CN112884554B - Auction method of Internet of things data auction system based on alliance chain - Google Patents

Auction method of Internet of things data auction system based on alliance chain Download PDF

Info

Publication number
CN112884554B
CN112884554B CN202110291564.5A CN202110291564A CN112884554B CN 112884554 B CN112884554 B CN 112884554B CN 202110291564 A CN202110291564 A CN 202110291564A CN 112884554 B CN112884554 B CN 112884554B
Authority
CN
China
Prior art keywords
data
auction
auctioneer
transaction
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110291564.5A
Other languages
Chinese (zh)
Other versions
CN112884554A (en
Inventor
马海英
李金舟
孙国荣
黄双龙
曹东杰
刘沁仪
方佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong University
Original Assignee
Nantong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong University filed Critical Nantong University
Priority to CN202110291564.5A priority Critical patent/CN112884554B/en
Publication of CN112884554A publication Critical patent/CN112884554A/en
Application granted granted Critical
Publication of CN112884554B publication Critical patent/CN112884554B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0611Request for offers or quotes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/45Commerce
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/40Information sensed or collected by the things relating to personal data, e.g. biometric data, records or preferences
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Operations Research (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an auction method of an Internet of things data auction system based on a alliance chain, S10, qualification audit and information input of two auction parties, wherein the data auction system can divide users into two categories of a bidder and an auctioneer according to the input information; s20, auction data authentication, wherein the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for an auctioneer to check the authentication result; s30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the requirement, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered. According to the auction method of the Internet of things data auction system based on the alliance chain, the uplink of the transaction process ensures traceability, traceability and non-falsification of the data auction process, and any problems occurring on both parties achieving the transaction can be inquired through the alliance chain.

Description

Auction method of Internet of things data auction system based on alliance chain
Technical Field
The invention relates to the technical field of Internet of things auction, in particular to an auction method of an Internet of things data auction system based on a alliance chain.
Background
The blockchain is a decentralised distributed data storage technology, and the introduction of the blockchain layer into the data market system enables individual users to directly transact with data demanders without relying on any third party, thereby enabling the users to maintain ownership of the data and ensuring that the transaction process is transparent.
The traditional centralized data market relates to parties, namely data auctioneers, data buyers and a market platform, and the platform can obtain higher benefits through ways of collusion fraud, arbitrage purchasing strategies and the like. In addition, the centralized data transaction model lacks an effective information communication channel between the data buyer and the data seller, resulting in inefficient data transaction. Finally, the marketplace platform has the further information advantage that the marketplace platform knows the data content, but the data buyer cannot know the data content before buying the data, so that the marketplace platform can illegally obtain benefits by building information barriers and controlling information disclosure.
The centralized data market is easily targeted by an attacker, sensitive information (such as location, chat records, etc.) of users is stored in a centralized database, there is a risk of privacy disclosure and data loss, and even if it uses and sells data illegally, it is generally difficult to track down.
Disclosure of Invention
In order to solve the problems, the invention provides an auction method of an Internet of things data auction system based on a alliance chain, wherein the uplink of a transaction process ensures traceability, traceability and non-falsification of the data auction process, and any problems occurring on both parties achieving the transaction can be inquired through the alliance chain.
In order to achieve the above purpose, the invention adopts a technical scheme that:
an auction method of an internet of things data auction system based on a coalition chain, comprising: s10, checking qualification of auction parties and inputting information, wherein a user firstly registers an account before conducting data auction, after the user registers, the information is input, and a data auction system divides the user into two categories of an auctioneer and an auctioneer according to the input information; s20, auction data authentication, wherein an auctioneer encrypts and uploads a data auction request to a alliance chain through a public and private key generated by a data auction platform, and the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for the auctioneer to check an authentication result; s30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the need, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered; s40, calculating utility functions and social benefits of the buyers and sellers, wherein the buyers and sellers with successful transaction can calculate profits according to the profits of the buyers and sellers, the market calculates a result of maximizing the social benefits by analyzing the profits of the buyers and sellers, and a consensus node in the data auction platform registers transaction information into a chain; the Internet of things data auction system of the alliance chain comprises an auction player, an auction platform, an intelligent contract and a distributed database which are connected with each other through the alliance chain.
Further, the intelligent contracts include a registration contract RC, a classification contract CLC, a licensing contract PC, an auction contract AC, and a trade contract TC.
Further, the step S10 includes: s11, calculating a public key K by a private key S, generating a random number X by a data auction system through a random source, then generating a private key S with 256 binary digits by the random number through an SHA-256 hash algorithm, and calculating the private key S by an elliptic curve cryptography algorithm ECDSA to obtain a unique 64-bit byte public key K; s12, calculating a currency address H by using a public key K, taking the public key K as input, firstly calculating a hash encryption value of SHA-256 to obtain a binary data result with the length of 256bits, and then calculating a hash encryption value of RIPEMD-160 by using the obtained result to obtain binary data with the length of 160bits, wherein the value is an initial value of the currency address; s13, obtaining a currency address by the public key hash, and encoding the public key hash by using Base58Check and Base64Check formats or converting the public key hash into a corresponding two-dimensional code by using a two-dimensional code generation algorithm; s14, the user firstly needs to send an identity verification application to a certificate issuing mechanism CA, submits corresponding identity certificates, certificates and related certificates, the CA verifies the identity information of the user, after the CA passes the verification, a key management center creates a key pair for the applicant, then sends the key pair to the applicant, and the CA generates a digital certificate according to the related attribute of the applicant, the personal information and a public key created by the key management center and sends the digital certificate to the applicant; s15, after receiving the digital certificate and the key pair, the user sends a registration application to the data auction system, and sends a digital certificate generated by the CA, after receiving the application, the node firstly inquires whether the user exists in the classification contract CLC, if the user is confirmed to be a new user, the authenticity of the digital certificate is checked, and the identity of the user is confirmed to the CA; s16, after the identity verification is passed, the node stores the address and the identity of the user in a classification contract CLC, the user is added into a data auction system, and after the user is added into the data auction system, the data auction system automatically creates an empty auction contract AC and a permission contract PC for the user and sends the contract address to the user; s17, after the user registers to obtain the transaction currency address, information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information.
Further, the step S20 includes: s21, the data auction platform generates public and private key pairs { P K ,S K And will public key P K Uploading to a alliance chain; s22, the auctioneer needs to ensure that the auctioned data is safely used and guaranteed before the data transaction is carried out, the auctioneer submits a data auction request to the data auction platform, and the auctioneer downloads the public key P of the data auction platform in a alliance chain K By P K Encrypting the data auction request, the auctioneer encrypts the address of the ciphertext and its public key P S Uploading to a alliance chain; s23, the data auction platform searches all data auction requests, downloads encrypted data through the address where the data of the auctioneer is stored, and uses the private key S of the data auction platform K Decrypting the ciphertext, verifying the data, and using the result of verification by the auctioneerPublic key P S Encrypting, releasing the ciphertext to a alliance chain, downloading by an auctioneer and then utilizing the private key S of the auctioneer S And decrypting and checking the result of data authentication.
Further, the step S30 includes: s31, issuing data auction information, wherein an auctioneer issues sales information of data through a classification contract, wherein the sales information comprises addresses of data storage, hash values of the data, types of the data, identification results of the data and keywords of the data; s32, searching data, namely searching the data by using keywords by the auction player through a searching function, checking sales information of the searched data, and screening the searched data to determine data which want to auction; s33, the auction operator submits an auction order, the auction operator firstly carries out data auction according to the actual demand of the operator, after receiving auction information, the auction contract of the operator automatically adds address information of the operator, the operator carries out auction on the retrieved data, an order is firstly added in an intelligent contract, the order comprises the demand of the operator on the data, the demand of the data comprises data types and auction quantity, when the auction price is submitted, irreversible solving and hash functions are utilized, the quotation is connected with a string of self-defined random character strings, hash encryption is carried out to be used as a sealed quotation, and meanwhile, a certain Ethernet coin is transferred to the intelligent contract address to be used as a guarantee to avoid false auction requests; s34, the auctioneer accepts the auction order, packages corresponding data according to the purchase order submitted by the auctioneer, utilizes an irreversible solving and hashing function when submitting the auction price, connects the quotation with a string of self-defined random character strings, performs hash encryption to serve as a sealed quotation, and meanwhile, transfers a certain Ethernet to the address of the intelligent contract of the auctioneer accepting the auction order to serve as a guarantee, so that false auction requests are avoided, and since the blockchain is public and transparent, the auctioneer who directly submits the price to the intelligent contract can see the bids of other auctioneers, therefore, sets a time function, and the auctioneer needs to submit the hash value of the sealed quotation in a window; s35, determining the parties for achieving the transaction, wherein the parties of the transaction acquire real bids of the parties through intelligent contracts, if the bids of one party are too low, the system can reduce the reputation value of the auctioneer, deduct the corresponding amount of deposit as punishment, and the reputation value of the auctioneer and the auctioneer who succeed in the transaction data can be improved; s36, the data auction system calculates the calculation tasks of the auction participants in a homomorphic encryption mode, and then gives the encrypted results to the data auction participants to complete orders.
Further, the step S34 includes: s341, after the auctioneer receives the auction order of the auctioneer, firstly encrypting data by using a symmetric encryption KEY, and signing the abstract msg of the ciphertext CT by using a private KEY SKD; s342, the auctioneer stores the encrypted ciphertext CT into a database, and the database returns a storage address Addr i The method comprises the steps of carrying out a first treatment on the surface of the S343, the auctioneer encrypts the storage address and the symmetric encryption key by the public key of the patient, attaches a signature, and sends the signature as transaction data to the network; s344, after receiving the transaction information, the consensus node firstly verifies the signature, if the signature passes the verification, the transaction data is packed into a block, and the consensus node waits for uplink; s345 after the block is commonly identified and uplink, the auction person can acquire the address of the transaction data from the block, the auction person firstly verifies the signature of the block, and then uses the private key SK of the auction person p And decrypting to obtain the key and the auction data storage address.
Further, the step S35 includes: s351, the blockchain platform can release the quantity of the auction players and the fees required to be paid by both parties in a round of transaction on the platform, and both parties can refer to the transaction; s352, after the block chain transaction platform sends a notice, a bidder who wants to sell data calculates the utility of the bidder according to the loss function of the bidder and the payment fee of the platform, each auctioneer submits n schemes for drawing out the sell data to the block chain platform, and the block chain platform issues the drawn out schemes to each corresponding auctioneer; s353, after receiving the m-bit proposed selling scheme, the bidder calculates the utility according to the income function and the fee to be charged by the platform, and submits the purchasing scheme to the platform, wherein the purchasing scheme comprises the number of the bidder, the data type number and the purchasing quantity b ij Total amount z of data to be purchased ij The method comprises the steps of carrying out a first treatment on the surface of the The 354 blockchain platform will bidThe purchase proposal of the player is sent to the corresponding auctioneer, and the auctioneer calculates the data unit price c given by the auctioneer after obtaining the purchase proposal of the auctioneer ij =z ij /b ij The minimum price of the vending data of the auctioneer is g ij When c ij Greater than or equal to g ij At c ij For unit price, the data volume of the transaction is b ij The method comprises the steps of carrying out a first treatment on the surface of the When c ij Less than g ij When the transaction is terminated; s355 calculates the utility function result of the buyer and seller who succeed in the transaction.
Further, the step S36 includes: s361 homomorphic key generation, wherein a trusted data auction third party organization generates a pair of homomorphic keys as homomorphic keys of the whole network, public keys of the homomorphic keys are disclosed, and private keys are stored in the data auction third party organization; s362 encrypts auction data and order information by using the homomorphic public key of the whole network, and the homomorphic encrypted ciphertext is respectively marked as X1 and X2, and the operation adopts an addition homomorphic encryption algorithm; s363 encrypts the transaction order in step S362 with the public key of the receiver, the encrypted ciphertext is denoted as Y1; s364, the sender initiates a transaction, the transaction content comprises three fields of ciphertext X1, ciphertext X2 in step S362 and ciphertext Y1 in step S363, and the sender sends transaction information to the all-network node for verification; s365, confirming the transaction, verifying transaction information by a verification node of the block chain whole network, maintaining a public account, and modifying the real balance of the user on the public account by the verification node after the transaction information is successfully verified.
Further, the step S40 includes: the meaning of the cost function of the auctioneer is that the amount paid by the auctioneer and obtained through data transaction by the auctioneer is subtracted by the amount of economic loss caused by potential privacy leakage risks after data collection, storage and transmission of the auctioneer, when the platform issues the allocation scheme X and the cost function U () of the round, the seller calculates the label issuing condition S of the next round according to the allocation scheme, the cost function and the loss function, so as to maximize the benefit which can be obtained by the auctioneer, and the following formulas (1) - (2) can be used as follows:
max J s =F(S)-U(X)……………………………………………(1)
where S represents all bidding cases of the auctioneer, F () represents the cost function paid to the auctioneer by all the auctioneers, X represents the distribution scheme of the auctioneer to all the auctioneers, U () represents the loss function of the auctioneer, X ij Represented as the amount of data that auctioneer i wants to sell to auctioneer j, S ij An amount of data designated as auctioneer i assigned to auctioneer j; the cost function of the auction player is represented by the following formulas (3) - (4) to be solved by the buyer, wherein the cost function of the auction player is represented by the utility benefit generated by the data purchased by the auction player minus the cost paid to the blockchain platform in the transaction process:
max J B =W(Y)-H(B)………………………………………………(3)
Where Y represents the total data that the auctioneer wants to purchase from all auctioneer's hands, W () represents the revenue function generated by the auctioneer's purchase of data, B represents the purchase scheme, H () represents the cost function, Y ij Data quantity b representing the amount of data of auction bidder j purchased from bidder i ij The amount of data representing that bidder j wants to purchase bidder i; s43 in economics, the definition of social benefit is the difference between the total benefit of all the auctioneers and the total loss of the utility of all the auctioneers, and in the blockchain many-to-many data auction market, the problem of maximizing social benefit can be expressed as follows in formulas (5) to (7):
y ij ≤x ij ……………………………………………………………(7)
wherein C is i Representing the maximum amount of data held by the auctioneer, b ij Representing the amount of data, y, of a bidder j that is willing to purchase a bidder i ij Data quantity x representing the number of bidder j purchased from bidder i ij Represented as the amount of data, s, that auctioneer i wants to sell to auctioneer j ij The amount of data that is expressed as the amount of data that auctioneer i allocates to auctioneer j, the sum of the amounts of data that equation (3) is the amount of data that auctioneer i can allocate to all auctioneers does not exceed the amount of data that auctioneer i owns, and the amount of data that equation (4) is the amount of data that auctioneer j can purchase from auctioneer i does not exceed the amount of data that auctioneer i wants to sell to auctioneer j; s44, transaction information is recorded and linked, agreement is achieved in the technology of recording and linking block information, and the newly created block node and a target block in the data auction system adopt the same technical architecture; s45, building a block chain basic environment on a server according to corresponding technical standards, and accessing the built nodes into a target block chain network; s46, the auction transaction blockchain is accessed to a target blockchain data auction system, trusted identity authenticity verification is applied, and after verification, an identity signature and a secret key are obtained; s47 uses standard data auction system specifications to link auction data.
Compared with the prior art, the technical scheme of the invention has the following advantages:
(1) According to the auction method of the Internet of things data auction system based on the alliance chain, the uplink of the transaction process ensures traceability, traceability and non-falsification of the data auction process, and any problems occurring on both parties achieving the transaction can be inquired through the alliance chain.
(2) According to the auction method of the internet of things data auction system based on the alliance chain, when a new data auction request is generated, the value of the data auction request cannot be accurately evaluated, the transaction can be carried out in the auction system, the buyers and sellers submit prices, the transaction is successful when the prices reach the standards of the buyers and sellers, after the data auction request is subjected to multiple auctions, the price of the data auction request reaches a certain interval range, the data auction request can be priced, and the data auction request can be directly subjected to the transaction through pricing.
(3) According to the auction method of the Internet of things data auction system based on the alliance chains, data are replicable, and each round of auction can be successful in a plurality of groups of transactions, namely one auctioneer can sell the same data to multiple auctioneers, and each auctioneer can also auction different data of a plurality of different auctioneers.
(4) According to the auction method of the Internet of things data auction system based on the alliance chain, alliance chain technology is combined on the basis of artificial intelligence, the data auction process is decentralised, so that a market platform does not have more information advantages, and can not illegally obtain benefits by constructing information barriers and controlling information disclosure, and on the contrary, after each round of auction transaction is finished, the two parties with successful transaction calculate respective utility functions, and the market calculates a result of maximizing social benefit.
Drawings
The technical solution of the present invention and its advantageous effects will be made apparent by the following detailed description of the specific embodiments of the present invention with reference to the accompanying drawings.
FIG. 1 is a flow chart of an auction method of an Internet of things data auction system based on a alliance chain according to an embodiment of the present invention;
FIG. 2 is a flow chart of an auction method of the Internet of things data auction system based on a alliance chain according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a data auction structure based on a coalition chain in an Internet of things environment according to an embodiment of the present invention;
FIG. 4 is a flow chart of a smart contract execution method according to an embodiment of the invention;
FIG. 5 illustrates a registered contract RC smart contract algorithm in accordance with an embodiment of the present invention;
FIG. 6 illustrates a classification contract CLC smart contract algorithm according to an embodiment of the invention;
FIG. 7 illustrates a license contract PC intelligent contract algorithm in accordance with an embodiment of the present invention;
FIG. 8 illustrates an auction contract AC intelligent contract algorithm according to an embodiment of the invention;
FIG. 9 illustrates a transaction contract TC intelligent contract algorithm, according to an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The embodiment provides an auction method of an internet of things data auction system based on a alliance chain, as shown in fig. 1-2, comprising: s10, checking qualification of auction parties and inputting information, wherein a user firstly registers an account before conducting data auction, after the user registers, the information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information. S20, auction data authentication, wherein an auctioneer encrypts and uploads a data auction request to a alliance chain through a public and private key generated by a data auction platform, and the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for the auctioneer to check an authentication result. S30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the requirement, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered. S40, calculating utility functions and social benefits of the buyers and sellers, wherein the buyers and sellers with successful transactions can calculate profits according to the profits of the buyers and sellers, the market calculates a result of maximizing the social benefits by analyzing the profits of the buyers and sellers, and a consensus node in the data auction platform registers transaction information into a chain.
As shown in fig. 3, the internet of things data auction system of the coalition chain includes an auctioneer, an auction platform, an intelligent contract, and a distributed database, which are connected to each other through the coalition chain. As shown in fig. 4 to 9, the smart contracts include a registration contract RC, a classification contract CLC, a license contract PC, an auction contract AC, and a transaction contract TC. The registration contract RC mainly stores addresses of all nodes in the system. In the user registration process, the system adds the address and classification information of the node to the contract. Through the registration condition of nodes in the RC confirmation system, double registration can be effectively prevented, and the system safety is ensured. The classification contract CLC mainly stores the category of the user and the category of auction data, the auctioneer submits the data through the CLC, and the data auction system classifies the data. The license contract PC mainly stores the address and the authority of the license node. The user manages the rights of the applicant in the license contract, and access control is performed on the auction data through the license contract, so that the privacy of the patient is protected. The auction contract RC mainly stores information such as an address, a status, and the like of a node with which a user (buyer and seller) has interacted. Each user has an auction contract for recording interactions between users (bids by buyers and sellers during a auction). Nodes with interaction relations are trusted to a certain extent, so that judgment is convenient when authorization is performed. The transaction contract TC mainly stores the address of the buyer and the seller who are successful in auction and the related information of transaction data, and when the transaction occurs, the preselected storage amount is frozen, so that the transaction safety is ensured. After the transaction is completed and the data is received by the auctioneer, a money transfer is made to the auctioneer. And replacing a trusted third party with the intelligent contract to realize transaction payment management. The transaction amount is prestored, double-flower attack can be effectively prevented, and transaction safety is guaranteed.
The step S10 includes: s11, calculating a public key K by a private key S, generating a random number X by a data auction system through a random source, then generating a private key S with 256 binary digits by the random number through an SHA-256 hash algorithm, and calculating the private key S by an elliptic curve cryptography algorithm ECDSA to obtain a unique 64-bit byte public key K. S12, calculating a currency address H by using a public key K, taking the public key K as input, firstly calculating the hash encryption value of the SHA-256 to obtain a binary data result with the length of 256bits, and then calculating the hash encryption value of RIPEMD-160 by using the obtained result to obtain binary data with the length of 160bits, wherein the value is an initial value of the currency address. And S13, obtaining a currency address by the public key hash, and encoding the public key hash by using Base58Check and Base64Check formats or converting the public key hash into a corresponding two-dimensional code by using a two-dimensional code generation algorithm. S14, the user firstly needs to send an identity verification application to a certificate issuing mechanism CA, submits corresponding identity certificates, certificates and related certificates, the CA verifies the identity information of the user, after the CA passes the verification, a key management center creates a key pair for the applicant, then sends the key pair to the applicant, and the CA generates a digital certificate according to the related attribute of the applicant, the personal information and the public key created by the key management center and sends the digital certificate to the applicant. S15, after receiving the digital certificate and the key pair, the user sends a registration application to the data auction system, and sends the digital certificate generated by the CA, after receiving the application, the node firstly inquires whether the user exists in the classification contract CLC, if the user is confirmed to be a new user, the authenticity of the digital certificate is checked, and the identity of the user is confirmed to the CA. And S16, after the identity verification is passed, the node stores the address and the identity of the user in a classification contract CLC, the user is added into the data auction system, and after the user is added into the data auction system, the data auction system automatically creates an empty auction contract AC and a permission contract PC for the user and sends the contract address to the user. S17, after the user registers to obtain the transaction currency address, information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information. The client also comprises a simple Ethernet account management function.
The step S20 includes: s21, the data auction platform generates public and private key pairs { P K ,S K And will public key P K Uploading to the federation chain. S22, the auctioneer needs to ensure that the auctioned data is safely used and guaranteed before the data transaction is carried out, the auctioneer submits a data auction request to the data auction platform, and the auctioneer downloads the public key P of the data auction platform in a alliance chain K By P K Encrypting the data auction request, the auctioneer encrypts the address of the ciphertext and its public key P S Uploading to the federation chain. S23, the data auction platform searches all data auction requests, downloads encrypted data through the address where the data of the auctioneer is stored, and uses the private key S of the data auction platform K For ciphertextDecrypting the data, verifying the data, and using the result of verification by using the public key P of the auctioneer S Encrypting, releasing the ciphertext to a alliance chain, downloading by an auctioneer and then utilizing the private key S of the auctioneer S And decrypting and checking the result of data authentication.
The step S30 includes: s31 issues data auction information, which the auctioneer issues sales information of the data by classifying the contract, the sales information including an address of the data storage, a hash value of the data, a type of the data, an authentication result of the data, and a keyword of the data. S32, searching the data, wherein the data is searched by the auction player through the searching function by utilizing the keywords, the auction player can check sales information of the searched data, and the data which is wanted to be auctioned is determined by screening the searched data. S33, the auction operator submits an auction order, the auction operator firstly performs data auction according to the actual demand of the operator, after receiving auction information, the auction contract of the auction operator automatically adds address information of the auction operator, the auction operator performs auction on the searched data, an order is added in an intelligent contract, the order comprises the demand of the auction operator on the data, the demand of the data comprises data types and auction quantity, when the auction price is submitted, an irreversible solving and hash function is utilized, the quotation is connected with a string of custom random character strings, hash encryption is performed to be used as a sealing quotation, and meanwhile, a certain Ethernet coin is transferred to the intelligent contract address to be used as a guarantee to avoid false auction requests.
S34, the auctioneer accepts the auction order, packages corresponding data according to the purchase order submitted by the auctioneer, utilizes an irreversible solving and hashing function when submitting the auction price, connects the quotation with a string of self-defined random character strings, performs hash encryption to serve as a sealed quotation, and meanwhile, transfers a certain Ethernet to the address of the intelligent contract of the auctioneer accepting the auction order to serve as a guarantee, so that false auction requests are avoided, and since the blockchain is public and transparent, the auctioneer who directly submits the price to the intelligent contract can see the bids of other auctioneers, and therefore, sets a time function, and the auctioneer needs to submit the hash value of the sealed quotation in the window. The step S34 includes: s341 auctioneerAfter receiving the auction order of the auctioneer, the auctioneer first encrypts the data with the symmetric encryption KEY and signs the digest msg of the ciphertext CT using the private KEY SKD. S342, the auctioneer stores the encrypted ciphertext CT into a database, and the database returns a storage address Addr i . S343 the auctioneer encrypts the storage address and the symmetric encryption key with the patient' S public key and attaches a signature as a piece of transaction data to be transmitted to the network. After receiving the transaction information, the consensus node at S344 verifies the signature first, and if the signature passes the verification, packages the transaction data into a block, and waits for the consensus uplink. S345 after the block is commonly identified and uplink, the auction person can acquire the address of the transaction data from the block, the auction person firstly verifies the signature of the block, and then uses the private key SK of the auction person p And decrypting to obtain the key and the auction data storage address.
S35, determining the parties for achieving the transaction, wherein the parties of the buyer and the seller acquire the true bid of the parties through the intelligent contract, if the bid of one party is too low, the system can reduce the reputation value of the auctioneer, and deduct the corresponding amount of deposit as punishment, so that the reputation value of the auctioneer and the auctioneer who successfully transact the data can be improved. Users with too low reputation values will not be able to participate in transactions, and the reputation system can suppress the cheating actions of system participants. The step S35 includes: s351, the blockchain platform can release the quantity of the auction participants and the auctioneers and the fees required to be paid by both sides of a round of transaction on the platform, and both sides of the transaction can refer to the information. And S352, after the block chain transaction platform sends a notice, a bidder who wants to sell data calculates the utility of the bidder according to the loss function of the bidder and the payment fee of the platform, each auctioneer submits n schemes for drawing out the sell data to the block chain platform, and the block chain platform issues the drawn out schemes to each corresponding auctioneer. S353, after receiving the m-bit proposed selling scheme, the bidder calculates the utility according to the income function and the fee to be charged by the platform, and submits the purchasing scheme to the platform, wherein the purchasing scheme comprises the number of the bidder, the data type number and the purchasing quantity b ij Total amount z of data to be purchased ij . The 354 blockchain platform sends the bidder's purchase to the corresponding auctionThe seller, after obtaining the purchase scheme of the auction subject, calculates the data unit price c given by the auction subject ij =z ij /b ij The minimum price of the vending data of the auctioneer is g ij When c ij Greater than or equal to g ij At c ij For unit price, the data volume of the transaction is b ij The method comprises the steps of carrying out a first treatment on the surface of the When c ij Less than g ij When the transaction is terminated. S355 calculates the utility function result of the buyer and seller who succeed in the transaction.
S36, the data auction system calculates the calculation tasks of the auction participants in a homomorphic encryption mode, and then gives the encrypted results to the data auction participants to complete orders. The step S36 includes: s361 homomorphic key generation, a trusted data auction third party organization generates a pair of homomorphic keys as homomorphic keys of the whole network, public keys of the homomorphic keys are disclosed, and private keys are stored in the data auction third party organization. S362 encrypts the auction data and the order information by using the homomorphic public key of the whole network, and the homomorphic encrypted ciphertext is respectively marked as X1 and X2, and the operation adopts an addition homomorphic encryption algorithm. S363 encrypts the transaction order in step S362 with the public key of the receiver, and the encrypted ciphertext is denoted as Y1. The sender initiates a transaction in S364, the transaction content includes three fields of ciphertext X1, ciphertext X2 in step S362, and ciphertext Y1 in S363, and the sender sends the transaction information to the all-network node for verification. S365, confirming the transaction, verifying transaction information by a verification node of the block chain whole network, maintaining a public account, and modifying the real balance of the user on the public account by the verification node after the transaction information is successfully verified.
The step S40 includes: the meaning of the cost function of the auctioneer is that the amount paid by the auctioneer and obtained through data transaction by the auctioneer is subtracted by the amount of economic loss caused by potential privacy leakage risks after data collection, storage and transmission of the auctioneer, when the platform issues the allocation scheme X and the cost function U () of the round, the seller calculates the label issuing condition S of the next round according to the allocation scheme, the cost function and the loss function, so as to maximize the benefit which can be obtained by the auctioneer, and the following formulas (1) - (2) can be used as follows:
max J s =F(S)-U(X)……………………………………………………(1)
where S represents all bidding cases of the auctioneer, F () represents the cost function paid to the auctioneer by all the auctioneers, X represents the distribution scheme of the auctioneer to all the auctioneers, U () represents the loss function of the auctioneer, X ij Represented as the amount of data that auctioneer i wants to sell to auctioneer j, S ij Represented as the amount of data that auctioneer i allocates to auctioneer j.
The cost function of the auction player is represented by the following formulas (3) - (4) to be solved by the buyer, wherein the cost function of the auction player is represented by the utility benefit generated by the data purchased by the auction player minus the cost paid to the blockchain platform in the transaction process:
max J B =W(Y)-H(B)………………………………………………(3)
where Y represents the total data that the auctioneer wants to purchase from all auctioneer's hands, W () represents the revenue function generated by the auctioneer's purchase of data, B represents the purchase scheme, H () represents the cost function, Y ij Data quantity b representing the amount of data of auction bidder j purchased from bidder i ij Indicating the amount of data that a bidder j wants to purchase a bidder i.
S43 in economics, the definition of social benefit is the difference between the total benefit of all the auctioneers and the total loss of the utility of all the auctioneers, and in the blockchain many-to-many data auction market, the problem of maximizing social benefit can be expressed as follows in formulas (5) to (7):
y ij ≤x ij ……………………………………………………………………(7)
wherein C is i Representing the maximum amount of data held by the auctioneer, b ij Representing the amount of data, y, of a bidder j that is willing to purchase a bidder i ij Data quantity x representing the number of bidder j purchased from bidder i ij Represented as the amount of data, s, that auctioneer i wants to sell to auctioneer j ij The sum of the data amounts that can be allocated to all the bidders for the auctioneer i is not more than the data amount owned by the auctioneer i, and the data amount that can be purchased from the auctioneer i for the auctioneer j is not more than the data amount that the auctioneer i wants to sell to the auctioneer j, expressed as the data amount that the auctioneer i allocates to the auctioneer j.
S44, the transaction information is recorded and linked, the technology of recording and linking the block information is agreed, and the newly created block node and the target block in the data auction system adopt the same technical architecture, so as to ensure the butt joint with the target block node.
S45, building a blockchain basic environment on a server according to corresponding technical standards, and accessing the built nodes into a target blockchain network.
S46, the auction transaction blockchain is accessed to a target blockchain data auction system, trusted identity authenticity verification is applied, and after verification, an identity signature and a secret key are obtained. S47 uses standard data auction system specifications to link auction data.
The foregoing description is only exemplary embodiments of the present invention and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes using the descriptions and the drawings of the present invention or directly or indirectly applied to other related technical fields are included in the scope of the present invention.

Claims (9)

1. An auction method of an internet of things data auction system based on a alliance chain, comprising:
s10, checking qualification of auction parties and inputting information, wherein a user firstly registers an account before conducting data auction, after the user registers, the information is input, and a data auction system divides the user into two categories of an auctioneer and an auctioneer according to the input information;
s20, auction data authentication, wherein an auctioneer encrypts and uploads a data auction request to a alliance chain through a public and private key generated by a data auction platform, and the data auction platform verifies the data auction request and then issues the data auction request to the alliance chain for the auctioneer to check an authentication result;
S30, the auctioneer issues an auction data request on the data auction platform, the auctioneer searches out the data participating in the auction through the keywords, the auctioneer submits an auction order according to the need, the auctioneer accepts the auction order, the intelligent contract determines the two parties for achieving the transaction, and finally the data is delivered;
s40, calculating utility functions and social benefits of the buyers and sellers, wherein the buyers and sellers with successful transaction can calculate profits according to the profits of the buyers and sellers, the market calculates a result of maximizing the social benefits by analyzing the profits of the buyers and sellers, and a consensus node in the data auction platform registers transaction information into a chain;
the Internet of things data auction system of the alliance chain comprises an auction player, an auction platform, an intelligent contract and a distributed database which are connected with each other through the alliance chain.
2. The auction method of claim 1, wherein the intelligent contracts comprise a registration contract RC, a classification contract CLC, a licensing contract PC, an auction contract AC, a transaction contract TC.
3. The auction method of the internet of things data auction system based on the alliance chain according to claim 2, wherein said step S10 comprises:
S11, calculating a public key K by a private key S, generating a random number X by a data auction system through a random source, then generating a private key S with 256 binary digits by the random number through an SHA-256 hash algorithm, and calculating the private key S by an elliptic curve cryptography algorithm ECDSA to obtain a unique 64-bit byte public key K;
s12, calculating a currency address H by using a public key K, taking the public key K as input, firstly calculating a hash encryption value of SHA-256 to obtain a binary data result with the length of 256bits, and then calculating a hash encryption value of RIPEMD-160 by using the obtained result to obtain binary data with the length of 160bits, wherein the value is an initial value of the currency address;
s13, obtaining a currency address by the public key hash, and encoding the public key hash by using Base58Check and Base64Check formats or converting the public key hash into a corresponding two-dimensional code by using a two-dimensional code generation algorithm;
s14, the user firstly needs to send an identity verification application to a certificate issuing mechanism CA, submits corresponding identity certificates, certificates and related certificates, the CA verifies the identity information of the user, after the CA passes the verification, a key management center creates a key pair for the applicant, then sends the key pair to the applicant, and the CA generates a digital certificate according to the related attribute of the applicant, the personal information and a public key created by the key management center and sends the digital certificate to the applicant;
S15, after receiving the digital certificate and the key pair, the user sends a registration application to the data auction system, and sends a digital certificate generated by the CA, after receiving the application, the node firstly inquires whether the user exists in the classification contract CLC, if the user is confirmed to be a new user, the authenticity of the digital certificate is checked, and the identity of the user is confirmed to the CA; s16, after the identity verification is passed, the node stores the address and the identity of the user in a classification contract CLC, the user is added into a data auction system, and after the user is added into the data auction system, the data auction system automatically creates an empty auction contract AC and a permission contract PC for the user and sends the contract address to the user;
s17, after the user registers to obtain the transaction currency address, information is input, and the data auction system divides the user into two categories of the auctioneer and the auctioneer according to the input information.
4. The auction method of claim 3, wherein said step S20 comprises:
s21, the data auction platform generates public and private key pairs { P K ,S K And will public key P K Uploading to a alliance chain;
s22, the auctioneer needs to ensure that the auctioned data is safely used and guaranteed before the data transaction is carried out, the auctioneer submits a data auction request to the data auction platform, and the auctioneer downloads the public key P of the data auction platform in a alliance chain K By P K Encrypting the data auction request, the auctioneer encrypts the address of the ciphertext and its public key P S Uploading to a alliance chain;
s23, the data auction platform searches all data auction requests, downloads encrypted data through the address where the data of the auctioneer is stored, and uses the private key S of the data auction platform K Decrypting the ciphertext, verifying the data, and using the result of verification by using the public key P of the auctioneer S Encrypting, releasing the ciphertext to a alliance chain, downloading by an auctioneer and then utilizing the private key S of the auctioneer S And decrypting and checking the result of data authentication.
5. The auction method of claim 4, wherein said step S30 comprises:
s31, issuing data auction information, wherein an auctioneer issues sales information of data through a classification contract, wherein the sales information comprises addresses of data storage, hash values of the data, types of the data, identification results of the data and keywords of the data;
s32, searching data, namely searching the data by using keywords by the auction player through a searching function, checking sales information of the searched data, and screening the searched data to determine data which want to auction; s33, the auction operator submits an auction order, the auction operator firstly carries out data auction according to the actual demand of the operator, after receiving auction information, the auction contract of the operator automatically adds address information of the operator, the operator carries out auction on the retrieved data, an order is firstly added in an intelligent contract, the order comprises the demand of the operator on the data, the demand of the data comprises data types and auction quantity, when the auction price is submitted, irreversible solving and hash functions are utilized, the quotation is connected with a string of self-defined random character strings, hash encryption is carried out to be used as a sealed quotation, and meanwhile, a certain Ethernet coin is transferred to the intelligent contract address to be used as a guarantee to avoid false auction requests;
S34, the auctioneer accepts the auction order, packages corresponding data according to the purchase order submitted by the auctioneer, utilizes an irreversible solving and hashing function when submitting the auction price, connects the quotation with a string of self-defined random character strings, performs hash encryption to serve as a sealed quotation, and meanwhile, transfers a certain Ethernet to the address of the intelligent contract of the auctioneer accepting the auction order to serve as a guarantee, so that false auction requests are avoided, and since the blockchain is public and transparent, the auctioneer who directly submits the price to the intelligent contract can see the bids of other auctioneers, therefore, sets a time function, and the auctioneer needs to submit the hash value of the sealed quotation in a window;
s35, determining the parties for achieving the transaction, wherein the parties of the transaction acquire real bids of the parties through intelligent contracts, if the bids of one party are too low, the system can reduce the reputation value of the auctioneer, deduct the corresponding amount of deposit as punishment, and the reputation value of the auctioneer and the auctioneer who succeed in the transaction data can be improved;
s36, the data auction system calculates the calculation tasks of the auction participants in a homomorphic encryption mode, and then gives the encrypted results to the data auction participants to complete orders.
6. The auction method of claim 5, wherein said step S34 comprises:
s341, after the auctioneer receives the auction order of the auctioneer, firstly encrypting data by using a symmetric encryption KEY, and signing the abstract msg of the ciphertext CT by using a private KEY SKD;
s342, the auctioneer stores the encrypted ciphertext CT into a database, and the database returns a storage address Addr i
S343, the auctioneer encrypts the storage address and the symmetric encryption key by the public key of the patient, attaches a signature, and sends the signature as transaction data to the network;
s344, after receiving the transaction information, the consensus node firstly verifies the signature, if the signature passes the verification, the transaction data is packed into a block, and the consensus node waits for uplink;
s345 after the block is commonly identified and uplink, the auction person can acquire the address of the transaction data from the block, the auction person firstly verifies the signature of the block, and then uses the private key SK of the auction person p And decrypting to obtain the key and the auction data storage address.
7. The auction method of claim 6, wherein said step S35 comprises:
S351, the blockchain platform can release the quantity of the auction players and the fees required to be paid by both parties in a round of transaction on the platform, and both parties can refer to the transaction;
s352, after the block chain transaction platform sends a notice, a bidder who wants to sell data calculates the utility of the bidder according to the loss function of the bidder and the payment fee of the platform, each auctioneer submits n schemes for drawing out the sell data to the block chain platform, and the block chain platform issues the drawn out schemes to each corresponding auctioneer;
s353, after receiving the m-bit proposed selling scheme, the bidder calculates the utility according to the income function and the fee to be charged by the platform, and submits the purchasing scheme to the platform, wherein the purchasing scheme comprises the number of the bidder, the data type number and the purchasing quantity b ij Total amount z of data to be purchased ij
The 354 block chain platform sends the buyer of the auction player to the corresponding auction player, and the auction player calculates the data unit price c given by the auction player after obtaining the purchase scheme of the auction player ij =z ij /b ij The minimum price of the vending data of the auctioneer is g ij When c ij Greater than or equal to g ij At c ij For unit price, the data volume of the transaction is b ij The method comprises the steps of carrying out a first treatment on the surface of the When c ij Less than g ij When the transaction is terminated;
S355 calculates the utility function result of the buyer and seller who succeed in the transaction.
8. The auction method of claim 7, wherein said step S36 comprises:
s361 homomorphic key generation, wherein a trusted data auction third party organization generates a pair of homomorphic keys as homomorphic keys of the whole network, public keys of the homomorphic keys are disclosed, and private keys are stored in the data auction third party organization;
s362 encrypts auction data and order information by using the homomorphic public key of the whole network, and the homomorphic encrypted ciphertext is respectively marked as X1 and X2, and the operation adopts an addition homomorphic encryption algorithm;
s363 encrypts the transaction order in step S362 with the public key of the receiver, the encrypted ciphertext is denoted as Y1;
s364, the sender initiates a transaction, the transaction content comprises three fields of ciphertext X1, ciphertext X2 in step S362 and ciphertext Y1 in step S363, and the sender sends transaction information to the all-network node for verification;
s365, confirming the transaction, verifying transaction information by a verification node of the block chain whole network, maintaining a public account, and modifying the real balance of the user on the public account by the verification node after the transaction information is successfully verified.
9. The auction method of claim 8, wherein said step S40 comprises:
The meaning of the cost function of the auctioneer is that the amount paid by the auctioneer and obtained through data transaction by the auctioneer is subtracted by the amount of economic loss caused by potential privacy leakage risks after data collection, storage and transmission of the auctioneer, when the platform issues the allocation scheme X and the cost function U () of the round, the seller calculates the label issuing condition S of the next round according to the allocation scheme, the cost function and the loss function, so as to maximize the benefit which can be obtained by the auctioneer, and the following formulas (1) - (2) can be used as follows:
maxJ s =F(S)-U(X)…………………………………………………(1)
where S represents all bidding cases of the auctioneer, F () represents the cost function paid to the auctioneer by all the auctioneers, X represents the distribution scheme of the auctioneer to all the auctioneers, U () represents the loss function of the auctioneer, X ij Represented as the amount of data that auctioneer i wants to sell to auctioneer j, S ij An amount of data designated as auctioneer i assigned to auctioneer j;
the cost function of the auction player is represented by the following formulas (3) - (4) to be solved by the buyer, wherein the cost function of the auction player is represented by the utility benefit generated by the data purchased by the auction player minus the cost paid to the blockchain platform in the transaction process:
maxJ B =W(Y)-H(B)……………………………………………………(3)
where Y represents the total data that the auctioneer wants to purchase from all auctioneer's hands, W () represents the revenue function generated by the auctioneer's purchase of data, B represents the purchase scheme, H () represents the cost function, Y ij Data quantity b representing the amount of data of auction bidder j purchased from bidder i ij The amount of data representing that bidder j wants to purchase bidder i;
s43 in economics, the definition of social benefit is the difference between the total benefit of all the auctioneers and the total loss of the utility of all the auctioneers, and in the blockchain many-to-many data auction market, the problem of maximizing social benefit can be expressed as follows in formulas (5) to (7):
y ij ≤x ij ……………………………………………………………(7)
wherein C is i Representing the maximum amount of data held by the auctioneer, b ij Representing the amount of data, y, of a bidder j that is willing to purchase a bidder i ij Data quantity x representing the number of bidder j purchased from bidder i ij Represented as the amount of data, s, that auctioneer i wants to sell to auctioneer j ij The amount of data that is expressed as the amount of data that auctioneer i allocates to auctioneer j, the sum of the amounts of data that equation (3) is the amount of data that auctioneer i can allocate to all auctioneers does not exceed the amount of data that auctioneer i owns, and the amount of data that equation (4) is the amount of data that auctioneer j can purchase from auctioneer i does not exceed the amount of data that auctioneer i wants to sell to auctioneer j;
s44, transaction information is recorded and linked, agreement is achieved in the technology of recording and linking block information, and the newly created block node and a target block in the data auction system adopt the same technical architecture;
s45, building a block chain basic environment on a server according to corresponding technical standards, and accessing the built nodes into a target block chain network;
S46, the auction transaction blockchain is accessed to a target blockchain data auction system, trusted identity authenticity verification is applied, and after verification, an identity signature and a secret key are obtained;
s47 uses standard data auction system specifications to link auction data.
CN202110291564.5A 2021-03-18 2021-03-18 Auction method of Internet of things data auction system based on alliance chain Active CN112884554B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110291564.5A CN112884554B (en) 2021-03-18 2021-03-18 Auction method of Internet of things data auction system based on alliance chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110291564.5A CN112884554B (en) 2021-03-18 2021-03-18 Auction method of Internet of things data auction system based on alliance chain

Publications (2)

Publication Number Publication Date
CN112884554A CN112884554A (en) 2021-06-01
CN112884554B true CN112884554B (en) 2023-11-24

Family

ID=76041215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110291564.5A Active CN112884554B (en) 2021-03-18 2021-03-18 Auction method of Internet of things data auction system based on alliance chain

Country Status (1)

Country Link
CN (1) CN112884554B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115514502A (en) * 2021-06-03 2022-12-23 中移雄安信息通信科技有限公司 Block chain-based edge computing platform identity authentication method and device
CN113487391A (en) * 2021-06-11 2021-10-08 弥达斯科技(深圳)有限公司 Auction trading method, device and equipment based on block chain and readable storage medium
CN113489698B (en) * 2021-06-25 2022-10-21 中标慧安信息技术股份有限公司 Internet of things data secret reading method and system based on block chain
CN113744051A (en) * 2021-07-23 2021-12-03 北京邮电大学 Distributed data transaction method and system
CN113643134B (en) * 2021-08-24 2023-08-25 杭州云象网络技术有限公司 Internet of things blockchain transaction method and system based on multi-key homomorphic encryption
CN113657978B (en) * 2021-09-01 2024-04-09 东南大学 Distributed energy auction method and system based on blockchain and privacy protection
CN114978634B (en) * 2022-05-12 2024-04-30 上海焜耀网络科技有限公司 Construction and auction method of distributed auction system
CN114897527B (en) * 2022-05-20 2023-03-14 西南交通大学 Authentication method for realizing commercial warranty claim value based on workload certification
CN116894730A (en) * 2023-06-08 2023-10-17 三峡大学 Multi-element distributed energy storage transaction method based on link-up-link-down coordination
CN117057825B (en) * 2023-10-09 2023-12-19 新立讯科技股份有限公司 Agricultural product transaction data processing method, agricultural product transaction data processing device, server and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880863A (en) * 2018-05-26 2018-11-23 江西理工大学 A kind of smart grid equipment safety diagnostic service system based on block chain technology
CN109118343A (en) * 2018-07-26 2019-01-01 上海交通大学 The auction system and system and medium of fixed quantity subject matter based on block chain
WO2019040712A1 (en) * 2017-08-23 2019-02-28 Mochi, Inc. Method and system for a decentralized marketplace auction
CN109598550A (en) * 2018-08-03 2019-04-09 武汉稀云科技有限公司 A kind of Internet advertising put-on method and device
CN110060137A (en) * 2019-04-17 2019-07-26 响拍拍(厦门)网络科技有限公司 A kind of system and method based on the Internet auctions
KR20200134622A (en) * 2019-05-22 2020-12-02 함문성 Transaction methods and systems using direct trading and auction, reverse auction and joint auction of blockchain-based value tangible and intangible assets

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019040712A1 (en) * 2017-08-23 2019-02-28 Mochi, Inc. Method and system for a decentralized marketplace auction
CN108880863A (en) * 2018-05-26 2018-11-23 江西理工大学 A kind of smart grid equipment safety diagnostic service system based on block chain technology
CN109118343A (en) * 2018-07-26 2019-01-01 上海交通大学 The auction system and system and medium of fixed quantity subject matter based on block chain
CN109598550A (en) * 2018-08-03 2019-04-09 武汉稀云科技有限公司 A kind of Internet advertising put-on method and device
CN110060137A (en) * 2019-04-17 2019-07-26 响拍拍(厦门)网络科技有限公司 A kind of system and method based on the Internet auctions
KR20200134622A (en) * 2019-05-22 2020-12-02 함문성 Transaction methods and systems using direct trading and auction, reverse auction and joint auction of blockchain-based value tangible and intangible assets

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于拍卖的物联网搜索数据提供机制;殷丽华;郭云川;张会兵;通信学报;第36卷(第12期);37-46 *

Also Published As

Publication number Publication date
CN112884554A (en) 2021-06-01

Similar Documents

Publication Publication Date Title
CN112884554B (en) Auction method of Internet of things data auction system based on alliance chain
Wu et al. CReam: A smart contract enabled collusion-resistant e-auction
CN107679976B (en) Auction method based on block chain
TWI822653B (en) Blockchain-based exchange with tokenisation
US20170221029A1 (en) Blockchaining systems and methods for frictionless media
CN110807641A (en) Pet food traceability system
TWI389046B (en) Trusted third party clearing house for lead tracking
WO2020014580A1 (en) Computer method and apparatus for providing intellectual property transactions
CN108701325A (en) The transaction system that is self-regulated and the method for the system
CN111402043B (en) Block chain-based internet of vehicles data transaction method
CN110503533B (en) Heterogeneous spectrum multi-round auction method based on block chain
KR101951408B1 (en) A System Providing Virtual Money Managerial System
CN112163954B (en) Transaction method and device based on block chain
CN111402055A (en) Decentralized data transaction method based on block chain
CN109118102B (en) Fair bidirectional combined cloud resource allocation method and system based on block chain
Xiong et al. Anti-collusion data auction mechanism based on smart contract
CN113962714A (en) Auction tracing method based on Etheng privacy protection and implementation system
CN112232828A (en) Power grid data transaction method and system
JP2004206187A (en) Community management system
JP2013045460A (en) E-commerce transaction method for intangible merchandise
Pop et al. An Ethereum-based implementation of English, Dutch and First-price sealed-bid auctions
Barbhaya et al. Etradechain: blockchain-based energy trading in local energy market (lem) using modified double auction protocol
Perrig et al. SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
CN112819594A (en) Privacy protection dynamic spectrum auction method based on alliance chain
Li et al. Secure electronic ticketing system based on consortium blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant