CN111897874A - Data security exchange and operation method based on hybrid chain - Google Patents

Data security exchange and operation method based on hybrid chain Download PDF

Info

Publication number
CN111897874A
CN111897874A CN202010730721.3A CN202010730721A CN111897874A CN 111897874 A CN111897874 A CN 111897874A CN 202010730721 A CN202010730721 A CN 202010730721A CN 111897874 A CN111897874 A CN 111897874A
Authority
CN
China
Prior art keywords
data
node
contract
result
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010730721.3A
Other languages
Chinese (zh)
Other versions
CN111897874B (en
Inventor
张金琳
高航
俞学劢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Shuqin Technology Co Ltd
Original Assignee
Zhejiang Shuqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Shuqin Technology Co Ltd filed Critical Zhejiang Shuqin Technology Co Ltd
Priority to CN202010730721.3A priority Critical patent/CN111897874B/en
Publication of CN111897874A publication Critical patent/CN111897874A/en
Application granted granted Critical
Publication of CN111897874B publication Critical patent/CN111897874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data security exchange and operation method based on a hybrid chain. Sending a data calling request, triggering the hash writing block chain of the intelligent contract computing request by the node receiving the request, and distributing the hash writing block chain as a task to other nodes; the received node acquires an operation contract according to the task and verifies the correctness, and a result is obtained by using local data and the operation contract; the hash value of the data in the node calculation operation process is written into the block chain, and the result data is returned to the node distributing the task; comparing and verifying the nodes of the distributed tasks to return results; and obtaining a final result by the returned result and the local data after the result is determined to be reasonable, writing the hash value of the data in the calculation process into the block chain, and returning the final result to the user. The invention realizes the multi-party data secure exchange by the block chain technology, and the data task is distributed to a plurality of participants, so that the final result of the data can be safely obtained.

Description

Data security exchange and operation method based on hybrid chain
Technical Field
The invention relates to a data processing and exchanging method in a block chain, in particular to a data security exchanging and computing method based on a mixed chain.
Background
With the development of science and technology, the data volume is exponentially increased, so that governments, enterprises and other subjects master a large amount of data resources, but due to the lack of a safe and reliable data sharing and exchanging cooperation mechanism, the data islanding phenomenon is obvious. Conventionally, in order to realize data sharing and exchange, a direct data centralization and processing mode is adopted, and data of multiple parties are directly called and collected in local for centralized storage.
Meanwhile, many private data cannot be exported to a private domain, and data sharing and exchange cannot be realized by directly adopting a method of calling source data, so that data in a large range is still in an unutilized state. In order to fully exert the data value and realize the safe circulation and use of the data, the data needs to be reasonably and safely used under the authorized condition, and the data flow direction and the use process need to be tracked in real time to ensure the authenticity and the safety of the data.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a data security exchange and operation method based on a hybrid chain, which aims to perform data fusion and use in an intelligent and secure mode and fully perform data security exchange and operation on the premise of ensuring data privacy security and ownership.
The technical scheme adopted by the invention is as follows:
A) a user sends a data call request, a node receiving the data call request is used as an initial node, the initial node triggers intelligent contract to calculate the hash of the data call request and writes the hash into a block chain where the hash is located, and then the data call request is used as a task to be distributed to other nodes in a hybrid chain;
B) the method comprises the steps that a node receiving a task obtains an operation contract from a hybrid chain operation contract library, hash of a source code of the operation contract is verified on a chain, after the correctness of the operation contract is verified, corresponding local data operation contracts are called according to a data calling request to obtain result data, then the node receiving the task calculates a common hash value of input data, the operation contract, the result data, operation starting time and operation ending time, the common hash value is written into a block chain network where the node is located, and the result data are returned to an initial node distributing the task;
C) the node of the distribution task receives result data returned by the node operation of the received task in the mixed chain, compares all the returned result data and determines the rationality of the result data;
D) after the reasonability of the returned result is determined, the node receiving the data calling request calculates a final result according to the local data, the returned result and the operation contract, calculates the hash value of the input data, the operation contract, the result data, the operation starting time and the operation ending time, writes the hash value into a block chain network where the node is located, and returns the calculated final result to the user.
The nodes described in the invention are all nodes in a mixed chain.
The step A) specifically comprises the following steps:
A1) a user sends a data calling request, wherein the data calling request comprises data inquiry, collection and calculation, and is selected according to actual needs;
A2) node S in hybrid chain receiving data call requestrCalculating the hash of the data call request, writing the hash into the block chain where the data call request is located, and triggering an intelligent contract to distribute the data call request as a task to other N nodes N required in the hybrid chainxN, x represents the ordinal number of a node, and n represents the total number of nodes needing to receive a data call request in a mixed chain;
the hybrid chain is a block chain of various types in the whole block chain network, including a alliance chain, a private chain, a public chain and the like, and a user sends a data call request to a block chain node which accepts the request in the hybrid chain.
The step B) specifically comprises the following steps:
B1) node N receiving taskxAcquiring an operation contract C from a code server where a mixed chain operation contract base is located according to a taskxAnd calculating a calculation contract CxHash of the source code of (1);
B2) comparing the calculated source code hash with the original source code hash on the hybrid chain for verification, and verifying the operation contractRunning a calculation contract C after correctnessxCalling local Data matched with the Data call request as input Data(in,x)According to a calculation contract CxCalculating the result Data required by the task(out,x)
B3) Node N receiving taskxCalculating the input Data(in,x)And calculating a contract CxData of the result Data(out,x)Operation start Time(start,x)Sum operation end Time(end,x)Common hash value ofxAnd the common hash value HxWrite node NxThe block chain in which the block chain is located;
Hx=H(Data(in,x),Cx,Data(out,x),Time(start,x),Time(end,x))
wherein H (-) is a secure hash function;
B4) node NxData of the calculated resultoutReturning to the original node S distributing the tasksr
The step C) specifically comprises the following steps:
initial node SrReceiving other nodes N of the mixed chainxReturned result Data(out,x)Thereafter, all returned result data are compared in the following manner:
if there is a node NxWhen the returned result data has overlarge deviation, the initial node SrTo node N with excessive deviationySending an inspection request m, y belongs to { 1.,. N }, so as to perform local data inspection, and calculating a node N with an overlarge deviation, wherein the hash value of the inspection request m is written into a block chain where the node N is locatedyAfter receiving the inspection request m, it first checks itself to determine the Data of the input Data(in,y)And calculating a contract CyAnd result Data(out,y)The correctness of (2):
if the data and operation mode are judged to have problems, the node N with overlarge deviation existsyUpdating the input Data and the calculation contract, and calculating new result Data 'according to the new calculation contract'(in,y)And returns to the original node SrAnd calculating updated input Data'(in,y)Calculating contract C'yData of the result Data'(out,y)And calculating the start Time Time'(start,y)And calculating the end Time of'(end,y)New common hash value of H'(Data,y)And the new common hash value H'(Data,y)Writing into the block chain:
H'(Data,y)=H(Data'(in,y),C'y,Data'(out,y),Time'(start,y),Time'(end,y))
wherein H (-) is a secure hash function;
if the data and the operation mode are both correct, the node N with excessive deviation existsySending a local Data calling request matched with the Data calling request to a Data owner of the local Data, and inputting the Data after obtaining the authorization w of the Data owner(in,y)And calculating a contract CyAnd result Data(out,y)Packaging and returning to the initial node SrAnd calculating the authorization w and the authorization Time of the data ownerwData of input Data(in,y)And calculating a contract CyAnd result Data(out,y)Write the common hash value of (1) into the blockchain:
Hw=H(w,Data(in,y),Cy,Data(out,y),Timew)
if there is no node N thereinxIf the returned result data has overlarge deviation, all the nodes NxThe result data returned is reasonable.
The step D) specifically comprises the following steps:
D1) initial node SrAnd (3) utilizing the return result to calculate a final result:
if all the nodes N are comparedxIf the returned result data is reasonable, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self resultData(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
wherein H (-) is a secure hash function;
if all the nodes N are comparedxIf the returned result data has large deviation and the judgment data and the operation mode have problems, the node NyTo the initial node SrReturning new result data, the initial node SrInvoking its own computation contract CrAccording to the returned new result Data { Data }(out,1),...,Data'(out,y),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)And calculates the new result Data { Data } returned(out,1),...,Data'(out,y),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)Write to initial node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data'(out,y),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has larger deviation but the judgment data and the operation mode are both correct, thenInitial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
D2) initial node SrFinal self result Data(out,r)And returning and sending to the user.
The invention realizes the multi-party data secure exchange by the block chain technology, and the data task is distributed to a plurality of participants, so that the final result of the data can be safely obtained.
Compared with the prior art, the invention has the beneficial effects that:
(1) the tasks are distributed to the hybrid link network by using the block link technology, and the nodes call local data according to the tasks to calculate and then return results, so that the data ownership and data privacy are ensured, and the data are fully used.
(2) The full-flow record of task initiation, distribution, operation and return is completed through the intelligent contract of the block chain, the use traceability of data use is realized, and the authenticity, the safety and the accuracy of results of the data are ensured.
Drawings
Fig. 1 is a flow chart illustrating a data security exchange and operation method based on a hybrid chain.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, the specific examples and embodiments of the present invention are as follows:
1) the user is an electronic device for inputting instructions. The user needs to obtain the detailed information and sends the data call request to the node SrNode S receiving the requestrIs a block chain B1A node of, node SrHash value write block chain B for calculating data call request1Triggering an intelligent contract to distribute the data calling request to relative nodes in a hybrid chain as data processing tasks according to the content, wherein the number of the nodes related to the current task is N to 5, and the number of the nodes receiving the tasks is Nx1, 5. The node conditions and received information are as follows:
node point Block chain Received information
Sr Block chain B1 Data call request
N1 Block chain B1 Data processing task
N2 Block chain B2 Data processing task
N3 Block chain B2 Data processing task
N4 Block chain B2 Data processing task
N5 Block chain B3 Data processing task
Node Sr、N1、N2、N3、N4And N5Nodes, nodes S, being hybrid chainsrAnd N1In the same block chain network, node N2、N3And N4In the same blockchain network.
2) Node N receiving taskxAcquiring an operation contract from a code server according to the task, wherein x belongs to { 1.,. 5}, and calculating the hash of a source code of the operation contract;
node point Derived computation contracts Hash value of a computation contract
N1 C1 H1
N2 C2 H2
N3 C3 H3
N4 C4 H4
N5 C5 H5
Each node NxDifferent working conditions of the system and the method are different, different operation contracts are used during task processing, and hash values corresponding to the operation contracts are different. Comparing the calculated source code hash with the source code hash on the chain for verification, running the operation contract after verifying the correctness of the operation contract, and calling local Data as input Data(in,x)Calculating the result Data required by the task(out,x)
Node point Operation contract Inputting data Outputting the data Operation start time End time of operation
N1 C1 Data(in,1) Data(out,1) Time(start,1) Time(end,1)
N2 C2 Data(in,2) Data(out,2) Time(start,2) Time(end,2)
N3 C3 Data(in,3) Data(out,3) Time(start,3) Time(end,3)
N4 C4 Data(in,4) Data(out,4) Time(start,4) Time(end,4)
N5 C5 Data(in,5) Data(out,5) Time(start,5) Time(end,5)
3) Each node N receiving the taskxRespectively calculate the input Data(in,x)And calculating a contract CxAnd result Data(out,x)Operation start Time(star,tx)Sum operation end Time(end,x)Common hash value ofxAnd the hash value H is added(Data,x)Writing a block chain where the node is located;
H(Data,x)=H(Data(in,x),Cx,Data(out,x),Time(start,x),Time(end,x))
each node NxData of the calculated result(out,x)Returning to the node S which received the data call requestr. The specific information is as follows:
node point Hash value for data operations Block chain for Hash writing Returning results
N1 H(Data,1) Block chain B1 Data(out,1)
N2 H(Data,2) Block chain B2 Data(out,2)
N3 H(Data,3) Block chain B2 Data(out,3)
N4 H(Data,4) Block chain B2 Data(out,4)
N5 H(Data,5) Block chain B3 Data(out,5)
4) Node SrReceiving result Data returned by nodes receiving tasks in a mixed chain(out,x)And then comparing all returned data:
if one of the nodes N is found3And when the returned data has overlarge deviation, applying for local data inspection: node SrSending queryCheck request m to node N with large deviation3And calculating a hash value of the description content and writing the hash value into the block chain. Node N3After receiving the inspection request m, it first checks itself to determine the Data of the input Data(in,3)And calculating a contract C3And result Data(out,3)The correctness of (2):
a) if the data and operation mode are judged to be in problem, the node N3Updating the calculation Data and the calculation contract and recalculating to obtain new result Data'(in,3)Back to node SrAnd calculating updated input Data'(in,3)Calculating contract C'3And result Data of'(out,3)And calculating the start Time Time'(start,3)And calculating the end Time of'(end,3)Of a common hash value of H'(Data,3)The common hash value H'(Data,3)Writing a block chain where the node is located;
H'(Data,3)=H(Data'(in,3),C'3,Data'(out,3),Time'(start,3),Time'(end,3))
b) if the data and operation mode are both correct, the node N3Sending an application for local data invocation corresponding to the data invocation request to the data owner, node N3Although local Data exists and the local Data has authority, the Data is sent to other nodes to obtain the authority of the Data owner without the authority, and the Data is input after the authority w of the Data owner is obtained(in,3)And calculating a contract C3And result Data(out,3)Back to node SrAnd calculating the authorization w and the authorization Time of the data ownerwData of input Data(in,3)And calculating a contract C3And result Data(out,3)Write the hash value of block chain:
Hw=H(w,Data(in,3),C3,Data(out,3),Timew)
if no data with obvious overlarge deviation is found, all the nodes NxThe result data returned is reasonable.
5) Node SrBy usingAnd returning a final result of the result operation:
if all the nodes N are comparedxIf the returned result data is reasonable, the node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,5),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has large deviation and the judgment data and the operation mode have problems, the node NyTo the initial node SrReturning new result data, the initial node SrInvoking its own computation contract CrAccording to the returned new result Data { Data }(out,1),...,Data'(out,y)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)And calculates the new result Data { Data } returned(out,1),...,Data'(out,y)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)Write to initial node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data'(out,3),...,Data(out,5),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has larger deviation but the judgment data and the operation mode are both correct, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
wherein H (-) is a secure hash function.
Node SrFinal result Data of the operation(out,r)And returning to the user.

Claims (6)

1. A data security exchange and operation method based on a hybrid chain is characterized by comprising the following steps:
A) a user sends a data call request, a node receiving the data call request is used as an initial node, the initial node triggers intelligent contract to calculate the hash of the data call request and writes the hash into a block chain where the hash is located, and then the data call request is used as a task to be distributed to other nodes in a hybrid chain;
B) the method comprises the steps that a node receiving a task obtains an operation contract from a hybrid chain operation contract library, the hash of a source code of the operation contract is verified, after the correctness of the operation contract is verified, a corresponding local data operation contract is called according to a data calling request to obtain result data, then the node receiving the task calculates a common hash value of input data, the operation contract, the result data, operation starting time and operation ending time, writes the common hash value into a block chain network where the node is located, and returns the result data to an initial node distributing the task;
C) the node of the distribution task receives result data returned by the node operation of the received task in the mixed chain, compares all the returned result data and determines the rationality of the result data;
D) after the reasonability of the returned result is determined, the node receiving the data calling request calculates a final result according to the local data, the returned result and the operation contract, calculates the hash value of the input data, the operation contract, the result data, the operation starting time and the operation ending time, writes the hash value into a block chain network where the node is located, and returns the calculated final result to the user.
2. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step A) specifically comprises the following steps:
A1) a user sends a data calling request, wherein the data calling request comprises data inquiry, collection and calculation;
A2) node S in hybrid chain receiving data call requestrCalculating the Hash of the data call request, writing the Hash into the block chain where the data call request is located, and triggering an intelligent contract to distribute the data call request as a task to other N nodes N in the mixed chainxN, x represents the ordinal number of the node.
3. A hybrid chain-based data security exchange and calculation method according to claims 1 and 2, characterized in that: the hybrid chain is a block chain of various types in the whole block chain network, including a alliance chain, a private chain, a public chain and the like, and a user sends a data call request to a block chain node which accepts the request in the hybrid chain.
4. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step B) specifically comprises the following steps:
B1) node N receiving taskxObtaining an operational contract C from a hybrid chain operational contract library according to the taskxAnd calculating a calculation contract CxHash of the source code of (1);
B2) comparing the calculated source code hash with the source code hash on the hybrid chain for verification, and running the operation contract C after verifying the correctness of the operation contractxCalling local Data matched with the Data call request as input Data(in,x)According to a calculation contract CxCalculating the result Data required by the task(out,x)
B3) Node N receiving taskxCalculating the input Data(in,x)And calculating a contract CxData of the result Data(out,x)Operation start Time(start,x)Sum operation end Time(end,x)Common hash value ofxAnd the common hash value HxWrite node NxThe block chain in which the block chain is located;
Hx=H(Data(in,x),Cx,Data(out,x),Time(start,x),Time(end,x))
wherein H (-) is a secure hash function;
B4) node NxData of the calculated resultoutReturning to the original node S distributing the tasksr
5. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step C) specifically comprises the following steps:
initial node SrReceiving other nodes N of the mixed chainxReturned result Data(out,x)Thereafter, all returned result data are compared in the following manner:
if there is a node NxWhen the returned result data has overlarge deviation, the initial node SrTo node N with excessive deviationySending ping requestsSolving m, y belonging to { 1.,. N }, and calculating the node N with overlarge deviation, wherein the hash value of the inspection request m is written into the block chain in which the node N is locatedyAfter receiving the inspection request m, it first checks itself to determine the Data of the input Data(in,y)And calculating a contract CyAnd result Data(out,y)The correctness of (2):
if the data and operation mode are judged to have problems, the node N with overlarge deviation existsyUpdating the input Data and the calculation contract, and calculating new result Data 'according to the new calculation contract'(in,y)And returns to the original node SrAnd calculating updated input Data'(in,y)Calculating contract C'yData of the result Data'(out,y)And calculating the start Time Time'(start,y)And calculating the end Time of'(end,y)New common hash value of H'(Data,y)And the new common hash value H'(Data,y)Writing into the block chain:
H'(Data,y)=H(Data'(in,y),C'y,Data'(out,y),Time'(start,y),Time'(end,y))
wherein H (-) is a secure hash function;
if the data and the operation mode are both correct, the node N with excessive deviation existsySending a local Data calling request matched with the Data calling request to a Data owner of the local Data, and inputting the Data after obtaining the authorization w of the Data owner(in,y)And calculating a contract CyAnd result Data(out,y)Packaging and returning to the initial node SrAnd calculating the authorization w and the authorization Time of the data ownerwData of input Data(in,y)And calculating a contract CyAnd result Data(out,y)Write the common hash value of (1) into the blockchain:
Hw=H(w,Data(in,y),Cy,Data(out,y),Timew)
if there is no node N thereinxIf the returned result data has overlarge deviation, all the nodes NxThe result data returned is reasonable.
6. The hybrid chain-based data security exchange and operation method according to claim 1, wherein: the step D) specifically comprises the following steps:
D1) initial node SrAnd (3) utilizing the return result to calculate a final result:
if all the nodes N are comparedxIf the returned result data is reasonable, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
wherein H (-) is a secure hash function;
if all the nodes N are comparedxIf the returned result data has large deviation and the judgment data and the operation mode have problems, the node NyTo the initial node SrReturning new result data, the initial node SrInvoking its own computation contract CrAccording to the returned new result Data { Data }(out,1),...,Data'(out,y),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)And calculates the new result Data { Data } returned(out,1),...,Data'(out,y),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)Write to initial node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data'(out,y),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
if all the nodes N are comparedxIf the returned result data has larger deviation but the judgment data and the operation mode are both correct, the initial node SrInvoking its own computation contract CrAccording to returned result Data { Data(out,1),...,Data(out,n)The local Data matched with the Data call request(in,r)Performing operation to obtain final self result Data(out,r)Then calculating the returned result Data { Data }(out,1),...,Data(out,n)Data of local Data(in,r)And calculating a contract CrSelf result Data(out,r)Operation start Time(start,r)Sum operation end Time(end,r)Common hash value of(Data,r)And write into the presentation node SrThe block chain is as follows:
H(Data,r)=H(Data(in,r),Data(out,1),...,Data(out,n),Cr,Data(out,r),Time(start,r),Time(end,r))
D2) initial node SrFinal self result Data(out,r)And returning and sending to the user.
CN202010730721.3A 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain Active CN111897874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010730721.3A CN111897874B (en) 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010730721.3A CN111897874B (en) 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain

Publications (2)

Publication Number Publication Date
CN111897874A true CN111897874A (en) 2020-11-06
CN111897874B CN111897874B (en) 2023-10-13

Family

ID=73190237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010730721.3A Active CN111897874B (en) 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain

Country Status (1)

Country Link
CN (1) CN111897874B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
KR101849912B1 (en) * 2017-05-25 2018-04-19 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
KR20180041055A (en) * 2017-09-06 2018-04-23 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
CN108959416A (en) * 2018-06-08 2018-12-07 浙江数秦科技有限公司 A kind of web data automatic evidence-collecting based on block chain and deposit card method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
KR101849912B1 (en) * 2017-05-25 2018-04-19 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
KR20180041055A (en) * 2017-09-06 2018-04-23 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
CN108959416A (en) * 2018-06-08 2018-12-07 浙江数秦科技有限公司 A kind of web data automatic evidence-collecting based on block chain and deposit card method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁伟等: "基于区块链的可信数据交换技术与应用", 《信息通信技术与政策》, pages 91 - 96 *

Also Published As

Publication number Publication date
CN111897874B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
CN109189962B (en) License service implementation system based on block chain
CN111062044B (en) Model joint training method and device based on block chain
CN111612455A (en) Power consumption information protection-oriented Byzantine fault-tolerant alliance chain consensus method, system and storage medium
CN110599095B (en) Block chain network-based hazardous waste treatment method and node of block chain network
CN109003185B (en) Intelligent contract establishing method and device, computing equipment and storage medium
CN110275891A (en) Artificial intelligence software market
CN111177800A (en) Data processing method and device based on block chain and electronic equipment
CN111523152B (en) Block chain-based electronic certificate management method, management network and electronic equipment
CN112039893B (en) Private transaction processing method and device, electronic equipment and readable storage medium
CN111612452A (en) Intellectual property management system and method based on block chain
CN112115204A (en) Multi-party security calculation implementation method based on block chain technology
CN113010906A (en) Credible data tracing method and system based on block chain
CN111861481A (en) Block chain account checking method and system
CN115701078B (en) Cross-chain transaction processing method, device, electronic equipment and storage medium
CN113259384B (en) Mechanism model call information processing method, server and system based on block chain
CN110910110A (en) Data processing method and device and computer storage medium
CN110662210B (en) Secondary or repeated mobile phone number identification method, system and equipment based on block chain
KR102294569B1 (en) Block Chain Management System To Build Block Chain Network
CN117435671A (en) Legal prosecution and certification system based on blockchain technology and operation method
CN108540335A (en) The management method and managing device of device analysis report
CN111897874B (en) Data security exchange and operation method based on hybrid chain
CN113239255B (en) Heterogeneous data resource sharing method and device, computer equipment and medium
CN115496601A (en) Loan system and method for recording carbon-neutral carbon emission based on block chain
CN114978893A (en) Decentralized federal learning method and system based on block chain
CN113158255A (en) Organization information management method, device and system based on private chain and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant