CN111224786A - Block chain-based data security sharing method, device and medium - Google Patents
Block chain-based data security sharing method, device and medium Download PDFInfo
- Publication number
- CN111224786A CN111224786A CN201911396956.7A CN201911396956A CN111224786A CN 111224786 A CN111224786 A CN 111224786A CN 201911396956 A CN201911396956 A CN 201911396956A CN 111224786 A CN111224786 A CN 111224786A
- Authority
- CN
- China
- Prior art keywords
- data
- shared
- party
- application
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000012795 verification Methods 0.000 claims abstract description 19
- 238000012544 monitoring process Methods 0.000 claims description 3
- 239000000047 product Substances 0.000 description 23
- 238000010586 diagram Methods 0.000 description 12
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application discloses a data security sharing method, equipment and medium based on a block chain. In the method, a data application side sends a data query request to a data sharing side; according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm; and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data. By pre-storing the hash value of the shared data in the blockchain, the data application side can verify the acquired shared data so as to ensure the security of data sharing.
Description
Technical Field
The present application relates to the field of data security technologies, and in particular, to a method, device, and medium for sharing data security based on a block chain.
Background
With the advent of the information age, the issue of data security has gradually become a focus of attention.
In the process of data sharing, the data sharing party can share own data, and the data application party obtains the own data according to the own needs.
However, shared data owned by the data sharing party may be tampered with, which may not guarantee the security of data sharing, and thus may cause the data application party to acquire wrong data, and further may cause other harmful results.
Disclosure of Invention
The embodiment of the application provides a data security sharing method, device and medium based on a block chain, which are used for solving the following technical problems in the prior art: the shared data has the risk of being tampered, and the security of data sharing cannot be guaranteed, so that a data application party obtains wrong data, and further other harm results may be caused.
The embodiment of the application adopts the following technical scheme:
a safe data sharing method based on a block chain comprises the following steps:
the data application side sends a data query request to the data sharing side;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
Optionally, before sending the data query request to the data sharing party, the method further includes: determining a data identifier of data to be queried; and determining whether a data identifier matched with the data identifier of the data to be inquired exists in the data identifiers of the shared data prestored in the block chain.
Optionally, the method further comprises: and returning feedback information based on the security of the shared data to the data sharing party according to the verification result.
A safe data sharing method based on a block chain comprises the following steps:
the data sharing party hashes the shared data by adopting a hash algorithm and writes the obtained hash value into the block chain;
receiving a data query request of a data application party;
determining shared data corresponding to the data query request from a database;
and returning the shared data to the data application party, so that the data application party carries out security verification on the shared data according to the hash value in the block chain.
Optionally, hashing the shared data by using a hashing algorithm includes: monitoring data updating in a database; and when the data updating is monitored, determining to adopt a hash algorithm to hash the updated shared data.
Optionally, the method further comprises: and generating a digital object unique identifier based on the shared data, and enabling the data application party to inquire the shared data according to the data object unique identifier.
Optionally, the method further comprises: and storing the data query request of the data application party.
Optionally, the data sharer comprises a front-end application; the method further comprises the following steps: and writing data into the block chain through the front-end application, and caching the data query request of the data application party.
An apparatus for secure sharing of data based on blockchains, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
A non-transitory computer storage medium for secure sharing of data based on blockchains, storing computer-executable instructions configured to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
by hashing the shared data, the shared data with a large data volume can be simplified into a hash value with a small data volume. Therefore, when the hash value of the shared data is written into the block chain, the workload of the write chain can be reduced, and meanwhile, the information of the shared data is not required to be disclosed to other nodes, but only the summary information of the shared data is disclosed, so that the safety of the data is ensured.
Moreover, by the characteristics of the safety and the tamper resistance of the block chain storage data, the safety of the hash value of the shared data written in the block chain can be ensured, and the hash value of the shared data is prevented from being tampered, so that the hash value can be used as a reference in the future.
By hashing shared data received by a data application party, authenticity of the shared data received by the data application party can be confirmed based on trust of authenticity of a hash value stored in a blockchain, thereby confirming security of the shared data stored in a database of the data sharing party. The method and the device realize the consistency of the shared data and the original data when in application, reduce the trust problems of tampering and deleting the data of the data sharing party and improve the mutual trust of the two parties to the data application. The problems that the shared data is tampered in the storage and transmission processes and the like can be found in time, and the storage safety of the shared data and the safety in the sharing process are guaranteed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
In the drawings:
fig. 1 is a flowchart of a block chain-based data security sharing method according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating a working principle of a block chain-based data security sharing method in an actual application scenario according to an embodiment of the present application;
fig. 3 is a schematic view of a working principle of another block chain-based data security sharing method in an actual application scenario provided in the embodiment of the present application
Fig. 4 is a schematic structural diagram of an apparatus for securely sharing data based on a blockchain according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given in the application without making any creative effort, shall fall within the protection scope of the application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a block chain-based data security sharing method according to an embodiment of the present application, which includes the specific steps of:
s101: and the data sharing party hashes the shared data by adopting a hash algorithm and writes the obtained hash value into the block chain.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm, and is essentially a decentralized database.
A blockchain network based on secure sharing of data may be deployed first based on a blockchain framework. The blockchain frame may be any blockchain frame capable of implementing the corresponding function of the embodiment of the present application, for example, bitcoin, etherhouse, Fabric, Corda, and the like.
The blockchain network comprises a plurality of nodes, and specifically comprises nodes such as a data sharing party and a data application party.
In the embodiment of the application, the data sharing party can adopt a hash algorithm to hash the shared data owned by the data sharing party to obtain the corresponding hash value. Then, the data sharing party can determine the data identifier corresponding to the shared data, and write the data identifier of the shared data and the hash value into the block chain network together. The hash algorithm may specifically adopt an MD4 algorithm, an MD5 algorithm, an SHA algorithm, and the like.
By hashing the shared data, the shared data with a large data volume can be simplified into a hash value with a small data volume. Therefore, when the hash value of the shared data is written into the block chain, the workload of the write chain can be reduced, and meanwhile, the information of the shared data is not required to be disclosed to other nodes, but only the summary information of the shared data is disclosed, so that the safety of the data is ensured.
Moreover, by the characteristics of the safety and the tamper resistance of the block chain storage data, the safety of the hash value of the shared data written in the block chain can be ensured, and the hash value of the shared data is prevented from being tampered, so that the hash value can be used as a reference in the future.
Further, the data sharer may store the shared data through an off-chain database. A monitor may be disposed in the database to monitor the data update in the database. If the data in the database is updated, the data sharing party can be notified. Wherein, a listener represents a program that listens for data update events, including the insertion, deletion, modification, etc. of data.
After receiving the data update message, the data sharing party can perform validity check on the data update to determine whether the data update is legal operation.
If the data updating is unauthorized illegal operation, the data sharing party can determine related illegal operating personnel and restore the data updating. If the data updating is performed under the legal authority, the data sharing party can perform hash on the updated data by adopting a hash algorithm and write the identification of the data and the hash value into the block chain.
By monitoring the database, the legality of data updating can be determined in the first time of data updating, legal data updating is written into the block chain in time, the hash value stored in the block chain is updated, and synchronization between the hash value stored in the block chain and shared data stored in the database is guaranteed. In addition, the security of the shared data stored in the database can be improved, and the risk of data tampering is reduced.
Further, the data sharing party may also generate a corresponding Digital Object Unique Identifier (DOI), such as a two-dimensional code, a barcode, etc., according to the shared data, and disclose the DOI to the data application party. The data application side can inquire the shared data through the DOI information without inquiring through special block chain software, so that convenience is provided for the data application side.
S102: and the data application side sends a data query request to the data sharing side.
In the embodiment of the application, when the data application party needs to acquire data, a data query request can be sent to the data sharing party.
Specifically, the data application side may perform operations such as scanning on DOI information provided by the data sharing side, so as to send a corresponding data query request to the data sharing side. The data query request comprises a data identifier of the data to be queried.
Further, since the data sharing party writes the hash value of the shared data into the blockchain in advance, the hash value is disclosed to all nodes in the blockchain network. Therefore, the data application side can firstly query in the block chain network according to the data identification of the data to be queried so as to determine whether matched shared data exists.
If the shared data matched with the data to be inquired does not exist in the block chain network, the prompt information that the data to be inquired does not exist can be returned to the data application party. If the block chain network has shared data matched with the data to be inquired, all information of the corresponding shared data can be returned to the data sharing party.
And partial information of the shared data is disclosed to all nodes through the block chain network, and the shared data in the block chain network can be inquired in advance by a data application side according to the data identification. Therefore, the query workload of the data sharing party can be reduced, the operation of the data sharing party is simplified, the burden of the data sharing party is reduced, and more effective data query results can be obtained.
S103: and the data sharing party determines corresponding shared data from the database according to the data query request and returns the shared data to the data application party.
In the embodiment of the application, after receiving the data query request of the data application party, the data sharing party can determine all information of corresponding shared data from the database according to the data identifier and return the information to the data application party.
Furthermore, the data sharing party can also store the data query request of the data application party, and corresponding to the information of the data application party, a corresponding data query record can be formed. The information of the data application side can include identity information, area information and the like.
Through the data query records, the data sharing party can know the trend and focus of data query of each data application party, so that the data supplier can conveniently perform operations of data supplement, data research and the like in relevant aspects. And moreover, data tracing can be facilitated through data query records.
Further, the data sharing party may be provided with a front-end application. The front-end application can be used as an intermediary between the database and the data application party, the data sharing party can write data into the block chain through the front-end application, and the data query request of the data application party can be cached in the front-end application.
By setting the front application, the query and access pressure on the database can be reduced, and the maintenance of the database of a data sharing party is facilitated. Meanwhile, the data query request of the data application party is cached by the front-end application, so that data support can be provided for the data sharing party.
S104: and the data application party carries out security verification on the obtained shared data according to the hash value prestored in the block chain.
In the embodiment of the application, the data application side can perform security verification on the obtained shared data according to the hash value pre-stored in the block chain.
Specifically, after receiving the shared data, the data application side may use the same hash algorithm to hash the received shared data to obtain a hash value. The data application side can match the hash value obtained by the data application side with the hash value of the shared data prestored in the block chain, so that the security of the obtained shared data is verified, and the credibility of the obtained shared data is determined.
And if the hash value obtained by the data application party is matched with the hash value prestored in the block chain, the shared data obtained by the data application party is consistent with the shared data stored by the data sharing party, and the security verification of the shared data is passed. If the hash value obtained by the data application party is not matched with the hash value pre-stored in the block chain, the shared data is possibly tampered in the storage and transmission processes, the security of the shared data has a problem, and the security verification of the shared data does not pass.
By hashing shared data received by a data application party, authenticity of the shared data received by the data application party can be confirmed based on trust of authenticity of a hash value stored in a blockchain, thereby confirming security of the shared data stored in a database of the data sharing party. The problems that the shared data is tampered in the storage and transmission processes and the like can be found in time, and the storage safety of the shared data and the safety in the sharing process are guaranteed.
Further, the data application party can return corresponding feedback information to the data sharing party according to the result of the security verification of the shared data. If the security verification is not passed, the data application side can send risk prompt information to the data sharing side so that the data sharing side can know the risk prompt information.
Fig. 2 and fig. 3 are schematic diagrams of working principles of a block chain-based data security sharing method in an actual application scenario provided by the embodiment of the present application.
As shown in fig. 2, the data sharing party includes a database and a front-end application, which in turn includes a Software Development Kit (SDK) and a cache database.
The database is used for storing shared data owned by a data sharing party, and the front-end application is used as an intermediary for the database to interact with the outside. The front-end application can specifically perform information interaction with the outside through the SDK and perform information interaction with the database at the same time. The cache database is used for temporarily storing data, and can be specifically MongoDB.
The data application side comprises an application and a blockchain, wherein the application is used for realizing interaction between a user and the blockchain, and the blockchain is used for storing written data.
In the practical application scenario provided by the embodiment of the application, the data sharing party can represent a civil institution, a government institution and the like with certain public credibility, and the data application party can represent users such as common citizens and the like.
The embodiments of the present application will be described in detail with reference to the Ministry of industry and communications as an example. The method comprises the following specific steps:
s201: and sending a data query request.
In the embodiment of the application, the industry department can collect the product data of all industrial products and store the product data in the database. Therefore, the user can scan information such as two-dimensional codes provided by a manufacturer on products through an application, an applet and the like installed on the terminal, and send a data query request to acquire related product data. The information such as the two-dimensional code provided by the manufacturer can be associated with the database of the Ministry of industry and information.
S202: and querying in the block chain according to the product identification.
In the embodiment of the present application, the two-dimensional code provided by the manufacturer may include a product identifier. After the user sends the data query request, the application may first query in the block chain according to the product identifier to determine whether a matching product identifier exists in the block chain.
If the matched product identification does not exist, the information that the product data does not exist can be prompted to the user. If there is a matching product identification, a data query request may be sent to the front-end application of the department of industry.
S203: and inquiring product data according to the product identification.
S204: and returning the product data.
After receiving the data query request, the front-end application of the work and mail department can be called through the SDK according to the product identification carried in the data query request, and corresponding product data are queried and obtained from the database.
The front-end application of the department of industry and trust may then return the queried product data to the application.
S205: and hashing the product data, and comparing the product data with a hash value prestored in the block chain.
After the application receives the product data, the same hash algorithm can be adopted to hash the product data to obtain a corresponding hash value. The application may compare the obtained hash value with a hash value pre-stored in the blockchain.
S206: and displaying to the user.
S207: and (6) prompting risks.
If the hash value obtained by the application is consistent with the hash value pre-stored in the block chain, the application can display the corresponding product data to the user. If the hash value obtained by the application is inconsistent with the hash value pre-stored in the block chain, the application can send risk prompt information to the front-end application of the work and credit department so that the work and credit department can know the risk prompt information.
It should be noted that what is shown in fig. 2 and fig. 3 is a practical application scenario based on fig. 1. The details are not detailed in the related description of fig. 2 and fig. 3, and the related description of fig. 1 may be specifically referred to.
Based on the same idea, some embodiments of the present application further provide a device and a non-volatile computer storage medium corresponding to the above method.
Fig. 4 is a schematic structural diagram of an apparatus for securely sharing data based on a blockchain according to an embodiment of the present application, where the blockchain apparatus includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
Some embodiments of the present application provide a non-volatile computer storage medium corresponding to a blockchain-based secure sharing of data of fig. 1, having stored thereon computer-executable instructions configured to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A safe data sharing method based on a block chain is characterized by comprising the following steps:
the data application side sends a data query request to the data sharing side;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
2. The method of claim 1, wherein prior to sending the data query request to the data sharer, the method further comprises:
determining a data identifier of data to be queried;
and determining whether a data identifier matched with the data identifier of the data to be inquired exists in the data identifiers of the shared data prestored in the block chain.
3. The method of claim 1, wherein the method further comprises:
and returning feedback information based on the security of the shared data to the data sharing party according to the verification result.
4. A safe data sharing method based on a block chain is characterized by comprising the following steps:
the data sharing party hashes the shared data by adopting a hash algorithm and writes the obtained hash value into the block chain;
receiving a data query request of a data application party;
determining shared data corresponding to the data query request from a database;
and returning the shared data to the data application party, so that the data application party carries out security verification on the shared data according to the hash value in the block chain.
5. The method of claim 4, wherein hashing the shared data using a hashing algorithm comprises:
monitoring data updating in a database;
and when the data updating is monitored, determining to adopt a hash algorithm to hash the updated shared data.
6. The method of claim 4, wherein the method further comprises:
and generating a digital object unique identifier based on the shared data, and enabling the data application party to inquire the shared data according to the data object unique identifier.
7. The method of claim 4, wherein the method further comprises:
and storing the data query request of the data application party.
8. The method of claim 7, wherein the data sharer comprises a front-end application;
the method further comprises the following steps:
and writing data into the block chain through the front-end application, and caching the data query request of the data application party.
9. An apparatus for secure sharing of data based on blockchains, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
10. A non-transitory computer storage medium for secure sharing of data based on blockchains, the computer storage medium having stored thereon computer-executable instructions configured to:
sending a data query request to a data sharing party;
according to the shared data corresponding to the received data query request, carrying out hash on the shared data by adopting a hash algorithm;
and matching the obtained hash value with a hash value written into a block chain in advance by a data sharing party so as to carry out security verification on the shared data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911396956.7A CN111224786A (en) | 2019-12-30 | 2019-12-30 | Block chain-based data security sharing method, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911396956.7A CN111224786A (en) | 2019-12-30 | 2019-12-30 | Block chain-based data security sharing method, device and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111224786A true CN111224786A (en) | 2020-06-02 |
Family
ID=70832312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911396956.7A Pending CN111224786A (en) | 2019-12-30 | 2019-12-30 | Block chain-based data security sharing method, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111224786A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111683082A (en) * | 2020-06-04 | 2020-09-18 | 杭州溪塔科技有限公司 | Data sharing method and system based on block chain and electronic equipment |
CN111858769A (en) * | 2020-07-28 | 2020-10-30 | 北京金山云网络技术有限公司 | Data using method, device, node equipment and storage medium |
CN112039891A (en) * | 2020-08-31 | 2020-12-04 | 深圳前海微众银行股份有限公司 | Method and device for sharing abnormal data by block chain |
CN112395353A (en) * | 2020-10-27 | 2021-02-23 | 中国电力科学研究院有限公司 | Intelligent electric energy meter quality data sharing method and system based on alliance chain |
CN112767110A (en) * | 2021-01-20 | 2021-05-07 | 中国工商银行股份有限公司 | Big data scattered cochain method and system |
CN112905553A (en) * | 2021-02-07 | 2021-06-04 | 全链通有限公司 | Data sharing method, device and system based on block chain |
CN113364754A (en) * | 2021-05-31 | 2021-09-07 | 支付宝(杭州)信息技术有限公司 | Data sharing method, device and equipment |
CN113411321A (en) * | 2021-06-15 | 2021-09-17 | 国网电子商务有限公司 | Block chain-based electricity consumption data acquisition method and system |
CN113449296A (en) * | 2021-07-20 | 2021-09-28 | 恒安嘉新(北京)科技股份公司 | System, method, apparatus, and medium for data security protection |
CN113656365A (en) * | 2021-07-28 | 2021-11-16 | 熵链科技(福建)有限公司 | Data sharing method and system based on block chain |
CN115242529A (en) * | 2022-07-26 | 2022-10-25 | 国网智能电网研究院有限公司 | Data security sharing system |
CN116686512A (en) * | 2023-08-01 | 2023-09-05 | 布比(北京)网络技术有限公司 | Crop production management method, device, storage medium and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175436A (en) * | 2019-05-16 | 2019-08-27 | 中细软集团有限公司 | The generation of block chain digital certificate, verification method, computer equipment and storage medium |
CN110222080A (en) * | 2019-06-18 | 2019-09-10 | 北京艾摩瑞策科技有限公司 | Pass through the shared economic data querying method and its device of block chain |
CN110362571A (en) * | 2019-06-25 | 2019-10-22 | 智链万源(北京)数字科技有限公司 | Data safety retroactive method and device based on block chain |
-
2019
- 2019-12-30 CN CN201911396956.7A patent/CN111224786A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175436A (en) * | 2019-05-16 | 2019-08-27 | 中细软集团有限公司 | The generation of block chain digital certificate, verification method, computer equipment and storage medium |
CN110222080A (en) * | 2019-06-18 | 2019-09-10 | 北京艾摩瑞策科技有限公司 | Pass through the shared economic data querying method and its device of block chain |
CN110362571A (en) * | 2019-06-25 | 2019-10-22 | 智链万源(北京)数字科技有限公司 | Data safety retroactive method and device based on block chain |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111683082A (en) * | 2020-06-04 | 2020-09-18 | 杭州溪塔科技有限公司 | Data sharing method and system based on block chain and electronic equipment |
CN111858769A (en) * | 2020-07-28 | 2020-10-30 | 北京金山云网络技术有限公司 | Data using method, device, node equipment and storage medium |
CN111858769B (en) * | 2020-07-28 | 2024-05-03 | 北京金山云网络技术有限公司 | Data use method, device, node equipment and storage medium |
CN112039891A (en) * | 2020-08-31 | 2020-12-04 | 深圳前海微众银行股份有限公司 | Method and device for sharing abnormal data by block chain |
CN112039891B (en) * | 2020-08-31 | 2024-04-09 | 深圳前海微众银行股份有限公司 | Method and device for sharing abnormal data by block chain |
CN112395353A (en) * | 2020-10-27 | 2021-02-23 | 中国电力科学研究院有限公司 | Intelligent electric energy meter quality data sharing method and system based on alliance chain |
CN112767110A (en) * | 2021-01-20 | 2021-05-07 | 中国工商银行股份有限公司 | Big data scattered cochain method and system |
CN112905553A (en) * | 2021-02-07 | 2021-06-04 | 全链通有限公司 | Data sharing method, device and system based on block chain |
CN113364754B (en) * | 2021-05-31 | 2023-10-13 | 支付宝(杭州)信息技术有限公司 | Data sharing method, device and equipment |
CN113364754A (en) * | 2021-05-31 | 2021-09-07 | 支付宝(杭州)信息技术有限公司 | Data sharing method, device and equipment |
CN113411321A (en) * | 2021-06-15 | 2021-09-17 | 国网电子商务有限公司 | Block chain-based electricity consumption data acquisition method and system |
CN113449296A (en) * | 2021-07-20 | 2021-09-28 | 恒安嘉新(北京)科技股份公司 | System, method, apparatus, and medium for data security protection |
CN113449296B (en) * | 2021-07-20 | 2024-04-23 | 恒安嘉新(北京)科技股份公司 | System, method, device and medium for data security protection |
CN113656365A (en) * | 2021-07-28 | 2021-11-16 | 熵链科技(福建)有限公司 | Data sharing method and system based on block chain |
CN113656365B (en) * | 2021-07-28 | 2024-05-17 | 熵链科技(福建)有限公司 | Block chain-based data sharing method and system |
CN115242529A (en) * | 2022-07-26 | 2022-10-25 | 国网智能电网研究院有限公司 | Data security sharing system |
CN116686512A (en) * | 2023-08-01 | 2023-09-05 | 布比(北京)网络技术有限公司 | Crop production management method, device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111224786A (en) | Block chain-based data security sharing method, device and medium | |
CN111935075B (en) | Digital identity issuing method, device and medium based on blockchain | |
CN110910138B (en) | Block chain data supervision method and device | |
CN106991334B (en) | Data access method, system and device | |
CN107342867B (en) | Signature verification method and device | |
CN110163006B (en) | Signature verification method, system, device and equipment in block chain type account book | |
CN111062715B (en) | Method, device and equipment for code scanning payment, information sending and collection code generation | |
CN109271798A (en) | Sensitive data processing method and system | |
CN111814196B (en) | Data processing method, device and equipment | |
CN111241569A (en) | Information processing method, device and equipment | |
CN110474775B (en) | User creating method, device and equipment in block chain type account book | |
CN107066346B (en) | Data backup method, data recovery method and device | |
CN108833133B (en) | Network configuration management method and device based on cloud computing network and storage medium | |
CN114826661A (en) | Data access method, device and medium based on open API | |
CN110995419A (en) | Symmetric encryption and decryption method, device and medium based on data on link | |
CN111228819B (en) | Method, device and equipment for protecting Shader | |
CN114266680A (en) | Block chain-based electronic contract signing method, device and system | |
CN113342802A (en) | Method and device for storing block chain data | |
CN111737747A (en) | Database security method, device, equipment and computer storage medium | |
CN115208630A (en) | Block chain based data acquisition method and system and block chain system | |
CN111292082B (en) | Public key management method, device and equipment in block chain type account book | |
CN114511431A (en) | Service processing method, device and medium based on block chain | |
CN116432199B (en) | Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment | |
CN108777630B (en) | Anti-repudiation method and device based on cloud computing network and readable storage medium | |
CN113222685B (en) | Order verification method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200731 Address after: Floor S01, Inspur Science Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province Applicant after: Inspur cloud Information Technology Co.,Ltd. Address before: Room 3110, S01 building, Langchao building, No. 1036, Langchao Road, high tech Zone, Jinan City, Shandong Province 250101 Applicant before: Shandong Aicheng Network Information Technology Co.,Ltd. |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |