CN113569275A - Block chain-based certified material privacy data processing method - Google Patents
Block chain-based certified material privacy data processing method Download PDFInfo
- Publication number
- CN113569275A CN113569275A CN202110653622.4A CN202110653622A CN113569275A CN 113569275 A CN113569275 A CN 113569275A CN 202110653622 A CN202110653622 A CN 202110653622A CN 113569275 A CN113569275 A CN 113569275A
- Authority
- CN
- China
- Prior art keywords
- data
- platform
- block chain
- electronic
- desensitization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000000463 material Substances 0.000 title claims abstract description 117
- 238000003672 processing method Methods 0.000 title claims abstract description 5
- 238000000586 desensitisation Methods 0.000 claims abstract description 38
- 238000012545 processing Methods 0.000 claims abstract description 29
- 238000012795 verification Methods 0.000 claims abstract description 24
- 238000000034 method Methods 0.000 claims description 10
- 239000000654 additive Substances 0.000 claims 1
- 230000000996 additive effect Effects 0.000 claims 1
- 238000007405 data analysis Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008033 biological extinction Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Tourism & Hospitality (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a certification material privacy data processing method based on a block chain, which comprises the following steps of 1) electronic certification material storage: a user submits the electronic certification material to a trusted data platform, and the trusted data platform adds noise to the electronic certification material to form desensitization data; the trusted data platform respectively calculates hash values of the original electronic proof material and desensitized data; returning the block chain to the corresponding material number of the event processing platform; 2) e, verifying the electronic certification material: the user sends the electronic certification material and the material number to the verification platform; 3) desensitization data consulting and verifying step the event management mechanism obtains the material number and desensitization data of the event proof material from the database and sends the material number and desensitization data to the verifying platform. The block chain technology can ensure that data is not tampered, differential privacy protects data privacy, data stored in a database is prevented from being attacked and leaked, and meanwhile, the adoption of effective electronic certification materials is guaranteed during event processing.
Description
Technical Field
The invention relates to a block chain technology, in particular to a privacy data processing technology based on a block chain.
Background
With the rapid advance of informatization, a large amount of certification material in event processing is presented in the form of electronic data material, and the presentation form of electronic data is increasingly diversified, and both the frequency of use and the amount of data of the electronic certification material are significantly increased. Compared with the traditional certification material, the electronic certification material has the characteristics of easy extinction, easy tampering, strong technical dependence and the like, and the authenticity and the legality examination and authentication of the electronic certification material are more difficult. Moreover, sensitive information such as personal privacy and business confidentiality is often involved in the electronic proof material, and if the private data is directly stored in a network and is leaked by an attack, the private data can cause great loss to the benefits of the parties and can also cause adverse effects on an event management organization.
The blockchain is a decentralized infrastructure and distributed database system, which is gradually emerging along with the popularization of digital encryption currencies such as bitcoin. The block chain technology has the characteristics of decentralization, unforgeability, traceability, collective maintenance, safety and the like, and can be combined with electronic data materials, so that the storage cost of the electronic data can be reduced, and the certification of the electronic data materials is facilitated.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method for proving material privacy data by combining a differential privacy protection technology based on a block chain technology.
The technical scheme adopted by the invention for solving the technical problems is that the certification material privacy data processing method based on the block chain comprises the following steps:
1) e, storing the electronic certification material:
a user submits the electronic certification material to a credible data platform, the credible data platform carries out noise adding processing on the electronic certification material to form desensitization data, and the desensitization data are stored in a database and used for recording and data statistics. The trusted data platform respectively calculates the hash values of the original electronic proof material and the desensitization data and sends the hash values to the event processing platform;
the event processing platform receives the hash values of the original electronic certification material and the desensitization data, the two hash values are sent to a block chain, the block chain is returned to a material number corresponding to the event processing platform, and the event processing platform sends the material number to the trusted data platform;
and after receiving the material number, the trusted data platform stores the material number into a database and simultaneously sends the material number to the user and an event management mechanism.
2) E, verifying the electronic certification material:
the user sends the electronic certification material and the material number to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material time stamp, judges whether the hash value of the original electronic proof material obtained from the block chain is equal to the hash value calculated according to the received electronic proof material, if not, the electronic proof material is invalid, and if equal, the electronic proof material is valid, and the verification platform can be used in event judgment.
3) Desensitization data consulting and verifying step
The event management mechanism obtains the material number and desensitization data of the event proof material from the database and sends the material number and desensitization data to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material timestamp, judges whether the desensitization data hash value obtained from the block chain is equal to the hash value calculated according to the received desensitization data, if not, the desensitization data is invalid, if so, the desensitization data is valid, and can be used for data analysis and the like. Differential privacy protection is a privacy protection technique based on data distortion, which distorts sensitive data by employing a technique that adds noise. Although the method is based on a data distortion technology, the required added rhyme noise amount is independent of the size of a data set, and for a large data set, a very small amount of noise is added to achieve high-level privacy protection. Compared with the previous privacy model, the differential privacy model can successfully resist most privacy attacks and provides provable privacy guarantee. Therefore, the electronic proof material can be desensitized by using differential privacy protection, and the safety and the usability of data are guaranteed.
The block chain technology can ensure that data is not tampered, differential privacy protects data privacy, data stored in a database is prevented from being attacked and leaked, and meanwhile, the adoption of effective electronic certification materials is guaranteed during event processing.
The invention has the beneficial effects that:
1. the electronic certification material containing the privacy data is subjected to differential privacy protection processing and then stored in the database, so that the privacy information can be prevented from being leaked due to the fact that the database is attacked;
2. the uplink data cannot be tampered, and the authenticity and integrity of the electronic certification material can be verified according to the hash value.
Drawings
FIG. 1 is a material flow diagram of electronic certification material relating to private data in the certification material;
FIG. 2 is a flow diagram of validating electronic proof material containing private data at event processing;
FIG. 3 is a flow diagram of the verification platform internally verifying electronic proof material containing private data;
fig. 4 is a desensitization data review and verification flow chart.
Detailed Description
The block chain is used in the event management mechanism and needs certain confidentiality, so the block chain can be realized by adopting an alliance chain such as FISCO-BCOS, Ether Fang alliance chain and the like; since electronic proof materials are not typically simple numbers, an exponential mechanism may be used to add noise to the data in differential privacy protection.
The certification material privacy data processing scheme based on the block chain comprises the following steps:
the method for storing the electronic certificate before the event processing as shown in fig. 1 comprises the following steps that:
1. the electronic proof material D of the event to be submitted by the party contains the privacy information of the party, so that the party submits the electronic proof material D to a trusted data processing platform of an event management institution;
2. and after receiving the electronic certification material D, the trusted data platform adds noise to the electronic certification material D by using an index mechanism. The process of adding noise using the exponential mechanism is:
(1) determining a privacy protection budget E which reflects the data privacy protection level;
Where Δ q is the output dataExp denotes an exponential function with a natural constant as the base;
then the algorithm a is considered to satisfy e-differential privacy, and a (D) is taken as the desensitization data after noise is added as D:
(4) storing all desensitization data obtained by processing into a database;
3. the credible data platform respectively calculates hash values of the original data D and the desensitization data A (D), H1 is hash (D), H2 is hash (A (D)), and the two hash values are sent to the event processing platform;
4. and uploading the received H1 and H2 to a block chain by the event processing platform, obtaining a corresponding material number NUM, and then sending the NUM to the trusted data platform.
5. And after receiving the NUM, the trusted data platform stores the NUM into the database and simultaneously sends the NUM to the party and the event management mechanism.
When event X is processed, the party needs to submit his own proof material. The electronic proof verification steps in the event processing shown in fig. 2 are:
1. the party submits an original electronic certification material D and a material number NUM to the verification platform;
2. and after receiving the original electronic certification material D and the material number NUM, the verification platform submits NUM to the block chain to obtain a hash value H1 and a material timestamp returned by the block chain. The proof material storage time is confirmed by the time stamp. As shown in fig. 3, the verification platform determines whether the hash value H1 obtained from the block chain is equal to the hash value H1' ═ hash (D) calculated according to the received electronic proof material, if not, the electronic proof material is invalid, and if equal, the electronic proof material D is determined to be valid, which can be used in event determination. 3. The verification platform sends verified A (D) to the event processing mechanism.
After the event X processing is finished, the event management entity needs to perform data analysis on the event proof material, and the desensitization data consulting and verifying steps shown in fig. 4 are as follows:
1. the event management mechanism obtains desensitization data A (D) from the database according to NUM and then sends NUM and A (D) to the verification platform;
2. and after receiving the desensitization data A (D) and the material number NUM, the verification platform submits NUM to the blockchain to obtain a hash value H2 and a material timestamp returned by the blockchain. The proof material storage time is confirmed by the time stamp. Verification of the hash value H2 as shown in fig. 3, the verification platform determines whether the hash value H2 obtained from the blockchain is equal to the hash value H2' hash (a (d)) calculated from the received desensitization data, if not, the desensitization data is invalid, and if equal, the desensitization data a (d) is valid and can be used for data analysis.
3. And the verification platform sends the verification result to the event processing mechanism.
The method of the invention needs the following function realization modules:
a database: for storing desensitized data, material numbers, etc.
A time stamping module: for providing a uniform time service to the system.
A data processing module: the method is used for adding noise to the original data to obtain desensitized data, calculating a data hash value and the like.
A block chain module: and uploading the hash value of the desensitization data and the original data to the blockchain network.
Electronic proof material verification module: the data processing system is used for receiving electronic certification materials, desensitized data and material numbers, sending the material numbers to the block chain to obtain hash values and material timestamps of corresponding certification materials, judging whether the hash values obtained from the block chain are equal to the hash values calculated according to the received data or not, if not, the data are invalid, and if equal, the data are judged to be valid and can be further used.
Claims (3)
1. A certification material privacy data processing method based on a block chain is characterized by comprising the following steps:
1) e, storing the electronic certification material:
a user submits the electronic certification material to a trusted data platform, the trusted data platform carries out noise adding processing on the electronic certification material to form desensitization data, and the desensitization data are stored in a database; the trusted data platform respectively calculates the hash values of the electronic certification material and the desensitization data and sends the two hash values to the event processing platform;
the event processing platform sends the received two hash value materials to a block chain, the block chain returns to a material number corresponding to the event processing platform, and the event processing platform sends the material number to the trusted data platform;
after receiving the material number, the trusted data platform stores the material number into a database and simultaneously sends the material number to a user and an event management mechanism;
2) e, verifying the electronic certification material:
the user sends the electronic certification material and the material number to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material time stamp, and judges whether the hash value of the electronic certification material obtained from the block chain is equal to the hash value calculated according to the received electronic certification material, if not, the electronic certification material is invalid, if so, the electronic certification material is valid, and the electronic certification material can be used in event judgment;
3) desensitization data consulting and verifying steps:
the event management mechanism obtains the material number and desensitization data of the event proof material from the database and sends the material number and desensitization data to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material time stamp, judges whether the desensitization data hash value obtained from the block chain is equal to the hash value calculated according to the received desensitization data, if not, the desensitization data is invalid, and if so, the desensitization data is judged to be valid.
2. The method of claim 1, wherein the desensitization data is generated in step 1) by adding noise to the electronically proven material using an exponential mechanism.
3. The method as claimed in claim 2, wherein the specific steps of using an exponential mechanism to apply the additive noise treatment to the electronic proof material D in step 1) to form desensitization data are as follows:
(1) determining a privacy protection budget E which reflects the data privacy protection level;
Where Δ q is the output dataExp denotes an exponential function with a natural constant as the base;
then algorithm a is considered to satisfy e-differential privacy and a (D) is taken as D to add the denoised desensitized data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110653622.4A CN113569275B (en) | 2021-06-11 | 2021-06-11 | Data processing method for proving privacy of material based on blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110653622.4A CN113569275B (en) | 2021-06-11 | 2021-06-11 | Data processing method for proving privacy of material based on blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113569275A true CN113569275A (en) | 2021-10-29 |
CN113569275B CN113569275B (en) | 2023-07-25 |
Family
ID=78161973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110653622.4A Active CN113569275B (en) | 2021-06-11 | 2021-06-11 | Data processing method for proving privacy of material based on blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113569275B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108304486A (en) * | 2017-12-29 | 2018-07-20 | 北京欧链科技有限公司 | A kind of data processing method and device based on block chain |
CN110868295A (en) * | 2019-12-12 | 2020-03-06 | 南京如般量子科技有限公司 | Anti-quantum computing alliance chain system based on secret sharing and communication method |
CN111191284A (en) * | 2019-12-27 | 2020-05-22 | 中国司法大数据研究院有限公司 | Processing method, device and system for judicial evidence storage of sensitive information based on block chain technology |
CN111552986A (en) * | 2020-07-10 | 2020-08-18 | 鹏城实验室 | Block chain-based federal modeling method, device, equipment and storage medium |
CN112634307A (en) * | 2020-12-02 | 2021-04-09 | 深圳前海微众银行股份有限公司 | Data distribution method and device based on block chain |
US11018873B1 (en) * | 2020-01-16 | 2021-05-25 | Tyson York Winarski | Collision resistant digital signatures |
-
2021
- 2021-06-11 CN CN202110653622.4A patent/CN113569275B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108304486A (en) * | 2017-12-29 | 2018-07-20 | 北京欧链科技有限公司 | A kind of data processing method and device based on block chain |
CN110868295A (en) * | 2019-12-12 | 2020-03-06 | 南京如般量子科技有限公司 | Anti-quantum computing alliance chain system based on secret sharing and communication method |
CN111191284A (en) * | 2019-12-27 | 2020-05-22 | 中国司法大数据研究院有限公司 | Processing method, device and system for judicial evidence storage of sensitive information based on block chain technology |
US11018873B1 (en) * | 2020-01-16 | 2021-05-25 | Tyson York Winarski | Collision resistant digital signatures |
CN111552986A (en) * | 2020-07-10 | 2020-08-18 | 鹏城实验室 | Block chain-based federal modeling method, device, equipment and storage medium |
CN112634307A (en) * | 2020-12-02 | 2021-04-09 | 深圳前海微众银行股份有限公司 | Data distribution method and device based on block chain |
Non-Patent Citations (2)
Title |
---|
JINJUN CHEN等: "Differential privacy in blockchain technology :A futuristic approach", 《JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 》 * |
刘彦松等: "基于区块链的链上数据安全共享体系研究", 《大数据》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113569275B (en) | 2023-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111542820B (en) | Method and apparatus for trusted computing | |
US8190903B2 (en) | Method and apparatus for verifying authenticity of digital data using trusted computing | |
TW202018571A (en) | Data storage method and device based on block chain and electronic equipment | |
EP1376925A2 (en) | Selectively disclosable digital certificates | |
US20090049300A1 (en) | Method and system for user attestation-signatures with attributes | |
CN112699353B (en) | Financial information transmission method and financial information transmission system | |
CN104135368A (en) | A method for protecting data of an electronic chart | |
CN112733192B (en) | Judicial electronic evidence system and method based on union chain homomorphic encryption | |
CN112073196B (en) | Service data processing method and device, electronic equipment and storage medium | |
EP3133791A1 (en) | Double authentication system for electronically signed documents | |
CN108768975A (en) | Support the data integrity verification method of key updating and third party's secret protection | |
CN113779642A (en) | Data processing method and device, system and electronic equipment thereof | |
CN116361823A (en) | Selective audit processing of blockchains for privacy protection | |
CN113569275A (en) | Block chain-based certified material privacy data processing method | |
WO2021152361A1 (en) | Method and system for unified social media ecosystem with self verification and privacy preserving proofs | |
CN112422294B (en) | Anonymous voting method and device based on ring signature, electronic equipment and storage medium | |
CN114329610A (en) | Block chain privacy identity protection method, device, storage medium and system | |
CN113836239A (en) | Transaction data supervision method, storage medium and computer equipment | |
Al Fikri et al. | Formal verification of the authentication and voice communication protocol security on device X using scyther tool | |
Sangeetha et al. | Development of novel blockchain technology for certificate management system using cognitive image steganography techniques | |
CN116975937B (en) | Anonymous attestation method and anonymous verification method | |
CN116305194B (en) | Asymmetric encryption and decryption method and system for sustainable information disclosure data | |
CN114726655B (en) | Character set encryption method based on digital certificate identity authentication | |
CN118612483B (en) | Live broadcast permission creation method and device and electronic equipment | |
CN112559456B (en) | Data sharing method with privacy protection auditing and deleting functions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |