CN116204904A - Data processing method and device for loosely coupled blockchain middleware - Google Patents

Data processing method and device for loosely coupled blockchain middleware Download PDF

Info

Publication number
CN116204904A
CN116204904A CN202310097517.6A CN202310097517A CN116204904A CN 116204904 A CN116204904 A CN 116204904A CN 202310097517 A CN202310097517 A CN 202310097517A CN 116204904 A CN116204904 A CN 116204904A
Authority
CN
China
Prior art keywords
data
uplink
middleware
blockchain
service system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310097517.6A
Other languages
Chinese (zh)
Inventor
袁敏夫
李引
王一龙
何维
何川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhongke Yide Technology Co ltd
Original Assignee
Guangzhou Zhongke Yide Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhongke Yide Technology Co ltd filed Critical Guangzhou Zhongke Yide Technology Co ltd
Priority to CN202310097517.6A priority Critical patent/CN116204904A/en
Publication of CN116204904A publication Critical patent/CN116204904A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to a data processing method and equipment of loosely coupled trusted blockchain middleware, wherein the method comprises the following steps: responding to an uplink port calling request of a service system, and receiving uplink data sent by the service system; verifying the credibility of the uplink data based on historical data and space-time correlation degree; encrypting the uplink data according to configuration information in the service system under the condition that the credibility meets the condition, and generating signature information based on the encrypted data; and constructing a uplink transaction containing the signature information, calling an intelligent contract, and storing the uplink transaction in a uplink way. The technical scheme provided by the invention can provide the efficient block chain middleware.

Description

Data processing method and device for loosely coupled blockchain middleware
Technical Field
The invention relates to the technical field of data processing, in particular to a data processing method and equipment of loosely coupled blockchain middleware.
Background
To ensure data trustworthiness on the chain, current blockchains generally need to be deployed in a defined, closed, secure system, and thus cannot support communication with external systems well. The main threat to blockchains from out-of-chain input comes from the fact that the data is not trusted, and any operation based on external physical input data may destroy the integrity of the entire blockchain.
Because of the large bottleneck in the read-write efficiency of the blockchain, it is not possible to save all data on the chain and it is not possible to execute all traffic on the chain. There should be a clear division between intelligent contracts on the chain and systems under the chain, which improves overall efficiency by transferring part of the computation under the chain, while fully maintaining the blockchain credibility advantage.
The uplink data is divided into two types, namely, the first data which can be disclosed to the public, such as names of commodities, places of production, production processes and the like; the second is the private data of the enterprise, such as the price of the product, upstream and downstream channels, etc., which can only be viewed by the enterprise itself, the enterprise user itself, the regulatory authorities, and the users who obtain the authorization of the enterprise. Therefore, the core has problems in that: the public can conveniently verify the public data on the chain, the privacy of enterprises is fully protected, and meanwhile the requirement of supervision and evidence collection can be met.
The block chain middleware is in butt joint with the service system to realize interaction between the service system and the block chain. However, the service system has various technical implementation and data structure, and if custom interface development is provided for each customer, the cost is very high.
In view of this, there is a need for a more efficient blockchain middleware.
Disclosure of Invention
In order to solve the above problems, the present invention provides a data processing method and apparatus for loosely coupled blockchain middleware.
To achieve the above object, in one aspect, the present invention provides a data processing method of a loosely coupled trusted blockchain middleware, the method including:
responding to an uplink port calling request of a service system, and receiving uplink data sent by the service system;
verifying the credibility of the uplink data based on historical data and space-time correlation degree;
encrypting the uplink data according to configuration information in the service system under the condition that the credibility meets the condition, and generating signature information based on the encrypted data;
and constructing a uplink transaction containing the signature information, calling an intelligent contract, and storing the uplink transaction in a uplink way.
In one embodiment, the uplink transaction further includes a public key of the data owner and tracing information, where the tracing information is obtained by selectively encrypting a part of fields in the plaintext data.
In one embodiment, encrypting the uplink data and generating signature information based on the encrypted data includes:
selectively encrypting part of fields in the plaintext data of the uplink data to obtain selectively encrypted data, and encrypting all fields in the plaintext data to obtain all encrypted data;
splicing the selectively encrypted data and the all encrypted data to obtain the encrypted data;
and signing the encrypted data by using a private key of a data owner to obtain the signature information.
In one embodiment, the spatiotemporal relevance is determined based on at least one of relational depth knowledge, data distributed depth knowledge, and property depth knowledge;
based on the historical data and the space-time correlation, verifying the trustworthiness of the uplink data comprises:
detecting the association degree of the uplink data and the historical data, and judging that the credibility of the uplink data meets the condition if the association degree is higher than or equal to a preset threshold value; and if the association degree is lower than the preset threshold value, judging that the credibility of the uplink data does not meet the condition.
In one embodiment, the method further comprises:
if the same uplink data is captured by a plurality of blockchain middleware, each blockchain middleware authenticates the uplink data and then sends respective authentication data to the blockchain;
after receiving the authentication data reported by each block chain middleware, the block link verifies each authentication data and readjusts the credibility of each block chain middleware based on the verification result.
In one embodiment, a front end processor is further included between the service system and the blockchain middleware, and the front end processor is used for temporarily storing data of the service system and synchronizing the data temporarily stored in the front end processor to the blockchain middleware in a database synchronization mode.
In one embodiment, the different blockchain platforms are provided with respective packaging policies, and after receiving the uplink data sent by the service system, the method further includes:
determining a blockchain platform corresponding to the uplink data, and selecting a packaging strategy corresponding to the blockchain platform;
and packaging the uplink data into a uplink object according to the packaging strategy, and loading the connector of the blockchain platform onto the uplink object.
In another aspect, the present invention also provides a loosely coupled trusted blockchain middleware, the trusted blockchain middleware comprising:
the data receiving unit is used for responding to an uplink port calling request of the service system and receiving uplink data sent by the service system;
the verification unit is used for verifying the credibility of the uplink data based on the historical data and the space-time correlation degree;
the signature unit is used for encrypting the uplink data according to the configuration information in the service system and generating signature information based on the encrypted data under the condition that the credibility meets the condition;
and the uplink storage unit is used for constructing the uplink transaction containing the signature information, calling the intelligent contract and storing the uplink transaction in an uplink mode.
The invention also provides an electronic device, which comprises a memory and a processor, wherein the memory is used for storing a computer program, and the computer program is executed by the processor to realize the data processing method.
In another aspect, the present invention also provides a computer storage medium, where the computer storage medium is used to store a computer program, where the computer program is executed by a processor to implement the above-mentioned data processing method.
The technical scheme provided by the invention is used as a bridge for connecting a traditional service system with a blockchain platform, firstly, the credibility of data outside a chain is ensured through relevance mining; secondly, the user is allowed to configure encryption and encryption fields by himself, and selective privacy protection is realized; thirdly, a loosely coupled connection assembly is provided to support the butt joint from any service system to any blockchain, so that the customization development cost is reduced; and fourthly, the system is used as a hub for data exchange between service systems, and is used for sharing the calculation work of a part of intelligent contracts on the chain, so that the overall efficiency of the block chain platform is improved.
Drawings
FIG. 1 illustrates a schematic diagram of the steps of a data processing method of loosely coupled trusted blockchain middleware in an embodiment of the invention;
FIG. 2 shows a schematic diagram of the trusted interval chain middleware in one embodiment of the present invention;
FIG. 3 shows a schematic diagram of data encryption in one embodiment of the invention;
FIG. 4 shows a schematic diagram of data verification in one embodiment of the invention;
FIG. 5 shows a flow chart of data chaining in one embodiment of the invention;
FIG. 6 is a schematic diagram of a middleware-based data interaction flow in one embodiment of the invention;
FIG. 7 illustrates a functional block diagram of trusted blockchain middleware in an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be further clearly and completely described in the following in conjunction with the embodiments of the present invention. It should be noted that the described embodiments are only some embodiments of the present invention, and not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a data processing method for loosely coupled trusted blockchain middleware according to an embodiment of the present invention may include the following steps.
S1: responding to an uplink port calling request of a service system, and receiving uplink data sent by the service system;
s2: verifying the credibility of the uplink data based on historical data and space-time correlation degree;
s3: encrypting the uplink data according to configuration information in the service system under the condition that the credibility meets the condition, and generating signature information based on the encrypted data;
s4: and constructing a uplink transaction containing the signature information, calling an intelligent contract, and storing the uplink transaction in a uplink way.
Specifically, referring to fig. 2, the blockchain middleware is a bridge between a service system and a blockchain, and its main functions include: the method comprises the steps of obtaining a data storage uplink from a service system, storing a blockchain account key in a proxy service system, communicating with middleware to realize data exchange sharing, providing data query and data statistics service and the like. The system mainly comprises a block chain interface layer, a data exchange layer, a data storage layer, a service interface layer and a display layer, wherein the design of each layer is as follows.
1. Block chain interface layer
The integrated block chain platform SDK directly interacts with the block chain link points and provides general interfaces such as certificate registration, contract calling, event subscription and the like for upper-layer applications.
2. Data exchange layer
And the function related to data exchange is responsible for sharing the data exchange with other service system users on the blockchain, including sending a sharing request and authorizing the sharing request, and verifying 3 aspects of shared data.
3. Data storage layer
Firstly, data from a business system is cleaned and standardized, the data is cached in a NoSql database, and stored contents comprise account data, transaction data and file data.
4. Service interface layer
The system is in butt joint with a service system, supports 3 modes of front-end processor exchange, data interface acquisition and active pushing/calling, and enterprise users can select according to actual conditions.
5. Display layer
The presentation portal, which is a blockchain middleware, mainly comprises functions requiring a user to perform operations, including the following.
Configuration management: including certificate management, account management, default administrative authorization, selective disclosure field configuration, front-end processor configuration, data warehousing rules, data cleaning rules, and the like.
Data statistics: the system comprises statistics of self-uplink data and statistics analysis report forms of overall data on the chain, the scene can comprise production and marketing docking data analysis and the like, and the specific requirements are determined according to the actual application scene.
Transaction inquiry: the corresponding transaction is queried in the blockchain through hashing, and related transaction lists are queried through the traceability codes.
Access authorization: when the external node sends a data sharing request, the user can be authorized through the function.
In one specific application example, the present invention confirms the trustworthiness of the uplink data by two schemes:
1. and carrying out credibility verification by utilizing the association degree of the historical data and the time-space attribute in the blockchain. The invention designs a comprehensive relevance analysis data model based on a plurality of dimensions such as core metadata fields, user behaviors, data evolution rules, credible timestamps, space positioning and the like, wherein the model needs to discover hidden depth knowledge in data and mainly comprises (1) relational depth knowledge such as analogy relations, upper and lower relations, causal relations, positive/negative correlation relations, frequent/sequential co-occurrence relations, sequence relations and the like; (2) Data distribution type depth knowledge, namely knowledge obeys certain data distribution, such as Gaussian distribution, power law distribution, long tail distribution and the like; (3) The property type depth knowledge, i.e. knowledge has a certain property. For example, in logistics application, the motion track of a truck must satisfy a physical rule, and there are internal relations and space-time relations between truck speeds, positions and times measured by different checkpoints (or vehicle-mounted GPS devices). By integrating the model in the middleware, the association degree of the data with the historical data on the chain can be analyzed when the data is input outside the chain, if the association degree is higher than a predefined correlation threshold value, the data can be considered to be higher in reliability, the data can be linked, and if the data input outside the chain is proved to be not higher in association degree with the historical data on the chain, the data is not linked according to a preset strategy, or warning labels are marked at the same time of linking.
2. The middleware is used as a data source of the blockchain platform, and the reliability of the middleware is also a reference index. In the invention, besides the reliability verification of the data outside the chain in the middleware, a reliability value is given to the middleware, so that the problem that the same data has conflicts in different data sources (middleware) is solved, the conflicts are specifically subdivided into mode conflicts, identifier conflicts and data conflicts, wherein the mode conflicts are caused by the mode isomerism of the data sources, such as different conditions of attribute names, semantics and the like, and the identification conflicts mainly refer to synonym phenomena; data collisions primarily refer to the same attribute having a plurality of different values. In case of a conflict, an authoritative node may be introduced for verification or the trusted value may be confirmed by voting of other nodes, and the trusted value of the middleware for which the provided data is considered to be erroneous may be lowered. When the same data is captured by multiple middleware x1, x2, …, xn, the middleware authenticates its own data and sends it to the blockchain. To reduce the amount of uplink data, and to save costs, these signatures are aggregated together to produce an aggregate signature. After the block chain obtains the data source signature in advance, the data sources are aggregated according to the soft credibility of each data source, and malicious data sources are rapidly removed through an optimal grouping method, so that the verification efficiency is improved. Meanwhile, the soft credibility of different data sources is reevaluated, and the soft credibility of each middleware data source is adjusted.
The scheme of the present invention is explained below in terms of both selective privacy policies and scalability policies.
Selective privacy policy
1. Encryption flow
Referring to fig. 3, firstly, the plaintext data is hashed on a part of fields according to a preset disclosure rule to obtain selectively encrypted data; after all fields are hashed, the fields are spliced together to obtain a total encrypted data HASH, and the total encrypted data HASH is signed by a private key of a data owner; the data owner public key, selectively encrypted data, and signature are ultimately stored together in the uplink.
2. Verification process
Referring to fig. 4, the data owner provides plaintext data to the verifier under the chain, and the data verifier firstly hashes all the fields to obtain encrypted data HASH; further decrypting the original encrypted data HASH through the signature of the corresponding data on the chain and the public key of the holder; the two are compared to verify if they are equal, and if they are equal, the plaintext data provided under the chain is proved to be authentic.
Expandable policies
The scalable strategy of the present invention includes the following two aspects:
1. in the link of the interface between the middleware and the service system, three interface modes aiming at different scenes are designed:
1) And exchanging the front-end processor. The front-end processor is a front-end system for data exchange between the service system and the middleware, and is used for acquiring data to the temporary storage area in the modes of front-end database, front-end file server and the like, and synchronizing the data to the middleware database in the mode of database synchronization.
2) And a data interface. The middleware provides unified data interface specifications, the service system can develop the data docking module according to the specifications, and then the interface of the middleware is called to realize uplink.
3) Active push/call mode. And opening an interface by the service system, and calling the interface of the service system in the middleware at regular time to realize data synchronization.
2. In the butt joint link of the middleware and the blockchain platform, the invention adopts a factory mode to package the uplink data, abstracts the uplink object into an interface, and embeds a default uplink method in each uplink object. For the upper layer, the factory returns a packaged uplink object only by providing information such as uplink data, data type, uplink position and the like to the factory, and the upper layer only needs to call a default uplink method and does not need to know specific details. While middleware may need to upload data to different chains, including different networks of the same type of blockchain, or completely heterogeneous blockchains, the packaging logic for the uplink data may be different, thus abstracting both factory and blockchain interfaces. Firstly, the common block chain platform SDK is packaged into mutually independent connectors, and universal interfaces such as contract calling, certificate registering, message subscribing and the like are provided for the outside, so that a uplink object packaging factory aiming at different block chain platforms is established. When the service system initiates the uplink, the middleware selects a factory corresponding to the appointed block chain platform according to the configuration or the parameters, packages the corresponding uplink object, and loads the connector of the appointed block chain platform into the uplink object.
Specifically, referring to fig. 5, the middleware-based data uplink flow is as follows:
1. the business system invokes the uplink interface of the blockchain middleware.
2. The middleware verifies the trustworthiness of the uplink data based on historical data and spatio-temporal correlation analysis.
3. The middleware selectively encrypts the uplink data according to the configuration of the service system and generates a signature.
4. The middleware constructs a uplink transaction, and invokes an intelligent contract to realize data uplink.
In addition, referring to fig. 6, the data interaction flow based on the middleware is as follows:
(1) the business system a user sends the transaction hash that it wants to share to the smart contract through the blockchain middleware.
(2) The intelligent contract checks the identity of the user of the business system A, and sends the middleware access address corresponding to the transaction to the user A and sends out the time limit certificate.
(3) And the service system A user sends a sharing request to the blockchain middleware B according to the address.
(4) The middleware B firstly verifies the validity of the time-limited certificate through the intelligent contract, the middleware B pushes an access request to be authorized to the service system user B, and the service system user B performs authorization on an interface.
(5) The middleware B sends complete plaintext data to the middleware A, and the middleware verifies the validity of the data through a selective disclosure mechanism according to the on-chain hash, the signature and the public key of the service system user B.
(6) The blockchain middleware B synchronously performs certification and uplink on the data sharing process through the intelligent contract.
It can be seen that in one embodiment, the uplink transaction further includes a public key of the data owner and tracing information, where the tracing information is obtained by selectively encrypting a part of fields in the plaintext data.
In one embodiment, encrypting the uplink data and generating signature information based on the encrypted data includes:
selectively encrypting part of fields in the plaintext data of the uplink data to obtain selectively encrypted data, and encrypting all fields in the plaintext data to obtain all encrypted data;
splicing the selectively encrypted data and the all encrypted data to obtain the encrypted data;
and signing the encrypted data by using a private key of a data owner to obtain the signature information.
In one embodiment, the spatiotemporal relevance is determined based on at least one of relational depth knowledge, data distributed depth knowledge, and property depth knowledge;
based on the historical data and the space-time correlation, verifying the trustworthiness of the uplink data comprises:
detecting the association degree of the uplink data and the historical data, and judging that the credibility of the uplink data meets the condition if the association degree is higher than or equal to a preset threshold value; and if the association degree is lower than the preset threshold value, judging that the credibility of the uplink data does not meet the condition.
In one embodiment, the method further comprises:
if the same uplink data is captured by a plurality of blockchain middleware, each blockchain middleware authenticates the uplink data and then sends respective authentication data to the blockchain;
after receiving the authentication data reported by each block chain middleware, the block link verifies each authentication data and readjusts the credibility of each block chain middleware based on the verification result.
In one embodiment, a front end processor is further included between the service system and the blockchain middleware, and the front end processor is used for temporarily storing data of the service system and synchronizing the data temporarily stored in the front end processor to the blockchain middleware in a database synchronization mode.
In one embodiment, the different blockchain platforms are provided with respective packaging policies, and after receiving the uplink data sent by the service system, the method further includes:
determining a blockchain platform corresponding to the uplink data, and selecting a packaging strategy corresponding to the blockchain platform;
and packaging the uplink data into a uplink object according to the packaging strategy, and loading the connector of the blockchain platform onto the uplink object.
Referring to fig. 7, the present invention further provides a loosely coupled trusted blockchain middleware, the trusted blockchain middleware comprising:
the data receiving unit is used for responding to an uplink port calling request of the service system and receiving uplink data sent by the service system;
the verification unit is used for verifying the credibility of the uplink data based on the historical data and the space-time correlation degree;
the signature unit is used for encrypting the uplink data according to the configuration information in the service system and generating signature information based on the encrypted data under the condition that the credibility meets the condition;
and the uplink storage unit is used for constructing the uplink transaction containing the signature information, calling the intelligent contract and storing the uplink transaction in an uplink mode.
The invention also provides an electronic device comprising a memory and a processor, wherein the memory is used for storing a computer program, and the data processing method is realized when the computer program is executed by the processor.
The present invention also provides a computer storage medium for storing a computer program which, when executed by a processor, implements the data processing method described above.
The technical scheme provided by the invention is used as a bridge for connecting a traditional service system with a blockchain platform, firstly, the credibility of data outside a chain is ensured through relevance mining; secondly, the user is allowed to configure encryption and encryption fields by himself, and selective privacy protection is realized; thirdly, a loosely coupled connection assembly is provided to support the butt joint from any service system to any blockchain, so that the customization development cost is reduced; and fourthly, the system is used as a hub for data exchange between service systems, and is used for sharing the calculation work of a part of intelligent contracts on the chain, so that the overall efficiency of the block chain platform is improved.
It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiment method may be implemented by a computer program to instruct related hardware, where the program may be stored in a computer readable storage medium, and the program may include the above-described embodiment method when executed. Wherein the storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a Flash Memory (Flash Memory), a Hard Disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for embodiments of the system, since they are substantially similar to the method embodiments, the description is relatively simple, as relevant to see the section of the method embodiments.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (10)

1. A method of data processing for loosely coupled trusted blockchain middleware, the method comprising:
responding to an uplink port calling request of a service system, and receiving uplink data sent by the service system;
verifying the credibility of the uplink data based on historical data and space-time correlation degree;
encrypting the uplink data according to configuration information in the service system under the condition that the credibility meets the condition, and generating signature information based on the encrypted data;
and constructing a uplink transaction containing the signature information, calling an intelligent contract, and storing the uplink transaction in a uplink way.
2. The method of claim 1, wherein the uplink transaction further includes a public key of a data owner and trace information, wherein the trace information is obtained by selectively encrypting a portion of fields in plaintext data.
3. The method of claim 1, wherein encrypting the uplink data and generating signature information based on the encrypted data comprises:
selectively encrypting part of fields in the plaintext data of the uplink data to obtain selectively encrypted data, and encrypting all fields in the plaintext data to obtain all encrypted data;
splicing the selectively encrypted data and the all encrypted data to obtain the encrypted data;
and signing the encrypted data by using a private key of a data owner to obtain the signature information.
4. The method of claim 1, wherein the spatiotemporal relevance is determined based on at least one of relational depth knowledge, data distributed depth knowledge, and property depth knowledge;
based on the historical data and the space-time correlation, verifying the trustworthiness of the uplink data comprises:
detecting the association degree of the uplink data and the historical data, and judging that the credibility of the uplink data meets the condition if the association degree is higher than or equal to a preset threshold value; and if the association degree is lower than the preset threshold value, judging that the credibility of the uplink data does not meet the condition.
5. The method according to claim 1, wherein the method further comprises:
if the same uplink data is captured by a plurality of blockchain middleware, each blockchain middleware authenticates the uplink data and then sends respective authentication data to the blockchain;
after receiving the authentication data reported by each block chain middleware, the block link verifies each authentication data and readjusts the credibility of each block chain middleware based on the verification result.
6. The method of claim 1, further comprising a front end processor between the business system and the blockchain middleware, wherein the front end processor is configured to temporarily store data of the business system and synchronize the temporarily stored data in the front end processor to the blockchain middleware by means of database synchronization.
7. The method of claim 1, wherein different blockchain platforms are provided with respective packaging policies, the method further comprising, after receiving the uplink data from the business system:
determining a blockchain platform corresponding to the uplink data, and selecting a packaging strategy corresponding to the blockchain platform;
and packaging the uplink data into a uplink object according to the packaging strategy, and loading the connector of the blockchain platform onto the uplink object.
8. A loosely coupled trusted blockchain middleware, the trusted blockchain middleware comprising:
the data receiving unit is used for responding to an uplink port calling request of the service system and receiving uplink data sent by the service system;
the verification unit is used for verifying the credibility of the uplink data based on the historical data and the space-time correlation degree;
the signature unit is used for encrypting the uplink data according to the configuration information in the service system and generating signature information based on the encrypted data under the condition that the credibility meets the condition;
and the uplink storage unit is used for constructing the uplink transaction containing the signature information, calling the intelligent contract and storing the uplink transaction in an uplink mode.
9. An electronic device comprising a memory and a processor, the memory for storing a computer program which, when executed by the processor, implements the method of any of claims 1 to 7.
10. A computer storage medium for storing a computer program which, when executed by a processor, implements the method of any one of claims 1 to 7.
CN202310097517.6A 2023-02-07 2023-02-07 Data processing method and device for loosely coupled blockchain middleware Pending CN116204904A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310097517.6A CN116204904A (en) 2023-02-07 2023-02-07 Data processing method and device for loosely coupled blockchain middleware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310097517.6A CN116204904A (en) 2023-02-07 2023-02-07 Data processing method and device for loosely coupled blockchain middleware

Publications (1)

Publication Number Publication Date
CN116204904A true CN116204904A (en) 2023-06-02

Family

ID=86507230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310097517.6A Pending CN116204904A (en) 2023-02-07 2023-02-07 Data processing method and device for loosely coupled blockchain middleware

Country Status (1)

Country Link
CN (1) CN116204904A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272405A (en) * 2023-11-21 2023-12-22 广东省电信规划设计院有限公司 Data verification method and device applied to blockchain tracing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272405A (en) * 2023-11-21 2023-12-22 广东省电信规划设计院有限公司 Data verification method and device applied to blockchain tracing
CN117272405B (en) * 2023-11-21 2024-04-12 广东省电信规划设计院有限公司 Data verification method and device applied to blockchain tracing

Similar Documents

Publication Publication Date Title
Xu et al. vchain: Enabling verifiable boolean range queries over blockchain databases
Li et al. FADB: A fine-grained access control scheme for VANET data based on blockchain
CN109802993B (en) Alliance chain building method based on supply chain ecology
Lam et al. ANT-centric IoT security reference architecture—Security-by-design for satellite-enabled smart cities
Rebollo-Monedero et al. Optimized query forgery for private information retrieval
CN109479053B (en) Method and system for node discovery and self-healing of block chain networks
WO2019161774A1 (en) Methods, application server, block chain node and media for logistics tracking and source tracing
US20190197562A1 (en) System and method for product authentication
Liang et al. PPRP: Preserving-privacy route planning scheme in VANETs
CN111459935B (en) Internet of things data storage method, storage system, query method and storage medium
CN111899019A (en) Method and system for cross validation and sharing of blacklist and multiple parties
CN116204904A (en) Data processing method and device for loosely coupled blockchain middleware
Huang et al. Secure data sharing over vehicular networks based on multi-sharding blockchain
Wu et al. A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain
US20230198771A1 (en) Systems and methods for providing secure internet of things data notifications using blockchain
Pethő et al. A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods
Singh et al. Blockchain Enabled Autonomous Vehicle Based Vehicular IoT System
CN115001707B (en) Device authentication method based on block chain and related device
CN117009988A (en) Encryption data storage and query method based on blockchain
CN114861144A (en) Data authority processing method based on block chain
Mehmood et al. IoT-enabled Web warehouse architecture: a secure approach
XIAO et al. An anti-DoS attack RFID security authentication protocol in the Internet of Vehicles
Hardjono Attestation Infrastructures for Automotive Cybersecurity and Vehicular Applications of Blockchains
CN117539645B (en) Block chain network construction method, system and storage medium based on service chain
CN117035740B (en) Construction method of bridge structure detection monitoring and maintenance data traceability system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination