CN113268763A - Block chain-based distributed private data storage method - Google Patents

Block chain-based distributed private data storage method Download PDF

Info

Publication number
CN113268763A
CN113268763A CN202011573938.4A CN202011573938A CN113268763A CN 113268763 A CN113268763 A CN 113268763A CN 202011573938 A CN202011573938 A CN 202011573938A CN 113268763 A CN113268763 A CN 113268763A
Authority
CN
China
Prior art keywords
data
private
calibration
client
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011573938.4A
Other languages
Chinese (zh)
Other versions
CN113268763B (en
Inventor
徐兵
林乐
兰春嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neng Lian Tech Ltd
Original Assignee
Neng Lian Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neng Lian Tech Ltd filed Critical Neng Lian Tech Ltd
Priority to CN202011573938.4A priority Critical patent/CN113268763B/en
Publication of CN113268763A publication Critical patent/CN113268763A/en
Application granted granted Critical
Publication of CN113268763B publication Critical patent/CN113268763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a block chain-based distributed private data storage method, which is applied to a block chain-based distributed private data storage system and comprises a client, a data integrity verification module, a data calibration module, a private database and a block chain module. And the user accesses the distributed private data storage system based on the block chain through the client and carries out integrity verification on the received data block through the data integrity verification module. The data calibration module is used for realizing the standardized calibration processing of the data, and the private database and the block chain module are used for realizing the safe storage and the quick query of the original data packet and the uplink data abstract information.

Description

Block chain-based distributed private data storage method
Technical Field
The invention relates to the field of block chain data storage, in particular to a distributed privacy data storage method based on a block chain.
Background
With the development of science and technology and the prosperity of the internet, people generate a large amount of data in daily life and work. With the advent of the big data age, data also plays an increasingly important role in the internet society. For enterprises, data is taken as core assets and effective competitiveness of the enterprises, and privacy and confidentiality are more and more valued; most of the existing private data storage systems are in a centralized storage mode, the security of data cannot be effectively guaranteed, and the query and access efficiency of the data is low under the condition of big data; the block chain technology is based on the distributed account book technology, so that the safety, the historical traceability and the non-tampering property of data can be ensured, and a distributed safe storage environment is provided for data storage; therefore, the method for storing the private data based on the block chain technology has important significance.
Disclosure of Invention
In view of the above, the present invention provides a block chain based distributed private data storage method that solves or partially solves the above-mentioned problems.
In order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: the distributed privacy data storage method based on the block chain comprises the following steps:
the distributed privacy data storage method based on the block chain is applied to a distributed privacy data storage system based on the block chain, and the distributed privacy data storage system based on the block chain comprises the following steps: the system comprises a client, a data integrity checking module, a data calibration module, a private database and a block chain module;
the client provides a human-computer interaction entrance for accessing the distributed privacy data storage system based on the block chain for a user; the user can upload the original privacy data to the block chain module and the private database through the client, and can also inquire the data in the block chain module and the private database through the client;
the data integrity checking module is used for verifying the integrity of a to-be-verified data packet formed by the received safety data block from the client;
the data calibration module carries out data standardization calibration processing on the original data packet according to different data types,
generating a calibration data keyword set, and generating a calibration data set after matching the calibration data keyword set with the original data packet;
the private database stores the original data packet through the created storage block, and realizes quick query and positioning of the original data packet through calibrating a data index number and an index outer chain;
the block chain module comprises a data uplink node, a data inquiry node and a private chain;
the storage process of the distributed privacy data storage system based on the block chain comprises the following steps:
step 1: a user realizes man-machine interaction with the distributed privacy data storage system based on the block chain through a client;
a user acquires the access right of a client in a single sign-on mode; the single sign-on refers to that a user can access authorized system resources after completing one-time identity authentication based on an identity joint authentication technology in a private and credible local area network system, wherein the authorized system resources comprise a client;
the specific method comprises the following steps: the identity joint authentication technology creates an identity joint authentication account for each user, and information of authorized system resources which can be accessed by the user and a safety identity joint certificate of the user are stored in the identity joint authentication account; when a user successfully logs in the private credible local area network system once, a server of the private credible local area network system issues a security identity joint certificate for the user, the security identity joint certificate is updated to an identity joint authentication account, when the user accesses other authorized system resources in the private credible local area network system, the user stored in the identity joint authentication account by the security identity joint certificate is shared and transmitted in the authorized system resources which can be accessed in the private credible local area network system, the identity verification of the user is completed through the existing security identity joint certificate in the identity joint authentication account without performing additional security identity verification operation, the unified management of the identity verification of the user is realized through the mode, and the security access authority of the user to a client is ensured;
step 2: the client comprises a private data uploading unit and a private data inquiring unit;
the private data uploading unit provides convenient and efficient private data uploading service for the user; the private data query unit provides a private data query service with intelligent matching for the user; the private data uploading unit provides the following for the user: a basic upload function, a batch upload function and an automatic upload function;
the user can manually and singly add the private data to be uploaded through the basic uploading function;
a user can add a plurality of private data to be uploaded with different data types at one time through a batch uploading function;
a user sets an automatic uploading rule through an automatic uploading function, and private data are automatically uploaded when the automatic uploading rule is met;
and step 3: the client encrypts the private data to be uploaded of the private data uploading unit by using a private key of the client, packages the private data into a security data packet, and transmits the security data packet to the data integrity verification module after passing through a dynamic security link established between the client and the data integrity verification module; the safety data packet has a unique data packet marking ID which is uniquely matched with the safety data packet; the dynamic security link plans a shortest dynamic security link for the security data packet according to the occupation condition of the real-time dynamic security link, so that the efficient transmission of the security data packet is ensured; the method comprises the steps that a safety data packet is divided into safety data blocks with consistent sizes in the transmission process of a dynamic safety link, each safety data block is allocated with a unique position tag, and the position tags are generated based on a data packet marking ID of the safety data packet and a logic sequence of the safety data blocks in the safety data packet; the position tag is uniquely matched with the safety data block;
and 4, step 4: the data integrity checking module receives the safety data blocks transmitted by the client, and splices the received safety data blocks according to the position label of each safety data block to generate a data packet to be verified; the data integrity checking module extracts the linear combination of the position labels of all the safety data blocks forming the data packet to be checked, then generates an aggregation label and sends the aggregation label to the client for integrity checking;
when the aggregation label does not pass the integrity check of the client, the client sends an integrity check failure signal to the data integrity check module; after receiving the integrity verification failure signal, the data integrity verification module discards a data packet to be verified and sends a private data uploading failure signal to the client;
when the aggregation label passes the integrity check of the client, the client sends an integrity check passing signal to the data integrity check module; after receiving the integrity verification passing signal, the data integrity verification module marks the data packet to be verified as an integral data packet, and then decrypts the integral data packet by using a public key of the client to generate an original data packet;
and 5: the data integrity checking module transmits the original data packet to the data calibration module, and the data calibration module carries out data standardized calibration processing on the original data packet according to different data types; the data calibration module maintains a data calibration mapping model, and the data calibration mapping model defines a mapping rule of data standardized calibration; the method comprises the steps that an original data packet is subjected to data standardization calibration processing to generate a calibration data set;
the method for the data standardization calibration processing comprises the following steps: firstly, iterative key information extraction is carried out on an original data packet in a random scale mode, after the iterative key information extraction, a key information set is formed by the obtained key information, then, each key information in the key information set is subjected to data calibration with a data calibration mapping model in sequence based on a binary search method, each key information corresponds to a calibration data keyword in the data calibration mapping model, and when all key information in the key information set completes the data calibration, a calibration data keyword set formed by all the calibration data keywords is output; matching the calibration data keyword set with the original data packet to generate a calibration data set;
step 6: the data calibration module sends the calibration data set to a private database, and the private database decomposes the calibration data set and extracts a calibration data keyword set and an original data packet; the private database allocates a unique storage block for the original data packet, wherein the storage block comprises an effective storage space, a unique index number of calibration data and an index outer chain; the effective storage space is used for storing the original data packet; the index number of the calibration data is the only mark of the storage block; the index outer chain is used for storing a calibration data keyword set; the storage block realizes the quick query and positioning of the original data packet by calibrating the data index number and the index outer chain;
and 7: the data uplink node of the block chain module monitors the change of a storage block of a private database, when the private database successfully creates a new storage block, a data uplink program of the data uplink node is triggered, and the data uplink program firstly generates uplink data abstract information according to an original data packet, a calibration data index number and an index external chain of the storage block; the uplink data abstract information comprises two parts of original data abstract information and index information; the original data abstract information is a hash value extracted by performing SHA256 algorithm on an original data packet; the index information consists of a calibration data index number and an index outer chain; the data uplink node signs the uplink data abstract information, adds a timestamp on the signed uplink data abstract information, sends the signed uplink data abstract information to a private chain of the block chain module, triggers a data uplink intelligent contract in the private chain, verifies the uplink data abstract information by the data uplink intelligent contract, and creates a new block to store the uplink data abstract information after the verification is passed;
and 8: when a user initiates a private data query request to a data query node of a block chain module through a private data query unit of a client, the data query node firstly carries out security verification on the private data query request, after the private data query request passes the verification, the data query node forwards the private data query request to a private chain of the block chain module, an intelligent contract for querying the private data in the private chain is triggered, and the intelligent contract for querying the private data decrypts the private data query request; searching the stored uplink data abstract information in the private chain, searching the uplink data abstract information matched with the private data query request, and encrypting the calibration data index number in the uplink data abstract information and returning the encrypted calibration data index number to the data query node when the matched uplink data abstract information is successfully searched; meanwhile, a private chain of the block chain module creates a new block record private data query request and uplink data summary information matched with the private data query request;
and step 9: after receiving the encrypted index number of the calibration data, the data query node initiates a specified data query request containing the index number of the calibration data to a private database; after the private database receives the specified data query request, the storage block corresponding to the calibration data index number is quickly positioned according to the calibration data index number in the specified data query request, and then the original data packet in the storage block is returned to the client for the user to browse.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example 1: the following description will exemplify an application scenario of the block chain-based distributed private data storage method as follows:
the distributed privacy data storage method based on the block chain is applied to a distributed privacy data storage system based on the block chain, and the distributed privacy data storage system based on the block chain comprises the following steps: the system comprises a client, a data integrity checking module, a data calibration module, a private database and a block chain module;
the client provides a human-computer interaction entrance for accessing the distributed privacy data storage system based on the block chain for a user; the user can upload the original privacy data to the block chain module and the private database through the client, and can also inquire the data in the block chain module and the private database through the client;
the data integrity checking module is used for verifying the integrity of a to-be-verified data packet formed by the received safety data block from the client;
the data calibration module carries out data standardization calibration processing on the original data packet according to different data types,
generating a calibration data keyword set, and generating a calibration data set after matching the calibration data keyword set with the original data packet;
the private database stores the original data packet through the created storage block, and realizes quick query and positioning of the original data packet through calibrating a data index number and an index outer chain;
the block chain module comprises a data uplink node, a data inquiry node and a private chain;
the storage process of the distributed privacy data storage system based on the block chain comprises the following steps:
step 1: a user realizes man-machine interaction with the distributed privacy data storage system based on the block chain through a client;
a user acquires the access right of a client in a single sign-on mode; the single sign-on refers to that a user can access authorized system resources after completing one-time identity authentication based on an identity joint authentication technology in a private and credible local area network system, wherein the authorized system resources comprise a client;
the specific method comprises the following steps: the identity joint authentication technology creates an identity joint authentication account for each user, and information of authorized system resources which can be accessed by the user and a safety identity joint certificate of the user are stored in the identity joint authentication account; when a user successfully logs in the private credible local area network system once, a server of the private credible local area network system issues a security identity joint certificate for the user, the security identity joint certificate is updated to an identity joint authentication account, when the user accesses other authorized system resources in the private credible local area network system, the user stored in the identity joint authentication account by the security identity joint certificate is shared and transmitted in the authorized system resources which can be accessed in the private credible local area network system, the identity verification of the user is completed through the existing security identity joint certificate in the identity joint authentication account without performing additional security identity verification operation, the unified management of the identity verification of the user is realized through the mode, and the security access authority of the user to a client is ensured;
step 2: the client comprises a private data uploading unit and a private data inquiring unit;
the private data uploading unit provides convenient and efficient private data uploading service for the user; the private data query unit provides a private data query service with intelligent matching for the user; the private data uploading unit provides the following for the user: a basic upload function, a batch upload function and an automatic upload function;
the user can manually and singly add the private data to be uploaded through the basic uploading function;
a user can add a plurality of private data to be uploaded with different data types at one time through a batch uploading function;
a user sets an automatic uploading rule through an automatic uploading function, and private data are automatically uploaded when the automatic uploading rule is met;
and step 3: the client encrypts the private data to be uploaded of the private data uploading unit by using a private key of the client, packages the private data into a security data packet, and transmits the security data packet to the data integrity verification module after passing through a dynamic security link established between the client and the data integrity verification module; the safety data packet has a unique data packet marking ID which is uniquely matched with the safety data packet; the dynamic security link plans a shortest dynamic security link for the security data packet according to the occupation condition of the real-time dynamic security link, so that the efficient transmission of the security data packet is ensured; the method comprises the steps that a safety data packet is divided into safety data blocks with consistent sizes in the transmission process of a dynamic safety link, each safety data block is allocated with a unique position tag, and the position tags are generated based on a data packet marking ID of the safety data packet and a logic sequence of the safety data blocks in the safety data packet; the position tag is uniquely matched with the safety data block;
and 4, step 4: the data integrity checking module receives the safety data blocks transmitted by the client, and splices the received safety data blocks according to the position label of each safety data block to generate a data packet to be verified; the data integrity checking module extracts the linear combination of the position labels of all the safety data blocks forming the data packet to be checked, then generates an aggregation label and sends the aggregation label to the client for integrity checking;
when the aggregation label does not pass the integrity check of the client, the client sends an integrity check failure signal to the data integrity check module; after receiving the integrity verification failure signal, the data integrity verification module discards a data packet to be verified and sends a private data uploading failure signal to the client;
when the aggregation label passes the integrity check of the client, the client sends an integrity check passing signal to the data integrity check module; after receiving the integrity verification passing signal, the data integrity verification module marks the data packet to be verified as an integral data packet, and then decrypts the integral data packet by using a public key of the client to generate an original data packet;
and 5: the data integrity checking module transmits the original data packet to the data calibration module, and the data calibration module carries out data standardized calibration processing on the original data packet according to different data types; the data calibration module maintains a data calibration mapping model, and the data calibration mapping model defines a mapping rule of data standardized calibration; the method comprises the steps that an original data packet is subjected to data standardization calibration processing to generate a calibration data set;
the method for the data standardization calibration processing comprises the following steps: firstly, iterative key information extraction is carried out on an original data packet in a random scale mode, after the iterative key information extraction, a key information set is formed by the obtained key information, then, each key information in the key information set is subjected to data calibration with a data calibration mapping model in sequence based on a binary search method, each key information corresponds to a calibration data keyword in the data calibration mapping model, and when all key information in the key information set completes the data calibration, a calibration data keyword set formed by all the calibration data keywords is output; matching the calibration data keyword set with the original data packet to generate a calibration data set;
step 6: the data calibration module sends the calibration data set to a private database, and the private database decomposes the calibration data set and extracts a calibration data keyword set and an original data packet; the private database allocates a unique storage block for the original data packet, wherein the storage block comprises an effective storage space, a unique index number of calibration data and an index outer chain; the effective storage space is used for storing the original data packet; the index number of the calibration data is the only mark of the storage block; the index outer chain is used for storing a calibration data keyword set; the storage block realizes the quick query and positioning of the original data packet by calibrating the data index number and the index outer chain;
and 7: the data uplink node of the block chain module monitors the change of a storage block of a private database, when the private database successfully creates a new storage block, a data uplink program of the data uplink node is triggered, and the data uplink program firstly generates uplink data abstract information according to an original data packet, a calibration data index number and an index external chain of the storage block; the uplink data abstract information comprises two parts of original data abstract information and index information; the original data abstract information is a hash value extracted by performing SHA256 algorithm on an original data packet; the index information consists of a calibration data index number and an index outer chain; the data uplink node signs the uplink data abstract information, adds a timestamp on the signed uplink data abstract information, sends the signed uplink data abstract information to a private chain of the block chain module, triggers a data uplink intelligent contract in the private chain, verifies the uplink data abstract information by the data uplink intelligent contract, and creates a new block to store the uplink data abstract information after the verification is passed;
and 8: when a user initiates a private data query request to a data query node of a block chain module through a private data query unit of a client, the data query node firstly carries out security verification on the private data query request, after the private data query request passes the verification, the data query node forwards the private data query request to a private chain of the block chain module, an intelligent contract for querying the private data in the private chain is triggered, and the intelligent contract for querying the private data decrypts the private data query request; searching the stored uplink data abstract information in the private chain, searching the uplink data abstract information matched with the private data query request, and encrypting the calibration data index number in the uplink data abstract information and returning the encrypted calibration data index number to the data query node when the matched uplink data abstract information is successfully searched; meanwhile, a private chain of the block chain module creates a new block record private data query request and uplink data summary information matched with the private data query request;
and step 9: after receiving the encrypted index number of the calibration data, the data query node initiates a specified data query request containing the index number of the calibration data to a private database; after receiving the specified data query request, the private database quickly positions a storage block corresponding to the calibration data index number according to the calibration data index number in the specified data query request, and then returns an original data packet in the storage block to the client for browsing by a user;
the beneficial results of the invention are as follows: the invention provides a block chain-based distributed private data storage method, which can be applied to a block chain-based distributed private data storage system and comprises a client, a data integrity verification module, a data calibration module, a private database and a block chain module; the client provides a human-computer interaction entrance for accessing the distributed privacy data storage system based on the block chain for a user; the data integrity checking module is used for verifying the integrity of the received data block from the client; the data calibration module carries out data standardization calibration processing on the original data packet according to different data types to generate a calibration data set; the private database stores the original data packet through the created storage block, and realizes quick query and positioning of the original data packet through calibrating a data index number and an index outer chain; the block chain module comprises a data uplink node, a data inquiry node and a private chain; the intelligent control of data storage and data query is realized through an intelligent contract; the safety, traceability and non-tamper property of data in the private chain are ensured;
the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.

Claims (1)

1. A distributed privacy data storage method based on a block chain is characterized by comprising the following contents:
the distributed privacy data storage method based on the block chain is applied to a distributed privacy data storage system based on the block chain, and the distributed privacy data storage system based on the block chain comprises the following steps: the system comprises a client, a data integrity checking module, a data calibration module, a private database and a block chain module;
the client provides a human-computer interaction entrance for accessing the block chain-based distributed privacy data storage system for a user; the user can upload original privacy data to the blockchain module and the private database through the client, and can also query data in the blockchain module and the private database through the client;
the data integrity checking module is used for verifying the integrity of a to-be-verified data packet formed by the received safety data block from the client;
the data calibration module carries out data standardization calibration processing on the original data packet according to different data types,
generating a calibration data keyword set, and generating a calibration data set after matching the calibration data keyword set with the original data packet;
the private database stores an original data packet through the created storage block, and realizes quick query and positioning of the original data packet through calibrating a data index number and an index external chain;
the block chain module comprises a data uplink node, a data query node and a private chain;
the storage process of the distributed privacy data storage system based on the block chain comprises the following steps:
step 1: the user realizes man-machine interaction with the distributed privacy data storage system based on the block chain through the client;
the user acquires the access right of the client in a single sign-on mode; the single sign-on refers to that the user can access authorized system resources after completing one-time identity authentication based on an identity joint authentication technology in a private and credible local area network system, wherein the authorized system resources comprise the client;
the specific method comprises the following steps: the identity joint authentication technology creates an identity joint authentication account for each user, wherein information of authorized system resources which can be accessed by the user and a safety identity joint certificate of the user are stored in the identity joint authentication account; when the user successfully logs in the private credible local area network system once, the server of the private credible local area network system issues the security identity joint certificate for the user, the security identity joint certificate is updated to the identity joint authentication account, when the user accesses other authorized system resources in the private credible local area network system, the security identity joint certificate shares and transmits authorized system resources which can be accessed by the user in the private credible local area network system and is stored in the identity joint authentication account, the identity authentication of the user is completed through the security identity joint certificate existing in the identity joint authentication account without performing additional security identity authentication operation, and the uniform management of the identity authentication of the user is realized through the mode, meanwhile, the safety access authority of the user to the client is ensured;
step 2: the client comprises a private data uploading unit and a private data inquiring unit;
the private data uploading unit provides convenient and efficient private data uploading service for the user; the private data query unit provides private data query service with intelligent matching for the user; the private data uploading unit provides the user with: a basic upload function, a batch upload function and an automatic upload function;
the user can manually and singly add the private data to be uploaded through the basic uploading function;
the user can add a plurality of private data to be uploaded with different data types at one time through the batch uploading function;
the user sets an automatic uploading rule through the automatic uploading function, and private data are automatically uploaded when the automatic uploading rule is met;
and step 3: the client encrypts the private data to be uploaded of the private data uploading unit by using a private key of the client, packages the private data into a secure data packet, and transmits the secure data packet to the data integrity verification module after passing through a dynamic secure link established between the client and the data integrity verification module; the security data packet has a unique data packet identification ID which is uniquely matched with the security data packet; the dynamic security link plans a shortest dynamic security link for the security data packet according to the occupation condition of the real-time dynamic security link, so that the efficient transmission of the security data packet is ensured; the security data packet is divided into security data blocks with consistent sizes in the transmission process of the dynamic security link, each security data block is allocated with a unique position tag, and the position tag is generated based on the data packet identification ID of the security data packet and the logic sequence of the security data block in the security data packet; the location tag uniquely matches the security data block;
and 4, step 4: the data integrity checking module receives the safety data blocks transmitted by the client, and splices the received safety data blocks according to the position label of each safety data block to generate a data packet to be verified; the data integrity checking module extracts the linear combination of the position labels of all the safety data blocks forming the data packet to be verified, then generates an aggregation label and sends the aggregation label to the client for integrity checking;
when the aggregation label does not pass the integrity check of the client, the client sends an integrity check failure signal to the data integrity check module; after receiving the integrity verification failure signal, the data integrity verification module discards the data packet to be verified and sends a private data uploading failure signal to the client;
when the aggregation tag passes the integrity check of the client, the client sends an integrity check passing signal to the data integrity check module; after receiving the integrity verification passing signal, the data integrity verification module marks the data packet to be verified as an integral data packet, and then decrypts the integral data packet by using the public key of the client to generate an original data packet;
and 5: the data integrity checking module transmits an original data packet to the data calibration module, and the data calibration module carries out data standardized calibration processing on the original data packet according to different data types; the data calibration module maintains a data calibration mapping model, and the data calibration mapping model defines a mapping rule of data standardized calibration; the original data packet is subjected to the data standardization calibration processing to generate a calibration data set;
the data normalization calibration processing method comprises the following steps: firstly, iterative key information extraction is carried out on the original data packet in a random scale mode, after the iterative key information extraction, a key information set is formed by the obtained key information, then, each key information in the key information set is subjected to data calibration with the data calibration mapping model in sequence based on a binary search method, each key information corresponds to one calibration data keyword in the data calibration mapping model, and when all key information in the key information set completes the data calibration, a calibration data keyword set formed by all the calibration data keywords is output; matching the calibration data keyword set with the original data packet to generate a calibration data set;
step 6: the data calibration module sends the calibration data set to the private database, and the private database decomposes the calibration data set and extracts the calibration data keyword set and the original data packet; the private database allocates a unique storage block for the original data packet, wherein the storage block comprises an effective storage space, a unique index number of calibration data and an index outer chain; the effective storage space is used for storing the original data packet; the index number of the calibration data is the only mark of the storage block; the index outer chain is used for storing the calibration data keyword set; the storage block realizes the quick query and positioning of the original data packet through the index number of the calibration data and the index outer chain;
and 7: a data uplink node of the block chain module monitors the change of a storage block of the private database, and when the private database successfully creates a new storage block, a data uplink program of the data uplink node is triggered, wherein the data uplink program firstly generates uplink data abstract information according to the original data packet, the calibration data index number and the index external chain of the storage block; the uplink data abstract information comprises two parts of original data abstract information and index information; the original data abstract information is a hash value extracted by performing SHA256 algorithm-based extraction on the original data packet; the index information consists of the index number of the calibration data and the index outer chain; the data uplink link node signs the uplink data abstract information, carries out timestamp stamping on the signed uplink data abstract information, sends the signed uplink data abstract information to a private chain of the block chain module, triggers a data uplink intelligent contract in the private chain, verifies the uplink data abstract information through the data uplink intelligent contract, and creates a new block to store the uplink data abstract information after verification;
and 8: when the user initiates a private data query request to the data query node of the blockchain module through a private data query unit of the client, the data query node firstly performs security verification on the private data query request, after the private data query request passes the verification, the data query node forwards the private data query request to a private chain of the blockchain module, and triggers a private data query intelligent contract in the private chain, and the private data query intelligent contract decrypts the private data query request; then, searching the stored uplink data summary information in the private chain, searching the uplink data summary information matched with the private data query request, and encrypting the index number of the calibration data in the uplink data summary information and returning the encrypted index number to the data query node when the matched uplink data summary information is successfully searched; meanwhile, a new block is created in a private chain of the block chain module to record the private data query request and the uplink data summary information matched with the private data query request;
and step 9: after receiving the encrypted calibration data index number, the data query node initiates a specified data query request containing the calibration data index number to the private database; and after receiving the specified data query request, the private database quickly locates a storage block corresponding to the calibration data index number according to the calibration data index number in the specified data query request, and then returns an original data packet in the storage block to the client for the user to browse.
CN202011573938.4A 2020-12-28 2020-12-28 Distributed privacy data storage method based on blockchain Active CN113268763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011573938.4A CN113268763B (en) 2020-12-28 2020-12-28 Distributed privacy data storage method based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011573938.4A CN113268763B (en) 2020-12-28 2020-12-28 Distributed privacy data storage method based on blockchain

Publications (2)

Publication Number Publication Date
CN113268763A true CN113268763A (en) 2021-08-17
CN113268763B CN113268763B (en) 2023-09-15

Family

ID=77227838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011573938.4A Active CN113268763B (en) 2020-12-28 2020-12-28 Distributed privacy data storage method based on blockchain

Country Status (1)

Country Link
CN (1) CN113268763B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114021172A (en) * 2021-11-10 2022-02-08 苏州同济区块链研究院有限公司 Multi-party joint security calculation method and device based on alliance chain
CN114969164A (en) * 2022-07-22 2022-08-30 华控清交信息科技(北京)有限公司 Data query method and device and readable storage medium
CN115277593A (en) * 2022-07-13 2022-11-01 葛莺燕 Method and system for safely storing data under link based on block chain
CN117076757A (en) * 2023-10-16 2023-11-17 校导帮(南京)科技创业有限公司 Knowledge service retrieval and management system based on large model
CN117195301A (en) * 2023-09-21 2023-12-08 北京中普达技术有限公司 Clinical data privacy management system based on blockchain
CN118018322A (en) * 2024-04-03 2024-05-10 湖南天河国云科技有限公司 Block chain privacy data processing method, device, computer equipment and medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN109450910A (en) * 2018-11-26 2019-03-08 远光软件股份有限公司 Data sharing method, data sharing network and electronic equipment based on block chain
CN109492351A (en) * 2018-11-23 2019-03-19 北京奇眸科技有限公司 Copy-right protection method, device and readable storage medium storing program for executing based on block chain
CN109525671A (en) * 2018-11-26 2019-03-26 远光软件股份有限公司 Date storage method, electronic equipment and storage medium based on block chain
CN109753815A (en) * 2018-11-26 2019-05-14 远光软件股份有限公司 Data processing method, data processing network and electronic equipment based on block chain
CN110113244A (en) * 2018-02-09 2019-08-09 中企云链(北京)金融信息服务有限公司 A kind of instant communicating system and method based on block chain technology
CN110287262A (en) * 2019-06-28 2019-09-27 中国科学技术大学 The bit coin Transaction Inquiries method of effective protection privacy of user
US20200007344A1 (en) * 2018-06-28 2020-01-02 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
CN110750492A (en) * 2019-09-02 2020-02-04 深圳晶泰科技有限公司 Block chain-based drug crystal library and construction method thereof
CN111883111A (en) * 2020-07-30 2020-11-03 平安国际智慧城市科技股份有限公司 Dialect training processing method and device, computer equipment and readable storage medium
US20200349194A1 (en) * 2019-05-02 2020-11-05 International Business Machines Corporation Index management for a database

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN110113244A (en) * 2018-02-09 2019-08-09 中企云链(北京)金融信息服务有限公司 A kind of instant communicating system and method based on block chain technology
US20200007344A1 (en) * 2018-06-28 2020-01-02 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
CN109492351A (en) * 2018-11-23 2019-03-19 北京奇眸科技有限公司 Copy-right protection method, device and readable storage medium storing program for executing based on block chain
CN109450910A (en) * 2018-11-26 2019-03-08 远光软件股份有限公司 Data sharing method, data sharing network and electronic equipment based on block chain
CN109525671A (en) * 2018-11-26 2019-03-26 远光软件股份有限公司 Date storage method, electronic equipment and storage medium based on block chain
CN109753815A (en) * 2018-11-26 2019-05-14 远光软件股份有限公司 Data processing method, data processing network and electronic equipment based on block chain
US20200349194A1 (en) * 2019-05-02 2020-11-05 International Business Machines Corporation Index management for a database
CN110287262A (en) * 2019-06-28 2019-09-27 中国科学技术大学 The bit coin Transaction Inquiries method of effective protection privacy of user
CN110750492A (en) * 2019-09-02 2020-02-04 深圳晶泰科技有限公司 Block chain-based drug crystal library and construction method thereof
CN111883111A (en) * 2020-07-30 2020-11-03 平安国际智慧城市科技股份有限公司 Dialect training processing method and device, computer equipment and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
尤瑶;孔兰菊;肖宗水;郑永清;李庆忠;: "一种支持区块链交易溯源的混合索引机制", 计算机集成制造系统, no. 04, pages 192 - 198 *
王洁;魏生;戴科冕;: "基于区块链的科技金融大数据开放共享体系研究", 现代计算机(专业版), no. 22, pages 54 - 60 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114021172A (en) * 2021-11-10 2022-02-08 苏州同济区块链研究院有限公司 Multi-party joint security calculation method and device based on alliance chain
CN115277593A (en) * 2022-07-13 2022-11-01 葛莺燕 Method and system for safely storing data under link based on block chain
CN115277593B (en) * 2022-07-13 2024-05-31 上海企源科技股份有限公司 Method and system for safely storing under-chain data based on blockchain
CN114969164A (en) * 2022-07-22 2022-08-30 华控清交信息科技(北京)有限公司 Data query method and device and readable storage medium
CN117195301A (en) * 2023-09-21 2023-12-08 北京中普达技术有限公司 Clinical data privacy management system based on blockchain
CN117076757A (en) * 2023-10-16 2023-11-17 校导帮(南京)科技创业有限公司 Knowledge service retrieval and management system based on large model
CN117076757B (en) * 2023-10-16 2024-01-23 校导帮(南京)科技创业有限公司 Knowledge service retrieval and management system based on large model
CN118018322A (en) * 2024-04-03 2024-05-10 湖南天河国云科技有限公司 Block chain privacy data processing method, device, computer equipment and medium

Also Published As

Publication number Publication date
CN113268763B (en) 2023-09-15

Similar Documents

Publication Publication Date Title
CN113268763A (en) Block chain-based distributed private data storage method
JP6923239B2 (en) How to Securely Serialize Product Units in the Supply Chain
CN108846010B (en) Method, system, computer system and storage medium for tracing product source in network
CN110969447B (en) Product depth traceability system based on block chain technology
CN108564182B (en) Equipment full life cycle management system and method based on block chain technology
CN107925660B (en) Data access and ownership management
US10459990B1 (en) Data processing method and device, medium and terminal thereof
US9219722B2 (en) Unclonable ID based chip-to-chip communication
WO2021003977A1 (en) Default information query method and apparatus, and computer device and storage medium
CN108520293A (en) A kind of product false proof source tracing method, device, server and storage medium
CN108512854B (en) System information safety monitoring method and device, computer equipment and storage medium
CN103413227A (en) Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN105139210A (en) Commodity traceability method and system
WO2019161774A1 (en) Methods, application server, block chain node and media for logistics tracking and source tracing
US10389693B2 (en) Keys for encrypted disk partitions
CN112202715A (en) System, method and device for credible interaction between Internet of things and block chain
CN112307515B (en) Database-based data processing method and device, electronic equipment and medium
CN107194273A (en) Can continuous-query data desensitization method and system
CN112541009A (en) Data query method and device, electronic equipment and storage medium
CN112698820B (en) Unified monitoring management method and device for memory and switch and computer equipment
US20150379524A1 (en) Method and system for authenticating physical items
CN110191129B (en) Content naming authentication system in information center network
US20210182518A1 (en) Product anti-counterfeiting method and system based on material signature blockchain
CN116527401B (en) Secure communication method and system of distributed data server
CN105760532A (en) Resource sharing system based on Web Service and resource sharing method based on Web Service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200120 building C3, No. 101 Eshan Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Lingshuzhonghe Information Technology Co.,Ltd.

Address before: C3, 101 Eshan Road, Pudong New Area, Shanghai, 200120

Applicant before: NENG LIAN TECH. LTD.

GR01 Patent grant
GR01 Patent grant