CN114329526B - Data sharing access control method based on blockchain and user credibility - Google Patents
Data sharing access control method based on blockchain and user credibility Download PDFInfo
- Publication number
- CN114329526B CN114329526B CN202111554168.3A CN202111554168A CN114329526B CN 114329526 B CN114329526 B CN 114329526B CN 202111554168 A CN202111554168 A CN 202111554168A CN 114329526 B CN114329526 B CN 114329526B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- index
- characteristic
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000011217 control strategy Methods 0.000 claims abstract description 11
- 239000013598 vector Substances 0.000 claims description 28
- 239000011159 matrix material Substances 0.000 claims description 24
- 230000008569 process Effects 0.000 claims description 22
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000000694 effects Effects 0.000 claims description 6
- 238000013475 authorization Methods 0.000 claims description 4
- 230000009471 action Effects 0.000 claims description 3
- 230000003542 behavioural effect Effects 0.000 claims description 3
- 238000010606 normalization Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 238000012937 correction Methods 0.000 claims description 2
- 230000001419 dependent effect Effects 0.000 claims description 2
- 230000008520 organization Effects 0.000 claims 1
- 230000006399 behavior Effects 0.000 description 20
- 238000013523 data management Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention belongs to the field of blockchains, and particularly relates to a data sharing access control method based on blockchains and user credibility, which comprises the steps that a user registers in a blockchain and stores encrypted data on an IPFS interstellar literature system, and updates a user credibility index value after successful uploading; the user formulates an access strategy corresponding to the data according to the uploaded data; when other users apply for data, if the access control strategy is not passed, updating the user credibility index value, carrying out operation of the user credibility index value and index weight, updating the credibility value of the user at the moment, and storing the current override access time and the final user credibility value into a user real-time credibility array in the intelligent contract; the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract; according to the current credit value and application information of the user B, whether the access right of the data D of the user B is given or not is confirmed; the invention can realize safe and efficient sharing of data.
Description
Technical Field
The invention belongs to the field of block chains, and particularly relates to a data sharing access control method based on block chains and user credibility.
Background
Currently, big data provides important references for enterprises to understand market demands and improve products, and the big data is deeply fused with the big data to become new kinetic energy for transformation and upgrading of the traditional industry. It can be said that the data contains huge productivity and business opportunities, and the data is mastered to master the developed resources and initiative. At present, urgent data sharing demands such as medical treatment, energy, government affairs, scientific research and the like exist in various industries. However, at the same time of data sharing, the integrity of data, the attribution right of data, the security of data and the privacy of data are also required to be guaranteed. Currently, there are many cloud server-based data storage, management and sharing technologies, and the combination of cryptography and cloud server technology can achieve secure sharing of data to some extent. However, these schemes still have the problems of difficult management of data sharing keys, low transparency of the sharing process, single point of failure, and the like.
Blockchain is a trusted ledger technology independent of third parties, and has the characteristics of decentralization, non-tampering and the like, so that the development and application of the blockchain are greatly promoted by the state. From a data management perspective, a blockchain may be considered a ledger that is commonly maintained and not tampered with by a number of untrusted nodes in a distributed environment. Because the nodes are mutually unreliable, the blockchain ensures the consistency of data storage through a consensus protocol, and the decentralised data management is realized. The data sharing process among users is recorded on the blockchain, all users in the system can access all transaction information on the nodes, and the disclosure and transparency of the user data sharing process can be realized. When the authority dispute of the data occurs, the source tracing can be performed through the transaction information on the blockchain, so that the problem is solved. Each node in the blockchain has an identical transaction copy, which solves the problem of single point failure limiting user data access in the traditional scheme. However, the existing data sharing scheme based on the blockchain has the problems of large access control granularity, unclear access authorization process, ineffective supervision of user behaviors in the system and the like.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a data sharing access control method based on blockchain and user credibility, which comprises the following steps:
s1: the user A uploads personal information to the blockchain for registration, and after successful registration, the intelligent contract automatically initializes the user-related reliability index value, namely, each index value is set to 0;
s2: the user A stores the data D encrypted by the symmetric key sm_key on the IPFS interstellar literature system, and indexes the obtained data I D Using the user A's own public key pk b A encrypted symmetric key pk b Information of_A (sm_key) and data is uploaded to a blockchain, and after the uploading is successful, the intelligent contract updates a credit index value related to data uploading operation of a user, namely the corresponding index value is self-increased by 1 in the intelligent contract;
s3: a user A formulates an access control strategy of the data D based on attributes;
s4: the user B applies for obtaining the decryption key of the data D, judges whether the user B has access rights according to the access control policy rule of the data D in the intelligent contract, updates the user credibility index value when the user B does not pass the access control policy, namely, the user B is an override operation, and the user corresponding index value for the override operation is automatically increased by 1 in the intelligent contract; then, carrying out calculation on the user credit index value and the index weight to obtain a credit value of the user at the moment, and storing the current override access time and the final user credit value into a user real-time credit array in the intelligent contract;
s5: the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract;
s6: after receiving the message of the user B, the user A confirms whether to endow the user B with the access right of the data D according to the current credit value and the application information of the user B;
s7: if the user A agrees to give the user B access authority, the symmetric encryption key sm_key of the data D is converted into the public key pk of the user B by using the proxy re-encryption algorithm b B encrypted symmetric key pk b B (sm_key), creating a reply message by means of a smart contract, decrypting the key pk b B (sm_key) and other authorization information are replied to the user B through a reply message;
s8: after receiving the response message from user A, user B uses its private key pk v And B, decrypting to obtain a symmetric encryption key sm_key of the data D, downloading the data in the IPFS interstellar literature system through the index of the data D, decrypting to obtain the original data, and enabling the data of the updated user A in the contract to be successfully accessed and operated by other people, so that the corresponding index value of the data is increased by 1 in the intelligent contract.
Further, the user personal information uploaded during the registration of the user at least comprises an ethernet account address, a public key, a name, an identity ID, an affiliated institution code and an affiliated project group number.
Further, the user reliability index is divided into two layers, the first layer comprises a functional index F, a reliable index R and a safety index S, the second layer is the characteristic of each first layer after the index is refined, the functional index F at least comprises a user uploading data number F1, a data correlation proof number F2 and uploading data accessed times F3, the reliable index R at least comprises an uploading data error number R1 and a correction other person error number R2, and the safety index S at least comprises override access times S1.
Further, the process of obtaining the confidence value of the user at the moment by performing the operation of the user confidence index value and the index weight comprises the following steps:
step 1: establishing a userBehavior feature matrix bc= [ BC ] ij ] n×m ;
Step 2: normalizing matrix BC to obtain the value of [0,1 ]]Feature matrix e= [ E ] within the range ij ] n×m Wherein n is the number of indexes, and m is the maximum value of the number of behavior characteristics in the indexes;
step 3: obtaining characteristic weight vector w of function index F by using fuzzy analytic hierarchy process F =[w f1 ,w f2 ,w f3 ]Characteristic weight vector w of reliability index R R =[w r1 ,w r2 ]Characteristic weight vector w of safety index S S =[w s1 ]And index weight vector w I =[w F ,w R ,w S ]。
Step 4: the user confidence value Credit is calculated according to the following formula:
wherein bc is as follows ij A representation; w (w) f1 To represent the vector of the user's uploaded data number f1, w f2 To represent the vector of data-dependent proof numbers f2, w f3 A vector representing the number of times the uploaded data is accessed f 3; w (w) r1 Vector for uploading data error number r1, w r2 A vector representing the corrected others error number r 2; w (w) s1 A vector representing the number of unauthorized accesses s 1;respectively belonging to w in the second layer F 、w R And w S The weight of the negative characteristic; />Index weights representing the negative of the second layer characteristics at the first layer index; cr (Cr) Pt For positive confidence, cr Ng Is a negative confidence level.
Further, the front credit rating Cr Pt Expressed as:
negative confidence level Cr Ng Expressed as:
wherein,for normalized positive user behavior feature values, < +.>Index weight indicating the front property in the second layer property in the first layer index, ++>Respectively belonging to w in the second layer F 、w R And w S The weight of the front characteristic is represented in the formula, and lambda is the user override access behavior coefficient; />And the normalized positive user behavior characteristic value.
Further, the user override access behavior coefficient λ is expressed as:
wherein n is ij Indicating that the user makes a negative behavioral characteristic e ij Is a number of times (1); bn ij Block number indicating when current negative activity occurs, bpre indicating when current negative activity e ij Block number where the previous negative action of (a) was located.
Further, the process of obtaining the characteristic weight corresponding to the index by using the fuzzy analytic hierarchy process is as follows:
step 1:the feature matrix after normalization of the related features of the functional index is E F =[e 1 ,...,e v ]V is the number of characteristics under the index, and the characteristics under the same index are compared in pairs according to importance to obtain an initial judgment matrix EQ= [ EQ ] ij ] v×v :
Step 2: converting the initial judgment matrix into a fuzzy judgment consistent matrix Q= [ Q ] ij ] v×v :
Step 3: calculating the weight of each characteristic under each index according to the fuzzy judgment consistency matrix, thereby obtaining a weight vector;
wherein eq ij A parameter indicating whether the ith characteristic is more important than the jth characteristic in a certain index, and if the ith characteristic is more important than the jth characteristic, then eq ij =1, if the ith characteristic is not as important as the jth characteristic, eq ij =0, otherwise eq ij =0.5;q ij And represents the ambiguity judgment value between the ith characteristic and the jth characteristic in a certain index.
Further, the ambiguity judgment value q between the ith characteristic and the jth characteristic in a certain index ij Expressed as: q ij =(q i -q j )/2v+0.5。
Further, the weight of the characteristic i under the index n is expressed as:
the invention has the following beneficial effects:
1) The encrypted data is stored on an IPFS interstellar literature system, and the obtained data index is stored on a blockchain, so that the safe and efficient storage of the data can be realized; the characteristics of the IPFS interstellar literature system distributed storage and the blockchain distributed account book can be utilized to solve the problem of single-point failure of data;
2) The access control strategy based on the attribute is combined with the intelligent contract, so that fine-grained access control in the data sharing process can be realized; the policy is stored in the intelligent contract, so that the non-falsification and safe execution of the data access control policy can be ensured;
3) Calculating a user confidence value according to the behavior of a user in the system through a confidence evaluation mechanism, reflecting the behavior of the user in the system in a numerical mode, and realizing audit on the behavior of the user; additionally, a credit value closely related to user behavior may provide a reference for the data owner in deciding whether to grant access to the user in the absence of trust with a third party.
Drawings
FIG. 1 is a schematic diagram of a block chain and user confidence based data sharing access control method framework of the present invention;
FIG. 2 is a flow chart of user confidence calculation according to the present invention;
FIG. 3 is a flow chart of a process for obtaining characteristic weights corresponding to an index using fuzzy analytic hierarchy process.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a data sharing access control method based on a blockchain and user credibility, which specifically comprises the following steps:
s1: the user A uploads personal information to the blockchain for registration, and after successful registration, the intelligent contract automatically initializes the user-related reliability index value, namely, each index value is set to 0;
s2: the user A stores the data D encrypted by the symmetric key sm_key on the IPFS interstellar literature system, and indexes the obtained data I D Using the user A's own public key pk b A encrypted symmetric key pk b Information of_A (sm_key) and data is uploaded to a blockchain, and after the uploading is successful, the intelligent contract updates a credit index value related to data uploading operation of a user, namely the corresponding index value is self-increased by 1 in the intelligent contract;
s3: a user A formulates an access control strategy of the data D based on attributes;
s4: the user B applies for obtaining the decryption key of the data D, judges whether the user B has access rights according to the access control policy rule of the data D in the intelligent contract, updates the user credibility index value when the user B does not pass the access control policy judgment, namely, the user B does not pass the access control policy, namely, the user B is an override operation, and the user corresponding index value for the override operation is self-increased by 1 in the intelligent contract; then, carrying out calculation on the user credit index value and the index weight to obtain a credit value of the user at the moment, and storing the current override access time and the final user credit value into a user real-time credit array in the intelligent contract;
s5: the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract;
s6: after receiving the message of the user B, the user A confirms whether to endow the user B with the access right of the data D according to the current credit value and the application information of the user B;
s7: if the user A agrees to give the user B access authority, the symmetric encryption key sm_key of the data D is converted into the public key pk of the user B by using the proxy re-encryption algorithm b B encrypted symmetric key pk b B (sm_key), creating a reply message by means of a smart contract, decrypting the key pk b B (sm_key) and other authorization information are replied to the user B through a reply message;
s8: after receiving the response message from user A, user B uses its private key pk v And B, decrypting to obtain a symmetric encryption key sm_key of the data D, downloading the data in the IPFS interstellar literature system through the index of the data D, decrypting to obtain the original data, and enabling the data of the updated user A in the contract to be successfully accessed and operated by other people, so that the corresponding index value of the data is increased by 1 in the intelligent contract.
As shown in fig. 1, the data sharing access control method based on blockchain and user confidence in this embodiment mainly includes the following steps:
storing the encrypted data of the user into an IPFS, and uploading the storage index and the data information to a block chain to realize safe storage of the data;
combining the access control strategy based on the attribute with the intelligent contract, and realizing the processes of user identity information registration, user data index uploading, data access control strategy formulation, data sharing key acquisition and the like so as to realize fine-granularity dynamic access control;
and establishing a user credibility assessment mechanism, and realizing a collection process and a calculation process of user credibility index values in a user data sharing process through intelligent contracts so as to achieve the purpose of monitoring user behaviors in a system.
The personal information of the user selected in this embodiment includes an ethernet account address, a public key, a name, an identity ID, an affiliated institution code, and an affiliated item group number. The user credibility index comprises a functional index F, a reliable index R and a safety index S, wherein F comprises 3 behavior characteristics: f1 user uploading data number, f2 data related proving number and f3 uploading data accessed times, wherein R comprises 2 behavior characteristics: r1, uploading data error number (negative), r2, correcting other error number, and S comprises 1 behavior characteristic: s1 number of unauthorized accesses (negative).
The embodiment provides a specific implementation manner for determining an evaluation index and a characteristic weight in the index by adopting a fuzzy analytic hierarchy process, as shown in fig. 2, the process includes:
step 1: taking the characteristic weight under the function index as an example: the feature matrix after normalization of the related features of the functional index is E F =[e 1 ,...,e v ]V is the number of characteristics under the index, and the characteristics under the same index are compared in pairs according to importance by using the following formula to obtain an initial judgment matrix EQ= [ EQ ] ij ] v×v :
Step 2: the initial judgment matrix is converted into a fuzzy judgment consistent matrix Q= [ Q ] by using the following formula ij ] v×v :
q ij =(q i -q j )/2v+0.5
Step 3: the weight of each characteristic under the function index F is calculated by using the following formula to obtain a weight vector w F =[w f1 ,w f2 ,w f3 ]。
The same steps are adopted to obtain the characteristic weight vectors under the reliable index and the safety index, and finally the three characteristics of the functional index, the reliable index and the safety index are used as the characteristics under the user credibility, the importance of the three characteristics is compared with each other, and the steps are repeated to obtain the weights of all the indexes.
The embodiment provides a specific implementation manner of user confidence calculation, as shown in fig. 3, the process includes:
step 1: establishing a user behavior feature matrix BC= [ BC ] ij ] n×m ;
Step 2: normalizing matrix BC to obtain the value of [0,1 ]]Feature matrix e= [ E ] within the range ij ] n×m Wherein n is the number of indexes, and m is the maximum value of the number of behavior characteristics in the indexes;
step 3: characteristic weight vector w of function index F F =[w f1 ,w f2 ,w f3 ]Characteristic weight vector w of reliability index R R =[w r1 ,w r2 ]Characteristic weight vector w of safety index S S =[w s1 ]And index weight vector w I =[w F ,w R ,w S ]And calculating the user according to the following formula by the normalized behavior feature matrix. Confidence value Credit:
wherein,belonging to w F 、w R And w S Representing the weight of the negative characteristic. />Belonging to w I And the index weight of the index where the negative characteristic is located is represented. Cr (Cr) Pt And Cr (V) Ng The positive confidence level and the negative confidence level are respectively calculated by the following formula:
wherein w is c Is the weight of the characteristic e ij Is a normalized user behavior characteristic value, and lambda is a coefficient set for unauthorized access behavior of users in an auditing system. After the unauthorized access behavior caused by misoperation of the user occurs, the coefficient can restore the user credibility to a normal level along with normal operation of the user, and the calculation formula is as follows:
wherein n is ij Indicating that the user makes a negative behavioral characteristic e ij Is a number of times (1). bn ij Block number indicating when current negative activity occurs, bpre indicating when current negative activity e ij Block number where the previous negative action of (a) was located.
While the foregoing is directed to embodiments, aspects and advantages of the present invention, other and further details of the invention may be had by the foregoing description, it will be understood that the foregoing embodiments are merely exemplary of the invention, and that any changes, substitutions, alterations, etc. which may be made herein without departing from the spirit and principles of the invention.
Claims (9)
1. The data sharing access control method based on the blockchain and the user credibility is characterized by comprising the following steps of:
s1: the user A uploads personal information to the blockchain for registration, and after successful registration, the intelligent contract automatically initializes the user-related reliability index value, namely, each index value is set to 0;
s2: the user A stores the data D encrypted by the symmetric key sm_key on the IPFS interstellar literature system, and indexes the obtained data I D Using the user A's own public key pk b A encrypted symmetric key pk b Information of_A (sm_key) and data is uploaded to a blockchain, and after the uploading is successful, the intelligent contract updates a credit index value related to data uploading operation of a user, namely the corresponding index value is self-increased by 1 in the intelligent contract;
s3: a user A formulates an access control strategy of the data D based on attributes;
s4: the user B applies for obtaining the decryption key of the data D, judges whether the user B has access rights according to the access control policy rule of the data D in the intelligent contract, updates the user credibility index value when the user B does not pass the access control policy judgment, namely, the user B does not pass the access control policy, namely, the user B is an override operation, and the user corresponding index value for the override operation is self-increased by 1 in the intelligent contract; then, carrying out calculation on the user credit index value and the index weight to obtain a credit value of the user at the moment, and storing the current override access time and the final user credit value into a user real-time credit array in the intelligent contract;
s5: the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract;
s6: after receiving the message of the user B, the user A confirms whether to endow the user B with the access right of the data D according to the current credit value and the application information of the user B;
s7: if the user A agrees to give the user B access authority, the proxy re-encryption algorithm is used for countingThe symmetric encryption key sm_key according to D is converted into the public key pk of the user B b B encrypted symmetric key pk b B (sm_key), creating a reply message by means of a smart contract, decrypting the key pk b B (sm_key) and other authorization information are replied to the user B through a reply message;
s8: after receiving the response message from user A, user B uses its private key pk v And B, decrypting to obtain a symmetric encryption key sm_key of the data D, downloading the data in the IPFS interstellar literature system through the index of the data D, decrypting to obtain the original data, and enabling the data of the updated user A in the contract to be successfully accessed and operated by other people, so that the corresponding index value of the data is increased by 1 in the intelligent contract.
2. The method for controlling data sharing access based on blockchain and user credibility according to claim 1, wherein the user personal information uploaded by the user during registration at least comprises ethernet account address, public key, name, identity ID, belonging organization code and belonging item group number.
3. The method for controlling data sharing access based on blockchain and user credibility according to claim 1, wherein the user credibility index is divided into two layers, the first layer comprises a functional index F, a reliable index R and a safety index S, the second layer is the characteristic of each first layer after the index is refined, the functional index F at least comprises a user uploading data number F1, a data correlation proof number F2 and uploading data accessed number F3, the reliable index R at least comprises an uploading data error number R1 and a correction other person error number R2, and the safety index S at least comprises an override access number S1.
4. The method for controlling data sharing access based on blockchain and user confidence according to claim 3, wherein the process of calculating the user confidence index value and the index weight to obtain the confidence value of the user at this time comprises:
step 1: establishing a user behavior feature matrix BC= [ BC ] ij ] n×m ;
Step 2: normalizing matrix BC to obtain the value of [0,1 ]]Feature matrix e= [ E ] within the range ij ] n×m Wherein n is the number of indexes, and m is the maximum value of the number of behavior characteristics in the indexes;
step 3: obtaining characteristic weight vector w of function index F by using fuzzy analytic hierarchy process F =[w f1 ,w f2 ,w f3 ]Characteristic weight vector w of reliability index R R =[w r1 ,w r2 ]Characteristic weight vector w of safety index S S =[w s1 ]And index weight vector w I =[w F ,w R ,w S ]。
Step 4: the user confidence value Credit is calculated according to the following formula:
wherein bc is as follows ij A representation; w (w) f1 To represent the vector of the user's uploaded data number f1, w f2 To represent the vector of data-dependent proof numbers f2, w f3 A vector representing the number of times the uploaded data is accessed f 3; w (w) r1 Vector for uploading data error number r1, w r2 A vector representing the corrected others error number r 2; w (w) s1 A vector representing the number of unauthorized accesses s 1;respectively belonging to w in the second layer F 、w R And w S The weight of the negative characteristic; />Index weights representing the negative of the second layer characteristics at the first layer index; cr (Cr) Pt For positive confidence, cr Ng Is a negative confidence level.
5. A zone-based method according to claim 4The data sharing access control method of block chain and user credibility is characterized in that the positive credibility Cr Pt Expressed as:
negative confidence level Cr Ng Expressed as:
wherein,for normalized positive user behavior feature values, < +.>Index weight indicating the front property in the second layer property in the first layer index, ++>Respectively belonging to w in the second layer F 、w R And w S The weight of the front characteristic is represented in the formula, and lambda is the user override access behavior coefficient; />And the normalized positive user behavior characteristic value.
6. The method for controlling data sharing access based on blockchain and user confidence according to claim 5, wherein the user override access behavior coefficient λ is expressed as:
wherein n is ij Indicating that the user makes a negative behavioral characteristic e ij Is a number of times (1); bn ij Block number indicating when current negative activity occurs, bpre indicating when current negative activity e ij Block number where the previous negative action of (a) was located.
7. The data sharing access control method based on blockchain and user confidence according to claim 4, wherein the process of obtaining the characteristic weight corresponding to the index by using the fuzzy analytic hierarchy process is as follows:
step 1: the feature matrix after normalization of the related features of the functional index is E F =[e 1 ,...,e v ]V is the number of characteristics under the index, and the characteristics under the same index are compared in pairs according to importance to obtain an initial judgment matrix EQ= [ EQ ] ij ] v×v :
Step 2: converting the initial judgment matrix into a fuzzy judgment consistent matrix Q= [ Q ] ij ] v×v :
Step 3: calculating the weight of each characteristic under each index according to the fuzzy judgment consistency matrix, thereby obtaining a weight vector;
wherein eq ij A parameter indicating whether the ith characteristic is more important than the jth characteristic in a certain index, and if the ith characteristic is more important than the jth characteristic, then eq ij =1, if the ith characteristic is not as important as the jth characteristic, eq ij =0, otherwise eq ij =0.5;q ij And represents the ambiguity judgment value between the ith characteristic and the jth characteristic in a certain index.
8. The method for data sharing access control based on blockchain and user confidence according to claim 7, wherein the ambiguity q between the ith and jth characteristics in a certain index ij Expressed as: q ij =(q i -q j )/2v+0.5。
9. The data sharing access control based on blockchain and user confidence of claim 7The method is characterized in that the weight of the characteristic i under the index n is expressed as follows:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111554168.3A CN114329526B (en) | 2021-12-17 | 2021-12-17 | Data sharing access control method based on blockchain and user credibility |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111554168.3A CN114329526B (en) | 2021-12-17 | 2021-12-17 | Data sharing access control method based on blockchain and user credibility |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114329526A CN114329526A (en) | 2022-04-12 |
CN114329526B true CN114329526B (en) | 2024-03-26 |
Family
ID=81052197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111554168.3A Active CN114329526B (en) | 2021-12-17 | 2021-12-17 | Data sharing access control method based on blockchain and user credibility |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114329526B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417482A (en) * | 2020-11-25 | 2021-02-26 | 中国传媒大学 | Data sharing system, device and method based on authority access mechanism |
CN112768018A (en) * | 2020-12-15 | 2021-05-07 | 扬州大学 | Electronic medical record security sharing method based on integrated credit evaluation intelligent contract |
CN113553612A (en) * | 2021-06-29 | 2021-10-26 | 福建师范大学 | Privacy protection method based on mobile crowd sensing technology |
CN113595971A (en) * | 2021-06-02 | 2021-11-02 | 云南财经大学 | Block chain-based distributed data security sharing method, system and computer readable medium |
CN113743955A (en) * | 2021-08-06 | 2021-12-03 | 广西综合交通大数据研究院 | Food material traceability data security access control method based on intelligent contract |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10027676B2 (en) * | 2010-01-04 | 2018-07-17 | Samsung Electronics Co., Ltd. | Method and system for multi-user, multi-device login and content access control and metering and blocking |
US20190258818A1 (en) * | 2016-02-08 | 2019-08-22 | Consumerinfo.Com, Inc. | Smart access control system for implementing access restrictions of regulated database records based on machine learning of trends |
-
2021
- 2021-12-17 CN CN202111554168.3A patent/CN114329526B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417482A (en) * | 2020-11-25 | 2021-02-26 | 中国传媒大学 | Data sharing system, device and method based on authority access mechanism |
CN112768018A (en) * | 2020-12-15 | 2021-05-07 | 扬州大学 | Electronic medical record security sharing method based on integrated credit evaluation intelligent contract |
CN113595971A (en) * | 2021-06-02 | 2021-11-02 | 云南财经大学 | Block chain-based distributed data security sharing method, system and computer readable medium |
CN113553612A (en) * | 2021-06-29 | 2021-10-26 | 福建师范大学 | Privacy protection method based on mobile crowd sensing technology |
CN113743955A (en) * | 2021-08-06 | 2021-12-03 | 广西综合交通大数据研究院 | Food material traceability data security access control method based on intelligent contract |
Non-Patent Citations (6)
Title |
---|
BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control;HONG XU 等;IEEE ACCESS;20200501;第8卷;第87552-87561页 * |
SCUC-DSAC:A data sharing access control model based on smart contract and user credit.2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).2022,第135-140页. * |
基于信任度的跨域安全访问控制模型研究;彭维平;刘雪贞;郭海儒;宋成;;计算机应用研究;20160630;33(06);第197-202页 * |
基于区块链和用户信用度的访问控制模型;王海勇;潘启青;郭凯璇;;计算机应用;20201231(06);第128-133页 * |
基于区块链的个人隐私数据保护研究;王益帅;知网研学;20220510;全文 * |
基于区块链的数据共享关键技术研究;王利;中国优秀硕士学位论文全文数据库 信息科技辑;20231015;文章第4章 * |
Also Published As
Publication number | Publication date |
---|---|
CN114329526A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2017269736B2 (en) | Multiple-link cryptologic blockchain | |
Aujla et al. | SecSVA: secure storage, verification, and auditing of big data in the cloud environment | |
CN110321721B (en) | Block chain-based electronic medical record access control method | |
Xu et al. | An efficient privacy‐enhanced attribute‐based access control mechanism | |
US11194919B2 (en) | Cognitive system for managing consent to user data | |
US11734259B2 (en) | Anonymous database rating update | |
Meva | Issues and challenges with blockchain: a survey | |
WO2019226580A1 (en) | Blockchain-anchored smart documents | |
CN110598434B (en) | House information processing method and device based on blockchain network, electronic equipment and storage medium | |
US11949794B2 (en) | Data anonymization of blockchain-based processing pipeline | |
CN110933093A (en) | Block chain data sharing platform and method based on differential privacy protection technology | |
CN110941856A (en) | Data differential privacy protection sharing platform based on block chain | |
AU2021210206A1 (en) | Index structure for blockchain ledger | |
US20210297264A1 (en) | Enabling consensus in distributed transaction processing systems | |
US11475365B2 (en) | Verification of stochastic gradient descent | |
AU2021300620A1 (en) | Permissioned eventing in a decentralized database | |
CN111444264A (en) | Data security sharing method based on block chain | |
US11856092B2 (en) | Limiting data availability on distributed ledger | |
US11924348B2 (en) | Honest behavior enforcement via blockchain | |
Thilagavathy et al. | A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
CN114329526B (en) | Data sharing access control method based on blockchain and user credibility | |
Li et al. | Improved efficient privacy-preserving certificateless provable data possession Scheme for cloud storage | |
US20230087602A1 (en) | Privacy-preserving state reference | |
US11645074B2 (en) | Computation and prediction of linked access | |
CHEN et al. | BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |