CN113032803A - Method for safely storing and reading data - Google Patents

Method for safely storing and reading data Download PDF

Info

Publication number
CN113032803A
CN113032803A CN202110301076.8A CN202110301076A CN113032803A CN 113032803 A CN113032803 A CN 113032803A CN 202110301076 A CN202110301076 A CN 202110301076A CN 113032803 A CN113032803 A CN 113032803A
Authority
CN
China
Prior art keywords
data
verification information
block
encryption
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110301076.8A
Other languages
Chinese (zh)
Inventor
张建忠
杨丰源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hanya Shenzhen Network Information Technology Co ltd
Original Assignee
Hanya Shenzhen Network Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hanya Shenzhen Network Information Technology Co ltd filed Critical Hanya Shenzhen Network Information Technology Co ltd
Priority to CN202110301076.8A priority Critical patent/CN113032803A/en
Publication of CN113032803A publication Critical patent/CN113032803A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data

Abstract

The invention discloses a method for safely storing and reading data, which comprises the following steps: inputting medical original data; writing verification information in the data transmission process for encryption; the data server filters the data; packaging the transaction data and the verification information in the filtered data into a block at intervals, and sequentially connecting the transaction data and the verification information in series to form a block chain; and storing the hash value of the verification information of the previous block in the verification information of each block, and storing the processed data into a target database and simultaneously making a data identifier. The invention ensures a brand new mode of data security from the technical aspect and ensures the data storage security through layer-by-layer encryption in the data storage process; and the data flow direction can be traced by using the block chain as a decentralized unique inlet at the reading level.

Description

Method for safely storing and reading data
Technical Field
The invention relates to the field of network data security, in particular to a method for safely storing and reading data.
Background
The existing medical data storage schemes are generally stored in a relational database, such as Oracle, DB2, Microsoft SQL Server, MicroAccess, and MySQLd. If the data is stolen, there is often no way to track it. The security of the patient data is not guaranteed.
The data server is compromised and patient data loss can cause, and is difficult to know, the data destination. For data security protection, a patient does not have a reasonable privacy scheme and a right-confirming scheme for data.
Disclosure of Invention
In order to solve at least or partially the above problems, a method for safely storing and reading data is provided, which can better protect the safety of medical data on the premise of insufficient protection of the medical data.
In order to achieve the purpose, the invention provides the following technical scheme:
the invention relates to a method for safely storing data, which comprises the following steps:
entering metadata: inputting medical original data;
encryption in the data transmission process: writing verification information in the data transmission process for encryption;
and (3) data server filtering: the data server filters the data;
data synchronization block chaining: packaging the transaction data and the verification information in the filtered data into a block at intervals, and sequentially connecting the transaction data and the verification information in series to form a block chain;
data is stored in combination with the blockchain hash value: and storing the hash value of the verification information of the previous block in the verification information of each block, and storing the processed data into a target database and simultaneously making a data identifier.
As a preferred technical solution of the present invention, the original data includes images, characters, and files.
As a preferred technical solution of the present invention, when the public chain of the data synchronization blockchain is used, the summary identification is performed on the blockchain.
In a preferred embodiment of the present invention, a linear and nonlinear hybrid encryption method is used for the algorithm of data encryption.
As a preferred technical scheme of the invention, the processed data are stored in a target database in a split type mode.
The invention relates to a method for safely reading data, which is used for reading the data stored by any one of the methods, and the reading method comprises the following steps:
the reading method comprises the following steps:
sending a data reading request;
extracting the block chain abstract: extracting a timestamp and a hash value in the data storage identification;
block chain data penetration: verifying the data through the timestamp, and linking the verified data content by calculating a hash value to complete block chain penetration;
data encryption transmission: the data display penetrates to an encrypted data server through a block chain, and the encrypted data server transmits the data to the browser in an encrypted mode;
browser playback: the browser decrypts and displays the transmitted data.
Compared with the prior art, the invention has the following beneficial effects:
the invention ensures a brand new mode of data security from the technical aspect and ensures the data storage security through layer-by-layer encryption in the data storage process;
and the data flow direction can be traced by using the block chain as a decentralized unique inlet at the reading level.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a data storage flow diagram of the present invention;
FIG. 2 is a flow chart of data reading according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In addition, if a detailed description of the known art is not necessary to show the features of the present invention, it is omitted.
Example 1
As shown in fig. 1, the present invention provides a method for securely storing data, comprising the following steps:
entering metadata: inputting medical original data;
encryption in the data transmission process: writing verification information in the data transmission process for encryption;
and (3) data server filtering: the data server filters the data;
data synchronization block chaining: packaging the transaction data and the verification information in the filtered data into a block at intervals, and sequentially connecting the transaction data and the verification information in series to form a block chain;
data is stored in combination with the blockchain hash value: and storing the hash value of the verification information of the previous block in the verification information of each block, and storing the processed data into a target database and simultaneously making a data identifier.
As shown in fig. 2, the present invention provides a method for reading data safely, which is used for reading data stored by the above method, and the reading method includes the following steps:
the reading method comprises the following steps:
sending a data reading request;
extracting the block chain abstract: extracting a timestamp and a hash value in the data storage identification;
block chain data penetration: verifying the data through the timestamp, and linking the verified data content by calculating a hash value to complete block chain penetration;
data encryption transmission: the data display penetrates to an encrypted data server through a block chain, and the encrypted data server transmits the data to the browser in an encrypted mode;
browser playback: the browser decrypts and displays the transmitted data.
Specifically, a data storage identification mechanism is provided by combining a block chain; data reading can only read data from the hash value of the storage identifier; the Hash value link block chain public chain ensures that data can be traced; the data display penetrates to the encrypted data server through the block chain; the data server gives out a true value of the data through a data encryption and decryption mechanism; making a data identifier while storing the data in a target database; when a public chain of a data synchronization block chain is formed, block chain abstract identification is made; on the basis of the algorithm of data encryption, a linear and nonlinear mixed encryption mode is adopted to ensure the safety of bottom data; the data server adopts the fragmentation storage, so that the data backup and the storage safety are ensured.
The invention solves the problems of data security and data right confirmation through a block chain, data encryption and database encryption comprehensive scheme.
The agreement is achieved by a consensus mechanism, advanced cryptographic algorithms ensure data security, and transaction data and verification information are packed in a block at intervals and are sequentially connected in series to form a chain. In the block header (authentication information) of each block, a block header hash value (parenthosh, parent block hash) of the previous block is stored. Such that the blocks in the block chain are linked to each other. If we change the content of a block in the previous period, the parent block hash of the following block is not matched with the parent block hash, and the block cannot be identified. This ensures non-tamper-ability of the blockchain data.
On one hand, the block chain authority is confirmed, and the originality and the advancement of the uploaded content are proved by adding a timestamp; on the other hand, after the content is uplinked by calculating the hash value, the right is confirmed quickly and simply, manual examination is far exceeded, and massive data is supported.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A method for secure storage of data, comprising the steps of:
entering metadata: inputting medical original data;
encryption in the data transmission process: writing verification information in the data transmission process for encryption;
and (3) data server filtering: the data server filters the data;
data synchronization block chaining: packaging the transaction data and the verification information in the filtered data into a block at intervals, and sequentially connecting the transaction data and the verification information in series to form a block chain;
data is stored in combination with the blockchain hash value: and storing the hash value of the verification information of the previous block in the verification information of each block, and storing the processed data into a target database and simultaneously making a data identifier.
2. The method of claim 1, wherein the raw data comprises images, text, and files.
3. The method of claim 1, wherein the summary identification is performed on the blockchain at the time of the public chain of the data synchronization blockchain.
4. The method for data security storage according to claim 1, wherein a linear and nonlinear mixed encryption mode is adopted in the algorithm of data encryption.
5. The method for securely storing data as claimed in claim 1, wherein the processed data is stored in the target database by using a split storage.
6. A method for secure reading of data for reading of data stored by the method according to any of claims 1 to 5, characterized in that the reading method comprises the steps of:
sending a data reading request;
extracting the block chain abstract: extracting a timestamp and a hash value in the data storage identification;
block chain data penetration: verifying the data through the timestamp, and linking the verified data content by calculating a hash value to complete block chain penetration;
data encryption transmission: the data display penetrates to an encrypted data server through a block chain, and the encrypted data server transmits the data to the browser in an encrypted mode;
browser playback: the browser decrypts and displays the transmitted data.
CN202110301076.8A 2021-03-22 2021-03-22 Method for safely storing and reading data Pending CN113032803A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110301076.8A CN113032803A (en) 2021-03-22 2021-03-22 Method for safely storing and reading data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110301076.8A CN113032803A (en) 2021-03-22 2021-03-22 Method for safely storing and reading data

Publications (1)

Publication Number Publication Date
CN113032803A true CN113032803A (en) 2021-06-25

Family

ID=76472121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110301076.8A Pending CN113032803A (en) 2021-03-22 2021-03-22 Method for safely storing and reading data

Country Status (1)

Country Link
CN (1) CN113032803A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109656882A (en) * 2017-10-10 2019-04-19 上海能链众合科技有限公司 Data record method, extracting method and device, storage medium, terminal
US20190132295A1 (en) * 2018-11-02 2019-05-02 Oron Lenz System and apparatus for data confidentiality in distributed ledger
US20190379531A1 (en) * 2018-06-07 2019-12-12 Coinfirm Blockchain Lab Sp. Zo.o. Method For Registration Of Data In A Blockchain Database And A Method For Verifying Data
CN111563130A (en) * 2020-07-15 2020-08-21 成都无右区块链科技有限公司 Data credible data management method and system based on block chain technology
CN111865983A (en) * 2020-07-21 2020-10-30 安徽高山科技有限公司 Block chain-based data security tracing method
CN111916217A (en) * 2020-08-07 2020-11-10 上海交通大学医学院附属第九人民医院 Block chain-based medical data management method, system, storage medium and terminal
CN111985006A (en) * 2020-08-18 2020-11-24 深圳中兴网信科技有限公司 Block chain based data synchronization method, system and computer readable storage medium
CN112000963A (en) * 2020-07-31 2020-11-27 天翼电子商务有限公司 Transaction privacy information verification method and verification system based on block chain
CN112347521A (en) * 2020-11-11 2021-02-09 汪礼君 Medical data management method and system based on medical block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109656882A (en) * 2017-10-10 2019-04-19 上海能链众合科技有限公司 Data record method, extracting method and device, storage medium, terminal
US20190379531A1 (en) * 2018-06-07 2019-12-12 Coinfirm Blockchain Lab Sp. Zo.o. Method For Registration Of Data In A Blockchain Database And A Method For Verifying Data
US20190132295A1 (en) * 2018-11-02 2019-05-02 Oron Lenz System and apparatus for data confidentiality in distributed ledger
CN111563130A (en) * 2020-07-15 2020-08-21 成都无右区块链科技有限公司 Data credible data management method and system based on block chain technology
CN111865983A (en) * 2020-07-21 2020-10-30 安徽高山科技有限公司 Block chain-based data security tracing method
CN112000963A (en) * 2020-07-31 2020-11-27 天翼电子商务有限公司 Transaction privacy information verification method and verification system based on block chain
CN111916217A (en) * 2020-08-07 2020-11-10 上海交通大学医学院附属第九人民医院 Block chain-based medical data management method, system, storage medium and terminal
CN111985006A (en) * 2020-08-18 2020-11-24 深圳中兴网信科技有限公司 Block chain based data synchronization method, system and computer readable storage medium
CN112347521A (en) * 2020-11-11 2021-02-09 汪礼君 Medical data management method and system based on medical block chain

Similar Documents

Publication Publication Date Title
EP3641220B1 (en) Cryptologic rewritable blockchain
CN110931093B (en) Medical information sharing system and method
CN110414203B (en) Internet medical identity authentication method based on block chain technology
KR100833141B1 (en) Digital document management system, digital document management method, and computer-readable storage medium having digital document management program
KR101656434B1 (en) Secure data cache
EP3319006B1 (en) Method for offline authenticity testing of a virtual document
CN112688954B (en) Protection method for sensitive data transmission
CN111586065A (en) Data authorization method based on block chain
CN112131309A (en) Data evidence storing method and system based on block chain technology
CN111081331B (en) Patient file privacy protection method and system
US11301823B2 (en) System and method for electronic deposit and authentication of original electronic information objects
CN115664867A (en) Electronic contract signing device and method based on third party authentication
CN111160997A (en) Advertisement supervision method and device based on block chain and advertisement delivery system
CN113032803A (en) Method for safely storing and reading data
CN117113382A (en) Information encryption method and system based on digital currency
CN111177747B (en) Block chain-based social network privacy data protection method
CN114189359B (en) Internet of things equipment capable of avoiding data tampering, data safety transmission method and system
CN112968774B (en) Method, device storage medium and equipment for encrypting and decrypting configuration file
CN101119198B (en) Biological stencil and method to produce biological stencil and identification identifying method
CN114760066B (en) Time sequence data slicing double-chain authentication method and device
Chen et al. Undeniable Vaccine Production Protocol with Blockchain and IPFS
CN114979716B (en) Video copyright trading method and system based on mother and child chains
CN114117499A (en) Authority management based trusted data exchange method
Shyni et al. Preservation Of Digital Forensic Evidence Using Blockchain Technology
CN117172775A (en) Block chain tracing electronic seal anti-counterfeiting mark method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination