CN114329526B - Data sharing access control method based on blockchain and user credibility - Google Patents

Data sharing access control method based on blockchain and user credibility Download PDF

Info

Publication number
CN114329526B
CN114329526B CN202111554168.3A CN202111554168A CN114329526B CN 114329526 B CN114329526 B CN 114329526B CN 202111554168 A CN202111554168 A CN 202111554168A CN 114329526 B CN114329526 B CN 114329526B
Authority
CN
China
Prior art keywords
user
data
index
characteristic
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111554168.3A
Other languages
Chinese (zh)
Other versions
CN114329526A (en
Inventor
徐光侠
王利
王益帅
张家俊
陈浪
马明明
胡新庭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN202111554168.3A priority Critical patent/CN114329526B/en
Publication of CN114329526A publication Critical patent/CN114329526A/en
Application granted granted Critical
Publication of CN114329526B publication Critical patent/CN114329526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention belongs to the field of blockchains, and particularly relates to a data sharing access control method based on blockchains and user credibility, which comprises the steps that a user registers in a blockchain and stores encrypted data on an IPFS interstellar literature system, and updates a user credibility index value after successful uploading; the user formulates an access strategy corresponding to the data according to the uploaded data; when other users apply for data, if the access control strategy is not passed, updating the user credibility index value, carrying out operation of the user credibility index value and index weight, updating the credibility value of the user at the moment, and storing the current override access time and the final user credibility value into a user real-time credibility array in the intelligent contract; the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract; according to the current credit value and application information of the user B, whether the access right of the data D of the user B is given or not is confirmed; the invention can realize safe and efficient sharing of data.

Description

Data sharing access control method based on blockchain and user credibility
Technical Field
The invention belongs to the field of block chains, and particularly relates to a data sharing access control method based on block chains and user credibility.
Background
Currently, big data provides important references for enterprises to understand market demands and improve products, and the big data is deeply fused with the big data to become new kinetic energy for transformation and upgrading of the traditional industry. It can be said that the data contains huge productivity and business opportunities, and the data is mastered to master the developed resources and initiative. At present, urgent data sharing demands such as medical treatment, energy, government affairs, scientific research and the like exist in various industries. However, at the same time of data sharing, the integrity of data, the attribution right of data, the security of data and the privacy of data are also required to be guaranteed. Currently, there are many cloud server-based data storage, management and sharing technologies, and the combination of cryptography and cloud server technology can achieve secure sharing of data to some extent. However, these schemes still have the problems of difficult management of data sharing keys, low transparency of the sharing process, single point of failure, and the like.
Blockchain is a trusted ledger technology independent of third parties, and has the characteristics of decentralization, non-tampering and the like, so that the development and application of the blockchain are greatly promoted by the state. From a data management perspective, a blockchain may be considered a ledger that is commonly maintained and not tampered with by a number of untrusted nodes in a distributed environment. Because the nodes are mutually unreliable, the blockchain ensures the consistency of data storage through a consensus protocol, and the decentralised data management is realized. The data sharing process among users is recorded on the blockchain, all users in the system can access all transaction information on the nodes, and the disclosure and transparency of the user data sharing process can be realized. When the authority dispute of the data occurs, the source tracing can be performed through the transaction information on the blockchain, so that the problem is solved. Each node in the blockchain has an identical transaction copy, which solves the problem of single point failure limiting user data access in the traditional scheme. However, the existing data sharing scheme based on the blockchain has the problems of large access control granularity, unclear access authorization process, ineffective supervision of user behaviors in the system and the like.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a data sharing access control method based on blockchain and user credibility, which comprises the following steps:
s1: the user A uploads personal information to the blockchain for registration, and after successful registration, the intelligent contract automatically initializes the user-related reliability index value, namely, each index value is set to 0;
s2: the user A stores the data D encrypted by the symmetric key sm_key on the IPFS interstellar literature system, and indexes the obtained data I D Using the user A's own public key pk b A encrypted symmetric key pk b Information of_A (sm_key) and data is uploaded to a blockchain, and after the uploading is successful, the intelligent contract updates a credit index value related to data uploading operation of a user, namely the corresponding index value is self-increased by 1 in the intelligent contract;
s3: a user A formulates an access control strategy of the data D based on attributes;
s4: the user B applies for obtaining the decryption key of the data D, judges whether the user B has access rights according to the access control policy rule of the data D in the intelligent contract, updates the user credibility index value when the user B does not pass the access control policy, namely, the user B is an override operation, and the user corresponding index value for the override operation is automatically increased by 1 in the intelligent contract; then, carrying out calculation on the user credit index value and the index weight to obtain a credit value of the user at the moment, and storing the current override access time and the final user credit value into a user real-time credit array in the intelligent contract;
s5: the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract;
s6: after receiving the message of the user B, the user A confirms whether to endow the user B with the access right of the data D according to the current credit value and the application information of the user B;
s7: if the user A agrees to give the user B access authority, the symmetric encryption key sm_key of the data D is converted into the public key pk of the user B by using the proxy re-encryption algorithm b B encrypted symmetric key pk b B (sm_key), creating a reply message by means of a smart contract, decrypting the key pk b B (sm_key) and other authorization information are replied to the user B through a reply message;
s8: after receiving the response message from user A, user B uses its private key pk v And B, decrypting to obtain a symmetric encryption key sm_key of the data D, downloading the data in the IPFS interstellar literature system through the index of the data D, decrypting to obtain the original data, and enabling the data of the updated user A in the contract to be successfully accessed and operated by other people, so that the corresponding index value of the data is increased by 1 in the intelligent contract.
Further, the user personal information uploaded during the registration of the user at least comprises an ethernet account address, a public key, a name, an identity ID, an affiliated institution code and an affiliated project group number.
Further, the user reliability index is divided into two layers, the first layer comprises a functional index F, a reliable index R and a safety index S, the second layer is the characteristic of each first layer after the index is refined, the functional index F at least comprises a user uploading data number F1, a data correlation proof number F2 and uploading data accessed times F3, the reliable index R at least comprises an uploading data error number R1 and a correction other person error number R2, and the safety index S at least comprises override access times S1.
Further, the process of obtaining the confidence value of the user at the moment by performing the operation of the user confidence index value and the index weight comprises the following steps:
step 1: establishing a userBehavior feature matrix bc= [ BC ] ij ] n×m
Step 2: normalizing matrix BC to obtain the value of [0,1 ]]Feature matrix e= [ E ] within the range ij ] n×m Wherein n is the number of indexes, and m is the maximum value of the number of behavior characteristics in the indexes;
step 3: obtaining characteristic weight vector w of function index F by using fuzzy analytic hierarchy process F =[w f1 ,w f2 ,w f3 ]Characteristic weight vector w of reliability index R R =[w r1 ,w r2 ]Characteristic weight vector w of safety index S S =[w s1 ]And index weight vector w I =[w F ,w R ,w S ]。
Step 4: the user confidence value Credit is calculated according to the following formula:
wherein bc is as follows ij A representation; w (w) f1 To represent the vector of the user's uploaded data number f1, w f2 To represent the vector of data-dependent proof numbers f2, w f3 A vector representing the number of times the uploaded data is accessed f 3; w (w) r1 Vector for uploading data error number r1, w r2 A vector representing the corrected others error number r 2; w (w) s1 A vector representing the number of unauthorized accesses s 1;respectively belonging to w in the second layer F 、w R And w S The weight of the negative characteristic; />Index weights representing the negative of the second layer characteristics at the first layer index; cr (Cr) Pt For positive confidence, cr Ng Is a negative confidence level.
Further, the front credit rating Cr Pt Expressed as:
negative confidence level Cr Ng Expressed as:
wherein,for normalized positive user behavior feature values, < +.>Index weight indicating the front property in the second layer property in the first layer index, ++>Respectively belonging to w in the second layer F 、w R And w S The weight of the front characteristic is represented in the formula, and lambda is the user override access behavior coefficient; />And the normalized positive user behavior characteristic value.
Further, the user override access behavior coefficient λ is expressed as:
wherein n is ij Indicating that the user makes a negative behavioral characteristic e ij Is a number of times (1); bn ij Block number indicating when current negative activity occurs, bpre indicating when current negative activity e ij Block number where the previous negative action of (a) was located.
Further, the process of obtaining the characteristic weight corresponding to the index by using the fuzzy analytic hierarchy process is as follows:
step 1:the feature matrix after normalization of the related features of the functional index is E F =[e 1 ,...,e v ]V is the number of characteristics under the index, and the characteristics under the same index are compared in pairs according to importance to obtain an initial judgment matrix EQ= [ EQ ] ij ] v×v
Step 2: converting the initial judgment matrix into a fuzzy judgment consistent matrix Q= [ Q ] ij ] v×v
Step 3: calculating the weight of each characteristic under each index according to the fuzzy judgment consistency matrix, thereby obtaining a weight vector;
wherein eq ij A parameter indicating whether the ith characteristic is more important than the jth characteristic in a certain index, and if the ith characteristic is more important than the jth characteristic, then eq ij =1, if the ith characteristic is not as important as the jth characteristic, eq ij =0, otherwise eq ij =0.5;q ij And represents the ambiguity judgment value between the ith characteristic and the jth characteristic in a certain index.
Further, the ambiguity judgment value q between the ith characteristic and the jth characteristic in a certain index ij Expressed as: q ij =(q i -q j )/2v+0.5。
Further, the weight of the characteristic i under the index n is expressed as:
the invention has the following beneficial effects:
1) The encrypted data is stored on an IPFS interstellar literature system, and the obtained data index is stored on a blockchain, so that the safe and efficient storage of the data can be realized; the characteristics of the IPFS interstellar literature system distributed storage and the blockchain distributed account book can be utilized to solve the problem of single-point failure of data;
2) The access control strategy based on the attribute is combined with the intelligent contract, so that fine-grained access control in the data sharing process can be realized; the policy is stored in the intelligent contract, so that the non-falsification and safe execution of the data access control policy can be ensured;
3) Calculating a user confidence value according to the behavior of a user in the system through a confidence evaluation mechanism, reflecting the behavior of the user in the system in a numerical mode, and realizing audit on the behavior of the user; additionally, a credit value closely related to user behavior may provide a reference for the data owner in deciding whether to grant access to the user in the absence of trust with a third party.
Drawings
FIG. 1 is a schematic diagram of a block chain and user confidence based data sharing access control method framework of the present invention;
FIG. 2 is a flow chart of user confidence calculation according to the present invention;
FIG. 3 is a flow chart of a process for obtaining characteristic weights corresponding to an index using fuzzy analytic hierarchy process.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a data sharing access control method based on a blockchain and user credibility, which specifically comprises the following steps:
s1: the user A uploads personal information to the blockchain for registration, and after successful registration, the intelligent contract automatically initializes the user-related reliability index value, namely, each index value is set to 0;
s2: the user A stores the data D encrypted by the symmetric key sm_key on the IPFS interstellar literature system, and indexes the obtained data I D Using the user A's own public key pk b A encrypted symmetric key pk b Information of_A (sm_key) and data is uploaded to a blockchain, and after the uploading is successful, the intelligent contract updates a credit index value related to data uploading operation of a user, namely the corresponding index value is self-increased by 1 in the intelligent contract;
s3: a user A formulates an access control strategy of the data D based on attributes;
s4: the user B applies for obtaining the decryption key of the data D, judges whether the user B has access rights according to the access control policy rule of the data D in the intelligent contract, updates the user credibility index value when the user B does not pass the access control policy judgment, namely, the user B does not pass the access control policy, namely, the user B is an override operation, and the user corresponding index value for the override operation is self-increased by 1 in the intelligent contract; then, carrying out calculation on the user credit index value and the index weight to obtain a credit value of the user at the moment, and storing the current override access time and the final user credit value into a user real-time credit array in the intelligent contract;
s5: the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract;
s6: after receiving the message of the user B, the user A confirms whether to endow the user B with the access right of the data D according to the current credit value and the application information of the user B;
s7: if the user A agrees to give the user B access authority, the symmetric encryption key sm_key of the data D is converted into the public key pk of the user B by using the proxy re-encryption algorithm b B encrypted symmetric key pk b B (sm_key), creating a reply message by means of a smart contract, decrypting the key pk b B (sm_key) and other authorization information are replied to the user B through a reply message;
s8: after receiving the response message from user A, user B uses its private key pk v And B, decrypting to obtain a symmetric encryption key sm_key of the data D, downloading the data in the IPFS interstellar literature system through the index of the data D, decrypting to obtain the original data, and enabling the data of the updated user A in the contract to be successfully accessed and operated by other people, so that the corresponding index value of the data is increased by 1 in the intelligent contract.
As shown in fig. 1, the data sharing access control method based on blockchain and user confidence in this embodiment mainly includes the following steps:
storing the encrypted data of the user into an IPFS, and uploading the storage index and the data information to a block chain to realize safe storage of the data;
combining the access control strategy based on the attribute with the intelligent contract, and realizing the processes of user identity information registration, user data index uploading, data access control strategy formulation, data sharing key acquisition and the like so as to realize fine-granularity dynamic access control;
and establishing a user credibility assessment mechanism, and realizing a collection process and a calculation process of user credibility index values in a user data sharing process through intelligent contracts so as to achieve the purpose of monitoring user behaviors in a system.
The personal information of the user selected in this embodiment includes an ethernet account address, a public key, a name, an identity ID, an affiliated institution code, and an affiliated item group number. The user credibility index comprises a functional index F, a reliable index R and a safety index S, wherein F comprises 3 behavior characteristics: f1 user uploading data number, f2 data related proving number and f3 uploading data accessed times, wherein R comprises 2 behavior characteristics: r1, uploading data error number (negative), r2, correcting other error number, and S comprises 1 behavior characteristic: s1 number of unauthorized accesses (negative).
The embodiment provides a specific implementation manner for determining an evaluation index and a characteristic weight in the index by adopting a fuzzy analytic hierarchy process, as shown in fig. 2, the process includes:
step 1: taking the characteristic weight under the function index as an example: the feature matrix after normalization of the related features of the functional index is E F =[e 1 ,...,e v ]V is the number of characteristics under the index, and the characteristics under the same index are compared in pairs according to importance by using the following formula to obtain an initial judgment matrix EQ= [ EQ ] ij ] v×v
Step 2: the initial judgment matrix is converted into a fuzzy judgment consistent matrix Q= [ Q ] by using the following formula ij ] v×v
q ij =(q i -q j )/2v+0.5
Step 3: the weight of each characteristic under the function index F is calculated by using the following formula to obtain a weight vector w F =[w f1 ,w f2 ,w f3 ]。
The same steps are adopted to obtain the characteristic weight vectors under the reliable index and the safety index, and finally the three characteristics of the functional index, the reliable index and the safety index are used as the characteristics under the user credibility, the importance of the three characteristics is compared with each other, and the steps are repeated to obtain the weights of all the indexes.
The embodiment provides a specific implementation manner of user confidence calculation, as shown in fig. 3, the process includes:
step 1: establishing a user behavior feature matrix BC= [ BC ] ij ] n×m
Step 2: normalizing matrix BC to obtain the value of [0,1 ]]Feature matrix e= [ E ] within the range ij ] n×m Wherein n is the number of indexes, and m is the maximum value of the number of behavior characteristics in the indexes;
step 3: characteristic weight vector w of function index F F =[w f1 ,w f2 ,w f3 ]Characteristic weight vector w of reliability index R R =[w r1 ,w r2 ]Characteristic weight vector w of safety index S S =[w s1 ]And index weight vector w I =[w F ,w R ,w S ]And calculating the user according to the following formula by the normalized behavior feature matrix. Confidence value Credit:
wherein,belonging to w F 、w R And w S Representing the weight of the negative characteristic. />Belonging to w I And the index weight of the index where the negative characteristic is located is represented. Cr (Cr) Pt And Cr (V) Ng The positive confidence level and the negative confidence level are respectively calculated by the following formula:
wherein w is c Is the weight of the characteristic e ij Is a normalized user behavior characteristic value, and lambda is a coefficient set for unauthorized access behavior of users in an auditing system. After the unauthorized access behavior caused by misoperation of the user occurs, the coefficient can restore the user credibility to a normal level along with normal operation of the user, and the calculation formula is as follows:
wherein n is ij Indicating that the user makes a negative behavioral characteristic e ij Is a number of times (1). bn ij Block number indicating when current negative activity occurs, bpre indicating when current negative activity e ij Block number where the previous negative action of (a) was located.
While the foregoing is directed to embodiments, aspects and advantages of the present invention, other and further details of the invention may be had by the foregoing description, it will be understood that the foregoing embodiments are merely exemplary of the invention, and that any changes, substitutions, alterations, etc. which may be made herein without departing from the spirit and principles of the invention.

Claims (9)

1. The data sharing access control method based on the blockchain and the user credibility is characterized by comprising the following steps of:
s1: the user A uploads personal information to the blockchain for registration, and after successful registration, the intelligent contract automatically initializes the user-related reliability index value, namely, each index value is set to 0;
s2: the user A stores the data D encrypted by the symmetric key sm_key on the IPFS interstellar literature system, and indexes the obtained data I D Using the user A's own public key pk b A encrypted symmetric key pk b Information of_A (sm_key) and data is uploaded to a blockchain, and after the uploading is successful, the intelligent contract updates a credit index value related to data uploading operation of a user, namely the corresponding index value is self-increased by 1 in the intelligent contract;
s3: a user A formulates an access control strategy of the data D based on attributes;
s4: the user B applies for obtaining the decryption key of the data D, judges whether the user B has access rights according to the access control policy rule of the data D in the intelligent contract, updates the user credibility index value when the user B does not pass the access control policy judgment, namely, the user B does not pass the access control policy, namely, the user B is an override operation, and the user corresponding index value for the override operation is self-increased by 1 in the intelligent contract; then, carrying out calculation on the user credit index value and the index weight to obtain a credit value of the user at the moment, and storing the current override access time and the final user credit value into a user real-time credit array in the intelligent contract;
s5: the user B judged by the access control strategy creates an access application message of the data D through the intelligent contract;
s6: after receiving the message of the user B, the user A confirms whether to endow the user B with the access right of the data D according to the current credit value and the application information of the user B;
s7: if the user A agrees to give the user B access authority, the proxy re-encryption algorithm is used for countingThe symmetric encryption key sm_key according to D is converted into the public key pk of the user B b B encrypted symmetric key pk b B (sm_key), creating a reply message by means of a smart contract, decrypting the key pk b B (sm_key) and other authorization information are replied to the user B through a reply message;
s8: after receiving the response message from user A, user B uses its private key pk v And B, decrypting to obtain a symmetric encryption key sm_key of the data D, downloading the data in the IPFS interstellar literature system through the index of the data D, decrypting to obtain the original data, and enabling the data of the updated user A in the contract to be successfully accessed and operated by other people, so that the corresponding index value of the data is increased by 1 in the intelligent contract.
2. The method for controlling data sharing access based on blockchain and user credibility according to claim 1, wherein the user personal information uploaded by the user during registration at least comprises ethernet account address, public key, name, identity ID, belonging organization code and belonging item group number.
3. The method for controlling data sharing access based on blockchain and user credibility according to claim 1, wherein the user credibility index is divided into two layers, the first layer comprises a functional index F, a reliable index R and a safety index S, the second layer is the characteristic of each first layer after the index is refined, the functional index F at least comprises a user uploading data number F1, a data correlation proof number F2 and uploading data accessed number F3, the reliable index R at least comprises an uploading data error number R1 and a correction other person error number R2, and the safety index S at least comprises an override access number S1.
4. The method for controlling data sharing access based on blockchain and user confidence according to claim 3, wherein the process of calculating the user confidence index value and the index weight to obtain the confidence value of the user at this time comprises:
step 1: establishing a user behavior feature matrix BC= [ BC ] ij ] n×m
Step 2: normalizing matrix BC to obtain the value of [0,1 ]]Feature matrix e= [ E ] within the range ij ] n×m Wherein n is the number of indexes, and m is the maximum value of the number of behavior characteristics in the indexes;
step 3: obtaining characteristic weight vector w of function index F by using fuzzy analytic hierarchy process F =[w f1 ,w f2 ,w f3 ]Characteristic weight vector w of reliability index R R =[w r1 ,w r2 ]Characteristic weight vector w of safety index S S =[w s1 ]And index weight vector w I =[w F ,w R ,w S ]。
Step 4: the user confidence value Credit is calculated according to the following formula:
wherein bc is as follows ij A representation; w (w) f1 To represent the vector of the user's uploaded data number f1, w f2 To represent the vector of data-dependent proof numbers f2, w f3 A vector representing the number of times the uploaded data is accessed f 3; w (w) r1 Vector for uploading data error number r1, w r2 A vector representing the corrected others error number r 2; w (w) s1 A vector representing the number of unauthorized accesses s 1;respectively belonging to w in the second layer F 、w R And w S The weight of the negative characteristic; />Index weights representing the negative of the second layer characteristics at the first layer index; cr (Cr) Pt For positive confidence, cr Ng Is a negative confidence level.
5. A zone-based method according to claim 4The data sharing access control method of block chain and user credibility is characterized in that the positive credibility Cr Pt Expressed as:
negative confidence level Cr Ng Expressed as:
wherein,for normalized positive user behavior feature values, < +.>Index weight indicating the front property in the second layer property in the first layer index, ++>Respectively belonging to w in the second layer F 、w R And w S The weight of the front characteristic is represented in the formula, and lambda is the user override access behavior coefficient; />And the normalized positive user behavior characteristic value.
6. The method for controlling data sharing access based on blockchain and user confidence according to claim 5, wherein the user override access behavior coefficient λ is expressed as:
wherein n is ij Indicating that the user makes a negative behavioral characteristic e ij Is a number of times (1); bn ij Block number indicating when current negative activity occurs, bpre indicating when current negative activity e ij Block number where the previous negative action of (a) was located.
7. The data sharing access control method based on blockchain and user confidence according to claim 4, wherein the process of obtaining the characteristic weight corresponding to the index by using the fuzzy analytic hierarchy process is as follows:
step 1: the feature matrix after normalization of the related features of the functional index is E F =[e 1 ,...,e v ]V is the number of characteristics under the index, and the characteristics under the same index are compared in pairs according to importance to obtain an initial judgment matrix EQ= [ EQ ] ij ] v×v
Step 2: converting the initial judgment matrix into a fuzzy judgment consistent matrix Q= [ Q ] ij ] v×v
Step 3: calculating the weight of each characteristic under each index according to the fuzzy judgment consistency matrix, thereby obtaining a weight vector;
wherein eq ij A parameter indicating whether the ith characteristic is more important than the jth characteristic in a certain index, and if the ith characteristic is more important than the jth characteristic, then eq ij =1, if the ith characteristic is not as important as the jth characteristic, eq ij =0, otherwise eq ij =0.5;q ij And represents the ambiguity judgment value between the ith characteristic and the jth characteristic in a certain index.
8. The method for data sharing access control based on blockchain and user confidence according to claim 7, wherein the ambiguity q between the ith and jth characteristics in a certain index ij Expressed as: q ij =(q i -q j )/2v+0.5。
9. The data sharing access control based on blockchain and user confidence of claim 7The method is characterized in that the weight of the characteristic i under the index n is expressed as follows:
CN202111554168.3A 2021-12-17 2021-12-17 Data sharing access control method based on blockchain and user credibility Active CN114329526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111554168.3A CN114329526B (en) 2021-12-17 2021-12-17 Data sharing access control method based on blockchain and user credibility

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111554168.3A CN114329526B (en) 2021-12-17 2021-12-17 Data sharing access control method based on blockchain and user credibility

Publications (2)

Publication Number Publication Date
CN114329526A CN114329526A (en) 2022-04-12
CN114329526B true CN114329526B (en) 2024-03-26

Family

ID=81052197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111554168.3A Active CN114329526B (en) 2021-12-17 2021-12-17 Data sharing access control method based on blockchain and user credibility

Country Status (1)

Country Link
CN (1) CN114329526B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417482A (en) * 2020-11-25 2021-02-26 中国传媒大学 Data sharing system, device and method based on authority access mechanism
CN112768018A (en) * 2020-12-15 2021-05-07 扬州大学 Electronic medical record security sharing method based on integrated credit evaluation intelligent contract
CN113553612A (en) * 2021-06-29 2021-10-26 福建师范大学 Privacy protection method based on mobile crowd sensing technology
CN113595971A (en) * 2021-06-02 2021-11-02 云南财经大学 Block chain-based distributed data security sharing method, system and computer readable medium
CN113743955A (en) * 2021-08-06 2021-12-03 广西综合交通大数据研究院 Food material traceability data security access control method based on intelligent contract

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10027676B2 (en) * 2010-01-04 2018-07-17 Samsung Electronics Co., Ltd. Method and system for multi-user, multi-device login and content access control and metering and blocking
US20190258818A1 (en) * 2016-02-08 2019-08-22 Consumerinfo.Com, Inc. Smart access control system for implementing access restrictions of regulated database records based on machine learning of trends

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417482A (en) * 2020-11-25 2021-02-26 中国传媒大学 Data sharing system, device and method based on authority access mechanism
CN112768018A (en) * 2020-12-15 2021-05-07 扬州大学 Electronic medical record security sharing method based on integrated credit evaluation intelligent contract
CN113595971A (en) * 2021-06-02 2021-11-02 云南财经大学 Block chain-based distributed data security sharing method, system and computer readable medium
CN113553612A (en) * 2021-06-29 2021-10-26 福建师范大学 Privacy protection method based on mobile crowd sensing technology
CN113743955A (en) * 2021-08-06 2021-12-03 广西综合交通大数据研究院 Food material traceability data security access control method based on intelligent contract

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control;HONG XU 等;IEEE ACCESS;20200501;第8卷;第87552-87561页 *
SCUC-DSAC:A data sharing access control model based on smart contract and user credit.2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).2022,第135-140页. *
基于信任度的跨域安全访问控制模型研究;彭维平;刘雪贞;郭海儒;宋成;;计算机应用研究;20160630;33(06);第197-202页 *
基于区块链和用户信用度的访问控制模型;王海勇;潘启青;郭凯璇;;计算机应用;20201231(06);第128-133页 *
基于区块链的个人隐私数据保护研究;王益帅;知网研学;20220510;全文 *
基于区块链的数据共享关键技术研究;王利;中国优秀硕士学位论文全文数据库 信息科技辑;20231015;文章第4章 *

Also Published As

Publication number Publication date
CN114329526A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
AU2017269736B2 (en) Multiple-link cryptologic blockchain
Aujla et al. SecSVA: secure storage, verification, and auditing of big data in the cloud environment
CN110321721B (en) Block chain-based electronic medical record access control method
Xu et al. An efficient privacy‐enhanced attribute‐based access control mechanism
US11194919B2 (en) Cognitive system for managing consent to user data
US11734259B2 (en) Anonymous database rating update
Meva Issues and challenges with blockchain: a survey
WO2019226580A1 (en) Blockchain-anchored smart documents
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
US11949794B2 (en) Data anonymization of blockchain-based processing pipeline
CN110933093A (en) Block chain data sharing platform and method based on differential privacy protection technology
CN110941856A (en) Data differential privacy protection sharing platform based on block chain
AU2021210206A1 (en) Index structure for blockchain ledger
US20210297264A1 (en) Enabling consensus in distributed transaction processing systems
US11475365B2 (en) Verification of stochastic gradient descent
AU2021300620A1 (en) Permissioned eventing in a decentralized database
CN111444264A (en) Data security sharing method based on block chain
US11856092B2 (en) Limiting data availability on distributed ledger
US11924348B2 (en) Honest behavior enforcement via blockchain
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
CN114329526B (en) Data sharing access control method based on blockchain and user credibility
Li et al. Improved efficient privacy-preserving certificateless provable data possession Scheme for cloud storage
US20230087602A1 (en) Privacy-preserving state reference
US11645074B2 (en) Computation and prediction of linked access
CHEN et al. BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant