CN113569275A - Block chain-based certified material privacy data processing method - Google Patents

Block chain-based certified material privacy data processing method Download PDF

Info

Publication number
CN113569275A
CN113569275A CN202110653622.4A CN202110653622A CN113569275A CN 113569275 A CN113569275 A CN 113569275A CN 202110653622 A CN202110653622 A CN 202110653622A CN 113569275 A CN113569275 A CN 113569275A
Authority
CN
China
Prior art keywords
data
platform
block chain
electronic
desensitization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110653622.4A
Other languages
Chinese (zh)
Other versions
CN113569275B (en
Inventor
高建彬
夏琦
王娟
胡垚
王珂
王嘉唯
张家铭
杨乐
王润东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Financial Dream Workshop Investment Management Co ltd
University of Electronic Science and Technology of China
Original Assignee
Chengdu Financial Dream Workshop Investment Management Co ltd
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Financial Dream Workshop Investment Management Co ltd, University of Electronic Science and Technology of China filed Critical Chengdu Financial Dream Workshop Investment Management Co ltd
Priority to CN202110653622.4A priority Critical patent/CN113569275B/en
Publication of CN113569275A publication Critical patent/CN113569275A/en
Application granted granted Critical
Publication of CN113569275B publication Critical patent/CN113569275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a certification material privacy data processing method based on a block chain, which comprises the following steps of 1) electronic certification material storage: a user submits the electronic certification material to a trusted data platform, and the trusted data platform adds noise to the electronic certification material to form desensitization data; the trusted data platform respectively calculates hash values of the original electronic proof material and desensitized data; returning the block chain to the corresponding material number of the event processing platform; 2) e, verifying the electronic certification material: the user sends the electronic certification material and the material number to the verification platform; 3) desensitization data consulting and verifying step the event management mechanism obtains the material number and desensitization data of the event proof material from the database and sends the material number and desensitization data to the verifying platform. The block chain technology can ensure that data is not tampered, differential privacy protects data privacy, data stored in a database is prevented from being attacked and leaked, and meanwhile, the adoption of effective electronic certification materials is guaranteed during event processing.

Description

Block chain-based certified material privacy data processing method
Technical Field
The invention relates to a block chain technology, in particular to a privacy data processing technology based on a block chain.
Background
With the rapid advance of informatization, a large amount of certification material in event processing is presented in the form of electronic data material, and the presentation form of electronic data is increasingly diversified, and both the frequency of use and the amount of data of the electronic certification material are significantly increased. Compared with the traditional certification material, the electronic certification material has the characteristics of easy extinction, easy tampering, strong technical dependence and the like, and the authenticity and the legality examination and authentication of the electronic certification material are more difficult. Moreover, sensitive information such as personal privacy and business confidentiality is often involved in the electronic proof material, and if the private data is directly stored in a network and is leaked by an attack, the private data can cause great loss to the benefits of the parties and can also cause adverse effects on an event management organization.
The blockchain is a decentralized infrastructure and distributed database system, which is gradually emerging along with the popularization of digital encryption currencies such as bitcoin. The block chain technology has the characteristics of decentralization, unforgeability, traceability, collective maintenance, safety and the like, and can be combined with electronic data materials, so that the storage cost of the electronic data can be reduced, and the certification of the electronic data materials is facilitated.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method for proving material privacy data by combining a differential privacy protection technology based on a block chain technology.
The technical scheme adopted by the invention for solving the technical problems is that the certification material privacy data processing method based on the block chain comprises the following steps:
1) e, storing the electronic certification material:
a user submits the electronic certification material to a credible data platform, the credible data platform carries out noise adding processing on the electronic certification material to form desensitization data, and the desensitization data are stored in a database and used for recording and data statistics. The trusted data platform respectively calculates the hash values of the original electronic proof material and the desensitization data and sends the hash values to the event processing platform;
the event processing platform receives the hash values of the original electronic certification material and the desensitization data, the two hash values are sent to a block chain, the block chain is returned to a material number corresponding to the event processing platform, and the event processing platform sends the material number to the trusted data platform;
and after receiving the material number, the trusted data platform stores the material number into a database and simultaneously sends the material number to the user and an event management mechanism.
2) E, verifying the electronic certification material:
the user sends the electronic certification material and the material number to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material time stamp, judges whether the hash value of the original electronic proof material obtained from the block chain is equal to the hash value calculated according to the received electronic proof material, if not, the electronic proof material is invalid, and if equal, the electronic proof material is valid, and the verification platform can be used in event judgment.
3) Desensitization data consulting and verifying step
The event management mechanism obtains the material number and desensitization data of the event proof material from the database and sends the material number and desensitization data to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material timestamp, judges whether the desensitization data hash value obtained from the block chain is equal to the hash value calculated according to the received desensitization data, if not, the desensitization data is invalid, if so, the desensitization data is valid, and can be used for data analysis and the like. Differential privacy protection is a privacy protection technique based on data distortion, which distorts sensitive data by employing a technique that adds noise. Although the method is based on a data distortion technology, the required added rhyme noise amount is independent of the size of a data set, and for a large data set, a very small amount of noise is added to achieve high-level privacy protection. Compared with the previous privacy model, the differential privacy model can successfully resist most privacy attacks and provides provable privacy guarantee. Therefore, the electronic proof material can be desensitized by using differential privacy protection, and the safety and the usability of data are guaranteed.
The block chain technology can ensure that data is not tampered, differential privacy protects data privacy, data stored in a database is prevented from being attacked and leaked, and meanwhile, the adoption of effective electronic certification materials is guaranteed during event processing.
The invention has the beneficial effects that:
1. the electronic certification material containing the privacy data is subjected to differential privacy protection processing and then stored in the database, so that the privacy information can be prevented from being leaked due to the fact that the database is attacked;
2. the uplink data cannot be tampered, and the authenticity and integrity of the electronic certification material can be verified according to the hash value.
Drawings
FIG. 1 is a material flow diagram of electronic certification material relating to private data in the certification material;
FIG. 2 is a flow diagram of validating electronic proof material containing private data at event processing;
FIG. 3 is a flow diagram of the verification platform internally verifying electronic proof material containing private data;
fig. 4 is a desensitization data review and verification flow chart.
Detailed Description
The block chain is used in the event management mechanism and needs certain confidentiality, so the block chain can be realized by adopting an alliance chain such as FISCO-BCOS, Ether Fang alliance chain and the like; since electronic proof materials are not typically simple numbers, an exponential mechanism may be used to add noise to the data in differential privacy protection.
The certification material privacy data processing scheme based on the block chain comprises the following steps:
the method for storing the electronic certificate before the event processing as shown in fig. 1 comprises the following steps that:
1. the electronic proof material D of the event to be submitted by the party contains the privacy information of the party, so that the party submits the electronic proof material D to a trusted data processing platform of an event management institution;
2. and after receiving the electronic certification material D, the trusted data platform adds noise to the electronic certification material D by using an index mechanism. The process of adding noise using the exponential mechanism is:
(1) determining a privacy protection budget E which reflects the data privacy protection level;
(2) given a score function
Figure RE-GDA0003279119200000032
Wherein D is the input electronic proof material,
Figure RE-GDA0003279119200000033
is output data;
(3) using an algorithm a, if algorithm a satisfies: a is in proportion to
Figure RE-GDA0003279119200000031
Probability output data of
Figure RE-GDA0003279119200000034
Where Δ q is the output data
Figure RE-GDA0003279119200000035
Exp denotes an exponential function with a natural constant as the base;
then the algorithm a is considered to satisfy e-differential privacy, and a (D) is taken as the desensitization data after noise is added as D:
(4) storing all desensitization data obtained by processing into a database;
3. the credible data platform respectively calculates hash values of the original data D and the desensitization data A (D), H1 is hash (D), H2 is hash (A (D)), and the two hash values are sent to the event processing platform;
4. and uploading the received H1 and H2 to a block chain by the event processing platform, obtaining a corresponding material number NUM, and then sending the NUM to the trusted data platform.
5. And after receiving the NUM, the trusted data platform stores the NUM into the database and simultaneously sends the NUM to the party and the event management mechanism.
When event X is processed, the party needs to submit his own proof material. The electronic proof verification steps in the event processing shown in fig. 2 are:
1. the party submits an original electronic certification material D and a material number NUM to the verification platform;
2. and after receiving the original electronic certification material D and the material number NUM, the verification platform submits NUM to the block chain to obtain a hash value H1 and a material timestamp returned by the block chain. The proof material storage time is confirmed by the time stamp. As shown in fig. 3, the verification platform determines whether the hash value H1 obtained from the block chain is equal to the hash value H1' ═ hash (D) calculated according to the received electronic proof material, if not, the electronic proof material is invalid, and if equal, the electronic proof material D is determined to be valid, which can be used in event determination. 3. The verification platform sends verified A (D) to the event processing mechanism.
After the event X processing is finished, the event management entity needs to perform data analysis on the event proof material, and the desensitization data consulting and verifying steps shown in fig. 4 are as follows:
1. the event management mechanism obtains desensitization data A (D) from the database according to NUM and then sends NUM and A (D) to the verification platform;
2. and after receiving the desensitization data A (D) and the material number NUM, the verification platform submits NUM to the blockchain to obtain a hash value H2 and a material timestamp returned by the blockchain. The proof material storage time is confirmed by the time stamp. Verification of the hash value H2 as shown in fig. 3, the verification platform determines whether the hash value H2 obtained from the blockchain is equal to the hash value H2' hash (a (d)) calculated from the received desensitization data, if not, the desensitization data is invalid, and if equal, the desensitization data a (d) is valid and can be used for data analysis.
3. And the verification platform sends the verification result to the event processing mechanism.
The method of the invention needs the following function realization modules:
a database: for storing desensitized data, material numbers, etc.
A time stamping module: for providing a uniform time service to the system.
A data processing module: the method is used for adding noise to the original data to obtain desensitized data, calculating a data hash value and the like.
A block chain module: and uploading the hash value of the desensitization data and the original data to the blockchain network.
Electronic proof material verification module: the data processing system is used for receiving electronic certification materials, desensitized data and material numbers, sending the material numbers to the block chain to obtain hash values and material timestamps of corresponding certification materials, judging whether the hash values obtained from the block chain are equal to the hash values calculated according to the received data or not, if not, the data are invalid, and if equal, the data are judged to be valid and can be further used.

Claims (3)

1. A certification material privacy data processing method based on a block chain is characterized by comprising the following steps:
1) e, storing the electronic certification material:
a user submits the electronic certification material to a trusted data platform, the trusted data platform carries out noise adding processing on the electronic certification material to form desensitization data, and the desensitization data are stored in a database; the trusted data platform respectively calculates the hash values of the electronic certification material and the desensitization data and sends the two hash values to the event processing platform;
the event processing platform sends the received two hash value materials to a block chain, the block chain returns to a material number corresponding to the event processing platform, and the event processing platform sends the material number to the trusted data platform;
after receiving the material number, the trusted data platform stores the material number into a database and simultaneously sends the material number to a user and an event management mechanism;
2) e, verifying the electronic certification material:
the user sends the electronic certification material and the material number to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material time stamp, and judges whether the hash value of the electronic certification material obtained from the block chain is equal to the hash value calculated according to the received electronic certification material, if not, the electronic certification material is invalid, if so, the electronic certification material is valid, and the electronic certification material can be used in event judgment;
3) desensitization data consulting and verifying steps:
the event management mechanism obtains the material number and desensitization data of the event proof material from the database and sends the material number and desensitization data to the verification platform;
the verification platform sends the material number to the block chain to obtain a corresponding hash value and a material time stamp, judges whether the desensitization data hash value obtained from the block chain is equal to the hash value calculated according to the received desensitization data, if not, the desensitization data is invalid, and if so, the desensitization data is judged to be valid.
2. The method of claim 1, wherein the desensitization data is generated in step 1) by adding noise to the electronically proven material using an exponential mechanism.
3. The method as claimed in claim 2, wherein the specific steps of using an exponential mechanism to apply the additive noise treatment to the electronic proof material D in step 1) to form desensitization data are as follows:
(1) determining a privacy protection budget E which reflects the data privacy protection level;
(2) given a scoring function
Figure RE-FDA0003279119190000011
Wherein D is the input electronic proof material,
Figure RE-FDA0003279119190000012
is output data;
(3) using an algorithm a, if algorithm a satisfies: a is in proportion to
Figure RE-FDA0003279119190000013
Probability output data of
Figure RE-FDA0003279119190000014
Where Δ q is the output data
Figure RE-FDA0003279119190000015
Exp denotes an exponential function with a natural constant as the base;
then algorithm a is considered to satisfy e-differential privacy and a (D) is taken as D to add the denoised desensitized data.
CN202110653622.4A 2021-06-11 2021-06-11 Data processing method for proving privacy of material based on blockchain Active CN113569275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110653622.4A CN113569275B (en) 2021-06-11 2021-06-11 Data processing method for proving privacy of material based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110653622.4A CN113569275B (en) 2021-06-11 2021-06-11 Data processing method for proving privacy of material based on blockchain

Publications (2)

Publication Number Publication Date
CN113569275A true CN113569275A (en) 2021-10-29
CN113569275B CN113569275B (en) 2023-07-25

Family

ID=78161973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110653622.4A Active CN113569275B (en) 2021-06-11 2021-06-11 Data processing method for proving privacy of material based on blockchain

Country Status (1)

Country Link
CN (1) CN113569275B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108304486A (en) * 2017-12-29 2018-07-20 北京欧链科技有限公司 A kind of data processing method and device based on block chain
CN110868295A (en) * 2019-12-12 2020-03-06 南京如般量子科技有限公司 Anti-quantum computing alliance chain system based on secret sharing and communication method
CN111191284A (en) * 2019-12-27 2020-05-22 中国司法大数据研究院有限公司 Processing method, device and system for judicial evidence storage of sensitive information based on block chain technology
CN111552986A (en) * 2020-07-10 2020-08-18 鹏城实验室 Block chain-based federal modeling method, device, equipment and storage medium
CN112634307A (en) * 2020-12-02 2021-04-09 深圳前海微众银行股份有限公司 Data distribution method and device based on block chain
US11018873B1 (en) * 2020-01-16 2021-05-25 Tyson York Winarski Collision resistant digital signatures

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108304486A (en) * 2017-12-29 2018-07-20 北京欧链科技有限公司 A kind of data processing method and device based on block chain
CN110868295A (en) * 2019-12-12 2020-03-06 南京如般量子科技有限公司 Anti-quantum computing alliance chain system based on secret sharing and communication method
CN111191284A (en) * 2019-12-27 2020-05-22 中国司法大数据研究院有限公司 Processing method, device and system for judicial evidence storage of sensitive information based on block chain technology
US11018873B1 (en) * 2020-01-16 2021-05-25 Tyson York Winarski Collision resistant digital signatures
CN111552986A (en) * 2020-07-10 2020-08-18 鹏城实验室 Block chain-based federal modeling method, device, equipment and storage medium
CN112634307A (en) * 2020-12-02 2021-04-09 深圳前海微众银行股份有限公司 Data distribution method and device based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JINJUN CHEN等: "Differential privacy in blockchain technology :A futuristic approach", 《JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 》 *
刘彦松等: "基于区块链的链上数据安全共享体系研究", 《大数据》 *

Also Published As

Publication number Publication date
CN113569275B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
CN111542820B (en) Method and apparatus for trusted computing
US8190903B2 (en) Method and apparatus for verifying authenticity of digital data using trusted computing
TW202018571A (en) Data storage method and device based on block chain and electronic equipment
EP1376925A2 (en) Selectively disclosable digital certificates
US20090049300A1 (en) Method and system for user attestation-signatures with attributes
CN112699353B (en) Financial information transmission method and financial information transmission system
CN104135368A (en) A method for protecting data of an electronic chart
CN112733192B (en) Judicial electronic evidence system and method based on union chain homomorphic encryption
CN112073196B (en) Service data processing method and device, electronic equipment and storage medium
EP3133791A1 (en) Double authentication system for electronically signed documents
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN113779642A (en) Data processing method and device, system and electronic equipment thereof
CN116361823A (en) Selective audit processing of blockchains for privacy protection
CN113569275A (en) Block chain-based certified material privacy data processing method
WO2021152361A1 (en) Method and system for unified social media ecosystem with self verification and privacy preserving proofs
CN112422294B (en) Anonymous voting method and device based on ring signature, electronic equipment and storage medium
CN114329610A (en) Block chain privacy identity protection method, device, storage medium and system
CN113836239A (en) Transaction data supervision method, storage medium and computer equipment
Al Fikri et al. Formal verification of the authentication and voice communication protocol security on device X using scyther tool
Sangeetha et al. Development of novel blockchain technology for certificate management system using cognitive image steganography techniques
CN116975937B (en) Anonymous attestation method and anonymous verification method
CN116305194B (en) Asymmetric encryption and decryption method and system for sustainable information disclosure data
CN114726655B (en) Character set encryption method based on digital certificate identity authentication
CN118612483B (en) Live broadcast permission creation method and device and electronic equipment
CN112559456B (en) Data sharing method with privacy protection auditing and deleting functions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant