CN109040012A - A kind of data security protecting and sharing method based on block chain and system and application - Google Patents

A kind of data security protecting and sharing method based on block chain and system and application Download PDF

Info

Publication number
CN109040012A
CN109040012A CN201810628273.9A CN201810628273A CN109040012A CN 109040012 A CN109040012 A CN 109040012A CN 201810628273 A CN201810628273 A CN 201810628273A CN 109040012 A CN109040012 A CN 109040012A
Authority
CN
China
Prior art keywords
data
block
node
common recognition
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810628273.9A
Other languages
Chinese (zh)
Other versions
CN109040012B (en
Inventor
樊凯
王尚阳
任延辉
孙士礼
李晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201810628273.9A priority Critical patent/CN109040012B/en
Publication of CN109040012A publication Critical patent/CN109040012A/en
Application granted granted Critical
Publication of CN109040012B publication Critical patent/CN109040012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

The invention belongs to digital information transmission technical field, discloses a kind of data security protecting based on block chain and sharing method and system and application, each participant provide authentication information and key;The summary info of initial data and cryptographic Hash packing are uploaded into block catenary system;It is packaged node and all summary infos received in the period and cryptographic Hash is packaged into block according to a graded, be sent to common recognition node;The whole network broadcast common recognition result after efficiently reaching common understanding according to RPBFT agreement;Block is recorded in account book according to common recognition result;Different access-control protocols is associated with block;User may have access to account book after access-control protocol authorization, obtain the data summarization recorded in account book and prime information storage location using quick-searching function, and user accesses raw information storing data library, obtains initial data.The present invention can resist distorting for malicious node, efficiently realize common recognition, significantly improve data search efficiency.

Description

A kind of data security protecting and sharing method based on block chain and system and application
Technical field
The invention belongs to digital information transmission technical field more particularly to a kind of data security protecting based on block chain and Sharing method and system and application.
Background technique
Currently, the prior art commonly used in the trade is such thatWith the development of information and network technology, big data era is come Face, various data show the situation of explosive growth.Excavation and utilization of the people for mass data are national economy, life The quantization progress in the fields such as work, military affairs provides important support.For example, can discover business by big data mining analysis and become Gesture determines quality of research, avoids disease's spread, fights crime or measure real-time traffic etc..However, enjoying data resource While bring is convenient, personal and mechanism is also in the risk that subject privacy leakage.Due to various heterogeneous networks it is cross-domain mutually Connection, various data are throughout terminal device, network and cloud, in addition black economy interests drive, the risk of data-privacy exposure Increasingly sharpen.In this context, the protection of big data security and privacy is very necessary, only increases grinding for Technology On Data Encryption Study carefully, just can ensure that data safety stores, protect the privacy of user, guarantee people during using internet data information it is complete Whole property, availability and confidentiality, avoid bringing interests to lose to individual.On the one hand, data requester wish obtain user with Past data, to create social value.On the other hand, the data record of storage includes mechanism and the relevant many privacies of user. Therefore, inquiry data may bring serious secret risk with shared to metadata provider.In order to meet the height of data sharing It is required that researcher proposes some relevant programmes about cloud storage and computing technique, mentioned for compression storage and processing demand For suitable solution.However, cloud service provider (CSP) is persuading mechanism due to exposure data content bring risk Major obstacles are faced for the use of centralized cloud service.At the same time, due to centralization problem, these schemes are in efficiency and can be used Property aspect there is also many problems.It is stored data into for mechanism and does not make us putting in the third-party institution such as cloud disk The heart.These half third parties trusted may abuse and disclose the privacy of provider.Based in existing scheme in shared procedure Summary info is stored in block chain by the trust problem of existing defects and cloud service provider in terms of recall precision, the present invention On, then strange land is stored in server to original, and the visit of file is realized by the access control policy being recorded in distributed account book It asks control, and promotes recall precision using quick-searching mechanism, to promote shared effect on the basis of securing documents Rate.
In conclusion problem of the existing technology is:Internet system data are highly susceptible to attack to reveal, Currently without a suitable data sharing mode, data security protecting and, realization data peace shared across mechanism are solved the problems, such as Full guard and shared.
Solve the difficulty and meaning of above-mentioned technical problem:
It solves the problems, such as that data security protecting is shared with across mechanism, how to overcome block chain technology itself in terms of efficiency How bottleneck and encryption data efficiently realize data retrieval.Problem above is that existing secure sharing method brings difficulty.
Summary of the invention
In view of the problems of the existing technology, the present invention provides a kind of data security protectings based on block chain and shared Method and system and application.
The invention is realized in this way a kind of data security protecting and sharing method based on block chain, described to be based on area The data security protecting and sharing method of block chain include: that each participant provides authentication information and key;By original number According to summary info and cryptographic Hash packing upload to block catenary system;Node is packaged to believe all abstracts received in the period Breath and cryptographic Hash are packaged into block according to a graded, are sent to common recognition node;It is complete after efficiently reaching common understanding according to RPBFT agreement Net broadcast common recognition result;Block is recorded in account book according to common recognition result;Different access-control protocol and block are carried out Association;User may have access to account book after access-control protocol authorization, and the data recorded in account book are obtained using quick-searching function Abstract and prime information storage location, user access raw information storing data library, obtain initial data.
Further, the initial method of the data security protecting and sharing method based on block chain includes:
(1) each participant provides authentication information and key;
(2) node for participating in system needs to apply authentication information and key, and the clear responsibility oneself undertaken;
(3) safety certificate issued by certification authority source can be obtained by the node of verifying;
(4) node is selected to back end, is packaged node, common recognition node, accounting nodes;
(5) certification authority needs to supervise whether every wheel common recognition is normal, and whether random seed, which can correctly be selected, is worked as front-wheel Secondary common recognition node.
Further, the data structures of the data security protecting and sharing method based on block chain upload data method packet It includes:
(1) locally the data uploaded will be needed to handle per after a period of time, back end passes through client, extracted Summary info, data cryptographic Hash, previous block coding related to user;
(2) previous block coding related to user will be accessed together control protocol protection with informative abstract;
(3) back end needs the access control policy of clear this document, and uploads with file;
(4) raw data file is stored in local data base or is uploaded to reliable cloud database.
Further, the packing node received data packet of the data security protecting and sharing method based on block chain includes:
(1) after being packaged the data that node receives back end upload, response message will be returned;
(2) transmitting file on relevant back end will be collected by being packaged node, and record each document source and access control System strategy, and in chronological order by All Files, it is packaged into a block;
(3) all packing nodes will arrange according to system, upload block in turn and give common recognition node, current round is packaged node When upload, remaining node will be silent;
(4) block head includes to be packaged node address, timestamp, block cryptographic Hash, file cryptographic Hash.
Further, the common recognition node of the data security protecting and sharing method based on block chain, which is reached common understanding, includes:
(1) according to rule, each round can generate random number by a randomizer, determine in alternative common recognition node Which node can become the common recognition node of current round, receive block by the common recognition node newly selected;
(2) reached common understanding between common recognition node according to PBFT agreement;
(3) after common recognition node is reached common understanding, to the whole network broadcast results;
(4) block is sent to accounting nodes by common recognition node;
(5) same node cannot continuously become common recognition node.
Further, account book is written in block by the accounting nodes of the data security protecting and sharing method based on block chain It specifically includes:
(1) accounting nodes receive the block that common recognition node is sent, and are written into account book;
(2) it after accounting nodes complete book keeping operation, will be broadcasted to the whole network.
Further, the configuration access control protocol of the data security protecting and sharing method based on block chain is specifically wrapped It includes:
(1) accounting nodes are needed according to the access control policy recorded in file, configuration access control strategy, and will be tactful It is anchored with block;
(2) hidden file information is only exposed block head information by access control policy;
(3) user can according to need update access strategy.
Further, user's acquisition information approach of the data security protecting and sharing method based on block chain includes:
(1) user accesses account book information by client, submits personal identification information to system as needed;
(2) access control policy will audit subscriber identity information, if meet access strategy will allow user check it is specific File content;If unauthenticated, can not check;
(3) user checks informative abstract, according to the data origin information recorded in account book, application access storage initial data Database;
(4) user records information according to Correlation block, finds the information of a block, different files is associated It uses;
(5) user compares file cryptographic Hash, and whether verification file is maliciously tampered.
Another object of the present invention is to provide the data security protecting based on block chain described in a kind of realize and share side The data security protecting and shared system based on block chain of method, the data security protecting and shared system based on block chain Include:
Certification authority module, for providing authentication information and key to each participant in system;
Data structures module, for the summary info of initial data and cryptographic Hash packing to be uploaded to block catenary system, text Summary info contains the previous block coding being associated in part;
Block chain module, for being packaged node for all summary infos and cryptographic Hash that receive in the period according to certain Order is packaged into block, is sent to common recognition node;
Common recognition node module, for the whole network broadcast common recognition result after reaching common understanding according to improvement PBFT agreement;
Accounting nodes module, for block to be recorded in account book according to common recognition result;
Access-control protocol module, for the requirement according to data structures, by different access-control protocol and block into Row association;
User is through access-control protocol module, for may have access to account book after authorizing, obtains account book according to quick-searching function The data summarization and prime information storage location of middle record, user access raw information storing data library, obtain initial data.
Another object of the present invention is to provide the data security protecting based on block chain described in a kind of application and share side The information data processing terminal of method.
In conclusion advantages of the present invention and good effect are as follows:In file summary info contain be associated it is previous Block coding, to facilitate subsequent rapid data to retrieve, the data retrieval mechanism improved can greatly improve the efficiency of system. On the basis of RPBFT common recognition mechanism efficiently can realize common recognition, the attack of prevention greed and the attack of malicious node bifurcated well, On the basis of guarantee scheme is safe and reliable, the efficiency of system is further increased.Summary info and initial data under chain on system chain Separation, guarantees the privacy of initial data.The block chain technology used ensure that can not distorting for the information in distributed account book, File cipher text cryptographic Hash on account book ensure that the complete of file and can not distort that the access strategy on account book realizes file Safety it is shared, unauthorized user can be blocked in except system.
The present invention can be realized user using block chain technology and share to the safe of file, to ensure raw data file Storage and shared safety;User realizes upload, the downloading of file in client, and with ciphertext form is stored in file credible It, only will be in data summarization, cryptographic Hash, association block number write area block chain account book in bad database;User can be simultaneously File customizes fine-grained access strategy, and it is associated with block chain account book, and user needs during obtaining file Authentication is carried out, only meets the information content in the available account book of user of access strategy, and further obtain file. Present invention ensures that the safety of user data, user are easy to use;Traditional public and private key cryptographic technique makes file more For safety;Block chain technology account book itself can not tamper further ensure the complete available of file, while making user It can be directed to the different access strategy of different paper formulations, realized while shared file and file is fully controlled;It is real File encryption upload, fine-grained access control and the file security in system of the user's control based on the system are showed It is shared.
Detailed description of the invention
Fig. 1 is the data security protecting based on block chain and sharing method flow chart provided in an embodiment of the present invention.
Fig. 2 is the implementation process of the data security protecting based on block chain and sharing method provided in an embodiment of the present invention Figure.
Fig. 3 is that the embodiment of the present invention provides the data security protecting based on block chain and the system of sharing method realizes signal Figure.
Fig. 4 is system model figure provided in an embodiment of the present invention.
Fig. 5 is block catenary system illustraton of model provided in an embodiment of the present invention.
Fig. 6 is block chain account book structure chart provided in an embodiment of the present invention.
Fig. 7 is the analogous diagram of data efficiency provided in an embodiment of the present invention.
Fig. 8 is the analogous diagram of network congestion provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
On the basis of guaranteeing that data are complete, secret, available, logarithm factually shows rapid data retrieval and is efficiently the present invention Altogether know shared to achieve the purpose that, realizes the mining analysis of data, generate value.
Application principle of the invention is explained in detail with reference to the accompanying drawing.
As shown in Figure 1, the data security protecting and sharing method provided in an embodiment of the present invention based on block chain include with Lower step:
S101: building, management system, provides authentication information and key to each participant in system;
S102: the summary info of initial data and cryptographic Hash packing are uploaded into block catenary system, summary info in file Contain the previous block coding being associated;
S103: it is packaged node and is packaged into all summary infos received in the period and cryptographic Hash according to a graded Block is sent to common recognition node;
S104: the whole network broadcast common recognition result after efficiently reaching common understanding according to RPBFT agreement;
S105: block is recorded in account book according to common recognition result;
S106: according to the requirement of data structures, different access-control protocols is associated with block;
S107: user may have access to account book after access-control protocol authorization, is obtained in account book and is remembered using quick-searching function The data summarization and prime information storage location of record, user access raw information storing data library, obtain initial data.
Application principle of the invention is further described with reference to the accompanying drawing.
As shown in Fig. 2, the data security protecting and sharing method provided in an embodiment of the present invention based on block chain specifically wraps Include following steps:
(1) certification authority, that is, the promoter of alliance's chain, possess highest system permission, are responsible for building, manage Reason system.Meanwhile being responsible for providing authentication information and key to each participant in system.
(2) summary info of initial data and cryptographic Hash packing are uploaded to block catenary system by data structures, are plucked in file Information is wanted to contain the previous block coding being associated, to facilitate later retrieval.Initial data be stored in local data base or Cloud.
(3) node is packaged in block catenary system by all summary infos and cryptographic Hash that receive in the period according to certain Order is packaged into block, is sent to common recognition node.
(4) common recognition node broadcasts common recognition result according to the whole network after PBFT agreement is reached common understanding is improved.
(5) block is recorded in account book according to common recognition result for accounting nodes.
(6) access-control protocol can close different access-control protocols with block according to the requirement of data structures Connection.
(7) user may have access to account book after access-control protocol authorization, is obtained in account book and is recorded according to quick-searching function Data summarization and prime information storage location, user access raw information storing data library, obtain initial data.
As shown in figure 3, the data security protecting and sharing method provided in an embodiment of the present invention based on block chain include with Lower step:
(1) it system initialization: in order to realize that system can run well, needs to initialize system in initial phase. Initialization procedure includes:
A) certification authority, that is, the promoter of alliance's chain, possess highest system permission, are responsible for building, manage Reason system.Meanwhile being responsible for providing authentication information and key to each participant in system.
B) node for desiring to participate in system needs to apply authentication information and key, and the clear responsibility oneself undertaken.
C) safety certificate issued by certification authority source can be obtained by the node of verifying, includes in this certificate One unique sequence number and public private key pair, sequence number represent the identity of node, and public private key pair is for signing.In terminal device When first Connection Time node is initialized, safety certificate can prove the legitimacy of node identities, which will be at For system interior nodes.
D) node can choose as back end, be packaged the responsibilities such as node, common recognition node, accounting nodes.Node can be with Undertake wherein one or more responsibilities.
E) certification authority needs to supervise whether every wheel common recognition is normal, and whether random seed can correctly select current round Common recognition node guarantees that system health is orderly.
(2) data structures upload data
A) arrange according to system, per after a period of time, back end passes through the data that client locally will need to upload It is handled, extracts summary info, data cryptographic Hash, previous block coding relevant to the user.Summary info contain with Associated previous block coding, to facilitate user's subsequent rapid data retrieval.By all finish messages at a file, on It is transmitted to neighbouring packing node.
B) previous block coding relevant to the user will be accessed together control protocol protection with informative abstract.
C) back end needs the access control policy of clear this document, and uploads with file.
D) raw data file is stored in local data base or is uploaded to reliable cloud database.
(3) it is packaged node and receives data
A) after being packaged the data that node receives back end upload, response message will be returned.
B) transmitting file on relevant back end will be collected by being packaged node, and record each document source and access control Strategy, and in chronological order by All Files, it is packaged into a block.
C) all packing nodes will arrange according to system, upload block in turn and give common recognition node, current round is packaged node When upload, remaining node will be silent.
D) block head includes to be packaged the information such as node address, timestamp, block cryptographic Hash, file cryptographic Hash.
(4) common recognition node is reached common understanding
A) according to system convention, each round can generate random number by a randomizer, to determine alternative common recognition Which node can become the common recognition node of current round in node, receive block by the common recognition node newly selected.Certificate Authority Mechanism supervises the process.
B) reached common understanding between common recognition node according to PBFT agreement.
C) after common recognition node is reached common understanding, to the whole network broadcast results.
D) block is sent to accounting nodes by common recognition node.
It e) is the safety of guarantee system, same node cannot continuously become common recognition node.
(5) account book is written in block by accounting nodes
A) accounting nodes receive the block that common recognition node is sent, and are written into account book.
B) it after accounting nodes complete book keeping operation, will be broadcasted to the whole network.
(6) configuration access control protocol
A) accounting nodes are needed according to the access control policy recorded in file, configuration access control strategy, and will be tactful It is anchored with block.
B) hidden file information is only exposed block head information by access control policy.To ensure the safety of information and hidden It is private.Access control policy will be by accounting nodes updating maintenance.
C) user can according to need update access strategy.
(7) user obtains information
A) user accesses account book information by client, submits personal identification information to system as needed.
B) access control policy will audit subscriber identity information, user will be allowed to check specific text if meeting access strategy Part content.If unauthenticated, can not check.
C) user checks informative abstract, needs further to check initial data, can according to the data recorded in account book come Source information, further application access stores the database of initial data.
D) user records information according to Correlation block, is quickly found out the information of a block, and different files is carried out Association uses.
E) user compares file cryptographic Hash, and whether verification file is maliciously tampered.
Application effect of the invention is described in detail below with reference to emulation.
1. simulated conditions
Simulated environment is: association's notebook, configuration is Intel (R) Core (TM) i5-3210M CPU@2.50GHz 4.0G RAM。
2. emulation content and interpretation of result
Using between the different system of the method for the present invention, the efficiency difference of information retrieval, as a result as shown in fig. 7, in this hair In bright scheme, the present invention improves the efficiency of information retrieval using association block number mechanism.If a user will retrieve Specific information directly can find corresponding block according to connection block number record.The number that searching method originally needs to be traversed for According to block until finding useful data.Although connection block number can bring additional data volume, the tradition relative to data retrieval Mode, efficiency increase too many.The present invention and other schemes such as Medrecord A Lippman, T Vieira, A Ekblaw, A Azaria.Et al,“MedRec:Using Blockchain for Medical Data,”Presented at International Conference on Open&Big Data.[Online]2016.Available:http:// Ieeexplore.ieee.org/document/7573685/ and Medshare Qi Xia, Emmanuel Boateng Sifah,et al.“MeDShare:Trust-Less Medical Data Sharing via Blockchain,”IEEE Access,July,2017.Vol.5.DOI.10.1109/ACCESS.2017.2730843..With the increase of the number of visiting people, originally Invention uses the less time.The result shows that the efficiency of data retrieval greatly improves.
When the negligible amounts of user, the ratio that the effective information of each user accounts for gross information content is higher.Searching originally Suo Fangfa can also be quickly found out relevant information.However, with the increase of number of users, advantage of the present invention to other methods It is more and more obvious.Association block number record can directly guide user to find corresponding block.Even if the ratio of effective information compared with It is low, efficiency will not be caused to constrain.Using between the different system of the method for the present invention, grid blocks difference, as a result such as Fig. 8 It is shown.Suggest adding block to system when being packaged node and issuing, the present invention is changed to alternately upload from the method uploaded in real time.If It is packaged node selection and uploads real time data, system will undertake very big high load capacity, this may result in data congestion.To avoid this Kind situation, improves the stability of system.The present invention uses the method successively uploaded by round.Uploading asynchronous data makes system load Smoothly, system data congestion is helped avoid.Theory analysis and simulation result show that the program is effectively to avoid a large amount of height negative Lotus may cause data congestion.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of data security protecting and sharing method based on block chain, which is characterized in that the data based on block chain Safeguard protection and sharing method include: that each participant provides authentication information and key;The abstract of initial data is believed Breath and cryptographic Hash packing upload to block catenary system;It is packaged all summary infos and cryptographic Hash that node will receive in the period It is packaged into block according to a graded, is sent to common recognition node;The whole network broadcast common recognition after efficiently reaching common understanding according to RPBFT agreement As a result;Block is recorded in account book according to common recognition result;Different access-control protocols is associated with block;User's warp It may have access to account book after access-control protocol authorization, the data summarization and prime information recorded in account book obtained using quick-searching function Storage location, user access raw information storing data library, obtain initial data.
2. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the initial method of sharing method include:
(1) each participant provides authentication information and key;
(2) node for participating in system needs to apply authentication information and key, and the clear responsibility oneself undertaken;
(3) safety certificate issued by certification authority source can be obtained by the node of verifying;
(4) node is selected to back end, is packaged node, common recognition node, accounting nodes;
(5) certification authority needs to supervise whether every wheel common recognition is normal, and it is total whether random seed can correctly select current round Know node.
3. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the data structures of sharing method upload data method and include:
(1) per after a period of time, back end locally will need the data uploaded to handle by client, extraction is made a summary Information, data cryptographic Hash, previous block coding related to user;
(2) previous block coding related to user will be accessed together control protocol protection with informative abstract;
(3) back end needs the access control policy of clear this document, and uploads with file;
(4) raw data file is stored in local data base or is uploaded to reliable cloud database.
4. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the packing node received data packet of sharing method include:
(1) after being packaged the data that node receives back end upload, response message will be returned;
(2) transmitting file on relevant back end will be collected by being packaged node, and record each document source and access control plan Slightly, and in chronological order by All Files, it is packaged into a block;
(3) all packing nodes will arrange according to system, upload block in turn and give common recognition node, current round is packaged node and uploads When, remaining node will be silent;
(4) block head includes to be packaged node address, timestamp, block cryptographic Hash, file cryptographic Hash.
5. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the common recognition node of sharing method, which are reached common understanding, includes:
(1) according to rule, each round can generate random number by a randomizer, which is determined in alternative common recognition node Node can become the common recognition node of current round, receive block by the common recognition node newly selected;
(2) reached common understanding between common recognition node according to PBFT agreement;
(3) after common recognition node is reached common understanding, to the whole network broadcast results;
(4) block is sent to accounting nodes by common recognition node;
(5) same node cannot continuously become common recognition node.
6. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the accounting nodes of sharing method specifically include block write-in account book:
(1) accounting nodes receive the block that common recognition node is sent, and are written into account book;
(2) it after accounting nodes complete book keeping operation, will be broadcasted to the whole network.
7. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the configuration access control protocol of sharing method specifically include:
(1) accounting nodes are needed according to the access control policy recorded in file, configuration access control strategy, and by strategy and area Block anchoring;
(2) hidden file information is only exposed block head information by access control policy;
(3) user can according to need update access strategy.
8. data security protecting and sharing method as described in claim 1 based on block chain, which is characterized in that described to be based on The data security protecting of block chain and the user of sharing method obtain information approach and include:
(1) user accesses account book information by client, submits personal identification information to system as needed;
(2) access control policy will audit subscriber identity information, user will be allowed to check specific file if meeting access strategy Content;If unauthenticated, can not check;
(3) user checks informative abstract, according to the data origin information recorded in account book, the number of application access storage initial data According to library;
(4) user records information according to Correlation block, finds the information of a block, different files, which is associated, to be made With;
(5) user compares file cryptographic Hash, and whether verification file is maliciously tampered.
9. a kind of number based on block chain of the data security protecting realized based on block chain described in claim 1 and sharing method According to safeguard protection and shared system, which is characterized in that the data security protecting and shared system based on block chain include:
Certification authority module, for providing authentication information and key to each participant in system;
Data structures module uploads to block catenary system for the summary info of initial data and cryptographic Hash to be packaged, in file Summary info contains the previous block coding being associated;
Block chain module, for being packaged node for all summary infos received in the period and cryptographic Hash according to a graded It is packaged into block, is sent to common recognition node;
Common recognition node module, for the whole network broadcast common recognition result after reaching common understanding according to improvement PBFT agreement;
Accounting nodes module, for block to be recorded in account book according to common recognition result;
Access-control protocol module closes different access-control protocols with block for the requirement according to data structures Connection;
User obtains in account book according to quick-searching function and remembers for may have access to account book after authorizing through access-control protocol module The data summarization and prime information storage location of record, user access raw information storing data library, obtain initial data.
10. a kind of letter of data security protecting and sharing method using based on block chain described in claim 1~8 any one Cease data processing terminal.
CN201810628273.9A 2018-06-19 2018-06-19 Block chain-based data security protection and sharing method and system and application Active CN109040012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810628273.9A CN109040012B (en) 2018-06-19 2018-06-19 Block chain-based data security protection and sharing method and system and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810628273.9A CN109040012B (en) 2018-06-19 2018-06-19 Block chain-based data security protection and sharing method and system and application

Publications (2)

Publication Number Publication Date
CN109040012A true CN109040012A (en) 2018-12-18
CN109040012B CN109040012B (en) 2021-02-09

Family

ID=64609906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810628273.9A Active CN109040012B (en) 2018-06-19 2018-06-19 Block chain-based data security protection and sharing method and system and application

Country Status (1)

Country Link
CN (1) CN109040012B (en)

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107276765A (en) * 2017-07-04 2017-10-20 中国联合网络通信集团有限公司 The processing method and processing device known together in block chain
CN109660545A (en) * 2018-12-27 2019-04-19 北京新唐思创教育科技有限公司 A kind of alliance's chain common recognition method and computer storage medium
CN109684287A (en) * 2018-12-29 2019-04-26 厦门链平方科技有限公司 Gateway information sharing query method and system based on block chain
CN109743173A (en) * 2018-12-20 2019-05-10 弗洛格(武汉)信息科技有限公司 Go out block node in block chain and determines method, block verification method and block catenary system
CN109766673A (en) * 2019-01-18 2019-05-17 四川大学 A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method
CN109819443A (en) * 2018-12-29 2019-05-28 东莞见达信息技术有限公司 Authentication registration method, apparatus and system based on block chain
CN109815732A (en) * 2019-01-09 2019-05-28 北京邮电大学 A kind of workshop data storage based on alliance's chain and access system, method and device
CN109871669A (en) * 2019-03-14 2019-06-11 哈尔滨工程大学 A kind of data sharing solution based on block chain technology
CN109919654A (en) * 2019-01-23 2019-06-21 深圳壹账通智能科技有限公司 Integral monitoring method, device, equipment and storage medium based on block chain
CN109936620A (en) * 2019-01-21 2019-06-25 中国联合网络通信集团有限公司 Storage method and device, system and storage medium based on block chain
CN109978571A (en) * 2019-04-01 2019-07-05 众安信息技术服务有限公司 Source tracing method based on block chain and device of tracing to the source
CN109981772A (en) * 2019-03-22 2019-07-05 西安电子科技大学 A kind of multiple domain data share exchange platform architecture based on block chain
CN110071802A (en) * 2019-04-24 2019-07-30 西安纸贵互联网科技有限公司 Data processing method and device suitable for block chain
CN110289963A (en) * 2019-05-08 2019-09-27 重庆八戒电子商务有限公司 Merging under high concurrent is packaged the method that block chain and its verifying is recorded
CN110336833A (en) * 2019-07-30 2019-10-15 中国工商银行股份有限公司 Image content common recognition method, server based on block chain
CN110427763A (en) * 2019-07-24 2019-11-08 上海朝夕网络技术有限公司 A kind of common recognition method based on the predefined distributed system for executing code
CN110581839A (en) * 2019-07-23 2019-12-17 中国空间技术研究院 Content protection method and device
CN110728577A (en) * 2019-08-21 2020-01-24 北京邮电大学 Centralized hierarchical and continuously-expanded block chain transaction method
CN110781531A (en) * 2019-09-04 2020-02-11 安徽省粮油信息中心(安徽粮食批发交易市场管委会) Tamper-proof grain depot data secure storage system and method
CN110795772A (en) * 2019-11-05 2020-02-14 重庆道之易科技服务有限公司 Creative processing method based on block chain
CN111049658A (en) * 2019-12-12 2020-04-21 北京信息科技大学 DAG-based whole-network unified trust anchor system, establishment method and authentication method
CN111061695A (en) * 2019-12-19 2020-04-24 广东以诺通讯有限公司 File sharing method and system based on block chain
CN111092882A (en) * 2019-12-12 2020-05-01 中国船舶工业系统工程研究院 Cross-domain multi-party information secure sharing method based on block chain and IPFS (Internet protocol File System)
CN111241092A (en) * 2019-12-31 2020-06-05 中国科学院昆明植物研究所 Block chain based species publishing system and method
CN111245570A (en) * 2020-01-14 2020-06-05 中国科学院软件研究所 Block chain network covert communication method based on multi-node timestamp collusion
CN111262936A (en) * 2020-01-16 2020-06-09 天津大学 Block chain-based ocean big data sharing method
CN111274594A (en) * 2020-01-20 2020-06-12 上海市大数据中心 Block chain-based secure big data privacy protection sharing method
CN111311263A (en) * 2020-03-18 2020-06-19 广州知弘科技有限公司 Local safety accounting method for block chain node
CN111339206A (en) * 2020-03-11 2020-06-26 中国建设银行股份有限公司 Data sharing method and device based on block chain
CN111405223A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Video processing method, device and equipment
CN111416832A (en) * 2019-01-07 2020-07-14 珠海金山办公软件有限公司 File updating method and device, electronic equipment and readable storage medium
CN111428834A (en) * 2020-04-21 2020-07-17 吉林大学 Orchard spraying information management system and method based on block chain and information fusion
CN111563130A (en) * 2020-07-15 2020-08-21 成都无右区块链科技有限公司 Data credible data management method and system based on block chain technology
CN111583393A (en) * 2020-05-06 2020-08-25 江苏恒宝智能系统技术有限公司 Three-dimensional modeling product management method and system based on block chain technology
CN111682934A (en) * 2020-04-21 2020-09-18 国网天津市电力公司电力科学研究院 Storage, access and sharing method and system for comprehensive energy metering data
CN111753321A (en) * 2020-06-29 2020-10-09 山东大学 Block chain-based data security sharing method and system
CN112003704A (en) * 2020-07-31 2020-11-27 中科扶云(杭州)科技有限公司 Electronic evidence processing method and device and computer equipment
CN112100665A (en) * 2020-09-23 2020-12-18 江苏四象软件有限公司 Data sharing system based on block chain
CN112163241A (en) * 2020-09-09 2021-01-01 法信公证云(厦门)科技有限公司 Notarization archive information processing method, system, platform, equipment and storage medium
CN112241435A (en) * 2020-10-23 2021-01-19 山西特信环宇信息技术有限公司 Cone block chain storage system and consensus storage method
CN112468565A (en) * 2020-11-19 2021-03-09 江苏省测绘资料档案馆 System for managing space data integrity and tracking shared flow based on block chain
CN112487443A (en) * 2020-11-11 2021-03-12 昆明理工大学 Energy data fine-grained access control method based on block chain
CN112818365A (en) * 2021-02-01 2021-05-18 上海竞动科技有限公司 User privacy data protection method and system based on block chain
CN112861180A (en) * 2020-03-06 2021-05-28 西南交通大学 Supply chain information sharing system and method combining block chain and workflow
CN112966126A (en) * 2021-02-26 2021-06-15 南京审计大学 High-reliability knowledge base construction method capable of inquiring and tracing mass unstructured data content
CN113438084A (en) * 2021-06-23 2021-09-24 国网北京市电力公司 Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN113656365A (en) * 2021-07-28 2021-11-16 熵链科技(福建)有限公司 Data sharing method and system based on block chain
CN114528346A (en) * 2022-01-27 2022-05-24 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114938278A (en) * 2022-04-11 2022-08-23 北京邮电大学 Zero trust access control method and device
CN115021914A (en) * 2022-06-14 2022-09-06 广西师范大学 Safe and efficient education seniority witness method based on block chain
CN115801815A (en) * 2023-02-03 2023-03-14 安徽中科晶格技术有限公司 Block chain-based plant growth condition sharing method and device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169125A (en) * 2017-05-31 2017-09-15 北京小米移动软件有限公司 The dispensing statistics acquisition methods and device of multimedia resource
CN107181599A (en) * 2017-07-18 2017-09-19 天津理工大学 The storage of route location data confidentiality and sharing method based on block chain
CN107770115A (en) * 2016-08-15 2018-03-06 华为技术有限公司 Distribute the method and system of digital content in a peer-to-peer network
CN108092982A (en) * 2017-12-22 2018-05-29 广东工业大学 A kind of date storage method and system based on alliance's chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770115A (en) * 2016-08-15 2018-03-06 华为技术有限公司 Distribute the method and system of digital content in a peer-to-peer network
CN107169125A (en) * 2017-05-31 2017-09-15 北京小米移动软件有限公司 The dispensing statistics acquisition methods and device of multimedia resource
CN107181599A (en) * 2017-07-18 2017-09-19 天津理工大学 The storage of route location data confidentiality and sharing method based on block chain
CN108092982A (en) * 2017-12-22 2018-05-29 广东工业大学 A kind of date storage method and system based on alliance's chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
薛腾飞 等: "基于区块链的医疗数据共享模型研究", 《自动化学报》 *

Cited By (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107276765A (en) * 2017-07-04 2017-10-20 中国联合网络通信集团有限公司 The processing method and processing device known together in block chain
CN109743173A (en) * 2018-12-20 2019-05-10 弗洛格(武汉)信息科技有限公司 Go out block node in block chain and determines method, block verification method and block catenary system
CN109743173B (en) * 2018-12-20 2021-07-20 弗洛格(武汉)信息科技有限公司 Block out node determining method in block chain, block verification method and block chain system
CN109660545B (en) * 2018-12-27 2021-04-09 北京新唐思创教育科技有限公司 Alliance chain consensus method and computer storage medium
CN109660545A (en) * 2018-12-27 2019-04-19 北京新唐思创教育科技有限公司 A kind of alliance's chain common recognition method and computer storage medium
CN109684287A (en) * 2018-12-29 2019-04-26 厦门链平方科技有限公司 Gateway information sharing query method and system based on block chain
CN109819443A (en) * 2018-12-29 2019-05-28 东莞见达信息技术有限公司 Authentication registration method, apparatus and system based on block chain
CN109819443B (en) * 2018-12-29 2021-09-21 东莞见达信息技术有限公司 Registration authentication method, device and system based on block chain
CN111405223A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Video processing method, device and equipment
CN111416832A (en) * 2019-01-07 2020-07-14 珠海金山办公软件有限公司 File updating method and device, electronic equipment and readable storage medium
CN111416832B (en) * 2019-01-07 2023-03-24 珠海金山办公软件有限公司 File updating method and device, electronic equipment and readable storage medium
CN109815732B (en) * 2019-01-09 2021-12-28 北京邮电大学 Workshop data storage and access system, method and device based on alliance chain
CN109815732A (en) * 2019-01-09 2019-05-28 北京邮电大学 A kind of workshop data storage based on alliance's chain and access system, method and device
CN109766673A (en) * 2019-01-18 2019-05-17 四川大学 A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method
CN109936620A (en) * 2019-01-21 2019-06-25 中国联合网络通信集团有限公司 Storage method and device, system and storage medium based on block chain
CN109919654A (en) * 2019-01-23 2019-06-21 深圳壹账通智能科技有限公司 Integral monitoring method, device, equipment and storage medium based on block chain
CN109871669B (en) * 2019-03-14 2023-02-10 哈尔滨工程大学 Data sharing solution based on block chain technology
CN109871669A (en) * 2019-03-14 2019-06-11 哈尔滨工程大学 A kind of data sharing solution based on block chain technology
CN109981772A (en) * 2019-03-22 2019-07-05 西安电子科技大学 A kind of multiple domain data share exchange platform architecture based on block chain
CN109978571B (en) * 2019-04-01 2024-01-19 众安信息技术服务有限公司 Block chain-based tracing method and tracing device
CN109978571A (en) * 2019-04-01 2019-07-05 众安信息技术服务有限公司 Source tracing method based on block chain and device of tracing to the source
CN110071802A (en) * 2019-04-24 2019-07-30 西安纸贵互联网科技有限公司 Data processing method and device suitable for block chain
CN110289963A (en) * 2019-05-08 2019-09-27 重庆八戒电子商务有限公司 Merging under high concurrent is packaged the method that block chain and its verifying is recorded
CN110581839A (en) * 2019-07-23 2019-12-17 中国空间技术研究院 Content protection method and device
CN110581839B (en) * 2019-07-23 2021-12-14 中国空间技术研究院 Content protection method and device
CN110427763A (en) * 2019-07-24 2019-11-08 上海朝夕网络技术有限公司 A kind of common recognition method based on the predefined distributed system for executing code
CN110427763B (en) * 2019-07-24 2021-07-23 上海朝夕网络技术有限公司 Consensus method of distributed system based on predefined execution codes
CN110336833A (en) * 2019-07-30 2019-10-15 中国工商银行股份有限公司 Image content common recognition method, server based on block chain
CN110728577B (en) * 2019-08-21 2022-09-30 北京邮电大学 Centralized block chain transaction method capable of continuously expanding hierarchical layers
CN110728577A (en) * 2019-08-21 2020-01-24 北京邮电大学 Centralized hierarchical and continuously-expanded block chain transaction method
CN110781531A (en) * 2019-09-04 2020-02-11 安徽省粮油信息中心(安徽粮食批发交易市场管委会) Tamper-proof grain depot data secure storage system and method
CN110781531B (en) * 2019-09-04 2023-04-07 安徽省粮油信息中心(安徽粮食批发交易市场管委会) Tamper-proof grain depot data secure storage system and method
CN110795772A (en) * 2019-11-05 2020-02-14 重庆道之易科技服务有限公司 Creative processing method based on block chain
CN111092882B (en) * 2019-12-12 2021-12-07 中国船舶工业系统工程研究院 Cross-domain multi-party information secure sharing method based on block chain and IPFS (Internet protocol File System)
CN111049658A (en) * 2019-12-12 2020-04-21 北京信息科技大学 DAG-based whole-network unified trust anchor system, establishment method and authentication method
CN111092882A (en) * 2019-12-12 2020-05-01 中国船舶工业系统工程研究院 Cross-domain multi-party information secure sharing method based on block chain and IPFS (Internet protocol File System)
CN111049658B (en) * 2019-12-12 2022-09-16 北京信息科技大学 DAG-based whole-network unified trust anchor system and establishment method
CN111061695A (en) * 2019-12-19 2020-04-24 广东以诺通讯有限公司 File sharing method and system based on block chain
CN111061695B (en) * 2019-12-19 2023-04-14 广东以诺通讯有限公司 File sharing method and system based on block chain
CN111241092A (en) * 2019-12-31 2020-06-05 中国科学院昆明植物研究所 Block chain based species publishing system and method
CN111241092B (en) * 2019-12-31 2023-05-05 中国科学院昆明植物研究所 Species publishing system and method based on blockchain
CN111245570A (en) * 2020-01-14 2020-06-05 中国科学院软件研究所 Block chain network covert communication method based on multi-node timestamp collusion
CN111245570B (en) * 2020-01-14 2021-06-08 中国科学院软件研究所 Block chain network covert communication method based on multi-node timestamp collusion
CN111262936A (en) * 2020-01-16 2020-06-09 天津大学 Block chain-based ocean big data sharing method
CN111274594A (en) * 2020-01-20 2020-06-12 上海市大数据中心 Block chain-based secure big data privacy protection sharing method
CN112861180B (en) * 2020-03-06 2022-07-12 西南交通大学 Supply chain information sharing system and method combining block chain and workflow
CN112861180A (en) * 2020-03-06 2021-05-28 西南交通大学 Supply chain information sharing system and method combining block chain and workflow
CN111339206A (en) * 2020-03-11 2020-06-26 中国建设银行股份有限公司 Data sharing method and device based on block chain
CN111339206B (en) * 2020-03-11 2023-07-18 建信金融科技有限责任公司 Block chain-based data sharing method and device
CN111311263A (en) * 2020-03-18 2020-06-19 广州知弘科技有限公司 Local safety accounting method for block chain node
CN111682934B (en) * 2020-04-21 2023-08-01 国网天津市电力公司电力科学研究院 Method and system for storing, accessing and sharing comprehensive energy metering data
CN111428834A (en) * 2020-04-21 2020-07-17 吉林大学 Orchard spraying information management system and method based on block chain and information fusion
CN111428834B (en) * 2020-04-21 2024-03-08 吉林大学 Orchard spraying information management system and method based on blockchain and information fusion
CN111682934A (en) * 2020-04-21 2020-09-18 国网天津市电力公司电力科学研究院 Storage, access and sharing method and system for comprehensive energy metering data
CN111583393A (en) * 2020-05-06 2020-08-25 江苏恒宝智能系统技术有限公司 Three-dimensional modeling product management method and system based on block chain technology
CN111753321A (en) * 2020-06-29 2020-10-09 山东大学 Block chain-based data security sharing method and system
CN111563130A (en) * 2020-07-15 2020-08-21 成都无右区块链科技有限公司 Data credible data management method and system based on block chain technology
CN112003704A (en) * 2020-07-31 2020-11-27 中科扶云(杭州)科技有限公司 Electronic evidence processing method and device and computer equipment
CN112163241A (en) * 2020-09-09 2021-01-01 法信公证云(厦门)科技有限公司 Notarization archive information processing method, system, platform, equipment and storage medium
CN112100665A (en) * 2020-09-23 2020-12-18 江苏四象软件有限公司 Data sharing system based on block chain
CN112241435A (en) * 2020-10-23 2021-01-19 山西特信环宇信息技术有限公司 Cone block chain storage system and consensus storage method
CN112487443A (en) * 2020-11-11 2021-03-12 昆明理工大学 Energy data fine-grained access control method based on block chain
CN112468565A (en) * 2020-11-19 2021-03-09 江苏省测绘资料档案馆 System for managing space data integrity and tracking shared flow based on block chain
CN112818365B (en) * 2021-02-01 2021-07-23 上海竞动科技有限公司 User privacy data protection method and system based on block chain
CN112818365A (en) * 2021-02-01 2021-05-18 上海竞动科技有限公司 User privacy data protection method and system based on block chain
CN112966126A (en) * 2021-02-26 2021-06-15 南京审计大学 High-reliability knowledge base construction method capable of inquiring and tracing mass unstructured data content
CN113438084A (en) * 2021-06-23 2021-09-24 国网北京市电力公司 Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN113438084B (en) * 2021-06-23 2022-11-29 国网北京市电力公司 Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN113656365A (en) * 2021-07-28 2021-11-16 熵链科技(福建)有限公司 Data sharing method and system based on block chain
CN114528346A (en) * 2022-01-27 2022-05-24 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114528346B (en) * 2022-01-27 2023-01-13 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114938278B (en) * 2022-04-11 2023-10-31 北京邮电大学 Zero-trust access control method and device
CN114938278A (en) * 2022-04-11 2022-08-23 北京邮电大学 Zero trust access control method and device
CN115021914A (en) * 2022-06-14 2022-09-06 广西师范大学 Safe and efficient education seniority witness method based on block chain
CN115801815A (en) * 2023-02-03 2023-03-14 安徽中科晶格技术有限公司 Block chain-based plant growth condition sharing method and device and storage medium

Also Published As

Publication number Publication date
CN109040012B (en) 2021-02-09

Similar Documents

Publication Publication Date Title
CN109040012A (en) A kind of data security protecting and sharing method based on block chain and system and application
Liang et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data
US11212268B2 (en) Method and system for identity and access management for blockchain interoperability
Zhang et al. Blockchain-based public integrity verification for cloud storage against procrastinating auditors
CN107426157B (en) Alliance chain authority control method based on digital certificate and CA authentication system
CN105072180B (en) A kind of cloud storage data safety sharing method for having permission time control
CN109145612B (en) Block chain-based cloud data sharing method for preventing data tampering and user collusion
US20210089676A1 (en) Methods and systems for secure data exchange
CN109327481B (en) Block chain-based unified online authentication method and system for whole network
Wang et al. Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches
Yao et al. PBCert: Privacy-preserving blockchain-based certificate status validation toward mass storage management
CN105516110A (en) Mobile equipment secure data transmission method
CN109962890A (en) A kind of the authentication service device and node access, user authen method of block chain
CN106992988A (en) A kind of cross-domain anonymous resource sharing platform and its implementation
CN109858259A (en) The data protection of community health service alliance and sharing method based on HyperLedger Fabric
CN105450750A (en) Secure interaction method for intelligent terminal
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
Guo et al. Using blockchain to control access to cloud data
Fotiou et al. Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials
Wang et al. A role-based access control system using attribute-based encryption
CN111414340A (en) File sharing method and device, computer equipment and storage medium
Joseph et al. Protecting information stored inside the cloud with A new CCA-EBO protocol designed on hive technology
CN115643047A (en) Block chain identity authentication method based on honest rewards
Jin et al. A Blockchain-Based Scheme for Secure Storage and Sharing of Student Digital Profiles
Mershad et al. Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant