CN110516469A - A kind of anti-hacking methods in shared big data application scenarios based on block chain - Google Patents

A kind of anti-hacking methods in shared big data application scenarios based on block chain Download PDF

Info

Publication number
CN110516469A
CN110516469A CN201910699177.8A CN201910699177A CN110516469A CN 110516469 A CN110516469 A CN 110516469A CN 201910699177 A CN201910699177 A CN 201910699177A CN 110516469 A CN110516469 A CN 110516469A
Authority
CN
China
Prior art keywords
data
server
block chain
information
dirty
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910699177.8A
Other languages
Chinese (zh)
Other versions
CN110516469B (en
Inventor
白卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Baiyang Software Co Ltd
Original Assignee
Suzhou Baiyang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Baiyang Software Co Ltd filed Critical Suzhou Baiyang Software Co Ltd
Priority to CN201910699177.8A priority Critical patent/CN110516469B/en
Publication of CN110516469A publication Critical patent/CN110516469A/en
Application granted granted Critical
Publication of CN110516469B publication Critical patent/CN110516469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Anti- hacking methods in the invention discloses a kind of shared big data application scenarios based on block chain, source data is become into block chain data (comprising part dirty data), markization is gone again, and it stores on the server, each server product generates block chain data, network operator can be by API Calls data, and calling data is the setting of block chain server matches access client server, can just call data after server and dirty data successful match.The present invention solves the problems, such as that hacker or intra-company employee steal part or all of data, by the watermark data (API code key) for generating server, screen accessed server, 10% dirty data is added in data simultaneously, the irregular inspection dirty data of block chain server, if it find that dirty data discarding in part can then report an error, accomplish real-time detection, it is highly-safe.

Description

A kind of anti-hacking methods in shared big data application scenarios based on block chain
Technical field
The present invention relates to data information security protection technology field, specifically a kind of shared big data based on block chain is answered With the anti-hacking methods in scene.
Background technique
With the huge explosion of data and the needs of artificial intelligence, there is an urgent need to provide the people based on big data modeling between enterprise Work intelligent Service.It realizes artificial intelligence, needs to break data silo, could effectively be mentioned using external multi-party enterprise shared information For the effectiveness of artificial intelligence.But under the pressure of the requirement of laws and regulations between enterprise, and the interests needs of itself digital asset are protected, no It is ready that user information is shared to third party enterprise in plain text to be used.The present invention is directed to this special scenes, proposes user information The label data formed after desensitization shares to the use of third party enterprise, and enterprise's number one and user can be protected to believe Breath is not revealed in plain text, while being also able to satisfy third party enterprise in the modeling needs of artificial intelligence field.In order to guarantee shared number According to the high efficiency in modeling, shared data complete or collected works can the form of weak center in a distributed manner be deployed in third-party server, How to prevent from hacker or internal staff from stealing all or part of data to be very important thing.Current server only passes through use Name in an account book and password are set up defences, and requirement is no longer satisfied.Therefore, those skilled in the art provide a kind of shared based on block chain Anti- hacking methods in big data application scenarios, to solve the problems mentioned in the above background technology.
Summary of the invention
Anti- hacking methods in the purpose of the present invention is to provide a kind of shared big data application scenarios based on block chain, To solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme:
A kind of anti-hacking methods in shared big data application scenarios based on block chain, first have to lead to the user information of plaintext Irreversible hashing algorithm is crossed, the label data of desensitization is changed into;Secondly, source data is become block chain data (comprising part Watermark data), then markization is gone, and be stored in the server of other side, each server product generates different block chains Data, network operator can pass through API Calls user tag data.Verification server can irregularly call block chain server inspection The legitimacy of local data only ensures that local data is legal, and network operator can just continue to use API Calls user tag number According to.The specific method is as follows for it:
(1) block chain data: to prevent data to be altered, using general ledger technology, source data write-in one can not be distorted total In account book (block chain technology);
(2) encryption data:
Source data is encrypted, goes markization to obtain hash data information aggregate again after obtaining encryption data.Obtained data Gather irreversible, i.e., cannot obtain the plaintext of user information by hash data;
(3) server watermark data:
The characteristic information for extracting source data, automatically generates 10% ~ 15% watermark data (mantissa that should not be discovered of source data sum According to).Watermark data is encrypted, goes markization to obtain hash data information aggregate again after obtaining encryption data.Obtained number It is irreversible according to gathering, i.e., the plaintext of watermark data cannot be obtained by hash data;
(4) merging data
By the data acquisition system of step (2) and (3), all in the server, hash data information can after obtaining access mandate for storage Can be retrieved, match by third party;
(5) API Calls data:
A. block chain server match with access client server, block chain data and watermark data with access client server Successful match calls data success;
B. block chain server and access client server mismatch:
B1. block chain data and access client server mismatch, and cannot use data;
B2. dirty data and access client server mismatch, and cannot use data.
As a further solution of the present invention: digital digest algorithm can be used but be not limited to Hash calculation in the step (2) Method.
As further scheme of the invention: hash algorithm can be used in the algorithm of server watermark in the step (3).
As further scheme of the invention: the data information abstract includes not only specific digital information, is also wrapped Containing the information content, information source, information storage means, information storage.
As the present invention further scheme: when the access user and third party use data, access user and the Tripartite retrieves the data thought by digital digest information, to use data, needs to access user data and server letter Breath matching, accesses user if successful match and third party can recall respective data blocks from general ledger, carry out Data Matching or Analysis;
Wherein, if hacker or intra-company employee replicate part or all of data, anti-hacking methods of the invention can pass through clothes Business device watermark data and dirty data match denied access, play the purpose of protection.
Compared with prior art, the beneficial effects of the present invention are:
The present invention solves the problems, such as that hacker or intra-company employee steal part or all of data, by the water for generating server Printing screens accessed server according to (API code key), while 10% dirty data is added in data, and block chain server is indefinite The inspection dirty data of phase accomplishes real-time detection if it find that dirty data discarding in part can then report an error, highly-safe.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the anti-hacking methods in shared big data application scenarios based on block chain.
Fig. 2 be a kind of shared big data application scenarios based on block chain in anti-hacking methods in data block chain original Manage block diagram.
The original that Fig. 3 encrypts for source data in the anti-hacking methods in a kind of shared big data application scenarios based on block chain Manage block diagram.
Fig. 4 is server watermark data in the anti-hacking methods in a kind of shared big data application scenarios based on block chain Functional block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In the embodiment of the present invention, a kind of anti-hacking methods in shared big data application scenarios based on block chain, such as Fig. 1 It is shown, source data is become into block chain data (comprising part dirty data), then go markization, and store on the server, each Server product generates block chain data, and network operator can be by API Calls data, and calling data is block chain server With the setting for accessing client server, data can be just called after server and dirty data successful match, specific method is such as Under:
(1) block chain data: to prevent data to be altered, using general ledger technology, source data write-in one can not be distorted total In account book (block chain technology), as shown in Figure 2;
(2) encryption data:
Source data is encrypted, source data information can be encrypted data by digital digest algorithm, be encrypted Data increase by 10% dirty data automatically in ciphering process, then, then go markization to obtain data information the encrypted data Abstract can be retrieved by third party after data information abstract authorization, be matched, as shown in Figure 3;
(3) it stores: in the server by encrypted data storage in step (2);
(4) server watermark data:
After data are in service device, server will access user information by algorithm and server info forms a watermark Data, the watermark data is irreversible, as shown in Figure 4;
(5) API Calls data:
A. block chain server match with access client server, block chain data and dirty data with access client server With success, data success is called;
B. block chain server and access client server mismatch:
B1. block chain data and access client server mismatch, and cannot use data;
B2. dirty data and access client server mismatch, and cannot use data.
Digital digest algorithm can be used but be not limited to hash algorithm in the step (2).
Hash algorithm can be used in the algorithm of server watermark in the step (3).
Data information abstract not only includes specific digital information, also includes the information content, information source, and information is deposited Storage mode, information storage.
When the access user and third party use data, accesses user and third party is retrieved by digital digest information The data thought need to access user data and server information matches, user are accessed if successful match to use data And third party can recall respective data blocks from general ledger, carry out Data Matching or analysis;Wherein, if hacker or intra-company Employee replicates part or all of data, and anti-hacking methods of the invention can pass through server watermark data and dirty data matching refusal Access, plays the purpose of protection.
The present invention solves the problems, such as that hacker or intra-company employee steal part or all of data, by generating server Watermark data (API code key), screen accessed server, at the same in data addition 10% dirty data, block chain server Irregular inspection dirty data accomplishes real-time detection if it find that dirty data discarding in part can then report an error, highly-safe.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (5)

1. the anti-hacking methods in a kind of shared big data application scenarios based on block chain, which is characterized in that become source data At block chain data (including part watermark data), then markization is gone, and store on the server, each server product produces Raw different block chain data, network operator can be by API Calls data, and calling data is that the access of block chain server matches is used Data can be just called after the setting of family server, server and dirty data successful match, the specific method is as follows:
(1) block chain data:
To prevent data to be altered, using general ledger technology, a total account book (block chain skill that can not be distorted is written into source data Art) in;
(2) encryption data:
Source data is encrypted, source data information can be encrypted data by digital digest algorithm, be encrypted Data increase by 10% dirty data automatically in ciphering process, then, then go markization to obtain data information the encrypted data Abstract can be retrieved by third party after data information abstract authorization, be matched;
(3) it stores: in the server by encrypted data storage in step (2);
(4) server watermark data:
After data are in service device, server will access user information by algorithm and server info forms a watermark Data, the watermark data are irreversible;
(5) API Calls data:
A. block chain server match with access client server, block chain data and dirty data with access client server With success, data success is called;
B. block chain server and access client server mismatch:
B1. block chain data and access client server mismatch, and cannot use data;
B2. dirty data and access client server mismatch, and cannot use data.
2. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1, It is characterized in that, digital digest algorithm can be used but be not limited to hash algorithm in the step (2).
3. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1, It is characterized in that, hash algorithm can be used in the algorithm of server watermark in the step (3).
4. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1, It is characterized in that, it also includes the information content, information source, information that the data information abstract, which not only includes specific digital information, Storage mode, information storage.
5. the anti-hacking methods in a kind of shared big data application scenarios based on block chain according to claim 1, It is characterized in that, when the access user and third party use data, accesses user and third party passes through digital digest information retrieval It needs to access user data and server information matches to use data to the data thought, use is accessed if successful match Family and third party can recall respective data blocks from general ledger, carry out Data Matching or analysis.
CN201910699177.8A 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain Active CN110516469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910699177.8A CN110516469B (en) 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910699177.8A CN110516469B (en) 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain

Publications (2)

Publication Number Publication Date
CN110516469A true CN110516469A (en) 2019-11-29
CN110516469B CN110516469B (en) 2023-05-26

Family

ID=68624102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910699177.8A Active CN110516469B (en) 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain

Country Status (1)

Country Link
CN (1) CN110516469B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831984A (en) * 2019-04-23 2020-10-27 苏州白杨软件有限公司 Method for determining and verifying digital information property in digital economy
WO2021197227A1 (en) * 2020-04-01 2021-10-07 International Business Machines Corporation Noisy transaction for protection of data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017191472A1 (en) * 2016-05-05 2017-11-09 Invasec Ltd. A verification system and method
US20180227116A1 (en) * 2017-02-06 2018-08-09 Northern Trust Corporation Systems and methods for generating, uploading, and executing code blocks within distributed network nodes
CN108615148A (en) * 2018-03-26 2018-10-02 北交金科金融信息服务有限公司 A kind of preposition method of commerce of secured assets and system based on block chain technology
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
CN109190399A (en) * 2018-09-05 2019-01-11 贝富(广州)新技术有限公司 Method for anti-counterfeit, system and storage medium based on block chain
CN109241753A (en) * 2018-08-09 2019-01-18 南京简诺特智能科技有限公司 A kind of data sharing method and system based on block chain
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
US20190123895A1 (en) * 2017-10-23 2019-04-25 Cygnetise Limited Methods and apparatus for verifying a user transaction
CN109981641A (en) * 2019-03-26 2019-07-05 北京邮电大学 A kind of safe distribution subscription system and distribution subscription method based on block chain technology

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017191472A1 (en) * 2016-05-05 2017-11-09 Invasec Ltd. A verification system and method
US20180227116A1 (en) * 2017-02-06 2018-08-09 Northern Trust Corporation Systems and methods for generating, uploading, and executing code blocks within distributed network nodes
US20190123895A1 (en) * 2017-10-23 2019-04-25 Cygnetise Limited Methods and apparatus for verifying a user transaction
CN108615148A (en) * 2018-03-26 2018-10-02 北交金科金融信息服务有限公司 A kind of preposition method of commerce of secured assets and system based on block chain technology
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
CN109241753A (en) * 2018-08-09 2019-01-18 南京简诺特智能科技有限公司 A kind of data sharing method and system based on block chain
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN109190399A (en) * 2018-09-05 2019-01-11 贝富(广州)新技术有限公司 Method for anti-counterfeit, system and storage medium based on block chain
CN109981641A (en) * 2019-03-26 2019-07-05 北京邮电大学 A kind of safe distribution subscription system and distribution subscription method based on block chain technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ZHAOFENGMA ET AL.: "Blockchain for digital rights management", 《FUTURE GENERATION COMPUTER SYSTEMS》 *
呼阳等: "基于区块链的生产线数据共享方案研究", 《国外电子测量技术》 *
基于DSL和区块链技术的可编程智能合约设计与实现: "基于DSL和区块链技术的可编程智能合约设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831984A (en) * 2019-04-23 2020-10-27 苏州白杨软件有限公司 Method for determining and verifying digital information property in digital economy
WO2021197227A1 (en) * 2020-04-01 2021-10-07 International Business Machines Corporation Noisy transaction for protection of data
GB2609156A (en) * 2020-04-01 2023-01-25 Ibm Noisy transaction for protection of data

Also Published As

Publication number Publication date
CN110516469B (en) 2023-05-26

Similar Documents

Publication Publication Date Title
CN109146524A (en) A kind of agricultural product using block chain technology are traced to the source information security solution
CN105760722A (en) Watermark embedding electronic signature generation method and platform
Doshi et al. A review paper on security concerns in cloud computing and proposed security models
CN112131309A (en) Data evidence storing method and system based on block chain technology
CN108064030A (en) SMS interception method and device
CN110516469A (en) A kind of anti-hacking methods in shared big data application scenarios based on block chain
CN115333865B (en) Client data security management method of video conference system
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
CN108390857B (en) Method and device for exporting file from high-sensitivity network to low-sensitivity network
CN104917738B (en) Financial platform data processing method and system
CN110855664A (en) Network certificate system
CN114466353A (en) App user ID information protection device and method, electronic equipment and storage medium
Wallich Wire pirates
CN111817858A (en) Block chain data security method based on multiple signatures
CN109978377A (en) Enterprise qualification Auditing System and method
CN113536372B (en) Data processing method and device and electronic equipment
CN115587129A (en) Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry
CN115913526A (en) Anonymous reporting method based on block chain data hidden transmission
Wang et al. Collection and judgment of electronic data evidence in criminal cases: From the perspective of investigation and evidence collection by public security organs
CN114826730A (en) Block chain hidden communication model capable of hiding sensitive document and sender identity
CN111541652B (en) System for improving security of secret information keeping and transmission
CN109271811B (en) Group signature-based electronic material evidence tamper-proof storage method
CN104378325B (en) Network electronic data acquisition solidification, verification and reduction method and system
Chen et al. Research on Internet of Things information security based on blockchain
CN111651776A (en) Access control record storage method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant