CN111897874B - Data security exchange and operation method based on hybrid chain - Google Patents

Data security exchange and operation method based on hybrid chain Download PDF

Info

Publication number
CN111897874B
CN111897874B CN202010730721.3A CN202010730721A CN111897874B CN 111897874 B CN111897874 B CN 111897874B CN 202010730721 A CN202010730721 A CN 202010730721A CN 111897874 B CN111897874 B CN 111897874B
Authority
CN
China
Prior art keywords
data
node
time
result
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010730721.3A
Other languages
Chinese (zh)
Other versions
CN111897874A (en
Inventor
张金琳
高航
俞学劢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Shuqin Technology Co Ltd
Original Assignee
Zhejiang Shuqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Shuqin Technology Co Ltd filed Critical Zhejiang Shuqin Technology Co Ltd
Priority to CN202010730721.3A priority Critical patent/CN111897874B/en
Publication of CN111897874A publication Critical patent/CN111897874A/en
Application granted granted Critical
Publication of CN111897874B publication Critical patent/CN111897874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data security exchange and operation method based on a hybrid chain. Sending a data calling request, triggering the hash of the intelligent contract calculation request by the node receiving the request to write into a blockchain, and distributing the hash to other nodes as a task; the received node acquires an operation contract according to the task and verifies correctness, and a result is obtained by utilizing the local data and the operation contract; the node calculates the hash value of the data in the operation process, writes the hash value into the blockchain, and returns the result data to the node for distributing the task; comparing and verifying returned results by the nodes distributing the tasks; and after the result is determined to be reasonable, obtaining a final result by the returned result and the local data, calculating the hash value of the data in the operation process, writing the hash value into the block chain, and returning the final result to the user. The invention realizes the multi-party data safety exchange by the block chain technology, and the final result of the data can be obtained safely by distributing the data task to a plurality of participants.

Description

Data security exchange and operation method based on hybrid chain
Technical Field
The invention relates to a data processing exchange method in a block chain, in particular to a data security exchange and operation method based on a mixed chain.
Background
With the development of technology, the data volume increases exponentially, which makes governments, enterprises and other subjects grasp a large amount of data resources, but the phenomenon of data islanding is obvious due to the lack of a safe and reliable data sharing and exchanging cooperative mechanism. In the conventional case, in order to realize data sharing exchange, a direct data centralization and processing mode is adopted, and data of multiple parties is directly called and collected locally for centralized storage, however, the mode has the problems of data security, privacy disclosure and the like.
Meanwhile, because many private data cannot be output from the private domain, the data sharing exchange cannot be realized by directly adopting a mode of calling the source data, and therefore, the data in a large range is still in an unused state. In order to fully exert the value of data and realize the safe circulation and use of the data, the data needs to be reasonably and safely used under the authorized condition, and the flow direction and the use process of the data also need to be tracked in real time so as to ensure the authenticity and the safety of the data.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a data security exchange and operation method based on a hybrid chain, which aims to perform data fusion and use in an intelligent and secure mode and fully perform data security exchange and operation on the premise of ensuring data privacy security and attribution right.
The technical scheme adopted by the invention is as follows:
a) The user sends a data call request, a node receiving the data call request is used as an initial node, the initial node triggers intelligent cancellation to calculate the hash of the data call request and writes the hash into a block chain where the hash is located, and then the data call request is used as a task to be distributed to other nodes in the hybrid chain;
b) The node receiving the task acquires an operation contract from a mixed chain operation contract library, verifies the hash of a source code of the operation contract on a chain, calls a corresponding local data operation contract according to a data call request to obtain result data after verifying the correctness of the operation contract, calculates a common hash value of input data, the operation contract, the result data, operation starting time and operation ending time by the node receiving the task, writes the common hash value into a blockchain network where the node is located, and returns the result data to an initial node distributing the task;
c) The nodes for distributing the tasks receive the result data returned by the node operation for receiving the tasks in the mixed chain, and compare all the returned result data to determine the rationality of the result data;
d) After the rationality of the returned result is determined, the node receiving the data call request calculates a final result according to the local data, the returned result and the operation contract, calculates hash values of the input data, the operation contract, the result data, the operation starting time and the operation ending time, writes the hash values into a blockchain network where the node is located, and returns the calculated final result to the user.
The nodes in the invention are all nodes in the mixed chain.
The step A) specifically comprises the following steps:
a1 The user sends a data calling request which comprises data inquiry, collection and calculation, and the data calling request is selected according to actual needs;
a2 Node S in the hybrid chain that receives the data call request r Calculating hash of the data call request, writing the hash into the block chain, and triggering the intelligent contract to distribute the data call request as a task to other N nodes N needed in the hybrid chain x X=1,..n, x represents the ordinal number of the node, n represents the total number of nodes in the hybrid chain that need to receive the data call request;
the hybrid chain is a blockchain in the whole blockchain network, which relates to various types, including a alliance chain, a private chain, a public chain and the like, and a user sends a data call request to a blockchain link which accepts requests in the hybrid chain.
The step B) specifically comprises the following steps:
b1 Node N) that received the task x Obtaining an operation contract C from a code server where a mixed chain operation contract library is located according to a task x And calculate operation contract C x Is a hash of the source code of (1);
b2 Comparing and verifying the calculated source code hash with the original source code hash on the mixed chain, and operating the operation contract C after verifying the correctness of the operation contract x Invoking local Data matching the Data invocation request as input Data (in,x) According to operation contract C x Calculating result Data required for a task (out,x)
B3 Node N) that received the task x Calculate the input Data (in,x) Operation contract C x Result Data (out,x) Operation start Time Time (start,x) Sum operation end Time Time (end,x) Is a common hash value H of (2) x And will commonly hash value H x Write node N x A blockchain in which the block chain is located;
H x =H(Data (in,x) ,C x ,Data (out,x) ,Time (start,x) ,Time (end,x) )
wherein H (·) is a secure hash function;
b4 Node N) x Data the calculated result out Returning to the original node S of the distribution task r
The step C) specifically comprises the following steps:
initial node S r Receiving other nodes N of the hybrid chain x Returned result Data (out,x) Thereafter, all returned result data are compared as follows:
if there is a node N x When the returned result data has overlarge deviation, the initial node S r To the node N with excessive deviation y Sending a checking request m, y epsilon { 1..once, N } to perform local data checking, and calculating a hash value of the checking request m to write into a block chain where the hash value is located, wherein the node N has overlarge deviation y After receiving the inspection request m, the self-check is first performed to determine the input Data (in,y) Operation contract C y And result Data (out,y) Accuracy of (2):
if it is determined that there is a problem with the data and the operation method, the node N having an excessive deviation y Updating the input Data and the operation contract, and operating the new result Data 'based on the new operation contract' (in,y) And returns to the original node S r And calculates updated input Data' (in,y) Operation contract C' y Result Data' (out,y) Operation start Time Time' (start,y) Sum operation end Time Time' (end,y) Is a new common hash value H' (Data,y) And will new common hash value H' (Data,y) Writing into a block chain:
H' (Data,y) =H(Data' (in,y) ,C' y ,Data' (out,y) ,Time' (start,y) ,Time' (end,y) )
wherein H (·) is a secure hash function;
if the judgment data and the operation mode are correct, the node N with overlarge deviation exists y Sending a call request of local data matched with the data call request to a data owner of the local data, and obtaining authorization of the data ownerw is followed by inputting Data (in,y) Operation contract C y And result Data (out,y) Packaging returns to the initial node S r And calculates the authorization w and the authorization Time Time of the data owner w Input Data (in,y) Operation contract C y And result Data (out,y) Is written to the blockchain:
H w =H(w,Data (in,y) ,C y ,Data (out,y) ,Time w )
if there is no node N x When the returned result data has excessive deviation, all nodes N x The returned result data is reasonable.
The step D) specifically comprises the following steps:
d1 Initial node S) r Calculating a final result by using the returned result:
if all nodes N are compared x The returned result data is reasonable, the initial node S r Invoking own operation contract C r According to the returned result Data { Data ] (out,1) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) Then calculate the returned result Data { Data } (out,1) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) And write to the presentation node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
wherein H (·) is a secure hash function;
if all nodes N are compared x If there is a large deviation in the returned result data and there is a problem in the decision data and the operation modeNode N y To the initial node S r Returning new result data, initial node S r Invoking own operation contract C r Based on the returned new result Data { Data ] (out,1) ,...,Data' (out,y) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) And calculates new result Data { Data }, which is returned (out,1) ,...,Data' (out,y) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) Writing initial node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data' (out,y) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
if all nodes N are compared x If the returned result data has larger deviation but the judgment data and the operation mode are correct, the initial node S r Invoking own operation contract C r According to the returned result Data { Data ] (out,1) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) Then calculate the returned result Data { Data } (out,1) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) And write to the presentation node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
d2 Initial node S) r Data of the final self result (out,r) And sending the return to the user.
The invention realizes the multi-party data safety exchange by the block chain technology, and the final result of the data can be obtained safely by distributing the data task to a plurality of participants.
Compared with the prior art, the invention has the beneficial effects that:
(1) And distributing the tasks to the hybrid chain network by using the block chain technology, and returning the result after the nodes call the local data to calculate according to the tasks, so that the data attribution right and the data privacy are ensured, and the data is fully used.
(2) The whole process records of task initiation, distribution, operation and return are completed through the intelligent contracts of the block chain, so that the use traceability of data use is realized, and the authenticity, the safety and the accuracy of results of the data are ensured.
Drawings
FIG. 1 is a flow chart of a data security exchanging and operating method based on a mixed chain.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, specific examples and embodiments of the present invention are as follows:
1) The user is an electronic device that inputs instructions. The user needs to acquire detailed information and send a data call request to the node S r Node S receiving the request r Is blockchain B 1 Is a node S r Computing hash value write to blockchain B for data call request 1 Triggering the intelligent contract to distribute the data call request to related nodes in the hybrid chain as data processing tasks according to the content, wherein n=5 nodes related to the current task, and N nodes receiving the task x X=1,..5. The conditions of each node and the received information are as follows:
node Local blockchain Received information
S r Blockchain B 1 Data call request
N 1 Blockchain B 1 Data processing task
N 2 Blockchain B 2 Data processing task
N 3 Blockchain B 2 Data processing task
N 4 Blockchain B 2 Data processing task
N 5 Blockchain B 3 Data processing task
Node S r 、N 1 、N 2 、N 3 、N 4 And N 5 All are nodes of a mixed chain, and node S r And N 1 Node N in the same blockchain network 2 、N 3 And N 4 In the same blockchain network.
2) Node N receiving task x Obtaining an operation contract from a code server according to a task, x epsilon { 1..4.5 }, and calculating a hash of a source code of the operation contract;
node Acquired operation contract Hash value of operation contract
N 1 C 1 H 1
N 2 C 2 H 2
N 3 C 3 H 3
N 4 C 4 H 4
N 5 C 5 H 5
Each node N x The operation conditions are different, the operation contracts used in the task processing are different, and the hash values corresponding to the operation contracts are also different. Comparing and verifying the calculated source code hash with the source code hash on the chain, running the operation contract after verifying the correctness of the operation contract, and calling the local Data as input Data (in,x) Calculating the result Data required by the task (out,x)
Node Operation contract Input data Output data Calculation start time Calculation end time
N 1 C 1 Data (in,1) Data (out,1) Time (start,1) Time (end,1)
N 2 C 2 Data (in,2) Data (out,2) Time (start,2) Time (end,2)
N 3 C 3 Data (in,3) Data (out,3) Time (start,3) Time (end,3)
N 4 C 4 Data (in,4) Data (out,4) Time (start,4) Time (end,4)
N 5 C 5 Data (in,5) Data (out,5) Time (start,5) Time (end,5)
3) Each node N receiving a task x Respectively calculate the input Data (in,x) Operation contract C x And result Data (out,x) Operation start Time Time (star,tx) Sum operation end Time Time (end,x) Is a common hash value H of (2) x And hash value H (Data,x) Writing a blockchain where the node is located;
H (Data,x) =H(Data (in,x) ,C x ,Data (out,x) ,Time (start,x) ,Time (end,x) )
each node N x Data of the result of the calculation (out,x) Returning to the node S receiving the data call request r . The specific information is as follows:
node Hash value for data operations Hash written blockchain Returning the result
N 1 H (Data,1) Blockchain B 1 Data (out,1)
N 2 H (Data,2) Blockchain B 2 Data (out,2)
N 3 H (Data,3) Blockchain B 2 Data (out,3)
N 4 H (Data,4) Blockchain B 2 Data (out,4)
N 5 H (Data,5) Blockchain B 3 Data (out,5)
4) Node S r Receiving result Data returned by nodes receiving tasks in hybrid chains (out,x) All returned data were compared later:
if one node N is found 3 When the returned data has excessive deviation, applying for local data checking: node S r Sending a ping request m to a node N with large deviation 3 And computes a hash value of the descriptive content to write into the blockchain. Node N 3 After receiving the inspection request m, the self-check is first performed to determine the input Data (in,3) Operation contract C 3 And result Data (out,3) Accuracy of (2):
a) If the judging data and the operation mode have problems, the node N 3 Updating operation Data and operation contract and re-operating to obtain new result Data' (in,3) Returned to the node S r And calculates updated input Data' (in,3) Operation contract C' 3 And result Data' (out,3) Operation start Time Time' (start,3) Sum operation end Time Time' (end,3) Is a common hash value H' (Data,3) Will hash the value H 'together' (Data,3) Writing a blockchain where the node is located;
H' (Data,3) =H(Data' (in,3) ,C' 3 ,Data' (out,3) ,Time' (start,3) ,Time' (end,3) )
b) If the determination data and the operation mode are correct, node N 3 Sending a local data call application corresponding to the data call request to a data owner, node N 3 Although the local Data has the authority of the self, the authority of the Data owner is required to be acquired by transmitting the local Data to other nodes without the authority, and the Data is input after the authority w of the Data owner is acquired (in,3) Operation contract C 3 And result Data (out,3) Returned to the node S r And calculates the authorization w and the authorization Time Time of the data owner w Input Data (in,3) Operation contract C 3 And result Data (out,3) Is written to the blockchain:
H w =H(w,Data (in,3) ,C 3 ,Data (out,3) ,Time w )
if no data with excessive obvious deviation is found, all nodes N x The returned result data is reasonable.
5) Node S r Calculating a final result by using the returned result:
if all nodes N are compared x The returned result data is reasonable, then the node S r Invoking own operation contract C r According to the returned result Data { Data ] (out,1) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) Then calculate the returned result Data { Data } (out,1) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) And write to the presentation node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data (out,5) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
if all nodes N are compared x If the returned result data has large deviation and the judgment data and the operation mode have problems, the node N y To the initial node S r Returning new result data, initial node S r Invoking own operation contract C r Based on the returned new result Data { Data ] (out,1) ,...,Data' (out,y) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) And calculates new result Data { Data }, which is returned (out,1) ,...,Data' (out,y) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) Writing initial node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data' (out,3) ,...,Data (out,5) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
if all nodes N are compared x If the returned result data has larger deviation but the judgment data and the operation mode are correct, the initial node S r Invoking own operation contract C r According to the returned result Data { Data ] (out,1) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) Then calculate the returned result Data { Data } (out,1) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result data Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) And write to the presentation node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
wherein H (·) is a secure hash function.
Node S r The final result Data of the operation (out,r) And returning to the user.

Claims (5)

1. The data security exchanging and operating method based on the mixed chain is characterized by comprising the following steps:
a) The user sends a data call request, a node receiving the data call request is used as an initial node, the initial node triggers intelligent cancellation to calculate the hash of the data call request and writes the hash into a block chain where the hash is located, and then the data call request is used as a task to be distributed to other nodes in the hybrid chain;
b) The node receiving the task acquires an operation contract from a mixed chain operation contract library, verifies the hash of a source code of the operation contract, calls corresponding local data as input data to operate the operation contract to obtain result data according to a data call request after verifying the correctness of the operation contract, calculates a common hash value of the input data, the operation contract, the result data, operation starting time and operation ending time by the node receiving the task, writes the common hash value into a blockchain network where the node is located, and returns the result data to an initial node distributing the task;
c) The nodes for distributing the tasks receive the result data returned by the node operation for receiving the tasks in the mixed chain, and compare all the returned result data to determine the rationality of the result data;
the step C) specifically comprises the following steps:
initial node S r Receiving other nodes N of the hybrid chain x Returned result Data (out,x) After that, the processing unit is configured to,all returned result data are compared as follows:
if there is a node N x When the returned result data has overlarge deviation, the initial node S r To the node N with excessive deviation y Sending a checking request m, y epsilon { 1..once, N }, and calculating a hash value of the checking request m to be written into a blockchain where the checking request m is located, wherein the node N has excessive deviation y After receiving the inspection request m, the self-check is first performed to determine the input Data (in,y) Operation contract C y And result Data (out,y) Accuracy of (2):
if it is determined that there is a problem with the data and the operation method, the node N having an excessive deviation y Updating the input Data and the operation contract, and operating the new result Data 'based on the new operation contract' (in,y) And returns to the original node S r And calculates updated input Data' (in,y) Operation contract C' y Result Data' (out,y) Operation start Time Time' (start,y) Sum operation end Time Time' (end,y) Is a new common hash value H' (Data,y) And will new common hash value H' (Data,y) Writing into a block chain:
H' (Data,y) =H(Data' (in,y) ,C' y ,Data' (out,y) ,Time' (start,y) ,Time' (end,y) )
wherein H (·) is a secure hash function;
if the judgment data and the operation mode are correct, the node N with overlarge deviation exists y Sending a call request of the local Data matched with the Data call request to a Data owner of the local Data, and inputting the Data after obtaining the authorization w of the Data owner (in,y) Operation contract C y And result Data (out,y) Packaging returns to the initial node S r And calculates the authorization w and the authorization Time Time of the data owner w Input Data (in,y) Operation contract C y And result Data (out,y) Is written to the blockchain:
H w =H(w,Data (in,y) ,C y ,Data (out,y) ,Time w )
if there is no node N x When the returned result data has excessive deviation, all nodes N x The returned result data is reasonable;
d) After the rationality of the result data is determined, the node receiving the data call request calculates a final result according to the local data, the result data and the operation contract, calculates hash values of the local data, the operation contract, the result data, the operation starting time and the operation ending time, writes the hash values into a blockchain network where the node is located, and returns the calculated final result to the user.
2. The data security exchanging and operating method based on the mixed chain according to claim 1, wherein: the step A) specifically comprises the following steps:
a1 A user sends a data calling request which comprises data inquiry, collection and calculation;
a2 Node S in the hybrid chain that receives the data call request r Calculating hash of the data call request, writing the hash into the block chain, triggering the intelligent contract to distribute the data call request as a task to other N nodes N in the mixed chain x X=1,..n, x represents the ordinal number of the node.
3. A method for secure exchange and computation of data based on hybrid chains according to claim 1 or 2, characterized in that: the hybrid chain is a blockchain in the whole blockchain network, which relates to various types, including a alliance chain, a private chain and a public chain, and a user sends a data call request to a blockchain link in the hybrid chain which accepts the request.
4. The data security exchanging and operating method based on the mixed chain according to claim 1, wherein: the step B) specifically comprises the following steps:
b1 Node N) that received the task x Obtaining operation contract C from mixed chain operation contract library according to task x And calculate the fortuneCalculation contract C x Is a hash of the source code of (1);
b2 Comparing and verifying the calculated source code hash with the source code hash on the mixed chain, and operating the operation contract C after verifying the correctness of the operation contract x Invoking local Data matching the Data invocation request as input Data (in,x) According to operation contract C x Calculating result Data required for a task (out,x)
B3 Node N) that received the task x Calculate the input Data (in,x) Operation contract C x Result Data (out,x) Operation start Time Time (start,x) Sum operation end Time Time (end,x) Is a common hash value H of (2) x And will commonly hash value H x Write node N x A blockchain in which the block chain is located;
H x =H(Data (in,x) ,C x ,Data (out,x) ,Time (start,x) ,Time (end,x) )
wherein H (·) is a secure hash function;
b4 Node N) x Data of the result of the calculation (out,x) Returning to the original node S of the distribution task r
5. The data security exchanging and operating method based on the mixed chain according to claim 1, wherein: the step D) specifically comprises the following steps:
d1 Initial node S) r Calculating a final result by using the result data:
if all nodes N are compared x The returned result data is reasonable, the initial node S r Invoking own operation contract C r According to the returned result Data { Data ] (out,1) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) Then calculate the returned result Data { Data } (out,1) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) And write to the initial node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
wherein H (·) is a secure hash function;
if all nodes N are compared x If there is too large deviation in the returned result data and there is a problem in the decision data and the operation mode, there is too large deviation in the node N y To the initial node S r Returning new result data, initial node S r Invoking own operation contract C r Based on the returned new result Data { Data ] (out,1) ,...,Data' (out,y) ,...,Data (out,n) Self local Data matched with Data call request (in,r) Performing operation to obtain final self-result Data (out,r) And calculates new result Data { Data }, which is returned (out,1) ,...,Data' (out,y) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) Writing initial node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data' (out,y) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
if all nodes N are compared x If the returned result data has excessive deviation but the judgment data and the operation mode are correct, the initial node S r Invoking own operation contract C r According to the returned result Data { Data ] (out,1) ,...,Data (out,n) ' and data toneWith self-local Data of request matching (in,r) Performing operation to obtain final self-result Data (out,r) Then calculate the returned result Data { Data } (out,1) ,...,Data (out,n) Local Data (in,r) Operation contract C r Self result Data (out,r) Operation start Time Time (start,r) Sum operation end Time Time (end,r) Is a common hash value H of (2) (Data,r) And write to the presentation node S r The blockchain:
H (Data,r) =H(Data (in,r) ,Data (out,1) ,...,Data (out,n) ,C r ,Data (out,r) ,Time (start,r) ,Time (end,r) )
d2 Initial node S) r Data of the final self result (out,r) And sending the return to the user.
CN202010730721.3A 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain Active CN111897874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010730721.3A CN111897874B (en) 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010730721.3A CN111897874B (en) 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain

Publications (2)

Publication Number Publication Date
CN111897874A CN111897874A (en) 2020-11-06
CN111897874B true CN111897874B (en) 2023-10-13

Family

ID=73190237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010730721.3A Active CN111897874B (en) 2020-07-27 2020-07-27 Data security exchange and operation method based on hybrid chain

Country Status (1)

Country Link
CN (1) CN111897874B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
KR101849912B1 (en) * 2017-05-25 2018-04-19 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
KR20180041055A (en) * 2017-09-06 2018-04-23 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
CN108959416A (en) * 2018-06-08 2018-12-07 浙江数秦科技有限公司 A kind of web data automatic evidence-collecting based on block chain and deposit card method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
KR101849912B1 (en) * 2017-05-25 2018-04-19 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
KR20180041055A (en) * 2017-09-06 2018-04-23 주식회사 코인플러그 Method for providing certificate service based on smart contract and server using the same
CN108959416A (en) * 2018-06-08 2018-12-07 浙江数秦科技有限公司 A kind of web data automatic evidence-collecting based on block chain and deposit card method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的可信数据交换技术与应用;梁伟等;《信息通信技术与政策》;第91-96页 *

Also Published As

Publication number Publication date
CN111897874A (en) 2020-11-06

Similar Documents

Publication Publication Date Title
JP7422806B2 (en) Methods, electronic devices and storage media to avoid or reduce cryptographically stranded resources in blockchain networks
US20220092586A1 (en) Off network identity tracking in anonymous cryptocurrency exchange networks
WO2020259156A1 (en) Blockchain-based private transaction method and apparatus
US10554407B1 (en) Protocols for decentralized networks
CN110599095B (en) Block chain network-based hazardous waste treatment method and node of block chain network
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
CN111309745B (en) Virtual resource processing method and device, electronic equipment and storage medium
CN111178894B (en) Asset type registration and transaction record verification method and system
WO2020228531A1 (en) Consortium blockchain governance method and apparatus, computer device and storage medium
CN110275891A (en) Artificial intelligence software market
CN111523152B (en) Block chain-based electronic certificate management method, management network and electronic equipment
CN110990879B (en) Data evidence storing method based on block chain
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
WO2022205966A1 (en) Cross-chain access control method and apparatus
KR20210087552A (en) Systems and methods for distributed resource allocation
CN112037055B (en) Transaction processing method, device, electronic equipment and readable storage medium
CN110662210B (en) Secondary or repeated mobile phone number identification method, system and equipment based on block chain
CN111897874B (en) Data security exchange and operation method based on hybrid chain
CN108540335A (en) The management method and managing device of device analysis report
WO2023045532A1 (en) Blockchain-based transaction processing
CN115701078B (en) Cross-chain transaction processing method, device, electronic equipment and storage medium
CN112039893B (en) Private transaction processing method and device, electronic equipment and readable storage medium
CN115526629A (en) Receipt transaction method and device based on block chain network and identity authentication device
CN111209540B (en) Information verification method, device and storage medium
CN112560115A (en) Multi-party combined research and development method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant