CN114065242A - Privacy data protection method based on block chain technology - Google Patents
Privacy data protection method based on block chain technology Download PDFInfo
- Publication number
- CN114065242A CN114065242A CN202111340935.0A CN202111340935A CN114065242A CN 114065242 A CN114065242 A CN 114065242A CN 202111340935 A CN202111340935 A CN 202111340935A CN 114065242 A CN114065242 A CN 114065242A
- Authority
- CN
- China
- Prior art keywords
- data
- transaction
- key
- address
- privacy data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of block chain privacy protection, in particular to a privacy data protection method based on a block chain technology, which specifically comprises the following five steps: s1: the transaction privacy data are preprocessed through a data sink technology, the preprocessed transaction privacy data are encrypted by adopting a symmetric encryption key, a public key of a user side encrypts the symmetric encryption key, and the encrypted transaction privacy data and the symmetric encryption key are packaged and updated to a block chain … …. The method is simple and effective, the transaction address is randomly generated by the server during transaction, the two parties transact in the randomly generated transaction address, the real addresses of the two parties are not involved, the information of the two parties is effectively protected, the concealment performance of the block chain is met, meanwhile, the end-to-end encryption effect can be realized by the symmetric encryption method, the data is prevented from being damaged by other nodes in the transmission process, and the transmission safety is improved.
Description
Technical Field
The invention relates to the technical field of block chain privacy protection, in particular to a privacy data protection method based on a block chain technology.
Background
The blockchain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is a distributed account book which is guaranteed in a cryptology mode and cannot be tampered and forged.
Through retrieval, the Chinese patent 'a privacy data protection method based on a block chain' (CN112055025B), the anonymity of the patent ensures that the privacy of a user is not disclosed, and the safe storage and sharing of the privacy data of the user of the Internet of things are realized. However, the patent does not hide the transaction address or adopt the virtual address transaction, so that the information of the receiving party is easily leaked, and the security is still deficient. Therefore, those skilled in the art provide a method for protecting private data based on the blockchain technique to solve the above problems in the background art.
Disclosure of Invention
The present invention is directed to a method for protecting private data based on a blockchain technique, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a privacy data protection method based on a block chain technology comprises the following steps:
s1: preprocessing transaction privacy data through a data sink technology, encrypting the preprocessed transaction privacy data by adopting a symmetric encryption key, encrypting the symmetric encryption key by using a public key of a user side, and packaging and updating the encrypted transaction privacy data and the symmetric encryption key into a block chain;
s2: the server generates a homomorphic key for user privacy encryption, the homomorphic key is stored through an interplanetary file system after encryption, a file hash address and encrypted privacy data are generated, and the hash address and the encrypted privacy data are updated into a block chain through the server;
s3: during transaction, the server randomly creates a transaction address and an opening key of the transaction address for the user side and the receiver;
s4: after the two parties reach agreement, the transaction address and the opening key of the transaction address are sent to the receiving party by the server, and meanwhile, corresponding transaction privacy data are packaged and sent to the transaction address;
s5: the receiver opens the address through the opening key of the transaction address, the receiver can receive the transaction privacy data, and the encryption of the transaction privacy data is opened by the public key of the user terminal.
As a further aspect of the invention: the specific method for preprocessing the transaction privacy data comprises the following steps:
a1: deleting repeated data in the transaction privacy data, and storing the characteristics of the repeated data in a HASH table;
a2: comparing the obtained MSH function value with a value stored in a HASH table, replacing the value with a pointer of a stored file if the value is the same, and storing data if the value is different;
a3: repeating A1-A2 until all data are detected completely;
a4: re-archiving data that is not duplicated;
a5: inputting the divided data into a data stream, constructing an m-bit B100m filter data structure, and initializing all bits of the m-bit B100m filter data structure to 0;
a6: selecting K HASH functions which are independent of each other, respectively mapping each element in the set into the same range, and calculating HASH values for every other data as composed sequence characteristic values;
a7: calculating the similarity between data objects according to the Hamming distance and the cosine similarity, if the data of the data objects are the same, replacing the file with a pointer pointing to the stored file, and if the data of the data objects are different, storing the data, updating the HASH table and adding a new file HASH value.
As a further aspect of the invention: the specific method of symmetric encryption is as follows:
b1: dividing a long plaintext into 64-bit plaintext segments, and encrypting each segment;
b2: carrying out initialization displacement processing on a 64-bit plaintext end and a key officer;
b3: performing 16 times of iteration processing on the result after initial displacement, wherein the block diagram of each iteration is the same, but the keys participating in the iteration are different, the keys are 56 bits and are divided into a left key and a right key, the ith iteration uses a key Ki to participate in the operation, and after the ith iteration is finished, the left key and the right key are circularly displaced to form a key for the (i + 1) th iteration;
b4: after 16 times of iteration processing, 32-bit interchange position is carried out, and after the interchange position, reduction transformation processing which is inverse to the initial displacement is carried out to obtain a 64-bit ciphertext;
b5: the decryption method inverts the encryption method, namely B4-B3-B2-B1.
As a further aspect of the invention: the public key of the user side used by the receiver is extracted by the user side and given by adopting an express way.
As a further aspect of the invention: and packaging and updating the encrypted transaction privacy data and the symmetric encryption key to a block chain, wherein the block chain needs to be authenticated by an authentication node, and the authentication node is selected from a plurality of nodes through a consensus mechanism.
Compared with the prior art, the invention has the beneficial effects that: the method is simple and effective, the transaction address is randomly generated by the server during transaction, the two parties transact in the randomly generated transaction address, the real addresses of the two parties are not involved, the information of the two parties is effectively protected, the concealment performance of the block chain is met, meanwhile, the end-to-end encryption effect can be realized by the symmetric encryption method, the data is prevented from being damaged by other nodes in the transmission process, and the transmission safety is improved.
Detailed Description
In the embodiment of the invention, a privacy data protection method based on a block chain technology comprises the following steps:
s1: preprocessing transaction privacy data through a data sink technology, encrypting the preprocessed transaction privacy data by adopting a symmetric encryption key, encrypting the symmetric encryption key by using a public key of a user side, and packaging and updating the encrypted transaction privacy data and the symmetric encryption key into a block chain;
s2: the server generates a homomorphic key for user privacy encryption, the homomorphic key is stored through an interplanetary file system after encryption, a file hash address and encrypted privacy data are generated, and the hash address and the encrypted privacy data are updated into a block chain through the server;
s3: during transaction, the server randomly creates a transaction address and an opening key of the transaction address for the user side and the receiver;
s4: after the two parties reach agreement, the transaction address and the opening key of the transaction address are sent to the receiving party by the server, and meanwhile, corresponding transaction privacy data are packaged and sent to the transaction address;
s5: the receiver opens the address through the opening key of the transaction address, the receiver can receive the transaction privacy data, and the encryption of the transaction privacy data is opened by the public key of the user terminal.
Further, the specific method for preprocessing the transaction privacy data is as follows:
a1: deleting repeated data in the transaction privacy data, and storing the characteristics of the repeated data in a HASH table;
a2: comparing the obtained MSH function value with a value stored in a HASH table, replacing the value with a pointer of a stored file if the value is the same, and storing data if the value is different;
a3: repeating A1-A2 until all data are detected completely;
a4: re-archiving data that is not duplicated;
a5: inputting the divided data into a data stream, constructing an m-bit B100m filter data structure, and initializing all bits of the m-bit B100m filter data structure to 0;
a6: selecting K HASH functions which are independent of each other, respectively mapping each element in the set into the same range, and calculating HASH values for every other data as composed sequence characteristic values;
a7: calculating the similarity between data objects according to the Hamming distance and the cosine similarity, if the data of the data objects are the same, replacing the file with a pointer pointing to the stored file, and if the data of the data objects are different, storing the data, updating the HASH table and adding a new file HASH value.
Further, the specific method of symmetric encryption is as follows:
b1: dividing a long plaintext into 64-bit plaintext segments, and encrypting each segment;
b2: carrying out initialization displacement processing on a 64-bit plaintext end and a key officer;
b3: performing 16 times of iteration processing on the result after initial displacement, wherein the block diagram of each iteration is the same, but the keys participating in the iteration are different, the keys are 56 bits and are divided into a left key and a right key, the ith iteration uses a key Ki to participate in the operation, and after the ith iteration is finished, the left key and the right key are circularly displaced to form a key for the (i + 1) th iteration;
b4: after 16 times of iteration processing, 32-bit interchange position is carried out, and after the interchange position, reduction transformation processing which is inverse to the initial displacement is carried out to obtain a 64-bit ciphertext;
b5: the decryption method inverts the encryption method, namely B4-B3-B2-B1.
Further, the public key of the user side used by the receiver is extracted by the user side and given by an express delivery mode.
Further, the encrypted transaction privacy data and the symmetric encryption key are packaged and updated to the block chain, authentication of the authentication nodes is required, and the authentication nodes are selected from a plurality of nodes through a common identification mechanism.
In summary, the following steps: the method is simple and effective, the transaction address is randomly generated by the server during transaction, the two parties transact in the randomly generated transaction address, the real addresses of the two parties are not involved, the information of the two parties is effectively protected, the concealment performance of the block chain is met, meanwhile, the end-to-end encryption effect can be realized by the symmetric encryption method, the data is prevented from being damaged by other nodes in the transmission process, and the transmission safety is improved.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention are equivalent to or changed within the technical scope of the present invention.
Claims (5)
1. A privacy data protection method based on a block chain technology is characterized by comprising the following steps:
s1: preprocessing transaction privacy data through a data sink technology, encrypting the preprocessed transaction privacy data by adopting a symmetric encryption key, encrypting the symmetric encryption key by using a public key of a user side, and packaging and updating the encrypted transaction privacy data and the symmetric encryption key into a block chain;
s2: the server generates a homomorphic key for user privacy encryption, the homomorphic key is stored through an interplanetary file system after encryption, a file hash address and encrypted privacy data are generated, and the hash address and the encrypted privacy data are updated into a block chain through the server;
s3: during transaction, the server randomly creates a transaction address and an opening key of the transaction address for the user side and the receiver;
s4: after the two parties reach agreement, the transaction address and the opening key of the transaction address are sent to the receiving party by the server, and meanwhile, corresponding transaction privacy data are packaged and sent to the transaction address;
s5: the receiver opens the address through the opening key of the transaction address, the receiver can receive the transaction privacy data, and the encryption of the transaction privacy data is opened by the public key of the user terminal.
2. The method for protecting private data based on blockchain technology according to claim 1, wherein the specific method for preprocessing the transaction private data is as follows:
a1: deleting repeated data in the transaction privacy data, and storing the characteristics of the repeated data in a HASH table;
a2: comparing the obtained MSH function value with a value stored in a HASH table, replacing the value with a pointer of a stored file if the value is the same, and storing data if the value is different;
a3: repeating A1-A2 until all data are detected completely;
a4: re-archiving data that is not duplicated;
a5: inputting the divided data into a data stream, constructing an m-bit B100m filter data structure, and initializing all bits of the m-bit B100m filter data structure to 0;
a6: selecting K HASH functions which are independent of each other, respectively mapping each element in the set into the same range, and calculating HASH values for every other data as composed sequence characteristic values;
a7: calculating the similarity between data objects according to the Hamming distance and the cosine similarity, if the data of the data objects are the same, replacing the file with a pointer pointing to the stored file, and if the data of the data objects are different, storing the data, updating the HASH table and adding a new file HASH value.
3. The method according to claim 1, wherein the symmetric encryption is performed by the following steps:
b1: dividing a long plaintext into 64-bit plaintext segments, and encrypting each segment;
b2: carrying out initialization displacement processing on a 64-bit plaintext end and a key officer;
b3: performing 16 times of iteration processing on the result after initial displacement, wherein the block diagram of each iteration is the same, but the keys participating in the iteration are different, the keys are 56 bits and are divided into a left key and a right key, the ith iteration uses a key Ki to participate in the operation, and after the ith iteration is finished, the left key and the right key are circularly displaced to form a key for the (i + 1) th iteration;
b4: after 16 times of iteration processing, 32-bit interchange position is carried out, and after the interchange position, reduction transformation processing which is inverse to the initial displacement is carried out to obtain a 64-bit ciphertext;
b5: the decryption method inverts the encryption method, namely B4-B3-B2-B1.
4. The method of claim 1, wherein the public key of the user side used by the receiver is extracted from the user side and is delivered by express delivery.
5. The method of claim 1, wherein the encrypted transaction privacy data and the symmetric encryption key are packaged and updated to a blockchain requiring authentication by an authentication node selected from a plurality of nodes through a common recognition mechanism.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111340935.0A CN114065242A (en) | 2021-11-12 | 2021-11-12 | Privacy data protection method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111340935.0A CN114065242A (en) | 2021-11-12 | 2021-11-12 | Privacy data protection method based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114065242A true CN114065242A (en) | 2022-02-18 |
Family
ID=80271618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111340935.0A Pending CN114065242A (en) | 2021-11-12 | 2021-11-12 | Privacy data protection method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114065242A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114584374A (en) * | 2022-03-04 | 2022-06-03 | 泉州谷极网络科技有限公司 | Block chain-based big data privacy sharing security protection system and method |
CN115643103A (en) * | 2022-11-03 | 2023-01-24 | 浪潮云信息技术股份公司 | Big data encryption method using redundancy elimination technology |
-
2021
- 2021-11-12 CN CN202111340935.0A patent/CN114065242A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114584374A (en) * | 2022-03-04 | 2022-06-03 | 泉州谷极网络科技有限公司 | Block chain-based big data privacy sharing security protection system and method |
CN114584374B (en) * | 2022-03-04 | 2023-11-21 | 内蒙古蒙嘟嘟科技服务有限公司 | Big data privacy sharing safety protection system and method based on blockchain |
CN115643103A (en) * | 2022-11-03 | 2023-01-24 | 浪潮云信息技术股份公司 | Big data encryption method using redundancy elimination technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qadir et al. | A review paper on cryptography | |
Li et al. | Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol | |
Barman et al. | Fingerprint-based crypto-biometric system for network security | |
CN110717191A (en) | Block chain data privacy protection access control method based on searchable attribute encryption | |
US20180262326A1 (en) | Protecting white-box feistel network implementation against fault attack | |
US20170104584A1 (en) | Construction and uses of variable-input-length tweakable ciphers | |
WO2007103906A2 (en) | Secure data transmission using undiscoverable or black data | |
US20080077795A1 (en) | Method and apparatus for two-way authentication without nonces | |
CN114175572B (en) | System and method for performing equal and less operations on encrypted data using a quasi-group operation | |
CN106357401A (en) | Private key storage method and private key use method | |
CN111368318B (en) | Object tracking method for multi-mode blockchain transaction | |
CN103490889B (en) | A kind of infinite length key internet communication encryption method | |
CN114065242A (en) | Privacy data protection method based on block chain technology | |
CN106953723A (en) | Prevent fractionation and merging method that DFA is attacked | |
Jueneman | Electronic document authentication | |
CN117118617A (en) | Distributed threshold encryption and decryption method based on mode component homomorphism | |
Savant et al. | A review on network security and cryptography | |
WO2021115591A1 (en) | Devices and sharing methods for private set intersection | |
Sarkar et al. | A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function | |
CN111191262B (en) | Block chain wallet client private key protection method based on two-party signature | |
KR20220142254A (en) | Multi-signature wallet system in blockchain using the bloom filter | |
US10938790B2 (en) | Security system and method | |
Ebrahimi et al. | Enhancing cold wallet security with native multi-signature schemes in centralized exchanges | |
Curry | An introduction to cryptography and digital signatures | |
Singh et al. | The A review of different approaches for improving network security in cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |