CN111259410A - Block chain private data management method - Google Patents
Block chain private data management method Download PDFInfo
- Publication number
- CN111259410A CN111259410A CN202010020154.2A CN202010020154A CN111259410A CN 111259410 A CN111259410 A CN 111259410A CN 202010020154 A CN202010020154 A CN 202010020154A CN 111259410 A CN111259410 A CN 111259410A
- Authority
- CN
- China
- Prior art keywords
- data
- record
- intelligent contract
- symmetric key
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a block chain private data management method, belongs to the technical field of block chains, and aims to solve the problems that a traditional computer architecture has throughput and deployment difficulties for the application of the block chains, a traditional data acquisition mode based on cloud service cannot be realized on the block chains, and the rights and interests of data owners are easily infringed; the method comprises the steps of 1) generating a record, 2) accessing a record request, and 3) accessing a record permission revocation; the invention realizes the practical management of high throughput and encrypted data based on the block chain low throughput computer architecture and the public characteristic of data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain private data management method.
Background
In blockchain applications, whether public, private, or federated, the public attribute is the public nature of the data. The data can be obtained and detected by anyone on the chain in some technical way. The privacy of the data owner is vulnerable to violation. The traditional computer architecture has difficulty in throughput and deployment for blockchain applications and the traditional data acquisition manner based on cloud services cannot be realized on blockchains, so that effective management of blockchain private data is required.
Disclosure of Invention
In view of the technical deficiencies, the invention aims to provide a block chain private data management method, which realizes the practical management of high throughput and encrypted data based on the low throughput computer architecture of the block chain and the public characteristics of the data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
In order to solve the technical problems, the invention adopts the following technical scheme:
the block chain private data management method is characterized by comprising the following steps:
1) generating records
a. The data owner generates a binary data record;
b. the data owner carries out hash operation on the binary data record obtained in the step 1) -a to obtain data record hash;
c. the data owner generates a new data symmetric key;
d. the data owner encrypts the binary data record obtained in the step 1) -a by using the data symmetric key obtained in the step 1) -c to obtain encrypted binary data;
e. the data owner stores the data record Hash obtained in 1) -b and the binary data obtained in 1) -d as a data pair into an intelligent contract;
2) accessing record requests
a. The data requester generates a public key and private key pair;
b. the data requester searches records from the intelligent contract according to the keywords and simultaneously sends the public key obtained in the step 2) -a to the intelligent contract;
c. the intelligent contract returns to the recording list;
d. the intelligent contract encrypts the data symmetric key obtained in 1) -c by using the public key obtained in 2) -a and stores the encrypted data symmetric key into the intelligent contract;
e. the data accessor obtains a record list;
f. the data accessor obtains an encrypted symmetric key by taking the public key obtained from the intelligent contract 2) -a as an index;
g. the data visitor decrypts the data in 2) -f by using the private key to obtain a symmetric key;
h. the data accessor reads the encrypted data from the intelligent contract and decrypts the encrypted data by using the symmetric key obtained from the step 2) to the step g to obtain the binary data record in the step 1) to the step a;
3) access record rights revocation
a. The data owner generates a new data symmetric key;
b. the data owner re-encrypts the binary data record obtained in 1) -a with the new data symmetric key,
obtaining new encrypted data;
c. the data owner stores the encrypted data obtained in 3) -b into the intelligent contract by the same data hash value as that of 1) -b, and original data in 1) -d are covered;
d. the data owner updates the current symmetric key of the smart contract.
The invention has the beneficial effects that: the invention realizes the practical management of high throughput and encrypted data based on the block chain low throughput computer architecture and the public characteristic of data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the following embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A block chain private data management method is applied to block chain data management of data disclosure on a terminal, and comprises the following steps:
1) generating records
a. The data owner generates a binary data record;
b. the data owner carries out hash operation on the binary data record obtained in the step 1) -a to obtain data record hash;
c. the data owner generates a new data symmetric key;
d. the data owner encrypts the binary data record obtained in the step 1) -a by using the data symmetric key obtained in the step 1) -c to obtain encrypted binary data;
e. the data owner stores the data record Hash obtained in 1) -b and the binary data obtained in 1) -d as a data pair into an intelligent contract;
2) accessing record requests
a. The data requester generates a public key and private key pair;
b. the data requester searches records from the intelligent contract according to the keywords and simultaneously sends the public key obtained in the step 2) -a to the intelligent contract;
c. the intelligent contract returns to the recording list;
d. the intelligent contract encrypts the data symmetric key obtained in 1) -c by using the public key obtained in 2) -a and stores the encrypted data symmetric key into the intelligent contract;
e. the data accessor obtains a record list;
f. the data accessor obtains an encrypted symmetric key by taking the public key obtained from the intelligent contract 2) -a as an index;
g. the data visitor decrypts the data in 2) -f by using the private key to obtain a symmetric key;
h. the data accessor reads the encrypted data from the intelligent contract and decrypts the encrypted data by using the symmetric key obtained from the step 2) to the step g to obtain the binary data record in the step 1) to the step a;
3) access record rights revocation
a. The data owner generates a new data symmetric key;
b. the data owner re-encrypts the binary data record obtained in 1) -a with the new data symmetric key,
obtaining new encrypted data;
c. the data owner stores the encrypted data obtained in 3) -b into the intelligent contract by the same data hash value as that of 1) -b, and original data in 1) -d are covered;
d. the data owner updates the current symmetric key of the intelligent contract; the access of the data visitor can be invalid, and the data symmetric key needs to be applied again.
The invention realizes the practical management of high throughput and encrypted data based on the block chain low throughput computer architecture and the public characteristic of data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (1)
1. The block chain private data management method is characterized by comprising the following steps:
1) generating records
a. The data owner generates a binary data record;
b. the data owner carries out hash operation on the binary data record obtained in the step 1) -a to obtain data record hash;
c. the data owner generates a new data symmetric key;
d. the data owner encrypts the binary data record obtained in the step 1) -a by using the data symmetric key obtained in the step 1) -c to obtain encrypted binary data;
e. the data owner stores the data record Hash obtained in 1) -b and the binary data obtained in 1) -d as a data pair into an intelligent contract;
2) accessing record requests
a. The data requester generates a public key and private key pair;
b. the data requester searches records from the intelligent contract according to the keywords and simultaneously sends the public key obtained in the step 2) -a to the intelligent contract;
c. the intelligent contract returns to the recording list;
d. the intelligent contract encrypts the data symmetric key obtained in 1) -c by using the public key obtained in 2) -a and stores the encrypted data symmetric key into the intelligent contract;
e. the data accessor obtains a record list;
f. the data accessor obtains an encrypted symmetric key by taking the public key obtained from the intelligent contract 2) -a as an index;
g. the data visitor decrypts the data in 2) -f by using the private key to obtain a symmetric key;
h. the data accessor reads the encrypted data from the intelligent contract and decrypts the encrypted data by using the symmetric key obtained from the step 2) to the step g to obtain the binary data record in the step 1) to the step a;
3) access record rights revocation
a. The data owner generates a new data symmetric key;
b. the data owner re-encrypts the binary data record obtained in the step 1) -a by using a new data symmetric key to obtain new encrypted data;
c. the data owner stores the encrypted data obtained in 3) -b into the intelligent contract by the same data hash value as that of 1) -b, and original data in 1) -d are covered;
d. the data owner updates the current symmetric key of the smart contract.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010020154.2A CN111259410A (en) | 2020-01-09 | 2020-01-09 | Block chain private data management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010020154.2A CN111259410A (en) | 2020-01-09 | 2020-01-09 | Block chain private data management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111259410A true CN111259410A (en) | 2020-06-09 |
Family
ID=70946910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010020154.2A Pending CN111259410A (en) | 2020-01-09 | 2020-01-09 | Block chain private data management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111259410A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618728A (en) * | 2013-12-04 | 2014-03-05 | 南京邮电大学 | Attribute-based encryption method for multiple authority centers |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
CN108881160A (en) * | 2018-05-07 | 2018-11-23 | 北京信任度科技有限公司 | Medical treatment & health data managing method and system based on block chain intelligence contract |
CN108900533A (en) * | 2018-08-01 | 2018-11-27 | 南京荣链科技有限公司 | A kind of shared data method for secret protection, system, terminal and medium |
CN109559124A (en) * | 2018-12-17 | 2019-04-02 | 重庆大学 | A kind of cloud data safety sharing method based on block chain |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
-
2020
- 2020-01-09 CN CN202010020154.2A patent/CN111259410A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618728A (en) * | 2013-12-04 | 2014-03-05 | 南京邮电大学 | Attribute-based encryption method for multiple authority centers |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
CN108881160A (en) * | 2018-05-07 | 2018-11-23 | 北京信任度科技有限公司 | Medical treatment & health data managing method and system based on block chain intelligence contract |
CN108900533A (en) * | 2018-08-01 | 2018-11-27 | 南京荣链科技有限公司 | A kind of shared data method for secret protection, system, terminal and medium |
CN109559124A (en) * | 2018-12-17 | 2019-04-02 | 重庆大学 | A kind of cloud data safety sharing method based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shi et al. | A blockchain-empowered AAA scheme in the large-scale HetNet | |
CN108830601B (en) | Smart city information safe use method and system based on block chain | |
US20060236104A1 (en) | Method and apparatus for encrypting and decrypting data in a database table | |
CN104009987B (en) | Fine-grained cloud platform security access control method based on user identity capacity | |
CN111008855B (en) | Retrospective data access control method based on improved proxy re-encryption | |
CN111245861B (en) | Power data storage and sharing method | |
CN104216907A (en) | Method, device and system for providing database access control | |
CN111858519B (en) | System and method for sharing confidential data on blockchain | |
CN102034036A (en) | Permission management method and equipment | |
CN114944963B (en) | Government affair data opening method and system | |
CN111885153B (en) | Block chain-based data acquisition method, device, computer equipment and storage medium | |
CN110298193B (en) | Information sharing system and method based on block chain | |
CN114329512A (en) | Encrypted data asset right confirming, managing and using method and device based on block chain | |
CN111932263A (en) | Data management method, device and equipment | |
Papadopoulos et al. | Separating authentication from query execution in outsourced databases | |
CN111259410A (en) | Block chain private data management method | |
CN111177747B (en) | Block chain-based social network privacy data protection method | |
Asonov et al. | Repudiative information retrieval | |
CN110543774A (en) | XML (extensive Makeup language) file private data protection method and system in cloud environment | |
Li et al. | A Traceable Capability-based Access Control for IoT. | |
Alomari et al. | SecloudDB: A unified API for secure SQL and NoSQL cloud databases | |
US10263970B1 (en) | System, method and architecture for secure sharing of customer intelligence | |
Panda et al. | Securing database integrity in intelligent government systems that employ fog computing technology | |
CN117034213B (en) | Method for encryption protection of NFT (network File transfer) of digital work | |
Yang et al. | Research on the ranked searchable encryption scheme based on an access Tree in IoTs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200609 |