CN113656498A - Inter-enterprise data sharing optimization method and system - Google Patents

Inter-enterprise data sharing optimization method and system Download PDF

Info

Publication number
CN113656498A
CN113656498A CN202110943051.8A CN202110943051A CN113656498A CN 113656498 A CN113656498 A CN 113656498A CN 202110943051 A CN202110943051 A CN 202110943051A CN 113656498 A CN113656498 A CN 113656498A
Authority
CN
China
Prior art keywords
data
enterprise
sharing
enterprises
data sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110943051.8A
Other languages
Chinese (zh)
Inventor
朱剑川
谢道德
肖建峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Huiyintongda Digital Technology Co ltd
Original Assignee
Xiamen Huiyintongda Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Huiyintongda Digital Technology Co ltd filed Critical Xiamen Huiyintongda Digital Technology Co ltd
Priority to CN202110943051.8A priority Critical patent/CN113656498A/en
Publication of CN113656498A publication Critical patent/CN113656498A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of data sharing, in particular to a method and a system for optimizing data sharing among enterprises, wherein the method comprises the steps of establishing a sharing server, and initiating registration to the sharing server by the enterprises; evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list; carrying out data synchronization among enterprises in the cluster list; according to the invention, the shared server is established through the registration system, and the enterprise is added into the cluster and needs to be registered and checked, so that the credibility of the enterprise can be controlled, and data access leakage and invalid enterprise are avoided; random data synchronization and verification are carried out between every two enterprises of the local service cloud, a trusted data sharing system scheme is constructed, and data which are required to be shared to industries among the enterprises are collected, summarized and shared; by utilizing shared data, enterprises can know the industry dynamics and the requirements in real time, adjust the energy supply and demand structure and reduce the production and operation cost.

Description

Inter-enterprise data sharing optimization method and system
Technical Field
The invention relates to the technical field of data sharing, in particular to a method and a system for optimizing data sharing among enterprises.
Background
In the chemical field, the enterprise scale is large, and the capital market value of the enterprise is large; most enterprise self-built software systems have their own technical development team or custom software system; but the system technology is old and the upgrading and reconstruction complexity is high; complex relations of 'competition + cooperation' exist among enterprises, so that data sharing will not be strong or credibility is not high among the enterprises; and the barrier of the chemical industry is high, and the involvement of Internet enterprises is little.
In order to improve communication among enterprises, two modes are mainly adopted for enterprise communication in the prior art;
according to the first scheme, referring to fig. 1, enterprises are mutually called based on an interface;
if the number of enterprises is large, the enterprise interface protocol, complexity, business docking, interface risk, enterprise mutual trust and the like all face several levels of increased risk. The industry association cannot monitor the overall data sharing condition as a whole. The data islanding problem still cannot be solved integrally. The interface provider may face the requesting operation with multiple callers disabled and even risk DDOS attacks.
According to the second scheme, referring to fig. 2, each enterprise uniformly reports to a designated 'trusted cloud platform', and then queries and acquires data from the 'trusted cloud platform'. Centralized data management and operation and maintenance monitoring are realized, the cost is low, and the data real-time performance is high; the unified protocol and the butt joint cost are low. However, the 'trusted cloud platform' may be attacked by malicious DDOS, the possibility of data tampering is high, the requirement on data security is high, and a single point of failure may occur.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the inter-enterprise data sharing optimization method and system meet the requirement that data which are required to be shared with each other to the industry among enterprises in the industry are collected, summarized and shared, and meanwhile data leakage, single-point failure and possible falsification are avoided.
In order to solve the technical problems, the invention adopts the technical scheme that:
a method for optimizing data sharing among enterprises comprises
Establishing a sharing server, and initiating registration to the sharing server by an enterprise;
evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list;
and carrying out data synchronization among enterprises in the cluster list.
Preferably, the enterprise joining in the cluster list provides a data sharing id, and the enterprise providing the data sharing id has a local key for checking the data sharing id;
enterprises in the cluster list apply for a data sharing id from a sharing server, apply for data synchronization through the data sharing id, and are requested to synchronize local keys of the enterprises to carry out validity check on the data sharing id;
and carrying out data synchronization among enterprises after verification.
Preferably, the data synchronization comprises
Enterprises initiating data synchronization in the cluster list apply for a data sharing id from a sharing server;
the sharing server transfers a data sharing id packet to the application enterprise through application;
the enterprise initiating data synchronization selects a data sharing id through a data sharing id packet to initiate a synchronization request to the enterprise having the data sharing id;
the enterprise initiated with the data sharing id carries out validity check on the data sharing id through a local key;
and after the verification, performing data synchronization between the enterprise initiating the data synchronization and the enterprise initiated with the data sharing id.
Preferably, the data packet written into the local database is confirmed when data synchronization is performed between the enterprises, the confirmation mode is whether the data packet obtains a confirmation instruction of a preset number of enterprises in the cluster list, if the confirmation instruction of the preset number is reached, writing is performed, otherwise, writing is not performed.
Preferably, the confirmation means comprises
Initiating data packet confirmation to other enterprises in the cluster list which does not initiate data synchronization by the data packet needing to be confirmed;
other enterprises which receive the non-initiated data synchronization confirmation data packet judge whether the data packet needs to be written into the local database according to the storage rule, and if the data packet needs to be written, the other enterprises confirm and send a confirmation instruction outwards; if not, the writing is not carried out and the sending is not carried out.
Counting the number of other enterprise confirmations in the returned cluster list which does not initiate data synchronization;
and writing if the preset number of confirmation instructions is reached, or not writing.
Preferably, the validation instruction is deduplicated.
Preferably, the data synchronization further includes encrypted data obtained by encrypting the data packet, before writing, whether the data packet is complete or tampered is determined by the encrypted data, and if the encrypted data is consistent, the data packet continues to be processed.
Preferably, the data sharing id and the local key are encrypted through a private encryption algorithm.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
an inter-enterprise data sharing optimization system comprises
The sharing server is used for initiating registration to the sharing server by the enterprise; evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list;
the enterprise in the cluster list applies for data synchronization among the enterprise local service clouds, and the data after data synchronization is stored in the enterprise local service clouds;
and the enterprise local database is used for inquiring data in the enterprise local service cloud.
Preferably, comprises
The enterprise local service cloud of the enterprise added into the cluster list provides a data sharing id, and the enterprise providing the data sharing id has a local key for verifying the data sharing id;
enterprises in the cluster list apply for a data sharing id from a sharing server through an enterprise local service cloud, apply for data synchronization through the data sharing id, and are requested to synchronize keys of the enterprise local to carry out validity verification on the data sharing id;
and after the verification, the enterprise performs data synchronization through the enterprise local service cloud.
The invention has the beneficial effects that: the shared server is established through the registration system, and enterprises are added into the cluster and need to be registered and checked, so that the credibility of the enterprises can be controlled, and data access leakage and invalid enterprises are avoided; random data synchronization and verification are carried out between every two local service clouds of the enterprises, the possibility of single-point failure can be effectively solved, the possibility that data of a scheme II in the prior art are changed in a serial mode is avoided, and a function similar to decentralization is formed, namely, a sharing platform only provides the added enterprises and the corresponding sharing ids, and the synchronization work is automatically carried out between different enterprises; the enterprise 'local service cloud' directly provides an internal query interface of the enterprise, so that the problem of single-point performance of service can be effectively solved; and a set of credible data sharing system scheme is established by means of guidance of industry associations, and data which are required to be shared to industries among enterprises are collected, summarized and shared; by utilizing shared data, enterprises can know the industry dynamics and the requirements in real time, adjust the energy supply and demand structure and reduce the production and operation cost.
Drawings
FIG. 1 is a schematic diagram of a first prior art solution;
FIG. 2 is a schematic diagram of a second prior art solution;
FIG. 3 is a schematic diagram of a distributed data package of a method for optimizing data sharing between enterprises according to an embodiment of the present invention;
fig. 4 is a block diagram of an inter-enterprise data sharing optimization system according to an embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Example one
A method for optimizing data sharing among enterprises comprises
Establishing a sharing server, and initiating registration to the sharing server by an enterprise;
evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list; an enterprise added into the cluster list provides a data sharing id, and the enterprise providing the data sharing id has a local key for verifying the data sharing id; and the data sharing id and the local key are encrypted through a private encryption algorithm.
Enterprises in the cluster list apply for a data sharing id from a sharing server, apply for data synchronization through the data sharing id, and are requested to synchronize local keys of the enterprises to carry out validity check on the data sharing id;
after the verification, carrying out data synchronization between enterprises, wherein the data synchronization comprises
Enterprises initiating data synchronization in the cluster list apply for a data sharing id from a sharing server;
the sharing server transfers a data sharing id packet to the application enterprise through application;
the enterprise initiating data synchronization selects a data sharing id through a data sharing id packet to initiate a synchronization request to the enterprise having the data sharing id;
the enterprise initiated with the data sharing id carries out validity check on the data sharing id through a local key;
and after the verification, performing data synchronization between the enterprise initiating the data synchronization and the enterprise initiated with the data sharing id.
When data synchronization is carried out among the enterprises, data packets written in a local database are confirmed, and the data packets needing to be confirmed are confirmed to other enterprises in a cluster list which does not initiate data synchronization;
other enterprises which receive the non-initiated data synchronization confirmation data packet judge whether the data packet needs to be written into the local database according to the storage rule, and if the data packet needs to be written, the other enterprises confirm and send a confirmation instruction outwards; if not, the writing is not carried out and the sending is not carried out.
Counting the confirmation quantity of other enterprises in the returned cluster list which does not initiate data synchronization, and removing duplication of confirmation instructions;
and writing if the preset number of confirmation instructions is reached, or not writing.
And the data synchronization also comprises encrypted data obtained by encrypting the data packet, before writing, whether the data packet is complete or tampered is judged through the encrypted data, and if the encrypted data are consistent, the data packet continues to be processed.
Wherein the enterprise initiating registration with the shared server comprises
Registration in HTTP or TCP protocol is supported.
The registration data format is as follows:
1.{
"bid" enterprise business license serial number ",
"bname": enterprise name ",
"still": data synchronization start time point ",
"username": contact ",
"telephone": contact phone ",
"password",
"mac" server mac serial number,
9.}
format of data returned:
1.{
"id" account id ",
"key": communication key ",
"elapsed" effective time "
5.}
Data synchronization between enterprises including
Enterprise A needs to share one piece of data and needs the following steps
1) Application data packet dataid (data sharing id)
1.{
"id" account id ",
"key": communication key ",
4.}
returning data
1.{
"dataid": packet id ",
"predataid": the "last packet id",
"servers" [ ],// Server List
5.}
2) Calculating how many enterprise ack acknowledgements are needed before writing the data packets to the database
Integer act=(servers.size/2)+1;
3) Distributing a data packet, and performing the data packet by using an RPC or HTTP basic communication protocol, referring to FIG. 3;
4) processing after receipt of a data packet
Firstly, checking whether the dataid is valid or not according to the key
Secondly, according to the data storage rule (lastnodeb), if the data packet can be stored in its local database, a confirm command is sent to the outside
1.{
"dataid" packet id, data packet id,
3."confirm":true,
"nodeid": node id ",
5.}
5) after the number of confirm is received and the duplicate is removed, num (confirm) > < num (act), the received data packet is written into the local database.
Data packet format
1.{
"dataid": packet id ",
"predataid": the "last node packet id",
"content": packet content ",
"nodeid": sender node ",
"secret" is the result of SHA256 encrypting the whole data packet to prevent data from being tampered ",
"ctime": transmission time ",
8.}
description of the drawings:
the secret field is a value obtained by performing SHA256 encryption on the whole data packet (except the secret field), and is used for judging whether the data packet is complete or tampered, and if so, the data packet can be written into the database.
The database can be directly queried in an enterprise for business query operation, but the database cannot be directly written into
Example two
Referring to FIG. 4, an inter-enterprise data sharing optimization system includes
The sharing server is used for initiating registration to the sharing server by the enterprise; evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list; the enterprise local service cloud of the enterprise added into the cluster list provides a data sharing id, and the enterprise providing the data sharing id has a local key for verifying the data sharing id;
the enterprise in the cluster list applies for a data sharing id to the sharing server through the enterprise local service cloud, applies for data synchronization through the data sharing id, and carries out validity check on the data sharing id by a key requested to synchronize the local enterprise; and after the verification, the enterprise performs data synchronization through the enterprise local service cloud.
And the enterprise local database is used for inquiring data in the enterprise local service cloud.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method for optimizing data sharing among enterprises is characterized by comprising
Establishing a sharing server, and initiating registration to the sharing server by an enterprise;
evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list;
and carrying out data synchronization among enterprises in the cluster list.
2. The inter-enterprise data sharing optimization method according to claim 1, wherein an enterprise joining in the cluster list provides a data sharing id, and the enterprise providing the data sharing id has a local key for checking the data sharing id;
enterprises in the cluster list apply for a data sharing id from a sharing server, apply for data synchronization through the data sharing id, and are requested to synchronize local keys of the enterprises to carry out validity check on the data sharing id;
and carrying out data synchronization among enterprises after verification.
3. The inter-enterprise data sharing optimization method of claim 2, wherein the data synchronization comprises
Enterprises initiating data synchronization in the cluster list apply for a data sharing id from a sharing server;
the sharing server transfers a data sharing id packet to the application enterprise through application;
the enterprise initiating data synchronization selects a data sharing id through a data sharing id packet to initiate a synchronization request to the enterprise having the data sharing id;
the enterprise initiated with the data sharing id carries out validity check on the data sharing id through a local key;
and after the verification, performing data synchronization between the enterprise initiating the data synchronization and the enterprise initiated with the data sharing id.
4. The inter-enterprise data sharing optimization method according to claim 3, wherein the data packet written into the local database is confirmed when data synchronization is performed between the enterprises, the confirmation mode is whether the data packet obtains a preset number of confirmation instructions of the enterprises in the cluster list, and if the preset number of confirmation instructions is reached, writing is performed, otherwise, writing is not performed.
5. The inter-enterprise data sharing optimization method of claim 4, wherein the validation means comprises
Initiating data packet confirmation to other enterprises in the cluster list which does not initiate data synchronization by the data packet needing to be confirmed;
other enterprises which receive the non-initiated data synchronization confirmation data packet judge whether the data packet needs to be written into the local database according to the storage rule, and if the data packet needs to be written, the other enterprises confirm and send a confirmation instruction outwards; if not, the writing is not carried out and the sending is not carried out.
Counting the number of other enterprise confirmations in the returned cluster list which does not initiate data synchronization;
and writing if the preset number of confirmation instructions is reached, or not writing.
6. The method of claim 5, wherein the validation instructions are deduplicated.
7. The inter-enterprise data sharing optimization method according to claim 4, wherein the data synchronization further includes encrypted data obtained by encrypting the data packet, before writing, whether the data packet is complete or tampered is determined by the encrypted data, and if the encrypted data is consistent, the processing is continued.
8. The inter-enterprise data sharing optimization method of claim 1, wherein the data sharing id and the local key are encrypted by a private encryption algorithm.
9. An inter-enterprise data sharing optimization system is characterized by comprising
The sharing server is used for initiating registration to the sharing server by the enterprise; evaluating the enterprise initiating the registration, and adding the enterprise after the evaluation to establish a shared server to form a cluster list;
the enterprise in the cluster list applies for data synchronization among the enterprise local service clouds, and the data after data synchronization is stored in the enterprise local service clouds;
and the enterprise local database is used for inquiring data in the enterprise local service cloud.
10. The inter-enterprise data sharing optimization system of claim 9, comprising
The enterprise local service cloud of the enterprise added into the cluster list provides a data sharing id, and the enterprise providing the data sharing id has a local key for verifying the data sharing id;
enterprises in the cluster list apply for a data sharing id from a sharing server through an enterprise local service cloud, apply for data synchronization through the data sharing id, and are requested to synchronize keys of the enterprise local to carry out validity verification on the data sharing id;
and after the verification, the enterprise performs data synchronization through the enterprise local service cloud.
CN202110943051.8A 2021-08-17 2021-08-17 Inter-enterprise data sharing optimization method and system Pending CN113656498A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110943051.8A CN113656498A (en) 2021-08-17 2021-08-17 Inter-enterprise data sharing optimization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110943051.8A CN113656498A (en) 2021-08-17 2021-08-17 Inter-enterprise data sharing optimization method and system

Publications (1)

Publication Number Publication Date
CN113656498A true CN113656498A (en) 2021-11-16

Family

ID=78479950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110943051.8A Pending CN113656498A (en) 2021-08-17 2021-08-17 Inter-enterprise data sharing optimization method and system

Country Status (1)

Country Link
CN (1) CN113656498A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012015A (en) * 2019-04-09 2019-07-12 中国科学院沈阳计算技术研究所有限公司 A kind of internet of things data sharing method and system based on block chain
CN110661780A (en) * 2019-08-15 2020-01-07 西安雷迪信息技术有限公司 Wireless city data sharing method and system based on SAAS application
CN112396385A (en) * 2021-01-20 2021-02-23 四川文轩宝湾供应链有限公司 Supply chain information collaborative sharing-based transaction method and system
CN113256385A (en) * 2021-06-03 2021-08-13 北京德风新征程科技有限公司 Big data industry internet popularization system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012015A (en) * 2019-04-09 2019-07-12 中国科学院沈阳计算技术研究所有限公司 A kind of internet of things data sharing method and system based on block chain
CN110661780A (en) * 2019-08-15 2020-01-07 西安雷迪信息技术有限公司 Wireless city data sharing method and system based on SAAS application
CN112396385A (en) * 2021-01-20 2021-02-23 四川文轩宝湾供应链有限公司 Supply chain information collaborative sharing-based transaction method and system
CN113256385A (en) * 2021-06-03 2021-08-13 北京德风新征程科技有限公司 Big data industry internet popularization system

Similar Documents

Publication Publication Date Title
WO2021047445A1 (en) Data processing method and apparatus in blockchain network, storage medium, and computer device
CN110958111B (en) Block chain-based identity authentication mechanism of electric power mobile terminal
CN111294352B (en) Data security authentication method between cloud and edge node
CN110599095B (en) Block chain network-based hazardous waste treatment method and node of block chain network
CN106341429B (en) A kind of authentication method for protecting server data safety
CN101068245B (en) Shared file issuing and downloading method and file sharing control system
CN1302634C (en) Network connection system
CN105247529A (en) Synchronizing credential hashes between directory services
CN113014676B (en) System and method for storing data of Internet of things into blockchain based on SIM card
US11849052B2 (en) Certificate in blockchain network, storage medium, and computer device
US10257171B2 (en) Server public key pinning by URL
CN103259663A (en) User unified authentication method in cloud computing environment
CN112149105A (en) Data processing system, method, related device and storage medium
JP2004206695A (en) Method and architecture to provide client session failover
US9325697B2 (en) Provisioning and managing certificates for accessing secure services in network
CN108965342B (en) Authentication method and system for data requester to access data source
CN109150800A (en) Login access method, system and storage medium
CN102231766B (en) Method and system for analyzing and verifying domain name
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN111914272B (en) Encryption retrieval method and system for origin data in mobile edge computing environment
CN116260656B (en) Main body trusted authentication method and system in zero trust network based on blockchain
CN113656498A (en) Inter-enterprise data sharing optimization method and system
CN115001707B (en) Device authentication method based on block chain and related device
CN110457944A (en) A kind of data sharing method and system
CN110620750A (en) Network security verification method of distributed system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination