CN111932249A - Data transaction ecosystem based on block chain - Google Patents

Data transaction ecosystem based on block chain Download PDF

Info

Publication number
CN111932249A
CN111932249A CN202010504405.4A CN202010504405A CN111932249A CN 111932249 A CN111932249 A CN 111932249A CN 202010504405 A CN202010504405 A CN 202010504405A CN 111932249 A CN111932249 A CN 111932249A
Authority
CN
China
Prior art keywords
module
data
contract
buyer
seller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010504405.4A
Other languages
Chinese (zh)
Inventor
唐煜
尚超
徐天豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Lianxiang Technology Co ltd
Original Assignee
Chengdu Lianxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Lianxiang Technology Co ltd filed Critical Chengdu Lianxiang Technology Co ltd
Priority to CN202010504405.4A priority Critical patent/CN111932249A/en
Publication of CN111932249A publication Critical patent/CN111932249A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a data transaction ecosystem based on a block chain, which comprises a safety data transaction platform, wherein a buyer deploys a data analysis intelligent contract through the safety data transaction platform, a seller sends data through the safety data transaction platform, and the buyer obtains a result through a credible node service; the secure data transaction platform comprises a transaction information management contract, a data transaction management contract, a buyer demand broadcast contract and a trusted node service; the trade information management contract comprises a contract information storage module and a contract information inquiry module; the data transaction management contract comprises an information recording module, a pre-storage management module, an information query module, a result statistical analysis module and a reward module; the buyer demand broadcast contract comprises a demand broadcast module and a fee module; the trusted node service comprises an SGX remote authentication module, an EVM virtual machine, a password module, a result signature module, a data sealing/unsealing module, a cost module and the like; the invention improves the safety, the expansibility, the integration and the like of the data transaction system.

Description

Data transaction ecosystem based on block chain
Technical Field
The invention relates to the technical field of distributed systems, in particular to a data transaction ecosystem based on a block chain.
Background
Data is a key asset in the current data-driven economy, and social benefits can be effectively increased by reasonably processing, analyzing and using big data, and the productivity is improved. In recent years, as the demand for buying and selling data has been expanding, the number of data exchange platforms has increased rapidly in order to facilitate the exchange of data sets. The data transaction platform serves as a bridge between data buyers and sellers.
However, the conventional data transaction platform has many limitations, and dishonest buyers or sellers often exist in data transaction, and dishonest data exchange may cache or transfer data of the sellers without authorization of the sellers. Furthermore, a dishonest buyer may maliciously modify the original data set by performing an insert, delete or transform operation. Tampering or handedness of transaction information may be difficult to discover due to the opacity of conventional data transaction platforms. Moreover, the traditional data switching center model is single-point, and a network attacker only needs to attack the data transaction platform to damage the interests of a plurality of data owners.
In addition, in existing data transaction platforms, the buyer typically obtains the complete data set from the seller. However, in addition to having access to the complete data set, buyers often only need the results of data analysis to make data-based decisions. For example, the transaction data is the seller's quarterly sales data, but the buyer only needs part of the statistics in the sales data. Then, the seller does not have to transmit the entire quarterly sales data to the buyer, and in this case, there is a risk that the buyer will leak and tamper with the data.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a data transaction ecosystem based on a block chain, so that the safety, the expansibility, the integration and the like of the data transaction system are improved.
The purpose of the invention is realized by the following technical scheme:
a data transaction ecosystem based on a block chain comprises a secure data transaction platform, a buyer deploys a data analysis intelligent contract through the secure data transaction platform, a seller sends data through the secure data transaction platform, and the buyer obtains a result through a trusted node service; the secure data transaction platform comprises a transaction information management contract, a data transaction management contract, a buyer demand broadcast contract and a trusted node service; the transaction information management contract comprises a contract information storage module and a contract information inquiry module; the data transaction management contract comprises an information recording module, a pre-storage management module, an information query module, a result statistical analysis module and a reward module; the buyer demand broadcast contract comprises a demand broadcast module and a fee module; the trusted node service comprises an SGX remote authentication module, an EVM virtual machine, a password module, a result signature module, a data sealing/unsealing module and a cost module; the transaction information management contract stores seller information through the contract information storage module, wherein the seller information comprises seller evaluation and data processing information of a buyer; the contract information inquiry module can help the buyer to better select a proper seller according to the historical transaction information; the buyer requirement broadcast contract can receive the buyer requirement and broadcast the requirement to the Ethernet workshop network, so that the seller and the credible node know the buyer requirement; the fee module in the contract will pre-mortgage the buyer's ethernet against denial of service attacks; the information recording module of the data transaction management contract records the data set characteristics of the seller and the competitive price of the seller and the credible node; the pre-storage management module requires a buyer to store enough Ethernet money in advance to pay the cost of the seller and the credible node; the contract information inquiry module is convenient for the seller and the credible node to inquire the reward which can be obtained by the transaction; the result statistical analysis module can analyze the result of data set processing and vote and elect the received result to obtain the optimal result; and the reward module issues the Ethernet currency reward for the seller and the credible node address based on the data processing optimal result.
Furthermore, the trusted node builds and uses an SGX (secure gateway X) extended instruction set in a service way, and can process sensitive data information by using the data sealing/unsealing module; the cipher module is used for decrypting encrypted data provided by a seller and encrypting a buyer data analysis result; the virtual machine runs a data processing intelligent contract provided by a buyer to process the data of the buyer; the fee module charges fee according to the output result of the Ether house intelligent contract virtual machine; and the result signing module is used for signing the data processing result in the Enclave container for preventing the node from tampering the result.
Further, a requirement matching process is included, and the requirement matching process is used for enabling the buyer to match the appropriate data seller and the appropriate trusted node in the data transaction ecosystem to execute the intelligent contract.
Further, a preparation environment process is included for the trusted node to complete environment preparation work before executing the data analysis intelligent contract, including obtaining a data decryption key of the seller and determining revenue that can be obtained by the seller and the node executing the contract.
And further, a data analysis execution process is included, and the data analysis execution process is used for the trusted node to execute the data analysis intelligent contract after the execution environment is prepared.
The invention has the beneficial effects that:
(1) the invention improves the safety, the expansibility, the integration and the like of a data transaction system, particularly adopts a brand-new data transaction model, uses a block chain consensus mechanism and an intelligent contract to resist various network attacks such as denial of service attacks and the like, a data buyer can not contact an original data set, the system provides a third-party trusted computing node cluster to analyze the data, the data of the buyer is effectively blocked from being reselled and falsified at the source, and a one-station intelligent contract deployment, data transaction and data analysis service platform is provided for the buyer.
(2) According to the invention, the traditional data transaction platform is subjected to uplink modification, and the trusted node cluster is integrated for data analysis, so that the coverage of data security transaction, data hosting and online data analysis is completed. A data transaction ecosystem design and novel data transaction protocols involved therein have been completed. The system mainly comprises functional modules including contract registration, demand matching, fund management and a trusted environment.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a system architecture diagram of the present invention;
FIG. 2 is a flow chart of demand matching according to the present invention;
FIG. 3 is a flow diagram of a preparation environment of the present invention;
FIG. 4 is a flow chart of data analysis execution according to the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following. All of the features disclosed in this specification, or all of the steps of a method or process so disclosed, may be combined in any combination, except combinations where mutually exclusive features and/or steps are used.
Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
Specific embodiments of the present invention will be described in detail below, and it should be noted that the embodiments described herein are only for illustration and are not intended to limit the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known circuits, software, or methods have not been described in detail so as not to obscure the present invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before describing the embodiments, some necessary terms need to be explained. For example:
if the terms "first," "second," etc. are used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. Thus, a "first" element discussed below could also be termed a "second" element without departing from the teachings of the present invention. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present.
The various terms appearing in this application are used for the purpose of describing particular embodiments only and are not intended as limitations of the invention, with the singular being intended to include the plural unless the context clearly dictates otherwise.
When the terms "comprises" and/or "comprising" are used in this specification, these terms are intended to specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence and/or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As shown in fig. 1 to 4, a data transaction ecosystem based on a block chain includes a secure data transaction platform, a buyer deploys a data analysis intelligent contract through the secure data transaction platform, a seller sends data through the secure data transaction platform, and the buyer obtains a result through a trusted node service; the secure data transaction platform comprises a transaction information management contract, a data transaction management contract, a buyer demand broadcast contract and a trusted node service; the transaction information management contract comprises a contract information storage module and a contract information inquiry module; the data transaction management contract comprises an information recording module, a pre-storage management module, an information query module, a result statistical analysis module and a reward module; the buyer demand broadcast contract comprises a demand broadcast module and a fee module; the trusted node service comprises an SGX remote authentication module, an EVM virtual machine, a password module, a result signature module, a data sealing/unsealing module and a cost module; the transaction information management contract stores seller information through the contract information storage module, wherein the seller information comprises seller evaluation and data processing information of a buyer; the contract information inquiry module can help the buyer to better select a proper seller according to the historical transaction information; the buyer requirement broadcast contract can receive the buyer requirement and broadcast the requirement to the Ethernet workshop network, so that the seller and the credible node know the buyer requirement; the fee module in the contract will pre-mortgage the buyer's ethernet against denial of service attacks; the information recording module of the data transaction management contract records the data set characteristics of the seller and the competitive price of the seller and the credible node; the pre-storage management module requires a buyer to store enough Ethernet money in advance to pay the cost of the seller and the credible node; the contract information inquiry module is convenient for the seller and the credible node to inquire the reward which can be obtained by the transaction; the result statistical analysis module can analyze the result of data set processing and vote and elect the received result to obtain the optimal result; and the reward module issues the Ethernet currency reward for the seller and the credible node address based on the data processing optimal result.
Furthermore, the trusted node builds and uses an SGX (secure gateway X) extended instruction set in a service way, and can process sensitive data information by using the data sealing/unsealing module; the cipher module is used for decrypting encrypted data provided by a seller and encrypting a buyer data analysis result; the virtual machine runs a data processing intelligent contract provided by a buyer to process the data of the buyer; the fee module charges fee according to the output result of the Ether house intelligent contract virtual machine; and the result signing module is used for signing the data processing result in the Enclave container for preventing the node from tampering the result.
Further, a requirement matching process is included, and the requirement matching process is used for enabling the buyer to match the appropriate data seller and the appropriate trusted node in the data transaction ecosystem to execute the intelligent contract.
Further, a preparation environment process is included for the trusted node to complete environment preparation work before executing the data analysis intelligent contract, including obtaining a data decryption key of the seller and determining revenue that can be obtained by the seller and the node executing the contract.
And further, a data analysis execution process is included, and the data analysis execution process is used for the trusted node to execute the data analysis intelligent contract after the execution environment is prepared.
The data transaction ecosystem comprises four important functional modules: contract enrollment, demand matching, fund management, and trusted environment. The four modules are designed into a transaction information management contract, a buyer requirement broadcast contract, a data transaction management contract and a distributed trusted node cluster in the system, and the whole system architecture is shown in fig. 1.
The transaction information management contract stores seller information including buyer-to-seller evaluation and data processing information (data analysis result hash, data set size, etc., but not encrypted data) through the contract information storage module. The contract information query module may help the buyer better select the appropriate seller based on historical transaction information.
The buyer requirement broadcast contract can receive buyer requirement and broadcast the requirement to the Ethernet workshop network, so that the seller and the credible node can know the buyer requirement, and the fee module in the contract can pre-mortgage the Ethernet currency of the buyer to prevent denial of service attack.
The information recording module of the data transaction management contract records the characteristics of the seller data set and the competitive price of the seller and the credible node. The pre-storage management module requires the buyer to store enough Ethernet money in advance to pay the fees of the seller and the trusted node. An information query module in the contract facilitates the seller and trusted node to query for rewards that their transaction can receive. The result statistical analysis module can analyze the results of the data set processing and vote the received results to obtain the optimal results. The reward module issues an ethernet reward for the seller and the trusted node address based on the data processing optimization result.
The trusted node cluster environment uses an SGX (software guard extensions, an extended instruction set developed by intel corporation aiming at hardware security as mandatory guarantee) remote authentication module to authenticate the SGX environment of the node and establish a secure channel for data transmission. An envelope container (a container realized by using SGX, which can divide a protected area in an address space of an application program and provide protection of confidentiality and integrity for codes and data in the container) in a trusted node can safely process sensitive data information by using a data sealing/unsealing module. The cipher module is used for decrypting the encrypted data provided by the seller and encrypting the buyer data analysis result. And the Ethernet intelligent contract virtual machine runs the data processing intelligent contract provided by the buyer to process the data of the buyer. And the fee module charges fee according to the output result of the Ethernet intelligent contract virtual machine. And the result signing module signs the data processing result in the Enclave container for preventing the node from tampering the result.
Deploying intelligent contracts and demand matching
The deployment process of the data analysis intelligent contract is the same as the standard deployment process of the Etheng intelligent contract.
The buyer needs to match the appropriate data seller, trusted node, in the data transaction ecosystem to execute the intelligent contract. The requirement matching procedure defined by the present system is shown in fig. 2.
1) The method comprises the following steps of (1) dividing the requirements of a seller into three parts: 1. the data set required for purchase illustrates 2. bid prices, including: price of unit data, highest price of unit data, price of reward node per unit data, highest price of reward node per unit data 3. number of trusted nodes to perform data analysis. Wherein the unit data price and the price per unit data reward node are the lowest prices that the buyer can pay to the seller and the data analysis node, and the highest unit data price and the highest price per unit data reward node are the highest prices that the buyer can pay to the seller and the data analysis node. While the buyer broadcasts the buyer IP address and data analysis contract in the blockchain network.
2) And (5) transmitting the aes-256 key of the buyer to an envelope container, wherein the container stores the transaction ID number, the IP address of the buyer and the buyer key by using an SGX sealing method. The buyer key will be used to encrypt the data analysis results.
3) And (6) generating an ID address and a public and private key of the container by the envelope container, and then storing the ID address and the public and private key of the container by using an SGX sealing method.
4) And (9) the buyer calls the transaction information management contract to inquire the credibility of the seller. Meanwhile, the buyer can also call the transaction information to manage the historical transaction appointed by the seller on the contract inquiry block chain, and the credibility is judged.
5) The buyer selects the first n nodes on the line that complete the steps (3) - (6) with the SGX context in preparation for data analysis services.
6) Step (10) the buyer selects a seller according to the transaction information management contract.
Preparing environment for executing intelligent contracts
Before the data analysis smart contract is executed. The trusted node needs to complete some environment preparation work, including obtaining the seller's data decryption key and determining the revenue that the seller and the node can obtain in executing the contract, etc., and the environment preparation flow chart is shown in fig. 3.
1) Step (1) the buyer stores the ID serial number, the data analysis intelligent contract, the node Ethenhouse address, the buyer Ethenhouse address, the unit data processing node price, the unit data price, the seller address, the node reward upper limit, the seller reward upper limit and the Enclave container public key in the data transaction management contract.
2) And (3) the seller and the trusted node judge whether the price meets the expectation or not by inquiring the information of the data transaction management contract.
3) And (5) the trusted node performs SGX remote authentication on the seller. Meanwhile, the authentication frequency is limited in the transaction, and a dishonest seller or a network attacker is prevented from carrying out denial of service attack.
4) And (6) transmitting the contract information to an envelope container through the SGX remote authentication secure channel. After receiving the contract information of the seller, the node stores the ID serial number, the data processing intelligent contract and the private key of the seller, and stores the ID serial number, the data processing intelligent contract and the private key of the seller outside the envelope container by an SGX sealing method.
Executing intelligent contracts
After the execution environment is prepared, the trusted node executes the data analysis intelligent contract, and the specific flow is shown in fig. 4.
1) Before executing the intelligent contract, the Enclave container of the trusted node acquires the ID serial number, the data processing intelligent contract and the seller key by using a unsealing method. The Enclave container reads the encrypted data set provided by the seller and decrypts using the seller's key. The intelligent contract virtual machine of the Ethernet workshop runs an intelligent contract processing data set, and a certain fee needs to be paid because the running of the intelligent contract needs to consume gas (the fee generated by running the intelligent contract in the Ethernet workshop). The amount of the fee is related to the size of the output data. After the calculation result is obtained, the envelope container uses the private key to sign the ID number, the input data size, the hash of the output result, and the consumed gas number. This information is sent to a data transaction management contract to achieve a network wide consensus.
2) And (3) verifying the signature by the data transaction management appointment to ensure that the sender is the node specified by the buyer. The contract selects the data processing result with the most votes as the final result. The node that is processed to the final result will be identified as a honest node, with the reward from the buyer. The reward received by the computing node and the seller is calculated based on the amount of data processed and the price of the unit data. If a dishonest seller uploads a large amount of spam data, the calculation node and the seller's reward are calculated based on the upper limit value of the amount of data provided by the buyer and the highest unit data price. At the same time, gas consumed by the ether house will also be deducted.
3) Step (5), when the buyer receives the returned balance, the calculation node and the buyer can be scored and evaluated.
4) And (6) writing information such as an execution result, buyer comments, the number of Ethernet coins mortised by the buyer, the cost for operating the Ethernet intelligent contract virtual machine, the size of input data and the like into a transaction information management contract to facilitate the evaluation of the seller by a system in the future.
In other technical features of the embodiment, those skilled in the art can flexibly select and use the features according to actual situations to meet different specific actual requirements. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known algorithms, methods or systems have not been described in detail so as not to obscure the present invention, and are within the scope of the present invention as defined by the claims.
For simplicity of explanation, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and elements referred to are not necessarily required in this application.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The disclosed systems, modules, and methods may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be referred to as an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may also be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It will be understood by those skilled in the art that all or part of the processes in the methods for implementing the embodiments described above can be implemented by instructing the relevant hardware through a computer program, and the program can be stored in a computer-readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a ROM, a RAM, etc.
The foregoing is illustrative of the preferred embodiments of this invention, and it is to be understood that the invention is not limited to the precise form disclosed herein and that various other combinations, modifications, and environments may be resorted to, falling within the scope of the concept as disclosed herein, either as described above or as apparent to those skilled in the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A data transaction ecosystem based on a block chain is characterized by comprising a secure data transaction platform, a buyer deploys data analysis intelligent contracts through the secure data transaction platform, a seller sends data through the secure data transaction platform, and the buyer obtains results through trusted node service;
the secure data transaction platform comprises a transaction information management contract, a data transaction management contract, a buyer demand broadcast contract and a trusted node service;
the transaction information management contract comprises a contract information storage module and a contract information inquiry module; the data transaction management contract comprises an information recording module, a pre-storage management module, an information query module, a result statistical analysis module and a reward module; the buyer demand broadcast contract comprises a demand broadcast module and a fee module; the trusted node service comprises an SGX remote authentication module, an EVM virtual machine, a password module, a result signature module, a data sealing/unsealing module and a cost module;
the transaction information management contract stores seller information through the contract information storage module, wherein the seller information comprises seller evaluation and data processing information of a buyer; the contract information inquiry module can help the buyer to better select a proper seller according to the historical transaction information; the buyer requirement broadcast contract can receive the buyer requirement and broadcast the requirement to the Ethernet workshop network, so that the seller and the credible node know the buyer requirement; the fee module in the contract will pre-mortgage the buyer's ethernet against denial of service attacks; the information recording module of the data transaction management contract records the data set characteristics of the seller and the competitive price of the seller and the credible node; the pre-storage management module requires a buyer to store enough Ethernet money in advance to pay the cost of the seller and the credible node; the contract information inquiry module is convenient for the seller and the credible node to inquire the reward which can be obtained by the transaction; the result statistical analysis module can analyze the result of data set processing and vote and elect the received result to obtain the optimal result; and the reward module issues the Ethernet currency reward for the seller and the credible node address based on the data processing optimal result.
2. The block chain-based data transaction ecosystem of claim 1, wherein the trusted node constructs a service using an SGX extension instruction set, and can process sensitive data information using the data sealing/unsealing module; the cipher module is used for decrypting encrypted data provided by a seller and encrypting a buyer data analysis result; the virtual machine runs a data processing intelligent contract provided by a buyer to process the data of the buyer; the fee module charges fee according to the output result of the Ether house intelligent contract virtual machine; and the result signing module is used for signing the data processing result in the Enclave container for preventing the node from tampering the result.
3. The data transaction ecosystem of any one of claims 1 or 2, comprising a requirement matching process for enabling a buyer to match an appropriate data seller, trusted node, in the data transaction ecosystem to execute an intelligent contract.
4. The blockchain-based data transaction ecosystem of claim 3, comprising a preparation environment process for the trusted node to perform environment preparation work prior to executing the data analysis intelligent contract, including obtaining a data decryption key of the seller and determining revenue that can be obtained by the seller and the node executing the contract.
5. The block chain-based data transaction ecosystem of claim 3, comprising a data analysis execution flow, wherein the data analysis execution flow is used for the trusted node to execute the data analysis intelligent contract after the execution environment is prepared.
CN202010504405.4A 2020-06-05 2020-06-05 Data transaction ecosystem based on block chain Pending CN111932249A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010504405.4A CN111932249A (en) 2020-06-05 2020-06-05 Data transaction ecosystem based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010504405.4A CN111932249A (en) 2020-06-05 2020-06-05 Data transaction ecosystem based on block chain

Publications (1)

Publication Number Publication Date
CN111932249A true CN111932249A (en) 2020-11-13

Family

ID=73316500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010504405.4A Pending CN111932249A (en) 2020-06-05 2020-06-05 Data transaction ecosystem based on block chain

Country Status (1)

Country Link
CN (1) CN111932249A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113065134A (en) * 2020-12-28 2021-07-02 上海能链众合科技有限公司 Block chain code and data security calculation method
CN113688394A (en) * 2021-06-07 2021-11-23 重庆大学 Outsourcing computing system and method based on block chain under safe and trusted execution environment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113065134A (en) * 2020-12-28 2021-07-02 上海能链众合科技有限公司 Block chain code and data security calculation method
CN113065134B (en) * 2020-12-28 2024-03-12 上海零数众合信息科技有限公司 Block chain code and data security calculation method
CN113688394A (en) * 2021-06-07 2021-11-23 重庆大学 Outsourcing computing system and method based on block chain under safe and trusted execution environment
CN113688394B (en) * 2021-06-07 2023-08-25 重庆大学 Block chain-based outsourcing computing system and method in safe and trusted execution environment

Similar Documents

Publication Publication Date Title
Dai et al. SDTE: A secure blockchain-based data trading ecosystem
CN111095332B (en) Method and system for protecting private social media advertisements
Xie et al. Blockchain for cloud exchange: A survey
US10693632B1 (en) Autonomous devices
Gao et al. Privacy-preserving auction for big data trading using homomorphic encryption
CN110046996B (en) Data processing method and device
CN112132198B (en) Data processing method, device and system and server
CN110766406B (en) Resource transfer method, resource transfer device, storage medium and electronic equipment
TW202026909A (en) Blockchain certificate storage method and apparatus, and computer device
CN111177253A (en) Power big data protection method and system based on identity digital authentication
CN110020543B (en) Data processing method and device based on block chain
WO2018224431A1 (en) Connected lighting system, method, and apparatus using blockchain
US20080281756A1 (en) Trusted third party clearing house for lead tracking
WO2022120886A1 (en) Commodity transaction method and apparatus, computer device, storage medium, and system
EP2583224A2 (en) Techniques to verify location for location based services
CN114401268A (en) Cross-link data sharing method, system, equipment and readable storage medium
CN111460457A (en) Real estate property registration supervision method, device, electronic equipment and storage medium
CN116743768B (en) Method, apparatus, device and computer readable storage medium for trading computing power resources
CN111932249A (en) Data transaction ecosystem based on block chain
Su et al. BDTF: A blockchain-based data trading framework with trusted execution environment
Xie et al. Dual-chain blockchain in agricultural E-commerce information traceability considering the viniar algorithm
Verma et al. Blockchain-based federated cloud environment: Issues and challenges
Vieira et al. Blockchain technologies for IoT applications: Use-cases and limitations
CN111586157B (en) Information processing method, device and equipment
CN111131227B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201113

WD01 Invention patent application deemed withdrawn after publication