CN117235782A - Method, system and terminal for realizing privacy calculation data security based on alliance chain - Google Patents

Method, system and terminal for realizing privacy calculation data security based on alliance chain Download PDF

Info

Publication number
CN117235782A
CN117235782A CN202311115427.1A CN202311115427A CN117235782A CN 117235782 A CN117235782 A CN 117235782A CN 202311115427 A CN202311115427 A CN 202311115427A CN 117235782 A CN117235782 A CN 117235782A
Authority
CN
China
Prior art keywords
data
alliance chain
information
party
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311115427.1A
Other languages
Chinese (zh)
Inventor
曹彪
吴杰
郑冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kelibang Information Technology Co ltd
Original Assignee
Beijing Kelibang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kelibang Information Technology Co ltd filed Critical Beijing Kelibang Information Technology Co ltd
Priority to CN202311115427.1A priority Critical patent/CN117235782A/en
Publication of CN117235782A publication Critical patent/CN117235782A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method, a system and a terminal for realizing privacy calculation data security based on a alliance chain, wherein the method comprises the following steps: the method comprises the steps of receiving data sent by a data provider, uploading the data to a alliance chain, receiving a data acquisition request of a data user, acquiring data information and computing resource information from the alliance chain, and sending the data information and the computing resource information to the data user; according to a request of a user for accessing a computing party to provide services, acquiring data information from a alliance chain, sending the data information to the computing party, and receiving information of model training and updating by the computing party; triggering an intelligent contract for the request for providing services, calculating benefit distribution according to the contribution of each party in the federal modeling process, and distributing the benefit to each party; adding a supervisor to the federation chain; and acquiring information of the data security of the alliance chain of the supervision party in real time. The method uses the alliance chain to ensure data synchronization and data security, and utilizes the intelligent contract to realize reasonable distribution of benefits, so that a supervisor can monitor the data security in real time as a member of the alliance chain.

Description

Method, system and terminal for realizing privacy calculation data security based on alliance chain
Technical Field
The application relates to the technical field of blockchains, in particular to a method, a system, a terminal and a medium for realizing privacy calculation data security based on a alliance chain.
Background
Privacy calculations are a technique for protecting data privacy that allows multiple parties to make calculations without revealing the respective data. Existing privacy computing technologies rely primarily on centralized servers for data synchronization and model updates. However, this method has the following problems: the business data security of each party is difficult to ensure, the benefit distribution is opaque, and the supervision party is difficult to monitor the data security in real time.
The disadvantages of the prior art mainly include:
(1) The data security is difficult to ensure: the centralized server is easily targeted for attack, and data may be stolen or tampered with during transmission.
(2) Benefit allocation is opaque: the prior art does not explicitly specify how to distribute benefits based on the contribution of parties in the federal modeling process, and cannot prevent other parties from tampering with the revenue data.
(3) The supervision side is difficult to monitor the data security in real time: the prior art does not provide an effective method for the supervision party to monitor the data in real time.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides a method, a system, a terminal and a medium for realizing privacy calculation data security based on a alliance chain, which ensure data synchronization and data security in the privacy calculation process by using the alliance chain and realize reasonable benefit distribution, transaction security, transparency and reliability by using intelligent contracts.
In a first aspect, a method for implementing security of private computing data based on a federation chain according to an embodiment of the present application includes:
the data provider, the calculator and the data user are used as nodes to create a alliance chain;
the method comprises the steps that data sent by a data provider are received and uploaded to a alliance chain, computing resource information sent by a receiving computing party is received and uploaded to the alliance chain, and intelligent contract information sent by a data user is received and uploaded to the alliance chain;
receiving a data acquisition request of a data user, acquiring data information and computing resource information from a alliance chain, and sending the data information and the computing resource information to the data user;
according to a request of a user for accessing a computing party to provide services, acquiring data information from a alliance chain, sending the data information to the computing party, and receiving information of model training and updating by the computing party;
triggering an intelligent contract for the request for providing services, calculating benefit distribution according to the contribution of each party in the federal modeling process, and distributing the benefit to each party;
acquiring a request of a supervisor for applying to join a alliance chain, and adding the supervisor to the alliance chain;
and acquiring information of the data security of the alliance chain of the supervision party in real time.
In a second aspect, the present application provides a system for implementing privacy calculation data security based on a federation chain, where the system includes a data collection module, a data distribution module, a benefit distribution module, and a security supervision module;
the data collection module is used for receiving data sent by the data provider and uploading the data to the alliance chain, receiving computing resource information sent by the computing party and uploading the computing resource information to the alliance chain, and receiving intelligent contract information sent by the data user and uploading the intelligent contract information to the alliance chain;
the data distribution module is used for receiving a data acquisition request of a data user, acquiring data information and computing resource information from a alliance chain, sending the data information and the computing resource information to the data user, acquiring the data information from the alliance chain, sending the data information to a computing party according to a request of a user for accessing the computing party to provide services, and receiving information of model training and updating by the computing party;
the benefit distribution module calculates benefit distribution according to the contribution of each party in the federal modeling process when the intelligent contract is triggered by the request for providing the service, and distributes the benefit to each party;
the safety supervision module is used for acquiring a request of a supervision party for applying to join the alliance chain, adding the supervision party to the alliance chain, and acquiring information of the supervision party for supervising the data safety of the alliance chain in real time;
wherein the data provider, the calculator and the data consumer create a federation chain as nodes.
In a third aspect, an embodiment of the present application provides an intelligent terminal, including a processor, an input device, an output device, and a memory, where the processor is connected to the input device, the output device, and the memory, respectively, and the memory is configured to store a computer program, where the computer program includes program instructions, and the processor is configured to invoke the program instructions to execute the method described in the foregoing embodiment.
In a fourth aspect, embodiments of the present application also provide a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method described in the above embodiments.
The application has the beneficial effects that:
the method for realizing privacy calculation data security based on the alliance chain provided by the embodiment of the application has the following advantages:
(1) And a alliance chain technology is adopted to ensure the data synchronization and the safety of a data provider, a data user and a calculator in the federation modeling process. The alliance chain technology can prevent data from being tampered and lost, and improves the data security.
(2) The relation between contribution and benefit distribution of each party in the federal modeling process is realized through intelligent contracts, reasonable benefit distribution is realized, and the safety, transparency and reliability of transactions are ensured. The intelligent contracts can quickly establish allocation rules, ensure that all parties execute according to the contracts and accelerate the speed of joint modeling.
(3) And adding the supervision party into the alliance chain to enable the supervision party to monitor the data security in real time. Thus, the supervision party can timely discover potential data security problems and take corresponding measures for processing.
The embodiment of the application provides a system, an intelligent terminal and a medium for realizing privacy calculation data safety based on a alliance chain, which have the same beneficial effects as the method for realizing privacy calculation data safety based on the alliance chain based on the same application conception.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
FIG. 1 is a flow chart of a method for implementing privacy computing data security based on federated chains provided by a first embodiment of the present application;
FIG. 2 is a flow chart illustrating a particular method for calculating benefit distribution by smart contracts based on contributions of parties in a federal modeling process according to a first embodiment of the present application;
FIG. 3 is a flowchart of a specific method for obtaining information about the security of a real-time supervision federation chain data of a supervision party according to a first embodiment of the present application;
FIG. 4 is a block diagram illustrating a system for implementing security of private computing data based on a federated chain in accordance with another embodiment of the present application;
fig. 5 is a block diagram of an intelligent terminal according to another embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
Explanation of terms used in the embodiments of the present application: blockchains are a kind of chained data structures that combine blocks of data in a sequential manner in time order, and cryptographically guaranteed, non-tamperable and non-counterfeitable distributed ledgers. In broad terms, blockchain technology is a completely new distributed infrastructure and computing paradigm that utilizes blockchain data structures to validate and store data, distributed node consensus algorithms to generate and update data, cryptography to secure data transfer and access, and intelligent contracts composed of automated script code to program and manipulate data.
A federated chain, also known as a community blockchain (Consortium Blockchains), is a special type of blockchain that establishes partnerships among multiple parties to form a restricted access network for sharing information, data, and transactions, but allows only specific entities to participate, rather than being fully open as a public blockchain. Unlike public blockchains, participants in a federated chain are typically pre-authorized organizations or individuals. For example, a community of 15 financial institutions, each running a node, needs to be validated for 10 of the institutions in order to validate each block. Blockchains may allow everyone to read or be limited to participants only, or walk a hybrid route, such as the root hash of the block and its API (application programming interface) to be exposed, which may allow the outside world to be used for a limited number of queries and to obtain blockchain state information. These blockchains may be considered "partially decentralised".
Smart contracts are an automated compounding and mechanism based on blockchain technology, which is a piece of programming code that defines rules and behaviors that are executed under specific conditions. The main objective of smart contracts is to automatically execute the contract terms without third party intervention and to ensure the security, transparency and reliability of the transaction.
Referring to fig. 1, a flowchart of a method for implementing security of private computing data based on a federation chain according to a first embodiment of the present application is shown, where the method includes the following steps:
the data provider, the calculator and the data user are used as nodes to create a alliance chain;
the method comprises the steps that data sent by a data provider are received and uploaded to a alliance chain, computing resource information sent by a receiving computing party is received and uploaded to the alliance chain, and intelligent contract information sent by a data user is received and uploaded to the alliance chain;
receiving a data acquisition request of a data user, acquiring data information and computing resource information from a alliance chain, and sending the data information and the computing resource information to the data user;
according to a request of a user for accessing a computing party to provide services, acquiring data information from a alliance chain, sending the data information to the computing party, receiving information of model training and updating by the computing party, wherein the model can be an air control model, a marketing model, an anti-fraud model, a quantitative transaction model and the like, and the model training process comprises data preparation, feature engineering, model selection and initialization, training optimization, super-parameter adjustment, verification evaluation, iterative optimization, final deployment, continuous monitoring and the like;
triggering an intelligent contract for the request for providing services, calculating benefit distribution according to the contribution of each party in the federal modeling process, and distributing the benefit to each party;
acquiring a request of a supervisor to apply for joining a alliance chain, adding the supervisor to the alliance chain, and requiring to have read data authority and decryption authority when the supervisor applies for joining the alliance chain, so that the supervisor can be used as a member of the alliance chain to monitor data security in real time;
and acquiring information of the data security of the alliance chain of the supervision party in real time.
Prior to implementation of embodiments of the present application, the performance of federation chains and smart contracts may be evaluated through simulation and modeling methods. For example: the workflow of federation chains and intelligent contracts can be modeled using Petri nets, state machines, or other modeling tools, and their performance metrics analyzed by simulation, such as data synchronization speed, fairness of security and benefit distribution, and the like. And a alliance chain technology is adopted to ensure the data synchronization and the safety of a data provider, a data user and a calculator in the federation modeling process. The alliance chain technology can prevent data from being tampered and lost, and improves the data security.
As shown in fig. 2, a specific method for the smart contract to calculate a benefit allocation based on the contributions of parties to the federal modeling process includes:
selecting block nodes from the alliance chain link points;
reading alliance chain information according to the block outlet node, and calculating a benefit distribution result;
packing out blocks according to benefit distribution results;
broadcasting the packaged blocks;
and writing the packaged blocks into a block chain.
According to the steps, the relation between contribution and benefit distribution of each party in the federal modeling process is realized through intelligent contracts. The intelligent contract can quickly establish allocation rules, ensure that all parties execute according to the contract and accelerate the speed of joint modeling.
And for other nodes, after the step of broadcasting the packaged blocks, the other nodes receive the packaged blocks and verify the packaged blocks, and the packaged blocks are written into the blockchain after the verification is passed.
As shown in fig. 3, in this embodiment, a specific method for obtaining information of the data security of the real-time supervision alliance chain of the supervision party includes:
synchronizing all blockchain data generated by the alliance chain in the running process to a supervisor node;
and when the block chain data triggers an alarm rule, alarm information sent by the supervisor node is received.
The steps realize the automatic supervision and audit of the blockchain data by the supervision party, and the alarming information is immediately sent when the blockchain data triggers the alarming rule, so that the data safety is ensured.
The following describes the above method in detail using a specific application scenario:
a is a data provider, B is a calculator (training model providing method), C is a data user (external service provider), and three parties provide borrower risk assessment service and share service benefits through a alliance chain and intelligent contracts.
Creating a coalition chain network: A. b, C A and B respectively establish a alliance chain network, wherein the A side uploads the encrypted data to the alliance chain, the B, C side provides the encrypted data, the B side uploads the computing resource information to the alliance chain, the B side performs wind control model training and provides a model to the C side, the C side obtains the encrypted data and the computing resource information from the alliance chain after receiving a risk assessment task request of other external users (not the AB side), and a risk assessment result is calculated by using the model.
Building a risk assessment intelligent contract: on the federation chain, an intelligent contract is written, and the contract code comprises the following functions: storing the proportion of the revenue share of each party (e.g., A40%, B30%, C30%), the smart contract triggers automatic execution and proportioned revenue when the revenue enters the contract account. The intelligent contract execution process on the federation chain is visible to all parties who can verify whether the revenue distribution is made according to the contract. The supervisory side applies for joining the alliance chain, adds the supervisory side to the alliance chain, and monitors the execution process of the intelligent contracts on the alliance chain in the whole process by the supervisory side, so that the income is ensured to be carried out according to the contracts. And adding the supervision party into the alliance chain to enable the supervision party to monitor the data security in real time. Thus, the supervision party can timely discover potential data security problems and take corresponding measures for processing.
The embodiment of the application provides a method for realizing privacy calculation data security based on a alliance chain, which provides a privacy calculation solution based on the alliance chain and an intelligent contract, ensures data synchronization and data security by using the alliance chain, realizes reasonable benefit distribution by using the intelligent contract and enables a supervisor to be used as a member of the alliance chain for monitoring data security in real time.
In the first embodiment, a method for implementing privacy calculation data security based on a federation chain is provided, and correspondingly, the application also provides a system for implementing privacy calculation data security based on the federation chain. Fig. 4 is a block diagram of a system for implementing security of private computing data based on a federation chain according to a second embodiment of the present application. Since the apparatus embodiments are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points. The device embodiments described below are merely illustrative.
FIG. 4 is a block diagram illustrating a system for implementing security of private computing data based on a federated chain according to another embodiment of the present application, the system including a data collection module, a data distribution module, a benefit distribution module, and a security supervision module; the data collection module is used for receiving data sent by the data provider and uploading the data to the alliance chain, receiving computing resource information sent by the computing party and uploading the computing resource information to the alliance chain, and receiving intelligent contract information sent by the data user and uploading the intelligent contract information to the alliance chain; the data distribution module is used for receiving a data acquisition request of a data user, acquiring data information and computing resource information from a alliance chain, sending the data information and the computing resource information to the data user, acquiring the data information from the alliance chain, sending the data information to a computing party according to a request of a user for accessing the computing party to provide services, and receiving information of model training and updating by the computing party; the benefit distribution module calculates benefit distribution according to the contribution of each party in the federal modeling process when the intelligent contract is triggered by the request for providing the service, and distributes the benefit to each party; the security supervision module is used for acquiring a request of a supervision party for applying to join the alliance chain, wherein the request for applying to join the alliance chain comprises a request for having read data authority and decryption authority, and adding the supervision party to the alliance chain to acquire information of the supervision party for real-time supervision of the data security of the alliance chain; wherein the data provider, the calculator and the data consumer create a federation chain as nodes.
The benefit distribution module comprises a node selection unit, a calculation unit, a packing unit and a writing unit, wherein the node selection unit is used for selecting block nodes from alliance link points; the computing unit is used for reading alliance chain information according to the block outlet node and computing a benefit distribution result; the packing unit is used for packing out blocks and broadcasting the packed blocks according to the benefit distribution result; the writing unit is used for writing the packaged blocks into the blockchain.
The safety supervision module comprises a data synchronization unit and an early warning unit, wherein the data synchronization unit is used for synchronizing all block chain data generated by the alliance chain in the operation process to a supervision party node; the early warning unit is used for sending early warning information in time when the block chain data triggers the warning rule.
The embodiment of the application provides a system for realizing privacy calculation data security based on a alliance chain, which provides a privacy calculation solution based on the alliance chain and an intelligent contract, ensures data synchronization and data security by using the alliance chain, realizes reasonable benefit distribution by using the intelligent contract and enables a supervisor to be used as a member of the alliance chain for monitoring data security in real time.
As shown in fig. 5, a schematic structural diagram of an intelligent terminal according to another embodiment of the present application is shown, where the intelligent terminal includes a processor, an input device, an output device, and a memory, where the processor is connected to the input device, the output device, and the memory, respectively, and the memory is used to store a computer program, and the computer program includes program instructions, and the processor is configured to invoke the program instructions to execute the method described in the foregoing embodiments.
It should be appreciated that in embodiments of the present application, the processor may be a central processing unit (Central Processing Unit, CPU), which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSPs), application specific integrated circuits (Application Specific Integrated Circuit, ASICs), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input devices may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, etc., and the output devices may include a display (LCD, etc.), a speaker, etc.
The memory may include read only memory and random access memory and provide instructions and data to the processor. A portion of the memory may also include non-volatile random access memory. For example, the memory may also store information of the device type.
In a specific implementation, the processor, the input device, and the output device described in the embodiments of the present application may execute the implementation described in the method embodiment provided in the embodiments of the present application, or may execute the implementation of the system embodiment described in the embodiments of the present application, which is not described herein again.
In a further embodiment of the application, a computer-readable storage medium is provided, in which a computer program is stored, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method described in the above embodiment.
The computer readable storage medium may be an internal storage unit of the terminal according to the foregoing embodiment, for example, a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used to store the computer program and other programs and data required by the terminal. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working procedures of the terminal and the unit described above may refer to the corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In several embodiments provided by the present application, it should be understood that the disclosed terminal and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or elements, or may be an electrical, mechanical, or other form of connection.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application, and are intended to be included within the scope of the appended claims and description.

Claims (10)

1. A method for implementing privacy computing data security based on a federation chain, comprising:
the data provider, the calculator and the data user are used as nodes to create a alliance chain;
the method comprises the steps that data sent by a data provider are received and uploaded to a alliance chain, computing resource information sent by a receiving computing party is received and uploaded to the alliance chain, and intelligent contract information sent by a data user is received and uploaded to the alliance chain;
receiving a data acquisition request of a data user, acquiring data information and computing resource information from a alliance chain, and sending the data information and the computing resource information to the data user;
according to a request of a user for accessing a computing party to provide services, acquiring data information from a alliance chain, sending the data information to the computing party, and receiving information of model training and updating by the computing party;
triggering an intelligent contract for the request for providing services, calculating benefit distribution according to the contribution of each party in the federal modeling process, and distributing the benefit to each party;
acquiring a request of a supervisor for applying to join a alliance chain, and adding the supervisor to the alliance chain;
and acquiring information of the data security of the alliance chain of the supervision party in real time.
2. The method of claim 1, wherein the specific method of the smart contract to calculate benefit allocation based on the contributions of parties to the federal modeling process comprises:
selecting block nodes from the alliance chain link points;
reading alliance chain information according to the block outlet node, and calculating a benefit distribution result;
packing out blocks according to benefit distribution results;
broadcasting the packaged blocks;
and writing the packaged blocks into a block chain.
3. The method of claim 1, wherein the obtaining a request by a supervisor to join a federation chain includes requiring read rights and decryption rights.
4. The method of claim 1, wherein the information specific method for obtaining the security of the real-time supervision alliance chain data of the supervision party comprises the following steps:
synchronizing all blockchain data generated by the alliance chain in the running process to a supervisor node;
and when the block chain data triggers an alarm rule, alarm information sent by the supervisor node is received.
5. The system for realizing the security of the privacy calculation data based on the alliance chain is characterized by comprising a data collection module, a data distribution module, a benefit distribution module and a security supervision module;
the data collection module is used for receiving data sent by the data provider and uploading the data to the alliance chain, receiving computing resource information sent by the computing party and uploading the computing resource information to the alliance chain, and receiving intelligent contract information sent by the data user and uploading the intelligent contract information to the alliance chain;
the data distribution module is used for receiving a data acquisition request of a data user, acquiring data information and computing resource information from a alliance chain, sending the data information and the computing resource information to the data user, acquiring the data information from the alliance chain, sending the data information to a computing party according to a request of the computing party for providing services, and receiving information of model training and updating by the computing party;
the benefit distribution module calculates benefit distribution according to contribution of each party in the federal modeling process when triggering the intelligent contract for providing service, and distributes benefits to each party;
the safety supervision module is used for acquiring a request of a supervision party for applying to join the alliance chain, adding the supervision party to the alliance chain and acquiring information of the data safety of the supervision party for supervising the alliance chain in real time;
wherein the data provider, the calculator and the data consumer create a federation chain as nodes.
6. The system of claim 5, wherein the benefit allocation module comprises a node selection unit, a calculation unit, a packing unit, and a writing unit, the node selection unit to select a block node from a federation link point;
the computing unit is used for reading alliance chain information according to the block outlet node and computing a benefit distribution result;
the packing unit is used for packing blocks and broadcasting the packed blocks according to the benefit distribution result;
the writing unit is used for writing the packaged blocks into the block chain.
7. The system of claim 5, wherein the request to join the federation chain includes a request to have read data rights and decryption rights.
8. The system of claim 5, wherein the security supervision module comprises a data synchronization unit and an early warning unit, the data synchronization unit to synchronize all blockchain data generated by the coalition chain during operation to a supervisor node;
the early warning unit is used for sending early warning information in time when the block chain data triggers the warning rule.
9. A smart terminal comprising a processor, an input device, an output device and a memory, the processor being connected to the input device, the output device and the memory, respectively, the memory being for storing a computer program comprising program instructions, characterized in that the processor is configured to invoke the program instructions to perform the method of any of claims 1-4.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-4.
CN202311115427.1A 2023-08-31 2023-08-31 Method, system and terminal for realizing privacy calculation data security based on alliance chain Pending CN117235782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311115427.1A CN117235782A (en) 2023-08-31 2023-08-31 Method, system and terminal for realizing privacy calculation data security based on alliance chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311115427.1A CN117235782A (en) 2023-08-31 2023-08-31 Method, system and terminal for realizing privacy calculation data security based on alliance chain

Publications (1)

Publication Number Publication Date
CN117235782A true CN117235782A (en) 2023-12-15

Family

ID=89090315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311115427.1A Pending CN117235782A (en) 2023-08-31 2023-08-31 Method, system and terminal for realizing privacy calculation data security based on alliance chain

Country Status (1)

Country Link
CN (1) CN117235782A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191293A (en) * 2018-08-09 2019-01-11 济南纳维信息技术有限公司 A kind of artificial intelligence service system and method based on intelligent contract and logical card
CN110071969A (en) * 2019-04-17 2019-07-30 杭州云象网络技术有限公司 A kind of data safety sharing method based on multichain framework
CN111369245A (en) * 2020-02-28 2020-07-03 杭州云象网络技术有限公司 Alliance chain system for financial product sales
CN111818095A (en) * 2020-08-28 2020-10-23 支付宝(杭州)信息技术有限公司 Tax refunding method and device based on block chain and electronic equipment
CN112509652A (en) * 2021-02-03 2021-03-16 南京可信区块链与算法经济研究院有限公司 Method and system for searching potential target points of innovative drugs by combining multiple parties based on block chain
CN112597240A (en) * 2021-03-01 2021-04-02 索信达(北京)数据技术有限公司 Federal learning data processing method and system based on alliance chain
CN113408746A (en) * 2021-06-22 2021-09-17 深圳大学 Block chain-based distributed federal learning method and device and terminal equipment
CN113434269A (en) * 2021-06-10 2021-09-24 湖南天河国云科技有限公司 Block chain-based distributed privacy calculation method and device
CN113570065A (en) * 2021-07-08 2021-10-29 国网河北省电力有限公司信息通信分公司 Data management method, device and equipment based on alliance chain and federal learning
CN114598707A (en) * 2022-03-22 2022-06-07 中山大学 Coalition chain supervisory systems
CN115412336A (en) * 2022-08-26 2022-11-29 国网数字科技控股有限公司 Method and device for detecting tampering attack of coalition chain account book and electronic equipment
CN115765965A (en) * 2022-11-04 2023-03-07 常州云科宸智能技术有限公司 Medical data safety sharing method based on federal learning and double union block chains

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191293A (en) * 2018-08-09 2019-01-11 济南纳维信息技术有限公司 A kind of artificial intelligence service system and method based on intelligent contract and logical card
CN110071969A (en) * 2019-04-17 2019-07-30 杭州云象网络技术有限公司 A kind of data safety sharing method based on multichain framework
CN111369245A (en) * 2020-02-28 2020-07-03 杭州云象网络技术有限公司 Alliance chain system for financial product sales
CN111818095A (en) * 2020-08-28 2020-10-23 支付宝(杭州)信息技术有限公司 Tax refunding method and device based on block chain and electronic equipment
CN112509652A (en) * 2021-02-03 2021-03-16 南京可信区块链与算法经济研究院有限公司 Method and system for searching potential target points of innovative drugs by combining multiple parties based on block chain
CN112597240A (en) * 2021-03-01 2021-04-02 索信达(北京)数据技术有限公司 Federal learning data processing method and system based on alliance chain
CN113434269A (en) * 2021-06-10 2021-09-24 湖南天河国云科技有限公司 Block chain-based distributed privacy calculation method and device
CN113408746A (en) * 2021-06-22 2021-09-17 深圳大学 Block chain-based distributed federal learning method and device and terminal equipment
CN113570065A (en) * 2021-07-08 2021-10-29 国网河北省电力有限公司信息通信分公司 Data management method, device and equipment based on alliance chain and federal learning
CN114598707A (en) * 2022-03-22 2022-06-07 中山大学 Coalition chain supervisory systems
CN115412336A (en) * 2022-08-26 2022-11-29 国网数字科技控股有限公司 Method and device for detecting tampering attack of coalition chain account book and electronic equipment
CN115765965A (en) * 2022-11-04 2023-03-07 常州云科宸智能技术有限公司 Medical data safety sharing method based on federal learning and double union block chains

Similar Documents

Publication Publication Date Title
Lone et al. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer
TWI720596B (en) Block chain certificate deposit method, device and computer equipment
Liu et al. Elastic and cost-effective data carrier architecture for smart contract in blockchain
CN110363527B (en) Block chain-based evidence storage and supervision method and device
CN112132198B (en) Data processing method, device and system and server
CN111445333B (en) Block generation method, device, computer equipment and storage medium
CN110166442B (en) Data processing method and device based on block chain
JP2021502018A (en) Computer-implemented systems and methods for linking blockchain to digital twins
CN109598147B (en) Data processing method and device based on block chain and electronic equipment
CN109978688A (en) The access control method and its contract generator and server of distributed common recognition system
Zhang et al. Construction site information decentralized management using blockchain and smart contracts
CN113434269A (en) Block chain-based distributed privacy calculation method and device
CN110298755B (en) Block chain transaction method and device
CN112100460A (en) Block chain-based network page evidence storing method, device, medium and electronic equipment
CN112667748B (en) Block chain all-in-one machine facing audit service, data processing method and device
CN110245514B (en) Distributed computing method and system based on block chain
US20200058163A1 (en) System and Method for Mapping a Virtual Building Model
Chiu et al. My data, my control: a secure data sharing and access scheme over blockchain
CN111612452A (en) Intellectual property management system and method based on block chain
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
CN111274597A (en) Data processing method and equipment
KR20200063295A (en) The abcd-type apparatus and method of block chain for management of research funds by using randomized mesh blockchain type verifier module and smart tcv type blockchain mediation module
CN117290887A (en) Account blockchain-based accountability privacy protection intelligent contract implementation method
CN112269838A (en) Block chain-based supervision method and device, electronic equipment and storage medium
Kirkman et al. Using smart contracts and blockchains to support consumer trust across distributed clouds

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination