CN113158212A - Distributed database security authentication method based on block chain technology - Google Patents
Distributed database security authentication method based on block chain technology Download PDFInfo
- Publication number
- CN113158212A CN113158212A CN202110444009.1A CN202110444009A CN113158212A CN 113158212 A CN113158212 A CN 113158212A CN 202110444009 A CN202110444009 A CN 202110444009A CN 113158212 A CN113158212 A CN 113158212A
- Authority
- CN
- China
- Prior art keywords
- data
- database
- module
- authentication
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000005516 engineering process Methods 0.000 title claims abstract description 16
- 230000015654 memory Effects 0.000 claims abstract description 14
- 238000001514 detection method Methods 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims description 13
- 238000013528 artificial neural network Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 claims description 10
- 238000010586 diagram Methods 0.000 claims description 6
- 238000013527 convolutional neural network Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 3
- 238000007477 logistic regression Methods 0.000 claims description 3
- 230000007787 long-term memory Effects 0.000 claims description 3
- 230000006855 networking Effects 0.000 claims description 3
- 230000009467 reduction Effects 0.000 claims description 3
- 230000006403 short-term memory Effects 0.000 claims description 3
- 241000700605 Viruses Species 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of databases, in particular to a distributed database security authentication method based on a block chain technology, which comprises an authentication flow, wherein the authentication flow comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and the authentication flow comprises the following steps: s1: acquiring database data in a block chain generated by a data node; and adding a data owner, a data user and a data platform into the alliance chain system. The one-time programmable memory is used for storing the decryption key or the authentication key, so that the utilization rate of the one-time programmable memory is improved, the authentication key is protected without an additional circuit when only identity authentication is carried out, the occupation of resources is reduced, the security protection module can effectively prevent viruses from attacking data, and the security is effectively improved.
Description
Technical Field
The invention relates to the technical field of databases, in particular to a distributed database security authentication method based on a block chain technology.
Background
In order to ensure the confidentiality of data in the database and prevent illegal users from maliciously probing, leaking and tampering private data, the method for encrypting the sensitive data and storing the encrypted sensitive data into the database is an effective method, and the encryption method has the advantages that the burden of a database server is not increased, but the encryption function is possibly limited to a certain extent and the coupling with a database management system is poor. Therefore, many users use the middleware to realize the encryption operation of the plaintext data, the middleware system is deployed between the database client and the server, the encryption and decryption algorithm can be flexibly adjusted while the data security is ensured, and loose coupling with the database server is realized while upper-layer application is not modified.
Some illegal users obtain the authority to enter the ciphertext database through replay attack, so that the data in the ciphertext database can be checked, maliciously tampered and deleted by using middleware, and the legal users can also perform unauthorized operation.
Disclosure of Invention
Based on the technical problems provided in the background art, the invention provides a distributed database security authentication method based on a block chain technology.
The invention provides a distributed database security authentication method based on a block chain technology, which comprises an authentication process, wherein the authentication process comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and comprises the following steps:
s1: acquiring database data in a block chain generated by a data node; adding a data owner, a data user and a data platform into the alliance chain system;
s2: in the alliance chain system, a corresponding channel is established for each group of data uploaded by a data owner, and the data owner and the data are transmitted to a database detection module;
s3: after the data user acquires the data use permission from the database detection module, the data platform transmits the data user to the database login module, the user registers an account and logs in, and the safety protection module can effectively protect and maintain the data platform;
s4: the network module is divided into a wired module and a wireless module and transmits user data in two networking modes;
s5: the database encryption module encrypts the data transmitted from the network module, stores the decryption key into the one-time programmable memory when the encryption is selected, and encrypts and stores the authentication key into the encryption code stream when the identity authentication is selected, so as to generate the encryption code stream containing the identity authentication.
Preferably, the database encryption module selects not to encrypt, and stores the authentication key in the one-time programmable memory when selecting to perform identity authentication, and generates a code stream containing identity authentication.
Preferably, the database detection module is configured to input the database into a consensus neural network architecture, and obtain a probability value representing reliability of node data output by the consensus neural network architecture; the consensus neural network architecture is obtained based on a prediction result corresponding to the number of the sample database and sample label training, and comprises a characteristic diagram and a evidence storage unit.
Preferably, the feature map obtaining unit is configured to input the block authentication code to a preset self-encoder to obtain a corresponding feature map; and the evidence storage unit is used for adding the block to a block chain if the probability value is greater than a preset probability threshold value.
Preferably, the inputting of the database data into a verification network model to obtain a verification result output by the verification network model specifically includes: inputting the database data into a preset convolutional neural network model for data dimensionality reduction to obtain database data of a target dimensionality; inputting the database data of the target dimension into a preset long-term and short-term memory network model for feature extraction to obtain data features; and inputting the data characteristics to a logistic regression layer to obtain the verification result.
Preferably, in step S3, the user logs in to the management server by using an account password or logs in to the management server by using a digital certificate, and the login error exceeds three times and the user needs to perform personal authentication before continuing the login.
Preferably, the database encryption module can effectively encrypt the user data, and the database encryption mode is a public key encryption (PKI) encryption mode, so that the encryption is complex, and the data in the database can be effectively prevented from being lost.
The beneficial effects of the invention are as follows:
1. according to the distributed database security authentication method based on the block chain technology, the one-time programmable memory and the security protection module are arranged, the one-time programmable memory is used for storing the decryption key or the authentication key, the utilization rate of the one-time programmable memory is improved, so that the authentication key is protected without an extra circuit when only identity authentication is carried out, the occupation of resources is reduced, the security protection module can effectively prevent viruses from attacking data, and the security is effectively improved.
2. According to the distributed database security authentication method based on the block chain technology, the database encryption module is arranged, the database encryption mode is a PKI public key encryption mode, encryption is complex, data in the database can be effectively prevented from being lost, and the security of the database is further improved.
3. According to the distributed database security authentication method based on the block chain technology, the common-recognition neural network architecture is introduced to process and authenticate the database data in the data node generation block, the authentication efficiency of the database data can be effectively improved, the reliability of data flow in a network is guaranteed, and therefore reliable collection, transmission and use of the database data are achieved.
The parts of the device not involved are the same as or can be implemented using prior art.
Drawings
Fig. 1 is a schematic structural diagram of a distributed database security authentication method based on a block chain technique according to the present invention.
Detailed Description
The technical solution of the present patent will be described in further detail with reference to the following embodiments.
Reference will now be made in detail to embodiments of the present patent, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present patent and are not to be construed as limiting the present patent.
In the description of this patent, it is to be understood that the terms "center," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the orientations and positional relationships indicated in the drawings for the convenience of describing the patent and for the simplicity of description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are not to be considered limiting of the patent.
In the description of this patent, it is noted that unless otherwise specifically stated or limited, the terms "mounted," "connected," and "disposed" are to be construed broadly and can include, for example, fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in this patent may be understood by those of ordinary skill in the art as appropriate.
Referring to fig. 1, the distributed database security authentication method based on the block chain technology includes an authentication process, the authentication process includes a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and the authentication process includes the following steps:
s1: acquiring database data in a block chain generated by a data node; adding a data owner, a data user and a data platform into the alliance chain system;
s2: in the alliance chain system, a corresponding channel is established for each group of data uploaded by a data owner, and the data owner and the data are transmitted to a database detection module;
s3: after the data user acquires the data use permission from the database detection module, the data platform transmits the data user to the database login module, the user registers an account and logs in, the safety protection module can effectively protect and maintain the data platform, the safety protection module can effectively prevent viruses from attacking data, and the safety is effectively improved;
s4: the network module is divided into a wired module and a wireless module and transmits user data in two networking modes;
s5: the database encryption module encrypts data transmitted from the network module, stores a decryption key into the one-time programmable memory when encryption is selected, encrypts an authentication key and stores the authentication key into an encryption code stream when identity authentication is selected to generate the encryption code stream containing the identity authentication, and the one-time programmable memory is used for storing the decryption key or the authentication key, so that the utilization rate of the one-time programmable memory is improved, an extra circuit is not needed to protect the authentication key when only the identity authentication is performed, and the occupation of resources is reduced.
In the invention, the database encryption module selects not to encrypt, and stores the authentication key into the one-time programmable memory when selecting to authenticate the identity, and generates a code stream containing identity authentication.
In the invention, the database encryption module selects not to encrypt, and stores the authentication key into the one-time programmable memory when selecting to authenticate the identity, and generates a code stream containing identity authentication.
In the invention, a database detection module is used for inputting a database into a consensus neural network architecture to obtain a probability value which is output by the consensus neural network architecture and represents the reliability of node data; the consensus neural network architecture is obtained based on a prediction result corresponding to the number of the sample databases and sample label training, comprises a characteristic diagram and a verification unit, and processes and authenticates database data in the data node generation block by introducing the consensus neural network architecture, so that the authentication efficiency of the database data can be effectively improved, the reliability of data flow in a network is ensured, and the reliable acquisition, transmission and use of the database data are realized.
In the invention, a characteristic diagram obtaining unit is used for inputting the block authentication code into a preset self-encoder to obtain a corresponding characteristic diagram; and the evidence storage unit is used for adding the block to the block chain if the probability value is greater than a preset probability threshold value.
In the invention, the database data is input into the verification network model to obtain the verification result output by the verification network model, and the method specifically comprises the following steps: inputting the database data into a preset convolutional neural network model for data dimension reduction to obtain database data of a target dimension; inputting database data of a target dimension into a preset long-term and short-term memory network model for feature extraction to obtain data features; and inputting the data characteristics to a logistic regression layer to obtain a verification result.
In the present invention, in step S3, the user logs in the management server using an account password or using a digital certificate, and the user needs to perform personal authentication more than three times to continue logging in.
In the invention, the database encryption module can effectively encrypt the user data, and the database encryption mode is a PKI public key encryption mode, so that the encryption is complex, and the data loss in the database can be effectively prevented.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (7)
1. The distributed database security authentication method based on the block chain technology comprises an authentication process, and is characterized in that the authentication process comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module, and the authentication process comprises the following steps:
s1: acquiring database data in a block chain generated by a data node; adding a data owner, a data user and a data platform into the alliance chain system;
s2: in the alliance chain system, a corresponding channel is established for each group of data uploaded by a data owner, and the data owner and the data are transmitted to a database detection module;
s3: after the data user acquires the data use permission from the database detection module, the data platform transmits the data user to the database login module, the user registers an account and logs in, and the safety protection module can effectively protect and maintain the data platform;
s4: the network module is divided into a wired module and a wireless module and transmits user data in two networking modes;
s5: the database encryption module encrypts the data transmitted from the network module, stores the decryption key into the one-time programmable memory when the encryption is selected, and encrypts and stores the authentication key into the encryption code stream when the identity authentication is selected, so as to generate the encryption code stream containing the identity authentication.
2. The distributed database security authentication method based on the blockchain technology as claimed in claim 1, wherein the database encryption module selects not to encrypt, and when identity authentication is selected, stores the authentication key in the one-time programmable memory, and generates a code stream containing identity authentication.
3. The distributed database security authentication method based on the blockchain technology as claimed in claim 2, wherein the database detection module is configured to input the database into a consensus neural network architecture to obtain a probability value representing the reliability of the node data output by the consensus neural network architecture; the consensus neural network architecture is obtained based on a prediction result corresponding to the number of the sample database and sample label training, and comprises a characteristic diagram and a evidence storage unit.
4. The distributed database security authentication method based on the blockchain technology as claimed in claim 4, wherein the signature graph obtaining unit is configured to input a blockchain authentication code into a preset self-encoder to obtain a corresponding signature graph; and the evidence storage unit is used for adding the block to a block chain if the probability value is greater than a preset probability threshold value.
5. The distributed database security authentication method based on the blockchain technology as claimed in claim 1, wherein the database data is input into a verification network model to obtain a verification result output by the verification network model, and the method specifically comprises: inputting the database data into a preset convolutional neural network model for data dimensionality reduction to obtain database data of a target dimensionality; inputting the database data of the target dimension into a preset long-term and short-term memory network model for feature extraction to obtain data features; and inputting the data characteristics to a logistic regression layer to obtain the verification result.
6. The method for distributed database security authentication based on blockchain technology as claimed in claim 1, wherein in step S3, the user logs in the management server using an account password or a digital certificate, and the login error exceeds three times and requires authentication before continuing the login.
7. The method as claimed in claim 6, wherein the database encryption module is capable of effectively encrypting the user data, and the database encryption method is a PKI public key encryption method, which is complex in encryption and capable of effectively preventing data loss in the database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110444009.1A CN113158212A (en) | 2021-04-23 | 2021-04-23 | Distributed database security authentication method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110444009.1A CN113158212A (en) | 2021-04-23 | 2021-04-23 | Distributed database security authentication method based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113158212A true CN113158212A (en) | 2021-07-23 |
Family
ID=76869998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110444009.1A Pending CN113158212A (en) | 2021-04-23 | 2021-04-23 | Distributed database security authentication method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113158212A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170149560A1 (en) * | 2012-02-02 | 2017-05-25 | Netspective Communications Llc | Digital blockchain authentication |
US20180145992A1 (en) * | 2016-11-23 | 2018-05-24 | Idemia Identity & Security France | Data verification method |
WO2019195820A1 (en) * | 2018-04-06 | 2019-10-10 | Daniel Maurice Lerner | Securing temporal digital communications via authentication and validation |
WO2020042464A1 (en) * | 2018-08-31 | 2020-03-05 | 深圳壹账通智能科技有限公司 | Data interaction method, apparatus and device, and readable storage medium |
CN111935119A (en) * | 2020-07-31 | 2020-11-13 | 上海安路信息科技有限公司 | Data encryption authentication method and data encryption authentication system |
CN112364388A (en) * | 2020-10-28 | 2021-02-12 | 中车工业研究院有限公司 | Sensor data authentication method and device based on block chain |
-
2021
- 2021-04-23 CN CN202110444009.1A patent/CN113158212A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170149560A1 (en) * | 2012-02-02 | 2017-05-25 | Netspective Communications Llc | Digital blockchain authentication |
US20180145992A1 (en) * | 2016-11-23 | 2018-05-24 | Idemia Identity & Security France | Data verification method |
WO2019195820A1 (en) * | 2018-04-06 | 2019-10-10 | Daniel Maurice Lerner | Securing temporal digital communications via authentication and validation |
WO2020042464A1 (en) * | 2018-08-31 | 2020-03-05 | 深圳壹账通智能科技有限公司 | Data interaction method, apparatus and device, and readable storage medium |
CN111935119A (en) * | 2020-07-31 | 2020-11-13 | 上海安路信息科技有限公司 | Data encryption authentication method and data encryption authentication system |
CN112364388A (en) * | 2020-10-28 | 2021-02-12 | 中车工业研究院有限公司 | Sensor data authentication method and device based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11171790B2 (en) | Systems and methods for trusted path secure communication | |
US7178025B2 (en) | Access system utilizing multiple factor identification and authentication | |
US7231526B2 (en) | System and method for validating a network session | |
US5491752A (en) | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | |
KR101753859B1 (en) | Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device | |
EP2544117A1 (en) | Method and system for sharing or storing personal data without loss of privacy | |
EP2339777A2 (en) | Method of authenticating a user to use a system | |
CN109688133A (en) | It is a kind of based on exempt from account login communication means | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
Dua et al. | Replay attack prevention in Kerberos authentication protocol using triple password | |
CN110378135A (en) | Intimacy protection system and method based on big data analysis and trust computing | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
Feiri et al. | Efficient and secure storage of private keys for pseudonymous vehicular communication | |
CN103152326A (en) | Distributed authentication method and authentication system | |
CN112272090B (en) | Key generation method and device | |
CN117376002A (en) | Biometric authentication method and authentication system | |
CN107104792B (en) | Portable mobile password management system and management method thereof | |
CN116346423A (en) | Client data multiple encryption system and method in intelligent Internet of things energy system | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
CN116112234A (en) | Electronic signing security verification method, system, medium and equipment | |
CN113158212A (en) | Distributed database security authentication method based on block chain technology | |
CN114338181A (en) | Encryption transmission method for guaranteeing reliability of network communication | |
CN107819751A (en) | A kind of safe automated log on management system | |
CN106656947B (en) | Data encryption system | |
Khalid et al. | New and Simple Offline Authentication Approach using Time-based One-time Password with Biometric for Car Sharing Vehicles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210723 |