CN112667641A - Database system capable of recording addition, deletion and modification operations and implementation method - Google Patents

Database system capable of recording addition, deletion and modification operations and implementation method Download PDF

Info

Publication number
CN112667641A
CN112667641A CN202110005215.2A CN202110005215A CN112667641A CN 112667641 A CN112667641 A CN 112667641A CN 202110005215 A CN202110005215 A CN 202110005215A CN 112667641 A CN112667641 A CN 112667641A
Authority
CN
China
Prior art keywords
database
participant
deleting
database system
modifying operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110005215.2A
Other languages
Chinese (zh)
Inventor
杨向军
汪小八
狄斌
张晓光
聂大伟
张宗芹
缪旭
冯煜
刘瑞虹
范江坤
高莎
李宏
陈海波
范贵甫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongchao Credit Card Industry Development Co ltd
Original Assignee
Zhongchao Credit Card Industry Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongchao Credit Card Industry Development Co ltd filed Critical Zhongchao Credit Card Industry Development Co ltd
Priority to CN202110005215.2A priority Critical patent/CN112667641A/en
Publication of CN112667641A publication Critical patent/CN112667641A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a database system capable of recording the operation of increasing, deleting and modifying and a realization method thereof, relating to the field of databases, wherein the method comprises the following steps: the database is accessed into the permission chain to form a database system; after receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system identifies the database adding, deleting and modifying operation request; and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests. The embodiment of the invention can be compatible with the traditional database and realizes the credible cooperation of the database data based on the permission chain.

Description

Database system capable of recording addition, deletion and modification operations and implementation method
Technical Field
The invention relates to the field of databases, in particular to a database system capable of recording operations of increasing, deleting and modifying and an implementation method thereof.
Background
Currently, popular databases include MySQL, Oracle, RocksDB, etc., which are centralized databases, and an operator has all rights of data, and can perform add, delete, modify and modify operations at any time without being known by users.
Disclosure of Invention
The database system capable of recording the operations of addition, deletion and modification and the implementation method provided by the embodiment of the invention at least solve the problem that the data of the databases such as MySQL, Oracle, RocksDB and the like is tampered but is unknown to the user.
The embodiment of the invention provides a database system realization method capable of recording the operation of adding, deleting and modifying, which comprises the following steps: the database is accessed into the permission chain to form a database system; after receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system identifies the database adding, deleting and modifying operation request; and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests.
Preferably, the method further comprises: before a database is connected into a permission chain to form a database system, the permission chain comprising a plurality of consensus nodes is constructed.
Preferably, the method further comprises: after forming the database system, a party identity and party rights are created for each party to the database system on the license chain.
Preferably, the method further comprises: and when receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system carries out signature authentication on the participant sending the database adding, deleting and modifying operation request according to the identity of the participant.
Preferably, the method further comprises: and after signature authentication is carried out on the participant sending the database adding, deleting and modifying operation request, determining whether the participant sending the database adding, deleting and modifying operation request has the database adding, deleting and modifying operation authority or not according to the participant authority.
The embodiment of the invention also provides a database system capable of recording the increasing, deleting and modifying operations, which comprises a database and a permission chain, wherein the database is accessed into the permission chain to form the database system, the permission chain identifies the database increasing, deleting and modifying operation requests after receiving the database increasing, deleting and modifying operation requests of the participator of the database system, and the database increasing, deleting and modifying operation requests are subjected to the increasing, deleting and modifying operation according to the database increasing, deleting and modifying operation requests after the database increasing, deleting and modifying operation requests pass the identification.
Preferably, the system further comprises: and the construction module is used for constructing the permission chain comprising a plurality of consensus nodes before the database is accessed into the permission chain to form a database system.
Preferably, the building module is further configured to create a participant identity and a participant right for each participant of the database system on the license chain after the database system is formed.
Preferably, the permission chain is further configured to, when receiving a database add-delete-modify operation request of a participant of the database system, perform signature authentication on the participant who sends the database add-delete-modify operation request according to the participant identity.
Preferably, the permission chain is further configured to determine, according to the authority of the participant, whether the participant who sends the database add-delete-modify operation request has the authority of the database add-delete-modify operation after performing signature authentication on the participant who sends the database add-delete-modify operation request.
The embodiment of the invention accesses the database into the permission chain to form a database system, identifies the database adding, deleting and modifying operation requests after receiving the database adding, deleting and modifying operation requests of the participants, and performs adding, deleting and modifying operation on the database after identifying, thereby being compatible with the traditional database, realizing credible cooperation on the database data based on the permission chain, and overcoming the problem that the prior art can perform adding, deleting and modifying operation on the database data at any time without being described by users.
Drawings
FIG. 1 is a schematic flow chart of a database system implementation method capable of recording add-delete-modify operations according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a database system capable of recording add/delete operations according to an embodiment of the present invention;
FIG. 3 is an architecture diagram of a database system provided by an embodiment of the present invention;
fig. 4 is a flowchart of a work flow of a participant applying for joining a database system according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and it should be understood that the preferred embodiments described below are only for the purpose of illustrating and explaining the present invention, and are not to be construed as limiting the present invention.
Fig. 1 is a schematic flowchart of an implementation method of a database system capable of recording add/delete operations according to an embodiment of the present invention, and as shown in fig. 1, the method may include:
step S101: and (4) accessing the database into the permission chain to form a database system.
The database can be MySQL, Oracle, RocksDB, and the like.
Before the step S101, the method may further include: before a database is connected into a permission chain to form a database system, the permission chain comprising a plurality of consensus nodes is constructed.
Step S102: after receiving the database adding, deleting and modifying operation requests of the participants of the database system, the database system identifies the database adding, modifying and modifying operation requests.
The database system identifies the database add-delete-modify-operation requests, specifically, the permission chain identifies the database add-delete-modify-operation requests, and an existing consensus algorithm, such as a workload certificate (Pow), a practical byzantine fault-tolerant algorithm (PBFT), can be adopted, and operations after the permission chain identifies, whether correct or wrong, can be recorded by the permission chain, and related parties can inquire in a full link.
Step S103: and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests.
The method of the embodiment can be compatible with the traditional database, and any adding, deleting and modifying operation of the database data, which is made by the participant based on the permission chain, can be recorded by the permission chain for query after being identified by the permission chain, thereby overcoming the problem that the prior art can carry out adding, deleting and modifying operation on the database data at any time without being described for users.
Further, after the step S101, the method further includes: a party identity is created for each party to the database system on the license chain. In this way, when receiving a database add, delete and modify operation request of a participant of the database system, the database system may perform signature authentication on the participant who sends the database add, delete and modify operation request according to the identity of the participant, and specifically, may perform authentication by using an existing signature verification technology.
The method of the embodiment can improve the user authentication strength by performing signature authentication on the participant who sends the database addition, deletion and modification operation request.
Further, after the step S101, the method further includes: and setting participant authority for each participant of the database system on the license chain. In this way, after signature authentication is performed on the participant who sends the database add/delete/modify operation request, it may be further determined whether the participant who sends the database add/delete/modify operation request has the database add/delete/modify operation authority according to the participant authority, and when the participant has the database add/delete/modify operation authority, the implementation step S103 is performed.
The embodiment can set different permissions for different participants, for example, a participant with higher permission can create, delete, query a database, a table, and the like, a participant with lower permission can query database, table, and table data, the permission level setting is not limited to higher and lower, and multiple levels can be set according to actual conditions.
Correspondingly, an embodiment of the present invention further provides a database system capable of recording an add/delete/modify operation, and as shown in the structural schematic diagram shown in fig. 2, the system may include a database and a permission chain, where the database is accessed to the permission chain to form a database system, the permission chain identifies the database add/delete/modify operation request after receiving the database add/delete/modify operation request of a participant of the database system, and performs an add/delete/modify operation on the database according to the database add/delete/modify operation request after the database add/delete/modify operation request passes the identification.
The database can be MySQL, Oracle, RocksDB and other databases.
The permission chain may adopt an existing consensus algorithm, such as a workload certification (Pow), a practical byzantine fault-tolerant algorithm (PBFT), etc., to perform consensus on the database addition/deletion modification operation requests, and operations after the consensus of the permission chain are recorded by the permission chain regardless of whether the operations are correct or incorrect, and a relevant party may query the permission chain in a full link manner.
The system of the embodiment can be compatible with the traditional database, and any adding, deleting and modifying operation of the database data, which is made by the participant based on the permission chain, can be recorded by the permission chain for query after being identified by the permission chain, so that the problem that the prior art can carry out adding, deleting and modifying operation on the database data at any time without being used by a user is solved.
Further, the system may further include: and the construction module is used for constructing the permission chain comprising a plurality of consensus nodes before the database is accessed into the permission chain to form a database system.
Further, the building module is further configured to create a participant identity and participant rights for each participant of the database system on the license chain after the database system is formed. In this way, when receiving a database add/delete/modify operation request of a participant of the database system, the permission chain may perform signature authentication on the participant who has issued the database add/delete/modify operation request according to the identity of the participant, for example, perform authentication by using an existing signature verification technology.
The system of the embodiment can improve the user authentication strength by performing signature authentication on the participant who sends the database addition, deletion and modification operation request.
Further, the building module is further configured to set a participant right for each participant of the database system on the license chain after the database system is formed. In this way, the permission chain may further determine, according to the authority of the participant, whether the participant who sends the database add, delete and modify operation request has the authority of the database add, delete and modify operation after performing signature authentication on the participant who sends the database add, delete and modify operation request, and perform add, delete and modify operation on the database when the participant has the authority of the database add, delete and modify operation.
The building module of this embodiment may be set in a participant as an operating organization, and may set different permissions for different participants, for example, a participant with a higher permission may create, delete, query a database, a table, and the like, a participant with a lower permission may query a database, a table, and table data, the permission level setting is not limited to the higher and lower, and multiple levels may be set according to an actual situation.
This is explained in detail below with reference to fig. 3 and 4.
Fig. 3 is an architecture diagram of a database system provided by an embodiment of the present invention, as shown in fig. 3,
the permission chain is a union block chain commonly maintained by the participants, has a strict admission mechanism, and is characterized in that the operations of adding, deleting and modifying data by any participant are commonly known and recorded, and if one participant modifies the data of the other participant, the participant can sense the data for the first time. Based on the characteristics of the permission chain, the invention constructs a set of database system on the permission chain, supports the creation, deletion and query of the database, the creation, deletion and query of the table, and the insertion, deletion, update and query of the table data.
One or more consensus nodes of the license chain, for example consensus node F1.1, can receive transactions provided by each participant, store the transactions, execute the transactions, and forward the transactions.
And aiming at a certain application scene, a certain mechanism initiates the operation, combines a plurality of participants under the scene to elect an operation mechanism, establishes the permission chain by the mechanism, and undertakes the work of identity application and quitting, permission granting and revoking, service system establishment, system maintenance and management, dispute handling and the like of the participants at the later stage. There are a number of participants in the license chain as shown in fig. 3, where a participant F1.2 has a special role, which can receive the identity applications of other participants, create an identity for it on the license chain, and grant certain rights.
The embodiment solves the problem that an operator can freely add, delete and modify data in the database without being known by a user through the database system based on the permission chain, wherein the database system can record the adding, deleting and modifying operations of the database.
Taking the write operation of the database as an example, the main flow of the write operation of the currently popular databases MySQL, Oracle and RocksDB is as follows: 1. user authentication, namely authenticating by using a user name and a password; 2. lexical analysis, syntactic analysis and semantic analysis; 3. the write operation is performed directly. After the database system shown in fig. 3 is adopted, the main flow of the write operation of the databases MySQL, Oracle and RocksDB is as follows: 1. the user authentication is carried out by using a signature verification technology, and the intensity is very high; 2. lexical analysis, syntactic analysis and semantic analysis; 3. the write operation passes the consensus and can be finally written into the database. Therefore, the write operation is commonly identified through the permission chain, the write operation can be recorded on the permission chain, in addition, in the user authentication stage, the user authentication strength is improved by adopting the signature verification technology, and the problem that the authentication strength in the prior art is insufficient is solved.
Fig. 4 is a flowchart of a work flow of a participant applying for joining a database system according to an embodiment of the present invention, as shown in fig. 4, including the following steps:
step S401: the operator builds a chain of permissions.
Step S402: the participant submits an application to join the license chain.
Step S403: the operator creates participant identities on the chain.
Step S404: the operator authorizes the related rights of the participants, such as: rights to database creation, rights to table creation, etc.
Step S405: the participant can configure the type of the relevant operation on the listening chain by himself.
In the compatible traditional database of the embodiment, the access threshold of the participating party (or the data owning party) is low, the participating party (or the data owning party) can operate own data like the traditional database, and can ensure that the own data is not arbitrarily tampered by other people, and meanwhile, the dynamic perception of the data is ensured, and the credible cooperation of the data is realized.
Although the present invention has been described in detail hereinabove, the present invention is not limited thereto, and various modifications can be made by those skilled in the art in light of the principle of the present invention. Thus, modifications made in accordance with the principles of the present invention should be understood to fall within the scope of the present invention.

Claims (10)

1. A method for implementing a database system capable of recording incremental deletion operations, the method comprising:
the database is accessed into the permission chain to form a database system;
after receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system identifies the database adding, deleting and modifying operation request;
and after the database adding, deleting and modifying operation requests pass consensus, the database system performs adding, deleting and modifying operation on the database according to the database adding, deleting and modifying operation requests.
2. The method of claim 1, further comprising:
before a database is connected into a permission chain to form a database system, the permission chain comprising a plurality of consensus nodes is constructed.
3. The method of claim 2, further comprising:
after forming the database system, a party identity and party rights are created for each party to the database system on the license chain.
4. The method of claim 3, further comprising:
and when receiving a database adding, deleting and modifying operation request of a participant of the database system, the database system carries out signature authentication on the participant sending the database adding, deleting and modifying operation request according to the identity of the participant.
5. The method of claim 4, further comprising:
and after signature authentication is carried out on the participant sending the database adding, deleting and modifying operation request, determining whether the participant sending the database adding, deleting and modifying operation request has the database adding, deleting and modifying operation authority or not according to the participant authority.
6. The database system capable of recording the increasing, deleting and modifying operations is characterized by comprising a database and a permission chain, wherein the database is accessed into the permission chain to form the database system, the permission chain identifies the database increasing, deleting and modifying operation requests after receiving the database increasing, deleting and modifying operation requests of the participators of the database system, and the database increasing, deleting and modifying operation is carried out on the database according to the database increasing, deleting and modifying operation requests after the database increasing, deleting and modifying operation requests pass the identification.
7. The system of claim 6, further comprising:
and the construction module is used for constructing the permission chain comprising a plurality of consensus nodes before the database is accessed into the permission chain to form a database system.
8. The system of claim 7, wherein the build module is further configured to create a participant identity and participant rights for each participant of the database system on the license chain after the database system is formed.
9. The system according to claim 8, wherein the permission chain is further configured to, when receiving a database add/delete operation request from a participant of the database system, perform signature authentication on the participant who issued the database add/delete operation request according to the participant identity.
10. The system according to claim 9, wherein the permission chain is further configured to determine whether the participant issuing the database add/delete/modify operation request has a database add/delete/modify operation right according to the participant right after signature authentication of the participant issuing the database add/delete/modify operation request.
CN202110005215.2A 2021-01-05 2021-01-05 Database system capable of recording addition, deletion and modification operations and implementation method Pending CN112667641A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110005215.2A CN112667641A (en) 2021-01-05 2021-01-05 Database system capable of recording addition, deletion and modification operations and implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110005215.2A CN112667641A (en) 2021-01-05 2021-01-05 Database system capable of recording addition, deletion and modification operations and implementation method

Publications (1)

Publication Number Publication Date
CN112667641A true CN112667641A (en) 2021-04-16

Family

ID=75412765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110005215.2A Pending CN112667641A (en) 2021-01-05 2021-01-05 Database system capable of recording addition, deletion and modification operations and implementation method

Country Status (1)

Country Link
CN (1) CN112667641A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN108694189A (en) * 2017-04-07 2018-10-23 微软技术许可有限责任公司 The management of the Database Systems of co-ownership
CN109241181A (en) * 2018-08-08 2019-01-18 北京百度网讯科技有限公司 Database operation method and device
CN110008216A (en) * 2019-04-02 2019-07-12 北京众享比特科技有限公司 Database table operating method, device, equipment and storage medium based on block chain
CN111241589A (en) * 2018-11-29 2020-06-05 华为技术有限公司 Database system, node and method
WO2020113314A1 (en) * 2018-12-04 2020-06-11 Zeu Crypto Networks Inc. System and method for augmenting database applications with blockchain technology
CN111427869A (en) * 2020-04-10 2020-07-17 科通工业技术(深圳)有限公司 Log system based on block chain
CN111680105A (en) * 2020-06-15 2020-09-18 浙江创邻科技有限公司 Block chain-based distributed relational database management method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694189A (en) * 2017-04-07 2018-10-23 微软技术许可有限责任公司 The management of the Database Systems of co-ownership
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN109241181A (en) * 2018-08-08 2019-01-18 北京百度网讯科技有限公司 Database operation method and device
CN111241589A (en) * 2018-11-29 2020-06-05 华为技术有限公司 Database system, node and method
WO2020113314A1 (en) * 2018-12-04 2020-06-11 Zeu Crypto Networks Inc. System and method for augmenting database applications with blockchain technology
CN110008216A (en) * 2019-04-02 2019-07-12 北京众享比特科技有限公司 Database table operating method, device, equipment and storage medium based on block chain
CN111427869A (en) * 2020-04-10 2020-07-17 科通工业技术(深圳)有限公司 Log system based on block chain
CN111680105A (en) * 2020-06-15 2020-09-18 浙江创邻科技有限公司 Block chain-based distributed relational database management method and system

Similar Documents

Publication Publication Date Title
CN110990408B (en) Business information collaboration method based on block chain, business system and alliance chain
CN110109930A (en) Government data storage, querying method and system based on block chain duplex structure
CN107579958B (en) Data management method, device and system
US5220604A (en) Method for performing group exclusion in hierarchical group structures
CN112559627B (en) Method for sharing electronic medical record data in cooperation with each other on chain and under chain based on alliance chain
CN110069475B (en) Manufacturing industry cross-data entity tracing method based on block chain multi-party self-maintenance
CN108197959B (en) Block chain-based rapid verification pool, rapid verification system and operation method
WO2019184155A1 (en) Blockchain node authority control method, blockchain system and storage medium
CN111783128B (en) Verifiable distributed database access control method
CN111695108B (en) Unified account identification system for multi-source accounts in heterogeneous computing environment
CN114424182A (en) Block chain database management system
CN111221914A (en) Data exchange sharing tracing method based on block chain
CN107145531B (en) Distributed file system and user management method of distributed file system
KR102564106B1 (en) System and Method for Intelligent mediating based enhanced smart contract for privacy protection
TWI829219B (en) De-centralized data authorization control system capable of transferring read token from block chain subsystem to data requester device
CN114357490A (en) Data sharing method, device and system based on block chain
CN113986865A (en) Cross-department service collaboration system and method based on block chain
CN113271366B (en) Data sharing system based on block chain and safety calculation
CN113420320A (en) Block chain authority management method and system under data sharing scene
CN112667641A (en) Database system capable of recording addition, deletion and modification operations and implementation method
CN113794565A (en) Multi-party collaborative authority delegation method and system based on ring signature
CN111402104B (en) Block chain-based public security data management platform and method
KR102294569B1 (en) Block Chain Management System To Build Block Chain Network
CN113904875B (en) Multi-chain fusion authority control system based on block chain
CN111064695A (en) Authentication method and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination