CN112702354A - Data resource sharing tracing method and device based on block chain technology - Google Patents

Data resource sharing tracing method and device based on block chain technology Download PDF

Info

Publication number
CN112702354A
CN112702354A CN202011592929.XA CN202011592929A CN112702354A CN 112702354 A CN112702354 A CN 112702354A CN 202011592929 A CN202011592929 A CN 202011592929A CN 112702354 A CN112702354 A CN 112702354A
Authority
CN
China
Prior art keywords
data
node
unit
approval
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011592929.XA
Other languages
Chinese (zh)
Other versions
CN112702354B (en
Inventor
崔琪
王宏刚
刘识
王倩
简燕红
张海峰
米娜
孙明月
马寒梅
邓祥瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Big Data Center Of State Grid Corp Of China
Original Assignee
Big Data Center Of State Grid Corp Of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Big Data Center Of State Grid Corp Of China filed Critical Big Data Center Of State Grid Corp Of China
Priority to CN202011592929.XA priority Critical patent/CN112702354B/en
Publication of CN112702354A publication Critical patent/CN112702354A/en
Application granted granted Critical
Publication of CN112702354B publication Critical patent/CN112702354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data resource sharing tracing method and a device based on a block chain technology, wherein the method comprises the following steps: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node; when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be linked; encrypting the data to be uplink transmitted based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. In the process, after the approval is passed, the data to be uplink is encrypted based on the public key of the first unit node to obtain the second target data, and the second target data is sent to the first unit node, and is encrypted and sent, so that the data security of the data to be uplink in the sharing process is ensured.

Description

Data resource sharing tracing method and device based on block chain technology
Technical Field
The invention relates to the technical field of block chains, in particular to a data resource sharing tracing method and device based on a block chain technology.
Background
In a blockchain distributed system, the existing method of data sharing is generally performed by: the data provider issues data description information to the block chain, namely plaintext data is encrypted by adopting a Hash algorithm, the Hash result of the plaintext is stored on the block chain, and the plaintext data is stored under the chain; the data demand party acquires data description information issued by a data provider from the block chain, selects target data, issues a data permission request to the block chain, the data provider conducts permission approval on the data permission request issued by the data demand party according to a specific rule, and if the permission approval is passed, an access permission is directly opened to the data demand party; and downloading the Hash ciphertext prestored in the data from the block chain, checking the plaintext, and requesting the plaintext data through a point-to-point secure communication channel under the chain or on the chain.
The current data sharing method is to directly open access rights to a data demand party after a data provider agrees, wherein the security processing of data sharing is not considered, and thus the data security cannot be ensured.
Disclosure of Invention
In view of the above, the present invention provides a data resource sharing tracing method and apparatus based on a block chain technology, so as to solve the problem that in the data sharing method in the prior art, an access right is directly opened to a data demander after a data provider agrees, and the security processing of data sharing is not considered, so that the data security cannot be ensured. The specific scheme is as follows:
a data resource sharing tracing method based on a block chain technology is applied to a block chain, and the block chain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the method comprising:
when the first unit node sends a sharing request for first target data, the sharing request is approved based on the supervising node and the second unit node, wherein the first target data is obtained by encrypting data to be uplink-linked based on a first private key of the supervising node, and the data to be uplink-linked at least comprises data of the second unit node;
when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be uplink;
encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink.
In the foregoing method, optionally, the block chain further includes: the method comprises the steps of obtaining an operation log chain, wherein a hash value corresponding to the operation log after preset operation is performed on block data in a block chain is stored in the operation log chain, and the hash value is associated with the corresponding block data in the block chain;
when a tracing request for target block data is received, acquiring a target hash value corresponding to the target block data;
acquiring a target operation log corresponding to the target hash value based on the operation log chain;
and tracing the target block data based on the target operation log.
Optionally, in the method, when the first unit node sends a sharing request for the first target data, the examining and approving the sharing request based on the supervising node and the second unit node includes:
meanwhile, the sharing request is approved based on the second unit node and the inspection point supervision node to obtain a first approval result and a second approval result;
comparing the first approval result with the second approval result;
and when the first approval result and the second approval result are approved, judging that the sharing request is approved.
Optionally, in the method, when the first unit node sends a sharing request for the first target data, the examining and approving the sharing request based on the supervising node and the second unit node includes:
examining and approving the sharing request based on the second unit node to obtain a third examination and approval result;
if the third approval result is approval, the sharing request is approved based on the supervision node, and a fourth approval result is obtained;
and if the fourth approval result is that the approval is passed, judging that the sharing request is approved.
Optionally, in the method, encrypting the to-be-uplink data based on the first private key of the supervisory node to obtain the first target data includes:
performing consensus verification on the data to be uplink;
under the condition that the verification is passed, acquiring a first private key of the supervision node;
and encrypting the data to be uplink based on the first private key to obtain first target data.
A data resource sharing tracing device based on block chain technology is applied to a block chain, and the block chain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the apparatus comprising:
an approval module, configured to approve, based on the supervising node and the second unit node, a sharing request for first target data when the first unit node sends the sharing request for the first target data, where the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervising node, and the to-be-uplink data at least includes data of the second unit node;
the first decryption module is used for decrypting the first target data based on the first private key when the approval is passed, so as to obtain the data to be linked;
the encryption module is used for encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
and the second decryption module is configured to send the second target data to the first unit node, and decrypt the second target data based on a second private key of the first unit node to obtain the to-be-uplink data.
The above apparatus, optionally, the block chain further includes: an operation log chain, wherein a hash value corresponding to an operation log after a preset operation is performed on chunk data in a chunk chain is stored in the operation log chain, the hash value is associated with the corresponding chunk data in the chunk chain, and the operation log chain includes:
the device comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining a target hash value corresponding to target block data when a tracing request for the target block data is received;
a second obtaining unit configured to obtain a target operation log corresponding to the target hash value based on the operation log chain;
and the tracing unit is used for tracing the target block data based on the target operation log.
Optionally, the apparatus described above, wherein the approval module includes:
the first approval unit is used for simultaneously approving the sharing request based on the second unit node and the inspection point supervision node to obtain a first approval result and a second approval result;
the comparison unit is used for comparing the first approval result with the second approval result;
and the first judging unit is used for judging that the sharing request passes the approval when the first approval result and the second approval result both pass the approval.
Optionally, the apparatus described above, wherein the approval module includes:
the third approval unit is used for approving the sharing request based on the second unit node to obtain a third approval result;
the fourth approval unit is used for approving the sharing request based on the supervision node if the third approval result is approval pass, so as to obtain a fourth approval result;
and the second judging unit is used for judging that the approval of the sharing request is passed if the fourth approval result is that the approval is passed.
Optionally, the apparatus described above, wherein the approval module includes:
the verification unit is used for carrying out consensus verification on the data to be uplink;
the third obtaining unit is used for obtaining a first private key of the supervision node under the condition that the verification is passed;
and the encryption unit is used for encrypting the data to be linked based on the first private key to obtain first target data.
Compared with the prior art, the invention has the following advantages:
the invention discloses a data resource sharing tracing method and a device based on a block chain technology, wherein the method comprises the following steps: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node, wherein the first target data is obtained by encrypting data to be uplink-linked based on a first private key of the supervision node, and the data to be uplink-linked at least comprises data of the second unit node; when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be linked; encrypting the data to be uplink transmitted based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. In the process, after the approval is passed, the data to be uplink is encrypted based on the public key of the first unit node to obtain the second target data, and the second target data is sent to the first unit node, and is encrypted and sent, so that the data security of the data to be uplink in the sharing process is ensured.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a data resource sharing tracing method based on a block chain technology according to an embodiment of the present application;
fig. 2 is a block diagram of a data resource sharing tracing apparatus based on a block chain technique according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The invention discloses a data resource sharing and tracing method and device based on a block chain technology, which are applied to the sharing and tracing process of data in a block chain. The block chain technology, also called as distributed ledger technology, is a technical scheme for decentralized and collective maintenance of distributed ledgers, and is essentially a distributed database system with multiple nodes participating collectively. The block chain technology can safely store data information, the information cannot be forged and falsified, the public trust is high, and intelligent contracts can be automatically executed.
In a blockchain distributed system, the existing method of data sharing is generally performed by: the data provider issues data description information to the block chain, namely plaintext data is encrypted by adopting a Hash algorithm, the Hash result of the plaintext is stored on the block chain, and the plaintext data is stored under the chain; the data demand party acquires data description information issued by a data provider from the block chain, selects target data, issues a data permission request to the block chain, the data provider conducts permission approval on the data permission request issued by the data demand party according to a specific rule, and if the permission approval is passed, an access permission is directly opened to the data demand party; and downloading the Hash ciphertext prestored in the data from the block chain, checking the plaintext, and requesting the plaintext data through a point-to-point secure communication channel under the chain or on the chain.
The current data sharing method is to directly open access authority to a data demand party after a data provider agrees, wherein the data sharing safety processing is not considered, so that the data safety cannot be ensured; and a tracing method after data safety problems occur is also lost, so that the loss caused by hidden danger is reduced as much as possible. Therefore, the data sharing method lacks corresponding supervision and tracing, and is easy to cause non-compliance or illegal behaviors. Based on the above problem, an embodiment of the present invention provides a block chain-based data resource sharing tracing method, which is applied to a block chain, where the block chain includes: a supervisory node and a unit node, the unit node comprising: the monitoring node is a block chain node which is specially responsible for monitoring transactions in a block chain, has public trust, and can obtain the approval of each block chain node in the whole network through the matters passing the verification of the monitoring node; each of the unit nodes shares a portion of the hardware resources they own, and these shared resources provide services and content through the blockchain. Each unit node in the block chain is not only a provider of resources, services and contents, but also an acquirer of the resources, services and contents; when the unit nodes in the blockchain are used as transaction nodes, the transaction data generated by the unit nodes in the blockchain are agreed through the blockchain and are recorded in the blockchain in an encrypted manner through the supervision node, and the unit nodes participating in the agreement in the blockchain are the agreed nodes.
The execution flow of the method is shown in fig. 1, and comprises the following steps:
s101, when the first unit node sends a sharing request for first target data, the sharing request is approved based on the supervision node and the second unit node, wherein the first target data is obtained by encrypting data to be uplink-linked based on a first private key of the supervision node, and the data to be uplink-linked at least comprises data of the second unit node;
in the embodiment of the present invention, data to be uplink is encrypted in advance by using a first private key of the supervisory node to obtain first target data, and preferably, the data to be uplink is data achieving consensus, where the consensus process is as follows: when the block chain achieves consensus on the to-be-uplink data, it is not absolutely necessary to perform consensus verification on all unit nodes in the block chain, and it may be specifically considered whether the unit nodes in the block chain are online to perform consensus verification on the data to be written into the block chain. For example, it is only necessary to set that more than 60% of online unit nodes verify data to be written into the block chain, and in the embodiment of the present invention, a specific consensus process is not limited.
Further, since the data to be linked up is encrypted by the supervising node with the supervising role before sharing and recorded on the blockchain by using the first private key, and the first private key is kept by the supervising node, the data on the blockchain can be prevented from being illegally queried and tampered, so that the data of a data provider can be prevented from being accessed by an improper user or leaked by an incompletely trusted data center or service provider, and the risk of data leakage is reduced.
In the embodiment of the invention, the data to be linked is transaction data generated by the corresponding unit node during transaction, preferably, in the embodiment of the present invention, the data to be uplink includes at least the data of the second unit node as an example, when receiving a sharing request of the first unit node for the first target data, since the data to be uplink includes at least the data of the second unit node, accordingly, the first target data encrypted based on the first private key includes at least data of the second unit node, the second unit node is a node different from the first unit node in the blockchain network, the first unit node may be a terminal or a server of a data demander, and the second unit node may be a terminal or a server of a data provider. When the data demander needs to share the first target data stored on the blockchain, the data demander can submit a sharing request to the blockchain through the first unit node.
Examining and approving the sharing request based on the supervision node and the second unit node, wherein if at least one of the supervision node and the second unit node is not approved, the sharing request is not approved; and if the supervision node and the second unit node both agree, the sharing request passes the examination and approval.
The monitoring node and the second unit node can jointly examine and approve the sharing request according to a preset examination and approval process, wherein the preset examination and approval process can be set as follows: the supervising node and the second unit node respectively examine and approve the data sharing request to obtain a first examination and approval result of the supervising node on the sharing request and a second examination and approval result of the second unit node on the sharing request; and only when the first approval result of the supervision node on the sharing request and the second approval result of the second unit node on the sharing request indicate that the sharing request passes the approval, determining that the sharing request passes the approval, otherwise, determining that the sharing request does not pass the approval. In addition, the preset approval process can be set as follows: the method comprises the steps that a data sharing request is firstly approved by a second unit node to obtain a third approval result, when the third approval result of the sharing request indicates that the sharing request passes approval, the data sharing request is approved by a supervision node to obtain a fourth approval result, if the fourth approval result of the sharing request indicates that the data sharing request passes approval, the sharing request is determined to pass approval, and if not, the sharing request is determined not to pass approval. In the embodiment of the present invention, the specific approval process may be set based on experience or specific conditions, and in the embodiment of the present invention, specific limitations are not provided.
S102, when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be uplink;
in the embodiment of the invention, the approval of the sharing request is that the first target data is decrypted based on the first private key to obtain the data to be uplink, and the data to be uplink is copied.
S103, encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
in the embodiment of the present invention, the data to be uplink is encrypted based on the public key of the first unit node, and the specific encryption process is as follows: the supervising node can Encrypt the data to be uplink by operating an Encrypt function and taking the public key of the first unit node as the input of the Encrypt function to generate second target data, and returns the second target data to the second unit node through the block chain, wherein the Encrypt function is simpler to seek two large prime numbers according to number theory, and factorize the product of the two large prime numbers but extremely difficult, so that the product can be disclosed as an encryption key s
S104, sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink.
In this embodiment of the present invention, the second target data is sent to the first unit node, and the second target data is decrypted based on the second private key of the first unit node, where the decryption process is as follows: after the first unit node receives the second target data through the block link, the first unit node can execute a decryption function, Decrypt the second target data by taking a private key of the first unit node as the input of the decryption function, and acquire the data sharing request to the data to be linked when decryption is successful. The processing procedure of the Decrypt function is the same as that of the Encrypt function, and is not described herein again.
The invention discloses a data resource sharing tracing method based on a block chain technology, which comprises the following steps: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node, wherein the first target data is obtained by encrypting data to be uplink-linked based on a first private key of the supervision node, and the data to be uplink-linked at least comprises data of the second unit node; when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be linked; encrypting the data to be uplink transmitted based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. In the process, after the approval is passed, the data to be uplink is encrypted based on the public key of the first unit node to obtain the second target data, and the second target data is sent to the first unit node, and is encrypted and sent, so that the data security of the data to be uplink in the sharing process is ensured.
In the embodiment of the present invention, the block chain further includes an operation log chain, where a hash value corresponding to an operation log after a preset operation is performed on block data in the block chain is stored in the operation log chain, the hash value is associated with corresponding block data in the block chain, and the corresponding data in the block chain is traced based on the operation log chain. Wherein the preset operation comprises at least one of the following operations: add, delete, modify, view.
And storing the operation log data to the block chain supervision node and the operation log chain of each unit node, wherein the operation log chain stores the hash value corresponding to the operation log data. It should be noted that the blockchain may be a blockchain that is constructed in advance and includes a plurality of data storage nodes, and each data storage node stores the operation log data in a chained manner to form an operation log chain.
Since the hash value of the previous block is recorded in the current block data in the block chain, the modification of a certain block data may cause the hash value corresponding to the block data to be modified, and thus, the block chain can ensure the non-tamper-ability of the block data. The block chain realizes that a plurality of nodes store and synchronize data at the same time, and provides multi-node distributed backup for the data. The intelligent contracts in the block chain enable the service-related nodes to simultaneously execute the operation logic defined by the intelligent contracts and endorse the operation logic, and the transactions meeting the endorsement condition are verified and stored through uplink, wherein the endorsement condition can be set based on experience or specific conditions, and is not specifically limited in the embodiment of the invention. The endorsement condition may be: one valid signature is from members of the universe S, one valid signature is from any single member of S or one valid signature is any five of them.
The block data in the block chain is packed and stored by using a merkel Tree (also called a hash binary Tree), and the hash values of a plurality of data records stored on each block. A hashed binary tree is formed in an iterative manner. The modification of each data record affects the root of the hashed binary tree and, thus, the hash value of the root of the hashed binary tree on each chunk. The root hash value of each block is stored as the hash value of each block in a chain storage structure on a block chain, thereby ensuring that each data record is not tampered. It should be noted that the hashed binary tree in the blockchain provides an effective verification means for the true validity of each data record. Preferably, the hash value corresponding to the operation log is superposed to an information display page for displaying the target data;
when a tracing request for target block data is received, a target hash value corresponding to the target block data is obtained based on the corresponding relation between the block data and the hash value, a target operation log corresponding to the target hash value is obtained based on the operation log chain, and the target block data is traced based on the target operation log.
In the embodiment of the present invention, all the operation logs formed by the preset operation of the user on the block chain are stored in the operation log chain of the block chain, preferably, the hash value generated by the block chain for each operation log data storage is used as the unique identifier of the operation log data, and the hash value has a corresponding relationship with the corresponding block data, that is, if the current block data is adjusted to generate a new operation log, the hash value corresponding to the adjusted current block data changes, and the hash value corresponding to the new operation log is the hash value corresponding to the adjusted current block data, because the property of non-tampering of the block chain can ensure that the operation log stored in the block chain network has non-tampering property and is authentic, when the platform data is found to be tampered and deleted illegally, a person tampering and deleting the data can be positioned through the operation log chain in the block chain, accurately trace the responsibility.
In the method, the data resource sharing tracing method based on the block chain technology is used for storing the shared data resources on the block chain, so that the data resource sharing cannot be tampered, the data resource sharing range is controlled by supervision and notarization of a supervision node, and the data resource tracing is realized by adding the operation log chain.
Before sharing, all data which are agreed by the block chain network are encrypted by the supervision node, all encrypted data are recorded on the block chain, and data sharing transmission is also encrypted, so that the data sharing safety can be ensured; because the data sharing process is supervised and notarized by the supervision node, the trust and the notarization of the data sharing can be ensured, and the situation that the data sharing is not supervised and is easy to cause non-compliance or non-legal can be avoided; since the data sharing process is based on the approval mode authorization of the supervision node and the data provider, the authority control and authorization permission of data sharing can be ensured.
The operation log data are stored based on the block chain, so that the non-tampering property of the operation log data can be ensured, further, operations such as checking of platform data executed by any user can be checked according to the operation log data stored on the block chain network, and when the platform data are leaked or tampered, the operation log data of the leaked or tampered data can be traced back from the block chain network based on the hash value extracted from the information display page so as to take responsibility for related operators, and therefore the data security of the data on the data platform in the storage, use and sharing processes is ensured.
Based on the above method for tracing data resource sharing based on the blockchain technology, an embodiment of the present invention further provides a device for tracing data resource sharing based on the blockchain technology, which is applied to a blockchain, where the blockchain includes: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, and a block diagram of the apparatus is shown in fig. 2, and the apparatus includes:
an approval module 201, a first decryption module 202, an encryption module 203 and a second decryption module 204.
Wherein the content of the first and second substances,
the approval module 201 is configured to, when the first unit node sends a sharing request for first target data, approve the sharing request based on the supervising node and the second unit node, where the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervising node, and the to-be-uplink data at least includes data of the second unit node;
the first decryption module 202 is configured to decrypt the first target data based on the first private key when the approval is passed, so as to obtain the to-be-linked data;
the encryption module 203 is configured to encrypt the data to be uplink based on the public key of the first unit node to obtain second target data;
the second decryption module 204 is configured to send the second target data to the first unit node, and decrypt the second target data based on a second private key of the first unit node to obtain the to-be-uplink data.
The invention discloses a data resource sharing tracing device based on a block chain technology, which comprises: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node, wherein the first target data is obtained by encrypting data to be uplink-linked based on a first private key of the supervision node, and the data to be uplink-linked at least comprises data of the second unit node; when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be linked; encrypting the data to be uplink transmitted based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. In the process, after the approval is passed, the data to be uplink is encrypted based on the public key of the first unit node to obtain the second target data, and the second target data is sent to the first unit node, and is encrypted and sent, so that the data security of the data to be uplink in the sharing process is ensured.
In this embodiment of the present invention, the block chain further includes: an operation log chain, wherein a hash value corresponding to an operation log after a preset operation is performed on chunk data in a chunk chain is stored in the operation log chain, the hash value is associated with the corresponding chunk data in the chunk chain, and the operation log chain includes:
a first acquisition unit 205, a second acquisition unit 206 and a trace back unit 207.
Wherein the content of the first and second substances,
the first obtaining unit 205 is configured to obtain a target hash value corresponding to target block data when a trace back request for the target block data is received;
the second obtaining unit 206, configured to obtain a target operation log corresponding to the target hash value based on the operation log chain;
the tracing unit 207 is configured to trace the target block data based on the target operation log.
In the embodiment of the present invention, the approval module 201 includes:
a first approval unit 208, a comparison unit 209, and a second approval unit 210.
Wherein the content of the first and second substances,
the first approval unit 208 is configured to approve the sharing request based on the second unit node and the inspection point supervision node at the same time to obtain a first approval result and a second approval result;
the comparing unit 209 is configured to compare the first approval result with the second approval result;
the first determining unit 210 is configured to determine that the sharing request is approved when both the first approval result and the second approval result are approved.
In the embodiment of the present invention, the approval module 201 includes:
a third approval unit 211, a fourth approval unit 212 and a second decision unit 213.
Wherein the content of the first and second substances,
the third approval unit 211 is configured to approve the sharing request based on the second unit node to obtain a third approval result;
the fourth approval unit 212 is configured to, if the third approval result is that the approval is passed, approve the sharing request based on the monitoring node to obtain a fourth approval result;
the second determining unit 213 is configured to determine that the sharing request is approved if the fourth approval result is approved.
In the embodiment of the present invention, the approval module 201 includes:
an authentication unit 213, a third acquisition unit 214, and an encryption unit 215.
The verification unit 213 is configured to perform consensus verification on the to-be-uplink data;
the third obtaining unit 214 is configured to obtain the first private key of the supervisory node if the verification passes;
the encrypting unit 215 is configured to encrypt the data to be uplink based on the first private key to obtain first target data.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in a plurality of software and/or hardware when implementing the invention.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The method and the device for data resource sharing and tracing based on the block chain technology provided by the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation mode of the invention, and the description of the above embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A data resource sharing tracing method based on a block chain technology is applied to a block chain, and the block chain comprises the following steps: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the method comprising:
when the first unit node sends a sharing request for first target data, the sharing request is approved based on the supervising node and the second unit node, wherein the first target data is obtained by encrypting data to be uplink-linked based on a first private key of the supervising node, and the data to be uplink-linked at least comprises data of the second unit node;
when the approval is passed, decrypting the first target data based on the first private key to obtain the data to be uplink;
encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink.
2. The method of claim 1, wherein the blockchain further comprises: the method comprises the steps of obtaining an operation log chain, wherein a hash value corresponding to the operation log after preset operation is performed on block data in a block chain is stored in the operation log chain, and the hash value is associated with the corresponding block data in the block chain;
when a tracing request for target block data is received, acquiring a target hash value corresponding to the target block data;
acquiring a target operation log corresponding to the target hash value based on the operation log chain;
and tracing the target block data based on the target operation log.
3. The method of claim 1, wherein when the first unit node sends a sharing request for first target data, approving the sharing request based on the supervising node and the second unit node comprises:
meanwhile, the sharing request is approved based on the second unit node and the inspection point supervision node to obtain a first approval result and a second approval result;
comparing the first approval result with the second approval result;
and when the first approval result and the second approval result are approved, judging that the sharing request is approved.
4. The method of claim 1, wherein when the first unit node sends a sharing request for first target data, approving the sharing request based on the supervising node and the second unit node comprises:
examining and approving the sharing request based on the second unit node to obtain a third examination and approval result;
if the third approval result is approval, the sharing request is approved based on the supervision node, and a fourth approval result is obtained;
and if the fourth approval result is that the approval is passed, judging that the sharing request is approved.
5. The method of claim 1, wherein encrypting uplink data to be transmitted based on a first private key of the supervisory node to obtain the first target data comprises:
performing consensus verification on the data to be uplink;
under the condition that the verification is passed, acquiring a first private key of the supervision node;
and encrypting the data to be uplink based on the first private key to obtain first target data.
6. A data resource sharing tracing device based on block chain technology is characterized in that the device is applied to a block chain, and the block chain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the apparatus comprising:
an approval module, configured to approve, based on the supervising node and the second unit node, a sharing request for first target data when the first unit node sends the sharing request for the first target data, where the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervising node, and the to-be-uplink data at least includes data of the second unit node;
the first decryption module is used for decrypting the first target data based on the first private key when the approval is passed, so as to obtain the data to be linked;
the encryption module is used for encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
and the second decryption module is configured to send the second target data to the first unit node, and decrypt the second target data based on a second private key of the first unit node to obtain the to-be-uplink data.
7. The apparatus of claim 6, wherein the block chain further comprises: an operation log chain, wherein a hash value corresponding to an operation log after a preset operation is performed on chunk data in a chunk chain is stored in the operation log chain, the hash value is associated with the corresponding chunk data in the chunk chain, and the operation log chain includes:
the device comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining a target hash value corresponding to target block data when a tracing request for the target block data is received;
a second obtaining unit configured to obtain a target operation log corresponding to the target hash value based on the operation log chain;
and the tracing unit is used for tracing the target block data based on the target operation log.
8. The apparatus of claim 6, wherein the approval module comprises:
the first approval unit is used for simultaneously approving the sharing request based on the second unit node and the inspection point supervision node to obtain a first approval result and a second approval result;
the comparison unit is used for comparing the first approval result with the second approval result;
and the first judging unit is used for judging that the sharing request passes the approval when the first approval result and the second approval result both pass the approval.
9. The apparatus of claim 6, wherein the approval module comprises:
the third approval unit is used for approving the sharing request based on the second unit node to obtain a third approval result;
the fourth approval unit is used for approving the sharing request based on the supervision node if the third approval result is approval pass, so as to obtain a fourth approval result;
and the second judging unit is used for judging that the approval of the sharing request is passed if the fourth approval result is that the approval is passed.
10. The apparatus of claim 6, wherein the approval module comprises:
the verification unit is used for carrying out consensus verification on the data to be uplink;
the third obtaining unit is used for obtaining a first private key of the supervision node under the condition that the verification is passed;
and the encryption unit is used for encrypting the data to be linked based on the first private key to obtain first target data.
CN202011592929.XA 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology Active CN112702354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011592929.XA CN112702354B (en) 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011592929.XA CN112702354B (en) 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology

Publications (2)

Publication Number Publication Date
CN112702354A true CN112702354A (en) 2021-04-23
CN112702354B CN112702354B (en) 2023-08-11

Family

ID=75511503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011592929.XA Active CN112702354B (en) 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology

Country Status (1)

Country Link
CN (1) CN112702354B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114785517A (en) * 2022-04-06 2022-07-22 浙江数秦科技有限公司 Block chain based associated service data sharing method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379381A (en) * 2018-12-07 2019-02-22 深圳市智税链科技有限公司 Data managing method, device, medium and the electronic equipment of block catenary system
CN109639753A (en) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 A kind of data sharing method and system based on block chain
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
CN110727712A (en) * 2019-10-15 2020-01-24 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium
CN110958253A (en) * 2019-12-05 2020-04-03 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
WO2020181845A1 (en) * 2019-03-14 2020-09-17 深圳壹账通智能科技有限公司 Method and device for encrypting blockchain data, computer apparatus, and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639753A (en) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 A kind of data sharing method and system based on block chain
CN109379381A (en) * 2018-12-07 2019-02-22 深圳市智税链科技有限公司 Data managing method, device, medium and the electronic equipment of block catenary system
WO2020181845A1 (en) * 2019-03-14 2020-09-17 深圳壹账通智能科技有限公司 Method and device for encrypting blockchain data, computer apparatus, and storage medium
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
CN110727712A (en) * 2019-10-15 2020-01-24 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium
CN110958253A (en) * 2019-12-05 2020-04-03 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114785517A (en) * 2022-04-06 2022-07-22 浙江数秦科技有限公司 Block chain based associated service data sharing method
CN114785517B (en) * 2022-04-06 2024-03-19 浙江数秦科技有限公司 Associated service data sharing method based on block chain

Also Published As

Publication number Publication date
CN112702354B (en) 2023-08-11

Similar Documents

Publication Publication Date Title
CN109639753B (en) Data sharing method and system based on block chain
CN109194708B (en) Distributed storage system based on block chain technology and identity authentication method thereof
CN109450910B (en) Data sharing method based on block chain, data sharing network and electronic equipment
CN109525671B (en) Block chain-based data storage method, electronic device and storage medium
TWI709314B (en) Data processing method and device
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN108737442A (en) A kind of cryptographic check processing method
CN108055274A (en) A kind of encryption based on alliance's chain storage data and shared method and system
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN114329529A (en) Asset data management method and system based on block chain
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
KR102098803B1 (en) Security Management System using Block Chain Technology and Method thereof
CN115345618B (en) Block chain transaction verification method and system based on mixed quantum digital signature
CN110598377A (en) Software serial number management method and device based on block chain
CN113315745A (en) Data processing method, device, equipment and medium
CN113965370B (en) Data transmission method and device, computer equipment and readable storage medium
CN115567312A (en) Alliance chain data authority management system and method capable of meeting multiple scenes
CN116244725A (en) File processing method and device based on block chain, equipment and file contribution system
CN112702354B (en) Data resource sharing traceability method and device based on blockchain technology
CN113326529A (en) Decentralized architecture unifying method based on trusted computing
CN116436708A (en) Trusted data sharing method and system based on blockchain technology
CN111080300A (en) Asset transfer method and device based on block chain and hardware equipment
CN115658477A (en) Function testing method and device of privacy computing platform based on block chain assistance
CN115048672A (en) Data auditing method and device based on block chain, processor and electronic equipment
Zhu et al. Research on Modify Protection of Metrology Electronic Certificate Based on Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant