CN114978651A - Privacy calculation evidence storage method and device, electronic equipment and storage medium - Google Patents

Privacy calculation evidence storage method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114978651A
CN114978651A CN202210529552.6A CN202210529552A CN114978651A CN 114978651 A CN114978651 A CN 114978651A CN 202210529552 A CN202210529552 A CN 202210529552A CN 114978651 A CN114978651 A CN 114978651A
Authority
CN
China
Prior art keywords
node
task
information
privacy
computation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210529552.6A
Other languages
Chinese (zh)
Other versions
CN114978651B (en
Inventor
李露
高谦
苗守野
马红兵
李红五
李福昌
贺琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210529552.6A priority Critical patent/CN114978651B/en
Publication of CN114978651A publication Critical patent/CN114978651A/en
Application granted granted Critical
Publication of CN114978651B publication Critical patent/CN114978651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses privacy computation evidence storing method, device, electronic equipment and storage medium, relates to the technical field of communication, and is used for solving the problems that benefit distribution in the privacy computation process is unbalanced and the behavior of each participated node of the privacy computation cannot be normalized effectively when the privacy computation is combined with a block chain technology in the current stage, and the method comprises the following steps: the first node determines task characteristic information; the first node sends task characteristic information to the block chain nodes; a first node sends a privacy calculation request to a second node; the first node receives first indication information from the block chain node and determines first feedback information according to the first indication information; the first feedback information is used for indicating the blockchain node to determine a payment strategy; the first node sends first feedback information to the block link points. The method and the device are used for storing the certificate of the privacy calculation on the block chain.

Description

Privacy calculation evidence storage method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for storing a certificate in a private computing system, an electronic device, and a storage medium.
Background
The privacy calculation is a technical system for realizing data value mining on the premise of providing privacy protection. In the face of a data calculation participating node or an attacker intending to steal information, the privacy protection calculation technology can realize calculation of data in an encrypted state or a non-transparent state so as to achieve the purpose of privacy protection of each participating node.
At present, in an upper-layer application scenario in the blockchain technology, a blockchain user does not want to expose private information of the blockchain user, and for such a situation, the existing scheme combines privacy calculation and the blockchain technology together to provide a safe and private solution for the upper-layer application scenario of the blockchain.
However, in the existing scheme, the task completion condition of each node participating in privacy calculation is not stored, and the problem that the task completion condition statistics is unclear exists, so that the benefit distribution in the privacy calculation process is unbalanced. In addition, the existing scheme does not monitor and manage the abnormal state of the privacy computation task on the block chain, and the behavior of each node participating in the privacy computation cannot be effectively normalized.
Disclosure of Invention
The application provides a privacy calculation evidence storing method and device, electronic equipment and a storage medium, and can solve the problems that benefit distribution in the privacy calculation process is unbalanced and behaviors of all participated nodes of the privacy calculation cannot be effectively normalized when the privacy calculation and a block chain technology are combined and applied at the present stage.
In order to achieve the purpose, the following technical scheme is adopted in the application:
in a first aspect, the present application provides a method for storing certificates by private computing, including: the first node determines task characteristic information; the first node is a node initiating a privacy calculation task, and the task characteristic information is the characteristic information of the privacy calculation task; the first node sends task characteristic information to the block chain nodes; a first node sends a privacy calculation request to a second node; the second node is a node participating in a privacy calculation task, the privacy calculation request is used for indicating the second node to participate in the privacy calculation task, and the privacy calculation request comprises task characteristic information; the first node receives first indication information from the block chain node and determines first feedback information according to the first indication information; the first indication information is used for indicating the first node to determine first feedback information, and the first feedback information is used for indicating the blockchain node to determine a payment strategy; the first node sends first feedback information to the block link points.
Based on the technical scheme, the first node starts a privacy calculation process by sending a privacy calculation request to the second node, and the second node judges whether the privacy calculation request passes or not according to the characteristic information of the privacy calculation task included in the privacy calculation request and the characteristic information of the privacy calculation task acquired from the block link point; after that, the second node sends the result information of the privacy calculation task to the blockchain node for evidence storage, so that the blockchain node can initiate a payment strategy making process and a supervision process of the first node and the second node. Therefore, according to the technical scheme provided by the application, the characteristic information and the result information related to the task in the privacy calculation process are uploaded to the block chain, so that balanced benefit distribution and standard management are performed on each participating node in the privacy calculation process.
In a possible implementation manner, the task feature information includes one or more of the following items: and data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task.
In a second aspect, the present application provides a method for storing certificates by private computing, including: the second node receives a privacy computation request from the first node; the second node is a node participating in a privacy calculation task, the privacy calculation request is used for indicating the second node to participate in the privacy calculation task, the privacy calculation request comprises task characteristic information, and the task characteristic information is used for representing the characteristic information of the privacy calculation task; the second node judges whether the privacy calculation request passes or not according to task characteristic information included in the privacy calculation request; if the privacy calculation request passes, the second node sends calculation result information of the privacy calculation task to the block chain node; the second node receives second indication information from the block chain node and determines second feedback information according to the second indication information; the second indication information is used for indicating the second node to determine second feedback information, and the second feedback information is used for indicating the blockchain node to determine a payment strategy; and the second node sends second feedback information to the block chain node.
In a possible implementation manner, the task feature information includes one or more of the following items: data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task; the computing result information of the private computing task includes one or more of: the method comprises the steps that corresponding log hash values of privacy calculation tasks, task states, calculation results, target data using modes, target data volumes, target data calling times and target data calling results are obtained; the target data are data required by the private computing task.
In a possible implementation manner, the determining, by the second node, whether the privacy computation request passes according to task feature information included in the privacy computation request specifically includes: the second node sends a verification information acquisition request to the block link point, wherein the verification information acquisition request is used for requesting to acquire verification information of the task characteristic information; the second node receives verification information of task characteristic information from the blockchain node; and the second node judges whether the privacy calculation request passes or not according to the task characteristic information and the verification information of the task characteristic information.
In a possible implementation manner, the method further includes: and if the privacy calculation request is not passed, the second node sends request failure information of the privacy calculation task to the block chain node.
In addition, for technical effects of the privacy calculation evidence storing method of the second aspect, reference may be made to the technical effects of the privacy calculation evidence storing method of the first aspect, which are not described herein again.
In a third aspect, the present application provides a privacy computing evidence storing method, including: the block chain node receives task characteristic information from the first node; the first node is a node initiating a privacy calculation task, and the task characteristic information is used for representing the characteristic information of the privacy calculation task; the block chain node receives the calculation result information of the privacy calculation task from the second node; the second node is a node participating in a privacy calculation task; the block chain node sends first indication information to a first node; the first indication information is used for indicating the first node to determine first feedback information, and the first feedback information is used for indicating the blockchain node to determine a payment strategy; the block chain node sends second indication information to the second node; the second indication information is used for indicating the second node to determine second feedback information, and the second feedback information is used for indicating the blockchain node to determine a payment strategy; the block chain node receives first feedback information from a first node; the block chain node receives second feedback information from the second node; the block chain node determines a payment strategy according to the first feedback information and the second feedback information; the block chain node determines the credit levels of the first node and the second node according to the calculation result information of the privacy calculation task; and the block chain node supervises the first node and the second node according to the credit levels of the first node and the second node.
In a possible implementation manner, the block link node supervises the first node and the second node according to credit levels of the first node and the second node, and specifically includes: if the credit level of the first node is higher than or equal to the preset credit level, allowing the first node to initiate a privacy calculation task by the block link point; if the credit level of the first node is lower than the preset credit level, the block chain node prohibits the first node from initiating a privacy calculation task; if the credit level of the second node is higher than or equal to the preset credit level, allowing the second node to participate in the privacy calculation task by the block link point; and if the credit level of the second node is lower than the preset credit level, the block link point forbids the second node to participate in the privacy calculation task.
In a possible implementation manner, the method further includes: the block link node receives a verification information acquisition request from the second node, wherein the verification information acquisition request is used for requesting to acquire verification information of the task characteristic information; and the block chain node sends the verification information of the task characteristic information to the second node.
In a possible implementation manner, the task feature information includes one or more of the following items: data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task; the computing result information of the private computing task includes one or more of: the method comprises the steps that corresponding log hash values of privacy calculation tasks, task states, calculation results, target data using modes, target data volumes, target data calling times and target data calling results are obtained; the target data is data required by the privacy calculation task.
In addition, for the technical effect of the privacy calculation evidence storing method according to the third aspect, reference may be made to the technical effect of the privacy calculation evidence storing method according to the first aspect, and details are not repeated here.
In a fourth aspect, the present application provides a privacy computing credentialing apparatus comprising: the privacy computing storage device includes: a processing unit, a transmitting unit and a receiving unit; the processing unit is used for determining task characteristic information; the first node is a node initiating a privacy calculation task, and the task characteristic information is the characteristic information of the privacy calculation task; the sending unit is used for sending the task characteristic information to the block link points; the sending unit is also used for sending a privacy calculation request to the second node; the second node is a node participating in a privacy calculation task, the privacy calculation request is used for indicating the second node to participate in the privacy calculation task, and the privacy calculation request comprises task characteristic information; the receiving unit is used for receiving first indication information from the block chain node and determining first feedback information according to the first indication information; the first indication information is used for indicating the first node to determine first feedback information, and the first feedback information is used for indicating the block chain node to determine a payment strategy; and the sending unit is also used for sending the first feedback information to the block chain nodes.
In a possible implementation manner, the task feature information includes one or more of the following items: and data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task.
In addition, for technical effects of the privacy computing evidence storing apparatus of the fourth aspect, reference may be made to the technical effects of the privacy computing evidence storing method of the first aspect, which are not described herein again.
In a fifth aspect, the present application provides a privacy computing credentialing apparatus comprising: a receiving unit, a processing unit and a transmitting unit; a receiving unit configured to receive a privacy computation request from a first node; the second node is a node participating in a privacy calculation task, the privacy calculation request is used for indicating the second node to participate in the privacy calculation task, the privacy calculation request comprises task characteristic information, and the task characteristic information is used for representing the characteristic information of the privacy calculation task; the processing unit is used for judging whether the privacy calculation request passes or not according to the task characteristic information included in the privacy calculation request; the processing unit is also used for sending the calculation result information of the privacy calculation task to the block chain nodes when the privacy calculation request passes; the receiving unit is further used for receiving second indication information from the block chain node and determining second feedback information according to the second indication information; the second indication information is used for indicating the second node to determine second feedback information, and the second feedback information is used for indicating the blockchain node to determine a payment strategy; and the sending unit is used for sending the second feedback information to the block chain nodes.
In a possible implementation manner, the task feature information includes one or more of the following items: data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task; the computing result information of the private computing task includes one or more of: the method comprises the steps that corresponding log hash values of privacy calculation tasks, task states, calculation results, target data using modes, target data volumes, target data calling times and target data calling results are obtained; the target data is data required by the privacy calculation task.
In a possible implementation manner, the sending unit is further configured to send a verification information obtaining request to the block link node, where the verification information obtaining request is used to request to obtain verification information of the task feature information; the receiving unit is also used for receiving verification information of the task characteristic information from the blockchain node; and the processing unit is also used for judging whether the privacy calculation request passes according to the task characteristic information and the verification information of the task characteristic information.
In a possible implementation manner, the processing unit is further configured to send request failure information of the privacy computation task to the block node when the privacy computation request fails.
In addition, for technical effects of the privacy computing evidence storing device of the fifth aspect, reference may be made to the technical effects of the privacy computing evidence storing method of the first aspect, which are not described herein again.
In a sixth aspect, the present application provides a privacy computing credentialing apparatus comprising: a receiving unit, a transmitting unit and a processing unit; a receiving unit, configured to receive task characteristic information from a first node; the first node is a node initiating a privacy calculation task, and the task characteristic information is used for representing the characteristic information of the privacy calculation task; the receiving unit is further used for receiving the calculation result information of the private calculation task from the second node; the second node is a node participating in a privacy calculation task; a sending unit, configured to send first indication information to a first node; the first indication information is used for indicating the first node to determine first feedback information, and the first feedback information is used for indicating the block chain node to determine a payment strategy; the sending unit is also used for sending second indication information to the second node; the second indication information is used for indicating the second node to determine second feedback information, and the second feedback information is used for indicating the blockchain node to determine a payment strategy; the receiving unit is further used for receiving first feedback information from the first node; a receiving unit, further configured to receive second feedback information from the second node; the processing unit is used for determining a payment strategy according to the first feedback information and the second feedback information; the processing unit is further used for determining the credit levels of the first node and the second node according to the calculation result information of the privacy calculation task; and the processing unit is also used for supervising the first node and the second node according to the credit levels of the first node and the second node.
In a possible implementation manner, the processing unit is further configured to allow the first node to initiate a privacy computation task when the credit level of the first node is higher than or equal to a preset credit level; the processing unit is further used for forbidding the first node to initiate a privacy calculation task when the credit level of the first node is lower than a preset credit level; the processing unit is further used for allowing the second node to participate in the privacy calculation task when the credit level of the second node is higher than or equal to the preset credit level; and the processing unit is further used for forbidding the second node to participate in the privacy calculation task when the credit level of the second node is lower than the preset credit level.
In a possible implementation manner, the receiving unit is further configured to receive an authentication information acquisition request from the second node, where the authentication information acquisition request is used to request to acquire authentication information of the task feature information; and the sending unit is also used for sending the verification information of the task characteristic information to the second node.
In a possible implementation manner, the task feature information includes one or more of the following items: data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task; the computing result information of the private computing task includes one or more of: the method comprises the steps that corresponding log hash values of privacy calculation tasks, task states, calculation results, target data using modes, target data volumes, target data calling times and target data calling results are obtained; the target data is data required by the privacy calculation task.
In addition, for the technical effect of the privacy computing evidence storing apparatus according to the sixth aspect, reference may be made to the technical effect of the privacy computing evidence storing method according to the first aspect, and details are not repeated here.
In a seventh aspect, the present application provides a computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device of the present application, cause the electronic device to perform the privacy computation evidence keeping method as described in the first aspect and any possible implementation manner of the first aspect.
In an eighth aspect, the present application provides an electronic device, comprising: a processor and a memory; wherein the memory is used for storing one or more programs, the one or more programs comprising computer executable instructions, which when executed by the processor, cause the electronic device to perform the method of privacy computation attestation as described in the first aspect and any one of the possible implementations of the first aspect.
In a ninth aspect, the present application provides a computer program product comprising instructions that, when run on a computer, cause an electronic device of the present application to perform the privacy computing attestation method as described in the first aspect and any one of the possible implementations of the first aspect.
In a tenth aspect, the present application provides a chip system, which is applied to a privacy computing evidence storing device; the chip system includes one or more interface circuits, and one or more processors. The interface circuit and the processor are interconnected through a line; the interface circuit is to receive a signal from a memory of the privacy computing credentialing apparatus and to send the signal to the processor, the signal comprising computer instructions stored in the memory. When the processor executes the computer instructions, the privacy computational credentialing device executes the privacy computational credentialing method of the first aspect and any possible design thereof.
In the present application, the names of the above-mentioned privacy computing evidence storing devices do not constitute limitations on the devices or functional units themselves, which may appear by other names in actual implementations. Insofar as the functions of the respective devices or functional units are similar to those of the present application, they are within the scope of the claims of the present application and their equivalents.
Drawings
Fig. 1 is a schematic architecture diagram of a private computing and evidence storing system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a privacy computing authentication method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another privacy computing authentication method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a privacy computing evidence storing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another privacy computing evidence storing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another privacy computing evidence storing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another privacy computing evidence storing apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship. For example, A/B may be understood as A or B.
The terms "first" and "second" in the description and claims of the present application are used for distinguishing between different objects and not for describing a particular order of the objects. For example, the first edge service node and the second edge service node are used for distinguishing different edge service nodes, and are not used for describing the characteristic sequence of the edge service nodes.
Furthermore, the terms "including" and "having," and any variations thereof, as referred to in the description of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In addition, in the embodiments of the present application, words such as "exemplarily" or "for example" are used for indicating as examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "such as" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "e.g.," is intended to present concepts in a concrete fashion.
The block chain is a technical system which is jointly maintained by multiple parties, stores data in a block chain structure, uses cryptography to ensure transmission and access safety, and can realize consistent storage of the data and cannot be tampered. Specifically, a blockchain is a permanent, non-reversible modified data record generated by superimposing encrypted data or blocks in chronological order. From a technical level, the blockchain involves many scientific and technical problems such as mathematics, cryptography, internet and computer programming. From the application aspect, the blockchain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace leaving in the whole process, traceability, collective maintenance, openness and transparency and the like.
The privacy calculation is a technical system for realizing data value mining on the premise of providing privacy protection. In the face of each participating node of data calculation or an attacker intending to steal information, the privacy calculation technology can realize calculation of data related to calculation in an encrypted state or a non-transparent state so as to achieve the purpose of privacy protection of each participating node. The block chain has the advantages that data is open, transparent and shared, but some block chain users do not want to expose their private information for the upper application scenes of the block chain. For such situations, the existing solution combines privacy computation and a blockchain technique, and provides a safe and private solution for an upper application scenario of a blockchain.
Exemplarily, the prior art provides a block chain-based distributed privacy computing method and device, and the device is designed as a block chain infrastructure layer, a distributed parallel computing layer and an interface display layer, and the technical scheme includes that a computing request client issues a computing task and decomposes the computing task; the task distribution module distributes tasks, and the computing node returns a task claim confirmation message; the calculation request client side compiles a benefit distribution intelligent contract; the computing node downloads the training model for training and returns the result to the computing request client; the safety verification module verifies the result returned by the computing node and fuses the result to obtain a final federal model; the intelligent contract distributes benefits to each computing node by using a benefit distribution function.
The existing scheme has the following defects: firstly, in the scheme, benefit distribution is carried out on each computing node by calling a distribution function through an intelligent contract, and the intelligent contract for writing the benefit distribution is formulated according to the benefit distribution function and the contribution amount of each computing node. However, the contribution amount of each computing node does not store the task completion condition, so that the problem of unclear task completion condition statistics exists, and the benefit distribution in the privacy computing process is unbalanced. Secondly, the abnormal state of the privacy computation task on the block chain is not monitored and managed in the scheme, and the behavior of each node participating in the privacy computation cannot be effectively normalized.
Therefore, in summary, in the current technical solution of combining the blockchain and the privacy computation, it is mainly concerned that how the privacy computation itself provides a computing environment with privacy security, or only the blockchain intelligent contract is used to distribute benefits to each node, and the non-tamper property of the blockchain is not used to supervise and audit all parties of the privacy computation, nor is the usage amount of the data stored to implement subsequent mechanisms such as pricing and charging, and further supervision and fine management on the data usage are lacked.
In order to solve the problems that benefit distribution is unbalanced and behaviors of all participated nodes of privacy calculation cannot be effectively normalized when the privacy calculation is combined with a block chain technology in the current stage, the privacy calculation evidence storage method is provided so as to achieve balanced benefit distribution and normalized management of all participated nodes in the privacy calculation process.
Illustratively, as shown in fig. 1, a system architecture diagram of a private computing presence system is provided herein. The privacy computing verification system 10 includes: a first node 11, a second node 12, a block link point 13.
The first node 11 is a node initiating a privacy computation task in a privacy computation process. Specifically, the first node 11 starts the privacy calculation process by sending a privacy calculation request to the second node 12. Meanwhile, the first node 11 sends task feature information of the private computation task to the block link node.
The second node 12 is a node participating in the privacy computation task in the privacy computation process. Correspondingly, after receiving the privacy computation request sent by the first node 11, the second node 12 authenticates the privacy computation request by acquiring the task feature information of the privacy computation task stored on the blockchain node 13, and participates in the privacy computation task if the authentication is passed. It should be noted that after participating in the privacy computation task, the second node 12 uploads the relevant result information of the privacy computation task to the blockchain node 13.
And the block chain node 13 is used for storing task characteristic information of the privacy calculation task and result information of the privacy calculation, and bearing the responsibility of determining a payment strategy to realize balanced benefit distribution. In addition, the block link point 13 determines the credit level of each participating node according to the stored historical privacy calculation result information, so as to supervise each participating node and realize the standard management in the privacy calculation process.
In different application scenarios, the first node 11, the second node 12, and the block chain node 13 may be disposed in different devices included in the privacy computing deposit system 10, or may be integrated in the same device included in the privacy computing deposit system 10, which is not specifically limited in this application.
When the first node 11, the second node 12 and the block link point 13 are integrated in the same device in the privacy computing and evidence storing system 10, the communication mode among the first node 11, the second node 12 and the block link point 13 is the communication among internal modules of the device. In this case, the communication flow among the three nodes is the same as "the communication flow among the three nodes when the first node 11, the second node 12, and the block link point 13 are independent of each other".
The system architecture of the privacy computing evidence storing method provided by the application is introduced above.
The technical solution provided by the present application is specifically explained below with reference to the drawings of the specification.
Illustratively, as shown in fig. 2, the privacy computing evidence storing method provided by the present application specifically includes the following steps S201 to S213:
it should be noted that, in the privacy computing and evidence storing scheme provided in the present application, the number of the second nodes may be multiple. In fig. 2, the number of the second nodes is only one for exemplary illustration, and does not represent that the technical solution of the present application is only applicable to the case where the number of the second nodes is only one.
S201, the first node determines task characteristic information.
The first node is a node initiating a privacy computation task. The task characteristic information is the characteristic information of the privacy computation task. It is understood that the privacy computation task herein is a computation task involved in providing privacy computation services for blockchain users when combining blockchain and privacy computation technologies.
Optionally, the task feature information of the privacy computation task may include one or more of: and data description information, a timestamp, a participating node name and configuration parameter information of the privacy calculation task.
S202, the first node sends task characteristic information to the block chain nodes. Accordingly, the block link node receives task feature information from the first node.
The first node sends the task feature information to the blockchain link point, so as to verify the feature information of the privacy computation task on the blockchain. In this way, other privacy computation participating nodes can download the task feature information through the block chain nodes, and compare the task feature information with the received task feature information from the first node, so as to facilitate the privacy computation request through the first node when the two feature information are consistent.
S203, the first node sends a privacy calculation request to the second node. Accordingly, the second node receives a privacy computation request from the first node.
And the second node is a node participating in the privacy calculation task. The privacy computation request is a request message initiated by the first node for instructing the second node to participate in the privacy computation task. Wherein the privacy computation request comprises task characteristic information of the privacy computation task,
s204, the second node judges whether the privacy calculation request passes according to task characteristic information included in the privacy calculation request.
In one possible implementation, the second node compares the received task characteristic information from the first node with the task characteristic information of the privacy computation task downloaded from the block link point. Further, if the comparison result is inconsistent, the second node determines that the privacy computation request fails, and executes the following step S205; if the comparison result is consistent, the second node determines that the privacy computation request passes, and then executes the following step S206.
S205, the second node sends the request failure information of the privacy computation task to the block chain node. Accordingly, the tile chain node receives request failure information for the private computing task from the second node.
Optionally, the second node generates request failure information of the privacy computation task after determining that the privacy computation request fails. The request failure information records a judgment process that the second node fails to pass the privacy calculation request. Illustratively, the request failure information may be a kind of log information.
S206, the second node sends the calculation result information of the privacy calculation task to the block chain nodes. Accordingly, the tile chain node receives the computation result information of the private computation task from the second node.
Optionally, after determining that the privacy computation request passes, the second node participates in executing the corresponding privacy computation task, records the computation result of the privacy computation task, and generates the computation result information.
Optionally, the computation result information of the privacy computation task comprises one or more of: the corresponding log hash value, the task state, the calculation result, the target data use mode, the target data volume, the target data calling times and the target data calling result of the privacy calculation task; and the target data is data required by the privacy calculation task.
It can be understood that the second node uploads the calculation result information of the privacy calculation task to the block chain node, so as to perform a higher-reliability evidence storage on the privacy calculation process. And the subsequent block chain node can conveniently carry out trust rating on the first node and the second node according to the calculation result information, so that the first node and the second node can be supervised, and the behavior of each participating node in privacy calculation can be normalized.
S207, the block chain link point sends first indication information to the first node. Accordingly, the first node receives the first indication information from the blockchain node.
The first indication information is used for indicating the first node to determine first feedback information, and the first feedback information is used for indicating the blockchain node to make a payment strategy.
S208, the first node sends the first feedback information to the block chain node. Accordingly, the block link node receives the first feedback information.
In one possible implementation, the block chain node sends first indication information for making a payment policy to the first node based on a consensus mechanism in the block chain technology. Correspondingly, after receiving the first indication information, the first node performs voting operation on the payment policy based on a consensus mechanism in the blockchain technology, and generates first feedback information based on the voting operation. After that, the first node sends the first feedback information to the blockchain node so that the blockchain node acquires the voting opinions of the first node on the payment strategy.
In another possible implementation, the first node may preset factors that affect the payment policy. For example, the first node presets factors influencing the payment policy, which may include: providing credit levels of the participating nodes of the target data, a target data using mode, a target data amount, target data calling times and a target data calling result; and the target data is data required by the privacy calculation task. In this way, after receiving the first indication information, the first node may determine the first feedback information according to a preset factor affecting the payment policy, so that the blockchain node obtains the voting opinion of the first node on the payment policy.
S209, the block chain node sends second indication information to the second node. Accordingly, the second node receives second indication information from the blockchain node.
The second indication information is used for indicating the second node to determine second feedback information, and the second feedback information is used for indicating the blockchain node to make a payment strategy.
S210, the second node sends second feedback information to the block chain node. Accordingly, the blockchain node receives the second feedback information.
In one possible implementation, the block link point sends the second indication information for making the payment policy to the second node based on a consensus mechanism and an intelligent contract in the block chain technology. Correspondingly, after receiving the second indication information, the second node performs voting operation on the payment policy based on a consensus mechanism in the blockchain technology, and generates second feedback information based on the voting operation. After that, the second node sends the second feedback information to the blockchain node so that the blockchain node acquires the voting opinions of the second node on the payment strategy.
In another possible implementation, the second node may preset factors that affect the payment policy. For example, the second node presets factors influencing the payment policy, which may include: providing credit levels of the participating nodes of the target data, a target data using mode, a target data amount, target data calling times and a target data calling result; and the target data is data required by the privacy calculation task. In this way, after receiving the second indication information, the second node may determine the second feedback information according to a preset factor affecting the payment policy, so that the blockchain node obtains the voting opinion of the second node on the payment policy.
S211, determining a payment strategy by the block chain node according to the first feedback information and the second feedback information.
It is understood that, as described in the foregoing S208 and S210, after receiving the first feedback information of the first node and the second feedback information of the second node, the blockchain node determines the final payment policy according to the voting opinions of the first node and the second node on the payment policy. It should be noted that, the specific block link points determine the final payment policy according to the voting opinions of the first node and the second node on the payment policy based on the consensus mechanism, which is the prior art and is not described herein again in this embodiment.
It should be noted that, through the above S208-S211, the first node, the second node, and the block link point jointly make a payment policy in the privacy computation process through signaling interaction. In addition, the first node, the second node and the block chain nodes can automatically adjust the pricing of the target data in the payment strategy according to the related information of the historical privacy calculation tasks recorded on the block chain through intelligent contracts. Or the first node, the second node and the block link point can automatically complete the payment of the target data through an intelligent contract. Alternatively, the incentive mechanism may be set in the blockchain, so that the participating nodes providing the high quality target data can obtain more benefits.
S212, determining the credit levels of the first node and the second node by the block link points according to the calculation result information of the privacy calculation task.
Illustratively, the credit levels of the first node and the second node may be divided into a high credit level, a medium credit level and a low credit level. The present embodiment is not limited to the classification of the specific credit level.
It should be noted that, a specific method for determining, by the block node, the credit levels of the first node and the second node according to the calculation result information of the privacy calculation task is the prior art, and this embodiment is not described again.
And S213, the block link point supervises the first node and the second node according to the credit levels of the first node and the second node.
Optionally, a preset credit level is preset for the block link point, the credit levels of the first node and the second node are compared with the preset credit level, and the first node and the second node are supervised according to the comparison result, specifically as follows:
if the credit level of the first node is higher than or equal to the preset credit level, allowing the first node to initiate a privacy calculation task by the block link point;
if the credit level of the first node is lower than the preset credit level, the block chain node prohibits the first node from initiating a privacy calculation task;
if the credit level of the second node is higher than or equal to the preset credit level, allowing the second node to participate in the privacy calculation task by the block link point;
and if the credit level of the second node is lower than the preset credit level, the block link point forbids the second node to participate in the privacy calculation task.
Alternatively, the block link point may set different preset credit levels according to the credit levels of the first node and the second node.
Optionally, the blockchain node stores the result of the policing of the credit levels of the first node and the second node in a blockchain database.
Based on the technical scheme, in the embodiment of the application, the first node starts a privacy calculation process by sending a privacy calculation request to the second node, and the second node judges whether the privacy calculation request passes or not according to the feature information of the privacy calculation task included in the privacy calculation request and the feature information of the privacy calculation task acquired from the block link point; after that, the second node sends the result information of the privacy calculation task to the blockchain node for evidence storage, so that the blockchain node can initiate a payment strategy making process and a supervision process of the first node and the second node. Therefore, according to the technical scheme provided by the application, the characteristic information and the result information related to the task in the privacy calculation process are uploaded to the block chain, so that balanced benefit distribution and standard management are performed on each participating node in the privacy calculation process.
Exemplarily, with reference to fig. 2 and as shown in fig. 3, in the privacy computing and evidence storing method provided by the present application, S204 specifically includes the following S301 to S303:
s301, the second node sends a verification information acquisition request to the block link node. Accordingly, the block link node receives the authentication information acquisition request from the second node.
The verification information acquisition request is used for the second node to request the verification information of acquiring the task characteristic information from the block link node.
S302, the block chain node sends verification information of the task characteristic information to the second node. Correspondingly, the second node receives verification information of the task characteristic information from the blockchain node.
It is to be understood that the verification information of the task characteristic information here may be a hash value of the task characteristic information from the first node stored in the blockchain, or may also be the task characteristic information itself from the first node stored in the blockchain, and this embodiment is not particularly limited.
And S303, the second node judges whether the privacy calculation request passes according to the task characteristic information and the verification information of the task characteristic information.
Optionally, in a case that the verification information of the task feature information received by the second node is a hash value of the task feature information from the first node stored in a block chain, the second node first determines the hash value of the task feature information received by the second node from the first node; and then, the second node compares the two hash values, and if the hash values are consistent, the privacy calculation request is judged to pass.
Optionally, when the verification information of the task feature information received by the second node is the task feature information itself from the first node stored in the blockchain, the second node compares the received task feature information from the first node with the verification information of the task feature information item by item, and if all the data are the same, it is determined that the privacy computation request passes.
In the embodiment of the present application, the privacy computing and evidence storing device may be divided into the functional modules or the functional units according to the above method examples, for example, each functional module or functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module may be implemented in a form of hardware, or may be implemented in a form of a software functional module or a functional unit. The division of the modules or units in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Exemplarily, as shown in fig. 4, a schematic diagram of a possible structure of a privacy computing evidence storing apparatus according to an embodiment of the present application is shown. The privacy computing authentication apparatus 400 includes: a processing unit 401, a transmitting unit 402 and a receiving unit 403.
The processing unit 401 is configured to determine task characteristic information.
A sending unit 402, configured to send task characteristic information to the block nodes.
A sending unit 402, configured to send a privacy computation request to the second node.
A receiving unit 403, configured to receive first indication information from a blockchain node, and determine first feedback information according to the first indication information.
The sending unit 402 is further configured to send the first feedback information to the block link point.
Optionally, the privacy computing certification device 400 may further include a storage unit (shown by a dashed box in fig. 4) that stores a program or instructions, which when executed by the processing unit 401, enables the privacy computing certification device to execute the privacy computing certification method according to the above method embodiment.
In addition, for the technical effect of the privacy computing evidence storing apparatus described in fig. 4, reference may be made to the technical effect of the privacy computing evidence storing method described in the foregoing embodiment, and details are not repeated here.
Exemplarily, as shown in fig. 5, a schematic diagram of a possible structure of another privacy computing evidence storing apparatus according to an embodiment of the present application is shown. The privacy computing authentication apparatus 500 includes: a receiving unit 501, a processing unit 502 and a transmitting unit 503.
The receiving unit 501 is configured to receive a privacy computation request from a first node.
The processing unit 502 is configured to determine whether the privacy computation request passes according to task feature information included in the privacy computation request.
The processing unit 502 is further configured to send calculation result information of the privacy calculation task to the block nodes when the privacy calculation request passes.
The receiving unit 501 is further configured to receive second indication information from the blockchain node, and determine second feedback information according to the second indication information.
A sending unit 503, configured to send the second feedback information to the block link point.
Optionally, the sending unit 503 is further configured to send the verification information acquisition request to the block link point.
Optionally, the receiving unit 501 is further configured to receive verification information of task feature information from a blockchain node.
Optionally, the processing unit 502 is further configured to determine whether the privacy computation request passes according to the task feature information and the verification information of the task feature information.
Optionally, the processing unit 502 is further configured to send request failure information of the privacy computation task to the block node when the privacy computation request fails.
Optionally, the privacy computing certification device 500 may further include a storage unit (shown by a dashed box in fig. 5) that stores a program or instructions, which when executed by the processing unit 501, enables the privacy computing certification device to execute the privacy computing certification method according to the above method embodiment.
In addition, for technical effects of the privacy calculation evidence storing device described in fig. 5, reference may be made to technical effects of the privacy calculation evidence storing method described in the foregoing embodiment, which is not described herein again.
Exemplarily, as shown in fig. 6, a schematic diagram of a possible structure of another privacy computing evidence storing apparatus according to an embodiment of the present application is shown. The privacy computing authentication apparatus 600 includes: a receiving unit 601, a transmitting unit 602 and a processing unit 603.
The receiving unit 601 is configured to receive task characteristic information from a first node.
The receiving unit 601 is further configured to receive calculation result information of the privacy calculation task from the second node.
A sending unit 602, configured to send the first indication information to the first node.
The sending unit 602 is further configured to send second indication information to the second node.
The receiving unit 601 is further configured to receive the first feedback information from the first node.
The receiving unit 601 is further configured to receive the second feedback information from the second node.
A processing unit 603, configured to determine the payment policy according to the first feedback information and the second feedback information.
The processing unit 603 is further configured to determine credit levels of the first node and the second node according to the calculation result information of the privacy calculation task.
The processing unit 603 is further configured to supervise the first node and the second node according to the credit levels of the first node and the second node.
Optionally, the processing unit 603 is further configured to allow the first node to initiate a privacy computation task when the credit level of the first node is higher than or equal to the preset credit level.
Optionally, the processing unit 603 is configured to prohibit the first node from initiating a privacy computation task when the credit level of the first node is lower than the preset credit level.
Optionally, the processing unit 603 is configured to allow the second node to participate in the privacy computation task when the credit level of the second node is higher than or equal to the preset credit level.
Optionally, the processing unit 603 is configured to prohibit the second node from participating in the privacy computation task when the credit level of the second node is lower than the preset credit level.
Optionally, the receiving unit 601 is further configured to receive an authentication information obtaining request from the second node.
Optionally, the sending unit 602 is further configured to send verification information of the task feature information to the second node.
Optionally, the privacy computing certification device 600 may further include a storage unit (shown by a dashed box in fig. 6) that stores a program or instructions, which when executed by the processing unit 601, enables the privacy computing certification device to execute the privacy computing certification method according to the above method embodiment.
In addition, for the technical effect of the privacy computing evidence storing apparatus described in fig. 6, reference may be made to the technical effect of the privacy computing evidence storing method described in the foregoing embodiment, and details are not repeated here.
Exemplarily, fig. 7 is a schematic structural diagram of still another possible structure of the private computing certificate involved in the foregoing embodiment. As shown in fig. 7, the privacy computing certificate 700 includes: a processor 702.
The processor 702 is configured to control and manage actions of the privacy computing and evidence storing, for example, execute steps executed by the processing unit 401, the sending unit 402, the receiving unit 403, the receiving unit 501, the processing unit 502, the sending unit 503, the receiving unit 601, the sending unit 602, and the processing unit 603, and/or execute other processes of the technical solution described herein.
The processor 702 may be implemented or performed with various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others.
Optionally, the privacy computing certificate 700 may further include a communication interface 703, a memory 701, and a bus 704. The communication interface 703 is used to support communication between the private computing certificate 700 and other network entities. The memory 701 is used for storing program codes and data of the privacy computing evidence.
Memory 701 may be memory in the privacy computing certificate, which may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
The bus 704 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus 704 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 7, but this is not intended to represent only one bus or type of bus.
Through the description of the foregoing embodiments, it will be clear to those skilled in the art that, for convenience and simplicity of description, only the division of the functional modules is illustrated, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the apparatus may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus, and the module described above, reference may be made to the corresponding processes in the foregoing method embodiments, which are not described herein again.
Embodiments of the present application provide a computer program product including instructions, which, when running on an electronic device of the present application, cause the computer to execute the offloading policy determination method according to the above method embodiments.
The embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the computer executes the instructions, the electronic device of the present application executes each step of privacy computation evidence storage execution in the method flow shown in the foregoing method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope disclosed in the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (22)

1. A method for privacy computing credentialing, the method comprising:
the first node determines task characteristic information; the first node is a node initiating a privacy computation task, and the task characteristic information is the characteristic information of the privacy computation task;
the first node sends task characteristic information to the block chain nodes;
the first node sends a privacy computation request to a second node; the second node is a node participating in the privacy computation task, the privacy computation request is used for indicating the second node to participate in the privacy computation task, and the privacy computation request comprises the task characteristic information;
the first node receives first indication information from the block chain node and determines first feedback information according to the first indication information; wherein the first indication information is used for indicating the first node to determine the first feedback information, and the first feedback information is used for indicating the block link point to determine a payment strategy;
the first node sends the first feedback information to the blockchain node.
2. The method of claim 1, wherein the task feature information comprises one or more of: and the data description information, the timestamp, the name of the participating node and the configuration parameter information of the privacy calculation task.
3. A method for privacy computing credentialing, the method comprising:
the second node receives a privacy computation request from the first node; the second node is a node participating in a privacy computation task, the privacy computation request is used for indicating the second node to participate in the privacy computation task, the privacy computation request comprises task characteristic information, and the task characteristic information is used for representing characteristic information of the privacy computation task;
the second node judges whether the privacy calculation request passes or not according to task characteristic information included in the privacy calculation request;
if the privacy calculation request passes, the second node sends calculation result information of the privacy calculation task to the block chain nodes;
the second node receives second indication information from the block chain node and determines second feedback information according to the second indication information; wherein the second indication information is used for indicating the second node to determine the second feedback information, and the second feedback information is used for indicating the block link point to determine a payment strategy;
the second node sends the second feedback information to the block link point.
4. The method of claim 3, wherein the task feature information comprises one or more of: data description information, a timestamp, a participating node name and configuration parameter information of the privacy computation task;
the computation result information of the private computation task comprises one or more of the following items: the corresponding log hash value, the task state, the calculation result, the target data use mode, the target data volume, the target data calling times and the target data calling result of the privacy calculation task; and the target data is data required by the private computing task.
5. The method according to claim 4, wherein the second node determines whether the privacy computation request passes according to task feature information included in the privacy computation request, and specifically includes:
the second node sends a verification information acquisition request to the blockchain node, wherein the verification information acquisition request is used for requesting to acquire verification information of the task characteristic information;
the second node receives verification information of the task characteristic information from the blockchain node;
and the second node judges whether the privacy calculation request passes or not according to the task characteristic information and the verification information of the task characteristic information.
6. The method according to any one of claims 3-5, further comprising:
and if the privacy calculation request is not passed, the second node sends request failure information of the privacy calculation task to the block chain node.
7. A method for privacy computing credentialing, the method comprising:
the block chain node receives task characteristic information from the first node; the first node is a node initiating a privacy computation task, and the task characteristic information is used for representing the characteristic information of the privacy computation task;
the block link node receives calculation result information of the privacy calculation task from a second node; the second node is a node participating in a privacy calculation task;
the block chain node sends first indication information to the first node; wherein the first indication information is used for indicating the first node to determine the first feedback information, and the first feedback information is used for indicating the block link point to determine a payment strategy;
the block chain node sends second indication information to the second node; wherein the second indication information is used for indicating the second node to determine the second feedback information, and the second feedback information is used for indicating the block link point to determine a payment strategy;
the block link node receiving the first feedback information from the first node;
the block link node receives the second feedback information from the second node;
the block chain node determines the payment strategy according to the first feedback information and the second feedback information;
the block chain node determines the credit levels of the first node and the second node according to the calculation result information of the privacy calculation task;
and the block chain node supervises the first node and the second node according to the credit levels of the first node and the second node.
8. The method according to claim 7, wherein the block chain node supervises the first node and the second node according to credit levels of the first node and the second node, and specifically comprises:
if the credit level of the first node is higher than or equal to the preset credit level, the block link node allows the first node to initiate a privacy computation task;
if the credit level of the first node is lower than the preset credit level, the block link node forbids the first node to initiate a privacy calculation task;
if the credit level of the second node is higher than or equal to the preset credit level, allowing the second node to participate in a privacy calculation task by the block chain node;
and if the credit level of the second node is lower than the preset credit level, the block link node forbids the second node to participate in a privacy calculation task.
9. The method of claim 8, further comprising:
the block link node receives a verification information acquisition request from the second node, wherein the verification information acquisition request is used for requesting to acquire verification information of the task characteristic information;
and the block chain node sends verification information of the task characteristic information to the second node.
10. The method of any of claims 7-9, wherein the task feature information includes one or more of: data description information, a timestamp, a participating node name and configuration parameter information of the privacy computation task;
the computation result information of the private computation task comprises one or more of the following items: the corresponding log hash value of the privacy calculation task, the task state, the calculation result, the target data use mode, the target data volume, the target data calling times and the target data calling result; and the target data is data required by the private computing task.
11. A private computing storage, comprising: a processing unit, a transmitting unit and a receiving unit;
the processing unit is used for determining task characteristic information; the first node is a node initiating a privacy computation task, and the task characteristic information is the characteristic information of the privacy computation task;
the sending unit is used for sending task characteristic information to the block link nodes;
the sending unit is further configured to send a privacy computation request to the second node; the second node is a node participating in the privacy computation task, the privacy computation request is used for indicating the second node to participate in the privacy computation task, and the privacy computation request comprises the task characteristic information;
the receiving unit is configured to receive first indication information from the blockchain node, and determine first feedback information according to the first indication information; wherein the first indication information is used for indicating the first node to determine the first feedback information, and the first feedback information is used for indicating the block link point to determine a payment strategy;
the sending unit is further configured to send the first feedback information to the block link point.
12. The private computing storage of claim 11, wherein the task feature information includes one or more of: and the data description information, the timestamp, the name of the participating node and the configuration parameter information of the privacy calculation task.
13. A private computing storage, comprising: a receiving unit, a processing unit and a transmitting unit;
the receiving unit is used for receiving a privacy calculation request from a first node; the second node is a node participating in a privacy computation task, the privacy computation request is used for indicating the second node to participate in the privacy computation task, the privacy computation request comprises task characteristic information, and the task characteristic information is used for representing characteristic information of the privacy computation task;
the processing unit is used for judging whether the privacy calculation request passes or not according to task characteristic information included in the privacy calculation request;
the processing unit is further used for sending the calculation result information of the privacy calculation task to the block nodes when the privacy calculation request passes through;
the receiving unit is further configured to receive second indication information from the blockchain node, and determine second feedback information according to the second indication information; wherein the second indication information is used for indicating the second node to determine the second feedback information, and the second feedback information is used for indicating the block link point to determine a payment strategy;
the sending unit is configured to send the second feedback information to the block link node.
14. The private computing storage of claim 13, wherein the task feature information includes one or more of: data description information, a timestamp, a participating node name and configuration parameter information of the privacy computation task;
the computation result information of the private computation task comprises one or more of the following items: the corresponding log hash value, the task state, the calculation result, the target data use mode, the target data volume, the target data calling times and the target data calling result of the privacy calculation task; and the target data is data required by the private computing task.
15. The private computing storage of claim 14,
the sending unit is further configured to send a verification information obtaining request to the blockchain node, where the verification information obtaining request is used to request to obtain verification information of the task feature information;
the receiving unit is further configured to receive verification information of the task feature information from the blockchain node;
and the processing unit is further used for judging whether the privacy calculation request passes according to the task characteristic information and the verification information of the task characteristic information.
16. The private computing storage of any of claims 13-15,
the processing unit is further configured to send request failure information of the privacy computation task to the block link point when the privacy computation request fails.
17. A private computing storage, comprising: a receiving unit, a transmitting unit and a processing unit;
the receiving unit is used for receiving task characteristic information from a first node; the first node is a node initiating a privacy computation task, and the task characteristic information is used for representing the characteristic information of the privacy computation task;
the receiving unit is further configured to receive computation result information of the private computation task from a second node; the second node is a node participating in a privacy calculation task;
the sending unit is configured to send first indication information to the first node; wherein the first indication information is used for indicating the first node to determine the first feedback information, and the first feedback information is used for indicating the block link point to determine a payment strategy;
the sending unit is further configured to send second indication information to the second node; wherein the second indication information is used for indicating the second node to determine the second feedback information, and the second feedback information is used for indicating the block link point to determine a payment strategy;
the receiving unit is further configured to receive the first feedback information from the first node;
the receiving unit is further configured to receive the second feedback information from the second node;
the processing unit is configured to determine the payment policy according to the first feedback information and the second feedback information;
the processing unit is further configured to determine credit levels of the first node and the second node according to calculation result information of the privacy calculation task;
the processing unit is further configured to supervise the first node and the second node according to the credit levels of the first node and the second node.
18. The private computing storage of claim 17,
the processing unit is further configured to allow the first node to initiate a privacy computation task when the credit level of the first node is higher than or equal to the preset credit level;
the processing unit is further configured to prohibit the first node from initiating a privacy computation task when the credit level of the first node is lower than the preset credit level;
the processing unit is further configured to allow the second node to participate in a privacy computation task when the credit level of the second node is higher than or equal to the preset credit level;
the processing unit is further configured to prohibit the second node from participating in a privacy computation task when the credit level of the second node is lower than the preset credit level.
19. The private computing storage of claim 18,
the receiving unit is further configured to receive an authentication information acquisition request from the second node, where the authentication information acquisition request is used to request to acquire authentication information of the task feature information;
the sending unit is further configured to send verification information of the task feature information to the second node.
20. The private computing storage of any of claims 17-19, wherein the task feature information includes one or more of: data description information, a timestamp, a participating node name and configuration parameter information of the privacy computation task;
the computation result information of the private computation task comprises one or more of the following: the corresponding log hash value, the task state, the calculation result, the target data use mode, the target data volume, the target data calling times and the target data calling result of the privacy calculation task; and the target data is data required by the private computing task.
21. An electronic device, comprising: a processor and a memory; wherein the memory is configured to store computer-executable instructions that, when executed by the electronic device, are executed by the processor to cause the electronic device to perform the private computing attestation method of any of claims 1-2 or claims 3-6 or claims 7-10.
22. A computer-readable storage medium comprising instructions that, when executed by an electronic device, enable the electronic device to perform the private computer verification method of any of claims 1-2 or claims 3-6 or claims 7-10.
CN202210529552.6A 2022-05-16 2022-05-16 Privacy calculation evidence-storing method and device, electronic equipment and storage medium Active CN114978651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210529552.6A CN114978651B (en) 2022-05-16 2022-05-16 Privacy calculation evidence-storing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210529552.6A CN114978651B (en) 2022-05-16 2022-05-16 Privacy calculation evidence-storing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114978651A true CN114978651A (en) 2022-08-30
CN114978651B CN114978651B (en) 2023-07-07

Family

ID=82983796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210529552.6A Active CN114978651B (en) 2022-05-16 2022-05-16 Privacy calculation evidence-storing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114978651B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865537A (en) * 2023-03-02 2023-03-28 蓝象智联(杭州)科技有限公司 Privacy calculation method based on centralized system management, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020774A (en) * 2019-01-30 2019-07-16 阿里巴巴集团控股有限公司 A kind of resource share method, system, device and electronic equipment
US20200169407A1 (en) * 2019-07-31 2020-05-28 Alibaba Group Holding Limited Blockchain-based data authorization method and apparatus
WO2021184970A1 (en) * 2020-03-18 2021-09-23 支付宝(杭州)信息技术有限公司 Method and device for calling contract
CN113434269A (en) * 2021-06-10 2021-09-24 湖南天河国云科技有限公司 Block chain-based distributed privacy calculation method and device
US20210377038A1 (en) * 2020-05-29 2021-12-02 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for processing privacy data of block chain, device, and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020774A (en) * 2019-01-30 2019-07-16 阿里巴巴集团控股有限公司 A kind of resource share method, system, device and electronic equipment
US20200169407A1 (en) * 2019-07-31 2020-05-28 Alibaba Group Holding Limited Blockchain-based data authorization method and apparatus
WO2021184970A1 (en) * 2020-03-18 2021-09-23 支付宝(杭州)信息技术有限公司 Method and device for calling contract
US20210377038A1 (en) * 2020-05-29 2021-12-02 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for processing privacy data of block chain, device, and storage medium
CN113434269A (en) * 2021-06-10 2021-09-24 湖南天河国云科技有限公司 Block chain-based distributed privacy calculation method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
戚扬;: "区块链热潮浅析", 金融世界, no. 09 *
苑朋彬;佟贺丰;赵蕴华;: "基于专利分析的全球区块链技术竞争态势研究", 全球科技经济望, no. 03 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865537A (en) * 2023-03-02 2023-03-28 蓝象智联(杭州)科技有限公司 Privacy calculation method based on centralized system management, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114978651B (en) 2023-07-07

Similar Documents

Publication Publication Date Title
Leng et al. Blockchain security: A survey of techniques and research directions
US11157833B2 (en) Learning service blockchain
CN112132198B (en) Data processing method, device and system and server
CN110166442B (en) Data processing method and device based on block chain
CN110138733B (en) Block chain-based object storage system trusted evidence storage and access authority control method
WO2019214311A1 (en) Blockchain-based information supervision method and device
CN111049695A (en) Cloud gateway configuration method and system
CN109379369A (en) Single-point logging method, device, server and storage medium
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
Viriyasitavat et al. Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN114493865A (en) Decentralized internet cooperative system and data interaction method based on block chain
CN113393240A (en) Electronic certificate storage system and operation method
CN111010282B (en) Block chain-based information processing method, related device and storage medium
Karmakar et al. ChainSure: Agent free insurance system using blockchain for healthcare 4.0
CN111654375A (en) Block chain-based edge calculation security encryption method, device and system
CN114978651A (en) Privacy calculation evidence storage method and device, electronic equipment and storage medium
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN112037055A (en) Transaction processing method and device, electronic equipment and readable storage medium
CN108540335A (en) The management method and managing device of device analysis report
CN112269838A (en) Block chain-based supervision method and device, electronic equipment and storage medium
CN112862589A (en) Identity verification method, device and system in financial scene
CN113988787B (en) Network configuration method and device and storage medium
CN115242401A (en) Test data verification system and method based on block chain
CN115658477A (en) Function testing method and device of privacy computing platform based on block chain assistance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant