CN109145612A - The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain - Google Patents

The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain Download PDF

Info

Publication number
CN109145612A
CN109145612A CN201810733972.XA CN201810733972A CN109145612A CN 109145612 A CN109145612 A CN 109145612A CN 201810733972 A CN201810733972 A CN 201810733972A CN 109145612 A CN109145612 A CN 109145612A
Authority
CN
China
Prior art keywords
data
user
dol
block
group leader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810733972.XA
Other languages
Chinese (zh)
Other versions
CN109145612B (en
Inventor
徐光伟
马永东
王文涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Donghua University
National Dong Hwa University
Original Assignee
Donghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Donghua University filed Critical Donghua University
Priority to CN201810733972.XA priority Critical patent/CN109145612B/en
Publication of CN109145612A publication Critical patent/CN109145612A/en
Application granted granted Critical
Publication of CN109145612B publication Critical patent/CN109145612B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

Recently as cloud using more and more extensive, both at home and abroad constantly occur about the problem of cloud shared data privacy leakage, privacy leakage problem becomes hot spot concerned by people in cloud data sharing, and relevant solution also constantly proposes.It is mostly formed with single sharer or specific user in currently existing scheme.However, sharing in scene in real data, the data shared are usually to be provided by the long numeric data owner; this brings a series of new problems to the privacy of protection data; if shared data is maliciously tampered, conspired between malicious user and user and cloud service provider between conspire.The invention proposes a kind of cloud data sharing methods that anti-data tampering, user's collusion are realized based on block chain.This method realizes that data are not distorted when shared by malicious user by using the method for disclosing book keeping operation and intelligent contract in block chain, (p is used simultaneously, t) thresholding Paillier cryptographic system realizes the confidentiality of shared data, avoids and conspires between malicious user come the problem of stealing shared data.

Description

The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
Technical field
The anti-tamper cloud data sharing method with user's collusion resistant of data is realized based on block chain the present invention relates to a kind of, is belonged to In cloud data sharing, data-privacy, block chain field.
Background technique
With network technology and the fast development of cloud computing, enterprise or personal data amount are increased rapidly.It is deposited in order to convenient Storage and shared data, more and more enterprises or the personal data for being possessed oneself, which are stored and shared, is transferred to cloud space In, compared with traditional information sharing and the communication technology, cloud computing has the characteristics that low energy consumption and resource high-efficiency are shared.However, This brings huge challenge to information securities such as loss of data and privacy compromises.Moreover, user will when data are stored in the cloud It is unable to control its personal data completely, this becomes emphasis to the confidentiality and privacy for ensuring shared data and considers the problems of.
To solve the above-mentioned problems, existing solution be in Data share model using center authority (CA, Central authority) or Third Party Authentication mechanism (TPA, Third-party authentication) be responsible for management The certification work of data and code key, or dedicated root certificate key is protected in certification authority.However still have in the above solution Shortcoming, center authority and third party be it is incredible, be easy to appear collusion either the centralization of state power the problems such as.And certain CA and TPA are not needed in scene.A kind of such as scientific research learns in shared scene, and the user with set of metadata of similar data can be according to them Demand carry out data trade, or significant result is obtained by shared calculate.It is not need to establish a letter between them Appoint center authority CA to be responsible for managing the shared data of oneself, does not need special certification authority TPA also to be responsible for.If It will lead to systematic processing steps complexity in this way, be easy to cause shared data to be tampered, and between malicious user The problems such as conspiracy.
Summary of the invention
The purpose of the present invention is: under cloud data sharing service, prevent data be maliciously tampered and malicious user collusion Shared data is stolen, proposes a kind of safe cloud sharing method.
In order to achieve the above object, realize that anti-data are usurped based on block chain the technical solution of the present invention is to provide a kind of Change, the cloud data sharing method of user's collusion, which comprises the following steps:
System parameter (g, P, H, H is calculated by initialization in step 10, H1, H2, U, V, W, h1, h2, f, Encκ()), In formula, g is randomly selected generator, g ∈ G1, G1For cyclic group;P=γ g, γ are random integers, It is non- Zero set of integers;H,H0To belong to cyclic group G1Two elements;H11·H0, H22·H0, ξ1、ξ2It is randomly selected Integer, For the prime number collection of non-zero;W=γ * P;h1、h2It is breathed out for two Uncommon function;F is random integers,Encκ() is Encryption Algorithm;
Step 2, using (p, t) thresholding Paillier cipher system, private key sk separates and is distributed to p user, p >= 2, in distribution procedure, according to data sharing devotion rate number carry out recommend a group leader data owner DOL, user's code key Distribution be responsible for by group leader data owner DOL, DOL and CA and TPA herein is different, the permission of DOL do not have CA and TPA high.And DOL is only the effect of Private key distribution and verifying in the method, maximum permission (Member Authentication, data quilt Distort) it is to have oneself to be responsible for by each member.Code key is sent to accordingly by group leader data owner DOL by the channel of safety User;
Step 3 generates file using the method for homomorphic cryptography, then uploads file;
Step 4, after user authentication passes through, user carry out shared data access operation, when user need more new data block When, user must carry out signature operation to data block, if user i is to data block m after data block updateiAfter being updated, Data block miIn carried out signature operation, sign by IDi, mii, SiFour parts composition, wherein IDiFor data block miId, mi For data block mi、σiFor signature, SiFor the identity of signer;
In carrying out data sharing process, if data are distorted by a certain user's malice, results in other users and collected Experience card, if showing that active user is the condition for the honest user being unsatisfactory in shared, data institute not over verifying formula The destruction operation of the person of having group leader DOL execution active user;
Step 5, user group detect, and each user in user group is a member, comprising the following steps:
Step 501, each member submit to group leader data owner DOLWith a signature δi, AiFor at The unique identification of member i, verifies Ai=Wi*ttmpIt is whether true, for member i, if not, 502 are then entered step, if so, Then enter step 503;
Step 502, member i send an error reporting to group leader data owner DOL, and error reporting is (N, IDi, γi,mi-1), in formula: N=h2(IDi| | t | 0≤t≤n-1), t is error reporting effective time threshold value; rjFor selected by member i Random integers;mt-1The data block updated for the expression t-1 moment;, group leader data owner DOL is according to error reporting inspection Ai =Wi*ttmpIt is whether true, if so, then (indicate that the member is not malicious user);If not, then indicate that member i is sent to The message of other members is different from the message that member i submits to group leader data owner DOL, and member i must be whithin a period of time Error reporting is retransmitted, if member i retransmits error reporting in threshold value t, group leader data owner DOL is according to mistake A is reexamined in reporti=Wi*ttmpIt is whether true, if member i is no in threshold value t to retransmit error reporting, show member i For insincere node, the removing members i from member, group leader data owner DOL execute the destruction operation of member i;
Step 503, member i are honest member, continue to execute the judgement operation of next member;
Step 6, open book keeping operation are broadcasted, operation note of the other users to the broadcasting user after user data access It is verified and is recorded, in entire shared procedure, after having multiple users to find mistake, errors validity operation is initiated in application, And minimum t member participates in verifying.All data are stored in a manner of data block in this method:
It is believable and is not affected by and distorts to ensure to record content, data hash value is stored in project block structure, data Block is made of multiple entry blocks, calculates hashed value to obtain the Merkle root of data block.Merkle root is submitted to block chain, with Just data will not be tampered, the cryptographic Hash and head information of each entry block stored items;
Each data include five kinds of information: i-th of data block mi, signature sigmai, data block miIdIDi, the identity of signer SiAnd hashed value, user record request and using public key be used as identity, by represent node whether receive broadcast request realize save The update operation of point information;
Step 7, code key update:
Group leader data owner DOL periodically carry out user's code key update operation, meanwhile, at certain time intervals in, mould After occurring multiple malice altered data problem in type, group leader data owner DOL initiates user's code key and updates operation.
The present invention has the advantage that
1) present invention can solve the problem of cloud shared data is tampered.By using block chain technology, user is each Access can be all recorded in block chain, and the public key information of identity-based is all had recorded in each access, once data quilt It distorts, other users can efficiently trace back to the malicious user.Moreover, can exchange in this scenario, between user shared Data, and Transaction Information is encrypted between a plurality of users, to ensure its safety and reliability.
2) present invention can solve the problem of user conspires in cloud shared environment.It is close using (p, t) thresholding Paillier Code system protects the multiparty data privacy in block chain.In the present invention, (p, t) thresholding Paillier cipher system is applied In block chain.Private key sk is separated (sk1, sk2..., skp) and be assigned to p participant.If a side wants decryption ciphertext C then needs to polymerize at least (t-1) a private key of its other party.This is difficult to realize in practice.
3) mutual equality, equality execute update and the attended operation of data, not only solve between honest user in the present invention Traditional center authority CA, Third Party Authentication mechanism TPA etc. safeguard data, but participate in keeping accounts by user, safeguarding altogether Enjoy the safety of data.Meanwhile solving the problems, such as the insincere of Cloud Server, and calculation amount is decomposed, meet practical Scene needs.
Detailed description of the invention
Fig. 1 is this method model schematic;
Fig. 2 is this method data block signature format structure figure;
Fig. 3 is user's testing process schematic diagram;
The storage format of Fig. 4 Merkle tree;
Fig. 5 item data structure.
Specific embodiment
In order to make the present invention more obvious and understandable, hereby with preferred embodiment, and attached drawing is cooperated to be described in detail below.
As shown in Figure 1, the model of this method is by data owner (data owner), cloud service provider (CSP), user (user) three roles' compositions such as.(1) then data owner uploads in Cloud Server and is total to first to data encryption It enjoys, wherein data owner is formed by specially sharing with part-time shared (user) two roles.User i.e. in the scene can also Share oneself all data.In data owner, according to data sharing devotion rate number carry out recommend one Group leader data owner (Data Owner Leader, hereinafter referred to as DOL), a few thing for carrying out data manipulation are responsible for, DOL is the role of honest data sharer and responsible person in the solution of the present invention.(2) cloud service provider is responsible for data and is possessed The data of person store, and cloud service provider is storing data honest and curious, that it can be honest, but also can be continuous Detect stored data content.(3) user is the data requirements person in scheme, after user passes through authentication, just constantly Data in access or update cloud.User may be data owner in the model simultaneously, can update uploaded number According to the data of accessible other users.
It is provided by the invention it is a kind of anti-data tampering is realized based on block chain, the cloud data sharing method of user's collusion can be with It is divided into eight parts: initialization, key generation, user's detection, file generated and upload, file-sharing, user accounting, user's revocation And code key updates.
Step 1: initialization, initialization section mainly include parameter initialization, and the part such as user's registration forms, including following Step:
Step 101: selection two elements H, H0, and H, H0 ∈ G1, G1For cyclic group, and randomly choose two prime numbers For non-zero prime number collection.The step is responsible for by DOL.DOL is that data owner recommends to select, and DOL has user The revocation permission of registration and user's code key, the common owner of other permissions and data is identical, sees formula (1) in detail:
Step 102: one generator g ∈ G of random selection1With a random integers For nonzero integer collection, so P=γ g, W=γ P is calculated afterwardsq.In addition DOL selects two hash function h1、h2, its random length is respectively mapped to G1Non-zero section and non-zero points
Step 103: another integer f is selected, and
After the calculating of step 101 to step 103, system parameter (g, P, H, H can be obtained0, H1, H2, U, V, W, h1, h2, f, Encκ()), wherein Encκ() is system encryption algorithm, is mainly used for the effect of data encryption.
Step 2: code key generation phase, using (p, t) thresholding Paillier cipher system, in which: private key sk separation (indicates Are as follows: sk1, sk2..., skp) and be distributed to a user of p (p >=2);T is to need to decrypt ciphertext number threshold value, i.e., only t More than people either t people it can just decrypt ciphertext.In actual scene, data are by safeguarding in many ways, therefore, if a side thinks Entire ciphertext C is decrypted, then at least needs to polymerize (t-1) a private key of other even-odd checks.This is in practical situations to be difficult Realize collusion.Step 2 specifically comprises the following steps:
Step 201: code key generates (sk, pk), and pk is public-key cryptography.DOL distributes secret value to group user as follows:
Step 2011: creation user's polynomial f (x) generates private key, as shown in formula (2):
In formula (2),For secret, i.e., complete private key;AiFor all marks for representing i user;skiTo indicate i user Private key, wherein the value range of i is between [1, p].Finally, each user has secret value, i.e. shared secret key.When him Need for confidentiality when, administrator rebuilds key, and very safe channel is sent to corresponding user.
Step 2012: generating public-key cryptography pk
The generation of public-key cryptography pk is realized using existing method.Then, data owner by ciphertext C and is based on The public-key cryptography pk of identity is sent collectively to cloud data center.
Step 3: file generated and upload
The operation of file generated and upload mainly between data owner and Cloud Server, data owner is first to general File to be sharing is encrypted, and encrypted file is then uploaded to cloud data center, comprising the following steps:
Step 301: file generated operation
Piecemeal and cryptographic operation mainly are carried out to the file of upload, the method used is homomorphic cryptography.Homomorphic cryptography permits Family allowable directly executes the algebraic operation specific to ciphertext, obtains as a result, and executing to identical plaintext encrypted result identical Operation.Public-key cryptography pk and private key sk are generated by security parameter α.Public-key cryptography pk is used for encrypting plaintext, and private key sk is for decrypting Ciphertext.Assuming that plaintext m ∈ Zn, n are a big positive integer, ZnIt is the set of integer mould n, by the encryption of plaintext m in the present invention It is expressed as Epk(m).Homomorphic cryptography has attribute:
In formula (3) and formula (4), m1And m2It is the plaintext for needing to encrypt;And a is constant.
Step 302 file uploads
Be located between user and cloud and upload file f, hashing operation is carried out to file f, so that H:{ 0,1 * → { 0,1 }l, l It is expressed as the length of Hash.After i.e. user carries out hashing operation to file f, a Hash keys K is generatedf=H (f), uses KfInto Row uniquely tagged file f.
Step 303: Encryption Algorithm employed in encryption this method is described in step 301, with formula f*=EpkGeneration List file f has been encrypted.Due to mentioning K in step 302f, it is stored in local.ThereforeIt will be stored in the cloud.
Step 304: after through the above steps, user is by f*AndIt is sent to cloud data center.
Step 4: file-sharing, after user authentication passes through, user carries out shared data access operation, including following step It is rapid:
Step 401: user is carrying out after authentication passes through, can access cloud it is shared in data;
Step 402: when user needs more new data block, user must be signed data block after data block update Name operation, the format that user signs to data block are as shown in Figure 2.By taking user i as an example, in user i to data block miIt is updated Afterwards, in data block miIn carried out signature operation, sign by IDi, mii, SiFour parts form, wherein IDiRepresent data block mi Id, miRepresent data block mi、σiBy procuration, SiThe identity of by procuration person.Signing structure figure is as shown in Figure 2.
In carrying out data sharing process, is distorted if there is data by a certain user's malice, then result in other users It read the data being destroyed, other users carry out collective's verifying, then show that the user is the honest use being unsatisfactory in shared The condition at family, then execute delete operation.
It is as follows that user collective verifies formula:
Formula (5), f (x) are that t user combines the ciphertext being decrypted.
When executing delete operation, DOL carries out destroying the code key of the user and the access authority of data.Meanwhile other users The record that also will record dishonest user in the account book of oneself, when next time, the user carried out data access request again, system The operation of refusal request can be executed.
Step 5: user's detection, in the user group being made of obstructed user, cannot ensure that each user is can Letter, there are the possibility that the user of malice damages shared data.This will lead to the number that other users in user group have accessed mistake According to.Therefore, user's detection is needed to be implemented in sharing, and revocation sharing operation is executed to malicious user, is included the following steps
Step 501: user's detection
Firstly, DOL is that all members are broadcasted { N, IDdol, Ai| 0≤i≤v-1 }, in formula, N=h2(IDi||t|0≤ I≤n-1), IDdolFor the identity of DOL, AiFor the unique identification of a member.Then each member is required to send one Verifying report.Each user submits A to DOLi2*g*ttmpWith a signature δi, f is a non-zero integer,When After being verified, A is verifiedi=Wi*ttmp(6) whether equal.
Step 502: error detection
If verification expression (6) is unequal, DOL needs active user i to send error reporting (N, an IDji,mt-1)。 Error reporting includes the key of user i and the message that he receives from prospective users.Then, DOL check again for formula (6) whether at It is vertical.If invalid, then it represents that the message that user i is sent to other users is different from the message that user i submits to DOL.Therefore, User i must retransmit error reporting whithin a period of time.If set up, showing that i user is not is malicious user.
In the case where formula (6) is invalid, if user i is reported in threshold value t without retransmitting, show the user i For can not credit household, then should delete user i from user group, DOL executes the destruction operation of user i.If user i is in threshold value t Report has inside been retransmitted, then whether true has rejudged formula (6).
If verification expression (6) is equal, active user i is honest user, and DOL detects remaining user in user group, The form and content of detection are as the form that user i is detected.If having the use similar to user i during detection Family then carries out delete processing to the user.It is illustrated in figure 3 the flow chart of entire user's detection.
Step 6: open book keeping operation is broadcasted, operation note of the other users to the broadcasting user after user data access It is verified and is recorded, comprising the following steps:
Step 601: data block storage, in the present invention, all data are stored in a manner of data block.To ensure to remember Record content is believable and is not affected by and distorts, and data hash value will be stored in the project structure of our buildings.By projects Hashed value is put into project block structure, can effectively reduce search space, accelerates user to the inspection speed of record.
Data block is made of multiple entry blocks, calculates hashed value to obtain the Merkle root of data block.Merkle root is mentioned It is sent to block chain, so that data will not be tampered.The cryptographic Hash and head information of each entry block stored items.Each data packet Containing five kinds of information: mi、σi、IDi、SiAnd hashed value.The storage organization and item data structure of Merkle tree are respectively such as Fig. 4 and Fig. 5 It is shown.
Step 602 intelligence contract
Intelligent contract is used to data information block chain is written.The specification of intelligent contract program is as follows:
Step 6021: user initiates record request, and using public key as oneself authentication.
Step 6022: representing node and receive request, and broadcast accepted request.If do not received, or else responded Operation.
Step 6023: user submits record, represents node according to the public key of user and record is added to project.
Step 6024: representing node broadcasts project verification information, represent node verification record, other node updates data.
Step 6025: inspecting periodically the quantity of entry block, and the Merkle root of calculation block.By all newly-generated data blocks Merkle root be anchored to block chain.
Step 6026: returning to step 6021, carry out performing the next step contract operation.
Step 7: code key updates, and in order to ensure the safety of shared data, DOL can periodically carry out the update behaviour of user's code key Make.Meanwhile at certain time intervals in, after occurring multiple malice altered data problem in model, in order to ensure the peace of data Entirely, DOL initiates the update operation of user's code key.

Claims (1)

1. it is a kind of based on block chain realize anti-data tampering, user collusion cloud data sharing method, which is characterized in that including with Lower step:
System parameter is calculated by initialization in step 1In formula, G is randomly selected generator, g ∈ G1, G1For cyclic group;P=γ g, γ are random integers,It is whole for non-zero Manifold: H, H0To belong to cyclic group G1Two elements;H11·H0, H22·H0, ξ1、ξ2For randomly selected integer,For non-zero prime number collection;W=γ * P;h1、h2For two hash functions; F is random integers, For Encryption Algorithm;
Step 2, using (p, t) thresholding Paillier cipher system, private key sk separates and is distributed to p user, >=2 p, In distribution procedure, according to data sharing devotion rate number carry out recommend a group leader data owner DOL, user's code key point Hair is responsible for by group leader data owner DOL, and group leader data owner DOL only has the function of Private key distribution and verifying;
Code key is sent to corresponding user by the channel of safety by group leader data owner DOL;
Step 3 generates file using the method for homomorphic cryptography, then uploads to file in Cloud Server;
Step 4, after user authentication passes through, user carry out shared data access operation, when user need more new data block when, use Family must carry out signature operation to data block, if user i is to data block m after data block updateiAfter being updated, in data Block miIn carried out signature operation, sign by IDi, mi, σi, SiFour parts composition, wherein IDiFor data block miId, miFor number According to block mi、σiFor signature, SiFor the identity of signer;
In carrying out data sharing process, if data are distorted by a certain user's malice, results in other users and carry out collection experience Card, if showing that active user is the condition for the honest user being unsatisfactory in shared, data owner not over verifying formula The destruction operation of group leader DOL execution active user;
Step 5, user group detect, and each user in user group is a member, comprising the following steps:
Step 501, each member submit A to group leader data owner DOLi2*g*ttmpWith a signature δi, AiFor member The unique identification of i verifies Ai=Wi*ttmpIt is whether true, for member i, if not, 502 are then entered step, if so, then Enter step 503;
Step 502, member i send an error reporting to group leader data owner DOL, and error reporting is (N, IDj, γi, mt-1), in formula: N=h2(IDi| | t | 0≤i≤n-1), t is error reporting effective time threshold value;γiTo indicate selected by member i Random number;mt-1The data block updated for the expression t-1 moment), group leader data owner DOL checks A according to error reportingi= Wi*ttmpIt is whether true, if so, then indicate that the member is not malicious user;If not, then indicate that member i is sent to other The message of member is different from the message that member i submits to group leader data owner DOL, and member i must whithin a period of time again Error reporting is sent, if member i retransmits error reporting in threshold value t, group leader data owner DOL is according to error reporting Reexamine Ai=Wi*ttmpIt is whether true, if member i is no in threshold value t to retransmit error reporting, show that member i is not Trusted node, the removing members i from member, group leader data owner DOL execute the destruction operation of member j;
Step 503, member i are honest member, continue to execute the judgement operation of next member;
Step 6, open book keeping operation are broadcasted after user data access, and other users carry out the operation note of the broadcasting user It verifies and records, in entire shared procedure, after having multiple users to find mistake, errors validity operation is initiated in application, and most Few t member participates in verifying, and all data are stored in a manner of data block:
Be believable and be not affected by and distort to ensure to record content, data hash value is stored in project block structure, data block by Multiple entry block compositions calculate hashed value to obtain the Merkle root of data block.Merkle root is submitted to block chain, to count According to will not be tampered, the cryptographic Hash and head information of each entry block stored items;
Each data include five kinds of information: i-th of data block mi, signature sigmai, data block miId, the identity S of signeriAnd hash Whether value, user record request and using public key as identity receive broadcast request by representing node and realize nodal information Update operation;
Step 7, code key update:
Group leader data owner DOL periodically carry out user's code key update operation, meanwhile, at certain time intervals in, in model After there is multiple malice altered data problem, group leader data owner DOL initiates user's code key and updates operation.
CN201810733972.XA 2018-07-05 2018-07-05 Block chain-based cloud data sharing method for preventing data tampering and user collusion Active CN109145612B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810733972.XA CN109145612B (en) 2018-07-05 2018-07-05 Block chain-based cloud data sharing method for preventing data tampering and user collusion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810733972.XA CN109145612B (en) 2018-07-05 2018-07-05 Block chain-based cloud data sharing method for preventing data tampering and user collusion

Publications (2)

Publication Number Publication Date
CN109145612A true CN109145612A (en) 2019-01-04
CN109145612B CN109145612B (en) 2021-11-16

Family

ID=64799733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810733972.XA Active CN109145612B (en) 2018-07-05 2018-07-05 Block chain-based cloud data sharing method for preventing data tampering and user collusion

Country Status (1)

Country Link
CN (1) CN109145612B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922077A (en) * 2019-03-27 2019-06-21 北京思源互联科技有限公司 A kind of identity identifying method and its system based on block chain
CN110059088A (en) * 2019-03-26 2019-07-26 阿里巴巴集团控股有限公司 Data attribute identification method, device and equipment in a kind of piece of chain type account book
CN110098919A (en) * 2019-04-26 2019-08-06 西安电子科技大学 The acquisition methods of data permission based on block chain
CN110516469A (en) * 2019-07-31 2019-11-29 苏州白杨软件有限公司 A kind of anti-hacking methods in shared big data application scenarios based on block chain
CN111259433A (en) * 2020-02-18 2020-06-09 重庆第二师范学院 Block chain privacy protection system
CN111368003A (en) * 2020-03-06 2020-07-03 安徽中科智链信息科技有限公司 Management method of multi-chain anchoring data
CN111950025A (en) * 2020-08-21 2020-11-17 安徽高山科技有限公司 File distributed storage method based on block chain intelligent contract
CN112953712A (en) * 2021-02-19 2021-06-11 昆明理工大学 Block chain data cross-chain sharing method based on zero knowledge proof and homomorphic encryption
WO2021114819A1 (en) * 2019-12-11 2021-06-17 支付宝(杭州)信息技术有限公司 Methods for generating and executing smart contract transaction and device
CN114266061A (en) * 2021-12-28 2022-04-01 航天科工智能运筹与信息安全研究院(武汉)有限公司 Offline data tamper-proof method based on hash chain
CN114282248A (en) * 2021-12-28 2022-04-05 航天科工智能运筹与信息安全研究院(武汉)有限公司 Offline data tamper-proof system based on hash chain

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685501B (en) * 2018-12-04 2023-04-07 暨南大学 Auditable privacy protection deep learning platform construction method based on block chain excitation mechanism

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196934A (en) * 2017-05-18 2017-09-22 电子科技大学 A kind of cloud data managing method based on block chain
CN107533501A (en) * 2015-03-20 2018-01-02 里维茨公司 Use block chain automated validation appliance integrality
US20180129945A1 (en) * 2016-11-09 2018-05-10 Cognitive Scale, Inc. Method for Cognitive Information Processing Using a Cognitive Blockchain Architecture

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107533501A (en) * 2015-03-20 2018-01-02 里维茨公司 Use block chain automated validation appliance integrality
US20180129945A1 (en) * 2016-11-09 2018-05-10 Cognitive Scale, Inc. Method for Cognitive Information Processing Using a Cognitive Blockchain Architecture
CN107196934A (en) * 2017-05-18 2017-09-22 电子科技大学 A kind of cloud data managing method based on block chain

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059088A (en) * 2019-03-26 2019-07-26 阿里巴巴集团控股有限公司 Data attribute identification method, device and equipment in a kind of piece of chain type account book
CN110059088B (en) * 2019-03-26 2023-02-28 创新先进技术有限公司 Data attribute identification method, device and equipment in block chain type account book
CN109922077B (en) * 2019-03-27 2021-06-04 北京思源理想控股集团有限公司 Identity authentication method and system based on block chain
CN109922077A (en) * 2019-03-27 2019-06-21 北京思源互联科技有限公司 A kind of identity identifying method and its system based on block chain
CN110098919A (en) * 2019-04-26 2019-08-06 西安电子科技大学 The acquisition methods of data permission based on block chain
CN110516469A (en) * 2019-07-31 2019-11-29 苏州白杨软件有限公司 A kind of anti-hacking methods in shared big data application scenarios based on block chain
CN110516469B (en) * 2019-07-31 2023-05-26 苏州白杨软件有限公司 Anti-hacking method in shared big data application scene based on block chain
WO2021114819A1 (en) * 2019-12-11 2021-06-17 支付宝(杭州)信息技术有限公司 Methods for generating and executing smart contract transaction and device
CN111259433A (en) * 2020-02-18 2020-06-09 重庆第二师范学院 Block chain privacy protection system
CN111368003B (en) * 2020-03-06 2020-10-16 安徽中科智链信息科技有限公司 Management method of multi-chain anchoring data
CN111368003A (en) * 2020-03-06 2020-07-03 安徽中科智链信息科技有限公司 Management method of multi-chain anchoring data
CN111950025A (en) * 2020-08-21 2020-11-17 安徽高山科技有限公司 File distributed storage method based on block chain intelligent contract
CN112953712A (en) * 2021-02-19 2021-06-11 昆明理工大学 Block chain data cross-chain sharing method based on zero knowledge proof and homomorphic encryption
CN112953712B (en) * 2021-02-19 2022-10-18 昆明理工大学 Data cross-chain sharing method based on zero knowledge proof and homomorphic encryption
CN114266061A (en) * 2021-12-28 2022-04-01 航天科工智能运筹与信息安全研究院(武汉)有限公司 Offline data tamper-proof method based on hash chain
CN114282248A (en) * 2021-12-28 2022-04-05 航天科工智能运筹与信息安全研究院(武汉)有限公司 Offline data tamper-proof system based on hash chain
CN114266061B (en) * 2021-12-28 2024-03-26 航天科工智能运筹与信息安全研究院(武汉)有限公司 Offline data tamper-proof method based on hash chain
CN114282248B (en) * 2021-12-28 2024-04-05 航天科工智能运筹与信息安全研究院(武汉)有限公司 Offline data tamper-proof system based on hash chain

Also Published As

Publication number Publication date
CN109145612B (en) 2021-11-16

Similar Documents

Publication Publication Date Title
CN109145612A (en) The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
CN112019591B (en) Cloud data sharing method based on block chain
Cui et al. Attribute-based storage supporting secure deduplication of encrypted data in cloud
Han et al. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
US20170142082A1 (en) System and method for secure deposit and recovery of secret data
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
CN110430161B (en) Unsupervised data anonymous sharing method and system based on block chain
CN104901942A (en) Distributed access control method for attribute-based encryption
CN102075544A (en) Encryption system, encryption method and decryption method for local area network shared file
Tian et al. Policy-based chameleon hash for blockchain rewriting with black-box accountability
JP2010220212A (en) Securing communications sent by first user to second user
Zhang et al. Multiauthority access control with anonymous authentication for personal health record
CN112383391B (en) Data security protection method based on data attribute authorization, storage medium and terminal
Xu et al. Expressive bilateral access control for internet-of-things in cloud-fog computing
CN110086615A (en) A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured
CN117201132A (en) Multi-committee attribute base encryption method capable of achieving complete decentralization and application of multi-committee attribute base encryption method
CN115174184A (en) Attribute-based encryption-based transaction object identity anonymous traceable method, network device and storage device
Wen et al. A privacy-preserving blockchain supervision framework in the multiparty setting
Ma et al. Be-trdss: Blockchain-enabled secure and efficient traceable-revocable data-sharing scheme in industrial internet of things
Wu et al. The security and privacy of blockchain-enabled EMR storage management scheme
CN117040800A (en) Personal archive management scheme based on alliance chain and non-certificate searchable encryption
CN114124392B (en) Data controlled circulation method, system, device and medium supporting access control
Zhang et al. Data security in cloud storage
Bai et al. Expressive ciphertext-policy attribute-based encryption with direct user revocation
Liu et al. A certificateless multi-dimensional data aggregation scheme for smart grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant