CN111259410A - Block chain private data management method - Google Patents

Block chain private data management method Download PDF

Info

Publication number
CN111259410A
CN111259410A CN202010020154.2A CN202010020154A CN111259410A CN 111259410 A CN111259410 A CN 111259410A CN 202010020154 A CN202010020154 A CN 202010020154A CN 111259410 A CN111259410 A CN 111259410A
Authority
CN
China
Prior art keywords
data
record
intelligent contract
symmetric key
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010020154.2A
Other languages
Chinese (zh)
Inventor
黄皓桦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010020154.2A priority Critical patent/CN111259410A/en
Publication of CN111259410A publication Critical patent/CN111259410A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain private data management method, belongs to the technical field of block chains, and aims to solve the problems that a traditional computer architecture has throughput and deployment difficulties for the application of the block chains, a traditional data acquisition mode based on cloud service cannot be realized on the block chains, and the rights and interests of data owners are easily infringed; the method comprises the steps of 1) generating a record, 2) accessing a record request, and 3) accessing a record permission revocation; the invention realizes the practical management of high throughput and encrypted data based on the block chain low throughput computer architecture and the public characteristic of data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.

Description

Block chain private data management method
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain private data management method.
Background
In blockchain applications, whether public, private, or federated, the public attribute is the public nature of the data. The data can be obtained and detected by anyone on the chain in some technical way. The privacy of the data owner is vulnerable to violation. The traditional computer architecture has difficulty in throughput and deployment for blockchain applications and the traditional data acquisition manner based on cloud services cannot be realized on blockchains, so that effective management of blockchain private data is required.
Disclosure of Invention
In view of the technical deficiencies, the invention aims to provide a block chain private data management method, which realizes the practical management of high throughput and encrypted data based on the low throughput computer architecture of the block chain and the public characteristics of the data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
In order to solve the technical problems, the invention adopts the following technical scheme:
the block chain private data management method is characterized by comprising the following steps:
1) generating records
a. The data owner generates a binary data record;
b. the data owner carries out hash operation on the binary data record obtained in the step 1) -a to obtain data record hash;
c. the data owner generates a new data symmetric key;
d. the data owner encrypts the binary data record obtained in the step 1) -a by using the data symmetric key obtained in the step 1) -c to obtain encrypted binary data;
e. the data owner stores the data record Hash obtained in 1) -b and the binary data obtained in 1) -d as a data pair into an intelligent contract;
2) accessing record requests
a. The data requester generates a public key and private key pair;
b. the data requester searches records from the intelligent contract according to the keywords and simultaneously sends the public key obtained in the step 2) -a to the intelligent contract;
c. the intelligent contract returns to the recording list;
d. the intelligent contract encrypts the data symmetric key obtained in 1) -c by using the public key obtained in 2) -a and stores the encrypted data symmetric key into the intelligent contract;
e. the data accessor obtains a record list;
f. the data accessor obtains an encrypted symmetric key by taking the public key obtained from the intelligent contract 2) -a as an index;
g. the data visitor decrypts the data in 2) -f by using the private key to obtain a symmetric key;
h. the data accessor reads the encrypted data from the intelligent contract and decrypts the encrypted data by using the symmetric key obtained from the step 2) to the step g to obtain the binary data record in the step 1) to the step a;
3) access record rights revocation
a. The data owner generates a new data symmetric key;
b. the data owner re-encrypts the binary data record obtained in 1) -a with the new data symmetric key,
obtaining new encrypted data;
c. the data owner stores the encrypted data obtained in 3) -b into the intelligent contract by the same data hash value as that of 1) -b, and original data in 1) -d are covered;
d. the data owner updates the current symmetric key of the smart contract.
The invention has the beneficial effects that: the invention realizes the practical management of high throughput and encrypted data based on the block chain low throughput computer architecture and the public characteristic of data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the following embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A block chain private data management method is applied to block chain data management of data disclosure on a terminal, and comprises the following steps:
1) generating records
a. The data owner generates a binary data record;
b. the data owner carries out hash operation on the binary data record obtained in the step 1) -a to obtain data record hash;
c. the data owner generates a new data symmetric key;
d. the data owner encrypts the binary data record obtained in the step 1) -a by using the data symmetric key obtained in the step 1) -c to obtain encrypted binary data;
e. the data owner stores the data record Hash obtained in 1) -b and the binary data obtained in 1) -d as a data pair into an intelligent contract;
2) accessing record requests
a. The data requester generates a public key and private key pair;
b. the data requester searches records from the intelligent contract according to the keywords and simultaneously sends the public key obtained in the step 2) -a to the intelligent contract;
c. the intelligent contract returns to the recording list;
d. the intelligent contract encrypts the data symmetric key obtained in 1) -c by using the public key obtained in 2) -a and stores the encrypted data symmetric key into the intelligent contract;
e. the data accessor obtains a record list;
f. the data accessor obtains an encrypted symmetric key by taking the public key obtained from the intelligent contract 2) -a as an index;
g. the data visitor decrypts the data in 2) -f by using the private key to obtain a symmetric key;
h. the data accessor reads the encrypted data from the intelligent contract and decrypts the encrypted data by using the symmetric key obtained from the step 2) to the step g to obtain the binary data record in the step 1) to the step a;
3) access record rights revocation
a. The data owner generates a new data symmetric key;
b. the data owner re-encrypts the binary data record obtained in 1) -a with the new data symmetric key,
obtaining new encrypted data;
c. the data owner stores the encrypted data obtained in 3) -b into the intelligent contract by the same data hash value as that of 1) -b, and original data in 1) -d are covered;
d. the data owner updates the current symmetric key of the intelligent contract; the access of the data visitor can be invalid, and the data symmetric key needs to be applied again.
The invention realizes the practical management of high throughput and encrypted data based on the block chain low throughput computer architecture and the public characteristic of data. This architecture manages and authorizes its own data by the data owner. The method not only meets the decentralized characteristic of the block chain and fully utilizes the advantages of the block chain, but also standardizes the performance and safety of data encryption, so that the deployment and application of the block chain in the actual industry become feasible.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (1)

1. The block chain private data management method is characterized by comprising the following steps:
1) generating records
a. The data owner generates a binary data record;
b. the data owner carries out hash operation on the binary data record obtained in the step 1) -a to obtain data record hash;
c. the data owner generates a new data symmetric key;
d. the data owner encrypts the binary data record obtained in the step 1) -a by using the data symmetric key obtained in the step 1) -c to obtain encrypted binary data;
e. the data owner stores the data record Hash obtained in 1) -b and the binary data obtained in 1) -d as a data pair into an intelligent contract;
2) accessing record requests
a. The data requester generates a public key and private key pair;
b. the data requester searches records from the intelligent contract according to the keywords and simultaneously sends the public key obtained in the step 2) -a to the intelligent contract;
c. the intelligent contract returns to the recording list;
d. the intelligent contract encrypts the data symmetric key obtained in 1) -c by using the public key obtained in 2) -a and stores the encrypted data symmetric key into the intelligent contract;
e. the data accessor obtains a record list;
f. the data accessor obtains an encrypted symmetric key by taking the public key obtained from the intelligent contract 2) -a as an index;
g. the data visitor decrypts the data in 2) -f by using the private key to obtain a symmetric key;
h. the data accessor reads the encrypted data from the intelligent contract and decrypts the encrypted data by using the symmetric key obtained from the step 2) to the step g to obtain the binary data record in the step 1) to the step a;
3) access record rights revocation
a. The data owner generates a new data symmetric key;
b. the data owner re-encrypts the binary data record obtained in the step 1) -a by using a new data symmetric key to obtain new encrypted data;
c. the data owner stores the encrypted data obtained in 3) -b into the intelligent contract by the same data hash value as that of 1) -b, and original data in 1) -d are covered;
d. the data owner updates the current symmetric key of the smart contract.
CN202010020154.2A 2020-01-09 2020-01-09 Block chain private data management method Pending CN111259410A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010020154.2A CN111259410A (en) 2020-01-09 2020-01-09 Block chain private data management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010020154.2A CN111259410A (en) 2020-01-09 2020-01-09 Block chain private data management method

Publications (1)

Publication Number Publication Date
CN111259410A true CN111259410A (en) 2020-06-09

Family

ID=70946910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010020154.2A Pending CN111259410A (en) 2020-01-09 2020-01-09 Block chain private data management method

Country Status (1)

Country Link
CN (1) CN111259410A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618728A (en) * 2013-12-04 2014-03-05 南京邮电大学 Attribute-based encryption method for multiple authority centers
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
CN108881160A (en) * 2018-05-07 2018-11-23 北京信任度科技有限公司 Medical treatment & health data managing method and system based on block chain intelligence contract
CN108900533A (en) * 2018-08-01 2018-11-27 南京荣链科技有限公司 A kind of shared data method for secret protection, system, terminal and medium
CN109559124A (en) * 2018-12-17 2019-04-02 重庆大学 A kind of cloud data safety sharing method based on block chain
CN109660485A (en) * 2017-10-10 2019-04-19 中兴通讯股份有限公司 A kind of authority control method and system based on the transaction of block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618728A (en) * 2013-12-04 2014-03-05 南京邮电大学 Attribute-based encryption method for multiple authority centers
CN109660485A (en) * 2017-10-10 2019-04-19 中兴通讯股份有限公司 A kind of authority control method and system based on the transaction of block chain
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
CN108881160A (en) * 2018-05-07 2018-11-23 北京信任度科技有限公司 Medical treatment & health data managing method and system based on block chain intelligence contract
CN108900533A (en) * 2018-08-01 2018-11-27 南京荣链科技有限公司 A kind of shared data method for secret protection, system, terminal and medium
CN109559124A (en) * 2018-12-17 2019-04-02 重庆大学 A kind of cloud data safety sharing method based on block chain

Similar Documents

Publication Publication Date Title
Shi et al. A blockchain-empowered AAA scheme in the large-scale HetNet
CN108830601B (en) Smart city information safe use method and system based on block chain
US20060236104A1 (en) Method and apparatus for encrypting and decrypting data in a database table
CN104009987B (en) Fine-grained cloud platform security access control method based on user identity capacity
CN111008855B (en) Retrospective data access control method based on improved proxy re-encryption
CN111245861B (en) Power data storage and sharing method
CN104216907A (en) Method, device and system for providing database access control
CN111858519B (en) System and method for sharing confidential data on blockchain
CN102034036A (en) Permission management method and equipment
CN114944963B (en) Government affair data opening method and system
CN111885153B (en) Block chain-based data acquisition method, device, computer equipment and storage medium
CN110298193B (en) Information sharing system and method based on block chain
CN114329512A (en) Encrypted data asset right confirming, managing and using method and device based on block chain
CN111932263A (en) Data management method, device and equipment
Papadopoulos et al. Separating authentication from query execution in outsourced databases
CN111259410A (en) Block chain private data management method
CN111177747B (en) Block chain-based social network privacy data protection method
Asonov et al. Repudiative information retrieval
CN110543774A (en) XML (extensive Makeup language) file private data protection method and system in cloud environment
Li et al. A Traceable Capability-based Access Control for IoT.
Alomari et al. SecloudDB: A unified API for secure SQL and NoSQL cloud databases
US10263970B1 (en) System, method and architecture for secure sharing of customer intelligence
Panda et al. Securing database integrity in intelligent government systems that employ fog computing technology
CN117034213B (en) Method for encryption protection of NFT (network File transfer) of digital work
Yang et al. Research on the ranked searchable encryption scheme based on an access Tree in IoTs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609