CN111897874A - Data security exchange and operation method based on hybrid chain - Google Patents
Data security exchange and operation method based on hybrid chain Download PDFInfo
- Publication number
- CN111897874A CN111897874A CN202010730721.3A CN202010730721A CN111897874A CN 111897874 A CN111897874 A CN 111897874A CN 202010730721 A CN202010730721 A CN 202010730721A CN 111897874 A CN111897874 A CN 111897874A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- contract
- result
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a data security exchange and operation method based on a hybrid chain. Sending a data calling request, triggering the hash writing block chain of the intelligent contract computing request by the node receiving the request, and distributing the hash writing block chain as a task to other nodes; the received node acquires an operation contract according to the task and verifies the correctness, and a result is obtained by using local data and the operation contract; the hash value of the data in the node calculation operation process is written into the block chain, and the result data is returned to the node distributing the task; comparing and verifying the nodes of the distributed tasks to return results; and obtaining a final result by the returned result and the local data after the result is determined to be reasonable, writing the hash value of the data in the calculation process into the block chain, and returning the final result to the user. The invention realizes the multi-party data secure exchange by the block chain technology, and the data task is distributed to a plurality of participants, so that the final result of the data can be safely obtained.
Description
Technical Field
The invention relates to a data processing and exchanging method in a block chain, in particular to a data security exchanging and computing method based on a mixed chain.
Background
With the development of science and technology, the data volume is exponentially increased, so that governments, enterprises and other subjects master a large amount of data resources, but due to the lack of a safe and reliable data sharing and exchanging cooperation mechanism, the data islanding phenomenon is obvious. Conventionally, in order to realize data sharing and exchange, a direct data centralization and processing mode is adopted, and data of multiple parties are directly called and collected in local for centralized storage.
Meanwhile, many private data cannot be exported to a private domain, and data sharing and exchange cannot be realized by directly adopting a method of calling source data, so that data in a large range is still in an unutilized state. In order to fully exert the data value and realize the safe circulation and use of the data, the data needs to be reasonably and safely used under the authorized condition, and the data flow direction and the use process need to be tracked in real time to ensure the authenticity and the safety of the data.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a data security exchange and operation method based on a hybrid chain, which aims to perform data fusion and use in an intelligent and secure mode and fully perform data security exchange and operation on the premise of ensuring data privacy security and ownership.
The technical scheme adopted by the invention is as follows:
A) a user sends a data call request, a node receiving the data call request is used as an initial node, the initial node triggers intelligent contract to calculate the hash of the data call request and writes the hash into a block chain where the hash is located, and then the data call request is used as a task to be distributed to other nodes in a hybrid chain;
B) the method comprises the steps that a node receiving a task obtains an operation contract from a hybrid chain operation contract library, hash of a source code of the operation contract is verified on a chain, after the correctness of the operation contract is verified, corresponding local data operation contracts are called according to a data calling request to obtain result data, then the node receiving the task calculates a common hash value of input data, the operation contract, the result data, operation starting time and operation ending time, the common hash value is written into a block chain network where the node is located, and the result data are returned to an initial node distributing the task;
C) the node of the distribution task receives result data returned by the node operation of the received task in the mixed chain, compares all the returned result data and determines the rationality of the result data;
D) after the reasonability of the returned result is determined, the node receiving the data calling request calculates a final result according to the local data, the returned result and the operation contract, calculates the hash value of the input data, the operation contract, the result data, the operation starting time and the operation ending time, writes the hash value into a block chain network where the node is located, and returns the calculated final result to the user.
The nodes described in the invention are all nodes in a mixed chain.
The step A) specifically comprises the following steps:
A1) a user sends a data calling request, wherein the data calling request comprises data inquiry, collection and calculation, and is selected according to actual needs;
A2) node S in hybrid chain receiving data call requestrCalculating the hash of the data call request, writing the hash into the block chain where the data call request is located, and triggering an intelligent contract to distribute the data call request as a task to other N nodes N required in the hybrid chainxN, x represents the ordinal number of a node, and n represents the total number of nodes needing to receive a data call request in a mixed chain;
the hybrid chain is a block chain of various types in the whole block chain network, including a alliance chain, a private chain, a public chain and the like, and a user sends a data call request to a block chain node which accepts the request in the hybrid chain.
The step B) specifically comprises the following steps:
B1) node N receiving taskxAcquiring an operation contract C from a code server where a mixed chain operation contract base is located according to a taskxAnd calculating a calculation contract CxHash of the source code of (1);
B2) comparing the calculated source code hash with the original source code hash on the hybrid chain for verification, and verifying the operation contractRunning a calculation contract C after correctnessxCalling local Data matched with the Data call request as input Data(in,x)According to a calculation contract CxCalculating the result Data required by the task(out,x),
B3) Node N receiving taskxCalculating the input Data(in,x)And calculating a contract CxData of the result Data(out,x)Operation start Time(start,x)Sum operation end Time(end,x)Common hash value ofxAnd the common hash value HxWrite node NxThe block chain in which the block chain is located;
Hx=H(Data(in,x),Cx,Data(out,x),Time(start,x),Time(end,x))
wherein H (-) is a secure hash function;
B4) node NxData of the calculated resultoutReturning to the original node S distributing the tasksr。
The step C) specifically comprises the following steps:
initial node SrReceiving other nodes N of the mixed chainxReturned result Data(out,x)Thereafter, all returned result data are compared in the following manner:
if there is a node NxWhen the returned result data has overlarge deviation, the initial node SrTo node N with excessive deviationySending an inspection request m, y belongs to { 1.,. N }, so as to perform local data inspection, and calculating a node N with an overlarge deviation, wherein the hash value of the inspection request m is written into a block chain where the node N is locatedyAfter receiving the inspection request m, it first checks itself to determine the Data of the input Data(in,y)And calculating a contract CyAnd result Data(out,y)The correctness of (2):
if the data and operation mode are judged to have problems, the node N with overlarge deviation existsyUpdating the input Data and the calculation contract, and calculating new result Data 'according to the new calculation contract'(in,y)And returns to the original node SrAnd calculating updated input Data'(in,y)Calculating contract C'yData of the result Data'(out,y)And calculating the start Time Time'(start,y)And calculating the end Time of'(end,y)New common hash value of H'(Data,y)And the new common hash value H'(Data,y)Writing into the block chain:
H'(Data,y)=H(Data'(in,y),C'y,Data'(out,y),Time'(start,y),Time'(end,y))
wherein H (-) is a secure hash function;
if the data and the operation mode are both correct, the node N with excessive deviation existsySending a local Data calling request matched with the Data calling request to a Data owner of the local Data, and inputting the Data after obtaining the authorization w of the Data owner(in,y)And calculating a contract CyAnd result Data(out,y)Packaging and returning to the initial node SrAnd calculating the authorization w and the authorization Time of the data ownerwData of input Data(in,y)And calculating a contract CyAnd result Data(out,y)Write the common hash value of (1) into the blockchain:
Hw=H(w,Data(in,y),Cy,Data(out,y),Timew)
if there is no node N thereinxIf the returned result data has overlarge deviation, all the nodes NxThe result data returned is reasonable.
The step D) specifically comprises the following steps:
D1) initial node SrAnd (3) utilizing the return result to calculate a final result:
if all the nodes N are comparedxIf the returned result data is reasonable, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self resultData(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
wherein H (-) is a secure hash function;
if all the nodes N are comparedxIf the returned result data has large deviation and the judgment data and the operation mode have problems, the node NyTo the initial node SrReturning new result data, the initial node SrInvoking its own computation contract CrAccording to the returned new result Data { Data }(out,1),...,Data'(out,y),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)And calculates the new result Data { Data } returned(out,1),...,Data'(out,y),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)Write to initial node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data'(out,y),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has larger deviation but the judgment data and the operation mode are both correct, thenInitial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
D2) initial node SrFinal self result Data(out,r)And returning and sending to the user.
The invention realizes the multi-party data secure exchange by the block chain technology, and the data task is distributed to a plurality of participants, so that the final result of the data can be safely obtained.
Compared with the prior art, the invention has the beneficial effects that:
(1) the tasks are distributed to the hybrid link network by using the block link technology, and the nodes call local data according to the tasks to calculate and then return results, so that the data ownership and data privacy are ensured, and the data are fully used.
(2) The full-flow record of task initiation, distribution, operation and return is completed through the intelligent contract of the block chain, the use traceability of data use is realized, and the authenticity, the safety and the accuracy of results of the data are ensured.
Drawings
Fig. 1 is a flow chart illustrating a data security exchange and operation method based on a hybrid chain.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, the specific examples and embodiments of the present invention are as follows:
1) the user is an electronic device for inputting instructions. The user needs to obtain the detailed information and sends the data call request to the node SrNode S receiving the requestrIs a block chain B1A node of, node SrHash value write block chain B for calculating data call request1Triggering an intelligent contract to distribute the data calling request to relative nodes in a hybrid chain as data processing tasks according to the content, wherein the number of the nodes related to the current task is N to 5, and the number of the nodes receiving the tasks is Nx1, 5. The node conditions and received information are as follows:
node point | Block chain | Received information |
Sr | Block chain B1 | Data call request |
N1 | Block chain B1 | Data processing task |
N2 | Block chain B2 | Data processing task |
N3 | Block chain B2 | Data processing task |
N4 | Block chain B2 | Data processing task |
N5 | Block chain B3 | Data processing task |
Node Sr、N1、N2、N3、N4And N5Nodes, nodes S, being hybrid chainsrAnd N1In the same block chain network, node N2、N3And N4In the same blockchain network.
2) Node N receiving taskxAcquiring an operation contract from a code server according to the task, wherein x belongs to { 1.,. 5}, and calculating the hash of a source code of the operation contract;
node point | Derived computation contracts | Hash value of a computation contract |
N1 | C1 | H1 |
N2 | C2 | H2 |
N3 | C3 | H3 |
N4 | C4 | H4 |
N5 | C5 | H5 |
Each node NxDifferent working conditions of the system and the method are different, different operation contracts are used during task processing, and hash values corresponding to the operation contracts are different. Comparing the calculated source code hash with the source code hash on the chain for verification, running the operation contract after verifying the correctness of the operation contract, and calling local Data as input Data(in,x)Calculating the result Data required by the task(out,x):
Node point | Operation contract | Inputting data | Outputting the data | Operation start time | End time of operation |
N1 | C1 | Data(in,1) | Data(out,1) | Time(start,1) | Time(end,1) |
N2 | C2 | Data(in,2) | Data(out,2) | Time(start,2) | Time(end,2) |
N3 | C3 | Data(in,3) | Data(out,3) | Time(start,3) | Time(end,3) |
N4 | C4 | Data(in,4) | Data(out,4) | Time(start,4) | Time(end,4) |
N5 | C5 | Data(in,5) | Data(out,5) | Time(start,5) | Time(end,5) |
3) Each node N receiving the taskxRespectively calculate the input Data(in,x)And calculating a contract CxAnd result Data(out,x)Operation start Time(star,tx)Sum operation end Time(end,x)Common hash value ofxAnd the hash value H is added(Data,x)Writing a block chain where the node is located;
H(Data,x)=H(Data(in,x),Cx,Data(out,x),Time(start,x),Time(end,x))
each node NxData of the calculated result(out,x)Returning to the node S which received the data call requestr. The specific information is as follows:
node point | Hash value for data operations | Block chain for Hash writing | Returning results |
N1 | H(Data,1) | Block chain B1 | Data(out,1) |
N2 | H(Data,2) | Block chain B2 | Data(out,2) |
N3 | H(Data,3) | Block chain B2 | Data(out,3) |
N4 | H(Data,4) | Block chain B2 | Data(out,4) |
N5 | H(Data,5) | Block chain B3 | Data(out,5) |
4) Node SrReceiving result Data returned by nodes receiving tasks in a mixed chain(out,x)And then comparing all returned data:
if one of the nodes N is found3And when the returned data has overlarge deviation, applying for local data inspection: node SrSending queryCheck request m to node N with large deviation3And calculating a hash value of the description content and writing the hash value into the block chain. Node N3After receiving the inspection request m, it first checks itself to determine the Data of the input Data(in,3)And calculating a contract C3And result Data(out,3)The correctness of (2):
a) if the data and operation mode are judged to be in problem, the node N3Updating the calculation Data and the calculation contract and recalculating to obtain new result Data'(in,3)Back to node SrAnd calculating updated input Data'(in,3)Calculating contract C'3And result Data of'(out,3)And calculating the start Time Time'(start,3)And calculating the end Time of'(end,3)Of a common hash value of H'(Data,3)The common hash value H'(Data,3)Writing a block chain where the node is located;
H'(Data,3)=H(Data'(in,3),C'3,Data'(out,3),Time'(start,3),Time'(end,3))
b) if the data and operation mode are both correct, the node N3Sending an application for local data invocation corresponding to the data invocation request to the data owner, node N3Although local Data exists and the local Data has authority, the Data is sent to other nodes to obtain the authority of the Data owner without the authority, and the Data is input after the authority w of the Data owner is obtained(in,3)And calculating a contract C3And result Data(out,3)Back to node SrAnd calculating the authorization w and the authorization Time of the data ownerwData of input Data(in,3)And calculating a contract C3And result Data(out,3)Write the hash value of block chain:
Hw=H(w,Data(in,3),C3,Data(out,3),Timew)
if no data with obvious overlarge deviation is found, all the nodes NxThe result data returned is reasonable.
5) Node SrBy usingAnd returning a final result of the result operation:
if all the nodes N are comparedxIf the returned result data is reasonable, the node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,5),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has large deviation and the judgment data and the operation mode have problems, the node NyTo the initial node SrReturning new result data, the initial node SrInvoking its own computation contract CrAccording to the returned new result Data { Data }(out,1),...,Data'(out,y)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)And calculates the new result Data { Data } returned(out,1),...,Data'(out,y)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)Write to initial node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data'(out,3),...,Data(out,5),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has larger deviation but the judgment data and the operation mode are both correct, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
wherein H (-) is a secure hash function.
Node SrFinal result Data of the operation(out,r)And returning to the user.
Claims (6)
1. A data security exchange and operation method based on a hybrid chain is characterized by comprising the following steps:
A) a user sends a data call request, a node receiving the data call request is used as an initial node, the initial node triggers intelligent contract to calculate the hash of the data call request and writes the hash into a block chain where the hash is located, and then the data call request is used as a task to be distributed to other nodes in a hybrid chain;
B) the method comprises the steps that a node receiving a task obtains an operation contract from a hybrid chain operation contract library, the hash of a source code of the operation contract is verified, after the correctness of the operation contract is verified, a corresponding local data operation contract is called according to a data calling request to obtain result data, then the node receiving the task calculates a common hash value of input data, the operation contract, the result data, operation starting time and operation ending time, writes the common hash value into a block chain network where the node is located, and returns the result data to an initial node distributing the task;
C) the node of the distribution task receives result data returned by the node operation of the received task in the mixed chain, compares all the returned result data and determines the rationality of the result data;
D) after the reasonability of the returned result is determined, the node receiving the data calling request calculates a final result according to the local data, the returned result and the operation contract, calculates the hash value of the input data, the operation contract, the result data, the operation starting time and the operation ending time, writes the hash value into a block chain network where the node is located, and returns the calculated final result to the user.
2. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step A) specifically comprises the following steps:
A1) a user sends a data calling request, wherein the data calling request comprises data inquiry, collection and calculation;
A2) node S in hybrid chain receiving data call requestrCalculating the Hash of the data call request, writing the Hash into the block chain where the data call request is located, and triggering an intelligent contract to distribute the data call request as a task to other N nodes N in the mixed chainxN, x represents the ordinal number of the node.
3. A hybrid chain-based data security exchange and calculation method according to claims 1 and 2, characterized in that: the hybrid chain is a block chain of various types in the whole block chain network, including a alliance chain, a private chain, a public chain and the like, and a user sends a data call request to a block chain node which accepts the request in the hybrid chain.
4. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step B) specifically comprises the following steps:
B1) node N receiving taskxObtaining an operational contract C from a hybrid chain operational contract library according to the taskxAnd calculating a calculation contract CxHash of the source code of (1);
B2) comparing the calculated source code hash with the source code hash on the hybrid chain for verification, and running the operation contract C after verifying the correctness of the operation contractxCalling local Data matched with the Data call request as input Data(in,x)According to a calculation contract CxCalculating the result Data required by the task(out,x),
B3) Node N receiving taskxCalculating the input Data(in,x)And calculating a contract CxData of the result Data(out,x)Operation start Time(start,x)Sum operation end Time(end,x)Common hash value ofxAnd the common hash value HxWrite node NxThe block chain in which the block chain is located;
Hx=H(Data(in,x),Cx,Data(out,x),Time(start,x),Time(end,x))
wherein H (-) is a secure hash function;
B4) node NxData of the calculated resultoutReturning to the original node S distributing the tasksr。
5. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step C) specifically comprises the following steps:
initial node SrReceiving other nodes N of the mixed chainxReturned result Data(out,x)Thereafter, all returned result data are compared in the following manner:
if there is a node NxWhen the returned result data has overlarge deviation, the initial node SrTo node N with excessive deviationySending ping requestsSolving m, y belonging to { 1.,. N }, and calculating the node N with overlarge deviation, wherein the hash value of the inspection request m is written into the block chain in which the node N is locatedyAfter receiving the inspection request m, it first checks itself to determine the Data of the input Data(in,y)And calculating a contract CyAnd result Data(out,y)The correctness of (2):
if the data and operation mode are judged to have problems, the node N with overlarge deviation existsyUpdating the input Data and the calculation contract, and calculating new result Data 'according to the new calculation contract'(in,y)And returns to the original node SrAnd calculating updated input Data'(in,y)Calculating contract C'yData of the result Data'(out,y)And calculating the start Time Time'(start,y)And calculating the end Time of'(end,y)New common hash value of H'(Data,y)And the new common hash value H'(Data,y)Writing into the block chain:
H'(Data,y)=H(Data'(in,y),C'y,Data'(out,y),Time'(start,y),Time'(end,y))
wherein H (-) is a secure hash function;
if the data and the operation mode are both correct, the node N with excessive deviation existsySending a local Data calling request matched with the Data calling request to a Data owner of the local Data, and inputting the Data after obtaining the authorization w of the Data owner(in,y)And calculating a contract CyAnd result Data(out,y)Packaging and returning to the initial node SrAnd calculating the authorization w and the authorization Time of the data ownerwData of input Data(in,y)And calculating a contract CyAnd result Data(out,y)Write the common hash value of (1) into the blockchain:
Hw=H(w,Data(in,y),Cy,Data(out,y),Timew)
if there is no node N thereinxIf the returned result data has overlarge deviation, all the nodes NxThe result data returned is reasonable.
6. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step D) specifically comprises the following steps:
D1) initial node SrAnd (3) utilizing the return result to calculate a final result:
if all the nodes N are comparedxIf the returned result data is reasonable, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
wherein H (-) is a secure hash function;
if all the nodes N are comparedxIf the returned result data has large deviation and the judgment data and the operation mode have problems, the node NyTo the initial node SrReturning new result data, the initial node SrInvoking its own computation contract CrAccording to the returned new result Data { Data }(out,1),...,Data'(out,y),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)And calculates the new result Data { Data } returned(out,1),...,Data'(out,y),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)Write to initial node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data'(out,y),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has larger deviation but the judgment data and the operation mode are both correct, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
D2) initial node SrFinal self result Data(out,r)And returning and sending to the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010730721.3A CN111897874B (en) | 2020-07-27 | 2020-07-27 | Data security exchange and operation method based on hybrid chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010730721.3A CN111897874B (en) | 2020-07-27 | 2020-07-27 | Data security exchange and operation method based on hybrid chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111897874A true CN111897874A (en) | 2020-11-06 |
CN111897874B CN111897874B (en) | 2023-10-13 |
Family
ID=73190237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010730721.3A Active CN111897874B (en) | 2020-07-27 | 2020-07-27 | Data security exchange and operation method based on hybrid chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111897874B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038578A (en) * | 2017-04-19 | 2017-08-11 | 浙江数秦科技有限公司 | Multi-signature exchange information processing method in data trade platform based on block chain |
KR101849912B1 (en) * | 2017-05-25 | 2018-04-19 | 주식회사 코인플러그 | Method for providing certificate service based on smart contract and server using the same |
KR20180041055A (en) * | 2017-09-06 | 2018-04-23 | 주식회사 코인플러그 | Method for providing certificate service based on smart contract and server using the same |
CN108959416A (en) * | 2018-06-08 | 2018-12-07 | 浙江数秦科技有限公司 | A kind of web data automatic evidence-collecting based on block chain and deposit card method |
-
2020
- 2020-07-27 CN CN202010730721.3A patent/CN111897874B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038578A (en) * | 2017-04-19 | 2017-08-11 | 浙江数秦科技有限公司 | Multi-signature exchange information processing method in data trade platform based on block chain |
KR101849912B1 (en) * | 2017-05-25 | 2018-04-19 | 주식회사 코인플러그 | Method for providing certificate service based on smart contract and server using the same |
KR20180041055A (en) * | 2017-09-06 | 2018-04-23 | 주식회사 코인플러그 | Method for providing certificate service based on smart contract and server using the same |
CN108959416A (en) * | 2018-06-08 | 2018-12-07 | 浙江数秦科技有限公司 | A kind of web data automatic evidence-collecting based on block chain and deposit card method |
Non-Patent Citations (1)
Title |
---|
梁伟等: "基于区块链的可信数据交换技术与应用", 《信息通信技术与政策》, pages 91 - 96 * |
Also Published As
Publication number | Publication date |
---|---|
CN111897874B (en) | 2023-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109189962B (en) | License service implementation system based on block chain | |
CN111062044B (en) | Model joint training method and device based on block chain | |
CN111612455A (en) | Power consumption information protection-oriented Byzantine fault-tolerant alliance chain consensus method, system and storage medium | |
CN110599095B (en) | Block chain network-based hazardous waste treatment method and node of block chain network | |
CN109003185B (en) | Intelligent contract establishing method and device, computing equipment and storage medium | |
CN110275891A (en) | Artificial intelligence software market | |
CN111177800A (en) | Data processing method and device based on block chain and electronic equipment | |
CN115701078B (en) | Cross-chain transaction processing method, device, electronic equipment and storage medium | |
CN111523152B (en) | Block chain-based electronic certificate management method, management network and electronic equipment | |
CN112039893B (en) | Private transaction processing method and device, electronic equipment and readable storage medium | |
CN111861481A (en) | Block chain account checking method and system | |
CN112115204A (en) | Multi-party security calculation implementation method based on block chain technology | |
CN110910110A (en) | Data processing method and device and computer storage medium | |
CN113010906A (en) | Credible data tracing method and system based on block chain | |
CN113259384B (en) | Mechanism model call information processing method, server and system based on block chain | |
CN110062044A (en) | Distributed application program downloads verification method, equipment and storage medium | |
CN110662210B (en) | Secondary or repeated mobile phone number identification method, system and equipment based on block chain | |
CN113296944A (en) | Cross-game asset transfer system based on block chain intelligent contract | |
KR102294569B1 (en) | Block Chain Management System To Build Block Chain Network | |
CN117435671A (en) | Legal prosecution and certification system based on blockchain technology and operation method | |
CN111897874B (en) | Data security exchange and operation method based on hybrid chain | |
CN113239255B (en) | Heterogeneous data resource sharing method and device, computer equipment and medium | |
CN115496601A (en) | Loan system and method for recording carbon-neutral carbon emission based on block chain | |
CN114978893A (en) | Decentralized federal learning method and system based on block chain | |
CN112968772A (en) | Cross-chain decoupling method and system for block chain data and application of cross-chain decoupling method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |