CN109325331A - Transaction system is acquired based on the big data of block chain and credible calculating platform - Google Patents

Transaction system is acquired based on the big data of block chain and credible calculating platform Download PDF

Info

Publication number
CN109325331A
CN109325331A CN201811069639.XA CN201811069639A CN109325331A CN 109325331 A CN109325331 A CN 109325331A CN 201811069639 A CN201811069639 A CN 201811069639A CN 109325331 A CN109325331 A CN 109325331A
Authority
CN
China
Prior art keywords
data
block
chain
voucher
credible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811069639.XA
Other languages
Chinese (zh)
Other versions
CN109325331B (en
Inventor
关振宇
刘建伟
赵莹
李大伟
秦煜瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201811069639.XA priority Critical patent/CN109325331B/en
Publication of CN109325331A publication Critical patent/CN109325331A/en
Application granted granted Critical
Publication of CN109325331B publication Critical patent/CN109325331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Virology (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Transaction system is acquired based on the big data of block chain and credible calculating platform the invention discloses a kind of, comprising: address verifying module, data acquisition module, data uploading module, data credibility authentication module and data recompense payment module on user's chain.The system is by merging extensive personal data isolated island to solve the problems, such as that data source is in short supply; and implement comprehensive supervision and protection by the acquisition to data, storage, packing, upload operation; the full link for realizing data is credible, and the method for using Direct Anonymous to prove makes data Collection Co., Ltd protect privacy of user in the validity of public key address on authenticating user's chain;Also, the characteristics of based on the intelligence contract decentralization of block chain and automating guarantees the open and clear of data reward payment; thus the contradiction reconciled between personal privacy protection and big data acquisition to a certain extent; and ensure the credibility of data source, while there is practicability, it is simple easily to realize.

Description

Transaction system is acquired based on the big data of block chain and credible calculating platform
Technical field
It is the present invention relates to cloud computing security technology area, in particular to a kind of big based on block chain and credible calculating platform Data acquire transaction system.
Background technique
Recently as the fast development of multimedia technology, software technology and memory technology, the skills such as big data, machine learning Art has a deep effect on and changes social production life style, but reliable data source is that these technologies are implemented, operation, developed Premise.Popularizing for internet of things equipment provides resolving ideas for big data source problem in short supply, and extensive internet of things equipment can be adopted The personal locating and tracking record data of collection, individual health data, personal lifestyle habit and hobby data etc. are a variety of with economic analysis The data of value, but how to guarantee fair credible and data set provider the privacy of data trade currently without mature solution Certainly scheme.
Summary of the invention
The application is to be made based on inventor to the understanding of following problems and discovery:
Internet network application technology fast development is universal, and the development of Web2.0 leads to the network user and network number in addition It grows at top speed according to amount, the characteristics of more stringent requirements are proposed for storage and processing ability of the user to data, cloud computing has catered to this A little demands.The cloud computing service of centralization provides great convenience for user's storage, and user need not be concerned about complicated hardware again Management.Although cloud computing has these attracting advantages, it also brings new security challenge and threat to data protection: first First, since user physically has their data no longer, the encryption for being conventionally used to data protection cannot be directly used.Its Secondary, although the equipment under cloud computing is more powerful than personal computing devices reliable, they still suffer from inside and outside number It is threatened according to integrality, the hackers for largely coveting cloud data ceaselessly excavate service provider Web using upper loophole, with expectation It makes a breach, obtains valuable data.Finally, that have high priority data access right is not user oneself, but cloud computing Service provider.Due to benefits program, cloud service supplier may have dishonest conduct to the data of user.Private clound has object Controllability, specificity and high security are managed, so being the choosing of current more and more people using private cloud storage individual privacy data It selects.
Data demand collected of the embodiment of the present invention copes with Internet of Things from the hardware physical equipment by certification, system Sensor device carries out authentication.Conventional authentication mode is normally based on Cryptography Principles, by key storage non-volatile In memory, certification and protection secret information therein to physical entity are realized by modes such as digital signature, encryptions, however This mode may suffer from the physical attacks such as Network Intrusion, half Network Intrusion, side-channel attack, be also easy to soft by virus etc. The attack of part;Application of traditional authentication mode in the case where resource is limited, computing capability is poor can also there is a problem of many And obstacle.Different from conventional authentication mode, the present invention uses the hardware accreditation scheme energy based on physics unclonable function Effectively solve the problems, such as above-mentioned key storage and authentication.(Physical Unclonable Function, physics is or not PUF Function can be cloned) it is widely used in digital circuit, usually broadly it is divided into the PUF based on the storage and PUF based on delay.Its Principle be using certain rule by physical entity in process for making caused by random sex differernce and physics inhomogeneities It extracts, under the premise of entity inputs an excitation, a uncertain response is exported, using the response as the physics The unique identification of hardware entities.In the PUF scheme of digital circuit, (Challenge Response Pairs swashs corresponding CRPs Encourage response to) can excitation input after, pass through BIST (Built-in self-test, self testing circuit) generate.PUF technology with The excellent properties such as uniqueness, unpredictability, nonclonability and anti-tamper property can solve authentication and management, knowledge produce Power protection and generation of encryption keys.
The network safety preventions such as traditional firewall, intrusion detection and virus defense means all lay particular emphasis on protection server Information security, and relatively fragile terminal just increasingly becomes the Main Weak Links of information system security.For these systems Demand for security and all kinds of attack means, trust computing are set about from Computer Architecture, establish a kind of letter from hardware security Appoint transport system to guarantee the credible of terminal, people and program, people and machine and interpersonal trust are solved from source Problem." credible " that industrial circle is generally accepted refers to establishes believable calculating environment based on security chips, it is ensured that system is real Body it is anticipated that behavior execute, wherein the safety chip for being embedded in hardware platform is known as credible platform module (Trusted Platform Module, TPM), platform is collectively referred to as credible calculating platform.Trusted Computing Group (TCG) also proposed credible meter Calculate the related specifications of platform.The function that credible calculating platform generally has has: establishing root of trust and determines trust anchor, constructs credible Chain makes to trust transmitting layer by layer, platform identity proves, completeness of platform proves the function of connecting with support trustable network.To prevent from disliking Meaning user makes up a large amount of false datas and uploads transaction, and the present invention uses reliable computing technology to mention for the acquisition of data, storage, processing For the credible of full link.
It 2008, is put forward for the first time by middle acute hearing (Satoshi Nakamoto) and the Standard Proof concept of bit coin, area Block chain (Blockchain) technology, as a kind of information technology most crucial in bit coin transaction system, because of its transaction system What open, not depend on any trust authority decentralization, timestamp and digital signature was guaranteed can not tamper and conjunction Method transaction be stored in block chain it is permanent the features such as, solve the problems, such as dual consumption problem and Byzantium general, and realize one Common recognition network system of the kind without trust.Then more and more block chain projects are come into being, and ether mill (Ethereum) is Wherein representative one, it is the complete information system of figure spirit and supports that customized intelligent contract, intelligent contract are One section of executable code on block chain, when a triggering condition is met, open and clear intelligent contract can go central place to hold automatically Row.This favors ether mill by more and more developers.The present invention is based on the peaces that block chain technology completes critical data Entirely, fair, the automatic payment with data reward is permanently stored.
Based on above-mentioned application demand and technical background, the embodiment of the present invention is that one kind is set for extensive personal Internet of things The credible big data of standby network acquires transaction system.Private clound, PUF, trust computing, block chain are merged to the system innovation Technology solves the problem of under the premise of guaranteeing data validity and justice of exchange while protecting data set provider privacy, right Fused data isolated island solves the problems, such as that data are in short supply and is of great significance.
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, it is an object of the invention to propose that a kind of acquired based on the big data of block chain and credible calculating platform is traded System, the contradiction which has reconciled to a certain extent between personal privacy protection and big data acquisition, and ensure data source Credibility, and have the advantages that practical, simple easily to realize.
In order to achieve the above objectives, the embodiment of the present invention proposes a kind of big data based on block chain and credible calculating platform Acquire transaction system, comprising: address verifying module on user's chain is used for data Collection Co., Ltd DCC, trusted third party TTP and use Communication interaction proves (Direct Anonymous Attestation, DAA) agreement to complete Direct Anonymous between family, and will be with DCC trade user white list is added in public key address on the block chain of credible privately owned cloud platform binding;Data acquisition module, for private Integrity measurement (the Integrity of capture program code page is executed while having cloud platform to be acquired operation Measurement) to obtain the first platform status, and hardware fingerprint is obtained and uploaded by Internet of things node, and described in utilization The data deblocking of credible privately owned cloud platform safely generates data voucher (Data Credential) with encapsulation function, to obtain The foundation of subsequent module verify data credibility;Data uploading module, for executing the integrity measurement of upload program code page To obtain the second platform status, and data block voucher (Data is generated after linking packing with the data voucher of any time period Block Credential), and shape of the public key address to trade on the block chain by being bound with the credible privately owned cloud platform Formula is uploaded to System Committee's chain;Data credibility authentication module, after announcing the data type for it is expected purchase in the DCC, The corresponding block number of user feedback and corresponding original data set are received, and the DCC is obtained under the assistance of the TTP By legitimate device under trusted status the corresponding effective district block number of acquired data, and calculate the data block of the effective block Credential verification value is uploaded to intelligent contract entrance;Data recompense payment module, for passing through the automatic traceability chain of the intelligent contract It is compared the data block voucher of the effective block of upper record with the DCC validation value submitted, with according to compare at The number of blocks of function is disclosed and is automatically recompensed to user's payment data.
The embodiment of the present invention is to acquire transaction system based on the big data of block chain and credible calculating platform, by data Acquisition, storage, packing, upload operation implement comprehensive supervision and protection, and the full link for realizing data is credible, using direct The method of anonymous attestation makes DCC protect privacy of user in the validity of public key address on authenticating user's chain;Also, it is based on The characteristics of intelligence contract decentralization of block chain and automation, guarantees the open and clear of data reward payment, thus in certain journey The contradiction reconciled on degree between personal privacy protection and big data acquisition, and ensure the credibility of data source, and have real It is simple easily to realize with property.
In addition, according to the above embodiment of the present invention acquire transaction system based on the big data of block chain and credible calculating platform System can also have following additional technical characteristic:
Further, in one embodiment of the invention, address verifying module is further used on user's chain: raw At anonymous credentials issuer TTP key;The anonymous credentials are issued to user terminal by TTP and zero-knowledge proof;By described User terminal calculates anonymity signature, to realize the DCC verifying user terminal anonymity signature correctness.
Further, in one embodiment of the invention, the data acquisition module is specifically used for: passing through what is embedded TPM carries out integrity measurement to the capture program code page, generates PCR value and metrics logs, and integrity measurement guarantees data Acquisition process operates in credible performing environment (Trusted Execution Environment, TEE), PCR value and measurement day Will can be used for the credible operation of subsequent module verifying acquisition process;Any selection is concentrated from the challenge of registration by internet of things equipment One challenge, and responded by executing BIST, challenge-response is uploaded to data, to obtain the hardware fingerprint; Data deblocking and data encapsulation are executed by the TPM, so that data are mutually bound with credible platform module, while being tied up by PCR Due to a kind of platform status, it is subsequent that the application of the technology will lead to the operation for distorting, making up privately owned cloud platform storing data will The failure of data credibility verifying;According to preset data Structure Calculation each period corresponding data voucher, include by input Sensor measurement data, timestamp, integrity measurement log, integrity measurement value, PUF challenge-response are to, previous time period Data voucher value exports the data voucher value for this period.
Further, in one embodiment of the invention, the data uploading module is specifically used for: by the TPM To upload data to block chain private clound scripting program code page carry out integrity measurement, generate corresponding metrics logs and PCR value;Input the data voucher, timestamp, the measurement day that integrity measurement generation is carried out to upload program of any one period Will and metric, and the data block voucher that the output valve obtained after link and hash operation is any time period is executed, and In the TEE set up, script is uploaded by public key address on chain and sends the transaction comprising data block voucher, so that transaction is beaten It is permanently recorded on alliance's chain of this system after wrapping chain.
Further, in one embodiment of the invention, the data credibility authentication module is specifically to be used for: passing through The type of internet of things equipment data needed for DCC is announced;The corresponding number of initial data is obtained according to the data requirements that the DCC is announced It is sent to DCC together according to the block number where block voucher, and by the block number and the initial data;The TTP's The number of effective block is obtained under assistance and calculates the data block credential verification value of effective block, and is uploaded to block platform chain Corresponding interface.
Further, in one embodiment of the invention, the data reward payment module is further used for the area Intelligent contract on block chain obtains effective block according to the data block credential verification value of the DCC effective block inputted and compiles Number, the data block evidence record value of effective block is simultaneously compared with validation value on the automatic traceability chain of contract, and according to verifying Successful data block voucher number, the intelligence contract are not relied on by third party, automatically to the user payment number According to reward.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is to acquire transaction system based on the big data of block chain and credible calculating platform according to one embodiment of the invention The structural schematic diagram of system;
Fig. 2 is to be handed over according to being acquired based on the big data of block chain and credible calculating platform for one specific embodiment of the present invention The structural schematic diagram of easy system;
Fig. 3 is the data structure schematic diagram according to the data voucher of one embodiment of the invention;
Fig. 4 is the data structure schematic diagram traded according to ether mill alliance's chain of one embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Before introducing based on the big data of block chain and credible calculating platform acquisition transaction system, first simply introduce The Fundamentals of Mathematics of the embodiment of the present invention.
(1) bilinear mapIf p is a Big prime,WithIt is the cyclic group of two p ranks, g It isA generation member,It is a bilinear map.If e meets with properties, we claimWithIt is Bilinear Groups:
1. bilinear characteristics: forThere is e (ua,ub)=e (u, v)ab=e (ub,va);
2. non-degeneracy:At least there is an element g in group, so that the e (g, g) after calculating isSome generation of group Member, i.e. e (g, g) ≠ 1;
3. computability: there are effective algorithms, so that allThe value of e (u, v) can effectively be calculated.
(2) q-SDH assumes (q-Strong Diffie-HellmanAssumption, q-SDH):
It is the cyclic group that rank is prime number p.Q-SDH assumesMiddle establishment refers to more to all probability Item formula time algorithm A, probability:
It is insignificant.Whereinψ is from groupIt arrivesIsomorphism.ψ(g2)=g1
(3) signatures of Knowledge: the embodiment of the present invention has used this work of signatures of Knowledge when constructing Direct Anonymous proof scheme Tool.It allows a side to prove that he knows a secret value in the case where not revealing any useful information.This tool is substantially It is that the zero-knowledge proof of knowledge or minimum leakage prove.Such as:
Indicate " about integer α, the zero-knowledge proof of β, δ, and y=gαhβ,It sets up, simultaneously (u≤α≤ V) ", y, g, h therein,It is groupAnd groupIn element.Meanwhile it can use The heuristic signatures of Knowledge converted zero-knowledge proof to message m of Fiat-Shamir, can such as be denoted as SPK { (α): y=gα} (m)。
(4) impact resistant hash algorithm:
Impact resistant hash function used in the embodiment of the present invention has two fundamental characteristics: one-way and anti-collision; One-way, which refers to input from hash function, derives output, and cannot export from hash function and calculate input;Impact resistant Property refers to that cannot find two different inputs simultaneously keeps its hash result identical.Hash algorithm in the present invention inputs In plain text, it exports to be mapped to domainIn element.
The big number based on block chain and credible calculating platform proposed according to embodiments of the present invention is described with reference to the accompanying drawings According to acquisition transaction system.
Fig. 1 is one embodiment of the invention based on the big data of block chain and credible calculating platform acquisition transaction system Structural schematic diagram.
As shown in Figure 1, should include: user's chain based on the big data of block chain and credible calculating platform acquisition transaction system 10 Upper address verifying module 100, data acquisition module 200, data uploading module 300, data credibility authentication module 400 and data Recompense payment module 500.
Wherein, on user's chain address verifying module 100 for data Collection Co., Ltd DCC, trusted third party TTP and user it Between communication interaction to complete Direct Anonymous identification protocol, and will add with public key address on the block chain of credible privately owned cloud platform binding Enter DCC trade user white list.Data acquisition module 200 executes acquisition journey while being acquired operation for privately owned cloud platform The integrity measurement of sequence code page obtains by Internet of things node and uploads hardware fingerprint to obtain the first platform status, and Data voucher is safely generated with encapsulation function using the data deblocking of the credible privately owned cloud platform, is tested with obtaining subsequent module Demonstrate,prove the foundation of data credibility.Data uploading module 300 is used to execute the integrity measurement of upload program code page to obtain the Two platform status, and with the data voucher of any time period link packing after generate data block voucher, and by with credible private The block chain public key address for having cloud platform to bind is uploaded to System Committee's chain in the form traded.Data credibility authentication module 400 for receiving the corresponding block number of user feedback and corresponding initial data after the data type that DCC announces expectation purchase Set, and DCC obtains under the assistance of TTP by legitimate device the corresponding effective block of the acquired data under trusted status Number, and the data block credential verification value of effective district block number is calculated, it is uploaded to intelligent contract entrance.Data recompense payment module The 500 data block voucher for the effective block by recording on the automatic traceability chain of intelligent contract tests it with what DCC was submitted Card value is compared, to be disclosed according to the successful number of blocks of comparison and automatically be recompensed to user's payment data.The present invention is real The system 10 of example is applied by merging extensive personal data isolated island to solve the problems, such as that data source is in short supply, it can be achieved that fair transparent Data trade guarantees the privacy that data set provider can also be protected while the credibility of transaction data.
It is understood that system 10 through the embodiment of the present invention, on the one hand, data Collection Co., Ltd can realize to being purchased The verifying of data reliability, integrality;On the other hand, data set provider is while keeping anonymity, deserved data reward Labor can be disclosed pellucidly automated payment.System proposed by the present invention includes following 3 network entities:
(1) data Collection Co., Ltd (Data Collection Company, DCC): it is desirable that buying personal Internet of things equipment note Record data simultaneously provide the enterprise institution of credible calculating platform equipment and trade network platform;
(2) user (User): possessing smart machine and authenticates credible calculating platform and has a mind to carry out of data trade People;
(3) trusted third party (Trusted Third Party, TTP): user's smart machine CRPs registration office, DAA association In view the issuer (Issuer) of anonymous credential and the operating status that credible calculating platform is submitted can be carried out assessment and safety The mechanism of audit.
Specifically, the present embodiments relate to it is a kind of based on PUF, trust computing, block chain technology credible big data Acquire address verifying module 100 in transaction system 10, including user's chain, data acquisition module 200, data uploading module 300, number Payment module 500 is recompensed according to Trusting eBusiness module 400 and data, system flow is as follows: 1, address validation mould on user's chain Direct Anonymous identification protocol is completed in block 100:DCC, TTP, user's Three Party Communication interaction, by the area with credible privately owned cloud platform binding DCC trade user white list is added in public key address on block chain, while not revealing any and subscriber identity information;2, data acquisition module Block 200: the integrity measurement for executing capture program code page obtains the first platform status, and Internet of things node is obtained and uploaded later Hardware fingerprint, both of the above are the foundations of subsequent module verify data credibility, later privately owned cloud platform using data deblocking with Encapsulation function is safely completed the generation of data voucher;3, data uploading module 300: the integrality of upload program code page is executed Measurement generates data block voucher after being packaged with the data links such as data voucher to obtain the second platform status, by with it is legal The block chain public key address of credible privately owned cloud platform binding is uploaded to System Committee's chain in the form traded, and reaches and permanently records Purpose;4, after data credibility authentication module 400:DCC announces the data type that expectation is bought, the corresponding block number of user feedback With corresponding original data set, it is corresponding that DCC obtains under the assistance of TTP by legitimate device the acquired data under trusted status Effective district block number, calculate effective district block number data block credential verification value, be uploaded to intelligent contract entrance;5, data are recompensed Payment module 500: the data block voucher of the effective block recorded on the intelligent automatic traceability chain of contract submits it with DCC Validation value is compared, and discloses, according to successful number of blocks is compared automatically to the reward of user's payment data.
Main thought: use PUF technology to obtain device hardware fingerprint as hardware on personal Internet of things device node and set " pass " of standby admission authentication.The privately owned cloud platform for being embedded in credible platform module passes through the integrality degree of acquisition data code page Amount, data decapsulation operation guarantee from having authenticated credibility of the Internet of things node equipment to data link privately owned cloud platform.Number It is provided with public key on the block chain of certification TPM binding in such a way that Direct Anonymous proves to data Collection Co., Ltd according to supplier Location, while the anonymity of itself can also be kept, achieve the purpose that secret protection.Finally, under the support of trusted third party, number It can verify that the credibility of data set provider data presented according to Collection Co., Ltd, data reward is obtained by the intelligent contract on block chain To fair and just payment.
Transaction system 10 is acquired to the big data based on block chain and credible calculating platform below in conjunction with specific embodiment It is further elaborated.
Further, in one embodiment of the invention, address verifying module 100 is further used on user's chain: raw At anonymous credentials issuer TTP key;Anonymous credentials are issued to user terminal by TTP and zero-knowledge proof;Pass through user terminal meter Anonymity signature is calculated, to realize that DCC verifies user terminal anonymity signature correctness.
It is understood that user uploads data block voucher cre_blockiThe channel of (i=1,2 ..., N) is block Chain, by held with user embed legal TPM privately owned cloud platform binding block chain on public key addressInitiation transaction, Transaction is completed by the mode that miner is packaged cochain permanent storage.It is added that DCC can address white list will be according on trade user chain DAA agreement is completed by user, DCC and TTP Three Party Communication interaction to realize.Wherein TTP takes on issuer, and task is to interior chimeric The privately owned cloud platform of method TPM issues anonymous credentials;Certifier is served as at user terminal, i.e. credible private clound computing platform end, and task is DAA signature is provided to verifier, being signed message is public key address on user's chain;DCC serves as verifier, and task is that verifying proves The white list that can trade is added to decide whether to be signed address in the correctness of the signature of DAA provided by person.
The implementation of the module 100 is specifically divided into 4 steps and executes in order, successively are as follows:
Step 1:KeyGen: anonymous credentials issuer TTP key is generated;
Step 2:DAA-Join:TTP issues anonymous credentials to user terminal by zero-knowledge proof;
Step 3:DAA-Sign: user terminal calculates anonymity signature;
Step 4:DAA-Verify:DCC verifies user terminal anonymity signature correctness.
Specifically, step 1:KeyGen:TTP is selectedGroup's Order is p, length k, and there are bilinear maps:ψ(g2)=g1, selection It calculatesThe key pair of TTP are as follows: (pk, sk)=((p, g1,g2,g3,Y,g,h),r)。
Step 2:DAA-Join:
(1) the embedded TPM of private clound selects secret informationRandom numberSignature identifiers SSID (Solely Signature Identifier) calculates η=H1(SSID), it calculates Pedersen and promises to undertake C=gfht, send To TTP, then private clound credible platform module proof possesses secret knowledge f, t': random selectionIt calculatesIt is sent to TTP;TTP random selectionIt is sent to privately owned cloud platform;TPM calculates sf=rf+cf,st' =rt'+ ct' sends sfAnd st'To TTP;TTP verifying
(2) TTP is selectedCalculate A=(g1Cht′)1/(y+x), A, x and t " are sent to privately owned Cloud.
(3) private clound host stores A and x, sends t " to TPM.
(4) TPM calculates t=t'+t ", stores f, t, whether true verifies following equation:
Step 3:DAA-Sign:
(1) private clound host randomly selectsCalculate T1=(Ahw),T2=gwh-x, T1And T2It is to A and x It promises to undertake, it was demonstrated that following two equatioies are set up:
e(T1,Y)/e(g1,g2)=e (h, Y)we(h,g2)wx+te(g,g2)f/e(T1,g2)x,
T2=gwh-x,T2 -xgwxh-xx=1, T3f
(2) it proves that privately owned cloud platform possesses knowledge f, x, w and t, meets above equation.Calculate instrumental value δ1=wx, δ2=- xx.TPM is randomly selectedIt calculatesIt willIt is sent to private clound host.
Private clound host is chosenIt calculates:
Private clound Framework computing:
ch=H (η | | g | | h | | g1||g2||g3||gT||Y||T1||T2||T3||R1||R2||R3||R4);
Send chTo TPM.
TPM selectionCalculate c=H (H (ch||nt) | | m), the message m being signed herein be with it is legal can Believe the public key address on the user blocks chain of privately owned cloud platform binding.
Private clound Framework computing sx=rx+c(-x),sw=rw+cw,TPM calculates sf= rf+cf,st=rt+c(-t)。
Private clound host output signature
Step 4:DAA-Verify:
(1) signature of public key address m on user blocks chain is givenAnd public affairs Key (p, g1,g2,gT, Y, g, h), DCC is calculated:
(2) whether true DCC verifies following equalities:
Setting up then can trade user public key address white list by m addition.
Further, in one embodiment of the invention, data acquisition module 200 is specifically used for: passing through embedded TPM Integrity measurement is carried out to capture program code page, generates PCR value and metrics logs;By internet of things equipment from the challenge of registration One challenge of any selection is concentrated, and is responded by executing BIST, challenge-response is uploaded to data, to obtain Hardware fingerprint;Data deblocking and data encapsulation are executed by TPM, so that data voucher and credible platform that the previous period is stored Module is mutually bound, while being bound to a kind of platform status by PCR value;It is corresponding according to preset data Structure Calculation each period Data voucher is chosen by input comprising sensor measurement data, timestamp, integrity measurement log, integrity measurement value, PUF War-response exports the data voucher value of this period to the data voucher value of, previous time period.
It is understood that particular content is such as shown in Fig. 2, data acquisition module 200 divides carries out for 4 sequence of steps Under.
Step 1: capture program code page integrity measurement: when privately owned cloud platform acquisition data, embedded TPM can be to acquisition Code page where program carries out integrity measurement, and generation is stored in platform configuration register (Platform Configuration Register, PCR) internal PCR value and metrics logs.Integrity measurement guarantees that data acquisition process operates in credible execution ring In border, PCR value and metrics logs can be used for the subsequent module verifying whether credible operation of acquisition process.
Step 2: internet of things equipment hardware fingerprint obtains: the internet of things equipment of user just registers it at TTP before factory CRPs, every time when privately owned cloud platform acquisition internet of things equipment data, internet of things equipment concentrates selection one to choose from the challenge of registration War is responded by executing BIST, and challenge-response is uploaded to private clound to data, shows to upload data with this Equipment is that have the equipment of corresponding hardware identity.
Step 3: data deblocking and encapsulation: after internet of things equipment data are uploaded to privately owned cloud platform, TPM executes data deblocking Securely generating for data voucher is ensured with data encapsulation operation, and data encapsulation not only mutually ties up data with a credible platform module It is fixed, it is bound to a kind of platform status simultaneously also by PCR, ensure that the credible of system running environment and data.The technology is answered With making the operation for distorting, making up privately owned cloud platform storing data lead to the failure of follow-up data Trusting eBusiness, to prevent The forgeries of internet of things equipment data.
Step 4: data voucher generates: calculating corresponding data voucher cre_ of each period according to the data structure of attached drawing 3 datai(i=1,2 ..., N).Input includes sensor measurement data, timestamp, integrity measurement log, integrity measurement To the data voucher value of, previous time period, algorithm is the form of nested hash, is exported as this period for value, PUF challenge-response Data voucher value.
Specifically, step 1: capture program code page integrity measurement: this step can be obtained credible privately owned cloud platform and hold The safe condition that key code is run when row data acquisition operations guarantees subsequently through the data of Trusting eBusiness to be all credible It is collected in performing environment.
Integrity measurement is one of function of TPM, actually calculates it to by measure object using cryptographic Hash algorithm The process of Hash Value.The input of hash operation is the code page acquired where data program in the present invention, and the Hash Value of output is The integrity measurement value of the code page, TPM charge to metric in specified PCR, and the method charged to is: new PCR value=hash Cryptographic algorithm (former PCR value | | metric).When executing integrity measurement operation platform should be recorded in metrics process information by platform In event log, content includes: measurement person's information, by measurement person's information, former PCR value, metric, new PCR value, deadline. Before each private clound executes data acquisition operations, embedded TPM will execute an aforesaid operations, generate key procedure code page PCR value and metrics logs, one of the input as data packaging operation.
Step 2: internet of things equipment hardware fingerprint obtains: the present invention is realized using the PUF (such as SRAM PUF) based on storage The certificate scheme of internet of things equipment hardware identity.By causing SRAM internal symmetry using the variation during the manufacturing The mismatch of cell parameters, after power-up, the bistable unit of SRAM node enter a unstable state, and unstable Constantly concussion returns to 0 or 1 stable state in state, is responded accordingly.Before internet of things equipment transmits data to private clound every time, A pair is chosen from the CRPs registered from TTP, internally self testing circuit input stimulus C, obtains the response R of PUF.It is each hard Part equipment all relies on the embedded PUF of the equipment and generates unique Identity Code progress authentication, Identity Code (PUF Challenge-response to) with data be uploaded to private clound, be follow-up data Trusting eBusiness preparatory condition.
Step 3: data deblocking and encapsulation: private clound is in the authentication information and sensor for receiving internet of things equipment transmission After recording data, it is carried out to compression packing processing with the data collected before.To guarantee the data compression value generated before Safety, the present invention using data encapsulate and solve encapsulation technique.Data encapsulation and unsealing operation are by critical data and specific Platform status (PCR value) and credible platform module are bound together, so that data are not only bound to a credible platform module, together When a kind of platform status is bound to by PCR.
For example, i-th of sub-period within the 1st period, generates HiIt will be first to the H that (i-1) period generatesi-1It carries out Deblocking, the specific step of unsealing operation are as follows:
(1) H that (i-1) a sub-period encapsulation generates is read from specified PCRi-1:
Hi-1||PCR_valuei-1| | TPM_Proof=Decrypt (key, sealedDatai-1);
(2) whether identical as the PCR_value decrypted TPM compares PCR value at that time;
(3) whether identical as the numerical value of storage inside TPM compares the TPM_Proof decrypted;
(4) if comparison is identical, H is exportedi-1
Wherein, TPM_Proof is TPM unique identification.With Hi-1With remaining related data as inputting, executes data and beat Package operation generates the data voucher H of i-th of periodi, and to HiData encapsulation operation is executed, to guarantee i to (i+1) in the period The secure storage of data voucher, that is, perform the following operations:
sealedDatai=Encrypt (key, (Hi||PCR_valuei||TPM_Proof))。
Step 4: data voucher generates: calculating corresponding data voucher cre_ of each period according to the data structure of attached drawing 3 datai(i=1,2 ..., N).Setting has n sub-period in each period.The H generated with i-th of sub-period of the 1st periodi For:
Hi=h (mi||ti||PCR_logi||PCR_valuei||Ci||Ri||Hi-1) (i=1,2 ..., n),
I.e. by tiWhen moment is uploaded to the internet of things equipment data of privately owned cloud platform, real-time time stamp, capture program operation Integrity measurement log and PCR value, the input stimulus of internet of things equipment PUF and output response and (i-1) a sub-period it is raw At Hi-1Link, and carry out hash operation.Hi-1(wherein i=2,3 ..., n) must can just read after data unsealing operation, this Sample guarantees that the data voucher before i-th of sub-period is not tampered with.After n sub-period, the data voucher H of first period is generatedn (namely cre_data1)。
Further, in one embodiment of the invention, data uploading module 300 is specifically used for: by TPM to data The scripting program code page for being uploaded to block chain carries out integrity measurement, generates corresponding metrics logs and PCR value;Input is any The data voucher of one period timestamp, carries out the metrics logs and metric of integrity measurement generation to upload program, and holds The output valve obtained after row link and hash operation is the data block voucher of any one period, and in the TEE set up, on It passes script and the transaction comprising data block voucher is sent by public key address on chain, so that transaction is for good and all remembered after being packaged cochain Record is on alliance's chain of this system.
It is understood that as shown in Fig. 2, data uploading module 300, specifically includes:
Step 1: upload program code page integrity measurement: the TPM of private clound platform built-in is uploaded to block chain to data Scripting program code page carry out integrity measurement, generate corresponding metrics logs and PCR value, for it is subsequent can to upload procedure The verifying of letter property.
Step 2: the generation and upload of data block voucher: data block voucher be finally be recorded on block chain with Card.Input the data voucher, timestamp, the metrics logs and degree that integrity measurement generation is carried out to upload program of certain time period Magnitude executes the data block voucher that the output valve obtained after link and hash operation is this period.It is setting up later In TEE, uploads script and pass throughChain on public key address send include data block voucher transaction, transaction be packaged cochain It is permanently recorded on alliance's chain of this system afterwards.
Specifically, step 1: upload program code page integrity measurement: assuming that user terminal upload altogether N number of data block with Card, the scripting program code page that the TPM of private clound platform built-in is uploaded to block chain to data carry out integrity measurement, generate and close The metrics logs PCR_log of script is uploaded in datajAnd PCR_valuej(j=1,2 ..., N), follow-up data credibility link The credibility of upload procedure can be determined according to both information.
Step 2: the generation and upload of data block voucher: data block voucher be finally be recorded on block chain with Card, data structure are as follows:
cre_blockj=h (tj||PCR_logj||PCR_valuej||cre_dataj) (j=1,2 ..., N),
cre_blockjFor by tjThe timestamp at moment, credible privately owned cloud platform have been executed to scripting program code page is uploaded The cre_data that metrics logs, PCR value and j-th of the period generated after whole property metric operations generatesj(j=1,2 ..., N) chain It connects and carries out the value generated after hash operation.Later in the TEE set up, uploads script and pass through public key address on chain Send comprising data block voucher transaction (as shown in figure 4) to trading pit wait miner be packaged.Miner completes proof of work The block comprising the transaction is generated afterwards and is broadcasted, when there are enough blocks to link after this block, it is believed that data Transaction certificate is permanently recorded on block chain.
It should be noted that (1) nonce represents block number in attached drawing 4;(2) publication trades, executes tune in ether mill It is required to consume certain expense with operations such as contract functions, with being counted as unit of gas.GasLimit is the permission of single situation Most gas total amounts, gasPrice be setting gas price, generally with GWei (1ETH=1000000000GWei) be unit; (3) Recipient is the collecting account of transaction, which belongs to the message call transaction in the transaction of ether mill Type, therefore the value is to initiate the user of recorded data zone block certificate transactions itself;(4) Value is transfer amounts, because of the invention institute Transaction is only for progress data record, therefore being worth is 0;(5) v, r, s are that miner carries out parameter necessary to ECDSA signs; (6) data is data block voucher, and block, which is packaged after cochain, is just recorded permanently storage.
Further, in one embodiment of the invention, data credibility authentication module 400 is specifically to be used for: passing through The type of internet of things equipment data needed for DCC is announced;The corresponding data field of initial data is obtained according to the data requirements that DCC is announced Block number where block voucher, and block number and initial data are sent to DCC together;The block number retrospect obtained according to feedback Corresponding transaction and data block voucher, and the number of effective block is obtained under the assistance of TTP, and then calculate effective block Data block credential verification value, and it is uploaded to the corresponding interface of system data reward payment module.
It is understood that as shown in Fig. 2, data credibility authentication module 400 specifically includes:
Step 1:DCC announces data requirements: the type of internet of things equipment data needed for DCC is announced, such as device type, data Meaning type etc..
Step 2: user feedback block number simultaneously sends initial data: user finds out according to the data requirements that DCC is announced to be met It is required that the corresponding data block voucher of initial data where block number, and block number and initial data are sent to together DCC。
Step 3: the data block credential verification value of effective block generates: the block number retrospect pair that DCC is obtained according to feedback The transaction answered and data block voucher, and the number of effective block is obtained under the assistance of TTP, wherein effective block refer to pair The data block voucher answered is the internet of things equipment upload by there is certification hardware identity, and executes acquisition in TEE, storage, beats Obtained by packet, upload operation.DCC is numbered according to effective block, the uploaded initial data of user is calculated according to side of the present invention Method calculates the data block credential verification value of effective block, and in the data of block chain payment platform interface input effective block Block credential verification value.
Specifically, step 1:DCC announces data requirements: DCC is by establishing on block chain the provision content of intelligent contract To announce the data type of expectation purchase.DCC issue intelligent contract public key address be it is disclosed, advertisement, official website can be passed through The mode of bulletin tells user, and the publisher public key address of the only intelligent contract of user's comparison is identical with the account address of announcement When, user can just execute subsequent such as feedback block number operation.
Step 2: user feedback block number simultaneously sends initial data: user finds out according to the data requirements that DCC is announced to be met It is required that the corresponding data block voucher of initial data where block number (being assumed to be 1 ..., N), and by block number and original Data are sent to DCC together.Initial data includes:
(1) sensor measurement data: M={ m1,...,mn;...;m(N-1)n,...,mNn};
(2) timestamp: T1={ t1,...,tn;...;t(N-1)n,...,tNnAnd T2={ tA,...,tA+N};
(3) internet of things equipment PUF challenge-response collection:
C={ C1,...,Cn;...;C(N-1)n,...,CNnAnd R={ R1,...,Rn;...;R(N-1)n,...,RNn};
(4) capture program integrity measurement log:
LOG1={ PCR_log1,...,PCR_logn;...;PCR_log(N-1)n,...,PCR_logNn};
(5) capture program integrity measurement value:
PCR1={ PCR_value1,...,PCR_valuen;...;PCR_value(N-1)n,...,PCR_valueNn};
(6) voucher upload program integrity measurement log: LOG2={ PCR_logA,...,PCR_logA+N};
(7) voucher upload program integrity measurement value: PCR2={ PCR_valueA,...,PCR_valueA+N}。
Step 3: the data block credential verification value of effective block generates: DCC is traced according to the block number that user submits 1 ..., data block voucher value recorded in block S.DCC is by the C in initial data, R, LOG1,PCR1,LOG2,PCR2Hair Give TTP.TTP motivates C according to the PUF that receives, inquires registered corresponding response R value, if the response of registration and receiving The Hamming distance of both responses is less than threshold epsilon, then the authentication of Internet of things node passes through.Capture program and voucher are uploaded The integrity measurement value and metrics logs of program, TTP by analyze integrity measurement event log information judge PCR value whether come From correct metrics process, the value of PCR is compared with the completeness of platform a reference value of registration later, if they are the same, is then shown The privately owned cloud platform for sending data is in trusted status when executing relevant operation.If the above verifying passes through, TTP thinks this The corresponding data of block be it is believable, the number of these effective blocks is sent to DCC by TTP.DCC uploads data using user and presses The data block credential verification value of effective block is calculated according to the method for the invention, and is disclosed, permanently by intelligent contract-defined interface Ground is recorded on block chain.
Further, in one embodiment of the invention, data reward payment module 500 is further used for according to block Chain intelligence contract obtains the data block credential verification value of effective block to the interface input value of DCC and effective block is numbered, and closes It corresponding data block evidence record value and is compared on about automatic traceability chain, and according to the data block voucher being proved to be successful Number, intelligent contract are not relied on by third party, automatically to the reward of user's payment data.
It is understood that as shown in Fig. 2, intelligent contract on block chain is according to the data of the DCC effective block inputted Block credential verification value obtains effective block number, corresponding data block evidence record value and is compared on the automatic traceability chain of contract It is right, it is identical, prove that the state of platform when user uploads data is believable and sensing data is not tampered, it is on the contrary then prove Data invalid.According to the data block voucher number being proved to be successful, intelligent contract is not relied on, by third party automatically to user's branch Pay data reward.
Specifically, the ether mill that data reward payment module 500 is located at credible big data acquisition transaction system is intelligently closed It about holds, intelligent contract is issued by DCC, leaves user's interface different with the end DCC for respectively, and DCC and user call the operation of contract Realize that the call operation of all pairs of contracts finally can all enter transaction in the form of transaction by the web3 module that ether mill provides Pond, the operation for being packaged cochain are disclosed, are permanently recorded on block chain.DCC, which is allowed to input in intelligent contract-defined interface, to be had The data block credential verification value of block and the public key address of corresponding user are imitated, contract traces the data of Correlation block record automatically Block voucher pays corresponding data reward, contract payment from trend client public key address according to identical number of blocks is compared Operation enters generation after trading pit waits packing, miner to complete proof of work with transaction form and goes forward side by side comprising the block of the transaction Row broadcast, when there is enough blocks to link after this block, it is believed that data trade voucher is permanently recorded in block On chain, so far payment is completed.
To sum up, the embodiment of the present invention provide a kind of combination PUF technology, reliable computing technology, block chain technology it is credible big Data acquire transaction system, can be used under the premise of guaranteeing data credibility and justice of exchange, extensive Internet of Things individual sets Standby data silo fusion and transaction, and personal identification privacy is protected not to be leaked, advantage and effect are:
1) embodiment of the present invention combines PUF technology, reliable computing technology, block chain technology, and PUF ensures acquired data From the hardware device being certified;Credible platform module guarantees data acquisition, stores, the safety of upload operation;Block chain generates Anti-tamper data block evidence record account book.This system assures that acquiring, storage, being packaged, the full link of upload is credible.
2) embodiment of the present invention proves to carry out secret protection to public key address on user's chain using Direct Anonymous, and DCC can only It proves that carry out account on the chain of data trade with it embeds the privately owned cloud platform binding of legal TPM with one really, but cannot obtain To about other any information outside privately owned cloud platform validity, to protect the privacy of user terminal.
3) centrality and automation feature are gone based on the intelligent contract function of block chain support, this system ensure that number reward Fair, transparent, automatic payment, solve the big worry of user.
What is proposed according to embodiments of the present invention acquires transaction system based on the big data of block chain and credible calculating platform, leads to Cross the acquisition to data, storage, packing, upload operation implement comprehensive supervision and protection, the full link for realizing data can Letter, the method for using Direct Anonymous to prove make DCC protect user hidden in the validity of public key address on authenticating user's chain It is private;Also, the characteristics of based on the intelligence contract decentralization of block chain and automating guarantees the open and clear of data reward payment, Thus the contradiction reconciled between personal privacy protection and big data acquisition to a certain extent, and ensure the credible of data source Property, and there is practicability, simple easily realization.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (6)

1. a kind of acquire transaction system based on the big data of block chain and credible calculating platform characterized by comprising
Address verifying module on user's chain is used for communication interaction between data Collection Co., Ltd DCC, trusted third party TTP and user To complete Direct Anonymous identification protocol, and DCC transaction will be added with public key address on the block chain of credible privately owned cloud platform binding User's white list;
Data acquisition module is acquired the integrality degree that capture program code page is executed while operation for privately owned cloud platform Amount obtains by Internet of things node and uploads hardware fingerprint to obtain the first platform status, and utilizes the credible private clound Data deblocking and the encapsulation function of platform generate data voucher, to obtain the foundation of subsequent module verify data credibility;
Data uploading module, for executing the integrity measurement of upload program code page to obtain the second platform status, and with appoint The data voucher link of one period generates data block voucher after being packaged, and by with the credible privately owned cloud platform binding Public key address is uploaded to System Committee's chain in the form traded on block chain;
Data credibility authentication module, for it is corresponding to receive user feedback after the data type that the DCC announces expectation purchase Block number and corresponding original data set, and the DCC is obtained by legitimate device under the assistance of the TTP credible The corresponding effective district block number of lower the acquired data of state, and the data block credential verification value of the effective block is calculated, it uploads To intelligent contract entrance;
Data recompense payment module, the data block for the effective block by recording on the automatic traceability chain of the intelligent contract It is compared voucher with the DCC validation value submitted, with according to compare successful number of blocks disclose and automatically to The reward of user's payment data.
2. according to claim 1 acquire transaction system, feature based on the big data of block chain and credible calculating platform It is, address verifying module is further used on user's chain:
Generate anonymous credentials issuer TTP key;
The anonymous credentials are issued to user terminal by TTP and zero-knowledge proof;
Anonymity signature is calculated by the user terminal, to realize the DCC verifying user terminal anonymity signature correctness.
3. according to claim 1 acquire transaction system, feature based on the big data of block chain and credible calculating platform It is, the data acquisition module is specifically used for:
Integrity measurement is carried out to the capture program code page by the TPM of private clound platform built-in, generates PCR value and measurement Log;
One challenge of any selection is concentrated from the challenge of registration by internet of things equipment, and is responded by executing BIST, is obtained The hardware fingerprint is taken, challenge-response is uploaded to data;
By TPM execution data deblocking and data encapsulation, so that data voucher generated of previous period is put down with credible Platform module is mutually bound, while being bound to a kind of platform status by PCR value;
According to preset data Structure Calculation each period corresponding data voucher, input as comprising sensor measurement data, time Stamp, integrity measurement log, integrity measurement value, PUF challenge-response export as this data voucher value of, previous time period The data voucher value of period.
4. according to claim 1 acquire transaction system, feature based on the big data of block chain and credible calculating platform It is, the data uploading module is specifically used for:
Integrity measurement is carried out to the scripting program code page for uploading data to block chain by the TPM, generates corresponding degree Measure log and PCR value;
Input the data voucher, timestamp, the metrics logs that integrity measurement generation is carried out to upload program of any one period And metric, and the data block voucher that the output valve obtained after link and hash operation is any time period is executed, and In the credible performing environment set up, script is uploaded by public key address on chain and sends the transaction comprising data block voucher, is made It must trade and be permanently recorded on alliance's chain of this system after being packaged cochain.
5. according to claim 1 acquire transaction system, feature based on the big data of block chain and credible calculating platform It is, the data credibility authentication module is specifically used for:
The type of internet of things equipment data needed for being announced by DCC;
According to the data requirements that the DCC is announced, block number where the corresponding data block voucher of user query initial data, And the block number and the initial data are sent to DCC together;
The corresponding transaction of block number retrospect obtained according to feedback and data block voucher, and obtained under the assistance of the TTP The number of effective block and the data block credential verification value for calculating effective block, and it is uploaded to intelligent contract entrance.
6. according to claim 1 acquire transaction system, feature based on the big data of block chain and credible calculating platform It is, the data reward payment module is further used for: the intelligent contract on the block chain has according to what the DCC was inputted The data block credential verification value of effect block obtains effective block number, the data block of effective block on the automatic traceability chain of contract Evidence record value is simultaneously compared with validation value, and according to the data block voucher number being proved to be successful, the intelligence contract is not It is relied on by third party, automatically to the user payment data reward.
CN201811069639.XA 2018-09-13 2018-09-13 Big data acquisition transaction system based on block chain and trusted computing platform Active CN109325331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811069639.XA CN109325331B (en) 2018-09-13 2018-09-13 Big data acquisition transaction system based on block chain and trusted computing platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811069639.XA CN109325331B (en) 2018-09-13 2018-09-13 Big data acquisition transaction system based on block chain and trusted computing platform

Publications (2)

Publication Number Publication Date
CN109325331A true CN109325331A (en) 2019-02-12
CN109325331B CN109325331B (en) 2022-05-20

Family

ID=65265796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811069639.XA Active CN109325331B (en) 2018-09-13 2018-09-13 Big data acquisition transaction system based on block chain and trusted computing platform

Country Status (1)

Country Link
CN (1) CN109325331B (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059497A (en) * 2019-02-19 2019-07-26 阿里巴巴集团控股有限公司 Method, node and the storage medium of secret protection are realized in block chain
CN110278193A (en) * 2019-05-20 2019-09-24 阿里巴巴集团控股有限公司 It is marked and transaction, the receipt storage method of event type and node in conjunction with code
CN110309634A (en) * 2019-04-04 2019-10-08 深圳大通实业股份有限公司 A kind of credible advertisement data management system based on block chain
CN110324422A (en) * 2019-07-05 2019-10-11 北京大学 A kind of substantive approach and system of cloud application
CN110336663A (en) * 2019-06-14 2019-10-15 东南大学 A kind of PUFs based on block chain technology certificate scheme group to group
CN110347607A (en) * 2019-07-16 2019-10-18 北京首汽智行科技有限公司 A kind of data cochain test method
CN110442631A (en) * 2019-08-07 2019-11-12 北京艾摩瑞策科技有限公司 About the knowledge payment associated data processing method and its device on block chain
CN110809058A (en) * 2019-11-13 2020-02-18 北京物资学院 Block chain traceability system and method based on feature code identification and verification technology
CN110875930A (en) * 2019-11-21 2020-03-10 山东超越数控电子股份有限公司 Method, equipment and medium for monitoring trusted state
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN111177096A (en) * 2019-12-11 2020-05-19 招银云创(深圳)信息技术有限公司 Log management method and device, computer equipment and storage medium
CN111274594A (en) * 2020-01-20 2020-06-12 上海市大数据中心 Block chain-based secure big data privacy protection sharing method
CN111428249A (en) * 2020-01-20 2020-07-17 中国科学院信息工程研究所 Anonymous registration method and system for protecting user privacy based on block chain
CN111783133A (en) * 2020-06-02 2020-10-16 广东科学技术职业学院 Network resource management method based on block chain technology
CN111950021A (en) * 2020-07-31 2020-11-17 南京航空航天大学 Method for solving privacy disclosure problem in data presentation of intelligent contract
CN112380574A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Data chaining method based on block chain and SE chip
CN112395511A (en) * 2020-11-04 2021-02-23 北京大学 Rumor detection and evidence preservation system based on message propagation path in mobile application
FR3101991A1 (en) * 2019-10-09 2021-04-16 Pierre-Francois Casanova Object authentication and assurance system and method
CN112751807A (en) * 2019-10-31 2021-05-04 中国电信股份有限公司 Secure communication method, apparatus, system and storage medium
CN113098693A (en) * 2021-04-08 2021-07-09 太原理工大学 Memory verification method based on physical unclonable function algorithm
CN113159769A (en) * 2021-04-21 2021-07-23 中国人民解放军国防科技大学 Block chain-based data circulation intelligent contract implementation method and system
CN113221089A (en) * 2021-03-15 2021-08-06 东北大学 Privacy protection attribute authentication system and method based on verifiable statement
CN113256427A (en) * 2021-06-28 2021-08-13 北京航空航天大学 Joint signature-based alliance block chain consensus method and system
CN113326527A (en) * 2021-06-24 2021-08-31 北京八分量信息科技有限公司 Credible digital signature system and method based on block chain
CN113433918A (en) * 2021-08-25 2021-09-24 江苏荣泽信息科技股份有限公司 Enterprise electronic standing book energy consumption data acquisition system based on block chain
CN114117553A (en) * 2022-01-28 2022-03-01 北京豪尔赛智慧城域科技有限公司 Block chain-based control method and system for Internet of things terminal
WO2022073212A1 (en) * 2020-10-09 2022-04-14 Alipay (Hangzhou) Information Technology Co., Ltd. Managing blockchain-based trustable transaction services
CN114679284A (en) * 2020-12-24 2022-06-28 中国移动通信有限公司研究院 Trusted remote attestation system, storage method, verification method and storage medium thereof
US11443307B2 (en) 2020-07-31 2022-09-13 Alipay (Hangzhou) Information Technology Co., Ltd. Cross-border resource transfer authenticity verification method, device and electronic equipment
CN115189863A (en) * 2022-09-13 2022-10-14 图林科技(深圳)有限公司 E-commerce transaction information management system based on block chain network architecture
EP4018597A4 (en) * 2019-08-22 2023-04-12 Quantumciel Pte. Ltd. Device, system and method for providing information security
CN116976891A (en) * 2023-07-21 2023-10-31 杭州易景数通科技有限公司 Financial data security management system, device and method thereof
CN117349897A (en) * 2023-12-05 2024-01-05 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Block chain-based carbon quota transaction privacy protection method
US11935048B2 (en) 2020-10-09 2024-03-19 Alipay (Hangzhou) Information Technology Co., Ltd. Managing blockchain-based trustable transaction services

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN106407481A (en) * 2016-11-30 2017-02-15 福州微启迪物联科技有限公司 Block chain architecture-based ecological environment monitoring system and implementation method thereof
CN107274184A (en) * 2017-05-11 2017-10-20 上海点融信息科技有限责任公司 block chain data processing based on zero-knowledge proof
US20170352027A1 (en) * 2016-06-07 2017-12-07 Cornell University Authenticated data feed for blockchains
US20170359374A1 (en) * 2016-06-11 2017-12-14 Lntel Corporation Blockchain System with Nucleobase Sequencing as Proof of Work
CN107533501A (en) * 2015-03-20 2018-01-02 里维茨公司 Use block chain automated validation appliance integrality
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN107533501A (en) * 2015-03-20 2018-01-02 里维茨公司 Use block chain automated validation appliance integrality
US20170352027A1 (en) * 2016-06-07 2017-12-07 Cornell University Authenticated data feed for blockchains
US20170359374A1 (en) * 2016-06-11 2017-12-14 Lntel Corporation Blockchain System with Nucleobase Sequencing as Proof of Work
CN106407481A (en) * 2016-11-30 2017-02-15 福州微启迪物联科技有限公司 Block chain architecture-based ecological environment monitoring system and implementation method thereof
CN107274184A (en) * 2017-05-11 2017-10-20 上海点融信息科技有限责任公司 block chain data processing based on zero-knowledge proof
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
XIAOLIAN CHEN 等: "A Blockchain Based Access Authentication Scheme of Energy Internet", 《2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2)》 *
李大伟 等: "基于区块链的密钥更新和可信定位系统", 《密码学报》 *
李彬 等: "非可信环境下基于区块链的多级DR投标安全管理及技术支撑", 《中国电机工程学报》 *

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059497A (en) * 2019-02-19 2019-07-26 阿里巴巴集团控股有限公司 Method, node and the storage medium of secret protection are realized in block chain
CN110309634A (en) * 2019-04-04 2019-10-08 深圳大通实业股份有限公司 A kind of credible advertisement data management system based on block chain
CN110278193A (en) * 2019-05-20 2019-09-24 阿里巴巴集团控股有限公司 It is marked and transaction, the receipt storage method of event type and node in conjunction with code
CN110278193B (en) * 2019-05-20 2021-06-01 创新先进技术有限公司 Receipt storage method and node combining code marking with transaction and event types
CN110336663A (en) * 2019-06-14 2019-10-15 东南大学 A kind of PUFs based on block chain technology certificate scheme group to group
CN110336663B (en) * 2019-06-14 2021-11-30 东南大学 PUFs group-to-group authentication method based on block chain technology
CN110324422B (en) * 2019-07-05 2020-08-28 北京大学 Cloud application verification method and system
CN110324422A (en) * 2019-07-05 2019-10-11 北京大学 A kind of substantive approach and system of cloud application
CN110347607A (en) * 2019-07-16 2019-10-18 北京首汽智行科技有限公司 A kind of data cochain test method
CN110442631A (en) * 2019-08-07 2019-11-12 北京艾摩瑞策科技有限公司 About the knowledge payment associated data processing method and its device on block chain
EP4018597A4 (en) * 2019-08-22 2023-04-12 Quantumciel Pte. Ltd. Device, system and method for providing information security
FR3101991A1 (en) * 2019-10-09 2021-04-16 Pierre-Francois Casanova Object authentication and assurance system and method
CN112751807B (en) * 2019-10-31 2023-02-03 中国电信股份有限公司 Secure communication method, device, system and storage medium
CN112751807A (en) * 2019-10-31 2021-05-04 中国电信股份有限公司 Secure communication method, apparatus, system and storage medium
CN110809058A (en) * 2019-11-13 2020-02-18 北京物资学院 Block chain traceability system and method based on feature code identification and verification technology
CN110875930A (en) * 2019-11-21 2020-03-10 山东超越数控电子股份有限公司 Method, equipment and medium for monitoring trusted state
CN111177096A (en) * 2019-12-11 2020-05-19 招银云创(深圳)信息技术有限公司 Log management method and device, computer equipment and storage medium
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN110912712B (en) * 2019-12-18 2022-03-08 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN111428249B (en) * 2020-01-20 2022-06-28 中国科学院信息工程研究所 Anonymous registration method and system for protecting user privacy based on block chain
CN111428249A (en) * 2020-01-20 2020-07-17 中国科学院信息工程研究所 Anonymous registration method and system for protecting user privacy based on block chain
CN111274594A (en) * 2020-01-20 2020-06-12 上海市大数据中心 Block chain-based secure big data privacy protection sharing method
CN111783133A (en) * 2020-06-02 2020-10-16 广东科学技术职业学院 Network resource management method based on block chain technology
US11443307B2 (en) 2020-07-31 2022-09-13 Alipay (Hangzhou) Information Technology Co., Ltd. Cross-border resource transfer authenticity verification method, device and electronic equipment
CN111950021A (en) * 2020-07-31 2020-11-17 南京航空航天大学 Method for solving privacy disclosure problem in data presentation of intelligent contract
US11798050B2 (en) 2020-10-09 2023-10-24 Alipay (Hangzhou) Information Technology Co., Ltd. Managing blockchain-based trustable transaction services
US11935048B2 (en) 2020-10-09 2024-03-19 Alipay (Hangzhou) Information Technology Co., Ltd. Managing blockchain-based trustable transaction services
WO2022073212A1 (en) * 2020-10-09 2022-04-14 Alipay (Hangzhou) Information Technology Co., Ltd. Managing blockchain-based trustable transaction services
CN112395511A (en) * 2020-11-04 2021-02-23 北京大学 Rumor detection and evidence preservation system based on message propagation path in mobile application
CN112380574A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Data chaining method based on block chain and SE chip
CN114679284A (en) * 2020-12-24 2022-06-28 中国移动通信有限公司研究院 Trusted remote attestation system, storage method, verification method and storage medium thereof
CN113221089B (en) * 2021-03-15 2023-11-07 东北大学 Privacy protection attribute authentication system and method based on verifiable statement
CN113221089A (en) * 2021-03-15 2021-08-06 东北大学 Privacy protection attribute authentication system and method based on verifiable statement
CN113098693B (en) * 2021-04-08 2022-08-16 太原理工大学 Memory verification method based on physical unclonable function algorithm
CN113098693A (en) * 2021-04-08 2021-07-09 太原理工大学 Memory verification method based on physical unclonable function algorithm
CN113159769B (en) * 2021-04-21 2022-07-19 中国人民解放军国防科技大学 Block chain-based data circulation intelligent contract implementation method and system
CN113159769A (en) * 2021-04-21 2021-07-23 中国人民解放军国防科技大学 Block chain-based data circulation intelligent contract implementation method and system
CN113326527A (en) * 2021-06-24 2021-08-31 北京八分量信息科技有限公司 Credible digital signature system and method based on block chain
CN113256427A (en) * 2021-06-28 2021-08-13 北京航空航天大学 Joint signature-based alliance block chain consensus method and system
CN113256427B (en) * 2021-06-28 2021-09-14 北京航空航天大学 Joint signature-based alliance block chain consensus method and system
CN113433918A (en) * 2021-08-25 2021-09-24 江苏荣泽信息科技股份有限公司 Enterprise electronic standing book energy consumption data acquisition system based on block chain
CN113433918B (en) * 2021-08-25 2021-11-16 江苏荣泽信息科技股份有限公司 Enterprise electronic standing book energy consumption data acquisition system based on block chain
CN114117553A (en) * 2022-01-28 2022-03-01 北京豪尔赛智慧城域科技有限公司 Block chain-based control method and system for Internet of things terminal
CN115189863A (en) * 2022-09-13 2022-10-14 图林科技(深圳)有限公司 E-commerce transaction information management system based on block chain network architecture
CN116976891A (en) * 2023-07-21 2023-10-31 杭州易景数通科技有限公司 Financial data security management system, device and method thereof
CN117349897A (en) * 2023-12-05 2024-01-05 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Block chain-based carbon quota transaction privacy protection method
CN117349897B (en) * 2023-12-05 2024-03-26 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Block chain-based carbon quota transaction privacy protection method

Also Published As

Publication number Publication date
CN109325331B (en) 2022-05-20

Similar Documents

Publication Publication Date Title
CN109325331A (en) Transaction system is acquired based on the big data of block chain and credible calculating platform
US11842317B2 (en) Blockchain-based authentication and authorization
Zhang et al. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage
Vangala et al. Smart contract-based blockchain-envisioned authentication scheme for smart farming
CN111737724B (en) Data processing method and device, intelligent equipment and storage medium
Lu et al. A secure and scalable data integrity auditing scheme based on hyperledger fabric
CN113595971B (en) Block chain-based distributed data security sharing method, system and computer readable medium
Pu et al. A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment
CN114499895B (en) Data trusted processing method and system fusing trusted computing and block chain
CN108650077B (en) Block chain based information transmission method, terminal, equipment and readable storage medium
Cai et al. Towards private, robust, and verifiable crowdsensing systems via public blockchains
CN109639714A (en) A kind of Internet of Things identity registration and verification method based on block chain
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
Azad et al. M2m-rep: Reputation system for machines in the internet of things
CN113259135B (en) Lightweight blockchain communication authentication device and method for detecting data tamper
Zhang et al. Trust-based secure multi-cloud collaboration framework in cloud-fog-assisted IoT
Jiang et al. SearchBC: A blockchain-based PEKS framework for IoT services
CN108777673A (en) One kind carrying out Bidirectional identity authentication method in block chain
Kumar et al. Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing
CN107104804A (en) A kind of platform integrity verification method and device
Zhang et al. Blockchain-based decentralized supply chain system with secure information sharing
Kelkar et al. Complete knowledge: Preventing encumbrance of cryptographic secrets
Wang et al. Crowdchain: A location preserve anonymous payment system based on permissioned blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant