CN114065242A - Privacy data protection method based on block chain technology - Google Patents

Privacy data protection method based on block chain technology Download PDF

Info

Publication number
CN114065242A
CN114065242A CN202111340935.0A CN202111340935A CN114065242A CN 114065242 A CN114065242 A CN 114065242A CN 202111340935 A CN202111340935 A CN 202111340935A CN 114065242 A CN114065242 A CN 114065242A
Authority
CN
China
Prior art keywords
data
transaction
key
address
privacy data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111340935.0A
Other languages
Chinese (zh)
Inventor
奚海峰
曹恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Border Blockchain Technology Co ltd
Original Assignee
Nanjing Border Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Border Blockchain Technology Co ltd filed Critical Nanjing Border Blockchain Technology Co ltd
Priority to CN202111340935.0A priority Critical patent/CN114065242A/en
Publication of CN114065242A publication Critical patent/CN114065242A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of block chain privacy protection, in particular to a privacy data protection method based on a block chain technology, which specifically comprises the following five steps: s1: the transaction privacy data are preprocessed through a data sink technology, the preprocessed transaction privacy data are encrypted by adopting a symmetric encryption key, a public key of a user side encrypts the symmetric encryption key, and the encrypted transaction privacy data and the symmetric encryption key are packaged and updated to a block chain … …. The method is simple and effective, the transaction address is randomly generated by the server during transaction, the two parties transact in the randomly generated transaction address, the real addresses of the two parties are not involved, the information of the two parties is effectively protected, the concealment performance of the block chain is met, meanwhile, the end-to-end encryption effect can be realized by the symmetric encryption method, the data is prevented from being damaged by other nodes in the transmission process, and the transmission safety is improved.

Description

Privacy data protection method based on block chain technology
Technical Field
The invention relates to the technical field of block chain privacy protection, in particular to a privacy data protection method based on a block chain technology.
Background
The blockchain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is a distributed account book which is guaranteed in a cryptology mode and cannot be tampered and forged.
Through retrieval, the Chinese patent 'a privacy data protection method based on a block chain' (CN112055025B), the anonymity of the patent ensures that the privacy of a user is not disclosed, and the safe storage and sharing of the privacy data of the user of the Internet of things are realized. However, the patent does not hide the transaction address or adopt the virtual address transaction, so that the information of the receiving party is easily leaked, and the security is still deficient. Therefore, those skilled in the art provide a method for protecting private data based on the blockchain technique to solve the above problems in the background art.
Disclosure of Invention
The present invention is directed to a method for protecting private data based on a blockchain technique, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a privacy data protection method based on a block chain technology comprises the following steps:
s1: preprocessing transaction privacy data through a data sink technology, encrypting the preprocessed transaction privacy data by adopting a symmetric encryption key, encrypting the symmetric encryption key by using a public key of a user side, and packaging and updating the encrypted transaction privacy data and the symmetric encryption key into a block chain;
s2: the server generates a homomorphic key for user privacy encryption, the homomorphic key is stored through an interplanetary file system after encryption, a file hash address and encrypted privacy data are generated, and the hash address and the encrypted privacy data are updated into a block chain through the server;
s3: during transaction, the server randomly creates a transaction address and an opening key of the transaction address for the user side and the receiver;
s4: after the two parties reach agreement, the transaction address and the opening key of the transaction address are sent to the receiving party by the server, and meanwhile, corresponding transaction privacy data are packaged and sent to the transaction address;
s5: the receiver opens the address through the opening key of the transaction address, the receiver can receive the transaction privacy data, and the encryption of the transaction privacy data is opened by the public key of the user terminal.
As a further aspect of the invention: the specific method for preprocessing the transaction privacy data comprises the following steps:
a1: deleting repeated data in the transaction privacy data, and storing the characteristics of the repeated data in a HASH table;
a2: comparing the obtained MSH function value with a value stored in a HASH table, replacing the value with a pointer of a stored file if the value is the same, and storing data if the value is different;
a3: repeating A1-A2 until all data are detected completely;
a4: re-archiving data that is not duplicated;
a5: inputting the divided data into a data stream, constructing an m-bit B100m filter data structure, and initializing all bits of the m-bit B100m filter data structure to 0;
a6: selecting K HASH functions which are independent of each other, respectively mapping each element in the set into the same range, and calculating HASH values for every other data as composed sequence characteristic values;
a7: calculating the similarity between data objects according to the Hamming distance and the cosine similarity, if the data of the data objects are the same, replacing the file with a pointer pointing to the stored file, and if the data of the data objects are different, storing the data, updating the HASH table and adding a new file HASH value.
As a further aspect of the invention: the specific method of symmetric encryption is as follows:
b1: dividing a long plaintext into 64-bit plaintext segments, and encrypting each segment;
b2: carrying out initialization displacement processing on a 64-bit plaintext end and a key officer;
b3: performing 16 times of iteration processing on the result after initial displacement, wherein the block diagram of each iteration is the same, but the keys participating in the iteration are different, the keys are 56 bits and are divided into a left key and a right key, the ith iteration uses a key Ki to participate in the operation, and after the ith iteration is finished, the left key and the right key are circularly displaced to form a key for the (i + 1) th iteration;
b4: after 16 times of iteration processing, 32-bit interchange position is carried out, and after the interchange position, reduction transformation processing which is inverse to the initial displacement is carried out to obtain a 64-bit ciphertext;
b5: the decryption method inverts the encryption method, namely B4-B3-B2-B1.
As a further aspect of the invention: the public key of the user side used by the receiver is extracted by the user side and given by adopting an express way.
As a further aspect of the invention: and packaging and updating the encrypted transaction privacy data and the symmetric encryption key to a block chain, wherein the block chain needs to be authenticated by an authentication node, and the authentication node is selected from a plurality of nodes through a consensus mechanism.
Compared with the prior art, the invention has the beneficial effects that: the method is simple and effective, the transaction address is randomly generated by the server during transaction, the two parties transact in the randomly generated transaction address, the real addresses of the two parties are not involved, the information of the two parties is effectively protected, the concealment performance of the block chain is met, meanwhile, the end-to-end encryption effect can be realized by the symmetric encryption method, the data is prevented from being damaged by other nodes in the transmission process, and the transmission safety is improved.
Detailed Description
In the embodiment of the invention, a privacy data protection method based on a block chain technology comprises the following steps:
s1: preprocessing transaction privacy data through a data sink technology, encrypting the preprocessed transaction privacy data by adopting a symmetric encryption key, encrypting the symmetric encryption key by using a public key of a user side, and packaging and updating the encrypted transaction privacy data and the symmetric encryption key into a block chain;
s2: the server generates a homomorphic key for user privacy encryption, the homomorphic key is stored through an interplanetary file system after encryption, a file hash address and encrypted privacy data are generated, and the hash address and the encrypted privacy data are updated into a block chain through the server;
s3: during transaction, the server randomly creates a transaction address and an opening key of the transaction address for the user side and the receiver;
s4: after the two parties reach agreement, the transaction address and the opening key of the transaction address are sent to the receiving party by the server, and meanwhile, corresponding transaction privacy data are packaged and sent to the transaction address;
s5: the receiver opens the address through the opening key of the transaction address, the receiver can receive the transaction privacy data, and the encryption of the transaction privacy data is opened by the public key of the user terminal.
Further, the specific method for preprocessing the transaction privacy data is as follows:
a1: deleting repeated data in the transaction privacy data, and storing the characteristics of the repeated data in a HASH table;
a2: comparing the obtained MSH function value with a value stored in a HASH table, replacing the value with a pointer of a stored file if the value is the same, and storing data if the value is different;
a3: repeating A1-A2 until all data are detected completely;
a4: re-archiving data that is not duplicated;
a5: inputting the divided data into a data stream, constructing an m-bit B100m filter data structure, and initializing all bits of the m-bit B100m filter data structure to 0;
a6: selecting K HASH functions which are independent of each other, respectively mapping each element in the set into the same range, and calculating HASH values for every other data as composed sequence characteristic values;
a7: calculating the similarity between data objects according to the Hamming distance and the cosine similarity, if the data of the data objects are the same, replacing the file with a pointer pointing to the stored file, and if the data of the data objects are different, storing the data, updating the HASH table and adding a new file HASH value.
Further, the specific method of symmetric encryption is as follows:
b1: dividing a long plaintext into 64-bit plaintext segments, and encrypting each segment;
b2: carrying out initialization displacement processing on a 64-bit plaintext end and a key officer;
b3: performing 16 times of iteration processing on the result after initial displacement, wherein the block diagram of each iteration is the same, but the keys participating in the iteration are different, the keys are 56 bits and are divided into a left key and a right key, the ith iteration uses a key Ki to participate in the operation, and after the ith iteration is finished, the left key and the right key are circularly displaced to form a key for the (i + 1) th iteration;
b4: after 16 times of iteration processing, 32-bit interchange position is carried out, and after the interchange position, reduction transformation processing which is inverse to the initial displacement is carried out to obtain a 64-bit ciphertext;
b5: the decryption method inverts the encryption method, namely B4-B3-B2-B1.
Further, the public key of the user side used by the receiver is extracted by the user side and given by an express delivery mode.
Further, the encrypted transaction privacy data and the symmetric encryption key are packaged and updated to the block chain, authentication of the authentication nodes is required, and the authentication nodes are selected from a plurality of nodes through a common identification mechanism.
In summary, the following steps: the method is simple and effective, the transaction address is randomly generated by the server during transaction, the two parties transact in the randomly generated transaction address, the real addresses of the two parties are not involved, the information of the two parties is effectively protected, the concealment performance of the block chain is met, meanwhile, the end-to-end encryption effect can be realized by the symmetric encryption method, the data is prevented from being damaged by other nodes in the transmission process, and the transmission safety is improved.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention are equivalent to or changed within the technical scope of the present invention.

Claims (5)

1. A privacy data protection method based on a block chain technology is characterized by comprising the following steps:
s1: preprocessing transaction privacy data through a data sink technology, encrypting the preprocessed transaction privacy data by adopting a symmetric encryption key, encrypting the symmetric encryption key by using a public key of a user side, and packaging and updating the encrypted transaction privacy data and the symmetric encryption key into a block chain;
s2: the server generates a homomorphic key for user privacy encryption, the homomorphic key is stored through an interplanetary file system after encryption, a file hash address and encrypted privacy data are generated, and the hash address and the encrypted privacy data are updated into a block chain through the server;
s3: during transaction, the server randomly creates a transaction address and an opening key of the transaction address for the user side and the receiver;
s4: after the two parties reach agreement, the transaction address and the opening key of the transaction address are sent to the receiving party by the server, and meanwhile, corresponding transaction privacy data are packaged and sent to the transaction address;
s5: the receiver opens the address through the opening key of the transaction address, the receiver can receive the transaction privacy data, and the encryption of the transaction privacy data is opened by the public key of the user terminal.
2. The method for protecting private data based on blockchain technology according to claim 1, wherein the specific method for preprocessing the transaction private data is as follows:
a1: deleting repeated data in the transaction privacy data, and storing the characteristics of the repeated data in a HASH table;
a2: comparing the obtained MSH function value with a value stored in a HASH table, replacing the value with a pointer of a stored file if the value is the same, and storing data if the value is different;
a3: repeating A1-A2 until all data are detected completely;
a4: re-archiving data that is not duplicated;
a5: inputting the divided data into a data stream, constructing an m-bit B100m filter data structure, and initializing all bits of the m-bit B100m filter data structure to 0;
a6: selecting K HASH functions which are independent of each other, respectively mapping each element in the set into the same range, and calculating HASH values for every other data as composed sequence characteristic values;
a7: calculating the similarity between data objects according to the Hamming distance and the cosine similarity, if the data of the data objects are the same, replacing the file with a pointer pointing to the stored file, and if the data of the data objects are different, storing the data, updating the HASH table and adding a new file HASH value.
3. The method according to claim 1, wherein the symmetric encryption is performed by the following steps:
b1: dividing a long plaintext into 64-bit plaintext segments, and encrypting each segment;
b2: carrying out initialization displacement processing on a 64-bit plaintext end and a key officer;
b3: performing 16 times of iteration processing on the result after initial displacement, wherein the block diagram of each iteration is the same, but the keys participating in the iteration are different, the keys are 56 bits and are divided into a left key and a right key, the ith iteration uses a key Ki to participate in the operation, and after the ith iteration is finished, the left key and the right key are circularly displaced to form a key for the (i + 1) th iteration;
b4: after 16 times of iteration processing, 32-bit interchange position is carried out, and after the interchange position, reduction transformation processing which is inverse to the initial displacement is carried out to obtain a 64-bit ciphertext;
b5: the decryption method inverts the encryption method, namely B4-B3-B2-B1.
4. The method of claim 1, wherein the public key of the user side used by the receiver is extracted from the user side and is delivered by express delivery.
5. The method of claim 1, wherein the encrypted transaction privacy data and the symmetric encryption key are packaged and updated to a blockchain requiring authentication by an authentication node selected from a plurality of nodes through a common recognition mechanism.
CN202111340935.0A 2021-11-12 2021-11-12 Privacy data protection method based on block chain technology Pending CN114065242A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111340935.0A CN114065242A (en) 2021-11-12 2021-11-12 Privacy data protection method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111340935.0A CN114065242A (en) 2021-11-12 2021-11-12 Privacy data protection method based on block chain technology

Publications (1)

Publication Number Publication Date
CN114065242A true CN114065242A (en) 2022-02-18

Family

ID=80271618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111340935.0A Pending CN114065242A (en) 2021-11-12 2021-11-12 Privacy data protection method based on block chain technology

Country Status (1)

Country Link
CN (1) CN114065242A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584374A (en) * 2022-03-04 2022-06-03 泉州谷极网络科技有限公司 Block chain-based big data privacy sharing security protection system and method
CN115643103A (en) * 2022-11-03 2023-01-24 浪潮云信息技术股份公司 Big data encryption method using redundancy elimination technology

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584374A (en) * 2022-03-04 2022-06-03 泉州谷极网络科技有限公司 Block chain-based big data privacy sharing security protection system and method
CN114584374B (en) * 2022-03-04 2023-11-21 内蒙古蒙嘟嘟科技服务有限公司 Big data privacy sharing safety protection system and method based on blockchain
CN115643103A (en) * 2022-11-03 2023-01-24 浪潮云信息技术股份公司 Big data encryption method using redundancy elimination technology

Similar Documents

Publication Publication Date Title
Qadir et al. A review paper on cryptography
Li et al. Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
Barman et al. Fingerprint-based crypto-biometric system for network security
CN110717191A (en) Block chain data privacy protection access control method based on searchable attribute encryption
US20180262326A1 (en) Protecting white-box feistel network implementation against fault attack
US20170104584A1 (en) Construction and uses of variable-input-length tweakable ciphers
WO2007103906A2 (en) Secure data transmission using undiscoverable or black data
US20080077795A1 (en) Method and apparatus for two-way authentication without nonces
CN114175572B (en) System and method for performing equal and less operations on encrypted data using a quasi-group operation
CN106357401A (en) Private key storage method and private key use method
CN111368318B (en) Object tracking method for multi-mode blockchain transaction
CN103490889B (en) A kind of infinite length key internet communication encryption method
CN114065242A (en) Privacy data protection method based on block chain technology
CN106953723A (en) Prevent fractionation and merging method that DFA is attacked
Jueneman Electronic document authentication
CN117118617A (en) Distributed threshold encryption and decryption method based on mode component homomorphism
Savant et al. A review on network security and cryptography
WO2021115591A1 (en) Devices and sharing methods for private set intersection
Sarkar et al. A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function
CN111191262B (en) Block chain wallet client private key protection method based on two-party signature
KR20220142254A (en) Multi-signature wallet system in blockchain using the bloom filter
US10938790B2 (en) Security system and method
Ebrahimi et al. Enhancing cold wallet security with native multi-signature schemes in centralized exchanges
Curry An introduction to cryptography and digital signatures
Singh et al. The A review of different approaches for improving network security in cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination