CN113505398A - Method, system, electronic device and storage medium for safely sharing industrial big data - Google Patents

Method, system, electronic device and storage medium for safely sharing industrial big data Download PDF

Info

Publication number
CN113505398A
CN113505398A CN202111055639.6A CN202111055639A CN113505398A CN 113505398 A CN113505398 A CN 113505398A CN 202111055639 A CN202111055639 A CN 202111055639A CN 113505398 A CN113505398 A CN 113505398A
Authority
CN
China
Prior art keywords
industrial
data
enterprise
information
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111055639.6A
Other languages
Chinese (zh)
Inventor
胡殿凯
程东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Firestone Technology Co ltd
Original Assignee
Hangzhou Firestone Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Firestone Technology Co ltd filed Critical Hangzhou Firestone Technology Co ltd
Priority to CN202111055639.6A priority Critical patent/CN113505398A/en
Publication of CN113505398A publication Critical patent/CN113505398A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a method, a system, an electronic device and a storage medium for industrial big data secure sharing, wherein the method comprises the following steps: obtaining industrial data, calculating by an enterprise through a Hash algorithm to obtain an industrial data Hash value, encrypting the industrial data through a public key of a government organization to obtain an industrial data ciphertext, carrying out private key signature on the industrial data ciphertext and the industrial data Hash value, calling a data chaining contract to generate industrial information record and storing the industrial information record into a block chain; then, a government organization acquires an industrial information record through a data acquisition contract, decrypts through a public and private key pair to acquire industrial data in the industrial information record, and verifies the authenticity and integrity of the decrypted industrial data through a Hash algorithm; and finally, the government organization performs data analysis on the decrypted industrial data through a big data analysis contract to obtain an industrial analysis result, and generates an industrial information use record and a chain storage certificate through a data chain contract. The method is beneficial to the government to accurately arrange and plan various enterprises.

Description

Method, system, electronic device and storage medium for safely sharing industrial big data
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, a system, an electronic device, and a storage medium for secure sharing of industrial big data.
Background
Under the background of the information age, the big data industry has become a strong driving force for the development of each enterprise, and governments generally need to refer to the analysis results of the big data of the industry when carrying out industry planning and industry guidance. Currently, each enterprise stores industrial data in a third-party server through a third-party industrial big data company, then a government organization calls related data from the third-party server, and then a big data analysis technology is utilized to obtain a related industry development conclusion, so that reasonable industry planning and industry guidance are realized. Specifically, the industry data of the related enterprises can be analyzed through a big data analysis technology to draw a conclusion of the related data which is beneficial to industry planning. However, since the industrial big data generally includes the private information of the enterprise, the privacy, the security and the traceability of the private information of the enterprise need to be ensured while the industrial big data is shared.
In the related art, a plurality of potential safety hazards exist, on one hand, since industrial big data are provided to the government by a third party organization, the government is difficult to determine the authenticity of the data source, and the situation that the industrial big data are fake may exist, so that various dispute events which are difficult to pursue are easily caused. On the other hand, industrial big data is stored in a third-party company server, and the condition that enterprise private data is leaked easily occurs while data is shared, so that potential safety hazards exist. In addition, a single server stores industrial big data, the authenticity of the data is mastered by a few high-authority users, the hidden danger of tampering exists, and unnecessary industrial data disputes are easily caused. Furthermore, enterprises are difficult to trace and inquire the use condition of the industrial big data, and can not trace and ask for responsibility for the illegal use of the industrial data.
At present, in the related art, an effective solution is not provided for the problem that the government cannot accurately layout and plan the enterprise due to the fact that the industrial data source is difficult to judge, the private data is easy to leak, the industrial data can be tampered, and the data application is difficult to trace the source when the enterprise shares industrial big data with the government.
Disclosure of Invention
The embodiment of the application provides a method, a system, an electronic device and a storage medium for safely sharing industrial big data, so as to solve at least the problem that in the related technology, when an enterprise shares industrial big data with a government, the government cannot accurately lay out and plan the enterprise due to the fact that the industrial data source is difficult to judge, private data is easy to leak, industrial data can be tampered, data application is difficult to trace and the like.
In a first aspect, an embodiment of the present application provides a method for securely sharing industrial big data, where the method includes:
the method comprises the steps that industrial data are obtained, an enterprise calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, encrypts the industrial data through a public key of a government organization to obtain an industrial data ciphertext, carries out private key signature on the industrial data ciphertext and the industrial data Hash value, calls a data chaining contract to generate an industrial information record and stores the industrial information record into a block chain, wherein the industrial information record comprises an enterprise name, an enterprise public key, the industrial data ciphertext, the industrial data Hash value and private key signature data;
a government agency acquires the industrial information records of the enterprise through a data acquisition contract, decrypts through a public and private key pair to acquire industrial data in the industrial information records, and verifies the authenticity and integrity of the decrypted industrial data through a Hash algorithm;
and the government agency carries out data analysis on the industrial data obtained by decryption through a big data analysis contract to obtain an industrial analysis result, and generates an industrial information use record and an industrial storage certificate through the data chaining contract, wherein the industrial information use record comprises the enterprise name, the enterprise public key, the industrial data Hash value, an industrial planning project and an industrial analysis result Hash value.
In some of these embodiments, the industry data includes business name, business type, financing, extent of operation, number of insured persons, intellectual property, dominant technology, capital alteration, equity control, annual income;
the big data analysis contract refers to a big data analysis algorithm realized through an intelligent contract code, and the use rule of a government agency on industrial big data is standardized by deploying an unchangeable big data analysis contract to each block chain node; the industrial analysis result refers to the conclusion of various enterprise layouts, key enterprise fund subsidies, core enterprise introduction and industrial development suggestions of the government on the industrial park.
In some of these embodiments, prior to obtaining the industry data, the method includes:
the enterprise stores the enterprise audit information in the block chain through the data chaining contract, and submits an application for joining the block chain network to a block chain network audit mechanism;
and the block chain network auditing mechanism acquires the enterprise auditing information through the data acquisition contract, performs qualification audit on the enterprise according to the enterprise auditing information, deploys block chain nodes for the enterprise which passes the audit, and sends auditing failure information to the enterprise if the audit is not passed.
In some embodiments, the enterprise audit information includes an enterprise certification information ciphertext, an enterprise certification information Hash value, and an audit information private key signature;
the enterprise certification information comprises a company name, an enterprise type, registered capital, an industrial and commercial registered number, a unified social credit code, a registration organ, a business term and an organization code; the enterprise certification information ciphertext refers to ciphertext information obtained by encrypting the enterprise certification information by adopting a public key of an auditing agency; the enterprise certification information Hash value refers to a Hash value obtained by encrypting the enterprise certification information by adopting a Hash algorithm; the signature of the private key of the audit information refers to signature data obtained by signing the cipher text of the enterprise certification information and the Hash value of the enterprise certification information by an enterprise private key.
In some embodiments, the verifying the authenticity and integrity of the decrypted industrial data includes:
verifying the private key signature data in the industrial information record through an enterprise public key, and judging the authenticity of the industrial data cipher text and the industrial data Hash value source;
and decrypting the industrial data ciphertext through a private key of a government agency to obtain an industrial data plaintext, and verifying the integrity and authenticity of the industrial data obtained through decryption through the industrial data Hash value.
In some embodiments, the verifying the integrity and authenticity of the industry data by the industry data Hash value includes:
and carrying out Hash operation on the industry data plaintext through a Hash algorithm to obtain a new Hash value, and comparing the new Hash value with the industry data Hash value stored in the block chain to judge whether the industry data ciphertext is changed or not so as to verify the integrity and the authenticity of the industry data.
In some embodiments, after the generating the industrial information usage record and the chain deposit by the data chaining contract, the method comprises:
and the enterprise can perform traceability query on the industrial information use record through a traceability contract according to the enterprise name and the industrial data Hash value.
In a second aspect, an embodiment of the present application provides a system for secure sharing of industrial big data, where the system includes:
the system comprises an encryption module, a data transmission module and a data transmission module, wherein the encryption module is used for acquiring industrial data, an enterprise calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, encrypts the industrial data through a public key of a government organization to obtain an industrial data cipher text, performs private key signature on the industrial data cipher text and the industrial data Hash value, calls a data chaining contract to generate an industrial information record and stores the industrial information record into a block chain, and the industrial information record comprises an enterprise name, an enterprise public key, the industrial data cipher text, the industrial data Hash value and private key signature data;
the verification module is used for acquiring the industrial information records of the enterprises through a data acquisition contract by a government agency, decrypting through a public and private key pair to obtain the industrial data in the industrial information records, and verifying the authenticity and the integrity of the decrypted industrial data through a Hash algorithm;
and the analysis recording module is used for the government agency to perform data analysis on the industrial data obtained by decryption through a big data analysis contract to obtain an industrial analysis result, and to generate the industrial information use record and chain storage certificate through the data chain linking contract, wherein the industrial information use record comprises the enterprise name, the enterprise public key, the industrial data Hash value, an industrial planning project and an industrial analysis result Hash value.
In some embodiments, the system further comprises an application review module that, prior to obtaining the industry data,
the application auditing module is used for storing enterprise auditing information in the block chain by the enterprise through the data chaining contract and submitting an application for joining the block chain network to a block chain network auditing mechanism,
and the block chain network auditing mechanism acquires the enterprise auditing information through the data acquisition contract, performs qualification audit on the enterprise according to the enterprise auditing information, deploys block chain nodes for the enterprise which passes the audit, and sends auditing failure information to the enterprise if the audit is not passed.
In some embodiments, the system further comprises a source query module for, after generating the industrial information usage record and uploading the chain certificate through the data chaining contract,
and the source tracing query module is used for the enterprise to perform source tracing query on the industrial information use record through a source tracing contract according to the enterprise name and the industrial data Hash value.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the processor implements the method for securely sharing industrial big data according to the first aspect.
In a fourth aspect, the present application provides a storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for secure sharing of industrial big data as described in the first aspect.
Compared with the related technology, the method for safely sharing the industrial big data, provided by the embodiment of the application, comprises the steps of obtaining industrial data, calculating the industrial data through a Hash algorithm by an enterprise to obtain an industrial data Hash value, encrypting the industrial data through a public key of a government agency to obtain an industrial data ciphertext, carrying out private key signature on the industrial data ciphertext and the industrial data Hash value, calling a data chaining contract to generate an industrial information record and storing the industrial information record into a block chain; then, a government organization acquires an industrial information record of an enterprise through a data acquisition contract, decrypts the industrial information record through a public and private key pair to obtain industrial data in the industrial information record, and verifies the authenticity and integrity of the decrypted industrial data through a Hash algorithm; and finally, the government organization performs data analysis on the industrial data obtained by decryption through a big data analysis contract to obtain an industrial analysis result, and generates an industrial information use record and a chain storage certificate through a data chain contract, wherein the industrial information use record comprises an enterprise name, an enterprise public key, an industrial data Hash value, an industrial planning project and an industrial analysis result Hash value.
The beneficial effects of this application are:
(1) the enterprise signs the industrial data by using the unique private key bound with the identity, so that the authenticity and the accuracy of the industrial data source are effectively ensured, the effect of tracing the source of the industrial data is achieved, and the problem that the industrial data source is difficult to judge is solved;
(2) when the enterprises share the industrial data, the private data in the industrial data is encrypted by adopting a public key of a government department, so that the private data in the industrial data is only disclosed to the government department, the privacy and the safety of the industrial data are ensured, and the problem that the industrial private data is easy to leak is solved;
(3) according to the method and the device, collective maintenance of the industrial data is realized through a block chain technology, and the industrial data is stored in a decentralized mode, so that modification of industrial data by high-authority users is avoided, and the industrial data is guaranteed to be not falsified and verifiable by combining technologies such as a Hash algorithm, and the problems of falsification and multi-version of the industrial data are effectively solved;
(4) based on the characteristic that a block chain cannot be tampered, comprehensive recording of links such as chaining, using and tracing of industrial big data is achieved by means of an intelligent contract technology, the fact that government agencies reasonably use the industrial big data is guaranteed, meanwhile, the using process of the industrial big data is recorded in detail, tracing and searching of the industrial big data is achieved, the behavior that the industrial data are illegally used is avoided, and the problem that the industrial big data are difficult to apply and trace is solved;
the data security and the privacy security of the industrial data in the sharing process are effectively improved, and the accurate corresponding layout and planning of various enterprises by the government are facilitated.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow diagram of a method of secure sharing of industrial big data according to an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a process of an enterprise network access application according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating an industrial data verification process according to an embodiment of the present application;
FIG. 4 is a schematic diagram illustrating an industrial data tracing process according to an embodiment of the present application;
FIG. 5 is a block diagram of a system for secure sharing of industrial big data according to an embodiment of the present application;
fig. 6 is an internal structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
An embodiment of the present application provides a method for securely sharing industrial big data, and fig. 1 is a flowchart of the method for securely sharing industrial big data according to the embodiment of the present application, and as shown in fig. 1, the flowchart includes the following steps:
step S101, industrial data are obtained, an enterprise calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, the industrial data are encrypted through a public key of a government organization to obtain an industrial data ciphertext, the industrial data ciphertext and the industrial data Hash value are subjected to private key signature, a data chaining contract is called to generate an industrial information record, and the industrial information record is stored in a block chain;
wherein, the industrial data comprises enterprise names, enterprise types, financing conditions, operating ranges, number of insured persons, intellectual property rights, dominant technologies, capital changes, stock control enterprises and annual income; the industrial information record comprises a company name, a company public key, an industrial data ciphertext, an industrial data Hash value and private key signature data; the data chaining contract refers to a contract for storing industrial information records, enterprise certification information, industrial information use records and other data chaining certificates;
fig. 2 is a schematic diagram of an enterprise network access application process according to an embodiment of the present application, as shown in fig. 2, before acquiring industrial data, an enterprise needs to store enterprise audit information in a block chain through a data chaining contract, and lift an application for joining a block chain network to a block chain network audit organization, where the enterprise audit information includes related enterprises in various industries that provide industrial data for governments, and includes an enterprise audit information cipher text, an enterprise attestation Hash value, and an audit information private key signature, where the enterprise audit information includes related information such as a company name, an enterprise type, registered capital, an industrial and commercial registration number, a unified social credit code, a registration organization, an expiration date, and an organization code.
Specifically, the calculation formula of the correlation data is shown in the following formulas 1 to 3:
enterprise certification information Hash value = Hash (enterprise certification information) (1)
Enterprise certification information cipher text = Gpuk (enterprise certification information) (2)
Private key signature of audit information = Eprk (Hash value of enterprise certification information, cipher text of enterprise certification information) (3)
Wherein, Hash () represents a Hash algorithm calculation function, Gpuk () represents a government public key encryption function, and Eprk () represents an enterprise private key signature function.
And then, the block chain network auditing mechanism acquires enterprise auditing information through a data acquisition contract, and performs qualification audit on the enterprise according to the enterprise auditing information, specifically, the block chain network auditing mechanism performs audit on related information such as business situation of the enterprise, so as to judge whether the enterprise has qualification for joining the block chain network. If the audit is passed, deploying the block chain nodes for the enterprise which passes the audit, and if the audit is not passed, sending audit failure information to the enterprise.
It should be noted that the data acquisition contract refers to an intelligent contract for acquiring related data on a chain; the block chain network audit organization refers to a node adding audit organization consisting of related organizations such as government departments and the like, and is responsible for the distribution and deployment of the block chain nodes; the asymmetric public and private key pair refers to a public key and a private key bound with identities of power organizations such as enterprises and the like, wherein the public key is public, the private key is secret, only the corresponding private key can decrypt data encrypted by the public key, the encrypted data can be effectively guaranteed to be only visible to a specified user, meanwhile, only the corresponding public key can verify data signed by the private key, and the accuracy of a data source can also be effectively verified.
Further, after the enterprise passes the audit, the embodiment obtains industrial data of the enterprise, calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, encrypts private data in the industrial data through a public key of a government agency to obtain an industrial data cipher text, and makes relevant private data visible only to the government agency so as to ensure privacy and security of the private data in the industrial data, and then performs private key signature on the obtained industrial data cipher text and the industrial data Hash value, and invokes a data chaining contract through a node to generate an industrial information record and store the industrial information record into a block chain, wherein the industrial information record includes an enterprise name, an enterprise public key, an industrial data cipher text, an industrial data Hash value, private key signature data and the like. Specifically, the calculation formula of the correlation data is shown in the following formulas 4 to 6:
industrial data Hash value = Hash (industrial data) (4)
Industrial data cipher text = Gpuk (industrial data) (5)
Private key signature = Eprk (industry data Hash value, industry data cipher text) (6)
Wherein, Hash () represents a Hash algorithm calculation function, Gpuk () represents a government public key encryption function, and Eprk () represents an enterprise private key signature function.
It should be noted that the aforementioned industrial data includes related information such as enterprise name, enterprise type, financing condition, operation scope, number of insured persons, intellectual property, dominant technology, capital alteration, stock control enterprise, annual income, etc.;
step S102, a government organization acquires industrial information records of an enterprise through a data acquisition contract, decrypts the industrial information records through a public and private key pair to acquire industrial data in the industrial information records, and verifies the authenticity and integrity of the decrypted industrial data through a Hash algorithm;
fig. 3 is a schematic diagram of an industrial data verification process according to an embodiment of the present application, as shown in fig. 3. Preferably, the government organization acquires the industrial information record of the enterprise through the data acquisition contract, verifies the private key signature data in the industrial information record through the enterprise public key, judges the authenticity of the industrial data cipher text and the industrial data Hash value source, obtains an authenticity result, ensures that the industrial data are provided by the enterprise, and avoids the fake condition of the industrial data. Specifically, the calculation formula is shown in the following formula 7:
authenticity result = Epuk (industrial data Hash value, industrial data cipher text, private key signature data) (7)
Where Epuk () refers to an enterprise public key verification function.
Next, the government agency decrypts the industrial data ciphertext obtained in step S101 by using a private key of the government agency to obtain an industrial data plaintext, so as to ensure that the industrial private data is only visible to the government agency, and specifically, the calculation formula is as shown in the following formula 8:
industry data plaintext = Gprk (industry data ciphertext) (8)
Where Gprk () refers to a government private key decryption function.
Further, the integrity and authenticity of the industrial data obtained by decryption are verified through the industrial data Hash value, specifically, in this embodiment, the Hash algorithm is used to perform Hash operation on the industrial data plaintext to obtain a new Hash value, and the new Hash value is compared with the industrial data Hash value stored on the block chain in step S101 to determine whether the industrial data ciphertext is modified, so as to ensure the authenticity, integrity and non-tamper-resistance of the industrial data on the chain.
It should be noted that, in the process of verifying the authenticity and integrity of the industrial data, if there is a verification failure, the failure result is fed back to the enterprise user, otherwise, if the verification is successful, the industrial data is true and correct, and the government organization can plan and layout the enterprise through the industrial data;
and step S103, carrying out data analysis on the decrypted industrial data by the government agency through a big data analysis contract to obtain an industrial analysis result, and generating an industrial information use record and a chain storage certificate through a data chain contract, wherein the industrial information use record comprises an enterprise name, an enterprise public key, an industrial data Hash value, an industrial planning project and an industrial analysis result Hash value. It should be noted that the big data analysis contract refers to a big data analysis algorithm implemented by intelligent contract codes, and the use rules of the government organization for the industry big data are standardized by deploying the unchangeable big data analysis contract to each block chain node.
In this embodiment, the government agency performs data analysis on the industrial data obtained by decryption through a big data analysis contract to obtain an industrial analysis result, so as to ensure legal use of the industrial big data. The industry big data refers to relevant industry data consisting of industry data of a certain industry and a plurality of enterprises; the industrial analysis result refers to the information that various enterprise layouts, key enterprise fund subsidies, core enterprise introduction, industrial development suggestions and the like are carried out on certain parks by governments through analyzing industrial big data by a big data analysis algorithm;
then, an industrial information usage record is generated and a chain deposit certificate is linked through a data chain contract. The industrial information usage record includes an enterprise name, an enterprise public key, an industrial data Hash value, an industrial planning item, an industrial analysis result Hash value, and the like. The industry planning project refers to a planning project corresponding to the current industry data analysis, for example: industrial planning projects such as garden industry distribution planning, garden project introduction planning, major enterprise government fund subsidy and the like which need industrial data analysis; the Hash value of the industrial analysis result refers to a Hash value obtained by performing Hash operation on the industrial data analysis result through a Hash algorithm, and a specific formula is shown as the following formula 9:
industrial analysis result Hash value = Hash (industrial analysis result) (9)
Preferably, after the industrial information usage record is generated and chain stored through the data chaining contract, the enterprise may perform a traceability query on the industrial information usage record through the traceability contract according to the enterprise name and the industrial data Hash value. Fig. 4 is a schematic diagram of an industrial data tracing process according to an embodiment of the present application, and as shown in fig. 4, in this embodiment, a usage record of industrial data is accurately stored by using a characteristic that a block chain is not tampered, so as to provide a reliable and accurate usage condition of industrial data for an enterprise, implement tracing and checking of industrial data usage, and avoid illegal usage of industrial data.
The embodiment analyzes and processes the industrial data through the big data analysis contract to obtain an industrial analysis result, and is beneficial to accurate planning and layout of the government on the enterprises.
Through the steps S101 to S103, the embodiment of the present application solves the problem that the government cannot perform accurate layout and planning on the enterprise due to the fact that the source of industrial data is difficult to determine, private data is easy to leak, industrial data is falsifiable, and data application is difficult to trace when the enterprise shares industrial big data with the government through the technologies of block-and-chain combination asymmetric encryption, hash algorithm, intelligent contract, and the like, thereby effectively ensuring the authenticity and accuracy of the industrial data source, ensuring the privacy, security, falsification and verifiability of the industrial data, realizing tracing and checking of the industrial big data, effectively improving the data security and privacy security of the industrial data in the sharing process, and facilitating the government to perform corresponding accurate layout and planning on various enterprises.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here.
The embodiment also provides a system for safely sharing industrial big data, which is used for implementing the above embodiments and preferred embodiments, and the description of the system that has been already made is omitted. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 5 is a block diagram of a system for secure sharing of industrial big data according to an embodiment of the present application, and as shown in fig. 5, the system includes an encryption module 51, a verification module 52, and an analysis recording module 53:
the encryption module 51 is used for acquiring industrial data, an enterprise calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, encrypts the industrial data through a public key of a government organization to obtain an industrial data cipher text, performs private key signature on the industrial data cipher text and the industrial data Hash value, calls a data chaining contract to generate an industrial information record and stores the industrial information record into a block chain, wherein the industrial information record comprises an enterprise name, an enterprise public key, an industrial data cipher text, an industrial data Hash value and private key signature data; the verification module 52 is used for acquiring the industrial information records of the enterprises by the data acquisition contracts of government agencies, decrypting the industrial data in the industrial information records by public and private key pairs to obtain the industrial data, and verifying the authenticity and the integrity of the industrial data obtained by decryption by a hash algorithm; and the analysis recording module 53 is configured to perform data analysis on the decrypted industrial data through a big data analysis contract by the government agency to obtain an industrial analysis result, and generate a usage record of industrial information and link a chain storage certificate through a data chain contract, where the usage record of industrial information includes an enterprise name, an enterprise public key, an industrial data Hash value, an industrial planning project, and an industrial analysis result Hash value.
Through the system, the embodiment of the application solves the problem that the government cannot accurately arrange and plan the enterprise due to the fact that the conditions that the industrial data source is difficult to judge, private data is easy to leak, industrial data can be tampered, data application is difficult to trace when the enterprise shares industrial big data with the government through the technologies of block-and-chain combination asymmetric encryption, Hash algorithm, intelligent contracts and the like, effectively guarantees authenticity and accuracy of the industrial data source, guarantees privacy, safety, non-tampering and verifiability of the industrial data, and achieves traceability of the industrial big data. The data security and the privacy security of the industrial data in the sharing process are effectively improved, and the accurate corresponding layout and planning of various enterprises by the government are facilitated.
In some embodiments, the system further comprises an application review module that, prior to obtaining the industry data,
an enterprise needs to store enterprise audit information in a block chain through a data uplink contract, and submits an application for joining a block chain network to a block chain network audit organization, wherein the enterprise mentioned above includes related enterprises in various industries providing industrial data for governments, the enterprise audit information includes enterprise attestation information cipher text, enterprise attestation information Hash value, and audit information private key signature, and the enterprise audit information includes related information such as company name, enterprise type, registered capital, industrial and commercial registration number, unified social credit code, registration authority, business deadline, and organization code. Specifically, the correlation data calculation formula is shown in formulas 1 to 3;
and then, the block chain network auditing mechanism acquires enterprise auditing information through a data acquisition contract, and performs qualification audit on the enterprise according to the enterprise auditing information, specifically, the block chain network auditing mechanism performs audit on related information such as business situation of the enterprise, so as to judge whether the enterprise has qualification for joining the block chain network. If the audit is passed, deploying the block chain nodes for the enterprise which passes the audit, and if the audit is not passed, sending audit failure information to the enterprise. It should be noted that, the block chain network auditing mechanism refers to a node joining auditing mechanism composed of relevant mechanisms such as government departments and the like, and is responsible for allocation and deployment of the block chain nodes; the asymmetric public and private key pair refers to a public key and a private key bound with identities of power organizations such as enterprises and the like, wherein the public key is public, the private key is secret, only the corresponding private key can decrypt data encrypted by the public key, the encrypted data can be effectively guaranteed to be only visible to a specified user, meanwhile, only the corresponding public key can verify data signed by the private key, and the accuracy of a data source can also be effectively verified.
In some embodiments, the system further includes a source-tracing query module, and after the industrial information usage record is generated and the chain is stored through the data chaining contract, the enterprise can perform source-tracing query on the industrial information usage record through the source-tracing contract according to the enterprise name and the industrial data Hash value. Specifically, in the embodiment, the usage record of the industrial data is accurately stored by using the characteristic that the block chain cannot be tampered, so that the credible and accurate usage condition of the industrial data is provided for an enterprise, traceability of the usage of the industrial data is realized, and illegal use of the industrial data is avoided.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
Note that each of the modules may be a functional module or a program module, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
The present embodiment also provides an electronic device comprising a memory having a computer program stored therein and a processor configured to execute the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
In addition, in combination with the method for securely sharing industrial big data in the above embodiments, the embodiments of the present application may provide a storage medium to implement. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any one of the above-described methods for secure sharing of industrial big data.
In one embodiment, a computer device is provided, which may be a terminal. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method for secure sharing of industrial big data. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
In an embodiment, fig. 6 is a schematic internal structure diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 6, there is provided an electronic device, which may be a server, and its internal structure diagram may be as shown in fig. 6. The electronic device comprises a processor, a network interface, an internal memory and a non-volatile memory connected by an internal bus, wherein the non-volatile memory stores an operating system, a computer program and a database. The processor is used for providing calculation and control capability, the network interface is used for communicating with an external terminal through network connection, the internal memory is used for providing an environment for an operating system and the running of a computer program, the computer program is executed by the processor to realize a method for safely sharing industrial big data, and the database is used for storing data.
Those skilled in the art will appreciate that the configuration shown in fig. 6 is a block diagram of only a portion of the configuration associated with the present application, and does not constitute a limitation on the electronic device to which the present application is applied, and a particular electronic device may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It should be understood by those skilled in the art that various features of the above-described embodiments can be combined in any combination, and for the sake of brevity, all possible combinations of features in the above-described embodiments are not described in detail, but rather, all combinations of features which are not inconsistent with each other should be construed as being within the scope of the present disclosure.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for secure sharing of industrial big data, the method comprising:
the method comprises the steps that industrial data are obtained, an enterprise calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, encrypts the industrial data through a public key of a government organization to obtain an industrial data ciphertext, carries out private key signature on the industrial data ciphertext and the industrial data Hash value, calls a data chaining contract to generate an industrial information record and stores the industrial information record into a block chain, wherein the industrial information record comprises an enterprise name, an enterprise public key, the industrial data ciphertext, the industrial data Hash value and private key signature data;
a government agency acquires the industrial information records of the enterprise through a data acquisition contract, decrypts through a public and private key pair to acquire industrial data in the industrial information records, and verifies the authenticity and integrity of the decrypted industrial data through a Hash algorithm;
and the government agency carries out data analysis on the industrial data obtained by decryption through a big data analysis contract to obtain an industrial analysis result, and generates an industrial information use record and an industrial storage certificate through the data chaining contract, wherein the industrial information use record comprises the enterprise name, the enterprise public key, the industrial data Hash value, an industrial planning project and an industrial analysis result Hash value.
2. The method of claim 1,
the industrial data comprises enterprise names, enterprise types, financing conditions, operation ranges, number of insured persons, intellectual property rights, dominant technologies, capital changes, stock control enterprises and annual income;
the big data analysis contract refers to a big data analysis algorithm realized through an intelligent contract code, and the use rule of a government agency on industrial big data is standardized by deploying an unchangeable big data analysis contract to each block chain node; the industrial analysis result refers to the conclusion of various enterprise layouts, key enterprise fund subsidies, core enterprise introduction and industrial development suggestions of the government on the industrial park.
3. The method of claim 1, wherein prior to obtaining industrial data, the method comprises:
the enterprise stores the enterprise audit information in the block chain through the data chaining contract, and submits an application for joining the block chain network to a block chain network audit mechanism;
and the block chain network auditing mechanism acquires the enterprise auditing information through the data acquisition contract, performs qualification audit on the enterprise according to the enterprise auditing information, deploys block chain nodes for the enterprise which passes the audit, and sends auditing failure information to the enterprise if the audit is not passed.
4. The method of claim 3,
the enterprise audit information comprises an enterprise certification information ciphertext, an enterprise certification information Hash value and an audit information private key signature;
the enterprise certification information comprises a company name, an enterprise type, registered capital, an industrial and commercial registered number, a unified social credit code, a registration organ, a business term and an organization code; the enterprise certification information ciphertext refers to ciphertext information obtained by encrypting the enterprise certification information by adopting a public key of an auditing agency; the enterprise certification information Hash value refers to a Hash value obtained by encrypting the enterprise certification information by adopting a Hash algorithm; the signature of the private key of the audit information refers to signature data obtained by signing the cipher text of the enterprise certification information and the Hash value of the enterprise certification information by an enterprise private key.
5. The method of claim 1, wherein verifying the authenticity and integrity of the decrypted industrial data comprises:
verifying the private key signature data in the industrial information record through an enterprise public key, and judging the authenticity of the industrial data cipher text and the industrial data Hash value source;
and decrypting the industrial data ciphertext through a private key of a government agency to obtain an industrial data plaintext, and verifying the integrity and authenticity of the industrial data obtained through decryption through the industrial data Hash value.
6. The method of claim 5, wherein the verifying the integrity and authenticity of the industrial data by the industrial data Hash value comprises:
and carrying out Hash operation on the industry data plaintext through a Hash algorithm to obtain a new Hash value, and comparing the new Hash value with the industry data Hash value stored in the block chain to judge whether the industry data ciphertext is changed or not so as to verify the integrity and the authenticity of the industry data.
7. The method of claim 1, wherein after generating the industrial information usage record and link deposit certificate via the data link contract, the method comprises:
and the enterprise can perform traceability query on the industrial information use record through a traceability contract according to the enterprise name and the industrial data Hash value.
8. A system for secure sharing of industrial big data, the system comprising:
the system comprises an encryption module, a data transmission module and a data transmission module, wherein the encryption module is used for acquiring industrial data, an enterprise calculates the industrial data through a Hash algorithm to obtain an industrial data Hash value, encrypts the industrial data through a public key of a government organization to obtain an industrial data cipher text, performs private key signature on the industrial data cipher text and the industrial data Hash value, calls a data chaining contract to generate an industrial information record and stores the industrial information record into a block chain, and the industrial information record comprises an enterprise name, an enterprise public key, the industrial data cipher text, the industrial data Hash value and private key signature data;
the verification module is used for acquiring the industrial information records of the enterprises through a data acquisition contract by a government agency, decrypting through a public and private key pair to obtain the industrial data in the industrial information records, and verifying the authenticity and the integrity of the decrypted industrial data through a Hash algorithm;
and the analysis recording module is used for the government agency to perform data analysis on the industrial data obtained by decryption through a big data analysis contract to obtain an industrial analysis result, and to generate the industrial information use record and chain storage certificate through the data chain linking contract, wherein the industrial information use record comprises the enterprise name, the enterprise public key, the industrial data Hash value, an industrial planning project and an industrial analysis result Hash value.
9. The system of claim 8, further comprising an application review module that, prior to obtaining industrial data,
the application auditing module is used for storing enterprise auditing information in the block chain by the enterprise through the data chaining contract and submitting an application for joining the block chain network to a block chain network auditing mechanism,
and the block chain network auditing mechanism acquires the enterprise auditing information through the data acquisition contract, performs qualification audit on the enterprise according to the enterprise auditing information, deploys block chain nodes for the enterprise which passes the audit, and sends auditing failure information to the enterprise if the audit is not passed.
10. The system of claim 8, further comprising a source query module configured to, after generating the industrial information usage record and chain deposit evidence via the data chain contract,
and the source tracing query module is used for the enterprise to perform source tracing query on the industrial information use record through a source tracing contract according to the enterprise name and the industrial data Hash value.
CN202111055639.6A 2021-09-09 2021-09-09 Method, system, electronic device and storage medium for safely sharing industrial big data Pending CN113505398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111055639.6A CN113505398A (en) 2021-09-09 2021-09-09 Method, system, electronic device and storage medium for safely sharing industrial big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111055639.6A CN113505398A (en) 2021-09-09 2021-09-09 Method, system, electronic device and storage medium for safely sharing industrial big data

Publications (1)

Publication Number Publication Date
CN113505398A true CN113505398A (en) 2021-10-15

Family

ID=78017000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111055639.6A Pending CN113505398A (en) 2021-09-09 2021-09-09 Method, system, electronic device and storage medium for safely sharing industrial big data

Country Status (1)

Country Link
CN (1) CN113505398A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114004595A (en) * 2021-11-03 2022-02-01 上海边界智能科技有限公司 Block chain-based government affair statistical information management method and system
CN114257381A (en) * 2021-12-21 2022-03-29 四川启睿克科技有限公司 Non-knowledge proof based yield calculation method
CN114499900A (en) * 2022-04-18 2022-05-13 杭州费尔斯通科技有限公司 Block chain private data sharing method based on zero knowledge proof
CN114708103A (en) * 2022-06-06 2022-07-05 杭州费尔斯通科技有限公司 Data asset transaction method, computer device and readable storage medium
CN115037548A (en) * 2022-06-24 2022-09-09 蚂蚁区块链科技(上海)有限公司 System, method and device for data security multi-party computation based on block chain
CN116401718A (en) * 2023-06-08 2023-07-07 科大讯飞股份有限公司 Block chain-based data protection method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401891A (en) * 2020-02-19 2020-07-10 中国建设银行股份有限公司 Data management method and device applied to block chain
CN111885053A (en) * 2020-07-22 2020-11-03 东莞市盟大塑化科技有限公司 Data processing method and device based on block chain and computer equipment
CN112351045A (en) * 2020-12-26 2021-02-09 旗美供应链(深圳)有限公司 Supply chain management method, system, server and computer readable medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401891A (en) * 2020-02-19 2020-07-10 中国建设银行股份有限公司 Data management method and device applied to block chain
CN111885053A (en) * 2020-07-22 2020-11-03 东莞市盟大塑化科技有限公司 Data processing method and device based on block chain and computer equipment
CN112351045A (en) * 2020-12-26 2021-02-09 旗美供应链(深圳)有限公司 Supply chain management method, system, server and computer readable medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114004595A (en) * 2021-11-03 2022-02-01 上海边界智能科技有限公司 Block chain-based government affair statistical information management method and system
CN114257381A (en) * 2021-12-21 2022-03-29 四川启睿克科技有限公司 Non-knowledge proof based yield calculation method
CN114257381B (en) * 2021-12-21 2023-11-21 四川启睿克科技有限公司 Yield calculation method based on zero knowledge proof
CN114499900A (en) * 2022-04-18 2022-05-13 杭州费尔斯通科技有限公司 Block chain private data sharing method based on zero knowledge proof
CN114708103A (en) * 2022-06-06 2022-07-05 杭州费尔斯通科技有限公司 Data asset transaction method, computer device and readable storage medium
CN114708103B (en) * 2022-06-06 2022-08-30 杭州费尔斯通科技有限公司 Data asset transaction method, computer device and readable storage medium
CN115037548A (en) * 2022-06-24 2022-09-09 蚂蚁区块链科技(上海)有限公司 System, method and device for data security multi-party computation based on block chain
CN115037548B (en) * 2022-06-24 2024-01-23 蚂蚁区块链科技(上海)有限公司 System, method, device, medium and equipment for secure multiparty computation of data based on blockchain
CN116401718A (en) * 2023-06-08 2023-07-07 科大讯飞股份有限公司 Block chain-based data protection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
TWI723658B (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN113505398A (en) Method, system, electronic device and storage medium for safely sharing industrial big data
CN110516474B (en) User information processing method and device in blockchain network, electronic equipment and storage medium
US9418210B2 (en) Systems and methods for managing and protecting electronic content and applications
CN109978688A (en) The access control method and its contract generator and server of distributed common recognition system
US20110289318A1 (en) System and Method for Online Digital Signature and Verification
CN111460525B (en) Block chain-based data processing method, device and storage medium
CN109560934B (en) Data tamper-proof method and device, computer equipment and storage medium
CN112231284A (en) Block chain-based big data sharing system, method, device and storage medium
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
WO2020143318A1 (en) Data verification method and terminal device
CN111770199A (en) Information sharing method, device and equipment
Shakan et al. Verification of university student and graduate data using blockchain technology
CN109933987A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
George et al. A blockchain based solution to know your customer (kyc) dilemma
Mansoor et al. A review of blockchain approaches for kyc
Balamurugan et al. A Survey on Privacy Preserving and Trust Building Techniques of Blockchain-Based Systems
CN109934579A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN112948894A (en) Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report
Nargis et al. A Secure Platform for Storing, Generating and Verifying Degree Certificates using Blockchain
CN114202426B (en) Block chain-based insurance application method, system and medium for electronic insurance function contract
CN115442115A (en) Risk data pushing method, system, server and trusted unit
US20230081416A1 (en) Anonymous private shared partitions in blockchain networks
CN115250176A (en) Carbon emission data processing method and device
CN111818094B (en) Identity registration method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211015

RJ01 Rejection of invention patent application after publication