CN111224786A - Block chain-based data security sharing method, device and medium - Google Patents

Block chain-based data security sharing method, device and medium Download PDF

Info

Publication number
CN111224786A
CN111224786A CN201911396956.7A CN201911396956A CN111224786A CN 111224786 A CN111224786 A CN 111224786A CN 201911396956 A CN201911396956 A CN 201911396956A CN 111224786 A CN111224786 A CN 111224786A
Authority
CN
China
Prior art keywords
data
shared
party
application
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911396956.7A
Other languages
Chinese (zh)
Inventor
马龙
庞松涛
商广勇
王伟兵
李文博
李佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Shandong ICity Information Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong ICity Information Technology Co., Ltd. filed Critical Shandong ICity Information Technology Co., Ltd.
Priority to CN201911396956.7A priority Critical patent/CN111224786A/en
Publication of CN111224786A publication Critical patent/CN111224786A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data security sharing method, equipment and medium based on a block chain. In the method, a data application side sends a data query request to a data sharing side; according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm; and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data. By pre-storing the hash value of the shared data in the blockchain, the data application side can verify the acquired shared data so as to ensure the security of data sharing.

Description

Block chain-based data security sharing method, device and medium
Technical Field
The present application relates to the field of data security technologies, and in particular, to a method, device, and medium for sharing data security based on a block chain.
Background
With the advent of the information age, the issue of data security has gradually become a focus of attention.
In the process of data sharing, the data sharing party can share own data, and the data application party obtains the own data according to the own needs.
However, shared data owned by the data sharing party may be tampered with, which may not guarantee the security of data sharing, and thus may cause the data application party to acquire wrong data, and further may cause other harmful results.
Disclosure of Invention
The embodiment of the application provides a data security sharing method, device and medium based on a block chain, which are used for solving the following technical problems in the prior art: the shared data has the risk of being tampered, and the security of data sharing cannot be guaranteed, so that a data application party obtains wrong data, and further other harm results may be caused.
The embodiment of the application adopts the following technical scheme:
a safe data sharing method based on a block chain comprises the following steps:
the data application side sends a data query request to the data sharing side;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
Optionally, before sending the data query request to the data sharing party, the method further includes: determining a data identifier of data to be queried; and determining whether a data identifier matched with the data identifier of the data to be inquired exists in the data identifiers of the shared data prestored in the block chain.
Optionally, the method further comprises: and returning feedback information based on the security of the shared data to the data sharing party according to the verification result.
A safe data sharing method based on a block chain comprises the following steps:
the data sharing party hashes the shared data by adopting a hash algorithm and writes the obtained hash value into the block chain;
receiving a data query request of a data application party;
determining shared data corresponding to the data query request from a database;
and returning the shared data to the data application party, so that the data application party carries out security verification on the shared data according to the hash value in the block chain.
Optionally, hashing the shared data by using a hashing algorithm includes: monitoring data updating in a database; and when the data updating is monitored, determining to adopt a hash algorithm to hash the updated shared data.
Optionally, the method further comprises: and generating a digital object unique identifier based on the shared data, and enabling the data application party to inquire the shared data according to the data object unique identifier.
Optionally, the method further comprises: and storing the data query request of the data application party.
Optionally, the data sharer comprises a front-end application; the method further comprises the following steps: and writing data into the block chain through the front-end application, and caching the data query request of the data application party.
An apparatus for secure sharing of data based on blockchains, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
A non-transitory computer storage medium for secure sharing of data based on blockchains, storing computer-executable instructions configured to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
by hashing the shared data, the shared data with a large data volume can be simplified into a hash value with a small data volume. Therefore, when the hash value of the shared data is written into the block chain, the workload of the write chain can be reduced, and meanwhile, the information of the shared data is not required to be disclosed to other nodes, but only the summary information of the shared data is disclosed, so that the safety of the data is ensured.
Moreover, by the characteristics of the safety and the tamper resistance of the block chain storage data, the safety of the hash value of the shared data written in the block chain can be ensured, and the hash value of the shared data is prevented from being tampered, so that the hash value can be used as a reference in the future.
By hashing shared data received by a data application party, authenticity of the shared data received by the data application party can be confirmed based on trust of authenticity of a hash value stored in a blockchain, thereby confirming security of the shared data stored in a database of the data sharing party. The method and the device realize the consistency of the shared data and the original data when in application, reduce the trust problems of tampering and deleting the data of the data sharing party and improve the mutual trust of the two parties to the data application. The problems that the shared data is tampered in the storage and transmission processes and the like can be found in time, and the storage safety of the shared data and the safety in the sharing process are guaranteed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
In the drawings:
fig. 1 is a flowchart of a block chain-based data security sharing method according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating a working principle of a block chain-based data security sharing method in an actual application scenario according to an embodiment of the present application;
fig. 3 is a schematic view of a working principle of another block chain-based data security sharing method in an actual application scenario provided in the embodiment of the present application
Fig. 4 is a schematic structural diagram of an apparatus for securely sharing data based on a blockchain according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given in the application without making any creative effort, shall fall within the protection scope of the application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a block chain-based data security sharing method according to an embodiment of the present application, which includes the specific steps of:
s101: and the data sharing party hashes the shared data by adopting a hash algorithm and writes the obtained hash value into the block chain.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm, and is essentially a decentralized database.
A blockchain network based on secure sharing of data may be deployed first based on a blockchain framework. The blockchain frame may be any blockchain frame capable of implementing the corresponding function of the embodiment of the present application, for example, bitcoin, etherhouse, Fabric, Corda, and the like.
The blockchain network comprises a plurality of nodes, and specifically comprises nodes such as a data sharing party and a data application party.
In the embodiment of the application, the data sharing party can adopt a hash algorithm to hash the shared data owned by the data sharing party to obtain the corresponding hash value. Then, the data sharing party can determine the data identifier corresponding to the shared data, and write the data identifier of the shared data and the hash value into the block chain network together. The hash algorithm may specifically adopt an MD4 algorithm, an MD5 algorithm, an SHA algorithm, and the like.
By hashing the shared data, the shared data with a large data volume can be simplified into a hash value with a small data volume. Therefore, when the hash value of the shared data is written into the block chain, the workload of the write chain can be reduced, and meanwhile, the information of the shared data is not required to be disclosed to other nodes, but only the summary information of the shared data is disclosed, so that the safety of the data is ensured.
Moreover, by the characteristics of the safety and the tamper resistance of the block chain storage data, the safety of the hash value of the shared data written in the block chain can be ensured, and the hash value of the shared data is prevented from being tampered, so that the hash value can be used as a reference in the future.
Further, the data sharer may store the shared data through an off-chain database. A monitor may be disposed in the database to monitor the data update in the database. If the data in the database is updated, the data sharing party can be notified. Wherein, a listener represents a program that listens for data update events, including the insertion, deletion, modification, etc. of data.
After receiving the data update message, the data sharing party can perform validity check on the data update to determine whether the data update is legal operation.
If the data updating is unauthorized illegal operation, the data sharing party can determine related illegal operating personnel and restore the data updating. If the data updating is performed under the legal authority, the data sharing party can perform hash on the updated data by adopting a hash algorithm and write the identification of the data and the hash value into the block chain.
By monitoring the database, the legality of data updating can be determined in the first time of data updating, legal data updating is written into the block chain in time, the hash value stored in the block chain is updated, and synchronization between the hash value stored in the block chain and shared data stored in the database is guaranteed. In addition, the security of the shared data stored in the database can be improved, and the risk of data tampering is reduced.
Further, the data sharing party may also generate a corresponding Digital Object Unique Identifier (DOI), such as a two-dimensional code, a barcode, etc., according to the shared data, and disclose the DOI to the data application party. The data application side can inquire the shared data through the DOI information without inquiring through special block chain software, so that convenience is provided for the data application side.
S102: and the data application side sends a data query request to the data sharing side.
In the embodiment of the application, when the data application party needs to acquire data, a data query request can be sent to the data sharing party.
Specifically, the data application side may perform operations such as scanning on DOI information provided by the data sharing side, so as to send a corresponding data query request to the data sharing side. The data query request comprises a data identifier of the data to be queried.
Further, since the data sharing party writes the hash value of the shared data into the blockchain in advance, the hash value is disclosed to all nodes in the blockchain network. Therefore, the data application side can firstly query in the block chain network according to the data identification of the data to be queried so as to determine whether matched shared data exists.
If the shared data matched with the data to be inquired does not exist in the block chain network, the prompt information that the data to be inquired does not exist can be returned to the data application party. If the block chain network has shared data matched with the data to be inquired, all information of the corresponding shared data can be returned to the data sharing party.
And partial information of the shared data is disclosed to all nodes through the block chain network, and the shared data in the block chain network can be inquired in advance by a data application side according to the data identification. Therefore, the query workload of the data sharing party can be reduced, the operation of the data sharing party is simplified, the burden of the data sharing party is reduced, and more effective data query results can be obtained.
S103: and the data sharing party determines corresponding shared data from the database according to the data query request and returns the shared data to the data application party.
In the embodiment of the application, after receiving the data query request of the data application party, the data sharing party can determine all information of corresponding shared data from the database according to the data identifier and return the information to the data application party.
Furthermore, the data sharing party can also store the data query request of the data application party, and corresponding to the information of the data application party, a corresponding data query record can be formed. The information of the data application side can include identity information, area information and the like.
Through the data query records, the data sharing party can know the trend and focus of data query of each data application party, so that the data supplier can conveniently perform operations of data supplement, data research and the like in relevant aspects. And moreover, data tracing can be facilitated through data query records.
Further, the data sharing party may be provided with a front-end application. The front-end application can be used as an intermediary between the database and the data application party, the data sharing party can write data into the block chain through the front-end application, and the data query request of the data application party can be cached in the front-end application.
By setting the front application, the query and access pressure on the database can be reduced, and the maintenance of the database of a data sharing party is facilitated. Meanwhile, the data query request of the data application party is cached by the front-end application, so that data support can be provided for the data sharing party.
S104: and the data application party carries out security verification on the obtained shared data according to the hash value prestored in the block chain.
In the embodiment of the application, the data application side can perform security verification on the obtained shared data according to the hash value pre-stored in the block chain.
Specifically, after receiving the shared data, the data application side may use the same hash algorithm to hash the received shared data to obtain a hash value. The data application side can match the hash value obtained by the data application side with the hash value of the shared data prestored in the block chain, so that the security of the obtained shared data is verified, and the credibility of the obtained shared data is determined.
And if the hash value obtained by the data application party is matched with the hash value prestored in the block chain, the shared data obtained by the data application party is consistent with the shared data stored by the data sharing party, and the security verification of the shared data is passed. If the hash value obtained by the data application party is not matched with the hash value pre-stored in the block chain, the shared data is possibly tampered in the storage and transmission processes, the security of the shared data has a problem, and the security verification of the shared data does not pass.
By hashing shared data received by a data application party, authenticity of the shared data received by the data application party can be confirmed based on trust of authenticity of a hash value stored in a blockchain, thereby confirming security of the shared data stored in a database of the data sharing party. The problems that the shared data is tampered in the storage and transmission processes and the like can be found in time, and the storage safety of the shared data and the safety in the sharing process are guaranteed.
Further, the data application party can return corresponding feedback information to the data sharing party according to the result of the security verification of the shared data. If the security verification is not passed, the data application side can send risk prompt information to the data sharing side so that the data sharing side can know the risk prompt information.
Fig. 2 and fig. 3 are schematic diagrams of working principles of a block chain-based data security sharing method in an actual application scenario provided by the embodiment of the present application.
As shown in fig. 2, the data sharing party includes a database and a front-end application, which in turn includes a Software Development Kit (SDK) and a cache database.
The database is used for storing shared data owned by a data sharing party, and the front-end application is used as an intermediary for the database to interact with the outside. The front-end application can specifically perform information interaction with the outside through the SDK and perform information interaction with the database at the same time. The cache database is used for temporarily storing data, and can be specifically MongoDB.
The data application side comprises an application and a blockchain, wherein the application is used for realizing interaction between a user and the blockchain, and the blockchain is used for storing written data.
In the practical application scenario provided by the embodiment of the application, the data sharing party can represent a civil institution, a government institution and the like with certain public credibility, and the data application party can represent users such as common citizens and the like.
The embodiments of the present application will be described in detail with reference to the Ministry of industry and communications as an example. The method comprises the following specific steps:
s201: and sending a data query request.
In the embodiment of the application, the industry department can collect the product data of all industrial products and store the product data in the database. Therefore, the user can scan information such as two-dimensional codes provided by a manufacturer on products through an application, an applet and the like installed on the terminal, and send a data query request to acquire related product data. The information such as the two-dimensional code provided by the manufacturer can be associated with the database of the Ministry of industry and information.
S202: and querying in the block chain according to the product identification.
In the embodiment of the present application, the two-dimensional code provided by the manufacturer may include a product identifier. After the user sends the data query request, the application may first query in the block chain according to the product identifier to determine whether a matching product identifier exists in the block chain.
If the matched product identification does not exist, the information that the product data does not exist can be prompted to the user. If there is a matching product identification, a data query request may be sent to the front-end application of the department of industry.
S203: and inquiring product data according to the product identification.
S204: and returning the product data.
After receiving the data query request, the front-end application of the work and mail department can be called through the SDK according to the product identification carried in the data query request, and corresponding product data are queried and obtained from the database.
The front-end application of the department of industry and trust may then return the queried product data to the application.
S205: and hashing the product data, and comparing the product data with a hash value prestored in the block chain.
After the application receives the product data, the same hash algorithm can be adopted to hash the product data to obtain a corresponding hash value. The application may compare the obtained hash value with a hash value pre-stored in the blockchain.
S206: and displaying to the user.
S207: and (6) prompting risks.
If the hash value obtained by the application is consistent with the hash value pre-stored in the block chain, the application can display the corresponding product data to the user. If the hash value obtained by the application is inconsistent with the hash value pre-stored in the block chain, the application can send risk prompt information to the front-end application of the work and credit department so that the work and credit department can know the risk prompt information.
It should be noted that what is shown in fig. 2 and fig. 3 is a practical application scenario based on fig. 1. The details are not detailed in the related description of fig. 2 and fig. 3, and the related description of fig. 1 may be specifically referred to.
Based on the same idea, some embodiments of the present application further provide a device and a non-volatile computer storage medium corresponding to the above method.
Fig. 4 is a schematic structural diagram of an apparatus for securely sharing data based on a blockchain according to an embodiment of the present application, where the blockchain apparatus includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
Some embodiments of the present application provide a non-volatile computer storage medium corresponding to a blockchain-based secure sharing of data of fig. 1, having stored thereon computer-executable instructions configured to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A safe data sharing method based on a block chain is characterized by comprising the following steps:
the data application side sends a data query request to the data sharing side;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
2. The method of claim 1, wherein prior to sending the data query request to the data sharer, the method further comprises:
determining a data identifier of data to be queried;
and determining whether a data identifier matched with the data identifier of the data to be inquired exists in the data identifiers of the shared data prestored in the block chain.
3. The method of claim 1, wherein the method further comprises:
and returning feedback information based on the security of the shared data to the data sharing party according to the verification result.
4. A safe data sharing method based on a block chain is characterized by comprising the following steps:
the data sharing party hashes the shared data by adopting a hash algorithm and writes the obtained hash value into the block chain;
receiving a data query request of a data application party;
determining shared data corresponding to the data query request from a database;
and returning the shared data to the data application party, so that the data application party carries out security verification on the shared data according to the hash value in the block chain.
5. The method of claim 4, wherein hashing the shared data using a hashing algorithm comprises:
monitoring data updating in a database;
and when the data updating is monitored, determining to adopt a hash algorithm to hash the updated shared data.
6. The method of claim 4, wherein the method further comprises:
and generating a digital object unique identifier based on the shared data, and enabling the data application party to inquire the shared data according to the data object unique identifier.
7. The method of claim 4, wherein the method further comprises:
and storing the data query request of the data application party.
8. The method of claim 7, wherein the data sharer comprises a front-end application;
the method further comprises the following steps:
and writing data into the block chain through the front-end application, and caching the data query request of the data application party.
9. An apparatus for secure sharing of data based on blockchains, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
10. A non-transitory computer storage medium for secure sharing of data based on blockchains, the computer storage medium having stored thereon computer-executable instructions configured to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
CN201911396956.7A 2019-12-30 2019-12-30 Block chain-based data security sharing method, device and medium Pending CN111224786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911396956.7A CN111224786A (en) 2019-12-30 2019-12-30 Block chain-based data security sharing method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911396956.7A CN111224786A (en) 2019-12-30 2019-12-30 Block chain-based data security sharing method, device and medium

Publications (1)

Publication Number Publication Date
CN111224786A true CN111224786A (en) 2020-06-02

Family

ID=70832312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911396956.7A Pending CN111224786A (en) 2019-12-30 2019-12-30 Block chain-based data security sharing method, device and medium

Country Status (1)

Country Link
CN (1) CN111224786A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683082A (en) * 2020-06-04 2020-09-18 杭州溪塔科技有限公司 Data sharing method and system based on block chain and electronic equipment
CN111858769A (en) * 2020-07-28 2020-10-30 北京金山云网络技术有限公司 Data using method, device, node equipment and storage medium
CN112039891A (en) * 2020-08-31 2020-12-04 深圳前海微众银行股份有限公司 Method and device for sharing abnormal data by block chain
CN112395353A (en) * 2020-10-27 2021-02-23 中国电力科学研究院有限公司 Intelligent electric energy meter quality data sharing method and system based on alliance chain
CN112767110A (en) * 2021-01-20 2021-05-07 中国工商银行股份有限公司 Big data scattered cochain method and system
CN112905553A (en) * 2021-02-07 2021-06-04 全链通有限公司 Data sharing method, device and system based on block chain
CN113364754A (en) * 2021-05-31 2021-09-07 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment
CN113411321A (en) * 2021-06-15 2021-09-17 国网电子商务有限公司 Block chain-based electricity consumption data acquisition method and system
CN113449296A (en) * 2021-07-20 2021-09-28 恒安嘉新(北京)科技股份公司 System, method, apparatus, and medium for data security protection
CN113656365A (en) * 2021-07-28 2021-11-16 熵链科技(福建)有限公司 Data sharing method and system based on block chain
CN115242529A (en) * 2022-07-26 2022-10-25 国网智能电网研究院有限公司 Data security sharing system
CN116686512A (en) * 2023-08-01 2023-09-05 布比(北京)网络技术有限公司 Crop production management method, device, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175436A (en) * 2019-05-16 2019-08-27 中细软集团有限公司 The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN110222080A (en) * 2019-06-18 2019-09-10 北京艾摩瑞策科技有限公司 Pass through the shared economic data querying method and its device of block chain
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175436A (en) * 2019-05-16 2019-08-27 中细软集团有限公司 The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN110222080A (en) * 2019-06-18 2019-09-10 北京艾摩瑞策科技有限公司 Pass through the shared economic data querying method and its device of block chain
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683082A (en) * 2020-06-04 2020-09-18 杭州溪塔科技有限公司 Data sharing method and system based on block chain and electronic equipment
CN111858769A (en) * 2020-07-28 2020-10-30 北京金山云网络技术有限公司 Data using method, device, node equipment and storage medium
CN111858769B (en) * 2020-07-28 2024-05-03 北京金山云网络技术有限公司 Data use method, device, node equipment and storage medium
CN112039891A (en) * 2020-08-31 2020-12-04 深圳前海微众银行股份有限公司 Method and device for sharing abnormal data by block chain
CN112039891B (en) * 2020-08-31 2024-04-09 深圳前海微众银行股份有限公司 Method and device for sharing abnormal data by block chain
CN112395353A (en) * 2020-10-27 2021-02-23 中国电力科学研究院有限公司 Intelligent electric energy meter quality data sharing method and system based on alliance chain
CN112767110A (en) * 2021-01-20 2021-05-07 中国工商银行股份有限公司 Big data scattered cochain method and system
CN112905553A (en) * 2021-02-07 2021-06-04 全链通有限公司 Data sharing method, device and system based on block chain
CN113364754B (en) * 2021-05-31 2023-10-13 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment
CN113364754A (en) * 2021-05-31 2021-09-07 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment
CN113411321A (en) * 2021-06-15 2021-09-17 国网电子商务有限公司 Block chain-based electricity consumption data acquisition method and system
CN113449296A (en) * 2021-07-20 2021-09-28 恒安嘉新(北京)科技股份公司 System, method, apparatus, and medium for data security protection
CN113449296B (en) * 2021-07-20 2024-04-23 恒安嘉新(北京)科技股份公司 System, method, device and medium for data security protection
CN113656365A (en) * 2021-07-28 2021-11-16 熵链科技(福建)有限公司 Data sharing method and system based on block chain
CN113656365B (en) * 2021-07-28 2024-05-17 熵链科技(福建)有限公司 Block chain-based data sharing method and system
CN115242529A (en) * 2022-07-26 2022-10-25 国网智能电网研究院有限公司 Data security sharing system
CN116686512A (en) * 2023-08-01 2023-09-05 布比(北京)网络技术有限公司 Crop production management method, device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN111224786A (en) Block chain-based data security sharing method, device and medium
CN111935075B (en) Digital identity issuing method, device and medium based on blockchain
CN110910138B (en) Block chain data supervision method and device
CN106991334B (en) Data access method, system and device
CN107342867B (en) Signature verification method and device
CN110163006B (en) Signature verification method, system, device and equipment in block chain type account book
CN111062715B (en) Method, device and equipment for code scanning payment, information sending and collection code generation
CN109271798A (en) Sensitive data processing method and system
CN111814196B (en) Data processing method, device and equipment
CN111241569A (en) Information processing method, device and equipment
CN110474775B (en) User creating method, device and equipment in block chain type account book
CN107066346B (en) Data backup method, data recovery method and device
CN108833133B (en) Network configuration management method and device based on cloud computing network and storage medium
CN114826661A (en) Data access method, device and medium based on open API
CN110995419A (en) Symmetric encryption and decryption method, device and medium based on data on link
CN111228819B (en) Method, device and equipment for protecting Shader
CN114266680A (en) Block chain-based electronic contract signing method, device and system
CN113342802A (en) Method and device for storing block chain data
CN111737747A (en) Database security method, device, equipment and computer storage medium
CN115208630A (en) Block chain based data acquisition method and system and block chain system
CN111292082B (en) Public key management method, device and equipment in block chain type account book
CN114511431A (en) Service processing method, device and medium based on block chain
CN116432199B (en) Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment
CN108777630B (en) Anti-repudiation method and device based on cloud computing network and readable storage medium
CN113222685B (en) Order verification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200731

Address after: Floor S01, Inspur Science Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province

Applicant after: Inspur cloud Information Technology Co.,Ltd.

Address before: Room 3110, S01 building, Langchao building, No. 1036, Langchao Road, high tech Zone, Jinan City, Shandong Province 250101

Applicant before: Shandong Aicheng Network Information Technology Co.,Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination