CN113034286A - Data sharing and mining method based on block chain - Google Patents
Data sharing and mining method based on block chain Download PDFInfo
- Publication number
- CN113034286A CN113034286A CN202110431437.0A CN202110431437A CN113034286A CN 113034286 A CN113034286 A CN 113034286A CN 202110431437 A CN202110431437 A CN 202110431437A CN 113034286 A CN113034286 A CN 113034286A
- Authority
- CN
- China
- Prior art keywords
- data
- enterprise
- node
- algorithm
- computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000005065 mining Methods 0.000 title claims abstract description 12
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 55
- 238000004364 calculation method Methods 0.000 claims abstract description 33
- 230000008569 process Effects 0.000 claims abstract description 12
- 238000012795 verification Methods 0.000 claims abstract description 12
- 239000003999 initiator Substances 0.000 claims abstract description 8
- 238000012545 processing Methods 0.000 claims abstract description 6
- 238000012550 audit Methods 0.000 claims abstract description 4
- 238000013475 authorization Methods 0.000 claims description 2
- 238000012986 modification Methods 0.000 claims description 2
- 230000004048 modification Effects 0.000 claims description 2
- 238000007418 data mining Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000005553 drilling Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000007637 random forest analysis Methods 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000002689 soil Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention discloses a data sharing and mining method based on a block chain, which comprises the following steps: building a alliance chain, wherein the alliance chain comprises a plurality of enterprise nodes and a computing node; the computing nodes have basic operating environments and control flows of various algorithms; the enterprise node with the algorithm is used as a transaction initiator, and the algorithm code is sent to the computing node; the computing node executes the algorithm code and processes the received data according to the logic of the algorithm; after the processing is finished, the calculation result is stored, the algorithm and the data are deleted, and then the calculation result is returned to each enterprise node providing the data for result verification; and after the audit is finished, sending the calculation result to a transaction initiator, and broadcasting the data transaction end in the network of the alliance chain. The invention has the advantages that: the block chain is introduced into the data transaction, so that the transaction process is trusted, unmodified and traceable by each enterprise.
Description
Technical Field
The invention belongs to the technical field of data sharing, and particularly relates to a data sharing and mining method based on a block chain.
Background
Data mining techniques need to obtain more accurate calculation results in a professional field, and need a calculation model suitable for the problem in the field and a large amount of related data. However, often the owner of the algorithm and the owner of the data are not the same company or organization, and even the data conforming to a certain calculation model are distributed among a plurality of data owners. In consideration of data security, core technology secret protection and the like, both a data owner and an algorithm owner are reluctant to disclose their core assets to each other, which greatly hinders the application of data mining technology.
The existing data transaction system based on the block chain can better enable data with low security level to flow in the alliance chain by checking the data access authority, but cannot solve the problem that a data acquisition party transfers the data outside the block chain after acquiring the data, and cannot solve the problem of uplink and circulation of high security data. The existing federal learning method can integrate multi-party data under the condition of data confidentiality and mine the data value. But are limited to neural networks and random forests. At present, a good method does not exist, distrust between a data owner and an algorithm developer can be removed, and meanwhile, the method is also suitable for various algorithm models.
Disclosure of Invention
The invention aims to provide a data sharing and mining method based on a block chain according to the defects of the prior art, the method is based on the block chain, the calculation nodes which are trusted by multiple parties together are introduced, the calculation nodes receive algorithm models and data and then calculate, the data of each enterprise is not exposed to other enterprises, and the block chain is introduced in the data transaction process, so that each step of transaction cannot be modified and is convenient to trace, and the transaction safety is improved.
The purpose of the invention is realized by the following technical scheme:
a data sharing and mining method based on a block chain is characterized by comprising the following steps:
(1) building a alliance chain, wherein the alliance chain comprises a plurality of enterprise nodes and a computing node, and each enterprise node is operated by the enterprise to which the enterprise node belongs; the computing nodes are provided with basic operation environments and control flows of various algorithms, and the modification operation of the algorithms and the basic operation environments in the computing nodes needs the auditing authorization of all enterprise nodes;
(2) performing data transactions within the federation chain:
2.1) the enterprise node with the algorithm is used as a transaction initiator, the code of the algorithm is sent to the computing node, and the data transaction is broadcasted in the network of the alliance chain;
2.2) the enterprise node with data receives the broadcast of data transaction, checks the authority, then sends the data to the computing node, and sends the broadcast data in the alliance chain;
2.3) executing the code of the algorithm after the computing node receives the data;
2.4) after the processing is finished, saving a calculation result, deleting the algorithm and the received data, and then returning the calculation result to each enterprise node providing data for result verification, wherein the calculation node broadcasts the current calculation end to the network of the alliance chain;
2.5) after the enterprise nodes providing data verify the calculation results, broadcasting the verification results to the network of the alliance chain;
and 2.6) when the computing node receives the broadcast of all the enterprise nodes providing data, and when all the enterprise nodes providing data pass the verification, the computing node sends the computing result to the transaction initiator and broadcasts the end of the data transaction in the network of the alliance chain.
And each enterprise node in the alliance chain is provided with a read-only account which can access the computing node, and the read-only account is used for viewing and auditing the algorithm and the basic operating environment in the computing node.
And the control flow comprises the steps of storing the operation information into a database after receiving the broadcast information of other enterprise nodes in the alliance chain, automatically executing codes of the algorithm after receiving codes and data of the algorithm, and deleting the codes and data of the algorithm after the calculation is finished.
And the enterprise node discloses own data information in the alliance chain, wherein the data information comprises a data dictionary, a calling interface and a transaction price.
And the accounting node in the alliance chain is one or the combination of the enterprise node and the computing node.
In step 2.1, the broadcasted content includes data needed by the algorithm, enterprise nodes providing the data, problems solved by the algorithm, and meanings indicated by the calculation results.
In step 2.1, the computing node receives the codes of the algorithm and then checks the codes, wherein the checking content comprises whether malicious attacks exist in the codes or logic of data leakage exists in the codes.
In step 2.5, when the enterprise node audits the calculation result, it audits whether the calculation result contains original data.
The invention has the advantages that: the data sharing and mining system is based on a block chain, a computing node which is jointly trusted by multiple parties is introduced, the computing node receives a computing model and data to perform computing, and core assets of each enterprise are not exposed to other enterprises. In the data transaction process, a block chain is introduced, so that each step of the transaction cannot be modified, the tracing is convenient, and the safety in the transaction process is improved.
Drawings
Fig. 1 is a schematic diagram of a block chain-based data sharing and mining method according to the present invention.
Detailed Description
The features of the present invention and other related features are described in further detail below by way of example in conjunction with the following drawings to facilitate understanding by those skilled in the art:
example (b): as shown in fig. 1, the present embodiment specifically relates to a data sharing and mining method based on a block chain, which includes the following steps:
【1】 And (3) building a alliance chain:
aiming at a specific field, a plurality of enterprises are combined to form a alliance chain, and each enterprise is used as an enterprise node in the alliance chain; the method comprises the steps that a alliance chain comprises a plurality of enterprise nodes and a computing node, wherein each enterprise node is operated by an enterprise to which the enterprise node belongs, the computing node is provided with a basic operation environment (such as an operation environment of python codes and a third party library commonly used by python) and a control flow of various algorithms, and by means of a mechanism of user read-write permission separation of a Linux operation system, each enterprise node in the alliance chain is provided with an account number only reading code files, so that the basic operation environment and the algorithm codes in the computing node can be checked and verified, and only when all enterprise nodes in the alliance chain pass, the basic operation environment and the algorithm codes in the computing node can be modified to ensure that the computing node is trusted by each enterprise. The mentioned control flow includes storing the operation information into the database after receiving the broadcast information of other enterprise nodes in the alliance chain, automatically executing the algorithm code after receiving the algorithm code and the data, and deleting the algorithm code and the data after the calculation is completed.
In addition, each enterprise node discloses own data information in the alliance chain, wherein the data information comprises information such as a data dictionary, a calling interface, a transaction price and the like. In the alliance chain, the accounting node of the block chain can be only an enterprise node, or both the computing node and the enterprise node can be accounted, and the accounting node is selected in a mode of PoW, Pos, DPoS and the like.
In this embodiment, taking the field of geotechnical investigation as an example, as shown in fig. 1, a federation chain has a plurality of enterprises, including enterprise a, enterprise B and other related enterprises, and each enterprise displays its own data resource type in the federation chain and indicates a data acquisition manner and conditions.
The enterprise A has hundreds of thousands of survey hole data in the Shanghai, including the position information of each drilling hole, the thickness of soil in each drilling hole and the physical and mechanical properties. And the enterprise B is responsible for the operation of the Shanghai subway and has line data of all the Shanghai subways. In a business scenario, enterprise B would like to know the correlation between tunnel segment leakage water and segment sand. Therefore, an algorithm code is developed for the enterprise B, the code receives position data, leakage water data and located stratum data of the subway segments, and finally the correlation is output. But enterprise B does not have relevant formation data and needs to perform data completion on the algorithm code.
【2】 Data transactions are conducted within the federation chain:
2.1) the enterprise node with the algorithm is used as a transaction initiator, the code of the algorithm is sent to a computing node, and the data transaction is broadcasted in the network of the alliance chain; and the computing node checks the codes after receiving the algorithm codes, so that the codes are ensured not to have malicious attacks or reveal the logic of data.
In this embodiment, the enterprise node B sends the developed algorithm code and part of the data to the computing node, and broadcasts to the rest enterprise nodes in the federation chain to ask for the formation data from the enterprise node a, and the transaction starts, that is, the process shown in fig. 1.
2.2) the enterprise node with the data receives the broadcast of the data transaction, checks the authority, then sends the data to the computing node, and broadcasts the data in the alliance chain and sends the data;
in this embodiment, the enterprise node a receives the broadcast of the data transaction, and after the enterprise node a verifies the token and the authority of the enterprise node B, the enterprise node a sends the data to the computing node and broadcasts the data to the other enterprise nodes in the federation chain, that is, the process shown in fig. 1 is two.
2.3) the computing node executes the algorithm code and processes the received data according to the logic of the algorithm;
in this embodiment, the compute node receives the algorithm code of enterprise node B and the data of enterprise node a, and then performs computation processing on the received data according to the logic of the algorithm code.
2.4) the computing node stores the computing result after processing is finished, deletes the algorithm code and the received data, returns the computing result to each enterprise node providing data for result verification, and broadcasts the current computing to the network of the alliance chain to finish the computation;
in this embodiment, the computing node stores the computing result after the processing is completed, sends the computing result to the enterprise node a, and broadcasts the information that the computing result is sent, that is, step three shown in fig. 1.
2.5) after each enterprise node providing data verifies the calculation result, broadcasting the verification result to the network of the alliance chain; this step can check whether the calculation result contains the original data;
in this embodiment, the enterprise node a performs auditing after receiving the calculation result sent by the calculation node, and broadcasts the auditing result to the whole network, that is, step (iv) shown in fig. 1.
2.6) the computing node receives the broadcast of all the enterprise nodes providing data, when all the enterprise nodes providing data pass the examination and verification, the computing node sends the computing result to the transaction initiator, and broadcasts the end of the data transaction in the network of the alliance chain;
in this embodiment, the calculation result receives the broadcast verification result, and if the verification is passed, the calculation result is sent to the enterprise node B, and the transaction is ended, that is, the process represented in fig. 1 is a fifth step.
The beneficial effect of this embodiment lies in: the problems that the existing data sharing and mining system is difficult to share high-security-level data and the algorithm applicability is poor can be solved. And effective technical support is provided for the data mining technology. On the basis of a block chain, a computing node with common trust of multiple parties is introduced, the computing node receives a computing model and data to compute, and core assets of each enterprise are not exposed to other enterprises. In the data transaction process, a block chain is introduced, so that each step of the transaction cannot be modified, the tracing is convenient, and the safety in the transaction process is improved.
Claims (8)
1. A data sharing and mining method based on a block chain is characterized by comprising the following steps:
(1) building a alliance chain, wherein the alliance chain comprises a plurality of enterprise nodes and a computing node, and each enterprise node is operated by the enterprise to which the enterprise node belongs; the computing nodes are provided with basic operation environments and control flows of various algorithms, and the modification operation of the algorithms and the basic operation environments in the computing nodes needs the auditing authorization of all enterprise nodes;
(2) performing data transactions within the federation chain:
2.1) the enterprise node with the algorithm is used as a transaction initiator, the code of the algorithm is sent to the computing node, and the data transaction is broadcasted in the network of the alliance chain;
2.2) the enterprise node with data receives the broadcast of data transaction, checks the authority, then sends the data to the computing node, and sends the broadcast data in the alliance chain;
2.3) executing the code of the algorithm after the computing node receives the data;
2.4) after the processing is finished, saving a calculation result, deleting the algorithm and the received data, and then returning the calculation result to each enterprise node providing data for result verification, wherein the calculation node broadcasts the current calculation end to the network of the alliance chain;
2.5) after the enterprise nodes providing data verify the calculation results, broadcasting the verification results to the network of the alliance chain;
and 2.6) when the computing node receives the broadcast of all the enterprise nodes providing data, and when all the enterprise nodes providing data pass the verification, the computing node sends the computing result to the transaction initiator and broadcasts the end of the data transaction in the network of the alliance chain.
2. The method of claim 1, wherein each of the enterprise nodes in the federation chain has a read-only account with access to the computing nodes, the read-only account being used to view and audit algorithms and underlying operating environments in the computing nodes.
3. The method of claim 1, wherein the control process comprises storing the operation information in a database after receiving broadcast information from other enterprise nodes in the federation chain, automatically executing the algorithm code and data after receiving the algorithm code and data, and deleting the algorithm code and data after the calculation is completed.
4. The blockchain-based data sharing and mining method of claim 1, wherein the enterprise nodes disclose own data information in the federation chain, the data information including data dictionaries, call interfaces, and transaction prices.
5. The method of claim 1, wherein the billing node in the federation chain is one or a combination of the enterprise node and the computing node.
6. The method according to claim 1, wherein in step 2.1, the broadcasted content includes data needed by the algorithm, enterprise nodes providing the data, problems solved by the algorithm, and meaning represented by the calculation result.
7. The method according to claim 1, wherein in step 2.1, the computing node checks the code after receiving the code of the algorithm, and the checking content includes whether a malicious attack exists in the code or logic for leaking data.
8. The method according to claim 1, wherein in step 2.5, the enterprise node, when reviewing the calculation result, includes reviewing whether the calculation result contains raw data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110431437.0A CN113034286B (en) | 2021-04-21 | 2021-04-21 | Data sharing and mining method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110431437.0A CN113034286B (en) | 2021-04-21 | 2021-04-21 | Data sharing and mining method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113034286A true CN113034286A (en) | 2021-06-25 |
CN113034286B CN113034286B (en) | 2022-07-08 |
Family
ID=76457196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110431437.0A Active CN113034286B (en) | 2021-04-21 | 2021-04-21 | Data sharing and mining method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113034286B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109729168A (en) * | 2018-12-31 | 2019-05-07 | 浙江成功软件开发有限公司 | A kind of data share exchange system and method based on block chain |
CN110071969A (en) * | 2019-04-17 | 2019-07-30 | 杭州云象网络技术有限公司 | A kind of data safety sharing method based on multichain framework |
US20200336298A1 (en) * | 2017-02-17 | 2020-10-22 | Alibaba Group Holding Limited | Blockchain system and data storage method and apparatus |
CN111951060A (en) * | 2020-08-31 | 2020-11-17 | 航天信息股份有限公司 | Safety tax control invoice data transaction system and method based on block chain |
CN112016132A (en) * | 2020-08-27 | 2020-12-01 | 上海勘察设计研究院(集团)有限公司 | Block chain-based survey data management system and working method thereof |
CN112541034A (en) * | 2020-01-02 | 2021-03-23 | 北京融信数联科技有限公司 | Government affair data sharing method based on alliance chain technology |
-
2021
- 2021-04-21 CN CN202110431437.0A patent/CN113034286B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200336298A1 (en) * | 2017-02-17 | 2020-10-22 | Alibaba Group Holding Limited | Blockchain system and data storage method and apparatus |
CN109729168A (en) * | 2018-12-31 | 2019-05-07 | 浙江成功软件开发有限公司 | A kind of data share exchange system and method based on block chain |
CN110071969A (en) * | 2019-04-17 | 2019-07-30 | 杭州云象网络技术有限公司 | A kind of data safety sharing method based on multichain framework |
CN112541034A (en) * | 2020-01-02 | 2021-03-23 | 北京融信数联科技有限公司 | Government affair data sharing method based on alliance chain technology |
CN112016132A (en) * | 2020-08-27 | 2020-12-01 | 上海勘察设计研究院(集团)有限公司 | Block chain-based survey data management system and working method thereof |
CN111951060A (en) * | 2020-08-31 | 2020-11-17 | 航天信息股份有限公司 | Safety tax control invoice data transaction system and method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN113034286B (en) | 2022-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190172059A1 (en) | Real-time net settlement by distributed ledger system | |
CN109660358A (en) | A kind of data circulation method based on block chain and secure execution environments | |
CN108961030A (en) | About the data processing method of electronic bill, device, system, medium and equipment | |
TW202021307A (en) | Cross-block chain interaction method and system, computer device, and storage medium | |
CN109347651B (en) | MSVL (modeling, simulation and verification language) -based block chain system modeling and security verification method and system | |
CN109388957B (en) | Block chain-based information transfer method, device, medium and electronic equipment | |
EP4178155A1 (en) | Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof | |
CN111429191A (en) | Block chain-based electronic invoice flow management method, device and system | |
CN111292174A (en) | Tax payment information processing method and device and computer readable storage medium | |
CN114003971A (en) | Material storage, inspection and distribution full-flow information management method based on block chain technology | |
CN112231404A (en) | Block chain-based data sharing method, computer device and storage medium | |
CN113127822A (en) | Enterprise electronic seal management method and system based on enterprise chain code | |
CN111476640A (en) | Authentication method, system, storage medium and big data authentication platform | |
Xiang et al. | A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks | |
Zhang | Challenges and strategies of promoting cloud accounting | |
CN113034286B (en) | Data sharing and mining method based on block chain | |
EP3907968A1 (en) | Method and system for blockchain intrusion prevention | |
CN113643011A (en) | New energy automobile charging sharing system based on block chain | |
CN114329567A (en) | Bid file generation method, verification method, electronic device and medium | |
CN113515781A (en) | Electronic insurance letter verification method and device | |
CN110910091A (en) | Data processing method, device and medium | |
CN103839205A (en) | Network invoice and application system thereof | |
Cristea et al. | CAS Report blockchain standardization-overview of current activities landscape | |
CN115510503A (en) | Business model sharing method, device, system and medium based on block chain | |
CN108053273B (en) | Credit method realized based on intelligent equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 200093 No. 38 Shui Feng Road, Yangpu District, Shanghai. Patentee after: Shanghai Survey, Design and Research Institute (Group) Co.,Ltd. Address before: 200093 No. 38 Shui Feng Road, Yangpu District, Shanghai. Patentee before: SGIDI ENGINEERING CONSULTING (Group) Co.,Ltd. |