CN113268753B - Block chain-based data controlled circulation method - Google Patents

Block chain-based data controlled circulation method Download PDF

Info

Publication number
CN113268753B
CN113268753B CN202110564714.5A CN202110564714A CN113268753B CN 113268753 B CN113268753 B CN 113268753B CN 202110564714 A CN202110564714 A CN 202110564714A CN 113268753 B CN113268753 B CN 113268753B
Authority
CN
China
Prior art keywords
data
key
trusted
party
streaming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110564714.5A
Other languages
Chinese (zh)
Other versions
CN113268753A (en
Inventor
仵松颀
陆月明
王东滨
韩道岐
段峰辉
郭子裕
李瑾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinrui Tongchuang Beijing Technology Co ltd
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202110564714.5A priority Critical patent/CN113268753B/en
Publication of CN113268753A publication Critical patent/CN113268753A/en
Application granted granted Critical
Publication of CN113268753B publication Critical patent/CN113268753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses a block chain-based data controlled circulation method, belonging to the field of network security; firstly, establishing a data transfer alliance chain in an untrusted network environment, and establishing a trusted third party, a data uploading area and a downloading area; secondly, executing an intelligent contract for data encryption uploading, encrypting the revolution data and uploading the revolution data to a data transfer central station by setting an access control structure tree among different users; then executing intelligent contract of data abstract uplink, extracting abstract information of the circulated data and uplink memory evidence; then executing an intelligent contract generated by the key, and dynamically generating a resource access key by a trusted third party according to the identity attribute of the data receiver; and finally, executing the intelligent contract obtained by data decryption, decrypting by using the resource access key by the data receiver to obtain a clear text of the transferred data, and verifying the authenticity of the transferred data through link-up and link-down data abstract comparison. The invention ensures the credible data source and controls the flowing range of the data.

Description

Block chain-based data controlled circulation method
Technical Field
The invention belongs to the technical field of network security, and relates to a block chain-based controlled data transfer method.
Background
With the continuous development of social informatization, a large amount of data resources are gathered in various industries, the data are mutually and independently stored in different information systems, and the data circulation between different systems is very difficult, so that the dilemma of data island among the industries is caused.
Data circulation among different systems can promote cross reference of data of various industries, is beneficial to mining potential value in the data and brings huge social and economic benefits, so that the problem of information barrier existing among the industries is urgently needed to be solved.
The data circulation brings great resource convenience to people and simultaneously faces the loss of personal data rights and interests. For example, enterprises sell personal private data without the knowledge of users, resulting in loss of personal data interests of users and great harm to the lives of users. Meanwhile, the data circulation in the open network environment also has the problems of content tampering, data theft and the like. Therefore, how to realize the controlled data circulation is a huge test faced in the information era on the premise of protecting the personal data rights and interests of people are more and more concerned.
Currently, a commonly used data transfer technology is a distributed database, which is composed of a plurality of interconnected databases and communicates using a two-phase commit protocol to implement data transfer. However, the distributed database has the problems of high overhead, difficult data synchronization, difficult security control and the like, and is not beneficial to protecting the data rights and interests in the data circulation process.
Therefore, a block chain technology is introduced, and a distributed shared account book and a database have the characteristics of decentralization, non-falsification, whole-course reservation and the like; the system is responsible for auditing the data circulation process and controlling the data flow range, and records all executed operations in the circulation process by utilizing the self anti-tampering characteristic. At the moment, data is stored in a local database, the whole circulation process is strictly controlled by a block chain, and the problems of difficulty in data synchronization, unstable safety and the like do not exist.
Disclosure of Invention
Based on a distributed database and a two-stage submission protocol in the prior art, the safety problem of a data transfer process cannot be solved, the invention provides a block chain-based data controlled transfer method, and the problems of low data reliability, disordered data transfer process, continuous loss of data rights and interests and the like in an open network environment are effectively solved.
The block chain-based data controlled circulation method comprises the following steps:
step one, adopting an architecture of an alliance master and two slave organizations to construct a data flow alliance chain, and adopting a Raft consensus algorithm to realize information synchronization between the alliance master and the slave organizations;
the architecture is specifically as follows:
firstly, building nine virtual machines which are respectively used as different nodes, forming an Org organization by every two peer-to-peer nodes, and forming three nodes: org1 tissue, Org2 from tissue and Org3 from tissue; org2 is the data upload area in the data stream federation chain from the organization, and Org3 is the data download area in the data stream federation chain from the organization.
The remaining three nodes form an Orderer organization, and the Org1 organization and the Orderer organization together form an alliance master leader as a trusted third party in the data flow federation chain.
Finally, establishing a trusted shared transmission channel1 between the trusted third party and the data uploading area; a trusted shared transmission channel2 is established between the trusted third party and the data download area.
Step two, a data sender a applies for a public parameter PA of attribute encryption to a trusted third party, and sets an access control structure tree T to encrypt the transmitted streaming data to generate a streaming data ciphertext DC;
the specific process is as follows:
firstly, a trusted third party inputs a security parameter lambda to generate a public parameter PA and a master key MK, and uploads the parameter PA to a channel 1;
Setup(λ)→(MK,PA)
then, the data sender a constructs an access structure tree T;
the access structure tree T consists of a series of data recipients' identity attributes and threshold logical operators.
And finally, the DATA sender a encrypts the streaming DATA plaintext DATA sent by the DATA sender a by using the access structure tree T and the public parameter PA to generate a streaming DATA ciphertext DC.
Encrypt(DATA,PA|T)→DC
Step three, sender a will encryptUploading the text DC to a data flow transfer station, and extracting data summary information H in the file flow process1And the uplink certificate is recorded in the data transfer alliance chain.
The summary information specifically comprises three parts:
the data entity comprises a data name, a data type, a data Hash value, a URI of a data file, a data size, a data version and the like.
The data activity comprises a circulation event number, data sender information and data receiver information.
The additional information is information such as a digital signature and a time stamp which are required to be added when the data summary is uplink.
And step four, the data receiver b sends a resource access request to a trusted third party, and the trusted third party generates a resource access key VK.
The specific process is as follows:
firstly, a data receiver b generates a public key PK and a private key SK for data encryption transmission, and sends a resource access request and the public key PK to a trusted third party.
Secondly, the trusted third party verifies the legal identity of the data receiver b, the identity attribute A of the data receiver b is obtained after the verification is successful, and an illegal user access warning is sent out when the verification is failed.
The trusted third party then generates a resource access key VK based on the master key MK, the public parameter PA and the identity attribute a.
KeyGen(PA,MK,A)→VK
Then, the trusted third party encrypts the resource access key VK using the public key PK to obtain an encrypted key EK, and uploads the encrypted key EK to the channel 2.
Encrypt(VK,PK)→EK
Finally, the data receiver b obtains the encrypted key EK from the channel2, and decrypts the key EK by using the private key SK to obtain the resource access key VK.
Decrypt(EK,SK)→VK
And step five, the DATA receiver b performs internal decryption calculation according to the resource access key VK to obtain the streaming DATA plaintext DATA of the DATA transmitter a.
The specific process is as follows:
first, the data receiver b acquires the streaming data ciphertext DC from the data streaming relay station, and acquires the resource access key VK from the channel 2.
Then, the DATA receiver b performs decryption calculation on the stream DATA ciphertext DC using the resource access key VK in the DATA download section, thereby obtaining the DATA sharing plaintext DATA.
The decryption process is as follows: and judging whether the identity attribute A of the DATA receiver b is matched with the access control structure tree T or not, and if so, successfully decrypting to obtain the plaintext DATA of the streaming DATA. Otherwise, decryption cannot be performed.
Finally, the data receiver b extracts the summary information H of the chain certificate1And calculating summary information H of the plaintext DATA of the streaming DATA1'. By comparing the summary information, if the summary information is consistent, the data verification result is correct; otherwise, a warning of data tampering is sent out, so that the rapid consistency verification of the circulated data is realized.
The invention has the advantages that:
1) the block chain technology is utilized, a structure of an alliance owner and two slave organizations is adopted, a partition grading isolation protection mechanism of data is established, the uploading and downloading processes in data circulation are effectively isolated, and therefore the safety and the isolation of an information transmission environment are guaranteed. Meanwhile, two safe isolation channels, namely channel1 and channel2, are established for unidirectional transmission and resource sharing of streaming data.
2) The data controlled circulation method based on the block chain extracts the summary information of the data, links the chain storage certificate, establishes a historical record book of the circulation data, and achieves rapid consistency verification and data diffusion track tracing in data circulation.
3) A data sender constructs an access structure tree T, and the flowing range of data is controlled by using an attribute encryption technology, so that fine-grained access control on the flowing data is realized.
4) A data sender implements an access control strategy among different users, and a data receiver obtains data with corresponding authority based on identity so as to prevent an illegal user from stealing personal privacy data.
5) A data controlled circulation method based on a block chain is characterized in that distribution and management of a secret key are achieved based on a data circulation alliance, and a safer and more convenient secret key distribution mechanism is provided for a user by means of the characteristics of decentralization, non-tampering and traceability of the block chain.
Drawings
FIG. 1 is a schematic diagram of a block chain based data controlled streaming method of the present invention;
FIG. 2 is a flow chart of a block chain based data controlled streaming method of the present invention;
FIG. 3 is an architecture diagram of the present invention utilizing nine virtual enterprises to build a data flow federation chain;
fig. 4 is a schematic diagram of a data sender a sending streaming data for encrypted uploading;
FIG. 5 is a detailed block diagram of the data summary information of the present invention;
fig. 6 is a detailed flowchart of the present invention for generating a resource access key VK by a trusted third party;
fig. 7 is a flow chart of the present invention for data receiver b to request access to resources to decrypt and obtain the plaintext of data.
Detailed Description
The invention is explained in detail below with reference to the figures and examples.
The invention aims at an untrusted network to realize controlled data transfer and rights and interests protection, and provides a block chain-based controlled data transfer method, as shown in fig. 1, firstly, a data transfer alliance chain is established in an untrusted network environment, and a trusted third party, a data uploading area and a data downloading area are established for isolating uploading and downloading operations in a data transfer process; secondly, executing an intelligent contract for data encryption uploading, encrypting the revolution data and uploading the revolution data to a data transfer central station by setting an access control structure tree among different users; then executing intelligent contract of data abstract uplink, extracting abstract information of the circulated data and uplink memory evidence; then executing an intelligent contract generated by the key, and dynamically generating a resource access key by a trusted third party according to the identity attribute of the data receiver; and finally, executing the intelligent contract obtained by data decryption, decrypting by a data receiver by using the resource access key to obtain the clear text of the data to be transferred, and verifying the authenticity of the data to be transferred by comparing the data digests on the chain and the data digests on the chain.
The block chain-based data controlled circulation method, as shown in fig. 2, specifically includes the following steps:
step one, adopting an architecture of an alliance master and two slave organizations to construct a data flow alliance chain, and adopting a Raft consensus algorithm to realize information synchronization between the alliance master and the slave organizations;
the alliance owner is used as a safety approval center for data circulation to approve and schedule the data; the two slave organizations are respectively responsible for uploading and downloading data, but the slave organizations cannot directly interact with each other; the architecture is specifically as follows:
building nine virtual machines and deploying a block chain environment on the nine virtual machines to generate configuration files such as certificates, foundational blocks, channel configuration and anchor nodes, wherein the environment configuration process can be copied from the initial virtual machine.
As shown in fig. 3, the nine virtual machines are respectively regarded as different nodes, and each two peer nodes form an Org organization, which includes three nodes: org1 organization, Org2 slave organization and Org3 slave organization are responsible for the recording of the ledger and the execution of the intelligent contracts;
org2 acts as a data upload area in the data flow federation chain from the organization, and executes intelligent contracts of data encryption upload and data summary uplink; org3 executes intelligent contracts obtained by encrypting data from an organization as a data download area in a data stream federation chain.
And the remaining three sequencing nodes form an Orderer organization, and the sequencing among accounts is performed by adopting a raft consensus algorithm.
The Org1 organization and the Orderer organization jointly form an alliance leader, which is used as a trusted third party in the data flow alliance chain and is responsible for managing and distributing keys in the data flow process and executing an intelligent contract generated by a resource access key.
Establishing a trusted shared transmission channel1 between a trusted third party and a data uploading area, recording summary information of the circulating data, and sending an attribute-encrypted public parameter PA to the data uploading area; a trusted shared transmission channel2 is established between the trusted third party and the data download area, and the resource access key VK is transmitted encrypted to the data download area.
Step two, a data sender a executes an intelligent contract for data encryption uploading in a data uploading area, applies for a public parameter PA of attribute encryption to a trusted third party, sets an access control structure tree T to encrypt transmitted streaming data, and generates a streaming data ciphertext DC;
as shown in fig. 4, the specific process is as follows:
the DATA sender a executes an intelligent contract for DATA encryption uploading, extracts the DATA DATA from the private database, and sends a DATA encryption uploading request to a trusted third party.
The trusted third party verifies the identity information of the data sender a, inputs the security parameter lambda, generates a public parameter PA and a master key MK with encrypted attributes, and sends the public parameter PA to upload to the channel 1;
Setup(λ)→(MK,PA)
a data sender a acquires a public parameter PA from a channel1, and constructs an access structure tree T by taking the user identity as an attribute;
the data sender a specifies a user identity range of the data receiver, such as a financial or sales person in department 1or department 2 of the organization a, whose access structure tree T is represented as follows.
T is the unit A and { department 1or department 2} and { financial staff or sales staff }
The access structure tree T consists of a series of data recipients' identity attributes and threshold logical operators.
And the DATA sender a encrypts the streaming DATA plaintext DATA by using the access structure tree T and the public parameter PA to generate a streaming DATA ciphertext DC, and only the DATA receiver satisfying the access structure tree attribute can unlock the streaming DATA ciphertext DC.
Encrypt(DATA,PA|T)→DC
And the data sender a uploads the streaming data ciphertext DC to a data streaming middle station.
Step three, establishing a data flow transfer middle station on the basis of the data flow union link, transferring a data ciphertext DC to the data flow transfer middle station by a data sender a, and extracting data abstract information H in the file transfer process1And executing the uplink certificate storing operation.
As shown in fig. 5, summary information H1The method specifically comprises the following three parts: data entities, data activities, and additional information;
the method comprises the following specific steps:
the user extracts entity information of the streaming data, including a data name, a data type, a data Hash value, a URI of a data file, a data size, a data version and the like.
The user generates activity information of the circulation data, wherein the activity information comprises an activity event number, data sender information and data receiver information;
the user adds additional information of the data to be transferred, wherein the additional information is information such as a digital signature, a time stamp and the like which are needed to be added when the data summary is uplink.
User executed summary information H1And performing uplink certification storing operation, namely extracting the data abstract in the circulation process and recording the data abstract in a data circulation alliance chain.
And step four, the data receiver b sends a resource access request to the trusted third party, and the trusted third party executes the intelligent contract generated by the key to generate a resource access key VK, and encrypts and sends the resource access key VK to the channel 2.
As shown in fig. 6, the specific process is as follows:
firstly, a data receiver b generates a public key PK and a private key SK for data encryption transmission, and sends a resource access request and the public key PK to a trusted third party.
And secondly, the trusted third party executes the key to generate an intelligent contract, the legal identity of the data receiver b is verified, the identity attribute A of the data receiver b is obtained after the verification is successful, and an illegal user access warning is sent to the data flow alliance if the verification is failed.
The trusted third party then generates a resource access key VK based on the attribute-encrypted master key MK, the public parameter PA and the identity attribute a.
KeyGen(PA,MK,A)→VK
Then, the trusted third party encrypts the resource access key VK using the encrypted transmission public key PK to obtain an encrypted key EK, and uploads the encrypted key EK to the channel 2.
Encrypt(VK,PK)→EK
Finally, the data receiver b obtains the encrypted key EK from the channel2, and decrypts the key EK by using the private key SK to obtain the resource access key VK.
Decrypt(EK,SK)→VK
And step five, the DATA receiver b executes the intelligent contract obtained by DATA decryption in the DATA downloading area, and performs internal decryption calculation according to the resource access key VK to obtain the streaming DATA plaintext DATA of the DATA sender a.
As shown in fig. 7, the specific process is as follows:
first, the data receiver b applies for obtaining the streaming data ciphertext DC from the data streaming relay station, and applies for obtaining the resource access key VK to the trusted third party through the channel 2.
Then, the DATA receiver b decrypts the streaming DATA ciphertext DC by using the resource access key VK in the DATA downloading area, so as to obtain a DATA sharing plaintext DATA;
the decryption process is as follows: and judging whether the identity attribute A of the DATA receiver b is matched with the access control structure tree T or not, and if so, successfully decrypting to obtain the plaintext DATA of the streaming DATA. Otherwise, decryption cannot be performed.
Finally, the data receiver b extracts the summary information H of the chain certificate1And calculating summary information H of the plaintext DATA of the streaming DATA1'. Comparing summary information on the chain, and if the summary information is consistent, the data verification result is correct; otherwise, a warning of data tampering is sent out, so that the rapid consistency verification of the circulated data is realized.
The method specifically comprises the following steps:
the data receiver b acquires data summary information from the channel2, verifies the data type, data URI, data size and data version of the streaming data and summary information of chain evidenceH1And if the information verification is inconsistent, an illegal tampering warning is sent out.
And the data receiver b calculates the Hash value of the streaming data, compares the Hash value with the Hash value stored on the chain, verifies the correct row and the integrity of the content of the streaming data, and sends out an illegal tampering warning if the content verification is inconsistent.
And after the data flow alliance sends an alarm, deep detection can be carried out, the operation history of the source data block is traced from the chain, the operation history is analyzed, whether the risk of illegal operation exists is evaluated, and the vulnerability is repaired in time.

Claims (6)

1. A block chain-based data controlled circulation method is characterized in that: firstly, a data flow alliance chain is constructed by adopting an alliance and two slave organization framework, and information synchronization between the alliance and the slave organization is realized by adopting a Raft consensus algorithm; then, the data sender a applies for a public parameter PA of attribute encryption to a trusted third party, sets an access control structure tree T to encrypt the transmitted streaming data to obtain a streaming data ciphertext DC, and extracts data summary information H of the file1The uplink certificate is recorded in a data transfer alliance chain; and finally, the DATA receiver b performs internal decryption calculation according to the key VK to obtain the streaming DATA plaintext DATA of the DATA transmitter a, and verifies the authenticity of the streaming DATA through chain uplink and downlink DATA abstract comparison.
2. The method according to claim 1, wherein the architecture specifically comprises:
firstly, building nine virtual machines which are respectively used as different nodes, forming an Org organization by every two peer-to-peer nodes, and forming three nodes: org1 tissue, Org2 from tissue and Org3 from tissue; org2 acts as a data upload area in the data stream federation chain from the organization, Org3 acts as a data download area in the data stream federation chain from the organization;
the remaining three nodes form an Orderer organization, and the Org1 organization and the Orderer organization form an alliance master leader together to serve as a trusted third party in the data flow alliance chain;
finally, a trusted shared transmission channel1 is established between the trusted third party and the data uploading area; a trusted shared transmission channel2 is established between the trusted third party and the data download area.
3. The method according to claim 1, wherein the process of encrypting the transmitted streaming data by the data sender a is as follows:
firstly, a trusted third party inputs a security parameter lambda to generate a public parameter PA and a master key MK, and uploads the parameter PA to a channel 1;
Setup(λ)→(MK,PA)
then, the data sender a constructs an access structure tree T;
the access structure tree T consists of a series of identity attributes of data receivers and threshold logical operators;
finally, the DATA sender a encrypts the streaming DATA plaintext DATA sent by the DATA sender a by using the access structure tree T and the public parameter PA to generate a streaming DATA ciphertext DC, and stores the streaming DATA ciphertext DC to a DATA streaming transfer station;
Encrypt(DATA,PA|T)→DC。
4. the method according to claim 1, wherein the summary information H is the same as the summary information H1The method specifically comprises the following three parts:
the data entity comprises a data name, a data type, a data Hash value, a URI of a data file, a data size and a data version;
the data activity comprises a circulation event number, data sender information and data receiver information;
the additional information is that when data summary uplink is carried out, a digital signature and a time stamp need to be added.
5. The method as claimed in claim 1, wherein the specific process of the trusted third party dynamically generating the resource access key VK according to the identity attribute of the data receiver b is as follows:
firstly, a data receiver b generates a public key PK and a private key SK for data encryption transmission, and sends a resource access request and the public key PK to a trusted third party;
secondly, the trusted third party verifies the legal identity of the data receiver b, acquires the identity attribute A of the data receiver b after the verification is successful, and sends out an illegal user access warning if the verification is failed;
then, the trusted third party generates a resource access key VK according to the master key MK, the public parameter PA and the identity attribute A;
KeyGen(PA,MK,A)→VK
then, the trusted third party encrypts the resource access key VK by using the public key PK to obtain an encrypted key EK and uploads the encrypted key EK to the channel 2;
Encrypt(VK,PK)→EK
finally, the data receiver b obtains the encrypted key EK from the channel2, and decrypts the key EK by using a private key SK to obtain a resource access key VK;
Decrypt(EK,SK)→VK。
6. the block chain-based DATA controlled circulation method as claimed in claim 1, wherein the DATA receiver b performs decryption calculation to obtain circulation DATA plaintext DATA, and the verification process is as follows:
firstly, a data receiver b acquires a streaming data ciphertext DC from a data streaming transfer station and acquires a resource access key VK from a channel 2;
then, the DATA receiver b decrypts the streaming DATA ciphertext DC by using the resource access key VK in the DATA downloading area, so as to obtain a DATA sharing plaintext DATA;
the decryption process is as follows: judging whether the identity attribute A of the DATA receiver b is matched with the access control structure tree T or not, if so, successfully decrypting to obtain the plaintext DATA of the streaming DATA; otherwise, decryption cannot be performed;
finally, the data receiver b extracts the summary information H of the chain certificate1And calculating summary information H of the plaintext DATA of the streaming DATA1'; judging whether the summary information is consistent, if so, the data verification result is correct; otherwise, a warning of data tampering is sent out, so that the rapid consistency verification of the circulated data is realized.
CN202110564714.5A 2021-05-24 2021-05-24 Block chain-based data controlled circulation method Active CN113268753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110564714.5A CN113268753B (en) 2021-05-24 2021-05-24 Block chain-based data controlled circulation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110564714.5A CN113268753B (en) 2021-05-24 2021-05-24 Block chain-based data controlled circulation method

Publications (2)

Publication Number Publication Date
CN113268753A CN113268753A (en) 2021-08-17
CN113268753B true CN113268753B (en) 2022-05-27

Family

ID=77232454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110564714.5A Active CN113268753B (en) 2021-05-24 2021-05-24 Block chain-based data controlled circulation method

Country Status (1)

Country Link
CN (1) CN113268753B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499895B (en) * 2022-04-06 2022-07-29 国网浙江省电力有限公司电力科学研究院 Data trusted processing method and system fusing trusted computing and block chain
CN114826779B (en) * 2022-06-22 2022-09-02 军事科学院系统工程研究院网络信息研究所 Distributed multi-party data secure sharing method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450856A (en) * 2018-10-12 2019-03-08 西安电子科技大学 Data-link information flow control system and method based on block chain
WO2020082226A1 (en) * 2018-10-23 2020-04-30 Beijing DIDI Infinity Technology and Development Co., Ltd Method and system for transferring data in a blockchain system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685501B (en) * 2018-12-04 2023-04-07 暨南大学 Auditable privacy protection deep learning platform construction method based on block chain excitation mechanism

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450856A (en) * 2018-10-12 2019-03-08 西安电子科技大学 Data-link information flow control system and method based on block chain
WO2020082226A1 (en) * 2018-10-23 2020-04-30 Beijing DIDI Infinity Technology and Development Co., Ltd Method and system for transferring data in a blockchain system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁艳丽等.基于区块链的云存储加密数据共享方案.《计算机工程与应用》.(第17期), *

Also Published As

Publication number Publication date
CN113268753A (en) 2021-08-17

Similar Documents

Publication Publication Date Title
US9935772B1 (en) Methods and systems for operating secure digital management aware applications
CN106911513B (en) trusted device management method based on decentralized network
WO2019120092A1 (en) Intelligent contract-based data transfer method and system
CN112347470A (en) Power grid data protection method and system based on block chain and data security sandbox
CN113553574A (en) Internet of things trusted data management method based on block chain technology
CN113268753B (en) Block chain-based data controlled circulation method
CN111371790B (en) Data encryption sending method based on alliance chain, related method, device and system
CN109543443A (en) User data management, device, equipment and storage medium based on block chain
CN112487443A (en) Energy data fine-grained access control method based on block chain
CN113420319A (en) Data privacy protection method and system based on block chain and permission contract
Isirova et al. Decentralized public key infrastructure development principles
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN111008855A (en) Retroactive data access control method based on improved proxy re-encryption
Zhang et al. BCST-APTS: Blockchain and CP-ABE empowered data supervision, sharing, and privacy protection scheme for secure and trusted agricultural product traceability system
CN112651049B (en) Privacy data sharing method and system based on block chain
CN112073182B (en) Quantum key management method and system based on block chain
CN113326529A (en) Decentralized architecture unifying method based on trusted computing
CN112906032B (en) File secure transmission method, system and medium based on CP-ABE and block chain
US11646872B2 (en) Management of access authorization using an immutable ledger
CN114663234A (en) System and method for supervising abnormal transactions on block chain
CN114866244A (en) Controllable anonymous authentication method, system and device based on ciphertext block chaining encryption
CN113094743A (en) Power grid data storage method based on improved Byzantine consensus algorithm
CN113672655A (en) File collaborative checking method and device based on block chain
CN111651776A (en) Access control record storage method and device
CN116827653B (en) Data encryption and authorization management method based on Hyperledger Fabric alliance chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230421

Address after: 100195 01 / F, building 8, yuquanhuigu, No.3 minzhuang Road, Haidian District, Beijing

Patentee after: Jinrui Tongchuang (Beijing) Technology Co.,Ltd.

Address before: 100876 Beijing city Haidian District Xitucheng Road No. 10

Patentee before: Beijing University of Posts and Telecommunications

TR01 Transfer of patent right