CN113158212A - Distributed database security authentication method based on block chain technology - Google Patents

Distributed database security authentication method based on block chain technology Download PDF

Info

Publication number
CN113158212A
CN113158212A CN202110444009.1A CN202110444009A CN113158212A CN 113158212 A CN113158212 A CN 113158212A CN 202110444009 A CN202110444009 A CN 202110444009A CN 113158212 A CN113158212 A CN 113158212A
Authority
CN
China
Prior art keywords
data
database
module
authentication
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110444009.1A
Other languages
Chinese (zh)
Inventor
许良
黄宇
黄静文
高厚臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huazhao New Energy Co ltd
Original Assignee
Shenzhen Qianhai Huazhao New Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huazhao New Energy Co ltd filed Critical Shenzhen Qianhai Huazhao New Energy Co ltd
Priority to CN202110444009.1A priority Critical patent/CN113158212A/en
Publication of CN113158212A publication Critical patent/CN113158212A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of databases, in particular to a distributed database security authentication method based on a block chain technology, which comprises an authentication flow, wherein the authentication flow comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and the authentication flow comprises the following steps: s1: acquiring database data in a block chain generated by a data node; and adding a data owner, a data user and a data platform into the alliance chain system. The one-time programmable memory is used for storing the decryption key or the authentication key, so that the utilization rate of the one-time programmable memory is improved, the authentication key is protected without an additional circuit when only identity authentication is carried out, the occupation of resources is reduced, the security protection module can effectively prevent viruses from attacking data, and the security is effectively improved.

Description

Distributed database security authentication method based on block chain technology
Technical Field
The invention relates to the technical field of databases, in particular to a distributed database security authentication method based on a block chain technology.
Background
In order to ensure the confidentiality of data in the database and prevent illegal users from maliciously probing, leaking and tampering private data, the method for encrypting the sensitive data and storing the encrypted sensitive data into the database is an effective method, and the encryption method has the advantages that the burden of a database server is not increased, but the encryption function is possibly limited to a certain extent and the coupling with a database management system is poor. Therefore, many users use the middleware to realize the encryption operation of the plaintext data, the middleware system is deployed between the database client and the server, the encryption and decryption algorithm can be flexibly adjusted while the data security is ensured, and loose coupling with the database server is realized while upper-layer application is not modified.
Some illegal users obtain the authority to enter the ciphertext database through replay attack, so that the data in the ciphertext database can be checked, maliciously tampered and deleted by using middleware, and the legal users can also perform unauthorized operation.
Disclosure of Invention
Based on the technical problems provided in the background art, the invention provides a distributed database security authentication method based on a block chain technology.
The invention provides a distributed database security authentication method based on a block chain technology, which comprises an authentication process, wherein the authentication process comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and comprises the following steps:
s1: acquiring database data in a block chain generated by a data node; adding a data owner, a data user and a data platform into the alliance chain system;
s2: in the alliance chain system, a corresponding channel is established for each group of data uploaded by a data owner, and the data owner and the data are transmitted to a database detection module;
s3: after the data user acquires the data use permission from the database detection module, the data platform transmits the data user to the database login module, the user registers an account and logs in, and the safety protection module can effectively protect and maintain the data platform;
s4: the network module is divided into a wired module and a wireless module and transmits user data in two networking modes;
s5: the database encryption module encrypts the data transmitted from the network module, stores the decryption key into the one-time programmable memory when the encryption is selected, and encrypts and stores the authentication key into the encryption code stream when the identity authentication is selected, so as to generate the encryption code stream containing the identity authentication.
Preferably, the database encryption module selects not to encrypt, and stores the authentication key in the one-time programmable memory when selecting to perform identity authentication, and generates a code stream containing identity authentication.
Preferably, the database detection module is configured to input the database into a consensus neural network architecture, and obtain a probability value representing reliability of node data output by the consensus neural network architecture; the consensus neural network architecture is obtained based on a prediction result corresponding to the number of the sample database and sample label training, and comprises a characteristic diagram and a evidence storage unit.
Preferably, the feature map obtaining unit is configured to input the block authentication code to a preset self-encoder to obtain a corresponding feature map; and the evidence storage unit is used for adding the block to a block chain if the probability value is greater than a preset probability threshold value.
Preferably, the inputting of the database data into a verification network model to obtain a verification result output by the verification network model specifically includes: inputting the database data into a preset convolutional neural network model for data dimensionality reduction to obtain database data of a target dimensionality; inputting the database data of the target dimension into a preset long-term and short-term memory network model for feature extraction to obtain data features; and inputting the data characteristics to a logistic regression layer to obtain the verification result.
Preferably, in step S3, the user logs in to the management server by using an account password or logs in to the management server by using a digital certificate, and the login error exceeds three times and the user needs to perform personal authentication before continuing the login.
Preferably, the database encryption module can effectively encrypt the user data, and the database encryption mode is a public key encryption (PKI) encryption mode, so that the encryption is complex, and the data in the database can be effectively prevented from being lost.
The beneficial effects of the invention are as follows:
1. according to the distributed database security authentication method based on the block chain technology, the one-time programmable memory and the security protection module are arranged, the one-time programmable memory is used for storing the decryption key or the authentication key, the utilization rate of the one-time programmable memory is improved, so that the authentication key is protected without an extra circuit when only identity authentication is carried out, the occupation of resources is reduced, the security protection module can effectively prevent viruses from attacking data, and the security is effectively improved.
2. According to the distributed database security authentication method based on the block chain technology, the database encryption module is arranged, the database encryption mode is a PKI public key encryption mode, encryption is complex, data in the database can be effectively prevented from being lost, and the security of the database is further improved.
3. According to the distributed database security authentication method based on the block chain technology, the common-recognition neural network architecture is introduced to process and authenticate the database data in the data node generation block, the authentication efficiency of the database data can be effectively improved, the reliability of data flow in a network is guaranteed, and therefore reliable collection, transmission and use of the database data are achieved.
The parts of the device not involved are the same as or can be implemented using prior art.
Drawings
Fig. 1 is a schematic structural diagram of a distributed database security authentication method based on a block chain technique according to the present invention.
Detailed Description
The technical solution of the present patent will be described in further detail with reference to the following embodiments.
Reference will now be made in detail to embodiments of the present patent, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present patent and are not to be construed as limiting the present patent.
In the description of this patent, it is to be understood that the terms "center," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the orientations and positional relationships indicated in the drawings for the convenience of describing the patent and for the simplicity of description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are not to be considered limiting of the patent.
In the description of this patent, it is noted that unless otherwise specifically stated or limited, the terms "mounted," "connected," and "disposed" are to be construed broadly and can include, for example, fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in this patent may be understood by those of ordinary skill in the art as appropriate.
Referring to fig. 1, the distributed database security authentication method based on the block chain technology includes an authentication process, the authentication process includes a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and the authentication process includes the following steps:
s1: acquiring database data in a block chain generated by a data node; adding a data owner, a data user and a data platform into the alliance chain system;
s2: in the alliance chain system, a corresponding channel is established for each group of data uploaded by a data owner, and the data owner and the data are transmitted to a database detection module;
s3: after the data user acquires the data use permission from the database detection module, the data platform transmits the data user to the database login module, the user registers an account and logs in, the safety protection module can effectively protect and maintain the data platform, the safety protection module can effectively prevent viruses from attacking data, and the safety is effectively improved;
s4: the network module is divided into a wired module and a wireless module and transmits user data in two networking modes;
s5: the database encryption module encrypts data transmitted from the network module, stores a decryption key into the one-time programmable memory when encryption is selected, encrypts an authentication key and stores the authentication key into an encryption code stream when identity authentication is selected to generate the encryption code stream containing the identity authentication, and the one-time programmable memory is used for storing the decryption key or the authentication key, so that the utilization rate of the one-time programmable memory is improved, an extra circuit is not needed to protect the authentication key when only the identity authentication is performed, and the occupation of resources is reduced.
In the invention, the database encryption module selects not to encrypt, and stores the authentication key into the one-time programmable memory when selecting to authenticate the identity, and generates a code stream containing identity authentication.
In the invention, the database encryption module selects not to encrypt, and stores the authentication key into the one-time programmable memory when selecting to authenticate the identity, and generates a code stream containing identity authentication.
In the invention, a database detection module is used for inputting a database into a consensus neural network architecture to obtain a probability value which is output by the consensus neural network architecture and represents the reliability of node data; the consensus neural network architecture is obtained based on a prediction result corresponding to the number of the sample databases and sample label training, comprises a characteristic diagram and a verification unit, and processes and authenticates database data in the data node generation block by introducing the consensus neural network architecture, so that the authentication efficiency of the database data can be effectively improved, the reliability of data flow in a network is ensured, and the reliable acquisition, transmission and use of the database data are realized.
In the invention, a characteristic diagram obtaining unit is used for inputting the block authentication code into a preset self-encoder to obtain a corresponding characteristic diagram; and the evidence storage unit is used for adding the block to the block chain if the probability value is greater than a preset probability threshold value.
In the invention, the database data is input into the verification network model to obtain the verification result output by the verification network model, and the method specifically comprises the following steps: inputting the database data into a preset convolutional neural network model for data dimension reduction to obtain database data of a target dimension; inputting database data of a target dimension into a preset long-term and short-term memory network model for feature extraction to obtain data features; and inputting the data characteristics to a logistic regression layer to obtain a verification result.
In the present invention, in step S3, the user logs in the management server using an account password or using a digital certificate, and the user needs to perform personal authentication more than three times to continue logging in.
In the invention, the database encryption module can effectively encrypt the user data, and the database encryption mode is a PKI public key encryption mode, so that the encryption is complex, and the data loss in the database can be effectively prevented.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (7)

1. The distributed database security authentication method based on the block chain technology comprises an authentication process, and is characterized in that the authentication process comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and the authentication process comprises the following steps:
s1: acquiring database data in a block chain generated by a data node; adding a data owner, a data user and a data platform into the alliance chain system;
s2: in the alliance chain system, a corresponding channel is established for each group of data uploaded by a data owner, and the data owner and the data are transmitted to a database detection module;
s3: after the data user acquires the data use permission from the database detection module, the data platform transmits the data user to the database login module, the user registers an account and logs in, and the safety protection module can effectively protect and maintain the data platform;
s4: the network module is divided into a wired module and a wireless module and transmits user data in two networking modes;
s5: the database encryption module encrypts the data transmitted from the network module, stores the decryption key into the one-time programmable memory when the encryption is selected, and encrypts and stores the authentication key into the encryption code stream when the identity authentication is selected, so as to generate the encryption code stream containing the identity authentication.
2. The distributed database security authentication method based on the blockchain technology as claimed in claim 1, wherein the database encryption module selects not to encrypt, and when identity authentication is selected, stores the authentication key in the one-time programmable memory, and generates a code stream containing identity authentication.
3. The distributed database security authentication method based on the blockchain technology as claimed in claim 2, wherein the database detection module is configured to input the database into a consensus neural network architecture to obtain a probability value representing the reliability of the node data output by the consensus neural network architecture; the consensus neural network architecture is obtained based on a prediction result corresponding to the number of the sample database and sample label training, and comprises a characteristic diagram and a evidence storage unit.
4. The distributed database security authentication method based on the blockchain technology as claimed in claim 4, wherein the signature graph obtaining unit is configured to input a blockchain authentication code into a preset self-encoder to obtain a corresponding signature graph; and the evidence storage unit is used for adding the block to a block chain if the probability value is greater than a preset probability threshold value.
5. The distributed database security authentication method based on the blockchain technology as claimed in claim 1, wherein the database data is input into a verification network model to obtain a verification result output by the verification network model, and the method specifically comprises: inputting the database data into a preset convolutional neural network model for data dimensionality reduction to obtain database data of a target dimensionality; inputting the database data of the target dimension into a preset long-term and short-term memory network model for feature extraction to obtain data features; and inputting the data characteristics to a logistic regression layer to obtain the verification result.
6. The method for distributed database security authentication based on blockchain technology as claimed in claim 1, wherein in step S3, the user logs in the management server using an account password or a digital certificate, and the login error exceeds three times and requires authentication before continuing the login.
7. The method as claimed in claim 6, wherein the database encryption module is capable of effectively encrypting the user data, and the database encryption method is a PKI public key encryption method, which is complex in encryption and capable of effectively preventing data loss in the database.
CN202110444009.1A 2021-04-23 2021-04-23 Distributed database security authentication method based on block chain technology Pending CN113158212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110444009.1A CN113158212A (en) 2021-04-23 2021-04-23 Distributed database security authentication method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110444009.1A CN113158212A (en) 2021-04-23 2021-04-23 Distributed database security authentication method based on block chain technology

Publications (1)

Publication Number Publication Date
CN113158212A true CN113158212A (en) 2021-07-23

Family

ID=76869998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110444009.1A Pending CN113158212A (en) 2021-04-23 2021-04-23 Distributed database security authentication method based on block chain technology

Country Status (1)

Country Link
CN (1) CN113158212A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170149560A1 (en) * 2012-02-02 2017-05-25 Netspective Communications Llc Digital blockchain authentication
US20180145992A1 (en) * 2016-11-23 2018-05-24 Idemia Identity & Security France Data verification method
WO2019195820A1 (en) * 2018-04-06 2019-10-10 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation
WO2020042464A1 (en) * 2018-08-31 2020-03-05 深圳壹账通智能科技有限公司 Data interaction method, apparatus and device, and readable storage medium
CN111935119A (en) * 2020-07-31 2020-11-13 上海安路信息科技有限公司 Data encryption authentication method and data encryption authentication system
CN112364388A (en) * 2020-10-28 2021-02-12 中车工业研究院有限公司 Sensor data authentication method and device based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170149560A1 (en) * 2012-02-02 2017-05-25 Netspective Communications Llc Digital blockchain authentication
US20180145992A1 (en) * 2016-11-23 2018-05-24 Idemia Identity & Security France Data verification method
WO2019195820A1 (en) * 2018-04-06 2019-10-10 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation
WO2020042464A1 (en) * 2018-08-31 2020-03-05 深圳壹账通智能科技有限公司 Data interaction method, apparatus and device, and readable storage medium
CN111935119A (en) * 2020-07-31 2020-11-13 上海安路信息科技有限公司 Data encryption authentication method and data encryption authentication system
CN112364388A (en) * 2020-10-28 2021-02-12 中车工业研究院有限公司 Sensor data authentication method and device based on block chain

Similar Documents

Publication Publication Date Title
US11171790B2 (en) Systems and methods for trusted path secure communication
US7178025B2 (en) Access system utilizing multiple factor identification and authentication
US7231526B2 (en) System and method for validating a network session
US5491752A (en) System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
KR101753859B1 (en) Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device
EP2544117A1 (en) Method and system for sharing or storing personal data without loss of privacy
EP2339777A2 (en) Method of authenticating a user to use a system
CN109688133A (en) It is a kind of based on exempt from account login communication means
CN101621794A (en) Method for realizing safe authentication of wireless application service system
Dua et al. Replay attack prevention in Kerberos authentication protocol using triple password
CN110378135A (en) Intimacy protection system and method based on big data analysis and trust computing
KR101358375B1 (en) Prevention security system and method for smishing
Feiri et al. Efficient and secure storage of private keys for pseudonymous vehicular communication
CN103152326A (en) Distributed authentication method and authentication system
CN112272090B (en) Key generation method and device
CN117376002A (en) Biometric authentication method and authentication system
CN107104792B (en) Portable mobile password management system and management method thereof
CN116346423A (en) Client data multiple encryption system and method in intelligent Internet of things energy system
KR102053993B1 (en) Method for Authenticating by using Certificate
CN116112234A (en) Electronic signing security verification method, system, medium and equipment
CN113158212A (en) Distributed database security authentication method based on block chain technology
CN114338181A (en) Encryption transmission method for guaranteeing reliability of network communication
CN107819751A (en) A kind of safe automated log on management system
CN106656947B (en) Data encryption system
Khalid et al. New and Simple Offline Authentication Approach using Time-based One-time Password with Biometric for Car Sharing Vehicles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210723