜喷水一区| 国产精品人妻久久久影院| 99热这里只有是精品50| av免费在线看不卡| 成人综合一区亚洲| 午夜激情久久久久久久| 亚洲丝袜综合中文字幕| 日韩强制内射视频| 亚洲最大成人中文| 最近手机中文字幕大全| 亚洲精品乱码久久久久久按摩| 国产69精品久久久久777片| 26uuu在线亚洲综合色| 精品亚洲乱码少妇综合久久| 精品久久久久久久久av| 久久精品国产亚洲av涩爱| 亚洲国产精品成人综合色| 九九在线视频观看精品| 麻豆乱淫一区二区| 搡女人真爽免费视频火全软件| 一级爰片在线观看| 中国国产av一级| 国产精品.久久久| 大香蕉97超碰在线| 国产亚洲5aaaaa淫片| 欧美3d第一页| 日日撸夜夜添| 人人妻人人看人人澡| 久久久久久久精品精品| 在线天堂最新版资源| 欧美xxxx性猛交bbbb| 精华霜和精华液先用哪个| 国产亚洲av片在线观看秒播厂| 国产亚洲午夜精品一区二区久久 | 精品一区二区三卡| 欧美一区二区亚洲| 欧美日韩综合久久久久久| 亚洲成人久久爱视频| 五月伊人婷婷丁香| 欧美一级a爱片免费观看看| 欧美性猛交╳xxx乱大交人| 波野结衣二区三区在线| 国产中年淑女户外野战色| 男女下面进入的视频免费午夜| 国产免费又黄又爽又色| 视频中文字幕在线观看| 欧美日韩一区二区视频在线观看视频在线 | 天美传媒精品一区二区| 国产老妇女一区| 人妻少妇偷人精品九色| 国产精品国产三级专区第一集| 中文字幕免费在线视频6| 国产男人的电影天堂91| 特级一级黄色大片| 男插女下体视频免费在线播放| 午夜福利在线在线| 亚洲av在线观看美女高潮| 男女边吃奶边做爰视频| 大香蕉久久网| av女优亚洲男人天堂| 97人妻精品一区二区三区麻豆| 国产一区有黄有色的免费视频| av在线天堂中文字幕| 全区人妻精品视频| 99热这里只有是精品在线观看| 少妇人妻久久综合中文| 国产又色又爽无遮挡免| 色播亚洲综合网| 91久久精品电影网| 久久精品国产亚洲av天美| 男女边吃奶边做爰视频| 波野结衣二区三区在线| 99热全是精品| 久久久久久伊人网av| 97超碰精品成人国产| 能在线免费看毛片的网站| 亚洲一区二区三区欧美精品 | 国产一区亚洲一区在线观看| 欧美+日韩+精品| 在线 av 中文字幕| 欧美日韩精品成人综合77777| 午夜精品一区二区三区免费看| 国精品久久久久久国模美| 亚洲精品aⅴ在线观看| 久久久久久久大尺度免费视频| 欧美精品国产亚洲| 日韩,欧美,国产一区二区三区| 老司机影院成人| 美女主播在线视频| 国产探花在线观看一区二区| 亚洲,一卡二卡三卡| 日韩欧美 国产精品| 国产欧美日韩一区二区三区在线 | 国产探花在线观看一区二区| 日日摸夜夜添夜夜爱| 成人毛片a级毛片在线播放| 久久久久久久国产电影| 夫妻午夜视频| av天堂中文字幕网| 国产精品国产三级国产专区5o| 一级毛片 在线播放| 国产成人午夜福利电影在线观看| 久久久久久久精品精品| 国内少妇人妻偷人精品xxx网站| 蜜桃久久精品国产亚洲av| xxx大片免费视频| 成年版毛片免费区| 97精品久久久久久久久久精品| 国产成人91sexporn| 搞女人的毛片| 亚洲国产精品成人久久小说| 亚洲伊人久久精品综合| 在线精品无人区一区二区三 | 成人综合一区亚洲| av卡一久久| 国产亚洲5aaaaa淫片| 成人综合一区亚洲| 国产免费一区二区三区四区乱码|