CN112667641A - Database system capable of recording addition, deletion and modification operations and implementation method - Google Patents
Database system capable of recording addition, deletion and modification operations and implementation method Download PDFInfo
- Publication number
- CN112667641A CN112667641A CN202110005215.2A CN202110005215A CN112667641A CN 112667641 A CN112667641 A CN 112667641A CN 202110005215 A CN202110005215 A CN 202110005215A CN 112667641 A CN112667641 A CN 112667641A
- Authority
- CN
- China
- Prior art keywords
- database
- participant
- deleting
- database system
- modifying operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000012217 deletion Methods 0.000 title claims description 10
- 230000037430 deletion Effects 0.000 title claims description 10
- 238000012986 modification Methods 0.000 title description 8
- 230000004048 modification Effects 0.000 title description 8
- 238000007792 addition Methods 0.000 title description 6
- 238000010276 construction Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a database system capable of recording the operation of increasing, deleting and modifying and a realization method thereof, relating to the field of databases, wherein the method comprises the following steps: the database is accessed into the permission chain to form a database system; after receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system identifies the database adding, deleting and modifying operation request; and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests. The embodiment of the invention can be compatible with the traditional database and realizes the credible cooperation of the database data based on the permission chain.
Description
Technical Field
The invention relates to the field of databases, in particular to a database system capable of recording operations of increasing, deleting and modifying and an implementation method thereof.
Background
Currently, popular databases include MySQL, Oracle, RocksDB, etc., which are centralized databases, and an operator has all rights of data, and can perform add, delete, modify and modify operations at any time without being known by users.
Disclosure of Invention
The database system capable of recording the operations of addition, deletion and modification and the implementation method provided by the embodiment of the invention at least solve the problem that the data of the databases such as MySQL, Oracle, RocksDB and the like is tampered but is unknown to the user.
The embodiment of the invention provides a database system realization method capable of recording the operation of adding, deleting and modifying, which comprises the following steps: the database is accessed into the permission chain to form a database system; after receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system identifies the database adding, deleting and modifying operation request; and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests.
Preferably, the method further comprises: before a database is connected into a permission chain to form a database system, the permission chain comprising a plurality of consensus nodes is constructed.
Preferably, the method further comprises: after forming the database system, a party identity and party rights are created for each party to the database system on the license chain.
Preferably, the method further comprises: and when receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system carries out signature authentication on the participant sending the database adding, deleting and modifying operation request according to the identity of the participant.
Preferably, the method further comprises: and after signature authentication is carried out on the participant sending the database adding, deleting and modifying operation request, determining whether the participant sending the database adding, deleting and modifying operation request has the database adding, deleting and modifying operation authority or not according to the participant authority.
The embodiment of the invention also provides a database system capable of recording the increasing, deleting and modifying operations, which comprises a database and a permission chain, wherein the database is accessed into the permission chain to form the database system, the permission chain identifies the database increasing, deleting and modifying operation requests after receiving the database increasing, deleting and modifying operation requests of the participator of the database system, and the database increasing, deleting and modifying operation requests are subjected to the increasing, deleting and modifying operation according to the database increasing, deleting and modifying operation requests after the database increasing, deleting and modifying operation requests pass the identification.
Preferably, the system further comprises: and the construction module is used for constructing the permission chain comprising a plurality of consensus nodes before the database is accessed into the permission chain to form a database system.
Preferably, the building module is further configured to create a participant identity and a participant right for each participant of the database system on the license chain after the database system is formed.
Preferably, the permission chain is further configured to, when receiving a database add-delete-modify operation request of a participant of the database system, perform signature authentication on the participant who sends the database add-delete-modify operation request according to the participant identity.
Preferably, the permission chain is further configured to determine, according to the authority of the participant, whether the participant who sends the database add-delete-modify operation request has the authority of the database add-delete-modify operation after performing signature authentication on the participant who sends the database add-delete-modify operation request.
The embodiment of the invention accesses the database into the permission chain to form a database system, identifies the database adding, deleting and modifying operation requests after receiving the database adding, deleting and modifying operation requests of the participants, and performs adding, deleting and modifying operation on the database after identifying, thereby being compatible with the traditional database, realizing credible cooperation on the database data based on the permission chain, and overcoming the problem that the prior art can perform adding, deleting and modifying operation on the database data at any time without being described by users.
Drawings
FIG. 1 is a schematic flow chart of a database system implementation method capable of recording add-delete-modify operations according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a database system capable of recording add/delete operations according to an embodiment of the present invention;
FIG. 3 is an architecture diagram of a database system provided by an embodiment of the present invention;
fig. 4 is a flowchart of a work flow of a participant applying for joining a database system according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and it should be understood that the preferred embodiments described below are only for the purpose of illustrating and explaining the present invention, and are not to be construed as limiting the present invention.
Fig. 1 is a schematic flowchart of an implementation method of a database system capable of recording add/delete operations according to an embodiment of the present invention, and as shown in fig. 1, the method may include:
step S101: and (4) accessing the database into the permission chain to form a database system.
The database can be MySQL, Oracle, RocksDB, and the like.
Before the step S101, the method may further include: before a database is connected into a permission chain to form a database system, the permission chain comprising a plurality of consensus nodes is constructed.
Step S102: after receiving the database adding, deleting and modifying operation requests of the participants of the database system, the database system identifies the database adding, modifying and modifying operation requests.
The database system identifies the database add-delete-modify-operation requests, specifically, the permission chain identifies the database add-delete-modify-operation requests, and an existing consensus algorithm, such as a workload certificate (Pow), a practical byzantine fault-tolerant algorithm (PBFT), can be adopted, and operations after the permission chain identifies, whether correct or wrong, can be recorded by the permission chain, and related parties can inquire in a full link.
Step S103: and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests.
The method of the embodiment can be compatible with the traditional database, and any adding, deleting and modifying operation of the database data, which is made by the participant based on the permission chain, can be recorded by the permission chain for query after being identified by the permission chain, thereby overcoming the problem that the prior art can carry out adding, deleting and modifying operation on the database data at any time without being described for users.
Further, after the step S101, the method further includes: a party identity is created for each party to the database system on the license chain. In this way, when receiving a database add, delete and modify operation request of a participant of the database system, the database system may perform signature authentication on the participant who sends the database add, delete and modify operation request according to the identity of the participant, and specifically, may perform authentication by using an existing signature verification technology.
The method of the embodiment can improve the user authentication strength by performing signature authentication on the participant who sends the database addition, deletion and modification operation request.
Further, after the step S101, the method further includes: and setting participant authority for each participant of the database system on the license chain. In this way, after signature authentication is performed on the participant who sends the database add/delete/modify operation request, it may be further determined whether the participant who sends the database add/delete/modify operation request has the database add/delete/modify operation authority according to the participant authority, and when the participant has the database add/delete/modify operation authority, the implementation step S103 is performed.
The embodiment can set different permissions for different participants, for example, a participant with higher permission can create, delete, query a database, a table, and the like, a participant with lower permission can query database, table, and table data, the permission level setting is not limited to higher and lower, and multiple levels can be set according to actual conditions.
Correspondingly, an embodiment of the present invention further provides a database system capable of recording an add/delete/modify operation, and as shown in the structural schematic diagram shown in fig. 2, the system may include a database and a permission chain, where the database is accessed to the permission chain to form a database system, the permission chain identifies the database add/delete/modify operation request after receiving the database add/delete/modify operation request of a participant of the database system, and performs an add/delete/modify operation on the database according to the database add/delete/modify operation request after the database add/delete/modify operation request passes the identification.
The database can be MySQL, Oracle, RocksDB and other databases.
The permission chain may adopt an existing consensus algorithm, such as a workload certification (Pow), a practical byzantine fault-tolerant algorithm (PBFT), etc., to perform consensus on the database addition/deletion modification operation requests, and operations after the consensus of the permission chain are recorded by the permission chain regardless of whether the operations are correct or incorrect, and a relevant party may query the permission chain in a full link manner.
The system of the embodiment can be compatible with the traditional database, and any adding, deleting and modifying operation of the database data, which is made by the participant based on the permission chain, can be recorded by the permission chain for query after being identified by the permission chain, so that the problem that the prior art can carry out adding, deleting and modifying operation on the database data at any time without being used by a user is solved.
Further, the system may further include: and the construction module is used for constructing the permission chain comprising a plurality of consensus nodes before the database is accessed into the permission chain to form a database system.
Further, the building module is further configured to create a participant identity and participant rights for each participant of the database system on the license chain after the database system is formed. In this way, when receiving a database add/delete/modify operation request of a participant of the database system, the permission chain may perform signature authentication on the participant who has issued the database add/delete/modify operation request according to the identity of the participant, for example, perform authentication by using an existing signature verification technology.
The system of the embodiment can improve the user authentication strength by performing signature authentication on the participant who sends the database addition, deletion and modification operation request.
Further, the building module is further configured to set a participant right for each participant of the database system on the license chain after the database system is formed. In this way, the permission chain may further determine, according to the authority of the participant, whether the participant who sends the database add, delete and modify operation request has the authority of the database add, delete and modify operation after performing signature authentication on the participant who sends the database add, delete and modify operation request, and perform add, delete and modify operation on the database when the participant has the authority of the database add, delete and modify operation.
The building module of this embodiment may be set in a participant as an operating organization, and may set different permissions for different participants, for example, a participant with a higher permission may create, delete, query a database, a table, and the like, a participant with a lower permission may query a database, a table, and table data, the permission level setting is not limited to the higher and lower, and multiple levels may be set according to an actual situation.
This is explained in detail below with reference to fig. 3 and 4.
Fig. 3 is an architecture diagram of a database system provided by an embodiment of the present invention, as shown in fig. 3,
the permission chain is a union block chain commonly maintained by the participants, has a strict admission mechanism, and is characterized in that the operations of adding, deleting and modifying data by any participant are commonly known and recorded, and if one participant modifies the data of the other participant, the participant can sense the data for the first time. Based on the characteristics of the permission chain, the invention constructs a set of database system on the permission chain, supports the creation, deletion and query of the database, the creation, deletion and query of the table, and the insertion, deletion, update and query of the table data.
One or more consensus nodes of the license chain, for example consensus node F1.1, can receive transactions provided by each participant, store the transactions, execute the transactions, and forward the transactions.
And aiming at a certain application scene, a certain mechanism initiates the operation, combines a plurality of participants under the scene to elect an operation mechanism, establishes the permission chain by the mechanism, and undertakes the work of identity application and quitting, permission granting and revoking, service system establishment, system maintenance and management, dispute handling and the like of the participants at the later stage. There are a number of participants in the license chain as shown in fig. 3, where a participant F1.2 has a special role, which can receive the identity applications of other participants, create an identity for it on the license chain, and grant certain rights.
The embodiment solves the problem that an operator can freely add, delete and modify data in the database without being known by a user through the database system based on the permission chain, wherein the database system can record the adding, deleting and modifying operations of the database.
Taking the write operation of the database as an example, the main flow of the write operation of the currently popular databases MySQL, Oracle and RocksDB is as follows: 1. user authentication, namely authenticating by using a user name and a password; 2. lexical analysis, syntactic analysis and semantic analysis; 3. the write operation is performed directly. After the database system shown in fig. 3 is adopted, the main flow of the write operation of the databases MySQL, Oracle and RocksDB is as follows: 1. the user authentication is carried out by using a signature verification technology, and the intensity is very high; 2. lexical analysis, syntactic analysis and semantic analysis; 3. the write operation passes the consensus and can be finally written into the database. Therefore, the write operation is commonly identified through the permission chain, the write operation can be recorded on the permission chain, in addition, in the user authentication stage, the user authentication strength is improved by adopting the signature verification technology, and the problem that the authentication strength in the prior art is insufficient is solved.
Fig. 4 is a flowchart of a work flow of a participant applying for joining a database system according to an embodiment of the present invention, as shown in fig. 4, including the following steps:
step S401: the operator builds a chain of permissions.
Step S402: the participant submits an application to join the license chain.
Step S403: the operator creates participant identities on the chain.
Step S404: the operator authorizes the related rights of the participants, such as: rights to database creation, rights to table creation, etc.
Step S405: the participant can configure the type of the relevant operation on the listening chain by himself.
In the compatible traditional database of the embodiment, the access threshold of the participating party (or the data owning party) is low, the participating party (or the data owning party) can operate own data like the traditional database, and can ensure that the own data is not arbitrarily tampered by other people, and meanwhile, the dynamic perception of the data is ensured, and the credible cooperation of the data is realized.
Although the present invention has been described in detail hereinabove, the present invention is not limited thereto, and various modifications can be made by those skilled in the art in light of the principle of the present invention. Thus, modifications made in accordance with the principles of the present invention should be understood to fall within the scope of the present invention.
Claims (10)
1. A method for implementing a database system capable of recording incremental deletion operations, the method comprising:
the database is accessed into the permission chain to form a database system;
after receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system identifies the database adding, deleting and modifying operation request;
and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests.
2. The method of claim 1, further comprising:
before a database is connected into a permission chain to form a database system, the permission chain comprising a plurality of consensus nodes is constructed.
3. The method of claim 2, further comprising:
after forming the database system, a party identity and party rights are created for each party to the database system on the license chain.
4. The method of claim 3, further comprising:
and when receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system carries out signature authentication on the participant sending the database adding, deleting and modifying operation request according to the identity of the participant.
5. The method of claim 4, further comprising:
and after signature authentication is carried out on the participant sending the database adding, deleting and modifying operation request, determining whether the participant sending the database adding, deleting and modifying operation request has the database adding, deleting and modifying operation authority or not according to the participant authority.
6. The database system capable of recording the increasing, deleting and modifying operations is characterized by comprising a database and a permission chain, wherein the database is accessed into the permission chain to form the database system, the permission chain identifies the database increasing, deleting and modifying operation requests after receiving the database increasing, deleting and modifying operation requests of the participators of the database system, and the database increasing, deleting and modifying operation is carried out on the database according to the database increasing, deleting and modifying operation requests after the database increasing, deleting and modifying operation requests pass the identification.
7. The system of claim 6, further comprising:
and the construction module is used for constructing the permission chain comprising a plurality of consensus nodes before the database is accessed into the permission chain to form a database system.
8. The system of claim 7, wherein the build module is further configured to create a participant identity and participant rights for each participant of the database system on the license chain after the database system is formed.
9. The system according to claim 8, wherein the permission chain is further configured to, when receiving a database add/delete operation request from a participant of the database system, perform signature authentication on the participant who issued the database add/delete operation request according to the participant identity.
10. The system according to claim 9, wherein the permission chain is further configured to determine whether the participant issuing the database add/delete/modify operation request has a database add/delete/modify operation right according to the participant right after signature authentication of the participant issuing the database add/delete/modify operation request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110005215.2A CN112667641A (en) | 2021-01-05 | 2021-01-05 | Database system capable of recording addition, deletion and modification operations and implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110005215.2A CN112667641A (en) | 2021-01-05 | 2021-01-05 | Database system capable of recording addition, deletion and modification operations and implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112667641A true CN112667641A (en) | 2021-04-16 |
Family
ID=75412765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110005215.2A Pending CN112667641A (en) | 2021-01-05 | 2021-01-05 | Database system capable of recording addition, deletion and modification operations and implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112667641A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480555A (en) * | 2017-08-01 | 2017-12-15 | 中国联合网络通信集团有限公司 | Database-access rights control method and equipment based on block chain |
CN108694189A (en) * | 2017-04-07 | 2018-10-23 | 微软技术许可有限责任公司 | The management of the Database Systems of co-ownership |
CN109241181A (en) * | 2018-08-08 | 2019-01-18 | 北京百度网讯科技有限公司 | Database operation method and device |
CN110008216A (en) * | 2019-04-02 | 2019-07-12 | 北京众享比特科技有限公司 | Database table operating method, device, equipment and storage medium based on block chain |
CN111241589A (en) * | 2018-11-29 | 2020-06-05 | 华为技术有限公司 | Database system, node and method |
WO2020113314A1 (en) * | 2018-12-04 | 2020-06-11 | Zeu Crypto Networks Inc. | System and method for augmenting database applications with blockchain technology |
CN111427869A (en) * | 2020-04-10 | 2020-07-17 | 科通工业技术(深圳)有限公司 | Log system based on block chain |
CN111680105A (en) * | 2020-06-15 | 2020-09-18 | 浙江创邻科技有限公司 | Block chain-based distributed relational database management method and system |
-
2021
- 2021-01-05 CN CN202110005215.2A patent/CN112667641A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108694189A (en) * | 2017-04-07 | 2018-10-23 | 微软技术许可有限责任公司 | The management of the Database Systems of co-ownership |
CN107480555A (en) * | 2017-08-01 | 2017-12-15 | 中国联合网络通信集团有限公司 | Database-access rights control method and equipment based on block chain |
CN109241181A (en) * | 2018-08-08 | 2019-01-18 | 北京百度网讯科技有限公司 | Database operation method and device |
CN111241589A (en) * | 2018-11-29 | 2020-06-05 | 华为技术有限公司 | Database system, node and method |
WO2020113314A1 (en) * | 2018-12-04 | 2020-06-11 | Zeu Crypto Networks Inc. | System and method for augmenting database applications with blockchain technology |
CN110008216A (en) * | 2019-04-02 | 2019-07-12 | 北京众享比特科技有限公司 | Database table operating method, device, equipment and storage medium based on block chain |
CN111427869A (en) * | 2020-04-10 | 2020-07-17 | 科通工业技术(深圳)有限公司 | Log system based on block chain |
CN111680105A (en) * | 2020-06-15 | 2020-09-18 | 浙江创邻科技有限公司 | Block chain-based distributed relational database management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110990408B (en) | Business information collaboration method based on block chain, business system and alliance chain | |
CN110109930A (en) | Government data storage, querying method and system based on block chain duplex structure | |
CN107579958B (en) | Data management method, device and system | |
US5220604A (en) | Method for performing group exclusion in hierarchical group structures | |
CN112559627B (en) | Method for sharing electronic medical record data in cooperation with each other on chain and under chain based on alliance chain | |
CN110069475B (en) | Manufacturing industry cross-data entity tracing method based on block chain multi-party self-maintenance | |
CN108197959B (en) | Block chain-based rapid verification pool, rapid verification system and operation method | |
WO2019184155A1 (en) | Blockchain node authority control method, blockchain system and storage medium | |
CN111783128B (en) | Verifiable distributed database access control method | |
CN111695108B (en) | Unified account identification system for multi-source accounts in heterogeneous computing environment | |
CN114424182A (en) | Block chain database management system | |
CN111221914A (en) | Data exchange sharing tracing method based on block chain | |
CN107145531B (en) | Distributed file system and user management method of distributed file system | |
KR102564106B1 (en) | System and Method for Intelligent mediating based enhanced smart contract for privacy protection | |
TWI829219B (en) | De-centralized data authorization control system capable of transferring read token from block chain subsystem to data requester device | |
CN114357490A (en) | Data sharing method, device and system based on block chain | |
CN113986865A (en) | Cross-department service collaboration system and method based on block chain | |
CN113271366B (en) | Data sharing system based on block chain and safety calculation | |
CN113420320A (en) | Block chain authority management method and system under data sharing scene | |
CN112667641A (en) | Database system capable of recording addition, deletion and modification operations and implementation method | |
CN113794565A (en) | Multi-party collaborative authority delegation method and system based on ring signature | |
CN111402104B (en) | Block chain-based public security data management platform and method | |
KR102294569B1 (en) | Block Chain Management System To Build Block Chain Network | |
CN113904875B (en) | Multi-chain fusion authority control system based on block chain | |
CN111064695A (en) | Authentication method and authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |