首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
区块链中的节点以副本形式保存数据,随着时间的推移,区块链中的区块数不断增加,导致节点承受的存储压力随之增大,存储压力成为区块链应用落地的瓶颈之一。为了解决区块链中存储压力问题,提出了基于变色龙hash的区块链可扩展存储方案,该方案利用节点被攻击成功的概率和改进的温度模型,将区块分为高低安全性的冷热区块;基于变色龙hash算法和改进的Merkle tree,对高安全性的冷区块进行部分节点存储。在存储过程中,除高安全性冷区块的区块体信息被重构外,其余数据保持不变。仿真实验表明,在不改变区块链结构和安全性能的情况下,所提出的方案可减少区块链中数据的存储总量,减少存储节点的存储压力;且区块数量越多,其优势越明显。  相似文献   

2.
分布式数据存储过程中的元数据保存在中心节点上,容易造成单点故障和易被恶意修改,安全性较差。虽然,通过引入备份节点可以一定程度上避免该问题,但节点之间的同步和切换效率较低。同时,存储元数据的节点可以达成共识修改元数据,缺乏可信性。针对传统分布式存储中存在的问题,结合区块链的特点,提出一种去中心化的分布式存储模型DMB(Decentralized Metadata Blockchain),通过将元数据保存在区块中、冗余存储区块链、协作验证来保证元数据的完整性。模型分为两个阶段,即元数据存储阶段和元数据验证阶段。在元数据存储阶段,将用户的签名和副本位置数据发送给若干验证节点,生成元数据区块并写入元数据区块链中。在元数据验证阶段,验证节点首先检查本地元数据区块链的状态和全局状态是否相同,如果不相同则进行状态同步。然后,检索本地元数据区块链来验证元数据完整性。理论与实验结果表明,DMB模型可以保证元数据的可追溯性和完整性,有较好的并发处理能力,对数据存储的效率影响较小。  相似文献   

3.
传统区块链系统采用全副本冗余的存储方式,每个节点存储相同的账本,使得区块链的存储负担非常大。目前,相关的区块链存储优化方法能够降低数据存储开销,但仍存在可扩展性差和可用性低的问题。为此,提出了一种基于纠删码的区块链账本分组存储优化方法。该方法引入一种新的区块链节点——分组存储(Grouping Storage, GS)节点,来解决上述问题。区块链账本的主要存储开销位于区块文件中,GS节点采用纠删码对区块文件编码,并以组为单位存储编码后的区块文件,如此,每个组织维持相同的账本,极大地降低了区块链的存储开销且提高了区块链的可用性。针对联盟链的存储扩展,基于GS节点对超级账本文件系统进行改进,重新设计了其存储、恢复和同步区块文件流程,使得本方案能够在实际的区块链架构上工作。最后,理论分析和实验结果表明,所提出的GS节点在存储开销方面取得了显著的进步,且具有较好的可扩展性和可用性。  相似文献   

4.
随着分布式存储技术的不断发展,越来越多的企业、政府机构用户将数据保存在云端,实现大数据的分布式存储和数据资源共享。区块链技术的去中心化、可追溯、不可篡改、数据一致性等特点,为解决云存储存在的隐私和安全挑战问题带来了新的契机。文章提出了一种基于区块链的分布式离链存储框架。在区块链中部署区块节点和存储节点,其中区块节点用于执行底层区块链运行机制,存储节点用于存储数据和文件,通过将区块和存储功能区分开实现了离链存储,保证了区块链的运行效率。此外,文章还提出了一个使用基于经典数据占有机制的全局交互验证方法,以确保数据文件的分布、可靠和可证明的存储。用户向区块链中添加区块(存储文件)时会触发公平挑战机制的审核机制,从而隐式验证离链存储的所有文件是否完整。  相似文献   

5.
目前区块链的容量受到网络里存储空间最小的节点的限制,提出了区块链存储容量可扩展模型,该模型将一条完整的区块链副本进行分片处理,并将分片数据保存在一定比例的节点中。同时,模型增加了验证节点,对存储数据的节点进行基于数据可检索性证明(proofs of retrievability,POR)方法的实时检测,并记录更新存储节点稳定性值,依此选择高稳定性节点来储存新产生的数据副本,提高了数据存储的稳定性。最后,模型在多节点中正常运行、节点故障和有恶意攻击时的实验表明,区块链存储容量可扩展模型在具有稳定性、容错性和安全性的同时,有效地增加了区块链的存储扩展性。  相似文献   

6.
区块链具有去中心化、不可篡改、可追溯以及公开透明等特性,可以解决去中心化网络中节点之间相互不信任的问题,为构建价值互联平台提供了可能.然而,区块链要求每个节点都存储一份完整的数据,以高存储冗余来保证数据的可靠性,给节点带来了巨大的存储压力,降低了存储资源的利用效率,也导致系统的存储可扩展性成为区块链性能的一个瓶颈.采用...  相似文献   

7.
区块链增强型轻量级节点模型   总被引:1,自引:0,他引:1  
区块链固有的链式结构意味着其数据量无休止地线性增长,随着时间的积累,对单个节点的存储造成很大的压力,对整个系统的存储空间造成极大的浪费。在比特币白皮书中提出的SPV(Simplified Payment Verification)节点模型,大大减少节点对存储空间的需求,但是,它使得全节点的个数减少、压力增大,减弱了整个系统的去中心化程度,存在拒绝服务攻击、女巫攻击等安全隐患。通过对比特币区块数据进行分析,提出一种功能完整的增强型轻量级节点模型ESPV(Enhanced SPV)。ESPV把区块分为新区块和旧区块,对它们采用不同的存储管理策略。新区块以全部副本(每个节点保存一份)的方式保存以用于交易验证,用较少的存储空间代价让ESPV具有交易验证(挖矿)功能;旧区块分片存储在网络的节点中,通过分级区块分区路由表访问,在保证数据可用性和可靠性的前提下减少系统对存储空间的浪费。ESPV节点具有完整的节点功能,从而保证区块链系统的去中心化特性,增强其安全性和稳定性。实验结果表明,ESPV节点具有80%以上的交易验证率,在数据量和增长量上这些节点仅为全节点的10%,ESPV的数据可用性和可靠性有保障,适用于系统的整个生命周期。  相似文献   

8.
张国潮  王瑞锦 《计算机应用》2019,39(9):2617-2622
针对存储原因所导致的区块链技术难以在大型业务场景应用的问题,提出了一种基于门限秘密共享的区块链分片存储模型。首先由共识节点使用改进的Shamir门限,将要上链的交易数据进行分片处理;其次,共识节点基于分片数据构造不同的区块,并分发给现存于区块链网络中的其他节点进行存储;最后,当节点要读取交易数据时,在从分发到交易数据分片的n个节点中的k个节点请求数据,并利用拉格朗日插值算法进行交易数据的恢复。实验结果表明,该模型在保证了上链数据安全性、可靠性、隐私性的同时,每个节点的数据存储量约为传统存储方法的1/(k-1),从而有利于区块链技术在大型业务场景的应用。  相似文献   

9.
针对智能电网用电数据存储系统中用电数据的安全问题,结合区块链共识机制、加密机制、对等网络和云存储技术,提出一种基于区块链的用电数据云存储方案,以确保用电数据的安全存储和共享.通过实用拜占庭协议,实现网络节点的共识,访问控制机制实现用电数据信息的共享,区块链存储用电数据的公共信息,并将用电数据的真实数据加密存储在数据库或云存储中,方便有效地实现敏感用户用电数据的存储和系统间的信息共享.在联盟链的环境下选取若干网络节点进行性能测试,通过安全性分析表明,该方案能安全、可靠地存储用电数据并且大大降低了网络节点的计算开销.  相似文献   

10.
智能电网数据存储技术通过直接对数据进行加密保存,实现电网数据的分布式存储,由于对数据存储节点的判定较为模糊,导致其存储延迟时间较长。对此,文章提出基于区块链技术的电网数据分布式存储技术,采用加密协议对存储节点提供签名和密钥,对数据存储节点进行加密。利用区块链技术构建出存储数据的共识机制,实现电网数据的分布式存储与共享。在实验过程中,文章对存储延迟时间进行了验证,经实验分析证明,利用提出的存储技术对电网数据进行存储,存储延迟时间较短。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号