CN110516469A - A kind of anti-hacking methods in shared big data application scenarios based on block chain - Google Patents
A kind of anti-hacking methods in shared big data application scenarios based on block chain Download PDFInfo
- Publication number
- CN110516469A CN110516469A CN201910699177.8A CN201910699177A CN110516469A CN 110516469 A CN110516469 A CN 110516469A CN 201910699177 A CN201910699177 A CN 201910699177A CN 110516469 A CN110516469 A CN 110516469A
- Authority
- CN
- China
- Prior art keywords
- data
- server
- block chain
- information
- dirty
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Anti- hacking methods in the invention discloses a kind of shared big data application scenarios based on block chain, source data is become into block chain data (comprising part dirty data), markization is gone again, and it stores on the server, each server product generates block chain data, network operator can be by API Calls data, and calling data is the setting of block chain server matches access client server, can just call data after server and dirty data successful match.The present invention solves the problems, such as that hacker or intra-company employee steal part or all of data, by the watermark data (API code key) for generating server, screen accessed server, 10% dirty data is added in data simultaneously, the irregular inspection dirty data of block chain server, if it find that dirty data discarding in part can then report an error, accomplish real-time detection, it is highly-safe.
Description
Technical field
The present invention relates to data information security protection technology field, specifically a kind of shared big data based on block chain is answered
With the anti-hacking methods in scene.
Background technique
With the huge explosion of data and the needs of artificial intelligence, there is an urgent need to provide the people based on big data modeling between enterprise
Work intelligent Service.It realizes artificial intelligence, needs to break data silo, could effectively be mentioned using external multi-party enterprise shared information
For the effectiveness of artificial intelligence.But under the pressure of the requirement of laws and regulations between enterprise, and the interests needs of itself digital asset are protected, no
It is ready that user information is shared to third party enterprise in plain text to be used.The present invention is directed to this special scenes, proposes user information
The label data formed after desensitization shares to the use of third party enterprise, and enterprise's number one and user can be protected to believe
Breath is not revealed in plain text, while being also able to satisfy third party enterprise in the modeling needs of artificial intelligence field.In order to guarantee shared number
According to the high efficiency in modeling, shared data complete or collected works can the form of weak center in a distributed manner be deployed in third-party server,
How to prevent from hacker or internal staff from stealing all or part of data to be very important thing.Current server only passes through use
Name in an account book and password are set up defences, and requirement is no longer satisfied.Therefore, those skilled in the art provide a kind of shared based on block chain
Anti- hacking methods in big data application scenarios, to solve the problems mentioned in the above background technology.
Summary of the invention
Anti- hacking methods in the purpose of the present invention is to provide a kind of shared big data application scenarios based on block chain,
To solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme:
A kind of anti-hacking methods in shared big data application scenarios based on block chain, first have to lead to the user information of plaintext
Irreversible hashing algorithm is crossed, the label data of desensitization is changed into;Secondly, source data is become block chain data (comprising part
Watermark data), then markization is gone, and be stored in the server of other side, each server product generates different block chains
Data, network operator can pass through API Calls user tag data.Verification server can irregularly call block chain server inspection
The legitimacy of local data only ensures that local data is legal, and network operator can just continue to use API Calls user tag number
According to.The specific method is as follows for it:
(1) block chain data: to prevent data to be altered, using general ledger technology, source data write-in one can not be distorted total
In account book (block chain technology);
(2) encryption data:
Source data is encrypted, goes markization to obtain hash data information aggregate again after obtaining encryption data.Obtained data
Gather irreversible, i.e., cannot obtain the plaintext of user information by hash data;
(3) server watermark data:
The characteristic information for extracting source data, automatically generates 10% ~ 15% watermark data (mantissa that should not be discovered of source data sum
According to).Watermark data is encrypted, goes markization to obtain hash data information aggregate again after obtaining encryption data.Obtained number
It is irreversible according to gathering, i.e., the plaintext of watermark data cannot be obtained by hash data;
(4) merging data
By the data acquisition system of step (2) and (3), all in the server, hash data information can after obtaining access mandate for storage
Can be retrieved, match by third party;
(5) API Calls data:
A. block chain server match with access client server, block chain data and watermark data with access client server
Successful match calls data success;
B. block chain server and access client server mismatch:
B1. block chain data and access client server mismatch, and cannot use data;
B2. dirty data and access client server mismatch, and cannot use data.
As a further solution of the present invention: digital digest algorithm can be used but be not limited to Hash calculation in the step (2)
Method.
As further scheme of the invention: hash algorithm can be used in the algorithm of server watermark in the step (3).
As further scheme of the invention: the data information abstract includes not only specific digital information, is also wrapped
Containing the information content, information source, information storage means, information storage.
As the present invention further scheme: when the access user and third party use data, access user and the
Tripartite retrieves the data thought by digital digest information, to use data, needs to access user data and server letter
Breath matching, accesses user if successful match and third party can recall respective data blocks from general ledger, carry out Data Matching or
Analysis;
Wherein, if hacker or intra-company employee replicate part or all of data, anti-hacking methods of the invention can pass through clothes
Business device watermark data and dirty data match denied access, play the purpose of protection.
Compared with prior art, the beneficial effects of the present invention are:
The present invention solves the problems, such as that hacker or intra-company employee steal part or all of data, by the water for generating server
Printing screens accessed server according to (API code key), while 10% dirty data is added in data, and block chain server is indefinite
The inspection dirty data of phase accomplishes real-time detection if it find that dirty data discarding in part can then report an error, highly-safe.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the anti-hacking methods in shared big data application scenarios based on block chain.
Fig. 2 be a kind of shared big data application scenarios based on block chain in anti-hacking methods in data block chain original
Manage block diagram.
The original that Fig. 3 encrypts for source data in the anti-hacking methods in a kind of shared big data application scenarios based on block chain
Manage block diagram.
Fig. 4 is server watermark data in the anti-hacking methods in a kind of shared big data application scenarios based on block chain
Functional block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In the embodiment of the present invention, a kind of anti-hacking methods in shared big data application scenarios based on block chain, such as Fig. 1
It is shown, source data is become into block chain data (comprising part dirty data), then go markization, and store on the server, each
Server product generates block chain data, and network operator can be by API Calls data, and calling data is block chain server
With the setting for accessing client server, data can be just called after server and dirty data successful match, specific method is such as
Under:
(1) block chain data: to prevent data to be altered, using general ledger technology, source data write-in one can not be distorted total
In account book (block chain technology), as shown in Figure 2;
(2) encryption data:
Source data is encrypted, source data information can be encrypted data by digital digest algorithm, be encrypted
Data increase by 10% dirty data automatically in ciphering process, then, then go markization to obtain data information the encrypted data
Abstract can be retrieved by third party after data information abstract authorization, be matched, as shown in Figure 3;
(3) it stores: in the server by encrypted data storage in step (2);
(4) server watermark data:
After data are in service device, server will access user information by algorithm and server info forms a watermark
Data, the watermark data is irreversible, as shown in Figure 4;
(5) API Calls data:
A. block chain server match with access client server, block chain data and dirty data with access client server
With success, data success is called;
B. block chain server and access client server mismatch:
B1. block chain data and access client server mismatch, and cannot use data;
B2. dirty data and access client server mismatch, and cannot use data.
Digital digest algorithm can be used but be not limited to hash algorithm in the step (2).
Hash algorithm can be used in the algorithm of server watermark in the step (3).
Data information abstract not only includes specific digital information, also includes the information content, information source, and information is deposited
Storage mode, information storage.
When the access user and third party use data, accesses user and third party is retrieved by digital digest information
The data thought need to access user data and server information matches, user are accessed if successful match to use data
And third party can recall respective data blocks from general ledger, carry out Data Matching or analysis;Wherein, if hacker or intra-company
Employee replicates part or all of data, and anti-hacking methods of the invention can pass through server watermark data and dirty data matching refusal
Access, plays the purpose of protection.
The present invention solves the problems, such as that hacker or intra-company employee steal part or all of data, by generating server
Watermark data (API code key), screen accessed server, at the same in data addition 10% dirty data, block chain server
Irregular inspection dirty data accomplishes real-time detection if it find that dirty data discarding in part can then report an error, highly-safe.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (5)
1. the anti-hacking methods in a kind of shared big data application scenarios based on block chain, which is characterized in that become source data
At block chain data (including part watermark data), then markization is gone, and store on the server, each server product produces
Raw different block chain data, network operator can be by API Calls data, and calling data is that the access of block chain server matches is used
Data can be just called after the setting of family server, server and dirty data successful match, the specific method is as follows:
(1) block chain data:
To prevent data to be altered, using general ledger technology, a total account book (block chain skill that can not be distorted is written into source data
Art) in;
(2) encryption data:
Source data is encrypted, source data information can be encrypted data by digital digest algorithm, be encrypted
Data increase by 10% dirty data automatically in ciphering process, then, then go markization to obtain data information the encrypted data
Abstract can be retrieved by third party after data information abstract authorization, be matched;
(3) it stores: in the server by encrypted data storage in step (2);
(4) server watermark data:
After data are in service device, server will access user information by algorithm and server info forms a watermark
Data, the watermark data are irreversible;
(5) API Calls data:
A. block chain server match with access client server, block chain data and dirty data with access client server
With success, data success is called;
B. block chain server and access client server mismatch:
B1. block chain data and access client server mismatch, and cannot use data;
B2. dirty data and access client server mismatch, and cannot use data.
2. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1,
It is characterized in that, digital digest algorithm can be used but be not limited to hash algorithm in the step (2).
3. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1,
It is characterized in that, hash algorithm can be used in the algorithm of server watermark in the step (3).
4. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1,
It is characterized in that, it also includes the information content, information source, information that the data information abstract, which not only includes specific digital information,
Storage mode, information storage.
5. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1,
It is characterized in that, when the access user and third party use data, accesses user and third party passes through digital digest information retrieval
It needs to access user data and server information matches to use data to the data thought, use is accessed if successful match
Family and third party can recall respective data blocks from general ledger, carry out Data Matching or analysis.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910699177.8A CN110516469B (en) | 2019-07-31 | 2019-07-31 | Anti-hacking method in shared big data application scene based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910699177.8A CN110516469B (en) | 2019-07-31 | 2019-07-31 | Anti-hacking method in shared big data application scene based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110516469A true CN110516469A (en) | 2019-11-29 |
CN110516469B CN110516469B (en) | 2023-05-26 |
Family
ID=68624102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910699177.8A Active CN110516469B (en) | 2019-07-31 | 2019-07-31 | Anti-hacking method in shared big data application scene based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110516469B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111831984A (en) * | 2019-04-23 | 2020-10-27 | 苏州白杨软件有限公司 | Method for determining and verifying digital information property in digital economy |
WO2021197227A1 (en) * | 2020-04-01 | 2021-10-07 | International Business Machines Corporation | Noisy transaction for protection of data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017191472A1 (en) * | 2016-05-05 | 2017-11-09 | Invasec Ltd. | A verification system and method |
US20180227116A1 (en) * | 2017-02-06 | 2018-08-09 | Northern Trust Corporation | Systems and methods for generating, uploading, and executing code blocks within distributed network nodes |
CN108615148A (en) * | 2018-03-26 | 2018-10-02 | 北交金科金融信息服务有限公司 | A kind of preposition method of commerce of secured assets and system based on block chain technology |
CN109145612A (en) * | 2018-07-05 | 2019-01-04 | 东华大学 | The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain |
CN109190399A (en) * | 2018-09-05 | 2019-01-11 | 贝富(广州)新技术有限公司 | Method for anti-counterfeit, system and storage medium based on block chain |
CN109241753A (en) * | 2018-08-09 | 2019-01-18 | 南京简诺特智能科技有限公司 | A kind of data sharing method and system based on block chain |
CN109257340A (en) * | 2018-08-29 | 2019-01-22 | 北京中科锐链科技有限公司 | A kind of website falsification-proof system and method based on block chain |
US20190123895A1 (en) * | 2017-10-23 | 2019-04-25 | Cygnetise Limited | Methods and apparatus for verifying a user transaction |
CN109981641A (en) * | 2019-03-26 | 2019-07-05 | 北京邮电大学 | A kind of safe distribution subscription system and distribution subscription method based on block chain technology |
-
2019
- 2019-07-31 CN CN201910699177.8A patent/CN110516469B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017191472A1 (en) * | 2016-05-05 | 2017-11-09 | Invasec Ltd. | A verification system and method |
US20180227116A1 (en) * | 2017-02-06 | 2018-08-09 | Northern Trust Corporation | Systems and methods for generating, uploading, and executing code blocks within distributed network nodes |
US20190123895A1 (en) * | 2017-10-23 | 2019-04-25 | Cygnetise Limited | Methods and apparatus for verifying a user transaction |
CN108615148A (en) * | 2018-03-26 | 2018-10-02 | 北交金科金融信息服务有限公司 | A kind of preposition method of commerce of secured assets and system based on block chain technology |
CN109145612A (en) * | 2018-07-05 | 2019-01-04 | 东华大学 | The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain |
CN109241753A (en) * | 2018-08-09 | 2019-01-18 | 南京简诺特智能科技有限公司 | A kind of data sharing method and system based on block chain |
CN109257340A (en) * | 2018-08-29 | 2019-01-22 | 北京中科锐链科技有限公司 | A kind of website falsification-proof system and method based on block chain |
CN109190399A (en) * | 2018-09-05 | 2019-01-11 | 贝富(广州)新技术有限公司 | Method for anti-counterfeit, system and storage medium based on block chain |
CN109981641A (en) * | 2019-03-26 | 2019-07-05 | 北京邮电大学 | A kind of safe distribution subscription system and distribution subscription method based on block chain technology |
Non-Patent Citations (3)
Title |
---|
ZHAOFENGMA ET AL.: "Blockchain for digital rights management", 《FUTURE GENERATION COMPUTER SYSTEMS》 * |
呼阳等: "基于区块链的生产线数据共享方案研究", 《国外电子测量技术》 * |
基于DSL和区块链技术的可编程智能合约设计与实现: "基于DSL和区块链技术的可编程智能合约设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111831984A (en) * | 2019-04-23 | 2020-10-27 | 苏州白杨软件有限公司 | Method for determining and verifying digital information property in digital economy |
WO2021197227A1 (en) * | 2020-04-01 | 2021-10-07 | International Business Machines Corporation | Noisy transaction for protection of data |
GB2609156A (en) * | 2020-04-01 | 2023-01-25 | Ibm | Noisy transaction for protection of data |
Also Published As
Publication number | Publication date |
---|---|
CN110516469B (en) | 2023-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109146524A (en) | A kind of agricultural product using block chain technology are traced to the source information security solution | |
CN105760722A (en) | Watermark embedding electronic signature generation method and platform | |
Doshi et al. | A review paper on security concerns in cloud computing and proposed security models | |
CN112131309A (en) | Data evidence storing method and system based on block chain technology | |
CN108064030A (en) | SMS interception method and device | |
CN110516469A (en) | A kind of anti-hacking methods in shared big data application scenarios based on block chain | |
CN115333865B (en) | Client data security management method of video conference system | |
CN107426223A (en) | Cloud file encryption and decryption method, encryption and decryption device and processing system | |
CN108390857B (en) | Method and device for exporting file from high-sensitivity network to low-sensitivity network | |
CN104917738B (en) | Financial platform data processing method and system | |
CN110855664A (en) | Network certificate system | |
CN114466353A (en) | App user ID information protection device and method, electronic equipment and storage medium | |
Wallich | Wire pirates | |
CN111817858A (en) | Block chain data security method based on multiple signatures | |
CN109978377A (en) | Enterprise qualification Auditing System and method | |
CN113536372B (en) | Data processing method and device and electronic equipment | |
CN115587129A (en) | Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry | |
CN115913526A (en) | Anonymous reporting method based on block chain data hidden transmission | |
Wang et al. | Collection and judgment of electronic data evidence in criminal cases: From the perspective of investigation and evidence collection by public security organs | |
CN114826730A (en) | Block chain hidden communication model capable of hiding sensitive document and sender identity | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN109271811B (en) | Group signature-based electronic material evidence tamper-proof storage method | |
CN104378325B (en) | Network electronic data acquisition solidification, verification and reduction method and system | |
Chen et al. | Research on Internet of Things information security based on blockchain | |
CN111651776A (en) | Access control record storage method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |