CN112597527B - Data access method for preventing alliance chain data leakage - Google Patents
Data access method for preventing alliance chain data leakage Download PDFInfo
- Publication number
- CN112597527B CN112597527B CN202110242456.9A CN202110242456A CN112597527B CN 112597527 B CN112597527 B CN 112597527B CN 202110242456 A CN202110242456 A CN 202110242456A CN 112597527 B CN112597527 B CN 112597527B
- Authority
- CN
- China
- Prior art keywords
- node
- data
- receiving
- area
- receiving area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of block chains, in particular to a data access method for preventing alliance chain data from leaking, which comprises the following steps: A) to the nodeTransmitting data storage signal to store dataIs divided intoPreparing; B) data blockEncrypted and sent to the node(ii) a C) Node pointRandomly deciding to exchange the receiving area and the switching area; D) the subsequent node also executes the step C); E) node pointData blockIs sent to the nodeThen, the end mark is sent, and the nodeAfter receiving the end mark, exchanging the receiving area with the exchange area; F) node pointStoring blocks of data as numbersAccording to(ii) a G) Node pointAccording to each nodeIs marked withRestoring data. The substantial effects of the invention are as follows: for dataDecryption requires each federation chain node to participate, ensuring that private data can only exist within the federation chain.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a data access method for preventing alliance chain data from leaking.
Background
A federation chain is a block chain managed by multiple enterprises in common, each organization or enterprise managing one or more nodes whose data only allows different enterprises in the system to read, write, and transmit. Each node of the federation chain usually has a corresponding entity organization, and can join and leave the network only after authorization. Organizations form interest-related alliances that collectively maintain healthy operation of blockchains. The federation chain is only for members of a certain group and limited third parties, and a plurality of preselected nodes are internally designated as billers, and the generation of each block is jointly determined by all the preselected nodes. Their main groups of use are banks, insurance, securities, business associations, corporate enterprises and upstream and downstream enterprises. The processing performance, privacy protection, compliance and the like of the existing block chain can not meet the service requirements of the existing block chain; and burden the risk of significant data leakage.
Controlling access to data on the federation chain can prevent enterprises outside the federation from acquiring data on the federation chain. The access control of the alliance chain data is mainly divided into two aspects: access control of data communicated over the chain and access control of data stored by the node. The access control of the communication data on the chain is completed through the node certificate and the SSL. And the current access control of the node stored data uses a disk-dropping encryption mode. The data on the hard disk of the node in the alliance chain are encrypted, and when the data need to be accessed, the data are managed through a Key Manager service. Key Manager service is deployed in an intra-organization network, node hard disk data access Key service is managed specially, and an external network cannot access the Key service. When the hard disk in the alliance chain is brought outside the intranet environment and started, the local data cannot be decrypted due to the fact that Key Manager service cannot be connected, and secrecy of the data in the alliance chain is achieved. However, the above method has a problem that if the hard disk and the encrypted key are leaked at the same time, data leakage on the federation chain is caused.
For example, chinese patent CN109714170A, published 2019, 5, month and 3, discloses a data isolation method in a federation chain and a corresponding federation chain system, where the data isolation method includes: s1, when the node links the original data, the original data is encrypted and stored in the local data pool; after the encrypted data is successfully stored in the local data pool, carrying out hash operation on the original data by the node, and storing the hash value obtained after the operation in the main chains of all nodes of the alliance chain; and storing the authorization information of each piece of encrypted data in the local data pool in the authorization chain of the node. In the technical scheme, only the uplink data of the node is stored in the local data pool of each node, and the uplink data of other nodes is not stored, so that the data is stored in an isolated manner. However, once the storage device of the node is leaked, the private data on the node is leaked, and both privacy and security are poor.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the data privacy and the security on the existing alliance chain are poor. The method can effectively prevent the data in the alliance chain from leaking and protect the security of the private data on the alliance chain.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a data access method for preventing federation chain data leakage comprises the following steps: A) each federation chain nodeEach having a locally corresponding storage nodeUnion link pointNeed to store dataTo the nodeTransmitting data storage signals and then storing the dataIs divided intoCopies, marked as data blocksData blockFixed length, data blockIf the length is not enough, zero filling is carried out,for data identification, storage nodeIs provided with length and data blockReceiving area and switching area with same length, the switching area having initialized random data, storage nodeAlso is provided with a mark position(ii) a B) Federation link pointsSequentially dividing the data blockEncrypted and sent to the nodeOf the receiving area, data blockBy federation chain nodeStoring; C) node pointRandomly deciding whether to exchange data between the receiving area and the switching area, and if so, marking bitSetting 1, otherwise, marking the bitThe setting is carried out at 0, and the operation is finished,representing nodesSlave nodeNumber of times data is received, nodeTransmitting data in a receiving area to a nodeThe receiving area of (a); D) node pointAnd the subsequent node also executes the step C), the nodeWill continuously receive data blocks, nodesStoring the received data blocks according to the receiving sequence; E) node pointData blockIs sent to the nodeAfter receiving the area, continuously sending an end mark to the nodeReceiving area, nodeAfter receiving the end mark, the data in the receiving area and the exchange area are forced to be exchanged, and the mark bitPut 1, nodeTransmitting data in a receiving area to a nodeThe receiving area of (a); F) node pointAfter the subsequent nodes receive the end mark, the data in the receiving area and the data in the exchange area are all forced to be exchanged and transmitted downwards until the nodes receive the end markReceiving the end mark, the nodeAfter receiving the end mark, the nodeStoring received data blocks as data in sequence,And then nodeSending an end flag to a nodeNode ofStopping the node after receiving the end markTransmitting data and transmitting the dataDeleting the node after the preset communication timeout time is exceededClearing the receiving area, filling the switching area with random data again, and waiting for next data transmission; G) node pointNeed to fetch dataTime, slave nodeReading dataNode ofAccording to each nodeIs marked withObtainingRemoving random data, correctly ordering, decrypting, splicing decrypted data blocks, and connecting nodesObtaining data. Data to be recordedThe data are divided into data blocks, and then random data are added after the data blocks are disordered in sequence, so that the data can be finishedTo obtain encrypted data. To dataDecrypt to obtain dataTherefore, after the hard disk of the alliance chain node is separated from the alliance chain, the recovered data cannot be obtained, privacy of the alliance chain privacy data is achieved, and the fact that the privacy data can only exist in the alliance chain is guaranteed.
Preferably, the federation chain nodeFlag bit serial number identificationInitial value of 0, nodeReceive its node one at a timeFlag bit sequence number identification at the time of a transmitted data blockAdding 1, when the preset communication timeout time is exceeded, not receiving the previous nodeFlag bit sequence number identification at the time of a transmitted data blockAnd setting 0.
Preferably, in step C), the nodesTransmitting data in a receiving area to a nodeAfter the receiving area, to the nodeTransmitting signal, nodeAfter receiving the signal, if the nodeThere is data to send to the nodeThen to the node immediatelyAnd (5) sending. Implementing a nodeWhen data are transmitted between the alliance chains, the data can be transmitted in parallel, and the data transmission speed between the alliance chains is improved.
Preferably, in step C), the nodesThe method for exchanging data of the receiving area and the switching area comprises the following steps: node pointRecording the storage addresses of the receiving area and the switching area if the nodeAnd determining data exchange between the receiving area and the exchange area, and exchanging the storage addresses of the receiving area and the exchange area.
Preferably, in step G), the nodeAccording to each nodeIs marked withObtainingThe method for correct order and interspersed random data comprises: G1) setting variablesAnd,let us orderNode ofWill be provided withIs sent to the next node(ii) a G2) Node pointReceive fromThen, inquireA value of, ifIs equal to 1, step G3) is entered, ifIs equal to 0, step G4) is entered; G3)self-add 1, re-queryA value of, ifIf the value of (A) is 0, the step is re-executed, if so, the step is repeatedIf 1, go to step G4); G4) will be provided withIs sent to the next node(ii) a G5) Repeating the steps G2) to G4) until the node is reachedWill be provided withIs sent to the nodeData blockI.e. as a data blockData ofNon-corresponding data blockThe data blocks of (1) are random data to be eliminated. By aligning flag bitsCan quickly obtain the restored dataIn restoring dataIn the process of (1), the nodeOnly the data of the node is needed to be checkedWithout the need of using flag bitsTo other nodes, each nodeCan not determine other nodes in betweenIs marked withCan ensure that only within a federation chainPrivate data is not leaked.
Preferably, the following steps are also performed between step F) and step G): node pointReceiving the end mark, completing the dataAfter storage, after waiting for a preset time, the nodeData to be recordedStep G) is executed after the steps A) to F) are executed as data to be stored. And the encryption is carried out for the second time to ensure the data security. At the same time as dataTo backup. When the alliance link node is to be exited, the stored flag bit is neededStored within the federation intra-chain network.
Preferably, the storage nodeAlso provided with a task flag bitTask flag bitInitial value of 0, alliance link nodeNeed to store dataTime, nodeFirst to the nodeQuery task flag bitIf the task flag bitIs 0, then the node is reachedQuery task flag bitIf the task flag bit 1, after waiting for a preset time, inquiring the task flag bit againStorage nodeQueried task flag bitThen, within a preset time length, the device willSet to 1, if the link point is unitedQuery to nodeOfService flag bitIf it is still 0, the data storage according to steps A) to F) is started。
The substantial effects of the invention are as follows: by counting dataEncrypting to obtain encrypted dataTo dataDecrypt to obtain dataTherefore, after the hard disk of the alliance chain node is separated from the alliance chain, the recovered data cannot be obtained, privacy of the alliance chain privacy data is achieved, and the fact that the privacy data can only exist in the alliance chain is guaranteed.
Drawings
FIG. 1 is a block diagram illustrating a data access method according to an embodiment.
FIG. 2 is a diagram illustrating data transfer by a storage node according to an embodiment.
Fig. 3 is a schematic diagram of an embodiment of a recovery data Dk.
Detailed Description
The following provides a more detailed description of the present invention, with reference to the accompanying drawings.
The first embodiment is as follows:
a data access method for preventing federation chain data leakage, as shown in fig. 1, includes the following steps:
A) each federation chain nodeEach having a locally corresponding storage nodeUnion link pointNeed to store dataTo the nodeTransmitting data storage signals and then storing the dataIs divided intoCopies, marked as data blocksData blockFixed length, data blockIf the length is not enough, zero filling is carried out,for data identification, storage nodeIs provided with length and data blockReceiving area and switching area with same length, the switching area having initialized random data, storage nodeAlso is provided with a mark position。
B) Federation link pointsSequentially dividing the data blockEncrypted and sent to the nodeOf the receiving area, data blockBy federation chain nodeAnd (5) storing.
C) Node pointIt is randomly determined whether to exchange data between the receiving area and the switching area, and if it is determined to exchange data, the flag bit is set as shown in FIG. 2 Setting 1, otherwise, marking the bitThe setting is carried out at 0, and the operation is finished,representing nodesSlave nodeNumber of times data is received, nodeTransmitting data in a receiving area to a nodeThe receiving area of (a). Node pointTransmitting data in a receiving area to a nodeAfter the receiving area, to the nodeTransmitting signal, nodeAfter receiving the signal, if the nodeThere is data to send to the nodeThen to the node immediatelyAnd (5) sending. Node pointThe method for exchanging data of the receiving area and the switching area comprises the following steps: node pointRecording the storage addresses of the receiving area and the switching area if the nodeDetermining receiving and switching zonesAnd exchanging the storage addresses of the receiving area and the exchange area.
D) Node pointAnd the subsequent node also executes the step C), the nodeWill continuously receive data blocks, nodesAnd storing the received data blocks according to the receiving sequence.
E) Node pointData blockIs sent to the nodeAfter receiving the area, continuously sending an end mark to the nodeReceiving area, nodeAfter receiving the end mark, the data in the receiving area and the exchange area are forced to be exchanged, and the mark bitPut 1, nodeTransmitting data in a receiving area to a nodeThe receiving area of (a).
F) Node pointAfter the subsequent nodes receive the end mark, the data in the receiving area and the data in the exchange area are all forced to be exchanged and transmitted downwards until the nodes receive the end markReceiving the end mark, the nodeAfter receiving the end mark, the nodeStoring received data blocks as data in sequence,And then nodeSending an end flag to a nodeNode ofStopping the node after receiving the end markTransmitting data and transmitting the dataDeleting the node after the preset communication timeout time is exceededClearing the receiving area and refilling the switching area with random data, etcAnd waiting for the next data transfer. Node pointReceiving the end mark, completing the dataAfter storage, after waiting for a preset time, the nodeData to be recordedStep G) is executed after the steps A) to F) are executed as data to be stored.
As shown in fig. 3, dataAfter encryption, data is obtained. Data to be recordedStored in a nodeInner, nodeCannot recover data alone。
G) Node pointNeed to fetch dataTime, slave nodeReading dataNode ofAccording to each nodeIs marked withObtainingRemoving random data, correctly ordering, decrypting, splicing decrypted data blocks, and connecting nodesObtaining data。
Node pointAccording to each nodeIs marked withObtainingThe method for correct order and interspersed random data comprises: G1) setting variablesAnd,let us orderNode ofWill be provided withIs sent to the next node(ii) a G2) Node pointReceive fromThen, inquireA value of, ifIs equal to 1, step G3) is entered, ifIs equal to 0, step G4) is entered; G3)self-add 1, re-queryA value of, ifIf the value of (A) is 0, the step is re-executed, if so, the step is repeatedIf 1, go to step G4); G4) will be provided withIs sent to the next node(ii) a G5) Repeating the steps G2) to G4) until the node is reachedWill be provided withIs sent to the nodeData blockI.e. as a data blockData ofNon-corresponding data blockThe data blocks of (1) are random data to be eliminated. Federation link pointsFlag bit serial number identificationInitial value of 0, nodeReceive its node one at a timeFlag bit sequence number identification at the time of a transmitted data blockAdding 1, when the preset communication timeout time is exceeded, not receiving the previous nodeFlag bit sequence number identification at the time of a transmitted data blockAnd setting 0. By aligning flag bitsCan quickly obtain the restored dataIn restoring dataIn the process of (1), the nodeOnly the data of the node is needed to be checkedWithout the need of using flag bitsTo other nodes, each nodeCan not determine other nodes in betweenIs marked withCan ensure that only private data in the federation chain is not leaked. Data to be recordedThe data are divided into data blocks, and then random data are added after the data blocks are disordered in sequence, so that the data can be finishedTo obtain encrypted data. To dataDecrypt to obtain dataTherefore, after the hard disk of the alliance chain node is separated from the alliance chain, the recovered data cannot be obtained, privacy of the alliance chain privacy data is achieved, and the fact that the privacy data can only exist in the alliance chain is guaranteed.
As shown in fig. 3, the federation chain in this embodiment has 5 nodes in total,toWhen nodeNeed to store dataTime, nodeData to be recordedIs divided into9 data blocks in total, the length of the data blocks is the same, if the data blocks are the sameIf the length is not enough, the length of the preset character is the same as that of the rest data block by zero padding or filling. Then nodeIn turn willToTo the next node, i.e. nodeFinal dataBy nodeAnd (4) generating. Node pointToThe values of the switch flags of the receiving area and the switching area at each transfer are shown in the figure. When nodeWill be provided withIs sent to the nodeThen, the node is not turned toAnd transmitting the END identification. Up to the nodeAfter receiving the first END identification, the nodeSending END identification to nodeNode ofCeasing to send data to a node. Node pointSubsequently sending the dataSupply nodeAnd finishing the storage and encryption of the data.
When data is processedWhen decrypting: node pointBuild valuesAnd then the value is calculatedIs sent to the nodeNode ofQueryThe values of (a), as shown in figure 3,is 1, then the nodeWill be provided withThe self-adding of 1 is carried out,become intoAnd then re-inquiredThe value of (c).Is 0, then continue to beFrom adding 1 toInquire toIs 1, and then the value is comparedIs sent to the node. Reason nodeInforming nodes of data storage requirements onlyTherefore, nodeIt cannot be known which node sends out the data decryption requirement, that is, the nodeCan not knowHas undergone several node modifications, and thus cannot learn about the nodeIs marked withThe value of (c).
Node pointReceive fromThen, inquireIs given a value of Is 1, then willThe self-adding of 1 is carried out,become intoThen inquiredThe value of (c). And will once againThe self-adding of 1 is carried out,become intoThen inquiredThe value of (c).Is 1, the value is addedIs sent to the nodeNode ofAlso cannot be determinedSeveral node modifications have been previously undertaken.
Node pointReceive fromThen, inquireThe value of (a) is,if the value of (1) is 0, the value is directly addedIs sent to the node。
Node pointReceive fromThen, inquireThe value of (a) is,is 1, then willSelf-add 1 until willWhen adding to 10, queryIs 1, when the node isWill valueIs sent to the nodeNode ofReceived valueThen, it can knowI.e. byThereby obtainingThe data of (1).
Then nodeWill valueIs sent to the nodeAfter the same operation, the nodeReceiving nodeTransmitted valueCan obtain. Repeating the process for 9 times to obtainToTo restore the data. In the recovery process, each alliance link node participates in, and each alliance link node only knows own data, cannot know the data of other alliance link nodes, and can finish the data without exposing the data of itself to other alliance link nodesAnd (5) recovering. Thereby dataThe recovery can be only carried out in the alliance chain intranet, and once the alliance chain intranet is separated, any data cannot be recovered. In order to avoid that data cannot be accessed due to the fact that a certain node in a alliance chain is in fault, the data should be storedAnd selecting part of the alliance link nodes to finish the storage process. And multiple groups of nodes are selected to finish the storage process for multiple times. And no cross exists among a plurality of groups of alliance chain nodes. If M groups are selected to complete the storage process, when M-1 nodes of the alliance link node have faults, the data can be necessarily recovered。
The beneficial technical effects of this embodiment are: by counting dataEncrypting to obtain encrypted dataTo dataDecrypt to obtain dataTherefore, after the hard disk of the alliance chain node is separated from the alliance chain, the recovered data cannot be obtained, privacy of the alliance chain privacy data is achieved, and the fact that the privacy data can only exist in the alliance chain is guaranteed.
Example two:
in this embodiment, a storage node is used as a data access method for preventing data leakage of a federation chainAlso provided with a task flag bitTask flag bitInitial value of 0, alliance link nodeNeed to store dataTime, nodeFirst to the nodeQuery task flag bitIf the task flag bitIs 0, then the node is reachedQuery task flag bitIf the task flag bit 1, after waiting for a preset time, inquiring the task flag bit againStorage nodeQueried task flag bitThen, within a preset time length, the device willSet to 1, if the link point is unitedQuery to nodeTask flag bit ofIf it is still 0, the data storage according to steps A) to F) is started. The rest steps are the same as the first embodiment.
The above embodiment is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and other variations and modifications may be made without departing from the technical scope of the claims.
Claims (6)
1. A data access method for preventing alliance chain data leakage is characterized in that,
the method comprises the following steps:
A) each federation chain nodeEach having a locally corresponding storage nodeUnion link pointNeed to store dataTo the nodeTransmitting data storage signals and then storing the dataIs divided intoCopies, marked as data blocksData blockFixed length, data blockIf the length is not enough, zero filling is carried out,for data identification, storage nodeIs provided with length and data blockReceiving area and switching area with same length, the switching area having initialized random data, storage nodeAlso is provided with a mark position;
B) Federation link pointsSequentially dividing the data blockEncrypted and sent to the nodeOf the receiving area, data blockBy federation chain nodeStoring;
C) federation link pointsRandomly deciding whether to exchange data between the receiving area and the switching area, and if so, marking bitSetting 1, otherwise, marking the bitThe setting is carried out at 0, and the operation is finished,representing nodesSlave nodeNumber of times data is received, nodeTransmitting data in a receiving area to a nodeThe receiving area of (a);
D) federation link pointsAnd the subsequent node also executes the step C), the nodeWill continuously receive data blocks, nodesStoring the received data blocks according to the receiving sequence;
E) federation link pointsData blockIs sent to the nodeAfter receiving the area, continuously sending an end mark to the nodeReceiving area, nodeAfter receiving the end mark, the data in the receiving area and the exchange area are forced to be exchanged, and the mark bitPut 1, nodeTransmitting data in a receiving area to a nodeThe receiving area of (a);
F) node pointAfter the subsequent nodes receive the end mark, the data in the receiving area and the data in the exchange area are all forced to be exchanged and transmitted downwards until the nodes receive the end markReceiving the end mark, the nodeAfter receiving the end mark, the nodeStoring received data blocks as data in sequence,And then nodeSending an end flag to a nodeNode ofStopping the node after receiving the end markTransmitting data and transmitting the dataDeleting the node after the preset communication timeout time is exceededClearing the receiving area, filling the switching area with random data again, and waiting for next data transmission;
G) node pointNeed to fetch dataTime, slave nodeReading dataNode ofAccording to each nodeIs marked withObtainingRemoving random data, correctly ordering, decrypting, splicing decrypted data blocks, and connecting nodesObtaining data;
In step G), the nodeAccording to each nodeIs marked withObtainingThe method for correct order and interspersed random data comprises:
G2) Node pointReceive fromThen, inquireA value of, ifIs equal to 1, step G3) is entered, ifIs equal to 0, step G4) is entered;
G3)self-add 1, re-queryA value of, ifIf the value of (A) is 0, the step is re-executed, if so, the step is repeatedIf 1, go to step G4);
2. The data access method for preventing federation chain data leakage of claim 1,
federation link pointsFlag bit serial number identificationInitial value of 0, nodeReceive its node one at a timeFlag bit sequence number identification at the time of a transmitted data blockAdding 1, when the preset communication timeout time is exceeded, not receiving the previous nodeFlag bit sequence number identification at the time of a transmitted data blockAnd setting 0.
3. The data access method for preventing federation chain data leakage according to claim 1 or 2,
4. The data access method for preventing federation chain data leakage according to claim 1 or 2,
in step C), the nodeThe method for exchanging data of the receiving area and the switching area comprises the following steps: node pointRecording the storage addresses of the receiving area and the switching area if the nodeAnd determining data exchange between the receiving area and the exchange area, and exchanging the storage addresses of the receiving area and the exchange area.
5. The data access method for preventing federation chain data leakage according to claim 1 or 2,
the following steps are also performed between step F) and step G):
6. The data access method for preventing federation chain data leakage according to claim 1 or 2,
storage nodeAlso provided with a task flag bitTask flag bitInitial value of 0, alliance link nodeNeed to store dataTime, nodeFirst to the nodeQuery task flag bitIf the task flag bitIs 0, then the node is reachedQuery task flag bitIf the task flag bit1, after waiting for a preset time, inquiring the task flag bit againStorage nodeQueried task flag bitThen, within a preset time length, the device willSet to 1, if the link point is unitedQuery to nodeTask flag bit ofIf it is still 0, the data storage according to steps A) to F) is started。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110242456.9A CN112597527B (en) | 2021-03-05 | 2021-03-05 | Data access method for preventing alliance chain data leakage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110242456.9A CN112597527B (en) | 2021-03-05 | 2021-03-05 | Data access method for preventing alliance chain data leakage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112597527A CN112597527A (en) | 2021-04-02 |
CN112597527B true CN112597527B (en) | 2021-06-08 |
Family
ID=75210261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110242456.9A Active CN112597527B (en) | 2021-03-05 | 2021-03-05 | Data access method for preventing alliance chain data leakage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112597527B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112989428B (en) * | 2021-05-08 | 2021-08-03 | 浙江数秦科技有限公司 | Rapid encryption storage method for alliance link data |
CN113378192B (en) * | 2021-06-02 | 2022-06-10 | 浙江数秦科技有限公司 | Alliance link data encryption method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB201703562D0 (en) * | 2017-03-06 | 2017-04-19 | Nchain Holdings Ltd | Computer-implemented system and method |
CN108712429B (en) * | 2018-05-24 | 2020-07-10 | 西安电子科技大学 | Privacy protection method based on block chain cloud outsourcing computing data |
CN109302495A (en) * | 2018-11-20 | 2019-02-01 | 北京邮电大学 | A kind of date storage method and device |
CN109587132B (en) * | 2018-11-29 | 2021-03-26 | 南京苏宁软件技术有限公司 | Data transmission method and device based on alliance chain |
-
2021
- 2021-03-05 CN CN202110242456.9A patent/CN112597527B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112597527A (en) | 2021-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112597527B (en) | Data access method for preventing alliance chain data leakage | |
US5706347A (en) | Method and system for authenticating a computer network node | |
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
EP0002578B1 (en) | Data communication method | |
CN109510818B (en) | Data transmission system, method, device, equipment and storage medium of block chain | |
US20160359626A1 (en) | System, method, and apparatus for quantum key output, storage, and consistency verification | |
CN101170554B (en) | Message safety transfer system | |
EP2555466A1 (en) | System for distributing cryptographic keys | |
EP0840476A2 (en) | Encrypted communication system that limits the damage caused when a secret key has been leaked | |
JPS6021501B2 (en) | Operation key verification method in data communication network | |
CN106611128A (en) | Secondary encryption-based data validation and data recovery algorithm in cloud storage | |
JPH09502845A (en) | Key distribution device in encryption system | |
JPS6145833B2 (en) | ||
JP6903223B2 (en) | Methods and systems for forward secrecy linear key agreements using non-secure shared communication media | |
CN109861956B (en) | Data verification system, method, device and equipment based on state channel | |
CN116318657A (en) | Relay key transmission method | |
CN111526197A (en) | Cloud data secure sharing method | |
US20100061550A1 (en) | Data processing apparatus | |
CN111698084B (en) | Block chain-based concealed communication method | |
CN109241754A (en) | A kind of cloud file data de-duplication method based on block chain | |
WO2020082226A1 (en) | Method and system for transferring data in a blockchain system | |
CN112989428B (en) | Rapid encryption storage method for alliance link data | |
CN117171779B (en) | Data processing device based on intersection protection | |
CN109214209A (en) | A kind of data transmission method for uplink, date storage method and device | |
CN112235101A (en) | Encoding method and device and decoding method and device based on hybrid encoding mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |