CN112884554B - Auction method of Internet of things data auction system based on alliance chain - Google Patents
Auction method of Internet of things data auction system based on alliance chain Download PDFInfo
- Publication number
- CN112884554B CN112884554B CN202110291564.5A CN202110291564A CN112884554B CN 112884554 B CN112884554 B CN 112884554B CN 202110291564 A CN202110291564 A CN 202110291564A CN 112884554 B CN112884554 B CN 112884554B
- Authority
- CN
- China
- Prior art keywords
- data
- auction
- auctioneer
- transaction
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000008569 process Effects 0.000 claims abstract description 13
- 238000012797 qualification Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 30
- 230000008901 benefit Effects 0.000 claims description 28
- 238000013500 data storage Methods 0.000 claims description 10
- 230000002427 irreversible effect Effects 0.000 claims description 6
- 230000008520 organization Effects 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 claims description 5
- 238000012546 transfer Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000013480 data collection Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 238000012550 audit Methods 0.000 abstract 1
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0611—Request for offers or quotes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/08—Auctions
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/45—Commerce
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y20/00—Information sensed or collected by the things
- G16Y20/40—Information sensed or collected by the things relating to personal data, e.g. biometric data, records or preferences
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Operations Research (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an auction method of an Internet of things data auction system based on a alliance chain, S10, qualification audit and information input of two auction parties, wherein the data auction system can divide users into two categories of a bidder and an auctioneer according to the input information; s20, auction data authentication, wherein the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for an auctioneer to check the authentication result; s30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the requirement, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered. According to the auction method of the Internet of things data auction system based on the alliance chain, the uplink of the transaction process ensures traceability, traceability and non-falsification of the data auction process, and any problems occurring on both parties achieving the transaction can be inquired through the alliance chain.
Description
Technical Field
The invention relates to the technical field of Internet of things auction, in particular to an auction method of an Internet of things data auction system based on a alliance chain.
Background
The blockchain is a decentralised distributed data storage technology, and the introduction of the blockchain layer into the data market system enables individual users to directly transact with data demanders without relying on any third party, thereby enabling the users to maintain ownership of the data and ensuring that the transaction process is transparent.
The traditional centralized data market relates to parties, namely data auctioneers, data buyers and a market platform, and the platform can obtain higher benefits through ways of collusion fraud, arbitrage purchasing strategies and the like. In addition, the centralized data transaction model lacks an effective information communication channel between the data buyer and the data seller, resulting in inefficient data transaction. Finally, the marketplace platform has the further information advantage that the marketplace platform knows the data content, but the data buyer cannot know the data content before buying the data, so that the marketplace platform can illegally obtain benefits by building information barriers and controlling information disclosure.
The centralized data market is easily targeted by an attacker, sensitive information (such as location, chat records, etc.) of users is stored in a centralized database, there is a risk of privacy disclosure and data loss, and even if it uses and sells data illegally, it is generally difficult to track down.
Disclosure of Invention
In order to solve the problems, the invention provides an auction method of an Internet of things data auction system based on a alliance chain, wherein the uplink of a transaction process ensures traceability, traceability and non-falsification of the data auction process, and any problems occurring on both parties achieving the transaction can be inquired through the alliance chain.
In order to achieve the above purpose, the invention adopts a technical scheme that:
an auction method of an internet of things data auction system based on a coalition chain, comprising: s10, checking qualification of auction parties and inputting information, wherein a user firstly registers an account before conducting data auction, after the user registers, the information is input, and a data auction system divides the user into two categories of an auctioneer and an auctioneer according to the input information; s20, auction data authentication, wherein an auctioneer encrypts and uploads a data auction request to a alliance chain through a public and private key generated by a data auction platform, and the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for the auctioneer to check an authentication result; s30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the need, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered; s40, calculating utility functions and social benefits of the buyers and sellers, wherein the buyers and sellers with successful transaction can calculate profits according to the profits of the buyers and sellers, the market calculates a result of maximizing the social benefits by analyzing the profits of the buyers and sellers, and a consensus node in the data auction platform registers transaction information into a chain; the Internet of things data auction system of the alliance chain comprises an auction player, an auction platform, an intelligent contract and a distributed database which are connected with each other through the alliance chain.
Further, the intelligent contracts include a registration contract RC, a classification contract CLC, a licensing contract PC, an auction contract AC, and a trade contract TC.
Further, the step S10 includes: s11, calculating a public key K by a private key S, generating a random number X by a data auction system through a random source, then generating a private key S with 256 binary digits by the random number through an SHA-256 hash algorithm, and calculating the private key S by an elliptic curve cryptography algorithm ECDSA to obtain a unique 64-bit byte public key K; s12, calculating a currency address H by using a public key K, taking the public key K as input, firstly calculating a hash encryption value of SHA-256 to obtain a binary data result with the length of 256bits, and then calculating a hash encryption value of RIPEMD-160 by using the obtained result to obtain binary data with the length of 160bits, wherein the value is an initial value of the currency address; s13, obtaining a currency address by the public key hash, and encoding the public key hash by using Base58Check and Base64Check formats or converting the public key hash into a corresponding two-dimensional code by using a two-dimensional code generation algorithm; s14, the user firstly needs to send an identity verification application to a certificate issuing mechanism CA, submits corresponding identity certificates, certificates and related certificates, the CA verifies the identity information of the user, after the CA passes the verification, a key management center creates a key pair for the applicant, then sends the key pair to the applicant, and the CA generates a digital certificate according to the related attribute of the applicant, the personal information and a public key created by the key management center and sends the digital certificate to the applicant; s15, after receiving the digital certificate and the key pair, the user sends a registration application to the data auction system, and sends a digital certificate generated by the CA, after receiving the application, the node firstly inquires whether the user exists in the classification contract CLC, if the user is confirmed to be a new user, the authenticity of the digital certificate is checked, and the identity of the user is confirmed to the CA; s16, after the identity verification is passed, the node stores the address and the identity of the user in a classification contract CLC, the user is added into a data auction system, and after the user is added into the data auction system, the data auction system automatically creates an empty auction contract AC and a permission contract PC for the user and sends the contract address to the user; s17, after the user registers to obtain the transaction currency address, information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information.
Further, the step S20 includes: s21, the data auction platform generates public and private key pairs { P K ,S K And will public key P K Uploading to a alliance chain; s22, the auctioneer needs to ensure that the auctioned data is safely used and guaranteed before the data transaction is carried out, the auctioneer submits a data auction request to the data auction platform, and the auctioneer downloads the public key P of the data auction platform in a alliance chain K By P K Encrypting the data auction request, the auctioneer encrypts the address of the ciphertext and its public key P S Uploading to a alliance chain; s23, the data auction platform searches all data auction requests, downloads encrypted data through the address where the data of the auctioneer is stored, and uses the private key S of the data auction platform K Decrypting the ciphertext, verifying the data, and using the result of verification by the auctioneerPublic key P S Encrypting, releasing the ciphertext to a alliance chain, downloading by an auctioneer and then utilizing the private key S of the auctioneer S And decrypting and checking the result of data authentication.
Further, the step S30 includes: s31, issuing data auction information, wherein an auctioneer issues sales information of data through a classification contract, wherein the sales information comprises addresses of data storage, hash values of the data, types of the data, identification results of the data and keywords of the data; s32, searching data, namely searching the data by using keywords by the auction player through a searching function, checking sales information of the searched data, and screening the searched data to determine data which want to auction; s33, the auction operator submits an auction order, the auction operator firstly carries out data auction according to the actual demand of the operator, after receiving auction information, the auction contract of the operator automatically adds address information of the operator, the operator carries out auction on the retrieved data, an order is firstly added in an intelligent contract, the order comprises the demand of the operator on the data, the demand of the data comprises data types and auction quantity, when the auction price is submitted, irreversible solving and hash functions are utilized, the quotation is connected with a string of self-defined random character strings, hash encryption is carried out to be used as a sealed quotation, and meanwhile, a certain Ethernet coin is transferred to the intelligent contract address to be used as a guarantee to avoid false auction requests; s34, the auctioneer accepts the auction order, packages corresponding data according to the purchase order submitted by the auctioneer, utilizes an irreversible solving and hashing function when submitting the auction price, connects the quotation with a string of self-defined random character strings, performs hash encryption to serve as a sealed quotation, and meanwhile, transfers a certain Ethernet to the address of the intelligent contract of the auctioneer accepting the auction order to serve as a guarantee, so that false auction requests are avoided, and since the blockchain is public and transparent, the auctioneer who directly submits the price to the intelligent contract can see the bids of other auctioneers, therefore, sets a time function, and the auctioneer needs to submit the hash value of the sealed quotation in a window; s35, determining the parties for achieving the transaction, wherein the parties of the transaction acquire real bids of the parties through intelligent contracts, if the bids of one party are too low, the system can reduce the reputation value of the auctioneer, deduct the corresponding amount of deposit as punishment, and the reputation value of the auctioneer and the auctioneer who succeed in the transaction data can be improved; s36, the data auction system calculates the calculation tasks of the auction participants in a homomorphic encryption mode, and then gives the encrypted results to the data auction participants to complete orders.
Further, the step S34 includes: s341, after the auctioneer receives the auction order of the auctioneer, firstly encrypting data by using a symmetric encryption KEY, and signing the abstract msg of the ciphertext CT by using a private KEY SKD; s342, the auctioneer stores the encrypted ciphertext CT into a database, and the database returns a storage address Addr i The method comprises the steps of carrying out a first treatment on the surface of the S343, the auctioneer encrypts the storage address and the symmetric encryption key by the public key of the patient, attaches a signature, and sends the signature as transaction data to the network; s344, after receiving the transaction information, the consensus node firstly verifies the signature, if the signature passes the verification, the transaction data is packed into a block, and the consensus node waits for uplink; s345 after the block is commonly identified and uplink, the auction person can acquire the address of the transaction data from the block, the auction person firstly verifies the signature of the block, and then uses the private key SK of the auction person p And decrypting to obtain the key and the auction data storage address.
Further, the step S35 includes: s351, the blockchain platform can release the quantity of the auction players and the fees required to be paid by both parties in a round of transaction on the platform, and both parties can refer to the transaction; s352, after the block chain transaction platform sends a notice, a bidder who wants to sell data calculates the utility of the bidder according to the loss function of the bidder and the payment fee of the platform, each auctioneer submits n schemes for drawing out the sell data to the block chain platform, and the block chain platform issues the drawn out schemes to each corresponding auctioneer; s353, after receiving the m-bit proposed selling scheme, the bidder calculates the utility according to the income function and the fee to be charged by the platform, and submits the purchasing scheme to the platform, wherein the purchasing scheme comprises the number of the bidder, the data type number and the purchasing quantity b ij Total amount z of data to be purchased ij The method comprises the steps of carrying out a first treatment on the surface of the The 354 blockchain platform will bidThe purchase proposal of the player is sent to the corresponding auctioneer, and the auctioneer calculates the data unit price c given by the auctioneer after obtaining the purchase proposal of the auctioneer ij =z ij /b ij The minimum price of the vending data of the auctioneer is g ij When c ij Greater than or equal to g ij At c ij For unit price, the data volume of the transaction is b ij The method comprises the steps of carrying out a first treatment on the surface of the When c ij Less than g ij When the transaction is terminated; s355 calculates the utility function result of the buyer and seller who succeed in the transaction.
Further, the step S36 includes: s361 homomorphic key generation, wherein a trusted data auction third party organization generates a pair of homomorphic keys as homomorphic keys of the whole network, public keys of the homomorphic keys are disclosed, and private keys are stored in the data auction third party organization; s362 encrypts auction data and order information by using the homomorphic public key of the whole network, and the homomorphic encrypted ciphertext is respectively marked as X1 and X2, and the operation adopts an addition homomorphic encryption algorithm; s363 encrypts the transaction order in step S362 with the public key of the receiver, the encrypted ciphertext is denoted as Y1; s364, the sender initiates a transaction, the transaction content comprises three fields of ciphertext X1, ciphertext X2 in step S362 and ciphertext Y1 in step S363, and the sender sends transaction information to the all-network node for verification; s365, confirming the transaction, verifying transaction information by a verification node of the block chain whole network, maintaining a public account, and modifying the real balance of the user on the public account by the verification node after the transaction information is successfully verified.
Further, the step S40 includes: the meaning of the cost function of the auctioneer is that the amount paid by the auctioneer and obtained through data transaction by the auctioneer is subtracted by the amount of economic loss caused by potential privacy leakage risks after data collection, storage and transmission of the auctioneer, when the platform issues the allocation scheme X and the cost function U () of the round, the seller calculates the label issuing condition S of the next round according to the allocation scheme, the cost function and the loss function, so as to maximize the benefit which can be obtained by the auctioneer, and the following formulas (1) - (2) can be used as follows:
max J s =F(S)-U(X)……………………………………………(1)
where S represents all bidding cases of the auctioneer, F () represents the cost function paid to the auctioneer by all the auctioneers, X represents the distribution scheme of the auctioneer to all the auctioneers, U () represents the loss function of the auctioneer, X ij Represented as the amount of data that auctioneer i wants to sell to auctioneer j, S ij An amount of data designated as auctioneer i assigned to auctioneer j; the cost function of the auction player is represented by the following formulas (3) - (4) to be solved by the buyer, wherein the cost function of the auction player is represented by the utility benefit generated by the data purchased by the auction player minus the cost paid to the blockchain platform in the transaction process:
max J B =W(Y)-H(B)………………………………………………(3)
Where Y represents the total data that the auctioneer wants to purchase from all auctioneer's hands, W () represents the revenue function generated by the auctioneer's purchase of data, B represents the purchase scheme, H () represents the cost function, Y ij Data quantity b representing the amount of data of auction bidder j purchased from bidder i ij The amount of data representing that bidder j wants to purchase bidder i; s43 in economics, the definition of social benefit is the difference between the total benefit of all the auctioneers and the total loss of the utility of all the auctioneers, and in the blockchain many-to-many data auction market, the problem of maximizing social benefit can be expressed as follows in formulas (5) to (7):
y ij ≤x ij ……………………………………………………………(7)
wherein C is i Representing the maximum amount of data held by the auctioneer, b ij Representing the amount of data, y, of a bidder j that is willing to purchase a bidder i ij Data quantity x representing the number of bidder j purchased from bidder i ij Represented as the amount of data, s, that auctioneer i wants to sell to auctioneer j ij The amount of data that is expressed as the amount of data that auctioneer i allocates to auctioneer j, the sum of the amounts of data that equation (3) is the amount of data that auctioneer i can allocate to all auctioneers does not exceed the amount of data that auctioneer i owns, and the amount of data that equation (4) is the amount of data that auctioneer j can purchase from auctioneer i does not exceed the amount of data that auctioneer i wants to sell to auctioneer j; s44, transaction information is recorded and linked, agreement is achieved in the technology of recording and linking block information, and the newly created block node and a target block in the data auction system adopt the same technical architecture; s45, building a block chain basic environment on a server according to corresponding technical standards, and accessing the built nodes into a target block chain network; s46, the auction transaction blockchain is accessed to a target blockchain data auction system, trusted identity authenticity verification is applied, and after verification, an identity signature and a secret key are obtained; s47 uses standard data auction system specifications to link auction data.
Compared with the prior art, the technical scheme of the invention has the following advantages:
(1) According to the auction method of the Internet of things data auction system based on the alliance chain, the uplink of the transaction process ensures traceability, traceability and non-falsification of the data auction process, and any problems occurring on both parties achieving the transaction can be inquired through the alliance chain.
(2) According to the auction method of the internet of things data auction system based on the alliance chain, when a new data auction request is generated, the value of the data auction request cannot be accurately evaluated, the transaction can be carried out in the auction system, the buyers and sellers submit prices, the transaction is successful when the prices reach the standards of the buyers and sellers, after the data auction request is subjected to multiple auctions, the price of the data auction request reaches a certain interval range, the data auction request can be priced, and the data auction request can be directly subjected to the transaction through pricing.
(3) According to the auction method of the Internet of things data auction system based on the alliance chains, data are replicable, and each round of auction can be successful in a plurality of groups of transactions, namely one auctioneer can sell the same data to multiple auctioneers, and each auctioneer can also auction different data of a plurality of different auctioneers.
(4) According to the auction method of the Internet of things data auction system based on the alliance chain, alliance chain technology is combined on the basis of artificial intelligence, the data auction process is decentralised, so that a market platform does not have more information advantages, and can not illegally obtain benefits by constructing information barriers and controlling information disclosure, and on the contrary, after each round of auction transaction is finished, the two parties with successful transaction calculate respective utility functions, and the market calculates a result of maximizing social benefit.
Drawings
The technical solution of the present invention and its advantageous effects will be made apparent by the following detailed description of the specific embodiments of the present invention with reference to the accompanying drawings.
FIG. 1 is a flow chart of an auction method of an Internet of things data auction system based on a alliance chain according to an embodiment of the present invention;
FIG. 2 is a flow chart of an auction method of the Internet of things data auction system based on a alliance chain according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a data auction structure based on a coalition chain in an Internet of things environment according to an embodiment of the present invention;
FIG. 4 is a flow chart of a smart contract execution method according to an embodiment of the invention;
FIG. 5 illustrates a registered contract RC smart contract algorithm in accordance with an embodiment of the present invention;
FIG. 6 illustrates a classification contract CLC smart contract algorithm according to an embodiment of the invention;
FIG. 7 illustrates a license contract PC intelligent contract algorithm in accordance with an embodiment of the present invention;
FIG. 8 illustrates an auction contract AC intelligent contract algorithm according to an embodiment of the invention;
FIG. 9 illustrates a transaction contract TC intelligent contract algorithm, according to an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The embodiment provides an auction method of an internet of things data auction system based on a alliance chain, as shown in fig. 1-2, comprising: s10, checking qualification of auction parties and inputting information, wherein a user firstly registers an account before conducting data auction, after the user registers, the information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information. S20, auction data authentication, wherein an auctioneer encrypts and uploads a data auction request to a alliance chain through a public and private key generated by a data auction platform, and the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for the auctioneer to check an authentication result. S30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the requirement, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered. S40, calculating utility functions and social benefits of the buyers and sellers, wherein the buyers and sellers with successful transactions can calculate profits according to the profits of the buyers and sellers, the market calculates a result of maximizing the social benefits by analyzing the profits of the buyers and sellers, and a consensus node in the data auction platform registers transaction information into a chain.
As shown in fig. 3, the internet of things data auction system of the coalition chain includes an auctioneer, an auction platform, an intelligent contract, and a distributed database, which are connected to each other through the coalition chain. As shown in fig. 4 to 9, the smart contracts include a registration contract RC, a classification contract CLC, a license contract PC, an auction contract AC, and a transaction contract TC. The registration contract RC mainly stores addresses of all nodes in the system. In the user registration process, the system adds the address and classification information of the node to the contract. Through the registration condition of nodes in the RC confirmation system, double registration can be effectively prevented, and the system safety is ensured. The classification contract CLC mainly stores the category of the user and the category of auction data, the auctioneer submits the data through the CLC, and the data auction system classifies the data. The license contract PC mainly stores the address and the authority of the license node. The user manages the rights of the applicant in the license contract, and access control is performed on the auction data through the license contract, so that the privacy of the patient is protected. The auction contract RC mainly stores information such as an address, a status, and the like of a node with which a user (buyer and seller) has interacted. Each user has an auction contract for recording interactions between users (bids by buyers and sellers during a auction). Nodes with interaction relations are trusted to a certain extent, so that judgment is convenient when authorization is performed. The transaction contract TC mainly stores the address of the buyer and the seller who are successful in auction and the related information of transaction data, and when the transaction occurs, the preselected storage amount is frozen, so that the transaction safety is ensured. After the transaction is completed and the data is received by the auctioneer, a money transfer is made to the auctioneer. And replacing a trusted third party with the intelligent contract to realize transaction payment management. The transaction amount is prestored, double-flower attack can be effectively prevented, and transaction safety is guaranteed.
The step S10 includes: s11, calculating a public key K by a private key S, generating a random number X by a data auction system through a random source, then generating a private key S with 256 binary digits by the random number through an SHA-256 hash algorithm, and calculating the private key S by an elliptic curve cryptography algorithm ECDSA to obtain a unique 64-bit byte public key K. S12, calculating a currency address H by using a public key K, taking the public key K as input, firstly calculating the hash encryption value of the SHA-256 to obtain a binary data result with the length of 256bits, and then calculating the hash encryption value of RIPEMD-160 by using the obtained result to obtain binary data with the length of 160bits, wherein the value is an initial value of the currency address. And S13, obtaining a currency address by the public key hash, and encoding the public key hash by using Base58Check and Base64Check formats or converting the public key hash into a corresponding two-dimensional code by using a two-dimensional code generation algorithm. S14, the user firstly needs to send an identity verification application to a certificate issuing mechanism CA, submits corresponding identity certificates, certificates and related certificates, the CA verifies the identity information of the user, after the CA passes the verification, a key management center creates a key pair for the applicant, then sends the key pair to the applicant, and the CA generates a digital certificate according to the related attribute of the applicant, the personal information and the public key created by the key management center and sends the digital certificate to the applicant. S15, after receiving the digital certificate and the key pair, the user sends a registration application to the data auction system, and sends the digital certificate generated by the CA, after receiving the application, the node firstly inquires whether the user exists in the classification contract CLC, if the user is confirmed to be a new user, the authenticity of the digital certificate is checked, and the identity of the user is confirmed to the CA. And S16, after the identity verification is passed, the node stores the address and the identity of the user in a classification contract CLC, the user is added into the data auction system, and after the user is added into the data auction system, the data auction system automatically creates an empty auction contract AC and a permission contract PC for the user and sends the contract address to the user. S17, after the user registers to obtain the transaction currency address, information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information. The client also comprises a simple Ethernet account management function.
The step S20 includes: s21, the data auction platform generates public and private key pairs { P K ,S K And will public key P K Uploading to the federation chain. S22, the auctioneer needs to ensure that the auctioned data is safely used and guaranteed before the data transaction is carried out, the auctioneer submits a data auction request to the data auction platform, and the auctioneer downloads the public key P of the data auction platform in a alliance chain K By P K Encrypting the data auction request, the auctioneer encrypts the address of the ciphertext and its public key P S Uploading to the federation chain. S23, the data auction platform searches all data auction requests, downloads encrypted data through the address where the data of the auctioneer is stored, and uses the private key S of the data auction platform K For ciphertextDecrypting the data, verifying the data, and using the result of verification by using the public key P of the auctioneer S Encrypting, releasing the ciphertext to a alliance chain, downloading by an auctioneer and then utilizing the private key S of the auctioneer S And decrypting and checking the result of data authentication.
The step S30 includes: s31 issues data auction information, which the auctioneer issues sales information of the data by classifying the contract, the sales information including an address of the data storage, a hash value of the data, a type of the data, an authentication result of the data, and a keyword of the data. S32, searching the data, wherein the data is searched by the auction player through the searching function by utilizing the keywords, the auction player can check sales information of the searched data, and the data which is wanted to be auctioned is determined by screening the searched data. S33, the auction operator submits an auction order, the auction operator firstly performs data auction according to the actual demand of the operator, after receiving auction information, the auction contract of the auction operator automatically adds address information of the auction operator, the auction operator performs auction on the searched data, an order is added in an intelligent contract, the order comprises the demand of the auction operator on the data, the demand of the data comprises data types and auction quantity, when the auction price is submitted, an irreversible solving and hash function is utilized, the quotation is connected with a string of custom random character strings, hash encryption is performed to be used as a sealing quotation, and meanwhile, a certain Ethernet coin is transferred to the intelligent contract address to be used as a guarantee to avoid false auction requests.
S34, the auctioneer accepts the auction order, packages corresponding data according to the purchase order submitted by the auctioneer, utilizes an irreversible solving and hashing function when submitting the auction price, connects the quotation with a string of self-defined random character strings, performs hash encryption to serve as a sealed quotation, and meanwhile, transfers a certain Ethernet to the address of the intelligent contract of the auctioneer accepting the auction order to serve as a guarantee, so that false auction requests are avoided, and since the blockchain is public and transparent, the auctioneer who directly submits the price to the intelligent contract can see the bids of other auctioneers, and therefore, sets a time function, and the auctioneer needs to submit the hash value of the sealed quotation in the window. The step S34 includes: s341 auctioneerAfter receiving the auction order of the auctioneer, the auctioneer first encrypts the data with the symmetric encryption KEY and signs the digest msg of the ciphertext CT using the private KEY SKD. S342, the auctioneer stores the encrypted ciphertext CT into a database, and the database returns a storage address Addr i . S343 the auctioneer encrypts the storage address and the symmetric encryption key with the patient' S public key and attaches a signature as a piece of transaction data to be transmitted to the network. After receiving the transaction information, the consensus node at S344 verifies the signature first, and if the signature passes the verification, packages the transaction data into a block, and waits for the consensus uplink. S345 after the block is commonly identified and uplink, the auction person can acquire the address of the transaction data from the block, the auction person firstly verifies the signature of the block, and then uses the private key SK of the auction person p And decrypting to obtain the key and the auction data storage address.
S35, determining the parties for achieving the transaction, wherein the parties of the buyer and the seller acquire the true bid of the parties through the intelligent contract, if the bid of one party is too low, the system can reduce the reputation value of the auctioneer, and deduct the corresponding amount of deposit as punishment, so that the reputation value of the auctioneer and the auctioneer who successfully transact the data can be improved. Users with too low reputation values will not be able to participate in transactions, and the reputation system can suppress the cheating actions of system participants. The step S35 includes: s351, the blockchain platform can release the quantity of the auction participants and the auctioneers and the fees required to be paid by both sides of a round of transaction on the platform, and both sides of the transaction can refer to the information. And S352, after the block chain transaction platform sends a notice, a bidder who wants to sell data calculates the utility of the bidder according to the loss function of the bidder and the payment fee of the platform, each auctioneer submits n schemes for drawing out the sell data to the block chain platform, and the block chain platform issues the drawn out schemes to each corresponding auctioneer. S353, after receiving the m-bit proposed selling scheme, the bidder calculates the utility according to the income function and the fee to be charged by the platform, and submits the purchasing scheme to the platform, wherein the purchasing scheme comprises the number of the bidder, the data type number and the purchasing quantity b ij Total amount z of data to be purchased ij . The 354 blockchain platform sends the bidder's purchase to the corresponding auctionThe seller, after obtaining the purchase scheme of the auction subject, calculates the data unit price c given by the auction subject ij =z ij /b ij The minimum price of the vending data of the auctioneer is g ij When c ij Greater than or equal to g ij At c ij For unit price, the data volume of the transaction is b ij The method comprises the steps of carrying out a first treatment on the surface of the When c ij Less than g ij When the transaction is terminated. S355 calculates the utility function result of the buyer and seller who succeed in the transaction.
S36, the data auction system calculates the calculation tasks of the auction participants in a homomorphic encryption mode, and then gives the encrypted results to the data auction participants to complete orders. The step S36 includes: s361 homomorphic key generation, a trusted data auction third party organization generates a pair of homomorphic keys as homomorphic keys of the whole network, public keys of the homomorphic keys are disclosed, and private keys are stored in the data auction third party organization. S362 encrypts the auction data and the order information by using the homomorphic public key of the whole network, and the homomorphic encrypted ciphertext is respectively marked as X1 and X2, and the operation adopts an addition homomorphic encryption algorithm. S363 encrypts the transaction order in step S362 with the public key of the receiver, and the encrypted ciphertext is denoted as Y1. The sender initiates a transaction in S364, the transaction content includes three fields of ciphertext X1, ciphertext X2 in step S362, and ciphertext Y1 in S363, and the sender sends the transaction information to the all-network node for verification. S365, confirming the transaction, verifying transaction information by a verification node of the block chain whole network, maintaining a public account, and modifying the real balance of the user on the public account by the verification node after the transaction information is successfully verified.
The step S40 includes: the meaning of the cost function of the auctioneer is that the amount paid by the auctioneer and obtained through data transaction by the auctioneer is subtracted by the amount of economic loss caused by potential privacy leakage risks after data collection, storage and transmission of the auctioneer, when the platform issues the allocation scheme X and the cost function U () of the round, the seller calculates the label issuing condition S of the next round according to the allocation scheme, the cost function and the loss function, so as to maximize the benefit which can be obtained by the auctioneer, and the following formulas (1) - (2) can be used as follows:
max J s =F(S)-U(X)……………………………………………………(1)
where S represents all bidding cases of the auctioneer, F () represents the cost function paid to the auctioneer by all the auctioneers, X represents the distribution scheme of the auctioneer to all the auctioneers, U () represents the loss function of the auctioneer, X ij Represented as the amount of data that auctioneer i wants to sell to auctioneer j, S ij Represented as the amount of data that auctioneer i allocates to auctioneer j.
The cost function of the auction player is represented by the following formulas (3) - (4) to be solved by the buyer, wherein the cost function of the auction player is represented by the utility benefit generated by the data purchased by the auction player minus the cost paid to the blockchain platform in the transaction process:
max J B =W(Y)-H(B)………………………………………………(3)
where Y represents the total data that the auctioneer wants to purchase from all auctioneer's hands, W () represents the revenue function generated by the auctioneer's purchase of data, B represents the purchase scheme, H () represents the cost function, Y ij Data quantity b representing the amount of data of auction bidder j purchased from bidder i ij Indicating the amount of data that a bidder j wants to purchase a bidder i.
S43 in economics, the definition of social benefit is the difference between the total benefit of all the auctioneers and the total loss of the utility of all the auctioneers, and in the blockchain many-to-many data auction market, the problem of maximizing social benefit can be expressed as follows in formulas (5) to (7):
y ij ≤x ij ……………………………………………………………………(7)
wherein C is i Representing the maximum amount of data held by the auctioneer, b ij Representing the amount of data, y, of a bidder j that is willing to purchase a bidder i ij Data quantity x representing the number of bidder j purchased from bidder i ij Represented as the amount of data, s, that auctioneer i wants to sell to auctioneer j ij The sum of the data amounts that can be allocated to all the bidders for the auctioneer i is not more than the data amount owned by the auctioneer i, and the data amount that can be purchased from the auctioneer i for the auctioneer j is not more than the data amount that the auctioneer i wants to sell to the auctioneer j, expressed as the data amount that the auctioneer i allocates to the auctioneer j.
S44, the transaction information is recorded and linked, the technology of recording and linking the block information is agreed, and the newly created block node and the target block in the data auction system adopt the same technical architecture, so as to ensure the butt joint with the target block node.
S45, building a blockchain basic environment on a server according to corresponding technical standards, and accessing the built nodes into a target blockchain network.
S46, the auction transaction blockchain is accessed to a target blockchain data auction system, trusted identity authenticity verification is applied, and after verification, an identity signature and a secret key are obtained. S47 uses standard data auction system specifications to link auction data.
The foregoing description is only exemplary embodiments of the present invention and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes using the descriptions and the drawings of the present invention or directly or indirectly applied to other related technical fields are included in the scope of the present invention.
Claims (9)
1. An auction method of an internet of things data auction system based on a alliance chain, comprising:
s10, checking qualification of auction parties and inputting information, wherein a user firstly registers an account before conducting data auction, after the user registers, the information is input, and a data auction system divides the user into two categories of an auctioneer and an auctioneer according to the input information;
s20, auction data authentication, wherein an auctioneer encrypts and uploads a data auction request to a alliance chain through a public and private key generated by a data auction platform, and the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for the auctioneer to check an authentication result;
S30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the need, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered;
s40, calculating utility functions and social benefits of the buyers and sellers, wherein the buyers and sellers with successful transaction can calculate profits according to the profits of the buyers and sellers, the market calculates a result of maximizing the social benefits by analyzing the profits of the buyers and sellers, and a consensus node in the data auction platform registers transaction information into a chain;
the Internet of things data auction system of the alliance chain comprises an auction player, an auction platform, an intelligent contract and a distributed database which are connected with each other through the alliance chain.
2. The auction method of claim 1, wherein the intelligent contracts comprise a registration contract RC, a classification contract CLC, a licensing contract PC, an auction contract AC, a transaction contract TC.
3. The auction method of the internet of things data auction system based on the alliance chain according to claim 2, wherein said step S10 comprises:
S11, calculating a public key K by a private key S, generating a random number X by a data auction system through a random source, then generating a private key S with 256 binary digits by the random number through an SHA-256 hash algorithm, and calculating the private key S by an elliptic curve cryptography algorithm ECDSA to obtain a unique 64-bit byte public key K;
s12, calculating a currency address H by using a public key K, taking the public key K as input, firstly calculating a hash encryption value of SHA-256 to obtain a binary data result with the length of 256bits, and then calculating a hash encryption value of RIPEMD-160 by using the obtained result to obtain binary data with the length of 160bits, wherein the value is an initial value of the currency address;
s13, obtaining a currency address by the public key hash, and encoding the public key hash by using Base58Check and Base64Check formats or converting the public key hash into a corresponding two-dimensional code by using a two-dimensional code generation algorithm;
s14, the user firstly needs to send an identity verification application to a certificate issuing mechanism CA, submits corresponding identity certificates, certificates and related certificates, the CA verifies the identity information of the user, after the CA passes the verification, a key management center creates a key pair for the applicant, then sends the key pair to the applicant, and the CA generates a digital certificate according to the related attribute of the applicant, the personal information and a public key created by the key management center and sends the digital certificate to the applicant;
S15, after receiving the digital certificate and the key pair, the user sends a registration application to the data auction system, and sends a digital certificate generated by the CA, after receiving the application, the node firstly inquires whether the user exists in the classification contract CLC, if the user is confirmed to be a new user, the authenticity of the digital certificate is checked, and the identity of the user is confirmed to the CA; s16, after the identity verification is passed, the node stores the address and the identity of the user in a classification contract CLC, the user is added into a data auction system, and after the user is added into the data auction system, the data auction system automatically creates an empty auction contract AC and a permission contract PC for the user and sends the contract address to the user;
s17, after the user registers to obtain the transaction currency address, information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information.
4. The auction method of claim 3, wherein said step S20 comprises:
s21, the data auction platform generates public and private key pairs { P K ,S K And will public key P K Uploading to a alliance chain;
s22, the auctioneer needs to ensure that the auctioned data is safely used and guaranteed before the data transaction is carried out, the auctioneer submits a data auction request to the data auction platform, and the auctioneer downloads the public key P of the data auction platform in a alliance chain K By P K Encrypting the data auction request, the auctioneer encrypts the address of the ciphertext and its public key P S Uploading to a alliance chain;
s23, the data auction platform searches all data auction requests, downloads encrypted data through the address where the data of the auctioneer is stored, and uses the private key S of the data auction platform K Decrypting the ciphertext, verifying the data, and using the result of verification by using the public key P of the auctioneer S Encrypting, releasing the ciphertext to a alliance chain, downloading by an auctioneer and then utilizing the private key S of the auctioneer S And decrypting and checking the result of data authentication.
5. The auction method of claim 4, wherein said step S30 comprises:
s31, issuing data auction information, wherein an auctioneer issues sales information of data through a classification contract, wherein the sales information comprises addresses of data storage, hash values of the data, types of the data, identification results of the data and keywords of the data;
s32, searching data, namely searching the data by using keywords by the auction player through a searching function, checking sales information of the searched data, and screening the searched data to determine data which want to auction; s33, the auction operator submits an auction order, the auction operator firstly carries out data auction according to the actual demand of the operator, after receiving auction information, the auction contract of the operator automatically adds address information of the operator, the operator carries out auction on the retrieved data, an order is firstly added in an intelligent contract, the order comprises the demand of the operator on the data, the demand of the data comprises data types and auction quantity, when the auction price is submitted, irreversible solving and hash functions are utilized, the quotation is connected with a string of self-defined random character strings, hash encryption is carried out to be used as a sealed quotation, and meanwhile, a certain Ethernet coin is transferred to the intelligent contract address to be used as a guarantee to avoid false auction requests;
S34, the auctioneer accepts the auction order, packages corresponding data according to the purchase order submitted by the auctioneer, utilizes an irreversible solving and hashing function when submitting the auction price, connects the quotation with a string of self-defined random character strings, performs hash encryption to serve as a sealed quotation, and meanwhile, transfers a certain Ethernet to the address of the intelligent contract of the auctioneer accepting the auction order to serve as a guarantee, so that false auction requests are avoided, and since the blockchain is public and transparent, the auctioneer who directly submits the price to the intelligent contract can see the bids of other auctioneers, therefore, sets a time function, and the auctioneer needs to submit the hash value of the sealed quotation in a window;
s35, determining the parties for achieving the transaction, wherein the parties of the transaction acquire real bids of the parties through intelligent contracts, if the bids of one party are too low, the system can reduce the reputation value of the auctioneer, deduct the corresponding amount of deposit as punishment, and the reputation value of the auctioneer and the auctioneer who succeed in the transaction data can be improved;
s36, the data auction system calculates the calculation tasks of the auction participants in a homomorphic encryption mode, and then gives the encrypted results to the data auction participants to complete orders.
6. The auction method of claim 5, wherein said step S34 comprises:
s341, after the auctioneer receives the auction order of the auctioneer, firstly encrypting data by using a symmetric encryption KEY, and signing the abstract msg of the ciphertext CT by using a private KEY SKD;
s342, the auctioneer stores the encrypted ciphertext CT into a database, and the database returns a storage address Addr i ;
S343, the auctioneer encrypts the storage address and the symmetric encryption key by the public key of the patient, attaches a signature, and sends the signature as transaction data to the network;
s344, after receiving the transaction information, the consensus node firstly verifies the signature, if the signature passes the verification, the transaction data is packed into a block, and the consensus node waits for uplink;
s345 after the block is commonly identified and uplink, the auction person can acquire the address of the transaction data from the block, the auction person firstly verifies the signature of the block, and then uses the private key SK of the auction person p And decrypting to obtain the key and the auction data storage address.
7. The auction method of claim 6, wherein said step S35 comprises:
S351, the blockchain platform can release the quantity of the auction players and the fees required to be paid by both parties in a round of transaction on the platform, and both parties can refer to the transaction;
s352, after the block chain transaction platform sends a notice, a bidder who wants to sell data calculates the utility of the bidder according to the loss function of the bidder and the payment fee of the platform, each auctioneer submits n schemes for drawing out the sell data to the block chain platform, and the block chain platform issues the drawn out schemes to each corresponding auctioneer;
s353, after receiving the m-bit proposed selling scheme, the bidder calculates the utility according to the income function and the fee to be charged by the platform, and submits the purchasing scheme to the platform, wherein the purchasing scheme comprises the number of the bidder, the data type number and the purchasing quantity b ij Total amount z of data to be purchased ij ;
The 354 block chain platform sends the buyer of the auction player to the corresponding auction player, and the auction player calculates the data unit price c given by the auction player after obtaining the purchase scheme of the auction player ij =z ij /b ij The minimum price of the vending data of the auctioneer is g ij When c ij Greater than or equal to g ij At c ij For unit price, the data volume of the transaction is b ij The method comprises the steps of carrying out a first treatment on the surface of the When c ij Less than g ij When the transaction is terminated;
S355 calculates the utility function result of the buyer and seller who succeed in the transaction.
8. The auction method of claim 7, wherein said step S36 comprises:
s361 homomorphic key generation, wherein a trusted data auction third party organization generates a pair of homomorphic keys as homomorphic keys of the whole network, public keys of the homomorphic keys are disclosed, and private keys are stored in the data auction third party organization;
s362 encrypts auction data and order information by using the homomorphic public key of the whole network, and the homomorphic encrypted ciphertext is respectively marked as X1 and X2, and the operation adopts an addition homomorphic encryption algorithm;
s363 encrypts the transaction order in step S362 with the public key of the receiver, the encrypted ciphertext is denoted as Y1;
s364, the sender initiates a transaction, the transaction content comprises three fields of ciphertext X1, ciphertext X2 in step S362 and ciphertext Y1 in step S363, and the sender sends transaction information to the all-network node for verification;
s365, confirming the transaction, verifying transaction information by a verification node of the block chain whole network, maintaining a public account, and modifying the real balance of the user on the public account by the verification node after the transaction information is successfully verified.
9. The auction method of claim 8, wherein said step S40 comprises:
The meaning of the cost function of the auctioneer is that the amount paid by the auctioneer and obtained through data transaction by the auctioneer is subtracted by the amount of economic loss caused by potential privacy leakage risks after data collection, storage and transmission of the auctioneer, when the platform issues the allocation scheme X and the cost function U () of the round, the seller calculates the label issuing condition S of the next round according to the allocation scheme, the cost function and the loss function, so as to maximize the benefit which can be obtained by the auctioneer, and the following formulas (1) - (2) can be used as follows:
maxJ s =F(S)-U(X)…………………………………………………(1)
where S represents all bidding cases of the auctioneer, F () represents the cost function paid to the auctioneer by all the auctioneers, X represents the distribution scheme of the auctioneer to all the auctioneers, U () represents the loss function of the auctioneer, X ij Represented as the amount of data that auctioneer i wants to sell to auctioneer j, S ij An amount of data designated as auctioneer i assigned to auctioneer j;
the cost function of the auction player is represented by the following formulas (3) - (4) to be solved by the buyer, wherein the cost function of the auction player is represented by the utility benefit generated by the data purchased by the auction player minus the cost paid to the blockchain platform in the transaction process:
maxJ B =W(Y)-H(B)……………………………………………………(3)
where Y represents the total data that the auctioneer wants to purchase from all auctioneer's hands, W () represents the revenue function generated by the auctioneer's purchase of data, B represents the purchase scheme, H () represents the cost function, Y ij Data quantity b representing the amount of data of auction bidder j purchased from bidder i ij The amount of data representing that bidder j wants to purchase bidder i;
s43 in economics, the definition of social benefit is the difference between the total benefit of all the auctioneers and the total loss of the utility of all the auctioneers, and in the blockchain many-to-many data auction market, the problem of maximizing social benefit can be expressed as follows in formulas (5) to (7):
y ij ≤x ij ……………………………………………………………(7)
wherein C is i Representing the maximum amount of data held by the auctioneer, b ij Representing the amount of data, y, of a bidder j that is willing to purchase a bidder i ij Data quantity x representing the number of bidder j purchased from bidder i ij Represented as the amount of data, s, that auctioneer i wants to sell to auctioneer j ij The amount of data that is expressed as the amount of data that auctioneer i allocates to auctioneer j, the sum of the amounts of data that equation (3) is the amount of data that auctioneer i can allocate to all auctioneers does not exceed the amount of data that auctioneer i owns, and the amount of data that equation (4) is the amount of data that auctioneer j can purchase from auctioneer i does not exceed the amount of data that auctioneer i wants to sell to auctioneer j;
s44, transaction information is recorded and linked, agreement is achieved in the technology of recording and linking block information, and the newly created block node and a target block in the data auction system adopt the same technical architecture;
s45, building a block chain basic environment on a server according to corresponding technical standards, and accessing the built nodes into a target block chain network;
S46, the auction transaction blockchain is accessed to a target blockchain data auction system, trusted identity authenticity verification is applied, and after verification, an identity signature and a secret key are obtained;
s47 uses standard data auction system specifications to link auction data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110291564.5A CN112884554B (en) | 2021-03-18 | 2021-03-18 | Auction method of Internet of things data auction system based on alliance chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110291564.5A CN112884554B (en) | 2021-03-18 | 2021-03-18 | Auction method of Internet of things data auction system based on alliance chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112884554A CN112884554A (en) | 2021-06-01 |
CN112884554B true CN112884554B (en) | 2023-11-24 |
Family
ID=76041215
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110291564.5A Active CN112884554B (en) | 2021-03-18 | 2021-03-18 | Auction method of Internet of things data auction system based on alliance chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112884554B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115514502A (en) * | 2021-06-03 | 2022-12-23 | 中移雄安信息通信科技有限公司 | Block chain-based edge computing platform identity authentication method and device |
CN113487391A (en) * | 2021-06-11 | 2021-10-08 | 弥达斯科技(深圳)有限公司 | Auction trading method, device and equipment based on block chain and readable storage medium |
CN113489698B (en) * | 2021-06-25 | 2022-10-21 | 中标慧安信息技术股份有限公司 | Internet of things data secret reading method and system based on block chain |
CN113744051A (en) * | 2021-07-23 | 2021-12-03 | 北京邮电大学 | Distributed data transaction method and system |
CN113643134B (en) * | 2021-08-24 | 2023-08-25 | 杭州云象网络技术有限公司 | Internet of things blockchain transaction method and system based on multi-key homomorphic encryption |
CN113657978B (en) * | 2021-09-01 | 2024-04-09 | 东南大学 | Distributed energy auction method and system based on blockchain and privacy protection |
CN114978634B (en) * | 2022-05-12 | 2024-04-30 | 上海焜耀网络科技有限公司 | Construction and auction method of distributed auction system |
CN114897527B (en) * | 2022-05-20 | 2023-03-14 | 西南交通大学 | Authentication method for realizing commercial warranty claim value based on workload certification |
CN116894730A (en) * | 2023-06-08 | 2023-10-17 | 三峡大学 | Multi-element distributed energy storage transaction method based on link-up-link-down coordination |
CN117057825B (en) * | 2023-10-09 | 2023-12-19 | 新立讯科技股份有限公司 | Agricultural product transaction data processing method, agricultural product transaction data processing device, server and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108880863A (en) * | 2018-05-26 | 2018-11-23 | 江西理工大学 | A kind of smart grid equipment safety diagnostic service system based on block chain technology |
CN109118343A (en) * | 2018-07-26 | 2019-01-01 | 上海交通大学 | The auction system and system and medium of fixed quantity subject matter based on block chain |
WO2019040712A1 (en) * | 2017-08-23 | 2019-02-28 | Mochi, Inc. | Method and system for a decentralized marketplace auction |
CN109598550A (en) * | 2018-08-03 | 2019-04-09 | 武汉稀云科技有限公司 | A kind of Internet advertising put-on method and device |
CN110060137A (en) * | 2019-04-17 | 2019-07-26 | 响拍拍(厦门)网络科技有限公司 | A kind of system and method based on the Internet auctions |
KR20200134622A (en) * | 2019-05-22 | 2020-12-02 | 함문성 | Transaction methods and systems using direct trading and auction, reverse auction and joint auction of blockchain-based value tangible and intangible assets |
-
2021
- 2021-03-18 CN CN202110291564.5A patent/CN112884554B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019040712A1 (en) * | 2017-08-23 | 2019-02-28 | Mochi, Inc. | Method and system for a decentralized marketplace auction |
CN108880863A (en) * | 2018-05-26 | 2018-11-23 | 江西理工大学 | A kind of smart grid equipment safety diagnostic service system based on block chain technology |
CN109118343A (en) * | 2018-07-26 | 2019-01-01 | 上海交通大学 | The auction system and system and medium of fixed quantity subject matter based on block chain |
CN109598550A (en) * | 2018-08-03 | 2019-04-09 | 武汉稀云科技有限公司 | A kind of Internet advertising put-on method and device |
CN110060137A (en) * | 2019-04-17 | 2019-07-26 | 响拍拍(厦门)网络科技有限公司 | A kind of system and method based on the Internet auctions |
KR20200134622A (en) * | 2019-05-22 | 2020-12-02 | 함문성 | Transaction methods and systems using direct trading and auction, reverse auction and joint auction of blockchain-based value tangible and intangible assets |
Non-Patent Citations (1)
Title |
---|
基于拍卖的物联网搜索数据提供机制;殷丽华;郭云川;张会兵;通信学报;第36卷(第12期);37-46 * |
Also Published As
Publication number | Publication date |
---|---|
CN112884554A (en) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112884554B (en) | Auction method of Internet of things data auction system based on alliance chain | |
Wu et al. | CReam: A smart contract enabled collusion-resistant e-auction | |
CN107679976B (en) | Auction method based on block chain | |
TWI822653B (en) | Blockchain-based exchange with tokenisation | |
US20210241243A1 (en) | Computer method and apparatus for providing proprietary rights transactions | |
US20170221029A1 (en) | Blockchaining systems and methods for frictionless media | |
CN110807641A (en) | Pet food traceability system | |
TWI389046B (en) | Trusted third party clearing house for lead tracking | |
CN108701325A (en) | The transaction system that is self-regulated and the method for the system | |
CN111402043B (en) | Block chain-based internet of vehicles data transaction method | |
CN110503533B (en) | Heterogeneous spectrum multi-round auction method based on block chain | |
KR101951408B1 (en) | A System Providing Virtual Money Managerial System | |
CN109118102B (en) | Fair bidirectional combined cloud resource allocation method and system based on block chain | |
CN112163954B (en) | Transaction method and device based on block chain | |
CN111402055A (en) | Decentralized data transaction method based on block chain | |
Xiong et al. | Anti-collusion data auction mechanism based on smart contract | |
CN113962714A (en) | Auction tracing method based on Etheng privacy protection and implementation system | |
KR20190010516A (en) | Electronic commerce system based on block | |
JP2004206187A (en) | Community management system | |
JP2013045460A (en) | E-commerce transaction method for intangible merchandise | |
Pop et al. | An Ethereum-based implementation of English, Dutch and First-price sealed-bid auctions | |
Barbhaya et al. | Etradechain: blockchain-based energy trading in local energy market (lem) using modified double auction protocol | |
Perrig et al. | SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. | |
CN112819594A (en) | Privacy protection dynamic spectrum auction method based on alliance chain | |
Li et al. | Secure electronic ticketing system based on consortium blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |