Background
The power grid big data is considered as a basis for supporting safe, stable and reliable operation of the smart power grid, and reasonable development and application of the power grid big data can promote development, optimization and reformation of the power grid and improve operation benefits of the power grid. The reasonable application of the big data of the power grid requires efficient data quality management, so that data collection, retrieval and change are facilitated, the reliability and authenticity of the data are improved, and the sharing and transaction of the data are promoted.
The root cause of the problems of poor authenticity, poor safety and the like of the traditional power grid big data digital asset management method in data recording quality is that information cannot be smoothly transmitted due to a hierarchical management architecture, and the information is easy to distort in the transmission process. The block chain is a distributed shared super account book which is commonly maintained by nodes of the whole network and used for storing historical transaction records or data information, and has the advantages of decentralization, openness, autonomy, anonymity, information non-falsification and the like.
For distributed grid blockchain devices, the nodes in each network are unknown and unpredictable, and the behavior of the nodes is completely uncontrolled, and the nodes are not only subject to external malicious attacks, but also subject to misoperation or even malicious operation of the internal nodes themselves. Therefore, in addition to the security attributes in the blockchain infrastructure, how to further guarantee the authenticity of the grid data becomes another difficult problem.
Disclosure of Invention
The invention aims to provide a block chain-based data asset reliability assessment method to guarantee the authenticity of power grid data.
In a first aspect, an embodiment of the present invention provides a block chain-based data asset credibility assessment method, which verifies authenticity of a data asset based on a block chain and an electronic voting technique, and the assessment method includes:
receiving a data asset authenticity verification request, and voting by a verification node according to the verification request;
obtaining a voting result of the verification node and feeding the voting result back to the block chain;
and determining the evaluation result of the data asset according to the voting result on the block chain.
Optionally, receiving a data asset validation request, validating the data asset authenticity comprising:
receiving a data asset verification request Tx (Hash, Address, facility, N, M) of a main node, and activating the verification request, wherein the main node is a node needing to verify the data asset;
the verification node is used as a verifier to vote according to the verification request;
the Hash value of the data on the blockchain is represented, the Address represents an Address corresponding to the data outside the blockchain, the validity is used for returning the authenticity of the data, the N represents that the data authenticity verification request is recorded on the block with the number of N, and the M represents that the authenticity verification request waits for M blocks.
Optionally, the authenticity of the data is judged according to the voting result after the (N + M + 1) th block.
Optionally, obtaining the voting collection voting result of the verification node, and feeding the voting result back to the blockchain, includes:
and starting a pre-constructed verification protocol to broadcast a voting request to each verification node, taking the verification nodes except the main node on the block chain as data verifiers to vote, and returning voting results in the M blocks.
Optionally, the evaluation method further comprises:
and evaluating the weight and the credit degree of each verification node, and increasing the weight of votes from the trusted nodes and the authoritative nodes.
Optionally, the evaluating the weight and the credit rating of each verification node, and the increasing the weight of the votes from the trusted node and the authoritative node includes:
evaluating the weight w and the credit v of each node, and giving a score s ═ f (w, v) of each verifier node as a weight w' of a return value based on the weight w and the credit v, so that the weighted score of each verifier node is:
g=w'c。
k represents the number of all verifier nodes and h represents the weighted total score of all verifier nodes, then
And setting a data authenticity threshold as alpha epsilon (0, 1), if h is larger than or equal to alpha, considering the data as real data, and if h is smaller than alpha, considering the data as not real data.
In a second aspect, an embodiment of the present invention provides a block chain-based data asset reliability assessment apparatus, where the assessment apparatus includes:
the verification module is used for receiving a data asset authenticity verification request, and the verification node votes according to the verification request;
the feedback module is used for acquiring the voting result of the verification node and feeding the voting result back to the block chain;
and the first evaluation module is used for determining the evaluation result of the data asset according to the voting result on the block chain.
Optionally, the evaluation device further comprises:
and the second evaluation module is used for evaluating the weight and the credit degree of each verification node and increasing the weight of votes from the credible nodes and the authoritative nodes.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
a processor; a memory for storing processor-executable instructions;
wherein the processor implements the above method by executing the executable instructions.
In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium having stored thereon computer instructions, which when executed by a processor, implement the steps of the above-described method.
Advantageous effects
The invention provides a block chain-based data asset credibility assessment method, which comprises the steps of receiving a data asset verification request, and verifying the authenticity of a data asset; obtaining the voting of the verification node, collecting the voting result and feeding the voting result back to the block chain; and determining an evaluation result of the data asset according to the voting result on the block chain so as to guarantee the authenticity of the power grid data, further evaluating the weight and the credit degree of each verification node, increasing the weight of votes of the credible nodes and the authoritative nodes, and further improving the authenticity of the data.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The root cause of the problems of poor authenticity, poor safety and the like of the traditional power grid big data digital asset management method in data recording quality is that information cannot be smoothly transmitted due to a hierarchical management architecture, and the information is easy to distort in the transmission process. The block chain is a distributed shared super account book which is commonly maintained by nodes of the whole network and used for storing historical transaction records or data information, and has the advantages of decentralization, openness, autonomy, anonymity, information non-falsification and the like.
The block chain technology realizes functions of decentralization, forgery prevention, falsification prevention and the like by adopting technologies such as a distributed consensus mechanism, an asymmetric encryption algorithm, block chain storage and the like, can ensure anonymity and openness of a voting process, is in accordance with authenticity and safety requirements of power grid data asset management, and provides a feasible technical path for digital asset credibility evaluation of power grid big data. Therefore, aiming at the industrial pain point and the technical difficulty of the power grid device in the aspect of data authenticity, the method is researched how to improve the data authenticity based on the block chain technology, construct a corresponding technical model and realize the data authenticity identification based on the block chain;
data authentication is a core technology for realizing data authenticity detection, and is also one of the important problems in the fields of cryptography and information security research. Aiming at the problem that authenticity identification of power grid data on a block chain is difficult to realize, a data asset authenticity assessment method based on the block chain is designed by adopting an electronic voting technology based on a coalition chain, and authenticity verification of data under the chain is realized by voting on the chain.
The invention will be further described with reference to the following description and specific examples, taken in conjunction with the accompanying drawings:
the invention aims to provide a block chain-based data asset reliability assessment method to guarantee the authenticity of power grid data.
FIG. 1 illustrates a flow diagram of a block chain based data asset trustworthiness assessment method of an embodiment of the present invention; as shown in fig. 1, the evaluation method verifies the authenticity of the data assets based on a block chain and an electronic voting technique, and the evaluation method comprises the following steps:
s20, receiving a data asset authenticity verification request, and voting by a verification node according to the verification request;
s40, obtaining the voting result of the verification node and feeding the voting result back to the block chain;
and S60, determining the evaluation result of the data asset according to the voting result on the block chain.
The embodiment verifies the authenticity of the data asset by receiving a data asset verification request; obtaining the voting of the verification node, collecting the voting result and feeding the voting result back to the block chain; and determining the evaluation result of the data asset according to the voting result on the block chain so as to ensure the authenticity of the power grid data.
Fig. 2 is a flowchart illustrating a method for obtaining voting results of verification nodes and feeding the voting results back to a blockchain according to an embodiment of the present invention, and fig. 3 is a process for implementing authenticity verification of data assets based on the blockchain according to an embodiment of the present invention; as shown in fig. 2-3, receiving a data asset validation request, validating the data asset authenticity includes:
receiving a data asset verification request Tx (Hash, Address, facility, N, M) of a main node, and activating the verification request, wherein the main node is a node needing to verify the data asset;
the verification node is used as a verifier to vote according to the verification request;
the Hash value of the data on the blockchain is represented, the Address represents the Address corresponding to the data outside the blockchain, the validity is used for returning the authenticity of the data, if the data is real, True is returned, and if the data is not real, False is returned. As shown in fig. 3, N indicates that the data authenticity verification request is recorded on the block numbered N, M indicates that the authenticity verification request waits for M blocks, and finally, after the (N + M + 1) th block, the authenticity of the data is determined according to the voting result.
Specifically, obtaining and feeding back the voting result of the verification node to the blockchain includes:
starting a pre-constructed verification protocol to broadcast a voting request to each verification node, taking the verification nodes except the main node on the block chain as verifiers to vote, and returning voting results in M blocks;
when the master node initiates the authenticity authentication request, a verification protocol is started to broadcast the request to each verification node. The verification node on the block chain is used as a data verifier Validator to vote, a voting result can be returned in the M blocks, and finally the authenticity of the data is judged according to the voting result after the (N + M + 1) th block.
Specifically, the authentication protocol includes three phases:
a) Pre-Prepare: a sequence number distribution stage, namely assigning a sequence number n to the verification request, broadcasting a sequence number distribution message and a request message m of the client, and transmitting a constructed PRE-PREPARE message to each verifier Validator;
b) prepare: in the interaction stage, a PRE-PREPARE message is received, and the PREPARE message is broadcast to other verifier nodes validators;
c) commit: and a sequence number confirmation stage, wherein after each verification node verifies the request and the sequence, the COMMIT message is broadcast.
A vote response (denoted by r) of the Validator of the different verifier nodes is received. If the verifier node Validator considers the data to be authentic, True is returned, otherwise False is returned.
Fig. 4 is a flowchart of a block chain-based data asset credibility assessment method according to another embodiment of the present invention, as shown in fig. 4, the assessment method further includes:
and S80, evaluating the weight and the credit degree of each verification node, and increasing the weight of votes from the credible nodes and the authoritative nodes.
Specifically, the evaluation of the weight and the credit degree of each verification node, and the increasing of the weight of votes from the trusted node and the authoritative node comprises the following steps:
defining the following indicative function to represent the scoring of the data truth vote by the Validator according to the return value of the verifier node Validator:
evaluating the weight w and the credit v of each node, and giving a score s ═ f (w, v) of each verifier node as a weight w' of a return value based on the weight w and the credit v, so that the weighted score of each verifier node is:
g=w'c。
k represents the number of all verifier nodes and h represents the weighted total score of all verifier nodes, then
And setting a data authenticity threshold as alpha epsilon (0, 1), if h is larger than or equal to alpha, considering the data as real data, and if h is smaller than alpha, considering the data as not real data.
The invention provides a block chain-based data asset credibility assessment method, which comprises the steps of receiving a data asset verification request, and verifying the authenticity of a data asset; obtaining the voting of the verification node, collecting the voting result and feeding the voting result back to the block chain; and determining an evaluation result of the data asset according to the voting result on the block chain so as to guarantee the authenticity of the power grid data, further evaluating the weight and the credit degree of each verification node, increasing the weight of votes of the credible nodes and the authoritative nodes, and further improving the authenticity of the data.
FIG. 5 is a block diagram of an embodiment of a block chain-based data asset credibility assessment apparatus; as shown in fig. 5, the evaluation device includes:
the verification module 20 is configured to receive a data asset authenticity verification request, and the verification node votes according to the verification request;
a feedback module 40, configured to obtain a voting result of the verification node and feed the voting result back to the block chain;
a first evaluation module 60 for determining an evaluation result of the data asset based on the voting results on the blockchain.
Fig. 6 is a block diagram of a block chain-based data asset credibility assessment apparatus according to another embodiment of the present invention, as shown in fig. 6, the assessment apparatus further includes:
and the second evaluation module 80 is used for evaluating the weight and the credit degree of each verification node and increasing the weight of votes from the trusted node and the authoritative node.
Specifically, the evaluation of the weight and the credit degree of each verification node, and the increasing of the weight of votes from the trusted node and the authoritative node comprises the following steps:
defining the following indicative function to represent the scoring of the data truth vote by the Validator according to the return value of the verifier node Validator:
evaluating the weight w and the credit v of each node, and giving a score s ═ f (w, v) of each verifier node as a weight w' of a return value based on the weight w and the credit v, so that the weighted score of each verifier node is:
g=w'c。
k represents the number of all verifier nodes and h represents the weighted total score of all verifier nodes, then
And setting a data authenticity threshold as alpha epsilon (0, 1), if h is larger than or equal to alpha, considering the data as real data, and if h is smaller than alpha, considering the data as not real data.
The embodiment of the invention provides a block chain-based data asset reliability assessment device, wherein a verification module 20 verifies the authenticity of a data asset by receiving a data asset verification request; the feedback module 40 acquires the votes of the verification nodes, collects the voting results and feeds the voting results back to the block chain; the first evaluation module 60 determines the evaluation result of the data asset according to the voting result on the block chain to ensure the authenticity of the power grid data, and further, the second evaluation module 80 evaluates the weight and the credit degree of each verification node, increases the weight of votes of the trusted nodes and the authoritative nodes, and further improves the authenticity of the data.
Fig. 7 is a block diagram showing the configuration of an electronic apparatus according to an embodiment of the present invention, and as shown in fig. 7, the computer electronic apparatus includes a Central Processing Unit (CPU)701 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input section 1006 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 310 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The application also provides a computer readable storage medium, which may be a computer readable storage medium included in the block chain-based data asset credibility assessment device in the above embodiments; or it may be a computer-readable storage medium that exists separately and is not built into the electronic device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the blockchain-based data asset trustworthiness assessment methods described herein.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.