CN114331441A - Data tracing and circulating method and system based on network trust - Google Patents

Data tracing and circulating method and system based on network trust Download PDF

Info

Publication number
CN114331441A
CN114331441A CN202210035493.7A CN202210035493A CN114331441A CN 114331441 A CN114331441 A CN 114331441A CN 202210035493 A CN202210035493 A CN 202210035493A CN 114331441 A CN114331441 A CN 114331441A
Authority
CN
China
Prior art keywords
data
data item
authorized
file system
interplanetary file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210035493.7A
Other languages
Chinese (zh)
Inventor
陈征宇
洪章阳
黄炳裕
黄河
谢云光
王孝文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guoxin Jingning Information Security Technology Co.,Ltd.
Original Assignee
Evecom Information Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Evecom Information Technology Development Co ltd filed Critical Evecom Information Technology Development Co ltd
Publication of CN114331441A publication Critical patent/CN114331441A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a data tracing and circulating method and system based on network trust, which comprises the following steps: the data circulation platform receives an authorized data item sent by a data authorization party to obtain an authorized data item set, and stores the authorized data item set in an interplanetary file system; receiving a data query request sent by a data demand party, wherein the data query request comprises a required data item, verifying whether the required data item is in an authorized data item set, and if so, routing the data query request to an edge node corresponding to a data owner corresponding to the authorized data item; the edge node acquires target data according to the required data item and stores the target data in an interplanetary file system; the data circulation platform acquires target data through the interplanetary file system and forwards the target data to a data demand party; data exchange between the data circulation platform and the edge nodes is achieved through the interplanetary file system, data transmission efficiency is improved, and data are directly acquired from a data owner to guarantee real-time performance of the data.

Description

Data tracing and circulating method and system based on network trust
Technical Field
The invention relates to the field of data communication, in particular to a data tracing and circulating method and system based on network trust.
Background
With the development of social digital economy, the deep fusion of digital economy and entity economy is promoted, basic systems and standard specifications such as data resource property rights, transaction circulation, cross-border transmission, safety protection and the like are established, and the development and utilization of data resources are promoted, so that the method becomes an important direction for ensuring the better and faster development of the digital economy. Data is increasingly becoming an important production element circulating in society, and the infrastructure supporting the circulation of data is the core and key of the circulation of data.
At present, two main ways of data circulation are available, namely, firstly, data in each data owner is gathered to a data center, and a data demand party directly accesses the data center to obtain required data, so that sharing and open circulation of the data are realized; however, in a large-scale multi-data-source scene, the data aggregation process is difficult, and new data needs to be obtained again after the original data in the data owner is changed, so that the timeliness of the data accessed by the demand side is weakened; and secondly, data aggregation is not carried out, a data demand party directly applies for data acquisition to a data ownership party, and the data ownership party sends the data to the data demand party in real time, so that the demand party has complicated requests in a large-scale cross-platform multi-source data scene, and if a platform is constructed to forward the data requests, a complex asynchronous transfer mode is needed for processing a large amount of concurrent messages, namely, a large amount of development and configuration operations are needed.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the data tracing and circulating method and system based on the network trust are provided, and efficient and real-time data circulation is achieved.
In order to solve the technical problems, the invention adopts a technical scheme that:
a data tracing and circulating method based on network trust comprises the following steps:
s1, the data circulation platform receives the authorization data item sent by the data authorization party to obtain an authorization data item set, and the authorization data item set is stored in the interplanetary file system;
s2, the data circulation platform receives a data query request sent by a data demand party, the data query request comprises a required data item, whether the required data item is in the authorized data item set is verified, and if yes, S3 is executed;
s3, the data circulation platform routes the data query request to the edge node corresponding to the data owner corresponding to the authorized data item;
s4, the edge node acquires target data according to the required data item and stores the target data in the interplanetary file system;
and S5, the data circulation platform acquires the target data through the interplanetary file system and forwards the target data to the data demand side.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a data traceback circulation system based on network trust, comprising a data circulation platform and an edge node, wherein the data circulation platform comprises a first memory, a first processor and a first computer program stored on the first memory and operable on the first processor, the edge node comprises a second memory, a second processor and a second computer program stored on the second memory and operable on the second processor, and the first processor implements the following steps when executing the first computer program:
s1, receiving an authorized data item set sent by a data authorizing party, and storing the authorized data item set in an interplanetary file system;
s2, receiving a data query request sent by a data demand party, wherein the data query request comprises a required data item, verifying whether the required data item is in the authorized data item set, and if so, executing S3;
s3, routing the data query request to the edge node corresponding to the data owner corresponding to the authorized data item;
s5, acquiring the target data through the interplanetary file system and forwarding the target data to the data demand side;
the second processor, when executing the second computer program, implements the steps of:
and S4, the edge node acquires target data according to the required data item and stores the target data in the interplanetary file system.
The invention has the beneficial effects that: the data circulation platform receives the data query request sent by the data demand party in a unified mode, authenticates the data query request, forwards the data query request meeting the conditions to the edge node corresponding to the corresponding data owner to acquire data, reduces the pressure of the data circulation platform for processing the data query request, achieves data exchange between the data circulation platform and the edge node through the interplanetary file system, does not need to transfer data layer by layer through complex asynchronous calling, and can conveniently acquire the data stored in the interplanetary file system in the edge node or the data circulation platform by the other party, so that the data transmission efficiency is improved, and the real-time performance of the data is also guaranteed by directly acquiring the data from the data owner.
Drawings
Fig. 1 is a flowchart illustrating steps of a data tracing and circulating method based on network trust according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a data tracing and circulating system based on network trust according to an embodiment of the present invention;
fig. 3 is an application schematic diagram of a data tracing and circulating method based on network trust in an actual scene according to an embodiment of the present invention;
fig. 4 is an application schematic diagram of a data tracing and circulating method based on network trust in a case of multiple data circulating platforms according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a relationship between each end of a data tracing and circulating method based on network trust according to an embodiment of the present invention;
description of reference numerals:
1. a data circulation platform; 1.1, a first processor; 1.2, a first memory; 2. an edge node; 2.1, a second processor; 2.2, a second memory; 3. a data tracing and circulating system based on network trust is disclosed.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 and fig. 3, a data tracing and circulating method based on network trust includes the steps of:
s1, the data circulation platform receives the authorization data item sent by the data authorization party to obtain an authorization data item set, and the authorization data item set is stored in the interplanetary file system;
s2, the data circulation platform receives a data query request sent by a data demand party, the data query request comprises a required data item, whether the required data item is in the authorized data item set is verified, and if yes, S3 is executed;
s3, the data circulation platform routes the data query request to the edge node corresponding to the data owner corresponding to the authorized data item;
s4, the edge node acquires target data according to the required data item and stores the target data in the interplanetary file system;
and S5, the data circulation platform acquires the target data through the interplanetary file system and forwards the target data to the data demand side.
From the above description, the beneficial effects of the present invention are: the data circulation platform receives the data query request sent by the data demand party in a unified mode, authenticates the data query request, forwards the data query request meeting the conditions to the edge node corresponding to the corresponding data owner to acquire data, reduces the pressure of the data circulation platform for processing the data query request, achieves data exchange between the data circulation platform and the edge node through the interplanetary file system, does not need to transfer data layer by layer through complex asynchronous calling, and can conveniently acquire the data stored in the interplanetary file system in the edge node or the data circulation platform by the other party, so that the data transmission efficiency is improved, and the real-time performance of the data is also guaranteed by directly acquiring the data from the data owner.
Further, the S1 specifically includes:
receiving authorized data items sent by a data authorization party to obtain an authorized data item set, hashing the authorized data item set and storing the hashed value in an interplanetary file system, and obtaining a hashed value identifier of each authorized data item in the interplanetary file system;
storing the hash value identification and the data authority into a preset block chain;
verifying in said S2 whether said required data item is included in said set of authorized data items:
obtaining the hash value of the required data item, and comparing the hash value with the hash value identification;
and if the first hash value identification which is the same as the hash value exists, the required data item is in the authorized data item set.
According to the description, the authorized data item set is stored in the interplanetary file system, the interplanetary file system stores the file by taking the hash value of the file content as the identifier, namely, the file content as the identifier, so that the comparison between the required data item and the authorized data item is conveniently carried out subsequently, and the existing mode of storing the file by the address is replaced, and the access of the file is more flexible.
Further, the S2 further includes:
checking whether the data demander subscribes to the access API corresponding to the required data item;
and obtaining the target data corresponding to the required data item through the access API.
According to the description, whether the data demand party has the authority to acquire the required data item or not is judged by checking whether the data demand party subscribes the access API corresponding to the required data item in the data query request or not, the data circulation platform authenticates the data demand party, and the data owner party only needs to acquire the corresponding data according to the data query request, so that the pressure of the data owner party is reduced.
Further, the S4 specifically includes:
the edge node acquires target data from a data owner according to the required data item;
encrypting the target data to obtain ciphertext target data;
and fragmenting the ciphertext data according to a preset scheme through the interplanetary file system to obtain a plurality of ciphertext fragment data, and storing the plurality of ciphertext fragment data into the interplanetary file system.
According to the description, after the edge node acquires the target data, the target data is encrypted, so that the data circulation platform is encrypted by the target data except for the data owner and the data demand side, and the data safety is guaranteed.
Further, the access API is a synchronous call or an asynchronous call.
As can be seen from the above description, the access API may set a synchronous call or an asynchronous call when it is issued, and can change according to the request frequency of the required data item.
Referring to fig. 2, a data tracing and circulating system based on network trust includes a data circulating platform and an edge node, where the data circulating platform includes a first memory, a first processor, and a first computer program stored in the first memory and operable on the first processor, the edge node includes a second memory, a second processor, and a second computer program stored in the second memory and operable on the second processor, and the first processor implements the following steps when executing the first computer program:
s1, receiving an authorized data item set sent by a data authorizing party, and storing the authorized data item set in an interplanetary file system;
s2, receiving a data query request sent by a data demand party, wherein the data query request comprises a required data item, verifying whether the required data item is in the authorized data item set, and if so, executing S3;
s3, routing the data query request to the edge node corresponding to the data owner corresponding to the authorized data item;
s5, acquiring the target data through the interplanetary file system and forwarding the target data to the data demand side;
the second processor, when executing the second computer program, implements the steps of:
and S4, the edge node acquires target data according to the required data item and stores the target data in the interplanetary file system.
The invention has the beneficial effects that: the data circulation platform receives the data query request sent by the data demand party in a unified mode, authenticates the data query request, forwards the data query request meeting the conditions to the edge node corresponding to the corresponding data owner to acquire data, reduces the pressure of the data circulation platform for processing the data query request, achieves data exchange between the data circulation platform and the edge node through the interplanetary file system, does not need to transfer data layer by layer through complex asynchronous calling, and can conveniently acquire the data stored in the interplanetary file system in the edge node or the data circulation platform by the other party, so that the data transmission efficiency is improved, and the real-time performance of the data is also guaranteed by directly acquiring the data from the data owner.
Further, the S1 specifically includes:
receiving an authorized data item sent by a data authorized party to obtain an authorized data item set, storing the authorized data item set in an interplanetary file system, and acquiring a hash value identifier of each authorized data item in the interplanetary file system;
storing the hash value identification and the data authority into a preset block chain;
verifying in said S2 whether said required data item is included in said set of authorized data items:
obtaining the hash value of the required data item, and comparing the hash value with the hash value identification;
and if the first hash value identification which is the same as the hash value exists, the required data item is in the authorized data item set.
According to the description, the authorized data item set is stored in the interplanetary file system, the interplanetary file system stores the file by taking the hash value of the file content as the identifier, namely, the file content as the identifier, so that the comparison between the required data item and the authorized data item is conveniently carried out subsequently, and the existing mode of storing the file by the address is replaced, and the access of the file is more flexible.
Further, the first processor when executing the first computer program implementation S2 further includes:
checking whether the data demander subscribes to the access API corresponding to the required data item;
and obtaining the target data corresponding to the required data item through the access API.
According to the description, whether the data demand party has the authority to acquire the required data item or not is judged by checking whether the data demand party subscribes the access API corresponding to the required data item in the data query request or not, the data circulation platform authenticates the data demand party, and the data owner party only needs to acquire the corresponding data according to the data query request, so that the pressure of the data owner party is reduced.
Further, the S4 specifically includes:
the edge node acquires target data from a data owner according to the required data item;
encrypting the target data to obtain ciphertext target data;
and fragmenting the ciphertext data according to a preset scheme through the interplanetary file system to obtain a plurality of ciphertext fragment data, and storing the plurality of ciphertext fragment data into the interplanetary file system.
According to the description, after the edge node acquires the target data, the target data is encrypted, so that the data circulation platform is encrypted by the target data except for the data owner and the data demand side, and the data safety is guaranteed.
Further, the access API is a synchronous call or an asynchronous call.
As can be seen from the above description, the access API may set a synchronous call or an asynchronous call when it is issued, and can change according to the request frequency of the required data item.
Referring to fig. 1 and 5, a first embodiment of the present invention is:
a data tracing and circulating method based on network trust comprises the following steps:
s1, the data circulation platform receives an authorized data item set obtained by receiving an authorized data item sent by a data authorizer (the data producer in fig. 5), and stores the authorized data item set in an interplanetary file system, specifically:
receiving authorized data items sent by a data authorization party to obtain an authorized data item set, hashing the authorized data item set and storing the hashed value in an interplanetary file system, and obtaining a hashed value identifier of each authorized data item in the interplanetary file system;
storing the hash value identification, the name of the data authorizer, the sending time of a data packet comprising the authorized data item set and the digital certificate information of the data authorizer into a preset block chain;
s2, the data circulation platform receives a data query request sent by a data demand party, the data query request comprises a required data item, whether the required data item is in the authorized data item set is verified, and if yes, S3 is executed;
s2 includes: checking whether the data demander subscribes to the access API corresponding to the required data item;
the target data corresponding to the required data item can be obtained through the access API, and specifically, the access API can call a data API of a data owner to obtain the target data;
wherein verifying whether the required data item is in the set of authorized data items comprises:
obtaining the hash value of the required data item, and comparing the hash value with the hash value identification;
if a first hash value identifier identical to the hash value exists, the required data item is in the authorized data item set;
s3, the data circulation platform routes the data query request to an edge node corresponding to a data owner (data collector in fig. 5) corresponding to the authorized data item;
s4, the edge node acquires target data according to the required data item, and stores the target data in the interplanetary file system, specifically:
the edge node acquires target data from a data owner according to the required data item;
encrypting the target data to obtain ciphertext target data;
the ciphertext data are segmented according to a preset scheme through the interplanetary file system to obtain a plurality of ciphertext segmented data, and the ciphertext segmented data are stored into the interplanetary file system;
submitting the output transaction to a blockchain for evidence storage;
specifically, the output transaction includes: the name of the data owner and the hash value of the ciphertext target data in the interplanetary file system;
s5, the data circulation platform acquires the target data through the interplanetary file system and forwards the target data to the data demand side;
specifically, after storing the target data in the interplanetary file system, the edge node sends a callback message to the data circulation platform, and after receiving the callback message, the data circulation platform acquires a target hash value of the target data through the interplanetary file system and forwards the target hash value to the data demand side;
the data demander inquires in the interplanetary file system according to the target hash value to obtain target data, and submits inquiry transaction to a block chain for evidence storage;
specifically, the query transaction includes: the name of the data demander, the time when the data demander receives the data packet with the target data and the target hash value;
in an alternative embodiment, the data archived in the blockchain for each step is shown in table 1:
TABLE 1
Figure BDA0003468172520000091
Figure BDA0003468172520000101
Referring to fig. 4, a second embodiment of the present invention is:
the data tracing and circulating method based on the network trust is applied to an actual scene:
in this embodiment, the data circulation platform includes a message center and an API gateway;
a message center corresponds to a plurality of edge nodes, and under the condition that the message center comprises a plurality of data circulation platforms:
s1, each data circulation platform receives the authorization data item sent by the corresponding data authorization party to obtain an authorization data item set, and stores the authorization data item set in an interplanetary file system, specifically:
receiving authorized data items sent by a data authorization party to obtain an authorized data item set, hashing the authorized data item set and storing the hashed value in an interplanetary file system, and obtaining a hashed value identifier of each authorized data item in the interplanetary file system;
storing the hash value identification and the data authority into a preset block chain;
s2, the first data circulation platform receives a data query request sent by a data demand party, wherein the data query request comprises a required data item, whether the required data item is in the authorized data item set is verified, and if yes, S3 is executed;
s2 includes: checking whether the data demander subscribes to an access API in the first data circulation platform or not through an API gateway;
target data corresponding to the required data item can be obtained through the access API;
wherein verifying whether the required data item is in the set of authorized data items comprises:
obtaining the hash value of the required data item, and comparing the hash value with the hash value identification;
if a first hash value identifier identical to the hash value exists, the required data item is in the authorized data item set;
s3, the first data circulation platform routes the data query request to a target edge node corresponding to the data owner corresponding to the authorized data item;
if the target edge node does not correspond to the first data circulation platform, routing the data query request to a total data circulation platform (a national data circulation platform), checking whether the data calling is legal through an interplanetary file system, if so, acquiring a second data circulation platform corresponding to the target edge node by the total data circulation platform, routing the data query request to the second data circulation platform, and checking whether the data calling is legal through the interplanetary file system;
specifically, the specific step of checking whether the data call is legal through the interplanetary file system is as follows: obtaining an authorized data item set through an interplanetary file system, verifying whether the required data item is in the authorized data item set, and calling legality if the required data item is in the authorized data item set;
the second data circulation platform routes the data query request to the target edge node;
s4, the target edge node acquires target data according to the required data item and stores the target data in the interplanetary file system;
submitting the output transaction to a blockchain for evidence storage;
the output transaction includes: the name of the data owner, the hash value of the data packet of the target data in the interplanetary file system, the time for sending the data packet including the target data to the interplanetary file system by the edge node and the digital certificate information of the data owner;
s5, the data circulation platform acquires the target data through the interplanetary file system and forwards the target data to the data demand side;
specifically, after storing target data in an interplanetary file system, the edge node sends a callback message to a second data circulation platform, the second data circulation platform receives the callback message and then forwards the callback message to a total data circulation platform, the total data circulation platform receives the callback message and then forwards the callback message to a first data circulation platform, and the first data circulation platform receives the callback message and then obtains a target hash value of the target data through the interplanetary file system and forwards the target hash value to a data demand side;
the data demander inquires in the interplanetary file system according to the target hash value to obtain target data, and submits inquiry transaction to a block chain for evidence storage;
specifically, the query transaction includes: the name of the data demander, the time when the data demander receives the data packet with the target data and the target hash value.
Referring to fig. 2, a third embodiment of the present invention is:
a data tracing and circulating system 3 based on network trust includes a data circulating platform 1 and an edge node 2, where the data circulating platform 1 includes a first memory 1.2, a first processor 1.1 and a first computer program stored in the first memory 1.2 and operable on the first processor 1.1, the edge node 2 includes a second memory 2.2, a second processor 2.1 and a second computer program stored in the second memory 2.2 and operable on the second processor 2.1, the first processor 1.1 implements the steps implemented by the data circulating platform in the first embodiment or the second embodiment when executing the first computer program, and the second processor 2.1 implements the steps implemented by the edge node in the first embodiment or the second embodiment when executing the second computer program.
In summary, the invention provides a data tracing and circulating method and system based on network trust, a data circulating platform and edge nodes are arranged, the edge nodes are arranged at one side of a data owner, the data circulating platform performs authentication of data query requests and forwards the data query requests to the corresponding edge nodes, the data owner does not need to care which data owner the data query requests are sent to, and the data owner does not need to verify the authority of the data owner, so that the execution efficiency of the data query requests is improved; introducing a interstellar file system, wherein the interstellar file system uses the hash value of the file content as an identifier to realize the storage of the files, and can use the hash value to realize the comparison of whether the files are the same or not; the data circulation platform does not need to gather data, the data is directly acquired from a data owner for a data demand side, the real-time performance of the acquired data is guaranteed, all the steps are filed on a block chain, the source and the destination of the data can be traced back, the data cannot be tampered and irreversible, the data is encrypted and completed on an edge node, the edge node is arranged at one end of the data owner, namely the data circulation platform serving as a transfer mode can not acquire plaintext data content except the data owner and the final data demand side, and the safety of the data in the transmission process is guaranteed.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A data tracing and circulating method based on network trust is characterized by comprising the following steps:
s1, the data circulation platform receives the authorization data item sent by the data authorization party to obtain an authorization data item set, and the authorization data item set is stored in the interplanetary file system;
s2, the data circulation platform receives a data query request sent by a data demand party, the data query request comprises a required data item, whether the required data item is in the authorized data item set is verified, and if yes, S3 is executed;
s3, the data circulation platform routes the data query request to the edge node corresponding to the data owner corresponding to the authorized data item;
s4, the edge node acquires target data according to the required data item and stores the target data in the interplanetary file system;
and S5, the data circulation platform acquires the target data through the interplanetary file system and forwards the target data to the data demand side.
2. The data tracing and circulating method based on network trust according to claim 1, wherein the S1 specifically is:
receiving authorized data items sent by a data authorization party to obtain an authorized data item set, performing hash removal on the authorized data item set, storing the authorized data item set in an interplanetary file system, and acquiring a hash value identifier of each authorized data item in the interplanetary file system;
storing the hash value identification and the data authority into a preset block chain;
verifying in said S2 whether said required data item is included in said set of authorized data items:
obtaining the hash value of the required data item, and comparing the hash value with the hash value identification;
and if the first hash value identification which is the same as the hash value exists, the required data item is in the authorized data item set.
3. The method for data retrospective circulation based on network trust according to claim 1, wherein the S2 further includes:
checking whether the data demander subscribes to the access API corresponding to the required data item;
and obtaining the target data corresponding to the required data item through the access API.
4. The data tracing and circulating method based on network trust according to claim 1, wherein the S4 specifically is:
the edge node acquires target data from a data owner according to the required data item;
encrypting the target data to obtain ciphertext target data;
and fragmenting the ciphertext data according to a preset scheme through the interplanetary file system to obtain a plurality of ciphertext fragment data, and storing the plurality of ciphertext fragment data into the interplanetary file system.
5. The method according to claim 3, wherein the access API is a synchronous call or an asynchronous call.
6. A network trust based data traceback circulation system, comprising a data circulation platform and an edge node, wherein the data circulation platform comprises a first memory, a first processor and a first computer program stored on the first memory and operable on the first processor, the edge node comprises a second memory, a second processor and a second computer program stored on the second memory and operable on the second processor, the network trust based data traceback circulation system is characterized in that:
the first processor, when executing the first computer program, implements the steps of:
s1, receiving an authorized data item set sent by a data authorizing party, and storing the authorized data item set in an interplanetary file system;
s2, receiving a data query request sent by a data demand party, wherein the data query request comprises a required data item, verifying whether the required data item is in the authorized data item set, and if so, executing S3;
s3, routing the data query request to the edge node corresponding to the data owner corresponding to the authorized data item;
s5, acquiring the target data through the interplanetary file system and forwarding the target data to the data demand side;
the second processor, when executing the second computer program, implements the steps of:
and S4, the edge node acquires target data according to the required data item and stores the target data in the interplanetary file system.
7. The data tracing and circulation system based on network trust according to claim 6, wherein the S1 specifically is:
receiving authorized data items sent by a data authorization party to obtain an authorized data item set, hashing the authorized data item set and storing the hashed value in an interplanetary file system, and obtaining a hashed value identifier of each authorized data item in the interplanetary file system;
storing the hash value identification and the data authority into a preset block chain;
the first processor executing the first computer program implementation S2 verifying whether the required data item is in the set of authorized data items comprises:
obtaining the hash value of the required data item, and comparing the hash value with the hash value identification;
and if the first hash value identification which is the same as the hash value exists, the required data item is in the authorized data item set.
8. The system according to claim 6, wherein the first processor, when executing the first computer program implementation S2, further comprises:
checking whether the data demander subscribes to the access API corresponding to the required data item;
and obtaining the target data corresponding to the required data item through the access API.
9. The data tracing and circulation system based on network trust according to claim 6, wherein the S4 specifically is:
the edge node acquires target data from a data owner according to the required data item;
encrypting the target data to obtain ciphertext target data;
and fragmenting the ciphertext data according to a preset scheme through the interplanetary file system to obtain a plurality of ciphertext fragment data, and storing the plurality of ciphertext fragment data into the interplanetary file system.
10. The system of claim 8, wherein the access API is a synchronous call or an asynchronous call.
CN202210035493.7A 2021-01-26 2022-01-13 Data tracing and circulating method and system based on network trust Pending CN114331441A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2021101031346 2021-01-26
CN202110103134 2021-01-26

Publications (1)

Publication Number Publication Date
CN114331441A true CN114331441A (en) 2022-04-12

Family

ID=81025927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210035493.7A Pending CN114331441A (en) 2021-01-26 2022-01-13 Data tracing and circulating method and system based on network trust

Country Status (1)

Country Link
CN (1) CN114331441A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305218A (en) * 2023-05-17 2023-06-23 国网浙江省电力有限公司物资分公司 Data link tracking and data updating method, device and data management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305218A (en) * 2023-05-17 2023-06-23 国网浙江省电力有限公司物资分公司 Data link tracking and data updating method, device and data management system
CN116305218B (en) * 2023-05-17 2023-08-11 国网浙江省电力有限公司物资分公司 Data link tracking and data updating method, device and data management system

Similar Documents

Publication Publication Date Title
CN109829326B (en) Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain
WO2020207233A1 (en) Permission control method and apparatus for blockchain
CN111461723B (en) Data processing system, method and device based on block chain
KR102566892B1 (en) Blockchain consensus method, device and system
CN110958111B (en) Block chain-based identity authentication mechanism of electric power mobile terminal
US8813243B2 (en) Reducing a size of a security-related data object stored on a token
US11546348B2 (en) Data service system
US20230316273A1 (en) Data processing method and apparatus, computer device, and storage medium
CN113271311B (en) Digital identity management method and system in cross-link network
CN110177109B (en) Double-proxy cross-domain authentication system based on identification password and alliance chain
CN112835977B (en) Database management method and system based on block chain
CN112702402A (en) System, method, device, processor and storage medium for realizing government affair information resource sharing and exchange based on block chain technology
WO2022193984A1 (en) Cross-chain data transmission method and apparatus, and computer device, storage medium and computer program product
US8799630B2 (en) Advanced security negotiation protocol
CN113824563A (en) Cross-domain identity authentication method based on block chain certificate
CN114640473A (en) Cross-data center access control method and system based on block chain and ABAC
Tapas et al. Blockchain-based publicly verifiable cloud storage
CN114331441A (en) Data tracing and circulating method and system based on network trust
CN111914272B (en) Encryption retrieval method and system for origin data in mobile edge computing environment
CN114172730A (en) Chain-crossing method and intermediate system for combining file block chains on chain and under chain
Papadopoulos et al. Separating authentication from query execution in outsourced databases
JP5620999B2 (en) System and method for accessing private digital content
CN116383241A (en) Index updating and query processing collaborative optimization system and method based on multi-granularity lock
Weixian et al. Design of Collaborative Control Scheme between On-chain and Off-chain Power Data
CN113836573A (en) User information processing method and device based on distributed storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Wei Lian

Inventor after: Wang Xiaowen

Inventor after: Guo Hongjie

Inventor after: Yan Shuo

Inventor after: Du Xiaojian

Inventor after: Chen Zhengyu

Inventor after: Hong Zhangyang

Inventor after: Xie Yunguang

Inventor after: Huang Bingyu

Inventor after: Huang He

Inventor before: Chen Zhengyu

Inventor before: Hong Zhangyang

Inventor before: Huang Bingyu

Inventor before: Huang He

Inventor before: Xie Yunguang

Inventor before: Wang Xiaowen

CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Guo Hongjie

Inventor after: Wang Xiaowen

Inventor after: Wei Lian

Inventor after: Yan Shuo

Inventor after: Du Xiaojian

Inventor after: Chen Zhengyu

Inventor after: Hong Zhangyang

Inventor after: Xie Yunguang

Inventor after: Huang Bingyu

Inventor after: Huang He

Inventor before: Wei Lian

Inventor before: Wang Xiaowen

Inventor before: Guo Hongjie

Inventor before: Yan Shuo

Inventor before: Du Xiaojian

Inventor before: Chen Zhengyu

Inventor before: Hong Zhangyang

Inventor before: Xie Yunguang

Inventor before: Huang Bingyu

Inventor before: Huang He

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240113

Address after: Room 608, Building 6, No. 58 Sanlihe Road, Xicheng District, Beijing, 100032

Applicant after: Beijing Guoxin Jingning Information Security Technology Co.,Ltd.

Address before: 350000 13th floor, building 5, f District, software park, 89 software Avenue, Gulou District, Fuzhou City, Fujian Province

Applicant before: EVECOM INFORMATION TECHNOLOGY DEVELOPMENT Co.,Ltd.