CN112597544A - Block chain-based industrial internet data security management system and method - Google Patents

Block chain-based industrial internet data security management system and method Download PDF

Info

Publication number
CN112597544A
CN112597544A CN202011557236.7A CN202011557236A CN112597544A CN 112597544 A CN112597544 A CN 112597544A CN 202011557236 A CN202011557236 A CN 202011557236A CN 112597544 A CN112597544 A CN 112597544A
Authority
CN
China
Prior art keywords
data
user
authority
dmm
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011557236.7A
Other languages
Chinese (zh)
Inventor
霍如
高宁捷
陈伟
王志浩
汪硕
黄韬
刘韵洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN202011557236.7A priority Critical patent/CN112597544A/en
Publication of CN112597544A publication Critical patent/CN112597544A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention relates to an industrial internet data security management system and method based on a block chain, and provides a data security management mechanism and system based on a block chain technology in an industrial internet environment, aiming at the problem that the existing data security management mechanism cannot well meet the requirements of security, management and performance in an industrial internet application scene, wherein the block chain is used as a trusted third party to realize the work of safe transmission, authentication, source tracing and the like of industrial data. Specifically, the invention adopts a license chain as a bottom system, and defines the storage format of data and the access control scheme of users at all levels on the basis, including the authority definition and change scheme, and the corresponding execution flow of off-chain data verification and on-chain data hierarchical access. The invention is composed of two parts: and designing a functional module of the industrial data safety management system based on the block chain and running the system.

Description

Block chain-based industrial internet data security management system and method
Technical Field
The invention belongs to the technical field of network security, and particularly relates to an industrial internet data security management system and method based on a block chain.
Background
In the conventional internet, common data security mechanisms include a method of encrypting data using various encryption algorithms and then transmitting the encrypted data, a method of limiting a visible range of the data by access right hierarchy, and the like. For a data encryption transmission mechanism, data is encrypted mainly through common data encryption algorithms such as an MD5 algorithm, an SHA1 algorithm and the like, and is decrypted after transmission is completed, so that safe transmission is realized; for an access authority grading mechanism, user authority is mainly distributed and judged through a grouping management-control process, and grading safe access of data is achieved.
The industrial internet is an industry and application ecology formed by the omnibearing deep integration of the internet, a new generation information technology and an industrial system, and is a key comprehensive information infrastructure for industrial intelligent development. The industrial internet is used as a key comprehensive information infrastructure for industrial intelligent development, is an important carrier for digitalization, networking and intellectualization of the manufacturing industry, is oriented to the digitalization, networking and intellectualization requirements of the manufacturing industry, constructs a service system based on mass data acquisition, aggregation and analysis, and is an important foundation for the construction of the strong country of China and the strong network country. The industrial internet relates to various support technologies, including industrial PON, industrial sensing and control, big data, cloud computing, and the like. These technologies cover different aspects of industrial processes, such as analysis, storage, sensing, connectivity, automation, Human Machine Interaction (HMI) and manufacturing. Although the industrial internet has achieved certain development results in theory and practice, many challenges still exist, and the most urgent one is to solve the security problem in the industrial data circulation process. Since most of the devices in the factory network only have simple data interaction capability and are difficult to implement data encryption transmission function required by a common data security mechanism, the security problem in the industrial data circulation process is difficult to solve by using a traditional method, and the block chain technology is widely used as an emerging data security technology to solve the problem.
A blockchain is in fact a distributed computing and storage system that is stored between multiple participants in a peer-to-peer network, and the participants can add new transactions to an existing transaction chain using encrypted signatures, forming a secure, continuous, invariant chained data structure. The block chain has the characteristics of tamper resistance, decentralization, multi-party participation and the like, and can effectively reduce trust cost generated by a centralization structure.
Currently, a common block chain data circulation security mechanism in the industrial field includes a dynamic data tracing method, a data sharing method, an access control method and the like based on a alliance chain. The principle of the dynamic data tracing method based on the alliance chain is that a multi-dimensional DAG graph is constructed and a dynamic data security model is established, wherein the multi-dimensional DAG graph determines the multi-dimensional authorization condition of a parent node and a child node according to the node in-degree and out-degree, a directed edge represents an evolution track under the dynamic data execution operation, an entity authorization relation is generated according to the dynamic data, the entity authorization relation and a key pair used for the entity to authorize and verify the dynamic data, the entity authorization relation is generated according to the boundary condition that each node achieves consensus, the multi-dimensional authorization chain between the entities is established and issued as a transaction to an authorization relation alliance chain network to be stored in a block chain form, and therefore trace and source tracing of the dynamic data operation of the Internet of things are achieved. It should be noted that, at present, a data security management mechanism completely adapted to an industrial internet scenario is not available, and a similar data tracing mechanism based on a DAG graph is mainly applied to the field of internet of things and cannot completely adapt to the requirements of the field of industrial internet.
The block chain technology is introduced in the field of industrial internet, so that the problems of data security and data concentration in the data circulation process of the industrial internet are solved, and the problems of data security circulation in new scenes and new applications emerging in the development process of the industrial internet such as commodity tracing, intelligent logistics and the like are realized through an intelligent contract, but under the background of the industrial internet, the block chain technology still has the following defects:
1. the existing data security scheme is multi-sided to the security protection of the data on the chain, and the security protection of the data off the chain is not enough. For a general data security management mechanism, the key point of management is to manage and control data on a chain, for example, a data management traceability technology implemented based on a DAG graph, the key point of the management is to create a multidimensional authorization chain between entities in a network and issue the multidimensional authorization chain as a transaction to an authorization relationship network, so as to implement operation trace and traceability of data on a link of an internet of things, and to prevent an attacker from performing operations such as tampering and illegal access on dynamic data of the internet of things, and not to relate to management and security protection of data under the chain.
2. The existing data security protection scheme is based on a static execution strategy and cannot cope with the situation of dynamic change. For a mainstream data security management mechanism, a static data access and modification policy is mostly based, that is, a user defines each authority of the user when joining a system, determines the authority previously entered by the user when the user performs each operation, and opens a corresponding authority to the user. However, for the field of industrial internet, there are behaviors such as information interaction, sharing, transaction and the like often among organizations and users, the authority of a user on certain data needs to be changed in real time, and a static execution strategy cannot meet the requirement.
3. The safety and the operation performance of the existing data safety protection scheme are difficult to meet the use requirement of an industrial internet system. For a data security mechanism adopting a DAG graph, the operation performance is high, and the concurrency is good, but the security and the consistency have some problems in terms of data structures; the trusted distributed data security method adopting the P2P technology has some problems in operation performance, and cannot simultaneously meet the use requirements of industrial internet security and operation performance.
In view of the above, there is a need to develop an industrial data security management mechanism that can meet the security, management and performance requirements of the industrial internet system.
Disclosure of Invention
The invention provides a data security management mechanism and a system based on a block chain technology under an industrial internet environment, aiming at the problem that the existing data security management mechanism can not well meet the requirements of security, management and performance under the industrial internet application scene, wherein the block chain is used as a trusted third party to realize the work of safe transmission, authentication, traceability and the like of industrial data. Specifically, the invention adopts a license chain as a bottom system, and defines the storage format of data and the access control scheme of users at all levels on the basis, including the authority definition and change scheme, and the corresponding execution flow of off-chain data verification and on-chain data hierarchical access. The system consists of two parts: and designing a functional module of the industrial data safety management system based on the block chain and running the system.
The invention mainly considers how to further ensure the security of the data of the blockchain network and dynamically updates the data access and verification strategy under the condition of solving the data security problem by applying the blockchain network in the industrial Internet system, thereby realizing the data security circulation of the industrial Internet system. Based on the block chain technology, the invention designs a reasonable data security management system, which can prevent data tampering, ensure data security, realize operation traceability and the like. The invention considers the requirement of data security condition under industrial internet scene, and the specific scheme is as follows:
an industrial internet data security management system based on a block chain comprises five functional modules: the system comprises a user adding module, a data management and control module, a data management module and a data verification subsystem;
the user adding module UJM is responsible for inputting user characteristic information and data operation authority in the whole system, and sending the user characteristic information and the initial data operation authority of the user to the data management and control module; the user has different authorities for different data, and the authority of the user is dynamically changed and is used for realizing access control;
the data management and control module DMM is responsible for receiving the characteristic information and the initial data operation authority of the user and recording the characteristic information and the initial data operation authority into the block chain; the system is responsible for storing all the on-chain data, including the characteristic information of the user, the data operation authority, the hash corresponding to the off-chain data storage address, the hash value corresponding to the off-chain data abstract and the industrial data to be stored on the chain; interacting with the control module and returning various query requests of the control module;
the control module CM is responsible for analyzing and verifying the requests sent by the data management and control module, the data verification module and the data management module and forwarding the requests to the corresponding modules;
the data management module DCM is responsible for executing operations on the data on the chain, including registration, updating, deletion and query;
the data verification subsystem DVM is responsible for verifying the data on the off-link or on-link, and confirming whether the data is tampered and when the data is tampered; the system divides data into two parts, the off-link data only stores the hash corresponding to the off-link data storage address and the hash value corresponding to the off-link data abstract on the link, the data body is not stored on the block link, and when the data is verified, whether the data is falsified can be verified only by verifying whether the corresponding hash values are consistent, so that data tracing is realized.
A block chain-based industrial Internet data security management method comprises a user authority writing-in process, an off-chain data verification process, a data registration process, a data query process, a data modification process, a data deletion process and a user authority changing process;
the user permission writing process means that a user joining module needs to write user characteristic information and user permission into a system for ensuring the privacy and safety of data;
the off-link data verification process includes storing a hash value corresponding to an off-link data storage address and a hash value corresponding to an off-link data abstract into a block chain, and comparing and verifying real-time data and stored data during subsequent verification to prevent the off-link data from being attacked maliciously;
the data registration process refers to that the authority of a user needs to be verified during data registration, and corresponding data is written in when the authority is allowed;
the data query process refers to the process of verifying the authority of a user when data is queried, and querying corresponding data when the authority is allowed;
the data modification process is characterized in that the authority of a user needs to be verified when data is modified, and corresponding data can be modified when the authority is allowed:
the data deleting process refers to that the authority of a user needs to be verified when the data is deleted, and the corresponding data can be deleted when the permission is allowed;
under the user permission changing process, the data deletion needs to verify the permission of the user, and the corresponding data can be deleted when the permission is allowed:
advantageous effects
The invention provides an industrial internet data security management mechanism and system based on a block chain according to an application scene of industrial internet system data circulation. The data tracing and access control are combined, the abstract and the hash value corresponding to the industrial data are stored by using a block chain, and when a user calls the data, the data are compared with the hash value stored on the chain, whether the data are falsified is identified, and the data tracing is realized; defining the authority classification mechanism of the user in the system, wherein the user has different authorities for different data and can dynamically change the authorities to realize access control. The two mechanisms are integrated to realize the safety management of the industrial data, so that the safety requirement, the management requirement and the performance requirement of the data circulation of the industrial internet system are met.
The invention provides a block chain-based industrial internet data security management system module design. The functions of block chain storage, data management, data verification and the like are separated, corresponding functions are realized through different modules, and then the control module is used for interacting and analyzing with the corresponding functions, so that all functions of the system are realized.
Drawings
FIG. 1 is a block chain-based industrial data security management system functional module design and interaction diagram;
FIG. 2 illustrates a user rights write process;
FIG. 3 off-link data validation flow;
FIG. 4 data registration flow
FIG. 5 data query flow
FIG. 6 data modification flow
FIG. 7 data deletion flow
FIG. 8 user rights change flow
Detailed Description
1. Block chain-based industrial internet data security management system functional module design
As shown in fig. 1, the industrial data security management system designed by the present invention includes five functional modules, which are used to ensure the secure circulation and operation tracing of data in the industrial internet, implement the functions of authorization management, trust endorsement, accounting storage, etc. of users through a permission chain, and implement the storage, verification and analysis of data on the off-chain and on-chain through each functional module. The user joining module is responsible for inputting the characteristic information and the data operation authority of the user in the whole system. The data management and control module is responsible for storing various data, including a hash corresponding to the off-link data storage address, a hash corresponding to the off-link data abstract, operation permissions corresponding to the data and the like. The control module is responsible for analyzing and verifying the requests sent by the data management and control module, the data verification module and the data management module, and forwarding the requests to the corresponding modules. The data management module is responsible for performing operations such as registration, updating, deletion, query and the like on the data on the chain, and the data verification subsystem is responsible for verifying the data on the chain and the off-chain and confirming whether the data is tampered and when the data is tampered.
Specifically, a User Join Module (User Join Module, UJM) sends User feature information and an initial Data operation authority of a User to a Data Management Module (DMM), and the Data Management Module is responsible for receiving the User feature information and the initial Data operation authority and recording the User feature information and the initial Data operation authority into a block chain. The data management and Control Module stores all on-chain data, including user information, corresponding authority, off-chain data storage address and corresponding hash, hash value corresponding to off-chain data abstract, and on-chain data, interacts with a Control Module (CM), and returns various query requests of the Control Module. The control module is responsible for interfacing with other modules, such as receiving a query request of the data verification module and returning a corresponding result. And the Data Verification Module (DVM) is responsible for verifying Data on an off-link or on-link, sending the hash of the current Data storage address and the hash of the product information, comparing and verifying the hash value stored on the link by the control Module, and returning the Verification result of the Data Verification subsystem. The Data Control Module (DCM) is responsible for performing operations such as registration, modification, deletion and the like on the linked Data, and interacts with the Control subsystem to obtain confirmation information of successful operation.
The original blockchain system has certain limits in performance and the amount of data that can be stored is limited. For example, the Bitstone network, with a block size of only 1MB and only up to 2000 transactions, can greatly limit the industrial data chaining. The system divides data into two parts, off-chain data only stores corresponding hash values on a chain, and data bodies are not stored on a block chain. When the data is verified, whether the data is falsified can be verified only by verifying whether the corresponding hash values are consistent.
2. System operation flow
The invention designs a system operation process based on the system functional module, which comprises a user authority writing process, an off-link data verification process, a data registration process, a data query process, a data modification process, a data deletion process and a user authority changing process.
2.1 user Authority write-in procedure
Under the framework of the invention, the user joining module needs to write the user characteristic information and the user authority into the system for ensuring the privacy and the security of data, and the flow is shown in fig. 2.
(1) And the user fills in basic information according to the condition of the user and uploads a qualification file related to the authority.
(2) UJM collects user information and qualification files, generates information + authority command, and sends it to DMM
(3) And after the DMM successfully records the block chain network, returning a write success message, and if the DMM fails, returning a failure message.
2.2 off-chain data verification procedure
Under the framework of the invention, the off-link data stores the hash value of the off-link data in the system, and the real-time data and the stored data can be compared and verified during subsequent verification, so that the off-link data is prevented from being maliciously attacked. The specific flow is shown in fig. 3.
(1) The DVM sends the data name to be verified + the hash value of the data storage address + the hash value of the data digest to the CM.
(2) CM sends query request containing data name to DMM
(3) The DMM retrieves and returns the hash value of the address hash + digest stored on the chain according to the data name.
(4) And the CM compares the hash values, returns a success instruction if the hash values are consistent with the hash values, and returns an error value if the hash values are not consistent with the success instruction.
2.3 data registration flow
Under the architecture of the present invention, data registration requires verification of the user's authority, and corresponding data can be written when permitted, and a specific flow is shown in fig. 4.
(1) The DCM sends the data name to be registered, the hash value of the data storage address and the hash value of the data abstract to the CM.
(2) And the CM inquires the user authority and then sends the user authority to the DMM.
(3) And returning success after the DMM successfully writes, and returning an error command if the DMM fails.
(4) The CM forwards the command to the DCM.
2.4 data query procedure
Under the architecture of the present invention, data query requires to verify the authority of the user, and if allowed, the corresponding data can be queried, and the specific flow is shown in fig. 5.
(1) The DCM sends the name of the data to be queried to the CM.
(2) And the CM inquires the user authority and then sends the user authority to the DMM.
(3) And after the DMM queries, returning the data name, the data storage address/the hash value and the hash value of the data abstract to the CM.
(4) The CM forwards the result to the DCM.
2.5 data modification flow
Under the architecture of the present invention, the data modification requires the verification of the user's authority, and the corresponding data can be modified if permitted, and the specific flow is shown in fig. 6.
(1) The DCM sends the data name to be modified, the hash value of the data storage address and the hash value of the data abstract to the CM.
(2) And the CM inquires the user authority and then sends the user authority to the DMM.
(3) And returning success after the DMM is successfully modified, and returning an error command if the DMM fails.
(4) The CM forwards the command to the DCM.
2.6 data deletion flow
Under the architecture of the present invention, data deletion requires verification of the user's right, and when permitted, the corresponding data can be deleted, and the specific flow is shown in fig. 7.
(1) The DCM sends the data name to be deleted to the CM.
(2) And the CM inquires the user authority and then sends the user authority to the DMM.
(3) And returning success after the DMM deletes successfully, and returning an error command if the DMM fails.
(4) The CM forwards the command to the DCM.
2.7 user Authority Change flow
Under the architecture of the present invention, data deletion requires verification of the user's right, and when permitted, the corresponding data can be deleted, and the specific flow is shown in fig. 8.
(1) The DCM sends the username + corresponding permissions to be modified to the CM.
(2) And the CM inquires the user authority and then sends the user authority to the DMM.
(3) And returning success after the DMM is successfully modified, and returning an error command if the DMM fails.
(4) The CM forwards the command to the DCM.

Claims (10)

1. The utility model provides an industry internet data security management system based on block chain for guarantee the safe circulation and the operation traceability of the inside data of industry internet, realize user's authorization management, trust endorsement, account keeping storage function through the permit chain, realize storage, verification, analysis from chain and chain data through each functional module, its characterized in that contains five functional modules: the system comprises a user adding module, a data management and control module, a data management module and a data verification subsystem;
the user adding module UJM is responsible for inputting user characteristic information and data operation authority in the whole system, and sending the user characteristic information and the initial data operation authority of the user to the data management and control module; the user has different operation authorities for different data, and the user authority is dynamically changed and is used for realizing access control;
the data management and control module DMM is responsible for receiving the characteristic information and the initial data operation authority of the user and recording the characteristic information and the initial data operation authority into the block chain; the system is responsible for storing all the on-chain data, including the characteristic information of the user, the data operation authority, the hash corresponding to the off-chain data storage address, the hash value corresponding to the off-chain data abstract and various industrial data to be stored on the chain; interacting with the control module and returning various query requests of the control module;
the control module CM is responsible for analyzing and verifying the requests sent by the data management and control module, the data verification module and the data management module and forwarding the requests to the corresponding modules;
the data management module DCM is responsible for executing operations on the data on the chain, including registration, updating, deletion and query;
the data verification subsystem DVM is responsible for verifying the data on the off-link or on-link, and confirming whether the data is tampered and when the data is tampered; the system divides data into two parts, the off-link data only stores the hash corresponding to the off-link data storage address and the hash value corresponding to the off-link data abstract on the link, the data body is not stored on the block link, and when the data is verified, whether the data is falsified can be verified only by verifying whether the corresponding hash values are consistent, so that data tracing is realized.
2. The block chain-based industrial internet data security management system according to claim 1, wherein: the data management module is responsible for executing operations including registration, updating, deletion and query.
3. A block chain based industrial internet data security management method, based on the system of claim 1, characterized in that: the method comprises a user authority writing flow, an off-link data verification flow, a data registration flow, a data query flow, a data modification flow, a data deletion flow and a user authority changing flow;
the user permission writing process means that a user joining module needs to write user characteristic information and user permission into a system for ensuring the privacy and safety of data;
the off-link data verification process includes storing a hash value corresponding to an off-link data storage address and a hash value corresponding to an off-link data abstract into a block chain, and comparing and verifying real-time data and stored data during subsequent verification to prevent the off-link data from being attacked maliciously;
the data registration process refers to that the authority of a user needs to be verified during data registration, and corresponding data is written in when the authority is allowed;
the data query process refers to the process of verifying the authority of a user when data is queried, and querying corresponding data when the authority is allowed;
the data modification process is characterized in that the authority of a user needs to be verified when data is modified, and corresponding data can be modified when the authority is allowed:
the data deleting process refers to that the authority of a user needs to be verified when the data is deleted, and the corresponding data can be deleted when the permission is allowed;
under the user authority changing process, the data deletion needs to verify the authority of the user, and the corresponding data can be deleted when the permission is allowed.
4. The block chain-based industrial internet data security management method according to claim 3, wherein: the user permission writing process specifically includes:
(1) the user fills in basic information according to own conditions and uploads qualification files related to the authority;
(2) UJM, collecting user information and qualification files, generating an instruction of information + authority, and sending the instruction to the DMM; (3) and after the DMM successfully records the block chain network, returning a write success message, and if the DMM fails, returning a failure message.
5. The block chain-based industrial internet data security management method according to claim 3, wherein: the off-link data verification process specifically comprises the following steps:
(1) the DVM sends the data name to be verified, the hash value of the data storage address and the hash value of the data abstract to the CM;
(2) the CM sends a query request containing a data name to the DMM;
(3) the DMM retrieves and returns the hash value of the address hash + abstract stored in the chain according to the data name;
(4) and the CM compares the hash values, returns a success instruction if the hash values are consistent with the hash values, and returns an error value if the hash values are not consistent with the success instruction.
6. The block chain-based industrial internet data security management method according to claim 3, wherein: the data registration process specifically includes:
(1) the DCM sends the data name needing to be registered, the hash value of the data storage address and the hash value of the data abstract to the CM;
(2) the CM inquires the user authority and then sends the user authority to the DMM;
(3) returning success after the DMM successfully writes, and returning an error command if the DMM fails;
(4) the CM forwards the command to the DCM.
7. The block chain-based industrial internet data security management method according to claim 3, wherein: the data query process specifically includes:
(1) the DCM sends a data name to be inquired to the CM;
(2) the CM inquires the user authority and then sends the user authority to the DMM;
(3) after the DMM queries, returning the hash values of the data name, the data storage address/hash value and the data abstract to the CM;
(4) the CM forwards the result to the DCM.
8. The block chain-based industrial internet data security management method according to claim 3, wherein: the data modification process specifically includes:
(1) the DCM sends the data name to be modified, the hash value of the data storage address and the hash value of the data abstract to the CM;
(2) the CM inquires the user authority and then sends the user authority to the DMM;
(3) after the DMM is successfully modified, returning success, and if the DMM fails, returning an error command;
(4) the CM forwards the command to the DCM.
9. The block chain-based industrial internet data security management method according to claim 3, wherein: the data deletion process specifically includes:
(1) the DCM sends a data name to be deleted to the CM;
(2) the CM inquires the user authority and then sends the user authority to the DMM;
(3) after the DMM succeeds in deleting, returning success, and if the DMM fails, returning an error command;
(4) the CM forwards the command to the DCM.
10. The block chain-based industrial internet data security management method according to claim 3, wherein: the user right change specifically comprises:
(1) the DCM sends the user name + the corresponding authority to be modified to the CM;
(2) the CM inquires the user authority and then sends the user authority to the DMM;
(3) after the DMM is successfully modified, returning success, and if the DMM fails, returning an error command;
(4) the CM forwards the command to the DCM.
CN202011557236.7A 2020-12-24 2020-12-24 Block chain-based industrial internet data security management system and method Pending CN112597544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011557236.7A CN112597544A (en) 2020-12-24 2020-12-24 Block chain-based industrial internet data security management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011557236.7A CN112597544A (en) 2020-12-24 2020-12-24 Block chain-based industrial internet data security management system and method

Publications (1)

Publication Number Publication Date
CN112597544A true CN112597544A (en) 2021-04-02

Family

ID=75201996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011557236.7A Pending CN112597544A (en) 2020-12-24 2020-12-24 Block chain-based industrial internet data security management system and method

Country Status (1)

Country Link
CN (1) CN112597544A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113872816A (en) * 2021-09-30 2021-12-31 赵静 Equipment management system for industrial internet
CN113973003A (en) * 2021-06-30 2022-01-25 江苏腾武信息技术有限公司 Verification method of cloud cluster scheduling storage information based on block chain
CN114386098A (en) * 2021-12-31 2022-04-22 江苏任务网络科技有限公司 Big data storage and traceability system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN107480559A (en) * 2017-08-25 2017-12-15 北京中星仝创科技有限公司 Safe storage system and method for a kind of block chain from chain data
CN108683705A (en) * 2018-04-10 2018-10-19 北京工业大学 Internet of Things data sharing method based on block chain
CN108810073A (en) * 2018-04-05 2018-11-13 西安电子科技大学 A kind of Internet of Things multiple domain access control system and method based on block chain
CN110879903A (en) * 2019-11-20 2020-03-13 北京海益同展信息科技有限公司 Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN112035897A (en) * 2020-11-06 2020-12-04 腾讯科技(深圳)有限公司 Block chain evidence storage method and related device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN107480559A (en) * 2017-08-25 2017-12-15 北京中星仝创科技有限公司 Safe storage system and method for a kind of block chain from chain data
CN108810073A (en) * 2018-04-05 2018-11-13 西安电子科技大学 A kind of Internet of Things multiple domain access control system and method based on block chain
CN108683705A (en) * 2018-04-10 2018-10-19 北京工业大学 Internet of Things data sharing method based on block chain
CN110879903A (en) * 2019-11-20 2020-03-13 北京海益同展信息科技有限公司 Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN112035897A (en) * 2020-11-06 2020-12-04 腾讯科技(深圳)有限公司 Block chain evidence storage method and related device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113973003A (en) * 2021-06-30 2022-01-25 江苏腾武信息技术有限公司 Verification method of cloud cluster scheduling storage information based on block chain
CN113872816A (en) * 2021-09-30 2021-12-31 赵静 Equipment management system for industrial internet
CN113872816B (en) * 2021-09-30 2023-08-25 北京布洛克快链科技有限公司 Equipment management system for industrial Internet
CN114386098A (en) * 2021-12-31 2022-04-22 江苏任务网络科技有限公司 Big data storage and traceability system
CN114386098B (en) * 2021-12-31 2024-05-03 江苏大道云隐科技有限公司 Big data storage and traceability system

Similar Documents

Publication Publication Date Title
US11824970B2 (en) Systems, methods, and apparatuses for implementing user access controls in a metadata driven blockchain operating via distributed ledger technology (DLT) using granular access objects and ALFA/XACML visibility rules
US11764950B2 (en) System or method to implement right to be forgotten on metadata driven blockchain using shared secrets and consensus on read
CN111709056B (en) Data sharing method and system based on block chain
US11611560B2 (en) Systems, methods, and apparatuses for implementing consensus on read via a consensus on write smart contract trigger for a distributed ledger technology (DLT) platform
JP6872015B2 (en) Secure access to sensitive data using blockchain ledger
CN111988338B (en) Permission-controllable Internet of things cloud platform based on block chain and data interaction method
Uzunov et al. Securing distributed systems using patterns: A survey
CN112597544A (en) Block chain-based industrial internet data security management system and method
CN111177252B (en) Service data processing method and device
Sicari et al. Security&privacy issues and challenges in NoSQL databases
AU2021210206B2 (en) Index structure for blockchain ledger
Yang et al. EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things
US11184395B1 (en) Cross-network identity provisioning
WO2024002102A1 (en) Active administration system for data assets, computing device, and storage medium
WO2024002103A1 (en) Data asset management method and data asset active management system
WO2024002105A1 (en) Data asset usage control method, client and intermediate service platform
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
CN103581200A (en) Method and system for achieving fast circulation of structural file among multiple levels of safety domains
Feng et al. Digital copyright protection system for oil and gas knowledge achievements based on blockchain
Tan et al. Digital Rights Management platform based on Blockchain technology
Jianjun Research on Network User Behavior Management System Based on Blockchain Technology
US11321298B1 (en) Automated merge of DLT networks
Kalapaaking et al. Blockchain-Based Access Control for Secure Smart Industry Management Systems
Yang et al. Research on Intelligent Perception and Supervision for Data Circulation Security Based on Block-Chain
Peng et al. Research on the Application of Digital Education Resource Data Security Sharing Based on Blockchain and Access Control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination