CN117592087A - Data security encryption protection system based on block chain - Google Patents

Data security encryption protection system based on block chain Download PDF

Info

Publication number
CN117592087A
CN117592087A CN202410069699.0A CN202410069699A CN117592087A CN 117592087 A CN117592087 A CN 117592087A CN 202410069699 A CN202410069699 A CN 202410069699A CN 117592087 A CN117592087 A CN 117592087A
Authority
CN
China
Prior art keywords
data
adjustment block
initial data
block
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410069699.0A
Other languages
Chinese (zh)
Other versions
CN117592087B (en
Inventor
关涛
曾凯
吴利敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sany Intelligent Manufacturing Shenzhen Co ltd
Original Assignee
Sany Intelligent Manufacturing Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sany Intelligent Manufacturing Shenzhen Co ltd filed Critical Sany Intelligent Manufacturing Shenzhen Co ltd
Priority to CN202410069699.0A priority Critical patent/CN117592087B/en
Publication of CN117592087A publication Critical patent/CN117592087A/en
Application granted granted Critical
Publication of CN117592087B publication Critical patent/CN117592087B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a data security encryption protection system based on a block chain, which comprises the following components: the data acquisition module is used for acquiring a plaintext data sequence; the first final block and ciphertext matrix acquisition module is used for obtaining a ciphertext matrix of a first adjustment block of the first initial data according to the plaintext data sequence, obtaining the miscut degree of the first adjustment block of the first initial data according to the ciphertext matrix, and obtaining the ciphertext matrices of the stop data, the final block and the final block of the first initial data according to the miscut degree; the other final blocks and ciphertext matrix acquisition modules acquire a plurality of final blocks and ciphertext matrixes of each final block according to the cut-off data of the first initial data and the final blocks; and the storage module is used for carrying out storage processing according to each final block and the ciphertext matrix of the final block. Thereby guaranteeing the safety of the data through data segmentation.

Description

Data security encryption protection system based on block chain
Technical Field
The invention relates to the technical field of data processing, in particular to a data security encryption protection system based on a blockchain.
Background
As financial transactions become increasingly digitized, data security and privacy protection become critical, and the advent of blockchain technology has brought new guarantees to the security of financial data; the blockchain is used as a distributed account book, all information of financial transactions can be recorded, the content of each transaction, a record construction block and a time stamp are connected into blocks to form a chain, and the non-tamper property of the structure provides higher security for financial data.
The two-dimensional Arnold chaotic transformation is commonly used for encrypting financial data, and the data encryption is realized by a data position exchange mode, so that the method does not change the numerical value of the data. Since the blockchain technique is a decentralised storage technique, the storage technique is to store data of each part in each block in the blockchain by dividing the data into a plurality of parts, and then to hand over the data in the block to a plurality of persons for storage. Thus, by this storage mode, the loss of data in a part of the blocks does not affect the security of the data of other blocks. The more blocks are divided, the better the security of the general data. However, when the data of a block is small, the position space contained in the block is small, and the regularity of the data in the block is difficult to be disturbed by using the Arnold chaotic transformation. Therefore, by setting a proper data dividing mode, the encryption effect of data in each block can be ensured while the block is ensured to be as small as possible.
Disclosure of Invention
The invention provides a data security encryption protection system based on a blockchain, which aims to solve the existing problems: how to ensure the safety of the data in each block by setting a proper data dividing mode.
The invention discloses a data security encryption protection system based on a block chain, which adopts the following technical scheme:
one embodiment of the invention provides a data security encryption protection system based on a blockchain, which comprises the following modules:
the data acquisition module is used for acquiring financial transaction data to obtain a plaintext data sequence;
the first final block and ciphertext matrix acquisition module is used for dividing partial gold-thawing transaction data in a plaintext data sequence to obtain first initial data and a first adjustment block of the first initial data, encrypting the first adjustment block of the first initial data to obtain a ciphertext matrix of the first adjustment block of the first initial data, obtaining the repeatability of the first adjustment block of the first initial data according to the data difference of adjacent positions in the ciphertext matrix of the first adjustment block of the first initial data, obtaining the numerical distribution degree of the first adjustment block of the first initial data according to the kurtosis of the statistical histogram of the ciphertext matrix of the first adjustment block of the first initial data, obtaining the miscut degree of the first adjustment block of the first initial data according to the numerical distribution degree and the repeatability of the first adjustment block of the first initial data, and dividing and adjusting the plaintext data sequence according to the miscut degree of the first adjustment block of the first initial data to obtain cut-off data of the first initial data, a final block and a ciphertext matrix of the final block;
the other final blocks and ciphertext matrix acquisition modules acquire a plurality of final blocks and ciphertext matrixes of each final block according to the cut-off data of the first initial data and the final blocks;
and the storage module is used for carrying out storage processing according to each final block and the ciphertext matrix of the final block.
Preferably, the method for dividing partial melting transaction data in a plaintext data sequence to obtain first starting data and a first adjustment block of the first starting data, encrypting the first adjustment block of the first starting data to obtain a ciphertext matrix of the first adjustment block of the first starting data includes the following specific steps:
setting a first empty N x N container matrix, wherein N represents the side length of a preset matrix, and marking first financial transaction data in a plaintext data sequence as first initial data; following the first starting data in the plaintext data sequence in the order of the serpentine scanSequentially inputting continuous financial transaction data into a first container matrix, and inputting the first container matrix after inputting the financial transaction dataA first adjustment block called first start data;
constructing an encryption matrix of the first initial block according to the side length of the first adjustment block of the first initial data:
wherein,side length of the first adjustment block representing the first start data,/for>、/>All represent preset parameters, < >>An encryption matrix representing a first adjustment block of first start data;
based on the encryption matrix, the first adjustment block of the first initial data is scrambled and encrypted by using an Arnold chaotic transformation method to obtain the ciphertext matrix of the first adjustment block of the first initial data.
Preferably, the method for obtaining the repeatability of the first adjustment block of the first initial data according to the data difference of the adjacent positions in the ciphertext matrix of the first adjustment block of the first initial data includes the following specific steps:
acquiring the transverse repeatability and the longitudinal repeatability of the first adjustment block of the first initial data according to the difference of adjacent position data in the ciphertext matrix of the first adjustment block of the first initial data;
taking the average value of the transverse repeatability and the longitudinal repeatability of the first adjustment block of the first initial data as the repeatability of the first adjustment block of the first initial data.
Preferably, the method for obtaining the lateral repeatability and the longitudinal repeatability of the first adjustment block of the first initial data according to the difference of the adjacent position data in the ciphertext matrix of the first adjustment block of the first initial data includes the following specific steps:
the method for calculating the lateral repeatability of the first adjustment block of the first initial data comprises the following steps:
the method for calculating the longitudinal repeatability of the first adjustment block of the first initial data comprises the following steps:
wherein,first block of ciphertext matrix representing first starting data>Go (go)/(go)>First block of ciphertext matrix representing first starting data>Column (S)/(S)>Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->First representing first start dataA ciphertext matrix of an adjustment block>Ciphertext data of the place->The side length of the first adjustment block representing the first start data,represents an exponential function based on natural constants, < ->The lateral repetition degree of the first adjustment block representing the first start data, ||represents the absolute value sign, |f>The longitudinal repetition of the first adjustment block representing the first start data.
Preferably, the obtaining the numerical distribution degree of the first adjustment block of the first initial data according to the kurtosis of the statistical histogram of the ciphertext matrix of the first adjustment block of the first initial data includes the following specific methods:
obtaining a plurality of local intervals of the first adjustment block of the first initial data and the mean value and the variance of each local interval according to the ciphertext matrix of the first adjustment block of the first initial data;
the calculation method for obtaining the numerical distribution degree of the first adjustment block of the first initial data according to the kurtosis of each local interval and the mean value and the variance of each local interval of the first adjustment block of the first initial data comprises the following steps:
wherein,ciphertext data representing a z-th data point of a u-th partial section of a first adjustment block of first start data, +.>Mean value of the (u) th local interval of the first adjustment block representing the first start data,/and (b) th local interval of the first adjustment block representing the first start data>Representing the variance of the u-th local section of the first adjustment block of the first start data,/for the first adjustment block of the first start data>Indicating the number of data points in the u-th partial region of the first adjustment block of the first start data,/>Represents an exponential function with a base of a natural constant,the number of local intervals of the first adjustment block representing the first start data;kurtosis of the (u) th local section of the first adjustment block representing the first start data,/->The numerical distribution degree of the first adjustment block of the first start data is represented.
Preferably, the method for obtaining the local intervals of the first adjustment block of the first start data and the mean and variance of each local interval according to the ciphertext matrix of the first adjustment block of the first start data includes the following specific steps:
counting ciphertext data in a ciphertext matrix of a first adjustment block of the first initial data to obtain a statistic histogram of the ciphertext matrix of the first adjustment block of the first initial data, wherein a horizontal axis of the statistic histogram describes the ciphertext data, a vertical axis describes the occurrence frequency of the ciphertext data, valley points in the statistic histogram are obtained, and a vertical line perpendicular to the horizontal axis of the statistic histogram is marked as a dividing line through each valley point; dividing the statistical histogram into a plurality of local intervals by utilizing a dividing line, and marking the local intervals as the local intervals of a first adjustment block of first initial data; dividing the accumulated sum of the products of the ciphertext data and the occurrence frequency of all the data points in each local interval by the accumulated sum of the occurrence frequency of all the data points to obtain the average value of each local interval, squaring the difference between the ciphertext data of all the data points in each local interval and the average value of the local interval, and then averaging to obtain the variance of each local interval.
Preferably, the obtaining the miscut degree of the first adjustment block of the first start data according to the numerical distribution degree and the repeatability degree of the first adjustment block of the first start data includes the following specific methods:
wherein,the value distribution degree of the first adjustment block representing the first start data, < >>The repetition degree of the first adjustment block representing the first start data,/for the first adjustment block>Representing a linear normalization process,/->The degree of miscut of the first adjustment block of the first start data is indicated.
Preferably, the dividing and adjusting the plaintext data sequence according to the degree of miscut of the first adjustment block of the first starting data to obtain the cut-off data of the first starting data, the final block and the ciphertext matrix of the final block, which comprises the following specific methods:
comparing the error degree of the first adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the first adjustment block of the first initial data is greater than the preset error degree threshold, comparing the first adjustment block of the first initial data with the first adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the first adjustment block of the first initial data is marked as a final block of the first initial data;
when the miscut degree of the first adjustment block of the first start data is less than or equal to the preset miscut degree threshold, a null is setA second matrix of containers>Representing the side length of a preset matrix; in the serpentine scanning order, the first starting data in the plaintext data sequence is followed by +.>Sequentially inputting the continuous financial transaction data into a second container matrix; the second container matrix after the financial transaction data is input is called a second adjustment block of the first initial data;
obtaining the error degree of a second adjustment block of the first initial data according to the method of obtaining the first adjustment block of the first initial data, comparing the error degree of the second adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the second adjustment block of the first initial data is greater than the preset error degree threshold Y1, comparing the first adjustment block of the first initial data with the second adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the second adjustment block of the first initial data is marked as a final block of the first initial data;
when the miscut degree of the second adjustment block of the first start data is less than or equal to the preset miscut degree threshold, a null is setThird container matrix, ">Representing the side length of a preset matrix; in the serpentine scanning order, the first starting data in the plaintext data sequence is followed by +.>Sequentially inputting the continuous financial transaction data into a third container matrix; a third container matrix after the financial transaction data is input is called a third adjustment block of the first initial data;
obtaining the error degree of a third adjustment block of the first initial data according to the method of obtaining the first adjustment block of the first initial data, comparing the error degree of the third adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the third adjustment block of the first initial data is greater than the preset error degree threshold Y1, comparing the first adjustment block of the first initial data with the second adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the third adjustment block of the first initial data is marked as a final block of the first initial data;
and then analogically, ending until the miscut degree of the adjustment block of the first initial data is greater than a preset miscut degree threshold value, and obtaining the cut-off data and the final block of the first initial data;
and encrypting the final block of the first initial data to obtain a ciphertext matrix of the final block of the first initial data.
Preferably, the obtaining a plurality of final blocks and ciphertext matrixes of each final block according to the cut-off data and the final blocks of the first starting data includes the following specific methods:
taking the next financial transaction data of the cut-off data of the first initial data in the plaintext data sequence as second initial data, and acquiring the cut-off data and the final block of the second initial data according to the cut-off data and the final block of the first initial data; taking the next financial transaction data of the cut-off data of the second initial data in the plaintext data sequence as third initial data, acquiring the cut-off data and the final block of the third initial data according to the method for acquiring the cut-off data and the final block of the first initial data, and so on until the cut-off data of the initial data is the last data of the plaintext data sequence, obtaining a plurality of initial data, and acquiring the cut-off data and the final block of each initial data;
and encrypting the final block of each initial data to obtain a ciphertext matrix of the final block of each initial data.
Preferably, the storing process is performed according to each final block and the ciphertext matrix of the final block, and the specific method includes:
the ciphertext matrix of each final block is stored in a different block of the blockchain, respectively.
The technical scheme of the invention has the beneficial effects that:
since the financial transaction data in different blocks in the blockchain are managed by different people, the greater the number of blocks, the greater the security thereof. In order to ensure the security of the financial transaction data in each block, the financial transaction data of each block is required to be encrypted; when the Arnold chaotic transformation method is used for encrypting the financial transaction data, when the financial transaction data in the blocks are small, the law of the financial transaction data in each block cannot be covered by scrambling and encryption. In order to ensure the safety of the financial transaction data in each block, a plaintext data sequence formed by the financial transaction data is required to be segmented to obtain an adjustment block of each initial data, the adjustment block of each initial data is encrypted to obtain a ciphertext matrix of the adjustment block of each initial data, and in order to judge whether the adjustment block of each initial data has a better encryption effect, the ciphertext matrix of the adjustment block of each initial data is required to be evaluated. Meanwhile, when the ciphertext matrix has a good encryption effect, the ciphertext matrix does not have too much repeated data, so that the numerical distribution degree of the adjustment block of each initial data is obtained by analyzing the kurtosis of the statistical histogram of the ciphertext matrix, the miscut degree of the adjustment block of each initial data is obtained according to the numerical distribution degree and the repetition degree of the adjustment block of each initial data, and the encryption effect of the ciphertext matrix of the adjustment block of each initial data can be reflected through the miscut degree. And performing segmentation adjustment according to the miscut degree of the adjustment block of each initial data to obtain a plurality of final blocks and a ciphertext matrix of each final block. The ciphertext matrix in the final block not only has a good encryption effect, but also can ensure that less data is stored in each final block. Thereby guaranteeing the security of the financial transaction data.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a block diagram of a block chain based data security encryption protection system of the present invention.
Detailed Description
In order to further describe the technical means and effects adopted by the present invention to achieve the preset purpose, the following detailed description refers to the specific implementation, structure, characteristics and effects of a blockchain-based data security encryption protection system according to the present invention with reference to the accompanying drawings and preferred embodiments. In the following description, different "one embodiment" or "another embodiment" means that the embodiments are not necessarily the same. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following specifically describes a specific scheme of the data security encryption protection system based on the blockchain, which is provided by the invention with reference to the accompanying drawings.
Referring to fig. 1, a block diagram of a data security encryption protection system based on a blockchain according to an embodiment of the present invention is shown, where the system includes the following modules:
the data acquisition module 101 is configured to acquire financial transaction data, and obtain a plaintext data sequence according to the financial transaction data.
In order to implement the data security encryption protection system based on the blockchain provided in this embodiment, a plaintext data sequence needs to be acquired first.
The specific process for acquiring the plaintext data sequence comprises the following steps: and acquiring a plurality of financial transaction data on a financial transaction platform, wherein the types of the financial transaction data are more, such as text type, image type and common data, and for the text type, the financial transaction data are converted into decimal data by using an ASCIL coding table. For the image type, the color data of each pixel is only used as independent financial transaction data. And marking the sequence formed by the converted financial transaction data as a plaintext data sequence.
The first final block and ciphertext matrix obtaining module 102 is configured to obtain a first adjustment block of the first initial data according to the plaintext data sequence, obtain a ciphertext matrix of the first adjustment block of the first initial data, obtain a repetition degree and a numerical distribution degree of the first adjustment block of the first initial data according to the ciphertext matrix of the first adjustment block of the first initial data, obtain a miscut degree of the first adjustment block of the first initial data according to the repetition degree and the numerical distribution degree of the first adjustment block of the first initial data, and obtain a final block of the first initial data and cut-off data of the first initial data according to the miscut complexity of the first adjustment block of the first initial data.
It should be noted that, since the encryption effect is affected by the data dividing method, the data division cannot be performed at this time, and a container may be manually given to divide a part of data.
Specifically, a first container matrix of n×n is set, where N represents a preset matrix side length, and this embodiment is described by taking N as 100, and othersOther values may be taken by the embodiment, and the embodiment is not particularly limited. The first financial transaction data in the plaintext data series is recorded as first origination data. Following the first starting data in the plaintext data sequence in the order of the serpentine scanSuccessive financial transaction data are sequentially input into the first container matrix. The first container matrix after inputting the financial transaction data is called a first adjustment block of the first initial data.
Further, an encryption matrix of the first initial block is constructed according to the side length of the first adjustment block of the first initial data:
wherein,side length of the first adjustment block representing the first start data,/for>、/>All the values represent preset parameters, and in this embodiment, the values of b are taken as 6 and c is taken as 4, and other values may be taken in other embodiments, and the embodiment is not particularly limited.An encryption matrix representing a first adjustment block of first start data.
Based on the encryption matrix, the first adjustment block of the first initial data is scrambled and encrypted by using an Arnold chaotic transformation method to obtain the ciphertext matrix of the first adjustment block of the first initial data.
For convenience of description, data in the ciphertext matrix of the first adjustment block of the first start data is referred to as ciphertext data.
It should be noted that, since the data in the first adjustment block of the first initial data is manually and randomly divided, whether the ciphertext matrix obtained based on the data has a good encryption effect cannot be determined, and therefore, the encryption effect of the ciphertext matrix of the first adjustment block of the first initial data needs to be evaluated.
It should be further noted that, when the ciphertext matrix encryption effect of the first adjustment block of the first starting data is good, it can isolate the repeated data, so as to effectively hide the data rule.
Further, the calculation method for obtaining the lateral repeatability of the first adjustment block of the first initial data according to the ciphertext matrix of the first adjustment block of the first initial data includes:
wherein,first block of ciphertext matrix representing first starting data>Go (go)/(go)>First block of ciphertext matrix representing first starting data>Column (S)/(S)>Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->The side length of the first adjustment block representing the first start data,represents an exponential function based on natural constants, < ->The lateral repetition of the first adjustment block representing the first start data, || represents the absolute value sign. />The difference in the lateral values of the first adjustment block reflecting the first start data, the larger the value is, the larger the difference in the lateral data in the block is, and thus the smaller the repeatability is.
The calculation method for obtaining the longitudinal repeatability of the first adjustment block of the first initial data according to the ciphertext matrix of the first adjustment block of the first initial data comprises the following steps:
wherein,first block of ciphertext matrix representing first starting data>Go (go)/(go)>First block of ciphertext matrix representing first starting data>Column (S)/(S)>Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->The side length of the first adjustment block representing the first start data,represents an exponential function based on natural constants, < ->The longitudinal repetition of the first adjustment block representing the first start data. />The difference in longitudinal values of the first adjustment block reflecting the first start data is larger, which means that the larger the difference in longitudinal values of the data in the block is, and thus the smaller the repetition degree is.
Taking the average value of the transverse repeatability and the longitudinal repeatability of the first adjustment block of the first initial data as the repeatability of the first adjustment block of the first initial data.
It should be noted that, when the divided data is suitable, that is, when the data in the first adjustment block of the first initial data is suitable, the data stored in the first adjustment block of the first initial data should be distributed more discretely, and the data kurtosis is reflected on the statistical feature to be smaller, so that the encryption effect of the ciphertext matrix of the first adjustment block of the first initial data can be evaluated by using the kurtosis feature of the data in the first adjustment block of the first initial data.
Further, the ciphertext data in the ciphertext matrix of the first adjustment block of the first initial data is counted to obtain a statistic histogram of the ciphertext matrix of the first adjustment block of the first initial data, wherein the horizontal axis of the statistic histogram describes the ciphertext data, the vertical axis describes the occurrence frequency of the ciphertext data, valley points in the statistic histogram are obtained, and a vertical line perpendicular to the horizontal axis of the statistic histogram is drawn through each valley point to be marked as a boundary. The statistical histogram is divided into a plurality of local regions by dividing lines, and the local regions are recorded as local regions of a first adjustment block of the first start data. Dividing the accumulated sum of the products of the ciphertext data and the occurrence frequency of all the data points in each local interval by the accumulated sum of the occurrence frequency of all the data points to obtain the average value of each local interval, squaring the difference between the ciphertext data of all the data points in each local interval and the average value of the local interval, and then averaging to obtain the variance of each local interval.
The calculation method of the numerical distribution degree of the first adjustment block of the first initial data comprises the following steps:
wherein,ciphertext data representing a z-th data point of a u-th partial section of a first adjustment block of first start data, +.>Mean value of the (u) th local interval of the first adjustment block representing the first start data,/and (b) th local interval of the first adjustment block representing the first start data>Representing the variance of the u-th local section of the first adjustment block of the first start data,/for the first adjustment block of the first start data>Indicating the number of data points in the u-th partial region of the first adjustment block of the first start data,/>Represents an exponential function based on natural constants, < ->The number of partial sections of the first adjustment block representing the first start data. />The kurtosis of the u-th local section of the first adjustment block of the first initial data is reflected, the larger the kurtosis is, the higher the data repeatability is, and the data repeatability is, the easier the data repeatability is to be cracked and decrypted, so that the encryption effect of the ciphertext matrix is poor, and the smaller the value distribution degree of the u-th local section of the first adjustment block of the first initial data is. />The value distribution degree of the first adjustment block of the first initial data is represented, the value reflects the encryption effect of the ciphertext matrix of the first adjustment block of the first initial data, and the larger the value is, the better the encryption effect of the ciphertext matrix of the first adjustment block of the first initial data is.
Further, the calculating method of the miscut degree of the first adjustment block of the first start data includes:
wherein,the greater the value of the distribution of the values of the first adjustment block representing the first initial data, the better the scrambling encryption effect of the ciphertext matrix of the first adjustment block of the first initial data, and thus the greater the degree of miscut of the first adjustment block of the first initial data>The repetition degree of the first adjustment block representing the first initial data is larger, which indicates that the encrypting effect of the encrypting matrix of the first adjustment block of the first initial data is largerThe difference, and thus the smaller the degree of miscut of the first adjustment block of the first start data, ++>Representing a linear normalization process,/->The degree of miscut of the first adjustment block of the first start data is indicated.
The miscut degree of the first adjustment block of the first initial data is obtained, and the encryption effect of the ciphertext matrix of the first adjustment block of the first initial data can be reflected through the miscut degree.
It should be noted that, when the data divided in the first adjustment block of the first starting data is inappropriate, it cannot obtain a better encryption effect, so that the division adjustment is required until the data is divided to have a better encryption effect.
Further, comparing the error-cut degree of the first adjustment block of the first initial data with a predetermined error-cut degree threshold Y1, and when the error-cut degree of the first adjustment block of the first initial data is greater than the predetermined error-cut degree threshold, comparing the first adjustment block of the first initial data with the first adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the first adjustment block of the first initial data is marked as a final block of the first initial data;
when the miscut degree of the first adjustment block of the first start data is less than or equal to the preset miscut degree threshold, a null is setA second matrix of containers>Representing the side length of the preset matrix. In the serpentine scanning order, the first starting data in the plaintext data sequence is followed by +.>Successive financial transaction data are sequentially input into the second container matrix. The second container matrix after the financial transaction data is input is called a second adjustment block of the first initial data;
obtaining the error degree of a second adjustment block of the first initial data according to the method of obtaining the first adjustment block of the first initial data, comparing the error degree of the second adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the second adjustment block of the first initial data is greater than the preset error degree threshold Y1, comparing the first adjustment block of the first initial data with the second adjustment block of the first initial dataThe financial transaction data is used as cut-off data of the first initial data, and the second adjustment block of the first initial data is marked as a final block of the first initial data.
When the miscut degree of the second adjustment block of the first start data is less than or equal to the preset miscut degree threshold, a null is setThird container matrix, ">Representing the side length of the preset matrix. In the serpentine scanning order, the first starting data in the plaintext data sequence is followed by +.>Successive financial transaction data are sequentially input into a third container matrix. A third container matrix after the financial transaction data is input is called a third adjustment block of the first initial data;
obtaining the error degree of a third adjustment block of the first initial data according to the method of obtaining the first adjustment block of the first initial data, comparing the error degree of the third adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the third adjustment block of the first initial data is greater than the preset error degree threshold Y1, comparing the first adjustment block of the first initial data with the second adjustment block of the first initial dataThe financial transaction data is used as the cut-off data of the first initial data, and the third adjustment block of the first initial data is marked as the final block of the first initial data.
And the same is done until the error cutting degree of the adjustment block of the first initial data is larger than the preset error cutting degree threshold value, and the cut-off data and the final block of the first initial data are obtained.
In this embodiment, Y1 is taken as an example of 0.78, and other values may be taken in other embodiments, and the embodiment is not particularly limited.
The remaining final blocks and ciphertext matrix obtaining module 103 are configured to obtain a plurality of initial data and the final block and the cut-off data of each initial data according to the cut-off data of the first initial data and the final block.
Taking the next financial transaction data of the cut-off data of the first initial data in the plaintext data sequence as second initial data, and acquiring the cut-off data and the final block of the second initial data according to the cut-off data and the final block of the first initial data; and taking the next financial transaction data of the cut-off data of the second initial data in the plaintext data sequence as third initial data, acquiring the cut-off data and the final block of the third initial data according to the method for acquiring the cut-off data and the final block of the first initial data, and so on until the cut-off data of the initial data is the last data of the plaintext data sequence, and obtaining a plurality of initial data, and the cut-off data and the final block of each initial data.
And acquiring the ciphertext matrix of the final block of each initial data according to the ciphertext matrix acquisition method of the adjustment block for acquiring the first initial data.
The data segmentation is completed, so that the segmented data can ensure that the data quantity contained in each final block is smaller, and simultaneously ensure that the encryption effect of the ciphertext matrix obtained based on each final block is better.
And the storage module 104 is used for carrying out storage processing on the ciphertext matrix of each final block.
Specifically, the ciphertext matrix of each final block is stored in a different block of the blockchain, respectively.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the invention, but any modifications, equivalent substitutions, improvements, etc. within the principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A blockchain-based data security encryption protection system, comprising the following modules:
the data acquisition module is used for acquiring financial transaction data to obtain a plaintext data sequence;
the first final block and ciphertext matrix acquisition module is used for dividing partial gold-thawing transaction data in a plaintext data sequence to obtain first initial data and a first adjustment block of the first initial data, encrypting the first adjustment block of the first initial data to obtain a ciphertext matrix of the first adjustment block of the first initial data, obtaining the repeatability of the first adjustment block of the first initial data according to the data difference of adjacent positions in the ciphertext matrix of the first adjustment block of the first initial data, obtaining the numerical distribution degree of the first adjustment block of the first initial data according to the kurtosis of the statistical histogram of the ciphertext matrix of the first adjustment block of the first initial data, obtaining the miscut degree of the first adjustment block of the first initial data according to the numerical distribution degree and the repeatability of the first adjustment block of the first initial data, and dividing and adjusting the plaintext data sequence according to the miscut degree of the first adjustment block of the first initial data to obtain cut-off data of the first initial data, a final block and a ciphertext matrix of the final block;
the other final blocks and ciphertext matrix acquisition modules acquire a plurality of final blocks and ciphertext matrixes of each final block according to the cut-off data of the first initial data and the final blocks;
and the storage module is used for carrying out storage processing according to each final block and the ciphertext matrix of the final block.
2. The system of claim 1, wherein the dividing the partial melting transaction data in the plaintext data sequence to obtain the first initial data and the first adjustment block of the first initial data, and encrypting the first adjustment block of the first initial data to obtain the ciphertext matrix of the first adjustment block of the first initial data comprises the following specific steps:
setting a first empty N x N container matrix, wherein N represents the side length of a preset matrix, and marking first financial transaction data in a plaintext data sequence as first initial data; following the first starting data in the plaintext data sequence in the order of the serpentine scanSequentially inputting continuous financial transaction data into a first container matrix, and enabling the first container matrix after inputting the financial transaction data to be called as a first adjustment block of first initial data;
constructing an encryption matrix of the first initial block according to the side length of the first adjustment block of the first initial data:
wherein,side length of the first adjustment block representing the first start data,/for>、/>All represent preset parameters, < >>An encryption matrix representing a first adjustment block of first start data;
based on the encryption matrix, the first adjustment block of the first initial data is scrambled and encrypted by using an Arnold chaotic transformation method to obtain the ciphertext matrix of the first adjustment block of the first initial data.
3. The system of claim 1, wherein the step of obtaining the repetition degree of the first adjustment block of the first initial data according to the data difference between adjacent positions in the ciphertext matrix of the first adjustment block of the first initial data comprises the following specific steps:
acquiring the transverse repeatability and the longitudinal repeatability of the first adjustment block of the first initial data according to the difference of adjacent position data in the ciphertext matrix of the first adjustment block of the first initial data;
taking the average value of the transverse repeatability and the longitudinal repeatability of the first adjustment block of the first initial data as the repeatability of the first adjustment block of the first initial data.
4. The system for protecting data security encryption based on blockchain as in claim 3, wherein the method for obtaining the lateral repeatability and the longitudinal repeatability of the first adjustment block of the first initial data according to the difference of the adjacent position data in the ciphertext matrix of the first adjustment block of the first initial data comprises the following specific steps:
the method for calculating the lateral repeatability of the first adjustment block of the first initial data comprises the following steps:
the method for calculating the longitudinal repeatability of the first adjustment block of the first initial data comprises the following steps:
wherein,first block of ciphertext matrix representing first starting data>Go (go)/(go)>First block of ciphertext matrix representing first starting data>Column (S)/(S)>Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->Ciphertext matrix of the first adjustment block representing the first starting data>Ciphertext data of the place->The side length of the first adjustment block representing the first start data,represents an exponential function based on natural constants, < ->The lateral repetition degree of the first adjustment block representing the first start data, ||represents the absolute value sign, |f>The longitudinal repetition of the first adjustment block representing the first start data.
5. The system of claim 1, wherein the obtaining the numerical distribution degree of the first adjustment block of the first initial data according to the kurtosis of the statistical histogram of the ciphertext matrix of the first adjustment block of the first initial data comprises the following specific steps:
obtaining a plurality of local intervals of the first adjustment block of the first initial data and the mean value and the variance of each local interval according to the ciphertext matrix of the first adjustment block of the first initial data;
the calculation method for obtaining the numerical distribution degree of the first adjustment block of the first initial data according to the kurtosis of each local interval and the mean value and the variance of each local interval of the first adjustment block of the first initial data comprises the following steps:
wherein,ciphertext data representing a z-th data point of a u-th partial section of a first adjustment block of first start data, +.>Mean value of the (u) th local interval of the first adjustment block representing the first start data,/and (b) th local interval of the first adjustment block representing the first start data>First tone representing first start dataVariance of the u-th local section of the whole block,/->Indicating the number of data points in the u-th partial region of the first adjustment block of the first start data,/>Represents an exponential function based on natural constants, < ->The number of local intervals of the first adjustment block representing the first start data; />Kurtosis of the (u) th local section of the first adjustment block representing the first start data,/->The numerical distribution degree of the first adjustment block of the first start data is represented.
6. The system of claim 5, wherein the obtaining the local intervals of the first adjustment block of the first starting data and the mean and variance of each local interval according to the ciphertext matrix of the first adjustment block of the first starting data comprises the following specific steps:
counting ciphertext data in a ciphertext matrix of a first adjustment block of the first initial data to obtain a statistic histogram of the ciphertext matrix of the first adjustment block of the first initial data, wherein a horizontal axis of the statistic histogram describes the ciphertext data, a vertical axis describes the occurrence frequency of the ciphertext data, valley points in the statistic histogram are obtained, and a vertical line perpendicular to the horizontal axis of the statistic histogram is marked as a dividing line through each valley point; dividing the statistical histogram into a plurality of local intervals by utilizing a dividing line, and marking the local intervals as the local intervals of a first adjustment block of first initial data; dividing the accumulated sum of the products of the ciphertext data and the occurrence frequency of all the data points in each local interval by the accumulated sum of the occurrence frequency of all the data points to obtain the average value of each local interval, squaring the difference between the ciphertext data of all the data points in each local interval and the average value of the local interval, and then averaging to obtain the variance of each local interval.
7. The system of claim 1, wherein the obtaining the miscut degree of the first adjustment block of the first starting data according to the numerical distribution degree and the repetition degree of the first adjustment block of the first starting data comprises the following specific steps:
wherein,the value distribution degree of the first adjustment block representing the first start data, < >>The repetition degree of the first adjustment block representing the first start data,/for the first adjustment block>Representing a linear normalization process,/->The degree of miscut of the first adjustment block of the first start data is indicated.
8. The system of claim 1, wherein the dividing and adjusting the plaintext data sequence according to the degree of miscut of the first adjustment block of the first starting data to obtain the cut-off data of the first starting data, the final block, and the ciphertext matrix of the final block comprises the following specific steps:
comparing the error degree of the first adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the first adjustment block of the first initial data is greater than the preset error degree threshold, comparing the first adjustment block of the first initial data with the first adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the first adjustment block of the first initial data is marked as a final block of the first initial data;
when the miscut degree of the first adjustment block of the first start data is less than or equal to the preset miscut degree threshold, a null is setA second matrix of containers>Representing the side length of a preset matrix; in the serpentine scanning order, the first starting data in the plaintext data sequence is followed by +.>Sequentially inputting the continuous financial transaction data into a second container matrix; the second container matrix after the financial transaction data is input is called a second adjustment block of the first initial data;
obtaining the error degree of a second adjustment block of the first initial data according to the method of obtaining the first adjustment block of the first initial data, comparing the error degree of the second adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the second adjustment block of the first initial data is greater than the preset error degree threshold Y1, comparing the first adjustment block of the first initial data with the second adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the second adjustment block of the first initial data is marked as a final block of the first initial data;
when the miscut degree of the second adjustment block of the first start data is less than or equal to the preset miscut degree threshold, a null is setThird container matrix, ">Representing the side length of a preset matrix; in the serpentine scanning order, the first starting data in the plaintext data sequence is followed by +.>Sequentially inputting the continuous financial transaction data into a third container matrix; a third container matrix after the financial transaction data is input is called a third adjustment block of the first initial data;
obtaining the error degree of a third adjustment block of the first initial data according to the method of obtaining the first adjustment block of the first initial data, comparing the error degree of the third adjustment block of the first initial data with a preset error degree threshold Y1, and when the error degree of the third adjustment block of the first initial data is greater than the preset error degree threshold Y1, comparing the first adjustment block of the first initial data with the second adjustment block of the first initial dataThe financial transaction data are used as cut-off data of the first initial data, and the third adjustment block of the first initial data is marked as a final block of the first initial data;
and then analogically, ending until the miscut degree of the adjustment block of the first initial data is greater than a preset miscut degree threshold value, and obtaining the cut-off data and the final block of the first initial data;
and encrypting the final block of the first initial data to obtain a ciphertext matrix of the final block of the first initial data.
9. The system of claim 1, wherein the obtaining a plurality of final blocks and ciphertext matrices for each final block based on the cutoff data and the final blocks of the first starting data comprises the following specific steps:
taking the next financial transaction data of the cut-off data of the first initial data in the plaintext data sequence as second initial data, and acquiring the cut-off data and the final block of the second initial data according to the cut-off data and the final block of the first initial data; taking the next financial transaction data of the cut-off data of the second initial data in the plaintext data sequence as third initial data, acquiring the cut-off data and the final block of the third initial data according to the method for acquiring the cut-off data and the final block of the first initial data, and so on until the cut-off data of the initial data is the last data of the plaintext data sequence, obtaining a plurality of initial data, and acquiring the cut-off data and the final block of each initial data;
and encrypting the final block of each initial data to obtain a ciphertext matrix of the final block of each initial data.
10. The system for protecting data security encryption based on blockchain as in claim 1, wherein the storing process is performed according to the ciphertext matrix of each final block and the final block, comprising the following specific steps:
the ciphertext matrix of each final block is stored in a different block of the blockchain, respectively.
CN202410069699.0A 2024-01-18 2024-01-18 Data security encryption protection system based on block chain Active CN117592087B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410069699.0A CN117592087B (en) 2024-01-18 2024-01-18 Data security encryption protection system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410069699.0A CN117592087B (en) 2024-01-18 2024-01-18 Data security encryption protection system based on block chain

Publications (2)

Publication Number Publication Date
CN117592087A true CN117592087A (en) 2024-02-23
CN117592087B CN117592087B (en) 2024-05-07

Family

ID=89913616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410069699.0A Active CN117592087B (en) 2024-01-18 2024-01-18 Data security encryption protection system based on block chain

Country Status (1)

Country Link
CN (1) CN117592087B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040153674A1 (en) * 2002-10-18 2004-08-05 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
CN105975866A (en) * 2016-04-26 2016-09-28 长安大学 Intra-class coefficient scrambling-based JPEG image encryption method
CN107454070A (en) * 2017-07-24 2017-12-08 华东师范大学 A kind of personalized privacy information search method based on block chain
WO2020212796A1 (en) * 2019-04-16 2020-10-22 nChain Holdings Limited Computer implemented method and system for encrypting data
KR20200143197A (en) * 2019-06-13 2020-12-23 주식회사 한컴위드 Data management device that enables distributed encryption management of data based on blockchain and operating method thereof
CN115242475A (en) * 2022-07-14 2022-10-25 南京化科天创科技有限公司 Big data secure transmission method and system
CN115580687A (en) * 2022-12-07 2023-01-06 电子科技大学 Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
CN116032474A (en) * 2023-03-27 2023-04-28 莱芜职业技术学院 Safety protection system based on big data computer network
CN116167089A (en) * 2023-04-20 2023-05-26 恒辉信达技术有限公司 High security database

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040153674A1 (en) * 2002-10-18 2004-08-05 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
CN105975866A (en) * 2016-04-26 2016-09-28 长安大学 Intra-class coefficient scrambling-based JPEG image encryption method
CN107454070A (en) * 2017-07-24 2017-12-08 华东师范大学 A kind of personalized privacy information search method based on block chain
WO2020212796A1 (en) * 2019-04-16 2020-10-22 nChain Holdings Limited Computer implemented method and system for encrypting data
KR20200143197A (en) * 2019-06-13 2020-12-23 주식회사 한컴위드 Data management device that enables distributed encryption management of data based on blockchain and operating method thereof
CN115242475A (en) * 2022-07-14 2022-10-25 南京化科天创科技有限公司 Big data secure transmission method and system
CN115580687A (en) * 2022-12-07 2023-01-06 电子科技大学 Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
CN116032474A (en) * 2023-03-27 2023-04-28 莱芜职业技术学院 Safety protection system based on big data computer network
CN116167089A (en) * 2023-04-20 2023-05-26 恒辉信达技术有限公司 High security database

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DRISHTI SAXENA 等: "Arnold transform and blockchain based signcryption scheme for novel reversible data hiding (RDH) technology", MULTIMEDIA TOOLS AND APPLICATIONS, 22 August 2023 (2023-08-22), pages 1 - 26 *

Also Published As

Publication number Publication date
CN117592087B (en) 2024-05-07

Similar Documents

Publication Publication Date Title
Lathey et al. Image enhancement in encrypted domain over cloud
CN114640523B (en) Computer data security encryption method and system
CN111192187B (en) Decryption method and system
CN111899191B (en) Text image restoration method, device and storage medium
CN108921266A (en) A kind of static two dimensional code encryption display methods and device based on image segmentation
CN115392955B (en) Store duplicate removal processing method, store duplicate removal processing device, store duplicate removal processing equipment and storage medium
CN117592087B (en) Data security encryption protection system based on block chain
CN114239780A (en) Anti-counterfeiting tracing code generation and verification method based on dot matrix
DE69727545T2 (en) Device and method for handwriting compression
CN109446827B (en) Data encryption and decryption method and system
Samal Minimum resolution for human face detection and identification
CN102915520B (en) Image scrambling method based on solutions to Kirkman&#39;s schoolgirl problem
CN106251316B (en) The restorative procedure and device of photo
CN113837751A (en) Transaction implementation method and device for digital currency
CN109977778B (en) Safety protection method and device in process of transmitting, storing and displaying three-dimensional data of object
CN112989086A (en) Intelligent recognition and classification system and method for city management images
CN112632627A (en) Block chain-based digital asset processing method
CN115952551B (en) Data processing method for building BIM model
US7295678B2 (en) Method for inserting binary messages in a digital image
Alshami et al. Enhancing quality of lossy compressed images using minimum decreasing technique
CN111783917A (en) Encrypted two-dimensional code with tracing and anti-counterfeiting functions
CN110414984A (en) Auth method and Related product based on block chain
US6999618B2 (en) Object extraction device, object extraction method, and recording media for storing an object extraction program
CN117592125B (en) Reliability electronic signature method of paperless transaction system for second-hand house transaction
CN116800549B (en) Data processing method and system based on computer software development

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant