CN112702354B - Data resource sharing traceability method and device based on blockchain technology - Google Patents

Data resource sharing traceability method and device based on blockchain technology Download PDF

Info

Publication number
CN112702354B
CN112702354B CN202011592929.XA CN202011592929A CN112702354B CN 112702354 B CN112702354 B CN 112702354B CN 202011592929 A CN202011592929 A CN 202011592929A CN 112702354 B CN112702354 B CN 112702354B
Authority
CN
China
Prior art keywords
data
node
unit
approval
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011592929.XA
Other languages
Chinese (zh)
Other versions
CN112702354A (en
Inventor
崔琪
王宏刚
刘识
王倩
简燕红
张海峰
米娜
孙明月
马寒梅
邓祥瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Big Data Center Of State Grid Corp Of China
Original Assignee
Big Data Center Of State Grid Corp Of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Big Data Center Of State Grid Corp Of China filed Critical Big Data Center Of State Grid Corp Of China
Priority to CN202011592929.XA priority Critical patent/CN112702354B/en
Publication of CN112702354A publication Critical patent/CN112702354A/en
Application granted granted Critical
Publication of CN112702354B publication Critical patent/CN112702354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application discloses a data resource sharing traceability method and device based on a blockchain technology, wherein the method comprises the following steps: when a first unit node sends a sharing request for first target data, approving the sharing request based on a supervision node and a second unit node; decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded; encrypting the uplink data to be processed based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. After the approval is passed, the uplink data to be encrypted based on the public key of the first unit node to obtain second target data, and the second target data is sent to the first unit node, so that the data security of the uplink data to be shared is ensured.

Description

Data resource sharing traceability method and device based on blockchain technology
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and an apparatus for tracing data resource sharing based on a blockchain technology.
Background
In a blockchain distributed system, existing methods of data sharing are typically performed by: the data provider issues data description information to the blockchain, namely plaintext data is encrypted by adopting a Hash algorithm, a Hash result of the plaintext is stored on the blockchain, and the plaintext data is stored under the chain; the data demand side acquires data description information issued by the data provider from the blockchain, selects target data, issues a data authority request to the blockchain, and performs authority approval on the data authority request issued by the data demand side according to a specific rule, and if the authority approval passes, directly opens access authority to the data demand side; downloading the Hash ciphertext pre-stored by the data from the block chain, checking the plaintext, and requesting the plaintext data through a point-to-point secure communication channel under or on the chain.
The current data sharing method directly opens access rights to a data demander after the data provider agrees, wherein the secure processing of data sharing is not considered, so that the data security cannot be ensured.
Disclosure of Invention
In view of the above, the present application provides a method and apparatus for tracing data resource sharing based on blockchain technology, which is used to solve the problem that in the prior art, the data sharing method directly opens access rights to the data demander after the data provider agrees, wherein the secure processing of data sharing is not considered, so that the data security cannot be ensured. The specific scheme is as follows:
a data resource sharing traceability method based on a blockchain technology, which is applied to a blockchain, wherein the blockchain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the method comprising:
when the first unit node sends a sharing request for first target data, the sharing request is approved based on the supervision node and the second unit node, wherein the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises data of the second unit node;
decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded;
encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink.
The method, optionally, the blockchain further includes: the system comprises an operation log chain, wherein a hash value corresponding to an operation log after preset operation is carried out on block data in a block chain is stored in the operation log chain, and the hash value is associated with the corresponding block data in the block chain;
when a tracing request for target block data is received, acquiring a target hash value corresponding to the target block data;
acquiring a target operation log corresponding to the target hash value based on the operation log chain;
and tracing the target block data based on the target operation log.
In the above method, optionally, when the first unit node sends a sharing request for the first target data, the method includes, based on the supervision node and the second unit node, approving the sharing request, including:
at the same time, based on the second unit node and the point supervision node, the sharing request is approved to obtain a first approval result and a second approval result;
comparing the first trial result with the second trial result;
and when the first examination result and the second examination result are both examination and approval passing, judging that the sharing request passes the examination and approval.
In the above method, optionally, when the first unit node sends a sharing request for the first target data, the method includes, based on the supervision node and the second unit node, approving the sharing request, including:
approval is carried out on the sharing request based on the second unit node, and a third approval result is obtained;
if the third approval result is approval passing, approving the sharing request based on the supervision node to obtain a fourth approval result;
and if the fourth approval result is approval passing, judging that the sharing request is approved.
In the above method, optionally, encrypting the uplink data to be processed based on the first private key of the supervisory node, to obtain the first target data includes:
performing consensus verification on the data to be uplink;
under the condition that verification is passed, a first private key of the supervision node is obtained;
and encrypting the data to be uplink based on the first private key to obtain first target data.
A data resource sharing traceability device based on a blockchain technology, which is applied to a blockchain, wherein the blockchain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the apparatus comprising:
the approval module is used for approving the sharing request based on the supervision node and the second unit node when the first unit node sends the sharing request of the first target data, wherein the first target data is obtained by encrypting the to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises the data of the second unit node;
the first decryption module is used for decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded;
the encryption module is used for encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
and the second decryption module is used for sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink.
The above apparatus, optionally, the blockchain further includes: the operation log chain, wherein, the operation log chain stores the hash value corresponding to the operation log after the block data in the block chain is subjected to the preset operation, the hash value is associated with the corresponding block data in the block chain, and the operation log chain comprises:
the first acquisition unit is used for acquiring a target hash value corresponding to target block data when receiving a tracing request for the target block data;
a second obtaining unit, configured to obtain a target operation log corresponding to the target hash value based on the operation log chain;
and the tracing unit is used for tracing the target block data based on the target operation log.
The above device, optionally, the approval module includes:
the first approval unit is used for approving the sharing request based on the second unit node and the point supervision node at the same time to obtain a first approval result and a second approval result;
the comparison unit is used for comparing the first trial result and the second trial result;
and the first judging unit is used for judging that the sharing request passes the approval when the first approval result and the second approval result are both the approval passes.
The above device, optionally, the approval module includes:
the third approval unit is used for approving the sharing request based on the second unit node to obtain a third approval result;
the fourth approval unit is used for approving the sharing request based on the supervision node if the third approval result is approved to obtain a fourth approval result;
and the second judging unit is used for judging that the sharing request passes the approval if the fourth approval result is that the approval passes.
The above device, optionally, the approval module includes:
the verification unit is used for carrying out consensus verification on the data to be uplinked;
the third acquisition unit is used for acquiring a first private key of the supervision node under the condition that verification is passed;
and the encryption unit is used for encrypting the data to be uplink based on the first private key to obtain first target data.
Compared with the prior art, the application has the following advantages:
the application discloses a data resource sharing traceability method and device based on a blockchain technology, wherein the method comprises the following steps: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node, wherein the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises data of the second unit node; decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded; encrypting the uplink data to be processed based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. After the approval is passed, the uplink data to be encrypted based on the public key of the first unit node to obtain second target data, and the second target data is sent to the first unit node, so that the data security of the uplink data to be shared is ensured.
Of course, it is not necessary for any one product to practice the application to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a data resource sharing traceability method based on a blockchain technique according to an embodiment of the present application;
fig. 2 is a block chain technology-based data resource sharing traceability device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The application discloses a data resource sharing traceability method and device based on a blockchain technology, which are applied to the sharing and traceability process of data in a blockchain, and in recent years, the blockchain technology is widely focused and developed and is gradually applied to a plurality of fields of finance, science and technology, energy sources and the like. The blockchain technology, also called as "distributed ledger technology", is a technical scheme for decentralizing and collectively maintaining a distributed ledger, and is essentially a distributed database system in which a plurality of nodes participate collectively. The blockchain technology can safely store data information, and the information cannot be forged and tampered, has high public confidence and can automatically execute intelligent contracts.
In a blockchain distributed system, existing methods of data sharing are typically performed by: the data provider issues data description information to the blockchain, namely plaintext data is encrypted by adopting a Hash algorithm, a Hash result of the plaintext is stored on the blockchain, and the plaintext data is stored under the chain; the data demand side acquires data description information issued by the data provider from the blockchain, selects target data, issues a data authority request to the blockchain, and performs authority approval on the data authority request issued by the data demand side according to a specific rule, and if the authority approval passes, directly opens access authority to the data demand side; downloading the Hash ciphertext pre-stored by the data from the block chain, checking the plaintext, and requesting the plaintext data through a point-to-point secure communication channel under or on the chain.
The current data sharing method directly opens access rights to a data demand party after the data provider agrees, wherein the safety processing of data sharing is not considered, so that the data safety cannot be ensured; the tracing method after the safety problem of the data is also lost, so that the loss caused by hidden danger is reduced as much as possible. Therefore, the above data sharing method lacks corresponding supervision processing and tracing, and is easy to cause the occurrence of illegal or illegal behaviors. Based on the above-mentioned problems, the embodiment of the present application provides a data resource sharing tracing method based on a blockchain, which is applied to the blockchain, wherein the blockchain includes: a supervisory node and a unit node, the unit node comprising: the system comprises a first unit node and a second unit node, wherein the supervision node is a blockchain node specially responsible for supervising transactions in a blockchain, has public trust, and obtains the approval of each blockchain node in the whole network through the item that the supervision node is searched for and verified by the supervision node; individual unit nodes share a portion of the hardware resources they own, which provide services and content through the blockchain. Each unit node in the blockchain is both a provider and acquirer of resources, services and content; the unit nodes in the blockchain achieve consensus through the blockchain when being used as transaction nodes, the transaction data generated by the unit nodes are encrypted and recorded in the blockchain through the supervision nodes, and the unit nodes participating in the consensus in the blockchain are consensus nodes.
The execution flow of the method is shown in fig. 1, and comprises the following steps:
s101, when a first unit node sends a sharing request for first target data, the sharing request is approved based on the supervision node and the second unit node, wherein the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises data of the second unit node;
in the embodiment of the application, the data to be uplink is encrypted by adopting the first private key of the supervision node in advance to obtain the first target data, and preferably, the data to be uplink is the data achieving consensus, and the consensus process is as follows: when the blockchain agrees with the data to be uplink, it is not absolutely necessary to perform consensus verification on all unit nodes in the blockchain, and specifically, whether the unit nodes in the blockchain are online or not may be considered to perform consensus verification on the data to be written into the blockchain. For example, it is only required to verify the data to be written into the blockchain by more than 60% of online unit nodes, and in the embodiment of the present application, a specific consensus process is not limited.
Furthermore, the data to be uplink is encrypted by the supervising node with the supervising role and recorded on the blockchain, and the first private key is kept by the supervising node before sharing, so that the data on the blockchain can be prevented from being illegally inquired and tampered, and the data of the data provider can be prevented from being accessed by an improper user or being leaked by an incompletely trusted data center or service provider, and the risk of data leakage is reduced.
In the embodiment of the present application, the data to be uplink is transaction data generated by a corresponding unit node during a transaction, where the corresponding unit node may be multiple, and in the embodiment of the present application, preferably, the data to be uplink includes at least data of a second unit node, and when a sharing request for the first target data is received by the first unit node, the data to be uplink includes at least data of the second unit node, so that the first target data encrypted based on the first private key includes at least data of the second unit node, where the second unit node is a node different from the first unit node in a blockchain network, and the first unit node may be a terminal or a server of a data consumer, and the second unit node may be a terminal or a server of a data provider. When a data consumer needs to share first target data stored on a blockchain, the data consumer can submit a sharing request to the blockchain through the first unit node.
Approving the sharing request based on the supervision node and the second unit node, and if at least one of the supervision node and the second unit node is not agreed, failing to pass the approval of the sharing request; and if the supervision node and the second unit node agree, the sharing request passes approval.
The supervising node and the second unit node may jointly examine and approve the sharing request according to a preset examining and approving process, where the preset examining and approving process may be set as follows: the supervision node and the second unit node respectively approve the data sharing request to obtain a first approval result of the supervision node on the sharing request and a second approval result of the second unit node on the sharing request; and only when the first approval result of the supervision node on the sharing request and the second approval result of the second unit node on the sharing request indicate that the sharing request passes approval, determining that the sharing request passes approval, otherwise, determining that the sharing request fails approval. In addition, the preset approval process may be set as follows: and firstly, the second unit node approves the data sharing request to obtain a third approval result, and when the third approval result of the second unit node on the sharing request indicates that the sharing request passes the approval, the supervision node approves the data sharing request to obtain a fourth approval result, if the supervision node indicates that the data sharing request passes the approval, the sharing request is confirmed to pass the approval, otherwise, the sharing request is confirmed to not pass the approval. In the embodiment of the present application, the specific approval process may be set based on experience or specific conditions, and the embodiment of the present application is not specifically limited.
S102, decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded;
in the embodiment of the application, when the approval of the sharing request is passed, the first target data is decrypted based on the first private key to obtain the data to be uploaded, and the data to be uploaded is copied.
S103, encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
in the embodiment of the present application, the data to be uplink is encrypted based on the public key of the first unit node, and the specific encryption process is as follows: the supervising node can Encrypt the data to be uplinked by running an Encrypt function, taking the public key of the first unit node as the input of the Encrypt function, generating second target data, and returning the second target data to the second unit node through the blockchain, wherein the Encrypt function is simpler to seek two large prime numbers according to the number theory, and the product of the two large prime numbers is extremely difficult to factorize, so the product can be disclosed as an encryption key s
And S104, the second target data are sent to the first unit node, and the second target data are decrypted based on a second private key of the first unit node to obtain the data to be uplink.
In the embodiment of the present application, the second target data is sent to the first unit node, and the second target data is decrypted based on the second private key of the first unit node, where the decryption process is as follows: after the first unit node receives the second target data through the block link, the first unit node can execute a Decrypt function, takes a private key of the first unit node as input of the Decrypt function to Decrypt the second target data, and after decryption is successful, the data sharing request to be uplink data is obtained. The processing procedure of the Decrypt function is the same as that of the Encrypt function, and will not be described in detail here.
The application discloses a data resource sharing traceability method based on a blockchain technology, which comprises the following steps: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node, wherein the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises data of the second unit node; decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded; encrypting the uplink data to be processed based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. After the approval is passed, the uplink data to be encrypted based on the public key of the first unit node to obtain second target data, and the second target data is sent to the first unit node, so that the data security of the uplink data to be shared is ensured.
In the embodiment of the application, the block chain further comprises an operation log chain, the operation log chain is stored with a hash value corresponding to the operation log after the block data in the block chain are subjected to preset operation, the hash value is associated with the corresponding block data in the block chain, and the tracing of the corresponding data in the block chain is realized based on the operation log chain. Wherein the preset operation includes at least one of: add, delete, modify, view.
And storing the operation log data to the operation log chains of the blockchain supervisory node and each unit node, wherein the operation log chains store hash values corresponding to the operation log data. It should be noted that, the blockchain may be a blockchain that is built in advance and includes a plurality of data storage nodes, where each data storage node stores operation log data in a chained manner to form an operation log chain.
Since the hash value of the last block is recorded in the current block data in the block chain, the modification of a certain block data can lead to the modification of the hash value corresponding to the block data, so that the block chain can ensure the tamper-resistance of the block data. The blockchain realizes simultaneous storage and synchronization of data by a plurality of nodes, and provides distributed backup of multiple nodes for the data. The intelligent contracts in the blockchain enable the business related nodes to simultaneously execute and endorse the operation logic defined by the intelligent contracts, and the transaction conforming to the endorsement condition is verified to be stored through the uplink, wherein the endorsement condition can be set based on experience or specific conditions, and the endorsement condition is not particularly limited in the embodiment of the application, for example, the endorsement condition can be that an endorsement node set is assumed to be S= { supervision node, first unit node, second unit node, third unit node, fourth unit node and fifth unit node }. The endorsement conditions may be: one valid signature from members of the population S, one valid signature from any single member of S or one valid signature as any five of them.
The chunk data in the blockchain is packaged into stored data using the merck Tree (also known as a hash binary Tree), with hash values of multiple data records stored on each chunk. A hash binary tree is formed in an iterative manner. The modification of each data record affects the root of the hash binary tree and thus the hash value of the hash binary tree root over each chunk. The root hash value of each block is stored on the blockchain as the hash value of each block in a chained memory structure, thereby ensuring that each data record can not be tampered with. It should be noted that the hash binary tree in the blockchain provides an effective means of verification of the true validity of each data record. Preferably, the hash value corresponding to the operation log is overlapped to an information display page for displaying the target data;
when a tracing request for target block data is received, a target hash value corresponding to the target block data is obtained based on the corresponding relation between the block data and the hash value, a target operation log corresponding to the target hash value is obtained based on the operation log chain, and tracing is carried out on the target block data based on the target operation log.
In the embodiment of the application, the operation logs formed by the preset operation of the user on the block chain are stored in the operation log chain of the block chain, preferably, the hash value generated by the block chain for each operation log data storage is used as the unique identifier of the operation log data, and the hash value has a corresponding relation with the corresponding block data, namely if the current block data is adjusted to generate a new operation log, the adjusted hash value corresponding to the current block data changes, the hash value corresponding to the new operation log is the adjusted hash value corresponding to the current block data, the tamper-proof characteristic of the block chain can ensure that the operation log stored in the block chain network is tamper-proof, and the operation log is real and reliable, and when the platform data is found to be illegally tampered and deleted, a person tampering and deleting the data can be positioned through the operation log chain in the block chain, so that the responsibility is accurately tracked.
In the method, the data resource sharing traceability method based on the blockchain technology is used for storing the shared data resources on the blockchain, so that the data resource sharing cannot be tampered, the scope of the data resource sharing is controlled by supervision and notarization of the supervision node, and traceability of the data resources is realized by adding the operation log chain.
Before sharing, all data agreed with the blockchain network are encrypted through the supervision node, and all encrypted data are recorded on the blockchain, and meanwhile, the data sharing transmission is also encrypted, so that the safety of the data sharing can be ensured; the data sharing process is supervised and notarized by the supervision node, so that the trust degree and the public trust of the data sharing can be ensured, and the situation that the data sharing is not supervised and is easy to cause non-compliance or illegal can be avoided; since the data sharing process is based on approval mode authorization of the supervising node and the data provider, rights control and authorization permissions for data sharing can be ensured.
Based on the blockchain storage operation log data, the non-falsification of the operation log data can be ensured, and then operations such as checking executed by any user on platform data are checked according to the operation log data stored on the blockchain network, when the platform data are leaked or falsified, the leaked or falsified operation log data can be traced back from the blockchain network based on the hash value extracted from the information display page so as to perform the responsibility following on related operators, thereby ensuring the data security of the data on the data platform in the processes of storage, use and sharing.
Based on the above-mentioned data resource sharing tracing method based on the blockchain technology, the embodiment of the application also provides a data resource sharing tracing device based on the blockchain technology, which is applied to the blockchain, wherein the blockchain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the apparatus having a block diagram as shown in fig. 2, the apparatus comprising:
an approval module 201, a first decryption module 202, an encryption module 203, and a second decryption module 204.
Wherein, the liquid crystal display device comprises a liquid crystal display device,
the approval module 201 is configured to, when the first unit node sends a sharing request for first target data, approve the sharing request based on the supervisory node and the second unit node, where the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervisory node, and the to-be-uplink data at least includes data of the second unit node;
the first decryption module 202 is configured to decrypt, when the approval passes, the first target data based on the first private key, to obtain the data to be uploaded;
the encryption module 203 is configured to encrypt the data to be uplink based on the public key of the first unit node to obtain second target data;
the second decryption module 204 is configured to send the second target data to the first unit node, decrypt the second target data based on a second private key of the first unit node, and obtain the data to be uplink.
The application discloses a data resource sharing traceability device based on a block chain technology, which comprises: when a first unit node sends a sharing request for first target data, the sharing request is approved based on a supervision node and a second unit node, wherein the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises data of the second unit node; decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded; encrypting the uplink data to be processed based on the public key of the first unit node to obtain second target data; and sending the second target data to the first unit node, and decrypting the second target data based on a second private key of the first unit node to obtain the data to be uplink. After the approval is passed, the uplink data to be encrypted based on the public key of the first unit node to obtain second target data, and the second target data is sent to the first unit node, so that the data security of the uplink data to be shared is ensured.
In an embodiment of the present application, the blockchain further includes: the operation log chain, wherein, the operation log chain stores the hash value corresponding to the operation log after the block data in the block chain is subjected to the preset operation, the hash value is associated with the corresponding block data in the block chain, and the operation log chain comprises:
a first acquisition unit 205, a second acquisition unit 206, and a traceback unit 207.
Wherein, the liquid crystal display device comprises a liquid crystal display device,
the first obtaining unit 205 is configured to obtain, when receiving a traceback request for target block data, a target hash value corresponding to the target block data;
the second obtaining unit 206 is configured to obtain a target operation log corresponding to the target hash value based on the operation log chain;
the tracing unit 207 is configured to trace back the target block data based on the target operation log.
In the embodiment of the present application, the approval module 201 includes:
a first review unit 208, a comparison unit 209, and a second review unit 210.
Wherein, the liquid crystal display device comprises a liquid crystal display device,
the first approval unit 208 is configured to approve the sharing request based on the second unit node and the point supervision node at the same time, so as to obtain a first approval result and a second approval result;
the comparing unit 209 is configured to compare the first trial result and the second trial result;
the first determining unit 210 is configured to determine that the sharing request passes the approval when the first approval result and the second approval result are both the approval passes.
In the embodiment of the present application, the approval module 201 includes:
a third approval unit 211, a fourth approval unit 212, and a second determination unit 213.
Wherein, the liquid crystal display device comprises a liquid crystal display device,
the third approval unit 211 is configured to approve the sharing request based on the second unit node, to obtain a third approval result;
the fourth approval unit 212 is configured to, if the third approval result is that the approval passes, approve the sharing request based on the supervision node, and obtain a fourth approval result;
the second determining unit 213 is configured to determine that the share request passes the approval if the fourth approval result is that the approval passes.
In the embodiment of the present application, the approval module 201 includes:
an authentication unit 213, a third acquisition unit 214, and an encryption unit 215.
The verification unit 213 is configured to perform consensus verification on the data to be uplink;
the third obtaining unit 214 is configured to obtain a first private key of the supervising node if the verification is passed;
the encryption unit 215 is configured to encrypt the data to be uplink based on the first private key, so as to obtain first target data.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described as different from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other. For the apparatus class embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference is made to the description of the method embodiments for relevant points.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in the same piece or pieces of software and/or hardware when implementing the present application.
From the above description of embodiments, it will be apparent to those skilled in the art that the present application may be implemented in software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present application.
The data resource sharing tracing method and device based on the blockchain technology provided by the application are described in detail, and specific examples are applied to illustrate the principle and implementation of the application, and the description of the above examples is only used for helping to understand the method and core ideas of the application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (2)

1. The utility model provides a data resource sharing traceability method based on block chain technology, which is characterized in that the method is applied to block chain, and the block chain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the method comprising:
when the first unit node sends a sharing request for first target data, the sharing request is approved based on the supervision node and the second unit node, wherein the first target data is obtained by encrypting to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises data of the second unit node;
decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded;
encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
the second target data are sent to the first unit node, and are decrypted based on a second private key of the first unit node, so that the data to be uplink are obtained;
wherein the blockchain further includes: the system comprises an operation log chain, wherein a hash value corresponding to an operation log after preset operation is carried out on block data in a block chain is stored in the operation log chain, and the hash value is associated with the corresponding block data in the block chain;
when a tracing request for target block data is received, acquiring a target hash value corresponding to the target block data;
acquiring a target operation log corresponding to the target hash value based on the operation log chain;
tracing the target block data based on the target operation log;
when the first unit node sends a sharing request for first target data, the sharing request is approved based on the supervision node and the second unit node, and the method comprises the following steps:
at the same time, based on the second unit node and the supervision node, the sharing request is approved to obtain a first approval result and a second approval result;
comparing the first trial result with the second trial result;
when the first examination result and the second examination result are both examination and approval passing, judging that the sharing request passes the examination and approval;
or when the first unit node sends a sharing request for first target data, approving the sharing request based on the supervision node and the second unit node, including:
approval is carried out on the sharing request based on the second unit node, and a third approval result is obtained;
if the third approval result is approval passing, approving the sharing request based on the supervision node to obtain a fourth approval result;
if the fourth approval result is approval passing, judging that the sharing request is approved;
encrypting the uplink data to be processed based on a first private key of the supervision node, wherein obtaining the first target data comprises:
performing consensus verification on the data to be uplink;
under the condition that verification is passed, a first private key of the supervision node is obtained;
and encrypting the data to be uplink based on the first private key to obtain first target data.
2. A data resource sharing traceability device based on a blockchain technology, which is applied to a blockchain, wherein the blockchain comprises: a supervisory node and a unit node, the unit node comprising: a first unit node and a second unit node, the apparatus comprising:
the approval module is used for approving the sharing request based on the supervision node and the second unit node when the first unit node sends the sharing request of the first target data, wherein the first target data is obtained by encrypting the to-be-uplink data based on a first private key of the supervision node, and the to-be-uplink data at least comprises the data of the second unit node;
the first decryption module is used for decrypting the first target data based on the first private key when the approval passes, so as to obtain the data to be uploaded;
the encryption module is used for encrypting the data to be uplink based on the public key of the first unit node to obtain second target data;
the second decryption module is used for sending the second target data to the first unit node, decrypting the second target data based on a second private key of the first unit node, and obtaining the data to be uplink;
wherein the blockchain further includes: the operation log chain, wherein, the operation log chain stores the hash value corresponding to the operation log after the block data in the block chain is subjected to the preset operation, the hash value is associated with the corresponding block data in the block chain, and the operation log chain comprises:
the first acquisition unit is used for acquiring a target hash value corresponding to target block data when receiving a tracing request for the target block data;
a second obtaining unit, configured to obtain a target operation log corresponding to the target hash value based on the operation log chain;
the tracing unit is used for tracing the target block data based on the target operation log;
wherein, the approval module includes:
the first approval unit is used for simultaneously approving the sharing request based on the second unit node and the supervision node to obtain a first approval result and a second approval result;
the comparison unit is used for comparing the first trial result and the second trial result;
the first judging unit is used for judging that the sharing request passes the approval when the first approval result and the second approval result are both the approval passes;
or, the approval module includes:
the third approval unit is used for approving the sharing request based on the second unit node to obtain a third approval result;
the fourth approval unit is used for approving the sharing request based on the supervision node if the third approval result is approved to obtain a fourth approval result;
the second judging unit is used for judging that the sharing request passes the approval if the fourth approval result is that the approval passes;
wherein, the approval module includes:
the verification unit is used for carrying out consensus verification on the data to be uplinked;
the third acquisition unit is used for acquiring a first private key of the supervision node under the condition that verification is passed;
and the encryption unit is used for encrypting the data to be uplink based on the first private key to obtain first target data.
CN202011592929.XA 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology Active CN112702354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011592929.XA CN112702354B (en) 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011592929.XA CN112702354B (en) 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology

Publications (2)

Publication Number Publication Date
CN112702354A CN112702354A (en) 2021-04-23
CN112702354B true CN112702354B (en) 2023-08-11

Family

ID=75511503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011592929.XA Active CN112702354B (en) 2020-12-29 2020-12-29 Data resource sharing traceability method and device based on blockchain technology

Country Status (1)

Country Link
CN (1) CN112702354B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114785517B (en) * 2022-04-06 2024-03-19 浙江数秦科技有限公司 Associated service data sharing method based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379381A (en) * 2018-12-07 2019-02-22 深圳市智税链科技有限公司 Data managing method, device, medium and the electronic equipment of block catenary system
CN109639753A (en) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 A kind of data sharing method and system based on block chain
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
CN110727712A (en) * 2019-10-15 2020-01-24 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium
CN110958253A (en) * 2019-12-05 2020-04-03 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
WO2020181845A1 (en) * 2019-03-14 2020-09-17 深圳壹账通智能科技有限公司 Method and device for encrypting blockchain data, computer apparatus, and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639753A (en) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 A kind of data sharing method and system based on block chain
CN109379381A (en) * 2018-12-07 2019-02-22 深圳市智税链科技有限公司 Data managing method, device, medium and the electronic equipment of block catenary system
WO2020181845A1 (en) * 2019-03-14 2020-09-17 深圳壹账通智能科技有限公司 Method and device for encrypting blockchain data, computer apparatus, and storage medium
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
CN110727712A (en) * 2019-10-15 2020-01-24 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium
CN110958253A (en) * 2019-12-05 2020-04-03 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112702354A (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN109639753B (en) Data sharing method and system based on block chain
WO2021184963A1 (en) Contract calling method and apparatus
CN111130757B (en) Multi-cloud CP-ABE access control method based on block chain
TWI709314B (en) Data processing method and device
CN110519260B (en) Information processing method and information processing device
CN108055274A (en) A kind of encryption based on alliance's chain storage data and shared method and system
CN108737442A (en) A kind of cryptographic check processing method
US11831753B2 (en) Secure distributed key management system
CN112613956B (en) Bidding processing method and device
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
US20220407729A1 (en) Data processing method and apparatus, device, and medium
CN114172667A (en) Privacy evidence storing method and device based on contract
CN112699353B (en) Financial information transmission method and financial information transmission system
Cha et al. Blockchain based sensitive data management by using key escrow encryption system from the perspective of supply chain
CN115580413B (en) Zero-trust multi-party data fusion calculation method and device
US20130173923A1 (en) Method and system for digital content security cooperation
CN110598377A (en) Software serial number management method and device based on block chain
CN115147224A (en) Transaction data sharing method and device based on alliance chain
CN113965370B (en) Data transmission method and device, computer equipment and readable storage medium
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN114997867A (en) Data element multi-mode delivery system and method based on block chain and privacy calculation
CN112702354B (en) Data resource sharing traceability method and device based on blockchain technology
CN112884485A (en) Symmetric encryption traceability transaction method, system and storage medium based on block chain network
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN111080300A (en) Asset transfer method and device based on block chain and hardware equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant