CN109040012A - A kind of data security protecting and sharing method based on block chain and system and application - Google Patents
A kind of data security protecting and sharing method based on block chain and system and application Download PDFInfo
- Publication number
- CN109040012A CN109040012A CN201810628273.9A CN201810628273A CN109040012A CN 109040012 A CN109040012 A CN 109040012A CN 201810628273 A CN201810628273 A CN 201810628273A CN 109040012 A CN109040012 A CN 109040012A
- Authority
- CN
- China
- Prior art keywords
- data
- block
- node
- common recognition
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Abstract
The invention belongs to digital information transmission technical field, discloses a kind of data security protecting based on block chain and sharing method and system and application, each participant provide authentication information and key;The summary info of initial data and cryptographic Hash packing are uploaded into block catenary system;It is packaged node and all summary infos received in the period and cryptographic Hash is packaged into block according to a graded, be sent to common recognition node;The whole network broadcast common recognition result after efficiently reaching common understanding according to RPBFT agreement;Block is recorded in account book according to common recognition result;Different access-control protocols is associated with block;User may have access to account book after access-control protocol authorization, obtain the data summarization recorded in account book and prime information storage location using quick-searching function, and user accesses raw information storing data library, obtains initial data.The present invention can resist distorting for malicious node, efficiently realize common recognition, significantly improve data search efficiency.
Description
Technical field
The invention belongs to digital information transmission technical field more particularly to a kind of data security protecting based on block chain and
Sharing method and system and application.
Background technique
Currently, the prior art commonly used in the trade is such thatWith the development of information and network technology, big data era is come
Face, various data show the situation of explosive growth.Excavation and utilization of the people for mass data are national economy, life
The quantization progress in the fields such as work, military affairs provides important support.For example, can discover business by big data mining analysis and become
Gesture determines quality of research, avoids disease's spread, fights crime or measure real-time traffic etc..However, enjoying data resource
While bring is convenient, personal and mechanism is also in the risk that subject privacy leakage.Due to various heterogeneous networks it is cross-domain mutually
Connection, various data are throughout terminal device, network and cloud, in addition black economy interests drive, the risk of data-privacy exposure
Increasingly sharpen.In this context, the protection of big data security and privacy is very necessary, only increases grinding for Technology On Data Encryption
Study carefully, just can ensure that data safety stores, protect the privacy of user, guarantee people during using internet data information it is complete
Whole property, availability and confidentiality, avoid bringing interests to lose to individual.On the one hand, data requester wish obtain user with
Past data, to create social value.On the other hand, the data record of storage includes mechanism and the relevant many privacies of user.
Therefore, inquiry data may bring serious secret risk with shared to metadata provider.In order to meet the height of data sharing
It is required that researcher proposes some relevant programmes about cloud storage and computing technique, mentioned for compression storage and processing demand
For suitable solution.However, cloud service provider (CSP) is persuading mechanism due to exposure data content bring risk
Major obstacles are faced for the use of centralized cloud service.At the same time, due to centralization problem, these schemes are in efficiency and can be used
Property aspect there is also many problems.It is stored data into for mechanism and does not make us putting in the third-party institution such as cloud disk
The heart.These half third parties trusted may abuse and disclose the privacy of provider.Based in existing scheme in shared procedure
Summary info is stored in block chain by the trust problem of existing defects and cloud service provider in terms of recall precision, the present invention
On, then strange land is stored in server to original, and the visit of file is realized by the access control policy being recorded in distributed account book
It asks control, and promotes recall precision using quick-searching mechanism, to promote shared effect on the basis of securing documents
Rate.
In conclusion problem of the existing technology is:Internet system data are highly susceptible to attack to reveal,
Currently without a suitable data sharing mode, data security protecting and, realization data peace shared across mechanism are solved the problems, such as
Full guard and shared.
Solve the difficulty and meaning of above-mentioned technical problem:
It solves the problems, such as that data security protecting is shared with across mechanism, how to overcome block chain technology itself in terms of efficiency
How bottleneck and encryption data efficiently realize data retrieval.Problem above is that existing secure sharing method brings difficulty.
Summary of the invention
In view of the problems of the existing technology, the present invention provides a kind of data security protectings based on block chain and shared
Method and system and application.
The invention is realized in this way a kind of data security protecting and sharing method based on block chain, described to be based on area
The data security protecting and sharing method of block chain include: that each participant provides authentication information and key;By original number
According to summary info and cryptographic Hash packing upload to block catenary system;Node is packaged to believe all abstracts received in the period
Breath and cryptographic Hash are packaged into block according to a graded, are sent to common recognition node;It is complete after efficiently reaching common understanding according to RPBFT agreement
Net broadcast common recognition result;Block is recorded in account book according to common recognition result;Different access-control protocol and block are carried out
Association;User may have access to account book after access-control protocol authorization, and the data recorded in account book are obtained using quick-searching function
Abstract and prime information storage location, user access raw information storing data library, obtain initial data.
Further, the initial method of the data security protecting and sharing method based on block chain includes:
(1) each participant provides authentication information and key;
(2) node for participating in system needs to apply authentication information and key, and the clear responsibility oneself undertaken;
(3) safety certificate issued by certification authority source can be obtained by the node of verifying;
(4) node is selected to back end, is packaged node, common recognition node, accounting nodes;
(5) certification authority needs to supervise whether every wheel common recognition is normal, and whether random seed, which can correctly be selected, is worked as front-wheel
Secondary common recognition node.
Further, the data structures of the data security protecting and sharing method based on block chain upload data method packet
It includes:
(1) locally the data uploaded will be needed to handle per after a period of time, back end passes through client, extracted
Summary info, data cryptographic Hash, previous block coding related to user;
(2) previous block coding related to user will be accessed together control protocol protection with informative abstract;
(3) back end needs the access control policy of clear this document, and uploads with file;
(4) raw data file is stored in local data base or is uploaded to reliable cloud database.
Further, the packing node received data packet of the data security protecting and sharing method based on block chain includes:
(1) after being packaged the data that node receives back end upload, response message will be returned;
(2) transmitting file on relevant back end will be collected by being packaged node, and record each document source and access control
System strategy, and in chronological order by All Files, it is packaged into a block;
(3) all packing nodes will arrange according to system, upload block in turn and give common recognition node, current round is packaged node
When upload, remaining node will be silent;
(4) block head includes to be packaged node address, timestamp, block cryptographic Hash, file cryptographic Hash.
Further, the common recognition node of the data security protecting and sharing method based on block chain, which is reached common understanding, includes:
(1) according to rule, each round can generate random number by a randomizer, determine in alternative common recognition node
Which node can become the common recognition node of current round, receive block by the common recognition node newly selected;
(2) reached common understanding between common recognition node according to PBFT agreement;
(3) after common recognition node is reached common understanding, to the whole network broadcast results;
(4) block is sent to accounting nodes by common recognition node;
(5) same node cannot continuously become common recognition node.
Further, account book is written in block by the accounting nodes of the data security protecting and sharing method based on block chain
It specifically includes:
(1) accounting nodes receive the block that common recognition node is sent, and are written into account book;
(2) it after accounting nodes complete book keeping operation, will be broadcasted to the whole network.
Further, the configuration access control protocol of the data security protecting and sharing method based on block chain is specifically wrapped
It includes:
(1) accounting nodes are needed according to the access control policy recorded in file, configuration access control strategy, and will be tactful
It is anchored with block;
(2) hidden file information is only exposed block head information by access control policy;
(3) user can according to need update access strategy.
Further, user's acquisition information approach of the data security protecting and sharing method based on block chain includes:
(1) user accesses account book information by client, submits personal identification information to system as needed;
(2) access control policy will audit subscriber identity information, if meet access strategy will allow user check it is specific
File content;If unauthenticated, can not check;
(3) user checks informative abstract, according to the data origin information recorded in account book, application access storage initial data
Database;
(4) user records information according to Correlation block, finds the information of a block, different files is associated
It uses;
(5) user compares file cryptographic Hash, and whether verification file is maliciously tampered.
Another object of the present invention is to provide the data security protecting based on block chain described in a kind of realize and share side
The data security protecting and shared system based on block chain of method, the data security protecting and shared system based on block chain
Include:
Certification authority module, for providing authentication information and key to each participant in system;
Data structures module, for the summary info of initial data and cryptographic Hash packing to be uploaded to block catenary system, text
Summary info contains the previous block coding being associated in part;
Block chain module, for being packaged node for all summary infos and cryptographic Hash that receive in the period according to certain
Order is packaged into block, is sent to common recognition node;
Common recognition node module, for the whole network broadcast common recognition result after reaching common understanding according to improvement PBFT agreement;
Accounting nodes module, for block to be recorded in account book according to common recognition result;
Access-control protocol module, for the requirement according to data structures, by different access-control protocol and block into
Row association;
User is through access-control protocol module, for may have access to account book after authorizing, obtains account book according to quick-searching function
The data summarization and prime information storage location of middle record, user access raw information storing data library, obtain initial data.
Another object of the present invention is to provide the data security protecting based on block chain described in a kind of application and share side
The information data processing terminal of method.
In conclusion advantages of the present invention and good effect are as follows:In file summary info contain be associated it is previous
Block coding, to facilitate subsequent rapid data to retrieve, the data retrieval mechanism improved can greatly improve the efficiency of system.
On the basis of RPBFT common recognition mechanism efficiently can realize common recognition, the attack of prevention greed and the attack of malicious node bifurcated well,
On the basis of guarantee scheme is safe and reliable, the efficiency of system is further increased.Summary info and initial data under chain on system chain
Separation, guarantees the privacy of initial data.The block chain technology used ensure that can not distorting for the information in distributed account book,
File cipher text cryptographic Hash on account book ensure that the complete of file and can not distort that the access strategy on account book realizes file
Safety it is shared, unauthorized user can be blocked in except system.
The present invention can be realized user using block chain technology and share to the safe of file, to ensure raw data file
Storage and shared safety;User realizes upload, the downloading of file in client, and with ciphertext form is stored in file credible
It, only will be in data summarization, cryptographic Hash, association block number write area block chain account book in bad database;User can be simultaneously
File customizes fine-grained access strategy, and it is associated with block chain account book, and user needs during obtaining file
Authentication is carried out, only meets the information content in the available account book of user of access strategy, and further obtain file.
Present invention ensures that the safety of user data, user are easy to use;Traditional public and private key cryptographic technique makes file more
For safety;Block chain technology account book itself can not tamper further ensure the complete available of file, while making user
It can be directed to the different access strategy of different paper formulations, realized while shared file and file is fully controlled;It is real
File encryption upload, fine-grained access control and the file security in system of the user's control based on the system are showed
It is shared.
Detailed description of the invention
Fig. 1 is the data security protecting based on block chain and sharing method flow chart provided in an embodiment of the present invention.
Fig. 2 is the implementation process of the data security protecting based on block chain and sharing method provided in an embodiment of the present invention
Figure.
Fig. 3 is that the embodiment of the present invention provides the data security protecting based on block chain and the system of sharing method realizes signal
Figure.
Fig. 4 is system model figure provided in an embodiment of the present invention.
Fig. 5 is block catenary system illustraton of model provided in an embodiment of the present invention.
Fig. 6 is block chain account book structure chart provided in an embodiment of the present invention.
Fig. 7 is the analogous diagram of data efficiency provided in an embodiment of the present invention.
Fig. 8 is the analogous diagram of network congestion provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
On the basis of guaranteeing that data are complete, secret, available, logarithm factually shows rapid data retrieval and is efficiently the present invention
Altogether know shared to achieve the purpose that, realizes the mining analysis of data, generate value.
Application principle of the invention is explained in detail with reference to the accompanying drawing.
As shown in Figure 1, the data security protecting and sharing method provided in an embodiment of the present invention based on block chain include with
Lower step:
S101: building, management system, provides authentication information and key to each participant in system;
S102: the summary info of initial data and cryptographic Hash packing are uploaded into block catenary system, summary info in file
Contain the previous block coding being associated;
S103: it is packaged node and is packaged into all summary infos received in the period and cryptographic Hash according to a graded
Block is sent to common recognition node;
S104: the whole network broadcast common recognition result after efficiently reaching common understanding according to RPBFT agreement;
S105: block is recorded in account book according to common recognition result;
S106: according to the requirement of data structures, different access-control protocols is associated with block;
S107: user may have access to account book after access-control protocol authorization, is obtained in account book and is remembered using quick-searching function
The data summarization and prime information storage location of record, user access raw information storing data library, obtain initial data.
Application principle of the invention is further described with reference to the accompanying drawing.
As shown in Fig. 2, the data security protecting and sharing method provided in an embodiment of the present invention based on block chain specifically wraps
Include following steps:
(1) certification authority, that is, the promoter of alliance's chain, possess highest system permission, are responsible for building, manage
Reason system.Meanwhile being responsible for providing authentication information and key to each participant in system.
(2) summary info of initial data and cryptographic Hash packing are uploaded to block catenary system by data structures, are plucked in file
Information is wanted to contain the previous block coding being associated, to facilitate later retrieval.Initial data be stored in local data base or
Cloud.
(3) node is packaged in block catenary system by all summary infos and cryptographic Hash that receive in the period according to certain
Order is packaged into block, is sent to common recognition node.
(4) common recognition node broadcasts common recognition result according to the whole network after PBFT agreement is reached common understanding is improved.
(5) block is recorded in account book according to common recognition result for accounting nodes.
(6) access-control protocol can close different access-control protocols with block according to the requirement of data structures
Connection.
(7) user may have access to account book after access-control protocol authorization, is obtained in account book and is recorded according to quick-searching function
Data summarization and prime information storage location, user access raw information storing data library, obtain initial data.
As shown in figure 3, the data security protecting and sharing method provided in an embodiment of the present invention based on block chain include with
Lower step:
(1) it system initialization: in order to realize that system can run well, needs to initialize system in initial phase.
Initialization procedure includes:
A) certification authority, that is, the promoter of alliance's chain, possess highest system permission, are responsible for building, manage
Reason system.Meanwhile being responsible for providing authentication information and key to each participant in system.
B) node for desiring to participate in system needs to apply authentication information and key, and the clear responsibility oneself undertaken.
C) safety certificate issued by certification authority source can be obtained by the node of verifying, includes in this certificate
One unique sequence number and public private key pair, sequence number represent the identity of node, and public private key pair is for signing.In terminal device
When first Connection Time node is initialized, safety certificate can prove the legitimacy of node identities, which will be at
For system interior nodes.
D) node can choose as back end, be packaged the responsibilities such as node, common recognition node, accounting nodes.Node can be with
Undertake wherein one or more responsibilities.
E) certification authority needs to supervise whether every wheel common recognition is normal, and whether random seed can correctly select current round
Common recognition node guarantees that system health is orderly.
(2) data structures upload data
A) arrange according to system, per after a period of time, back end passes through the data that client locally will need to upload
It is handled, extracts summary info, data cryptographic Hash, previous block coding relevant to the user.Summary info contain with
Associated previous block coding, to facilitate user's subsequent rapid data retrieval.By all finish messages at a file, on
It is transmitted to neighbouring packing node.
B) previous block coding relevant to the user will be accessed together control protocol protection with informative abstract.
C) back end needs the access control policy of clear this document, and uploads with file.
D) raw data file is stored in local data base or is uploaded to reliable cloud database.
(3) it is packaged node and receives data
A) after being packaged the data that node receives back end upload, response message will be returned.
B) transmitting file on relevant back end will be collected by being packaged node, and record each document source and access control
Strategy, and in chronological order by All Files, it is packaged into a block.
C) all packing nodes will arrange according to system, upload block in turn and give common recognition node, current round is packaged node
When upload, remaining node will be silent.
D) block head includes to be packaged the information such as node address, timestamp, block cryptographic Hash, file cryptographic Hash.
(4) common recognition node is reached common understanding
A) according to system convention, each round can generate random number by a randomizer, to determine alternative common recognition
Which node can become the common recognition node of current round in node, receive block by the common recognition node newly selected.Certificate Authority
Mechanism supervises the process.
B) reached common understanding between common recognition node according to PBFT agreement.
C) after common recognition node is reached common understanding, to the whole network broadcast results.
D) block is sent to accounting nodes by common recognition node.
It e) is the safety of guarantee system, same node cannot continuously become common recognition node.
(5) account book is written in block by accounting nodes
A) accounting nodes receive the block that common recognition node is sent, and are written into account book.
B) it after accounting nodes complete book keeping operation, will be broadcasted to the whole network.
(6) configuration access control protocol
A) accounting nodes are needed according to the access control policy recorded in file, configuration access control strategy, and will be tactful
It is anchored with block.
B) hidden file information is only exposed block head information by access control policy.To ensure the safety of information and hidden
It is private.Access control policy will be by accounting nodes updating maintenance.
C) user can according to need update access strategy.
(7) user obtains information
A) user accesses account book information by client, submits personal identification information to system as needed.
B) access control policy will audit subscriber identity information, user will be allowed to check specific text if meeting access strategy
Part content.If unauthenticated, can not check.
C) user checks informative abstract, needs further to check initial data, can according to the data recorded in account book come
Source information, further application access stores the database of initial data.
D) user records information according to Correlation block, is quickly found out the information of a block, and different files is carried out
Association uses.
E) user compares file cryptographic Hash, and whether verification file is maliciously tampered.
Application effect of the invention is described in detail below with reference to emulation.
1. simulated conditions
Simulated environment is: association's notebook, configuration is Intel (R) Core (TM) i5-3210M CPU@2.50GHz 4.0G
RAM。
2. emulation content and interpretation of result
Using between the different system of the method for the present invention, the efficiency difference of information retrieval, as a result as shown in fig. 7, in this hair
In bright scheme, the present invention improves the efficiency of information retrieval using association block number mechanism.If a user will retrieve
Specific information directly can find corresponding block according to connection block number record.The number that searching method originally needs to be traversed for
According to block until finding useful data.Although connection block number can bring additional data volume, the tradition relative to data retrieval
Mode, efficiency increase too many.The present invention and other schemes such as Medrecord A Lippman, T Vieira, A Ekblaw, A
Azaria.Et al,“MedRec:Using Blockchain for Medical Data,”Presented at
International Conference on Open&Big Data.[Online]2016.Available:http://
Ieeexplore.ieee.org/document/7573685/ and Medshare Qi Xia, Emmanuel Boateng
Sifah,et al.“MeDShare:Trust-Less Medical Data Sharing via Blockchain,”IEEE
Access,July,2017.Vol.5.DOI.10.1109/ACCESS.2017.2730843..With the increase of the number of visiting people, originally
Invention uses the less time.The result shows that the efficiency of data retrieval greatly improves.
When the negligible amounts of user, the ratio that the effective information of each user accounts for gross information content is higher.Searching originally
Suo Fangfa can also be quickly found out relevant information.However, with the increase of number of users, advantage of the present invention to other methods
It is more and more obvious.Association block number record can directly guide user to find corresponding block.Even if the ratio of effective information compared with
It is low, efficiency will not be caused to constrain.Using between the different system of the method for the present invention, grid blocks difference, as a result such as Fig. 8
It is shown.Suggest adding block to system when being packaged node and issuing, the present invention is changed to alternately upload from the method uploaded in real time.If
It is packaged node selection and uploads real time data, system will undertake very big high load capacity, this may result in data congestion.To avoid this
Kind situation, improves the stability of system.The present invention uses the method successively uploaded by round.Uploading asynchronous data makes system load
Smoothly, system data congestion is helped avoid.Theory analysis and simulation result show that the program is effectively to avoid a large amount of height negative
Lotus may cause data congestion.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of data security protecting and sharing method based on block chain, which is characterized in that the data based on block chain
Safeguard protection and sharing method include: that each participant provides authentication information and key;The abstract of initial data is believed
Breath and cryptographic Hash packing upload to block catenary system;It is packaged all summary infos and cryptographic Hash that node will receive in the period
It is packaged into block according to a graded, is sent to common recognition node;The whole network broadcast common recognition after efficiently reaching common understanding according to RPBFT agreement
As a result;Block is recorded in account book according to common recognition result;Different access-control protocols is associated with block;User's warp
It may have access to account book after access-control protocol authorization, the data summarization and prime information recorded in account book obtained using quick-searching function
Storage location, user access raw information storing data library, obtain initial data.
2. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the initial method of sharing method include:
(1) each participant provides authentication information and key;
(2) node for participating in system needs to apply authentication information and key, and the clear responsibility oneself undertaken;
(3) safety certificate issued by certification authority source can be obtained by the node of verifying;
(4) node is selected to back end, is packaged node, common recognition node, accounting nodes;
(5) certification authority needs to supervise whether every wheel common recognition is normal, and it is total whether random seed can correctly select current round
Know node.
3. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the data structures of sharing method upload data method and include:
(1) per after a period of time, back end locally will need the data uploaded to handle by client, extraction is made a summary
Information, data cryptographic Hash, previous block coding related to user;
(2) previous block coding related to user will be accessed together control protocol protection with informative abstract;
(3) back end needs the access control policy of clear this document, and uploads with file;
(4) raw data file is stored in local data base or is uploaded to reliable cloud database.
4. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the packing node received data packet of sharing method include:
(1) after being packaged the data that node receives back end upload, response message will be returned;
(2) transmitting file on relevant back end will be collected by being packaged node, and record each document source and access control plan
Slightly, and in chronological order by All Files, it is packaged into a block;
(3) all packing nodes will arrange according to system, upload block in turn and give common recognition node, current round is packaged node and uploads
When, remaining node will be silent;
(4) block head includes to be packaged node address, timestamp, block cryptographic Hash, file cryptographic Hash.
5. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the common recognition node of sharing method, which are reached common understanding, includes:
(1) according to rule, each round can generate random number by a randomizer, which is determined in alternative common recognition node
Node can become the common recognition node of current round, receive block by the common recognition node newly selected;
(2) reached common understanding between common recognition node according to PBFT agreement;
(3) after common recognition node is reached common understanding, to the whole network broadcast results;
(4) block is sent to accounting nodes by common recognition node;
(5) same node cannot continuously become common recognition node.
6. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the accounting nodes of sharing method specifically include block write-in account book:
(1) accounting nodes receive the block that common recognition node is sent, and are written into account book;
(2) it after accounting nodes complete book keeping operation, will be broadcasted to the whole network.
7. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the configuration access control protocol of sharing method specifically include:
(1) accounting nodes are needed according to the access control policy recorded in file, configuration access control strategy, and by strategy and area
Block anchoring;
(2) hidden file information is only exposed block head information by access control policy;
(3) user can according to need update access strategy.
8. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on
The data security protecting of block chain and the user of sharing method obtain information approach and include:
(1) user accesses account book information by client, submits personal identification information to system as needed;
(2) access control policy will audit subscriber identity information, user will be allowed to check specific file if meeting access strategy
Content;If unauthenticated, can not check;
(3) user checks informative abstract, according to the data origin information recorded in account book, the number of application access storage initial data
According to library;
(4) user records information according to Correlation block, finds the information of a block, different files, which is associated, to be made
With;
(5) user compares file cryptographic Hash, and whether verification file is maliciously tampered.
9. a kind of number based on block chain of the data security protecting realized based on block chain described in claim 1 and sharing method
According to safeguard protection and shared system, which is characterized in that the data security protecting and shared system based on block chain include:
Certification authority module, for providing authentication information and key to each participant in system;
Data structures module uploads to block catenary system for the summary info of initial data and cryptographic Hash to be packaged, in file
Summary info contains the previous block coding being associated;
Block chain module, for being packaged node for all summary infos received in the period and cryptographic Hash according to a graded
It is packaged into block, is sent to common recognition node;
Common recognition node module, for the whole network broadcast common recognition result after reaching common understanding according to improvement PBFT agreement;
Accounting nodes module, for block to be recorded in account book according to common recognition result;
Access-control protocol module closes different access-control protocols with block for the requirement according to data structures
Connection;
User obtains in account book according to quick-searching function and remembers for may have access to account book after authorizing through access-control protocol module
The data summarization and prime information storage location of record, user access raw information storing data library, obtain initial data.
10. a kind of letter of data security protecting and sharing method using based on block chain described in claim 1~8 any one
Cease data processing terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810628273.9A CN109040012B (en) | 2018-06-19 | 2018-06-19 | Block chain-based data security protection and sharing method and system and application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810628273.9A CN109040012B (en) | 2018-06-19 | 2018-06-19 | Block chain-based data security protection and sharing method and system and application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109040012A true CN109040012A (en) | 2018-12-18 |
CN109040012B CN109040012B (en) | 2021-02-09 |
Family
ID=64609906
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810628273.9A Active CN109040012B (en) | 2018-06-19 | 2018-06-19 | Block chain-based data security protection and sharing method and system and application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040012B (en) |
Cited By (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276765A (en) * | 2017-07-04 | 2017-10-20 | 中国联合网络通信集团有限公司 | The processing method and processing device known together in block chain |
CN109660545A (en) * | 2018-12-27 | 2019-04-19 | 北京新唐思创教育科技有限公司 | A kind of alliance's chain common recognition method and computer storage medium |
CN109684287A (en) * | 2018-12-29 | 2019-04-26 | 厦门链平方科技有限公司 | Gateway information sharing query method and system based on block chain |
CN109743173A (en) * | 2018-12-20 | 2019-05-10 | 弗洛格(武汉)信息科技有限公司 | Go out block node in block chain and determines method, block verification method and block catenary system |
CN109766673A (en) * | 2019-01-18 | 2019-05-17 | 四川大学 | A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method |
CN109819443A (en) * | 2018-12-29 | 2019-05-28 | 东莞见达信息技术有限公司 | Authentication registration method, apparatus and system based on block chain |
CN109815732A (en) * | 2019-01-09 | 2019-05-28 | 北京邮电大学 | A kind of workshop data storage based on alliance's chain and access system, method and device |
CN109871669A (en) * | 2019-03-14 | 2019-06-11 | 哈尔滨工程大学 | A kind of data sharing solution based on block chain technology |
CN109919654A (en) * | 2019-01-23 | 2019-06-21 | 深圳壹账通智能科技有限公司 | Integral monitoring method, device, equipment and storage medium based on block chain |
CN109936620A (en) * | 2019-01-21 | 2019-06-25 | 中国联合网络通信集团有限公司 | Storage method and device, system and storage medium based on block chain |
CN109978571A (en) * | 2019-04-01 | 2019-07-05 | 众安信息技术服务有限公司 | Source tracing method based on block chain and device of tracing to the source |
CN109981772A (en) * | 2019-03-22 | 2019-07-05 | 西安电子科技大学 | A kind of multiple domain data share exchange platform architecture based on block chain |
CN110071802A (en) * | 2019-04-24 | 2019-07-30 | 西安纸贵互联网科技有限公司 | Data processing method and device suitable for block chain |
CN110289963A (en) * | 2019-05-08 | 2019-09-27 | 重庆八戒电子商务有限公司 | Merging under high concurrent is packaged the method that block chain and its verifying is recorded |
CN110336833A (en) * | 2019-07-30 | 2019-10-15 | 中国工商银行股份有限公司 | Image content common recognition method, server based on block chain |
CN110427763A (en) * | 2019-07-24 | 2019-11-08 | 上海朝夕网络技术有限公司 | A kind of common recognition method based on the predefined distributed system for executing code |
CN110581839A (en) * | 2019-07-23 | 2019-12-17 | 中国空间技术研究院 | Content protection method and device |
CN110728577A (en) * | 2019-08-21 | 2020-01-24 | 北京邮电大学 | Centralized hierarchical and continuously-expanded block chain transaction method |
CN110781531A (en) * | 2019-09-04 | 2020-02-11 | 安徽省粮油信息中心(安徽粮食批发交易市场管委会) | Tamper-proof grain depot data secure storage system and method |
CN110795772A (en) * | 2019-11-05 | 2020-02-14 | 重庆道之易科技服务有限公司 | Creative processing method based on block chain |
CN111049658A (en) * | 2019-12-12 | 2020-04-21 | 北京信息科技大学 | DAG-based whole-network unified trust anchor system, establishment method and authentication method |
CN111061695A (en) * | 2019-12-19 | 2020-04-24 | 广东以诺通讯有限公司 | File sharing method and system based on block chain |
CN111092882A (en) * | 2019-12-12 | 2020-05-01 | 中国船舶工业系统工程研究院 | Cross-domain multi-party information secure sharing method based on block chain and IPFS (Internet protocol File System) |
CN111245570A (en) * | 2020-01-14 | 2020-06-05 | 中国科学院软件研究所 | Block chain network covert communication method based on multi-node timestamp collusion |
CN111241092A (en) * | 2019-12-31 | 2020-06-05 | 中国科学院昆明植物研究所 | Block chain based species publishing system and method |
CN111262936A (en) * | 2020-01-16 | 2020-06-09 | 天津大学 | Block chain-based ocean big data sharing method |
CN111274594A (en) * | 2020-01-20 | 2020-06-12 | 上海市大数据中心 | Block chain-based secure big data privacy protection sharing method |
CN111311263A (en) * | 2020-03-18 | 2020-06-19 | 广州知弘科技有限公司 | Local safety accounting method for block chain node |
CN111339206A (en) * | 2020-03-11 | 2020-06-26 | 中国建设银行股份有限公司 | Data sharing method and device based on block chain |
CN111405223A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Video processing method, device and equipment |
CN111416832A (en) * | 2019-01-07 | 2020-07-14 | 珠海金山办公软件有限公司 | File updating method and device, electronic equipment and readable storage medium |
CN111428834A (en) * | 2020-04-21 | 2020-07-17 | 吉林大学 | Orchard spraying information management system and method based on block chain and information fusion |
CN111563130A (en) * | 2020-07-15 | 2020-08-21 | 成都无右区块链科技有限公司 | Data credible data management method and system based on block chain technology |
CN111583393A (en) * | 2020-05-06 | 2020-08-25 | 江苏恒宝智能系统技术有限公司 | Three-dimensional modeling product management method and system based on block chain technology |
CN111682934A (en) * | 2020-04-21 | 2020-09-18 | 国网天津市电力公司电力科学研究院 | Storage, access and sharing method and system for comprehensive energy metering data |
CN111753321A (en) * | 2020-06-29 | 2020-10-09 | 山东大学 | Block chain-based data security sharing method and system |
CN112003704A (en) * | 2020-07-31 | 2020-11-27 | 中科扶云(杭州)科技有限公司 | Electronic evidence processing method and device and computer equipment |
CN112100665A (en) * | 2020-09-23 | 2020-12-18 | 江苏四象软件有限公司 | Data sharing system based on block chain |
CN112163241A (en) * | 2020-09-09 | 2021-01-01 | 法信公证云(厦门)科技有限公司 | Notarization archive information processing method, system, platform, equipment and storage medium |
CN112241435A (en) * | 2020-10-23 | 2021-01-19 | 山西特信环宇信息技术有限公司 | Cone block chain storage system and consensus storage method |
CN112468565A (en) * | 2020-11-19 | 2021-03-09 | 江苏省测绘资料档案馆 | System for managing space data integrity and tracking shared flow based on block chain |
CN112487443A (en) * | 2020-11-11 | 2021-03-12 | 昆明理工大学 | Energy data fine-grained access control method based on block chain |
CN112818365A (en) * | 2021-02-01 | 2021-05-18 | 上海竞动科技有限公司 | User privacy data protection method and system based on block chain |
CN112861180A (en) * | 2020-03-06 | 2021-05-28 | 西南交通大学 | Supply chain information sharing system and method combining block chain and workflow |
CN112966126A (en) * | 2021-02-26 | 2021-06-15 | 南京审计大学 | High-reliability knowledge base construction method capable of inquiring and tracing mass unstructured data content |
CN113438084A (en) * | 2021-06-23 | 2021-09-24 | 国网北京市电力公司 | Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp |
CN113656365A (en) * | 2021-07-28 | 2021-11-16 | 熵链科技(福建)有限公司 | Data sharing method and system based on block chain |
CN114528346A (en) * | 2022-01-27 | 2022-05-24 | 中科大数据研究院 | Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain |
CN114938278A (en) * | 2022-04-11 | 2022-08-23 | 北京邮电大学 | Zero trust access control method and device |
CN115021914A (en) * | 2022-06-14 | 2022-09-06 | 广西师范大学 | Safe and efficient education seniority witness method based on block chain |
CN115801815A (en) * | 2023-02-03 | 2023-03-14 | 安徽中科晶格技术有限公司 | Block chain-based plant growth condition sharing method and device and storage medium |
CN113656365B (en) * | 2021-07-28 | 2024-05-17 | 熵链科技(福建)有限公司 | Block chain-based data sharing method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169125A (en) * | 2017-05-31 | 2017-09-15 | 北京小米移动软件有限公司 | The dispensing statistics acquisition methods and device of multimedia resource |
CN107181599A (en) * | 2017-07-18 | 2017-09-19 | 天津理工大学 | The storage of route location data confidentiality and sharing method based on block chain |
CN107770115A (en) * | 2016-08-15 | 2018-03-06 | 华为技术有限公司 | Distribute the method and system of digital content in a peer-to-peer network |
CN108092982A (en) * | 2017-12-22 | 2018-05-29 | 广东工业大学 | A kind of date storage method and system based on alliance's chain |
-
2018
- 2018-06-19 CN CN201810628273.9A patent/CN109040012B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107770115A (en) * | 2016-08-15 | 2018-03-06 | 华为技术有限公司 | Distribute the method and system of digital content in a peer-to-peer network |
CN107169125A (en) * | 2017-05-31 | 2017-09-15 | 北京小米移动软件有限公司 | The dispensing statistics acquisition methods and device of multimedia resource |
CN107181599A (en) * | 2017-07-18 | 2017-09-19 | 天津理工大学 | The storage of route location data confidentiality and sharing method based on block chain |
CN108092982A (en) * | 2017-12-22 | 2018-05-29 | 广东工业大学 | A kind of date storage method and system based on alliance's chain |
Non-Patent Citations (1)
Title |
---|
薛腾飞 等: "基于区块链的医疗数据共享模型研究", 《自动化学报》 * |
Cited By (76)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276765A (en) * | 2017-07-04 | 2017-10-20 | 中国联合网络通信集团有限公司 | The processing method and processing device known together in block chain |
CN109743173A (en) * | 2018-12-20 | 2019-05-10 | 弗洛格(武汉)信息科技有限公司 | Go out block node in block chain and determines method, block verification method and block catenary system |
CN109743173B (en) * | 2018-12-20 | 2021-07-20 | 弗洛格(武汉)信息科技有限公司 | Block out node determining method in block chain, block verification method and block chain system |
CN109660545A (en) * | 2018-12-27 | 2019-04-19 | 北京新唐思创教育科技有限公司 | A kind of alliance's chain common recognition method and computer storage medium |
CN109660545B (en) * | 2018-12-27 | 2021-04-09 | 北京新唐思创教育科技有限公司 | Alliance chain consensus method and computer storage medium |
CN109684287A (en) * | 2018-12-29 | 2019-04-26 | 厦门链平方科技有限公司 | Gateway information sharing query method and system based on block chain |
CN109819443A (en) * | 2018-12-29 | 2019-05-28 | 东莞见达信息技术有限公司 | Authentication registration method, apparatus and system based on block chain |
CN109819443B (en) * | 2018-12-29 | 2021-09-21 | 东莞见达信息技术有限公司 | Registration authentication method, device and system based on block chain |
CN111405223A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Video processing method, device and equipment |
CN111416832B (en) * | 2019-01-07 | 2023-03-24 | 珠海金山办公软件有限公司 | File updating method and device, electronic equipment and readable storage medium |
CN111416832A (en) * | 2019-01-07 | 2020-07-14 | 珠海金山办公软件有限公司 | File updating method and device, electronic equipment and readable storage medium |
CN109815732B (en) * | 2019-01-09 | 2021-12-28 | 北京邮电大学 | Workshop data storage and access system, method and device based on alliance chain |
CN109815732A (en) * | 2019-01-09 | 2019-05-28 | 北京邮电大学 | A kind of workshop data storage based on alliance's chain and access system, method and device |
CN109766673A (en) * | 2019-01-18 | 2019-05-17 | 四川大学 | A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method |
CN109936620A (en) * | 2019-01-21 | 2019-06-25 | 中国联合网络通信集团有限公司 | Storage method and device, system and storage medium based on block chain |
CN109919654A (en) * | 2019-01-23 | 2019-06-21 | 深圳壹账通智能科技有限公司 | Integral monitoring method, device, equipment and storage medium based on block chain |
CN109871669B (en) * | 2019-03-14 | 2023-02-10 | 哈尔滨工程大学 | Data sharing solution based on block chain technology |
CN109871669A (en) * | 2019-03-14 | 2019-06-11 | 哈尔滨工程大学 | A kind of data sharing solution based on block chain technology |
CN109981772A (en) * | 2019-03-22 | 2019-07-05 | 西安电子科技大学 | A kind of multiple domain data share exchange platform architecture based on block chain |
CN109978571A (en) * | 2019-04-01 | 2019-07-05 | 众安信息技术服务有限公司 | Source tracing method based on block chain and device of tracing to the source |
CN109978571B (en) * | 2019-04-01 | 2024-01-19 | 众安信息技术服务有限公司 | Block chain-based tracing method and tracing device |
CN110071802A (en) * | 2019-04-24 | 2019-07-30 | 西安纸贵互联网科技有限公司 | Data processing method and device suitable for block chain |
CN110289963A (en) * | 2019-05-08 | 2019-09-27 | 重庆八戒电子商务有限公司 | Merging under high concurrent is packaged the method that block chain and its verifying is recorded |
CN110581839A (en) * | 2019-07-23 | 2019-12-17 | 中国空间技术研究院 | Content protection method and device |
CN110581839B (en) * | 2019-07-23 | 2021-12-14 | 中国空间技术研究院 | Content protection method and device |
CN110427763A (en) * | 2019-07-24 | 2019-11-08 | 上海朝夕网络技术有限公司 | A kind of common recognition method based on the predefined distributed system for executing code |
CN110427763B (en) * | 2019-07-24 | 2021-07-23 | 上海朝夕网络技术有限公司 | Consensus method of distributed system based on predefined execution codes |
CN110336833A (en) * | 2019-07-30 | 2019-10-15 | 中国工商银行股份有限公司 | Image content common recognition method, server based on block chain |
CN110728577A (en) * | 2019-08-21 | 2020-01-24 | 北京邮电大学 | Centralized hierarchical and continuously-expanded block chain transaction method |
CN110728577B (en) * | 2019-08-21 | 2022-09-30 | 北京邮电大学 | Centralized block chain transaction method capable of continuously expanding hierarchical layers |
CN110781531A (en) * | 2019-09-04 | 2020-02-11 | 安徽省粮油信息中心(安徽粮食批发交易市场管委会) | Tamper-proof grain depot data secure storage system and method |
CN110781531B (en) * | 2019-09-04 | 2023-04-07 | 安徽省粮油信息中心(安徽粮食批发交易市场管委会) | Tamper-proof grain depot data secure storage system and method |
CN110795772A (en) * | 2019-11-05 | 2020-02-14 | 重庆道之易科技服务有限公司 | Creative processing method based on block chain |
CN111092882A (en) * | 2019-12-12 | 2020-05-01 | 中国船舶工业系统工程研究院 | Cross-domain multi-party information secure sharing method based on block chain and IPFS (Internet protocol File System) |
CN111092882B (en) * | 2019-12-12 | 2021-12-07 | 中国船舶工业系统工程研究院 | Cross-domain multi-party information secure sharing method based on block chain and IPFS (Internet protocol File System) |
CN111049658B (en) * | 2019-12-12 | 2022-09-16 | 北京信息科技大学 | DAG-based whole-network unified trust anchor system and establishment method |
CN111049658A (en) * | 2019-12-12 | 2020-04-21 | 北京信息科技大学 | DAG-based whole-network unified trust anchor system, establishment method and authentication method |
CN111061695A (en) * | 2019-12-19 | 2020-04-24 | 广东以诺通讯有限公司 | File sharing method and system based on block chain |
CN111061695B (en) * | 2019-12-19 | 2023-04-14 | 广东以诺通讯有限公司 | File sharing method and system based on block chain |
CN111241092A (en) * | 2019-12-31 | 2020-06-05 | 中国科学院昆明植物研究所 | Block chain based species publishing system and method |
CN111241092B (en) * | 2019-12-31 | 2023-05-05 | 中国科学院昆明植物研究所 | Species publishing system and method based on blockchain |
CN111245570B (en) * | 2020-01-14 | 2021-06-08 | 中国科学院软件研究所 | Block chain network covert communication method based on multi-node timestamp collusion |
CN111245570A (en) * | 2020-01-14 | 2020-06-05 | 中国科学院软件研究所 | Block chain network covert communication method based on multi-node timestamp collusion |
CN111262936A (en) * | 2020-01-16 | 2020-06-09 | 天津大学 | Block chain-based ocean big data sharing method |
CN111274594A (en) * | 2020-01-20 | 2020-06-12 | 上海市大数据中心 | Block chain-based secure big data privacy protection sharing method |
CN112861180A (en) * | 2020-03-06 | 2021-05-28 | 西南交通大学 | Supply chain information sharing system and method combining block chain and workflow |
CN112861180B (en) * | 2020-03-06 | 2022-07-12 | 西南交通大学 | Supply chain information sharing system and method combining block chain and workflow |
CN111339206A (en) * | 2020-03-11 | 2020-06-26 | 中国建设银行股份有限公司 | Data sharing method and device based on block chain |
CN111339206B (en) * | 2020-03-11 | 2023-07-18 | 建信金融科技有限责任公司 | Block chain-based data sharing method and device |
CN111311263A (en) * | 2020-03-18 | 2020-06-19 | 广州知弘科技有限公司 | Local safety accounting method for block chain node |
CN111682934B (en) * | 2020-04-21 | 2023-08-01 | 国网天津市电力公司电力科学研究院 | Method and system for storing, accessing and sharing comprehensive energy metering data |
CN111428834B (en) * | 2020-04-21 | 2024-03-08 | 吉林大学 | Orchard spraying information management system and method based on blockchain and information fusion |
CN111682934A (en) * | 2020-04-21 | 2020-09-18 | 国网天津市电力公司电力科学研究院 | Storage, access and sharing method and system for comprehensive energy metering data |
CN111428834A (en) * | 2020-04-21 | 2020-07-17 | 吉林大学 | Orchard spraying information management system and method based on block chain and information fusion |
CN111583393A (en) * | 2020-05-06 | 2020-08-25 | 江苏恒宝智能系统技术有限公司 | Three-dimensional modeling product management method and system based on block chain technology |
CN111753321A (en) * | 2020-06-29 | 2020-10-09 | 山东大学 | Block chain-based data security sharing method and system |
CN111563130A (en) * | 2020-07-15 | 2020-08-21 | 成都无右区块链科技有限公司 | Data credible data management method and system based on block chain technology |
CN112003704A (en) * | 2020-07-31 | 2020-11-27 | 中科扶云(杭州)科技有限公司 | Electronic evidence processing method and device and computer equipment |
CN112163241A (en) * | 2020-09-09 | 2021-01-01 | 法信公证云(厦门)科技有限公司 | Notarization archive information processing method, system, platform, equipment and storage medium |
CN112100665A (en) * | 2020-09-23 | 2020-12-18 | 江苏四象软件有限公司 | Data sharing system based on block chain |
CN112241435A (en) * | 2020-10-23 | 2021-01-19 | 山西特信环宇信息技术有限公司 | Cone block chain storage system and consensus storage method |
CN112487443A (en) * | 2020-11-11 | 2021-03-12 | 昆明理工大学 | Energy data fine-grained access control method based on block chain |
CN112468565A (en) * | 2020-11-19 | 2021-03-09 | 江苏省测绘资料档案馆 | System for managing space data integrity and tracking shared flow based on block chain |
CN112818365A (en) * | 2021-02-01 | 2021-05-18 | 上海竞动科技有限公司 | User privacy data protection method and system based on block chain |
CN112818365B (en) * | 2021-02-01 | 2021-07-23 | 上海竞动科技有限公司 | User privacy data protection method and system based on block chain |
CN112966126A (en) * | 2021-02-26 | 2021-06-15 | 南京审计大学 | High-reliability knowledge base construction method capable of inquiring and tracing mass unstructured data content |
CN113438084B (en) * | 2021-06-23 | 2022-11-29 | 国网北京市电力公司 | Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp |
CN113438084A (en) * | 2021-06-23 | 2021-09-24 | 国网北京市电力公司 | Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp |
CN113656365B (en) * | 2021-07-28 | 2024-05-17 | 熵链科技(福建)有限公司 | Block chain-based data sharing method and system |
CN113656365A (en) * | 2021-07-28 | 2021-11-16 | 熵链科技(福建)有限公司 | Data sharing method and system based on block chain |
CN114528346A (en) * | 2022-01-27 | 2022-05-24 | 中科大数据研究院 | Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain |
CN114528346B (en) * | 2022-01-27 | 2023-01-13 | 中科大数据研究院 | Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain |
CN114938278B (en) * | 2022-04-11 | 2023-10-31 | 北京邮电大学 | Zero-trust access control method and device |
CN114938278A (en) * | 2022-04-11 | 2022-08-23 | 北京邮电大学 | Zero trust access control method and device |
CN115021914A (en) * | 2022-06-14 | 2022-09-06 | 广西师范大学 | Safe and efficient education seniority witness method based on block chain |
CN115801815A (en) * | 2023-02-03 | 2023-03-14 | 安徽中科晶格技术有限公司 | Block chain-based plant growth condition sharing method and device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109040012B (en) | 2021-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040012A (en) | A kind of data security protecting and sharing method based on block chain and system and application | |
Liang et al. | PDPChain: A consortium blockchain-based privacy protection scheme for personal data | |
US11212268B2 (en) | Method and system for identity and access management for blockchain interoperability | |
Zhang et al. | Blockchain-based public integrity verification for cloud storage against procrastinating auditors | |
US20220360609A1 (en) | Ephemeral control of a data resource according to a use policy | |
CN107426157B (en) | Alliance chain authority control method based on digital certificate and CA authentication system | |
CN105072180B (en) | A kind of cloud storage data safety sharing method for having permission time control | |
CN109145612B (en) | Block chain-based cloud data sharing method for preventing data tampering and user collusion | |
US20210089676A1 (en) | Methods and systems for secure data exchange | |
CN108462568A (en) | A kind of secure file storage and sharing method based on block chain | |
Wang et al. | Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches | |
Yao et al. | PBCert: Privacy-preserving blockchain-based certificate status validation toward mass storage management | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
CN109962890A (en) | A kind of the authentication service device and node access, user authen method of block chain | |
CN106992988A (en) | A kind of cross-domain anonymous resource sharing platform and its implementation | |
CN109858259A (en) | The data protection of community health service alliance and sharing method based on HyperLedger Fabric | |
CN105450750A (en) | Secure interaction method for intelligent terminal | |
CN107426223A (en) | Cloud file encryption and decryption method, encryption and decryption device and processing system | |
Guo et al. | Using blockchain to control access to cloud data | |
Fotiou et al. | Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials | |
Wang et al. | A role-based access control system using attribute-based encryption | |
CN111414340A (en) | File sharing method and device, computer equipment and storage medium | |
Joseph et al. | Protecting information stored inside the cloud with A new CCA-EBO protocol designed on hive technology | |
CN115643047A (en) | Block chain identity authentication method based on honest rewards | |
Kher et al. | Decentralized authentication mechanisms for object-based storage devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |