CN112511599B - Civil air defense data sharing system and method based on block chain - Google Patents

Civil air defense data sharing system and method based on block chain Download PDF

Info

Publication number
CN112511599B
CN112511599B CN202011245757.9A CN202011245757A CN112511599B CN 112511599 B CN112511599 B CN 112511599B CN 202011245757 A CN202011245757 A CN 202011245757A CN 112511599 B CN112511599 B CN 112511599B
Authority
CN
China
Prior art keywords
data
requester
module
sharing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011245757.9A
Other languages
Chinese (zh)
Other versions
CN112511599A (en
Inventor
唐雪燕
潘京金
刘明
沈燕群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing LES Information Technology Co. Ltd
Original Assignee
Nanjing LES Information Technology Co. Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing LES Information Technology Co. Ltd filed Critical Nanjing LES Information Technology Co. Ltd
Priority to CN202011245757.9A priority Critical patent/CN112511599B/en
Publication of CN112511599A publication Critical patent/CN112511599A/en
Application granted granted Critical
Publication of CN112511599B publication Critical patent/CN112511599B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a civil air defense data sharing system and method based on a block chain, which comprises the following steps: the data receiving module is used for receiving keywords and identity information sent by a data requester and receiving shared data of a data provider; the data processing module is used for standardizing and unifying the shared data sent by the data provider and sending the structured data ciphertext and the keyword index obtained after the standardization and unification processing to the data storage module; the data storage module is used for storing the structured data ciphertext and the keyword index; the identity authentication module is used for carrying out identity authentication on the identity information sent by the data requester; and the data sharing module is used for matching corresponding data in the data storage module according to the identity authentication result and the keywords and sharing the data to the data requester. The invention can prevent the data from being illegally obtained, used and tampered, and realize data sharing and protection of confidential data.

Description

Civil air defense data sharing system and method based on block chain
Technical Field
The invention belongs to the technical field of civil air defense data sharing, and particularly relates to a civil air defense data sharing system and method based on a block chain.
Background
The data sharing has the main function of realizing data sharing between a data owner and a data requester and realizing equivalent exchange between the service value of the data requester and the data owner.
The traditional data sharing method mainly includes two types: the first type is a distributed service bus switching mode, and the second type is a data centralized sharing mode. The two sharing modes mainly adopt a timing and quantitative sharing mode, cannot update in real time through methods such as data modification, uploading and deletion, and cannot meet the requirements of effectively controlling and monitoring data to be used in a specified range and forbidding illegal use. In addition, the traditional sharing mode is to share for sharing, and the relevance of the traditional sharing mode and the business requirement is relatively poor. A traditional data sharing mode adopts a centralized collection mode, and greater risks and hidden dangers exist in data safety management.
There are four main problems in implementing data sharing:
1. the data sensitivity is high, and the existing data sharing platform is not credible, so that users are unwilling to share open data.
2. No related system guarantees exist, so that the data face risks of leakage and the like in the sharing and opening processes, and responsibility definition is difficult to perform after the leakage.
3. And the sharing channel is not smooth, so that the safety, confidentiality and sustainability in the data sharing process are difficult to guarantee.
4. The data availability is low, the data heterogeneity of each level of mechanism unit is strong, and the data structure is complex.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, the present invention provides a system and a method for sharing civil air defense data based on a block chain; the invention can prevent the data from being illegally obtained, used and tampered, and realize data sharing and protection of confidential data.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
the invention relates to a civil air defense data sharing system based on a block chain, which comprises: the system comprises a data receiving module, a data storage module, a data processing module, an identity authentication module and a data sharing module;
the data receiving module is used for receiving the keywords and the identity information sent by the data requester so as to perform data query and data sharing and receiving the shared data of the data provider;
the data processing module is used for standardizing and unifying the shared data sent by the data provider and sending the structured data ciphertext and the keyword index obtained after the standardization and unification processing to the data storage module;
the data storage module is used for storing the structured data ciphertext and the keyword index;
the identity authentication module is used for carrying out identity authentication on the identity information sent by the data requester;
and the data sharing module is used for matching corresponding data in the data storage module according to the identity authentication result and the keywords and sharing the data to the data requester.
Further, the data processing module generates metadata from the data in the form of the table according to the attributes and attribute values of the table; and processing the image data in the image form according to a data set format, extracting key information, and processing the key information into data in an XML format containing the key information.
Further, the data storage module realizes IPFS (internet File System) data storage and block chain data storage.
Further, the data storage module stores data through an IPFS distributed storage mode, returns an encrypted address after encrypting the data, and accesses the encrypted data through the address.
Further, the block chain data storage is a chain structure formed by a plurality of personal defense data blocks in a linear mode, each personal defense data block is composed of a block head and a block body, the block head is stored in a public chain of the block chain, and the block body is stored in a private chain of the block chain.
The public chain is a chain with relatively low information disclosure and authority, and mainly stores metadata of shared civil air defense data.
The private chain is a chain which is open to a specified user and has relatively high authority, and is mainly used for storing shared civil defense data.
The block head includes: the hash value of the previous block, the Merkle root hash value, the timestamp and the random number; wherein the content of the first and second substances,
the hash value of the previous block, namely the parent hash, is connected with the current block to form a chain structure of the storage block;
the Merkle root hash value, namely the hash of the current block, and the overall hash of the current block;
the time stamp identifies the generation time of the current civil air defense block and ensures that the blocks on the chain are arranged in a time linear sequence;
the random number is used to prove that the node successfully built the block.
Further, the block body includes: the Order block hash value, the number of the Order blocks and the digital signature of the generated block nodes are stored, and people's air defense information of a collection is stored in the Order blocks, namely basic data shared by people's air defense mechanisms of all data sharing; the hash value of the Order block is used for verifying the validity of data storage at each time; the digital signature is used for guaranteeing subsequent traceability.
The Order block refers to a block generated by sorting unpacked data sharing transactions, wherein the data sharing transactions already contain signatures.
Data storage: finding a data existing address corresponding to the user according to the address when the user registers, finding the address of the user through the user ID, acquiring a data storage address of the user, and updating the data; the original data in the server is subjected to block chain accounting, each node stores respective complete data, the nodes are not interfered with each other and have equal authority, and the nodes achieve consistency of data storage through mutual periodicity or event-driven consensus.
Further, the data sharing module matches keywords with data in the data storage module according to an authentication result of the identity authentication module, and sends metadata of corresponding data, data belonging units, data acquisition time and data resource directory information to the data requester according to a keyword matching result.
Further, when the identity authentication module confirms that the data requester is the designated user, the data provider sends the shared data and the query result of the keyword to the data storage module, and sends the related information which needs to be verified by the designated user to the data storage module, and when the keyword certificate of the data requester is consistent with the verification information of the data provider, the shared data is sent to the data requester; otherwise, the ciphertext data cannot be obtained;
when the identity authentication module confirms that the data requester is other participants, the data requester only needs to send the key words to the data storage module, and when the key words are matched with the data, the data is returned; and if the matching is inconsistent, returning to null.
The invention discloses a civil air defense data sharing method based on a block chain, which comprises the following steps:
1) Receiving a data sharing request sent by a data requester;
2) Determining the data requester as a designated user or other participants according to the identity information of the data requester in the data sharing request;
3) If the requester is the designated user, the data provider sends the keyword cipher text and the acquired certificate information to the data storage module according to the data sharing request;
4) If the requester is other participants, returning the keyword cipher text to the data requester according to the keywords in the data sharing request;
5) And the data requester acquires the key word ciphertext to realize data sharing.
Further, the step 1) specifically includes: each data requester on the data sharing chain initiates a data sharing request, and carries out pointed or non-pointed query through authority division, wherein the data sharing request comprises a data type, keywords in data and identity information of the data requester.
Further, the step 2) specifically includes: and the data requester performs authentication according to the user name and the password to confirm the user information, and limits the data access authority of the data requester according to the user information.
Further, the step 3) specifically includes: the data provider encrypts data by using a public key of the data requester according to a negotiation result with the data requester (the data requester and the data provider specify data to be shared according to requirements), constructs a key word index structure, generates data acquisition authentication information, sends identity information of the data requester and related information of the requested data to the data storage module, verifies the information and then merges the index structure; before the data are uploaded to the data storage module, the encryption precision is accurate to the encryption content of each piece of data by adopting an asymmetric encryption technology method of an encryption algorithm.
Sending the keyword ciphertext and the data acquisition authentication information certificate to a data storage module, and verifying the acquisition authentication information acquisition certificate of the data requester; if the verification is successful, the key words are decrypted by using the private key of the data requester, data are searched according to the key words, if the verification is successful, the ciphertext set is returned, otherwise, the empty set is returned; if the verification is unsuccessful, the user is judged as an illegal user, continuous access is refused, and alarm information is sent to the data provider.
The data requester uses the intelligent contract to access the service, uses the intelligent contract to complete interaction according to the defined rule, and only returns the service result, thereby ensuring that the data is safer and more open. The intelligent contract is a special protocol and is mainly used for providing, verifying and executing contracts, so that the safety and the privacy of data sharing are ensured under the condition that a third party is not needed.
Further, the step 4) specifically includes: the data requester directly requests shared data from the data storage module, all data providers on the block chain store the sharable data in each block in the data storage module, and the data requester directly obtains data ciphertext from each block according to the requirement.
Further, the step 5) specifically includes: and acquiring a keyword ciphertext, decrypting by using a private key of a data requester to obtain standardized data corresponding to the data, acquiring storage position information of the shared data from the standardized data, and accessing a storage position to acquire the shared data.
The invention has the beneficial effects that:
the invention starts from the three aspects of privacy protection based on the block chain technology, data link-combined and off-link storage and multi-party calculation for forcing the privacy protection to be safe, prevents the data from being illegally obtained, used and tampered, and realizes the data sharing and the protection of the confidential data.
Drawings
FIG. 1 is a schematic block diagram of the system of the present invention.
FIG. 2 is a flow chart of the method of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention.
Referring to fig. 1, a civil air defense data sharing system based on a block chain according to the present invention includes: the system comprises a data receiving module, a data storage module, a data processing module, an identity authentication module and a data sharing module;
the data receiving module is used for receiving keywords and identity information sent by a data requester so as to perform data query and data sharing and receiving shared data of a data provider;
the data processing module is used for standardizing and unifying the shared data sent by the data provider and sending the structured data ciphertext and the keyword index obtained after the standardization and unification processing to the data storage module;
the data storage module is used for storing the structured data ciphertext and the keyword index;
the identity authentication module is used for carrying out identity authentication on the identity information sent by the data requester;
and the data sharing module is used for matching corresponding data in the data storage module according to the identity authentication result and the keywords and sharing the data to the data requester.
The data processing module generates metadata from the data in the form of the table according to the attributes and attribute values of the table; and processing the image data in the image form according to a data set format, extracting key information, and processing the key information into data in an XML format containing the key information.
Taking civil air defense data as an example, the data processing module mainly generates three types of metadata, namely civil air defense technology metadata, civil air defense service metadata and civil air defense management metadata. The data processing module of the civil air defense technology metadata generates description information according to the civil air defense data structure and the incidence relation between each main table and each sub table; according to the civil air defense service metadata, the data processing module divides civil air defense service data into five categories, organizes commands, personnel protection, key targets, professional strength and support guarantee, and generates description information about the five categories of service data, including information such as corresponding tables and acquisition time; and the data processing module generates description information of all users, roles and authority information in the data sharing system according to the civil air defense management metadata.
The data storage module realizes IPFS (inter platform File System) data storage and block chain data storage.
The data storage module stores data through an IPFS distributed storage mode, returns an encrypted address after encrypting the data, and accesses the encrypted data through the address. Further, the block chain data storage is a chain structure formed by a plurality of personal defense data blocks in a linear mode, each personal defense data block is composed of a block head and a block body, the block head is stored in a public chain of the block chain, and the block body is stored in a private chain of the block chain.
The public chain is a chain with relatively low information disclosure and authority, and mainly stores metadata of shared civil air defense data.
The private chain is a chain which is open to a specified user and has relatively high authority, and is mainly used for storing shared civil defense data.
The block head includes: the hash value of the previous block, the Merkle root hash value, the timestamp and the random number; wherein, the first and the second end of the pipe are connected with each other,
the hash value of the previous block, namely the parent hash, is connected with the current block to form a chain structure of the storage block;
the Merkle root hash value, namely the hash of the current block, and the integral hash of the current block;
the time stamp identifies the generation time of the current civil air defense block and ensures that blocks on the chain are arranged in a time linear sequence;
the random number is used to prove that the node successfully built the block.
The block body includes: the Order block hash value, the number of the Order blocks and the digital signature of the generated block nodes are stored, and people's air defense information of a collection is stored in the Order blocks, namely basic data shared by people's air defense mechanisms of all data sharing; the hash value of the Order block is used for verifying the validity of data storage at each time; the digital signature is used for guaranteeing subsequent traceability.
The Order block refers to a data sharing transaction which already contains a signature, and the Order block is generated by sequencing unpacked data sharing transactions.
Data storage: finding a data existing address corresponding to the user according to the address when the user registers, finding the address of the user through the user ID, acquiring a data storage address of the user, and updating the data; the original data in the server is subjected to block chain accounting, each node stores respective complete data, the nodes are not interfered with each other and have equal authority, and the nodes achieve consistency of data storage through mutual periodicity or event-driven consensus.
The data sharing module matches the keywords with the data in the data storage module according to the authentication result of the identity authentication module, and then sends the metadata of the corresponding data, the unit of the data, the data acquisition time and the data resource directory information to the data requester according to the keyword matching result.
When the identity authentication module confirms that the data requester is the designated user, the data provider sends shared data and a keyword query result to the data storage module and sends related information needing to be verified by the designated user to the data storage module together, and when a keyword certificate of the data requester is consistent with verification information of the data provider, the shared data is sent to the data requester; otherwise, the ciphertext data cannot be obtained;
when the identity authentication module confirms that the data requester is other participants, the data requester only needs to send the key words to the data storage module, and when the key words are matched with the data, the data is returned; and returning to null when the matching is not consistent.
Referring to fig. 2, the civil air defense data sharing method based on the block chain according to the present invention, based on the above system, includes the following steps:
1) Receiving a data sharing request sent by a data requester;
each data requester on the data sharing chain initiates a data sharing request, and performs pointed or non-pointed query through permission division, wherein the data sharing request comprises a data type, keywords in data and identity information of the data requester.
2) Determining the data requester as a designated user or other participants according to the identity information of the data requester in the data sharing request;
and the data requester performs authentication according to the user name and the password to confirm the user information, and limits the data access authority of the data requester according to the user information.
3) If the data requester is the designated user, the data provider sends the keyword cipher text and the acquired certificate information to the data storage module according to the data sharing request;
the data provider encrypts data by using a public key of the data requester according to a negotiation result with the data requester (the data requester and the data provider specify data to be shared according to requirements), constructs a key word index structure, generates data acquisition authentication information, sends identity information of the data requester and related information of the requested data to the data storage module, verifies the information, and merges the index structure; before the data are uploaded to the data storage module, the encryption precision is accurate to the encryption content of each piece of data by adopting an asymmetric encryption technology method of an encryption algorithm.
Sending the keyword ciphertext and the data acquisition authentication information certificate to a data storage module, and verifying the acquisition authentication information acquisition certificate of the data requester; if the verification is successful, the key words are decrypted by using the private key of the data requester, data are searched according to the key words, if the verification is successful, the ciphertext set is returned, otherwise, the empty set is returned; if the verification is unsuccessful, the user is judged as an illegal user, continuous access is refused, and alarm information is sent to the data provider.
The data requester uses the intelligent contract to access the service, uses the intelligent contract to complete interaction according to the defined rule, and only returns the service result, thereby ensuring that the data is safer and more open. The intelligent contract is a special protocol and is mainly used for providing, verifying and executing contracts, so that the safety and the privacy of data sharing are ensured without a third party.
4) If the data requester is other participants, returning the keyword cipher text to the data requester according to the keywords in the data sharing request;
the data requester directly requests shared data from the data storage module, all data providers on the block chain store the sharable data in each block in the data storage module, and the data requester directly obtains data ciphertext from each block according to the requirement.
5) And the data requester acquires the keyword cipher text to realize data sharing.
And acquiring a keyword ciphertext, decrypting by using a private key of a data requester to obtain standardized data corresponding to the data, acquiring storage position information of the shared data from the standardized data, and accessing a storage position to acquire the shared data.
While the invention has been described in terms of its preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.

Claims (10)

1. A people's air defense data sharing system based on a block chain is characterized by comprising: the system comprises a data receiving module, a data storage module, a data processing module, an identity authentication module and a data sharing module;
the data receiving module is used for receiving keywords and identity information sent by a data requester so as to perform data query and data sharing and receiving shared data of a data provider;
the data processing module is used for standardizing and unifying the shared data sent by the data provider and sending the structured data ciphertext and the keyword index obtained after processing to the data storage module;
the data storage module is used for storing the structured data ciphertext and the keyword index;
the identity authentication module is used for carrying out identity authentication on the identity information sent by the data requester;
the data sharing module is used for matching corresponding data in the data storage module according to the identity authentication result and the keywords and sharing the data to the data requester;
data storage: finding a data storage address corresponding to the user according to the address of the user during registration, finding the registration address of the user through the user ID, acquiring the data storage address of the user, and updating data; performing block chain accounting on original data in a server, wherein each node stores respective complete data, the nodes are mutually noninterfere and have equal authority, and the nodes achieve consistency of data storage through mutual periodicity or event-driven consensus;
when the identity authentication module confirms that the data requester is the designated user, the data provider sends shared data and a keyword query result to the data storage module and sends related information needing to be verified by the designated user to the data storage module together, and when a keyword certificate of the data requester is consistent with verification information of the data provider, the shared data is sent to the data requester; otherwise, ciphertext data cannot be obtained;
when the identity authentication module confirms that the data requester is other participants, the data requester only needs to send the key words to the data storage module, and when the key words are matched with the data, the data is returned; and returning to null when the matching is not consistent.
2. The civil air defense data sharing system based on the block chain as claimed in claim 1, wherein the data processing module generates metadata from the data in a table form according to the attributes of the table and the attribute values thereof; and processing the image data in the image form according to a data set format, extracting key information, and processing the key information into data in an XML format containing the key information.
3. The blockchain-based people air defense data sharing system of claim 1, wherein the data storage module implements IPFS data storage and blockchain data storage.
4. The system according to claim 3, wherein the data storage module stores data in an IPFS distributed storage mode, encrypts the data, returns an encrypted address, and accesses the encrypted data through the address.
5. The system according to claim 3, wherein the blockchain data storage is composed of a plurality of personal defense data blocks in a linear manner to form a chain structure, the personal defense data blocks are composed of block headers and block bodies, the block headers are stored in a public chain of the blockchain, and the block bodies are stored in a private chain of the blockchain.
6. The civil air defense data sharing system based on the block chain as claimed in claim 1, wherein the data sharing module matches the keywords with the data in the data storage module according to the authentication result of the identity authentication module, and then sends the metadata of the corresponding data, the data belonging units, the data acquisition time and the data resource directory information to the data requester according to the result of the keyword matching.
7. A civil air defense data sharing method based on a block chain is based on the system of any one of claims 1 to 6, and is characterized by comprising the following steps:
1) Receiving a data sharing request sent by a data requester;
2) Determining the data requester as a designated user or other participants according to the identity information of the data requester in the data sharing request;
3) If the requester is the designated user, the data provider sends the keyword cipher text and the acquired credential information to the data storage module according to the data sharing request;
4) If the requester is other participants, returning the keyword cipher text to the data requester according to the keywords in the data sharing request;
5) And the data requester acquires the keyword cipher text to realize data sharing.
8. The people's air defense data sharing method based on the block chain according to claim 7, wherein the step 1) specifically comprises: each data requester on the data sharing chain initiates a data sharing request, and performs pointed or non-pointed query through permission division, wherein the data sharing request comprises a data type, keywords in data and identity information of the data requester.
9. The people's air defense data sharing method based on the block chain according to claim 7, wherein the step 3) specifically comprises: the data provider encrypts data by using a public key of the data requester according to a negotiation result with the data requester, constructs a key word index structure, generates data acquisition authentication information, sends identity information of the data requester and related information of the requested data to the data storage module, verifies the information and then merges the index structure.
10. The people's air defense data sharing method based on the block chain according to claim 7, wherein the step 5) specifically comprises: and acquiring a keyword ciphertext, decrypting by using a private key of a data requester to obtain standardized data corresponding to the data, acquiring storage position information of the shared data from the standardized data, and accessing a storage position to acquire the shared data.
CN202011245757.9A 2020-11-10 2020-11-10 Civil air defense data sharing system and method based on block chain Active CN112511599B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011245757.9A CN112511599B (en) 2020-11-10 2020-11-10 Civil air defense data sharing system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011245757.9A CN112511599B (en) 2020-11-10 2020-11-10 Civil air defense data sharing system and method based on block chain

Publications (2)

Publication Number Publication Date
CN112511599A CN112511599A (en) 2021-03-16
CN112511599B true CN112511599B (en) 2023-03-24

Family

ID=74957083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011245757.9A Active CN112511599B (en) 2020-11-10 2020-11-10 Civil air defense data sharing system and method based on block chain

Country Status (1)

Country Link
CN (1) CN112511599B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732467A (en) * 2021-03-30 2021-04-30 北京浩瀚深度信息技术股份有限公司 Large-scale data sharing method and device and storage medium
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract
CN113297625B (en) * 2021-07-23 2021-11-02 北京笔新互联网科技有限公司 Data sharing system and method based on block chain and electronic equipment
CN115208656B (en) * 2022-07-12 2023-07-25 浪潮工创(山东)供应链科技有限公司 Supply chain data sharing method and system based on blockchain and authority management
CN115767515B (en) * 2022-10-28 2023-07-14 广州声博士声学技术有限公司 Encryption sharing method and system for base station-free real-time noise big data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101893729B1 (en) * 2018-03-28 2018-10-04 주식회사 마크로젠 Data sharing method based on multiple block-chains
CN108449359A (en) * 2018-04-16 2018-08-24 济南浪潮高新科技投资发展有限公司 A kind of electronic health record sharing method and system based on block chain
CN111343001B (en) * 2020-02-07 2022-04-12 复旦大学 Social data sharing system based on block chain
CN111835500B (en) * 2020-07-08 2022-07-26 浙江工商大学 Searchable encryption data secure sharing method based on homomorphic encryption and block chain

Also Published As

Publication number Publication date
CN112511599A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN112511599B (en) Civil air defense data sharing system and method based on block chain
US11438383B2 (en) Controlling permissible actions a computing device can perform on a data resource based on a use policy evaluating an authorized context of the device
US10396992B2 (en) Authentication of a user and/or a device through parallel synchronous update of immutable hash histories
US10356094B2 (en) Uniqueness and auditing of a data resource through an immutable record of transactions in a hash history
US9558228B2 (en) Client computer for querying a database stored on a server via a network
Guo et al. Towards public verifiable and forward-privacy encrypted search by using blockchain
US8832047B2 (en) Distributed document version control
Reen et al. Decentralized patient centric e-health record management system using blockchain and IPFS
CN106254324A (en) A kind of encryption method storing file and device
KR100839220B1 (en) Method for searching encrypted database and System thereof
US11343101B2 (en) Authentication through verification of an evolving identity credential
CN112417511B (en) Method for analyzing data authority control based on Handle identification
CN107612910A (en) A kind of distributed document data access method and system
CN112861157A (en) Data sharing method based on decentralized identity and proxy re-encryption
CN111540449A (en) Electronic medical record sharing method based on block chain, electronic medical record interface and system
CN114579998A (en) Block chain assisted medical big data search mechanism and privacy protection method
CN114547209B (en) Data sharing interaction method and system based on block chain
Chen et al. Bpvse: Publicly verifiable searchable encryption for cloud-assisted electronic health records
CN116383867A (en) Data query method, device, electronic equipment and computer readable medium
CN108170753A (en) A kind of method of Key-Value data base encryptions and Safety query in shared cloud
CN115514523A (en) Data security access system, method, device and medium based on zero trust system
Brandao Cloud computing security
CN114978664A (en) Data sharing method and device and electronic equipment
Maragathavalli et al. Cloud data security model using modified decoy technique in fog computing for E-healthcare
Zhao et al. Feasibility study on security deduplication of medical cloud privacy data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant