CN114978531B - Deep learning-oriented data credible traceability marking method and system - Google Patents
Deep learning-oriented data credible traceability marking method and system Download PDFInfo
- Publication number
- CN114978531B CN114978531B CN202210512826.0A CN202210512826A CN114978531B CN 114978531 B CN114978531 B CN 114978531B CN 202210512826 A CN202210512826 A CN 202210512826A CN 114978531 B CN114978531 B CN 114978531B
- Authority
- CN
- China
- Prior art keywords
- data
- processed
- processing
- digital signature
- digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000012804 iterative process Methods 0.000 claims abstract description 17
- 238000013135 deep learning Methods 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 10
- 238000010276 construction Methods 0.000 claims description 3
- 230000008520 organization Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a deep learning-oriented data credible traceability marking method and a system, wherein the method comprises the following steps: receiving data to be processed; carrying out iterative processing on the data to be processed and carrying out digital signature on the processing result data by using a digital certificate; a digital signature chain of an iterative process from source data to final processing result data is established based on the obtained plurality of digital signatures. The invention adopts the credible traceability chain formed by the digital signature to finish credible traceability of the iterative process of data processing, can avoid the performance loss caused by adopting the distributed block chain scheme, and is more suitable for the application scene of rapid iterative processing of data required by deep learning.
Description
Technical Field
The invention relates to the technical field of big data, in particular to a data credible tracing marking method and system for deep learning.
Background
With the maturity of the blockchain technology, the blockchain technology is used as a general digital evidence chain solution, the blockchain technology can be used for deeply learning data credible tracing, and the registration of the blockchain can ensure the credibility of data iteration, but has the defect that the retrieval speed is slow and the history blocks need to be traversed during tracing.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a deep learning-oriented data credible traceability marking method and system, which avoid performance loss caused by adopting a distributed block chain scheme and are more suitable for application scenes of rapid iterative processing of data required by deep learning.
The technical scheme adopted for solving the technical problems is as follows: the data credible tracing marking method facing deep learning comprises the following steps:
receiving data to be processed;
Carrying out iterative processing on the data to be processed and carrying out digital signature on the processing result data by using a digital certificate;
A digital signature chain of an iterative process from source data to final processing result data is established based on the obtained plurality of digital signatures.
After receiving the data to be processed, the method further comprises the step of verifying the digital signature attached to the data to be processed to confirm the credibility of data input.
The method further comprises the step of receiving the digital certificate which is issued by a central digital certificate issuing organization and faces deep learning before receiving the data to be processed.
The iterative processing of the data to be processed and the digital signature of the processing result data by using the digital certificate are specifically as follows:
performing iterative processing on the data to be processed to obtain processing result data;
Combining the digital signature of the data to be processed and the processing result data into basic information;
Digitally signing said base information using said digital certificate.
The data credible tracing marking method facing deep learning further comprises the following steps: and sequentially verifying through the digital signature chain to retrospectively confirm the credibility of the whole data processing iterative process.
The technical scheme adopted for solving the technical problems is as follows: the data credible traceability marking system facing deep learning comprises:
The first receiving module is used for receiving data to be processed;
the processing signature module is used for carrying out iterative processing on the data to be processed to obtain processing result data, and carrying out digital signature on the processing result data by using a digital certificate;
And the digital signature chain construction module is used for establishing a digital signature chain of an iterative process from the source data to the final processing result data based on the obtained plurality of digital signatures.
The deep learning-oriented data credible traceability marking system further comprises: and the verification module is used for verifying the digital signature attached to the data to be processed so as to confirm the credibility of the data input.
The deep learning-oriented data trusted traceability marking system further comprises a second receiving module, wherein the second receiving module is used for receiving the deep learning-oriented digital certificate issued by the central digital certificate issuing institution.
The processing signature module comprises:
the processing unit is used for carrying out iterative processing on the data to be processed to obtain processing result data;
the merging unit is used for merging the digital signature of the data to be processed and the processing result data into basic information;
and the signature unit is used for digitally signing the basic information by using the digital certificate.
The deep learning-oriented data credible traceability marking system further comprises: and the verification module is used for sequentially verifying through the digital signature chain to retrospectively confirm the credibility of the whole data processing iterative process.
Advantageous effects
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects: the invention adopts the credible traceability chain formed by the digital signature to finish credible traceability of the iterative process of data processing, can avoid the performance loss caused by adopting the distributed block chain scheme, and is more suitable for the application scene of rapid iterative processing of data required by deep learning. According to the invention, the digital signature is carried out by attaching the digital signature of the input data and the content of the output data together, so that a complete digital signature chain from the input data to the output data can be formed, and the quick verification can be completed by traversing the digital signature chain during the trusted traceability verification.
Drawings
Fig. 1 is a flow chart of a first embodiment of the present invention.
Detailed Description
The application will be further illustrated with reference to specific examples. It is to be understood that these examples are illustrative of the present application and are not intended to limit the scope of the present application. Furthermore, it should be understood that various changes and modifications can be made by one skilled in the art after reading the teachings of the present application, and such equivalents are intended to fall within the scope of the application as defined in the appended claims.
The first embodiment of the invention relates to a deep learning-oriented data credible traceability marking method, which comprises the following steps: receiving data to be processed; carrying out iterative processing on the data to be processed and carrying out digital signature on the processing result data by using a digital certificate; a digital signature chain of an iterative process from source data to final processing result data is established based on the obtained plurality of digital signatures. As shown in fig. 1, specifically:
Step 1, issuing digital certificates required to be used by each data processing module facing deep learning by a central digital certificate issuing authority. That is, after this step, each data processing module can obtain a digital certificate dedicated to each data processing module.
And 2, the data processing module receives the data to be processed, and after receiving the data to be processed, verifies the digital signature of the data to be processed to confirm the input credibility of the data to be processed.
And step 3, the data processing module carries out iterative processing on the input data and carries out digital signature on the processing result data by using the digital certificate of the data processing module. In the step, firstly, the data to be processed is subjected to iterative processing to obtain processing result data, and then when digital signature is carried out, the step comprises the steps of 3a, the digital signature of the data to be processed and the processing result data are added together to obtain basic information needing to be subjected to digital signature; step 3b, the data processing module digitally signs using a digital certificate issued by a central digital certificate authority.
And 4, after each data processing module is based on the processing flow of the step 3, a digital signature chain of an iterative process from the source data to the final processing result data can be established.
And step 5, the credibility of the whole data processing iterative process can be retrospectively confirmed by sequentially verifying the digital signature chain.
It is easy to find that the invention adopts the credible traceability chain formed by the digital signature to finish credible traceability of the data processing iterative process, can avoid the performance loss caused by adopting the distributed block chain scheme, and is more suitable for the application scene of data rapid iterative processing required by deep learning. According to the invention, the digital signature is carried out by attaching the digital signature of the input data and the content of the output data together, so that a complete digital signature chain from the input data to the output data can be formed, and the quick verification can be completed by traversing the digital signature chain during the trusted traceability verification.
The second embodiment of the invention relates to a deep learning-oriented data credible traceability marking system, which comprises: the first receiving module is used for receiving data to be processed; the processing signature module is used for carrying out iterative processing on the data to be processed to obtain processing result data, and carrying out digital signature on the processing result data by using a digital certificate; and the digital signature chain construction module is used for establishing a digital signature chain of an iterative process from the source data to the final processing result data based on the obtained plurality of digital signatures.
The deep learning-oriented data credible traceability marking system further comprises: and the verification module is used for verifying the digital signature attached to the data to be processed so as to confirm the credibility of the data input.
The deep learning-oriented data trusted traceability marking system further comprises a second receiving module, wherein the second receiving module is used for receiving the deep learning-oriented digital certificate issued by the central digital certificate issuing institution.
The processing signature module comprises: the processing unit is used for carrying out iterative processing on the data to be processed to obtain processing result data; the merging unit is used for merging the digital signature of the data to be processed and the processing result data into basic information; and the signature unit is used for digitally signing the basic information by using the digital certificate.
The deep learning-oriented data credible traceability marking system further comprises: and the verification module is used for sequentially verifying through the digital signature chain to retrospectively confirm the credibility of the whole data processing iterative process.
Claims (4)
1. The deep learning-oriented data credible traceability marking method is characterized by comprising the following steps of:
receiving data to be processed;
The data to be processed is subjected to iterative processing, and digital certificates are used for carrying out digital signature on the processing result data, specifically:
performing iterative processing on the data to be processed to obtain processing result data;
Combining the digital signature of the data to be processed and the processing result data into basic information;
Digitally signing the base information using the digital certificate;
Establishing a digital signature chain of an iterative process from source data to final processing result data based on the obtained digital signatures;
sequentially verifying through the digital signature chain to retrospectively confirm the credibility of the whole data processing iterative process;
The method further comprises the step of receiving the digital certificate which is issued by a central digital certificate issuing organization and faces deep learning before receiving the data to be processed.
2. The deep learning oriented data credible traceability marking method according to claim 1, further comprising verifying a digital signature attached to the data to be processed to confirm credibility of data input after receiving the data to be processed.
3. The deep learning-oriented data credible traceability marking system is characterized by comprising:
The first receiving module is used for receiving data to be processed;
The processing signature module is used for carrying out iterative processing on the data to be processed to obtain processing result data, and carrying out digital signature on the processing result data by using a digital certificate; the processing signature module comprises:
the processing unit is used for carrying out iterative processing on the data to be processed to obtain processing result data;
the merging unit is used for merging the digital signature of the data to be processed and the processing result data into basic information;
a signature unit for digitally signing the base information using the digital certificate;
The digital signature chain construction module is used for establishing a digital signature chain of an iterative process from source data to final processing result data based on the obtained digital signatures;
The verification module is used for sequentially verifying through the digital signature chain to retrospectively confirm the credibility of the whole data processing iterative process;
And the second receiving module is used for receiving the digital certificate which is issued by the central digital certificate issuing organization and is oriented to deep learning.
4. The deep learning oriented data trusted traceability marking system of claim 3, further comprising:
and the verification module is used for verifying the digital signature attached to the data to be processed so as to confirm the credibility of the data input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210512826.0A CN114978531B (en) | 2022-05-11 | 2022-05-11 | Deep learning-oriented data credible traceability marking method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210512826.0A CN114978531B (en) | 2022-05-11 | 2022-05-11 | Deep learning-oriented data credible traceability marking method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114978531A CN114978531A (en) | 2022-08-30 |
CN114978531B true CN114978531B (en) | 2024-04-30 |
Family
ID=82980789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210512826.0A Active CN114978531B (en) | 2022-05-11 | 2022-05-11 | Deep learning-oriented data credible traceability marking method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114978531B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5958051A (en) * | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
CN1547136A (en) * | 2003-12-08 | 2004-11-17 | 李 | Data once writing method and database safety management method based on the same method |
CN106254372A (en) * | 2016-08-31 | 2016-12-21 | 厦门天锐科技股份有限公司 | A kind of Multi Digital Signature method of ID-based cryptosystem mechanism |
CN110163006A (en) * | 2019-04-18 | 2019-08-23 | 阿里巴巴集团控股有限公司 | Signature verification method, system, device and equipment in a kind of piece of chain type account book |
CN111130795A (en) * | 2019-12-13 | 2020-05-08 | 浙商银行股份有限公司 | Multistage signature method based on block chain technology |
CN111355570A (en) * | 2020-02-24 | 2020-06-30 | 北京瑞友科技股份有限公司 | Trusted application network data tracing method and auditing method for software complex network |
CN112199736A (en) * | 2020-10-12 | 2021-01-08 | 南京邮电大学 | Ordered multi-signature method based on block chain |
CN112953978A (en) * | 2021-05-13 | 2021-06-11 | 众连智能科技有限公司 | Multi-signature authentication method, device, equipment and medium |
CN112989435A (en) * | 2021-03-26 | 2021-06-18 | 武汉深之度科技有限公司 | Digital signature method and computing device |
CN113382005A (en) * | 2021-06-10 | 2021-09-10 | 南京财经大学 | Traceable logistics method with privacy protection and traceable logistics system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10277608B2 (en) * | 2015-08-20 | 2019-04-30 | Guardtime Ip Holdings Limited | System and method for verification lineage tracking of data sets |
WO2022054079A1 (en) * | 2020-09-08 | 2022-03-17 | Iqreate Infotech Pvt Ltd | System for contextual and positional parameterized record building |
-
2022
- 2022-05-11 CN CN202210512826.0A patent/CN114978531B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5958051A (en) * | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
CN1547136A (en) * | 2003-12-08 | 2004-11-17 | 李 | Data once writing method and database safety management method based on the same method |
CN106254372A (en) * | 2016-08-31 | 2016-12-21 | 厦门天锐科技股份有限公司 | A kind of Multi Digital Signature method of ID-based cryptosystem mechanism |
CN110163006A (en) * | 2019-04-18 | 2019-08-23 | 阿里巴巴集团控股有限公司 | Signature verification method, system, device and equipment in a kind of piece of chain type account book |
CN111130795A (en) * | 2019-12-13 | 2020-05-08 | 浙商银行股份有限公司 | Multistage signature method based on block chain technology |
CN111355570A (en) * | 2020-02-24 | 2020-06-30 | 北京瑞友科技股份有限公司 | Trusted application network data tracing method and auditing method for software complex network |
CN112199736A (en) * | 2020-10-12 | 2021-01-08 | 南京邮电大学 | Ordered multi-signature method based on block chain |
CN112989435A (en) * | 2021-03-26 | 2021-06-18 | 武汉深之度科技有限公司 | Digital signature method and computing device |
CN112953978A (en) * | 2021-05-13 | 2021-06-11 | 众连智能科技有限公司 | Multi-signature authentication method, device, equipment and medium |
CN113382005A (en) * | 2021-06-10 | 2021-09-10 | 南京财经大学 | Traceable logistics method with privacy protection and traceable logistics system |
Non-Patent Citations (3)
Title |
---|
Target/clutter disentanglement using deep adversarial training on micro-Doppler signatures;L.Cifola 等;2019 16th European Radar Conference (EuRAD);20191004;全文 * |
基于签名链的关系查询认证方法;廖小林;中国优秀硕士学位论文全文数据库;20130315;全文 * |
大数据中若干安全和隐私保护问题研究;姚鑫等;中国博士学位论文全文数据库;20180615;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114978531A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112132292B (en) | Longitudinal federation learning data processing method, device and system based on block chain | |
CN111563041B (en) | Test case on-demand accurate execution method | |
CN109002474A (en) | A kind of data migration method and device | |
CN112417178B (en) | Document template definition-based on-chain contract processing method and device and electronic equipment | |
CN112347042A (en) | File uploading method and device, electronic equipment and storage medium | |
CN112134883B (en) | Method, device and related product for carrying out rapid authentication on trust relationship between nodes based on trusted computing | |
CN114978531B (en) | Deep learning-oriented data credible traceability marking method and system | |
CN102955739B (en) | A kind of method improving performance test script reuse rate | |
CN109522723B (en) | POC script generation method and device, electronic equipment and storage medium | |
CN114826768A (en) | Cloud vulnerability processing method applying big data and AI technology and AI analysis system | |
CN114168932A (en) | Method and device for realizing cross-row login based on block chain | |
CN110855441A (en) | Method, device and equipment for authenticating electronic identity and storage medium | |
CN113111125A (en) | Business evidence storage method based on block chain | |
CN114095179B (en) | Credible management method and system of industrial internet based on block chain | |
CN110021359B (en) | Method and device for removing redundancy of combined assembly result of second-generation sequence and third-generation sequence | |
CN111787059B (en) | Block tracking synchronization method and device, electronic equipment and computer storage medium | |
CN115265516A (en) | Transverse precision deviation testing method and system based on encryption plug-in | |
US11709959B2 (en) | Information processing apparatus and information processing method | |
CN204991130U (en) | A portable storage device of digital watermark for document is tracked | |
CN114090547A (en) | Data migration method and device, computer equipment and storage medium | |
CN110021342B (en) | Method and system for accelerating identification of variant sites | |
CN117150999B (en) | Method, device, terminal and medium for recording ECO implementation information by using redundant circuit | |
CN111225075A (en) | Configuration method and device for Internet of things directional access service | |
CN115049316B (en) | Digital management method for operation data | |
CN113992334B (en) | Storage method and verification method and device of equipment side data and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |