Research Article

[Retracted] A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques

Figure 9

Data recovery. (1) After the data processing server detects that the data of the local data node is lost or tampered with, it sends an alarm message to the data node. (2) The local data node obtains the data identification from the data direction and requests the corresponding coding matrix according to the alarm information. (3) The access controller automatically distributes the coding matrix according to the access control strategy. (4) The local data node sends the data recovery request and the coding matrix to the data processing server. (5) The data processing server obtains the required set of coded data blocks from the blockchain network. (6) The data processing server decodes the coding blocks, then gets the original data and sends it to the data node.