CN115296811B - Block chain-based data sharing utilization method, device and medium - Google Patents

Block chain-based data sharing utilization method, device and medium Download PDF

Info

Publication number
CN115296811B
CN115296811B CN202210676162.1A CN202210676162A CN115296811B CN 115296811 B CN115296811 B CN 115296811B CN 202210676162 A CN202210676162 A CN 202210676162A CN 115296811 B CN115296811 B CN 115296811B
Authority
CN
China
Prior art keywords
data
intelligent contract
party
blockchain
security detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210676162.1A
Other languages
Chinese (zh)
Other versions
CN115296811A (en
Inventor
刘齐军
谭林
尹海波
姚昱旻
杨征
王云丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Tianhe Guoyun Technology Co Ltd
Original Assignee
Hunan Tianhe Guoyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Tianhe Guoyun Technology Co Ltd filed Critical Hunan Tianhe Guoyun Technology Co Ltd
Priority to CN202210676162.1A priority Critical patent/CN115296811B/en
Publication of CN115296811A publication Critical patent/CN115296811A/en
Application granted granted Critical
Publication of CN115296811B publication Critical patent/CN115296811B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data sharing and utilizing method and system based on a block chain, wherein the method comprises the following steps: the block chain platform receives a data dictionary issued by a data storage party; after receiving the intelligent contract which is submitted by the data demand party and contains the data operation program, the blockchain platform carries out security detection on the received intelligent contract and deploys the received intelligent contract on each computing node after the security detection is passed; after receiving the trigger of executing the intelligent contract initiated by the data demand party, notifying a computing node where the data storage party is located to execute the intelligent contract through the blockchain platform, triggering a predictor to execute under the condition of intelligent contract security, starting a terminal process of a data source to execute the data operation program, forming blockchain consensus according to a computing result, and synchronizing the blockchain consensus to the computing node where the data demand party is located, so that data use is completed. The method has the advantages of simplicity, privacy leakage avoidance, high safety and reliability and the like.

Description

Block chain-based data sharing utilization method, device and medium
Technical Field
The present invention relates to the field of big data sharing technologies, and in particular, to a method, an apparatus, and a medium for sharing and utilizing data based on a blockchain.
Background
Data sharing is to enable users using different computers and different software in different places to read data of other people and perform various operations, calculation and analysis. The data can be scattered in all places of society, and the intelligent contract program of the trusted execution environment which is subjected to safety detection and is code-open is called and used when needed, and the data is used according to a certain rule and the like. In consideration of privacy issues or security issues, such as biosafety issues caused by biological data, enterprise security issues caused by industrial data obtained by a wrongdoer, etc., the data storage party may not wish to share or even share the usage data, resulting in failure to play a role of large data. Therefore, the problem to be solved is currently urgent if the sharing of data from different sources is advanced.
A blockchain is a chain database linked back and forth by multiple blocks of data that is commonly built and maintained between computing nodes in a distributed peer-to-peer network. Currently, blockchain technologies have fused many frontier technologies such as distributed network technologies, consensus algorithms, smart contract technologies, cryptographic algorithms, etc., which have non-tamper-resistant, value-unique, openness, privacy, etc. The blockchain technique is therefore the best solution to the multi-party involvement and the need to establish trust mechanisms.
However, in the prior art, in the manner of implementing data sharing based on blockchain, data collection is generally adopted and then the data is uplinked, and after the data is uplinked, each computing node has a copy of data, which is equivalent to that after desensitization, the data is directly disclosed to all blockchain computing nodes, which can cause problems of data privacy and security, especially for multiple-time and multi-source data, privacy leakage can be caused in the data sharing process.
As chinese patent application CN201810616957.7, a big data secure sharing method and system based on blockchain is disclosed, the scheme is that a data demand side broadcasts an intelligent contract containing reward information to a data provider through an open source user interface; when the data provider determines execution after determining payment, the data provider runs data collection codes sent by the data demand party and submits codes for providing data to the intelligent contract after determining that privacy is not exposed according to the calculation result, and miners execute the compiling process of the intelligent contract in the background, wherein compiling success indicates that the contract is established, and miners or data providers obtain payment. According to the scheme, the data is desensitized and then directly uplinked, the blockchain system is a distributed network, and after the data is uplinked, each computing node is provided with a copy of the data, so that a data collector can obtain very private details through a big data analysis means, and the privacy leakage problem is caused.
The Chinese patent application CN113271366A discloses a data sharing system based on blockchain and secure computation, in the scheme, a user node obtains a selected model and applied data resources through an application-approval mode to perform multiparty secure computation to realize the demands of users, the data sharing utilizes circulation between a model owned node and a data owned node and sends the result to the user node, and the data circulation on the computing model node cannot be ensured, so that the computing model cannot be ensured to be a wrought node, and the data cannot be ensured to be truly controllable and secure.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems existing in the prior art, the invention provides the block chain-based data sharing utilization method, the device and the medium which are simple in implementation method, capable of avoiding privacy disclosure and high in safety and reliability, and can realize that shared data is invisible and data cannot go out of a domain.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
a data sharing utilization method based on block chain includes the steps:
the method comprises the steps that a block chain platform receives a data dictionary issued by a data storage party, wherein the data dictionary contains information of data owned by the data storage party;
after receiving the intelligent contracts submitted by the data demand party and containing the data operation program, the blockchain platform carries out security detection on the received intelligent contracts and deploys the received intelligent contracts on all computing nodes after the security detection is passed, wherein the data operation program is used for carrying out required operation on data owned by the data storage party according to the data dictionary;
after receiving the trigger of executing the intelligent contract initiated by the data demand party, notifying a target computing node where the data storage party is located to execute the intelligent contract through the blockchain platform, triggering a predictor to execute under the condition of intelligent contract security, starting a terminal process of a data source to execute the data operation program, forming blockchain consensus according to a computing result, and synchronizing the blockchain consensus to the computing node where the data demand party is located, so as to finish data use.
Further, the steps of security detecting the received smart contract and deploying the received smart contract at each computing node after the security detection is passed include:
after receiving the intelligent contract containing the data operation program, the computing node forwards the intelligent contract to the security detection node for security detection of the contract;
after the security detection is passed, the security detection node deploys the received intelligent contract into a blockchain platform;
synchronizing the deployed intelligent contracts to each computing node;
the compute node submitting the smart contract sends a smart contract deployment success notification.
Further, the step of triggering the prophetic machine to execute in the case of smart contract security includes:
the target computing node inquires whether the received intelligent contract is subjected to security detection on a chain;
if the received intelligent contract does not pass the security detection, terminating executing the current intelligent contract;
and triggering execution by the prophetic machine if the received intelligent contract passes the security detection.
Further, the executing the data operation program by the terminal process of the starting data source includes:
the predictor program starts the data gateway and transmits the data operation program to the terminal process of the data source through the data gateway;
and receiving the calculation result of the data operation program, which is executed on the returned original data by the terminal process of the data source, and sending the received calculation result through the data gateway.
Further, the sending the received calculation result through the data gateway includes: and controlling transmission of the original data according to whether the original data acquisition permission exists, wherein if the original data acquisition permission does not exist, the data gateway only authorizes to send out a calculation result, and if the original data acquisition permission exists, the calculation result and the original data are sent out together.
Further, the forming the blockchain consensus according to the calculation result and synchronizing to the calculation node where the data demander is located includes:
the obtained calculation result is uplink through a target calculation node to be used as a final calculation result of the intelligent contract, so that block chain consensus is formed;
synchronizing the obtained calculation result to a target calculation node initiating an intelligent contract through the blockchain consensus;
and sending a completion data use notification to the target computing node initiating the intelligent contract.
Further, the information of the data owned by the data storage party includes: data attribute name, data type, data storage length, whether the data may be empty, data attribute description.
Further, the method also comprises a data dictionary classifying and managing step, and specifically comprises the following steps:
receiving a data dictionary sent by a data storage party, and verifying the digital signature of the data storage party;
checking the information of the data dictionary, and determining a data storage party and a data type corresponding to the checked digital dictionary;
and generating a catalog list for the verified data dictionary and issuing the catalog list to provide the catalog list for a data demander to inquire.
A blockchain-based data sharing utilization device, comprising:
the system comprises a receiving module, a block chain platform, a data storage part and a data request part, wherein the receiving module is used for receiving a data dictionary issued by the data storage part and an intelligent contract submitted by the data request part and containing data operation programs, the data dictionary contains information of data owned by the data storage part, and the data operation programs are used for carrying out required operation on the data owned by the data storage part according to the data dictionary;
the system comprises a security detection node, a data processing module and a block chain platform, wherein the security detection node is used for performing security detection on the received intelligent contract after receiving the intelligent contract which is submitted by a data demand party and contains a data operation program, and deploying the received intelligent contract on each computing node after the security detection is passed;
and the intelligent contract execution module is used for notifying a target computing node where the data storage party is positioned to execute the intelligent contract through the blockchain platform after receiving the trigger of executing the intelligent contract initiated by the data demand party, triggering the predictor to execute under the condition of intelligent contract safety so as to start the terminal process of the data source to execute the data operation program, forming blockchain consensus according to the computing result and synchronizing the blockchain consensus to the computing node where the data demand party is positioned, and completing data use.
A computer readable storage medium storing a computer program which when executed performs a method as described above.
Compared with the prior art, the invention has the advantages that:
1. the invention is based on a blockchain system structure, adopts a distributed data cross-domain utilization mode, realizes data sharing through the release of a data dictionary, the safety detection and deployment of an intelligent contract containing a data operation program, the execution of the intelligent contract and the execution of a data use program, a data storage party does not need to send out data, the data storage party can only see the data dictionary but can not see actual data, meanwhile, the data storage party can analyze the original data to obtain a calculation result, and the data operation is carried out in a controllable domain of the data storage party.
2. By storing the data dictionary on the blockchain, compared with directly uploading the data, the method and the device can be beneficial to protecting the privacy security of the original data, avoiding data leakage, being beneficial to the acquisition of all computing nodes and security detection nodes which access the blockchain, and being convenient for a data gateway to intercept the data leakage.
3. According to the invention, the intelligent contract is subjected to safety detection by adopting the safety detection node, and the intelligent contract can be deployed behind the safety detection node, so that the possibility of artificial disfigurement can be eliminated, and the safety and reliability of data sharing are further improved.
4. According to the invention, the data security gateway is further added to the data storage side, the original data is prevented from outflow through the data security gateway, and simultaneously, the authorized original data is reserved for the user demand of the original data to be issued outwards, so that the large-scale data can be prevented from being leaked under the unauthorized condition.
Drawings
Fig. 1 is a schematic flow chart of an implementation of a data sharing method based on a blockchain in the present embodiment.
Fig. 2 is a schematic diagram of the deployment of a smart contract in a specific application embodiment of the present invention.
Fig. 3 is a schematic diagram of the present invention for implementing data sharing utilization in a specific application embodiment.
Detailed Description
The invention is further described below in connection with the drawings and the specific preferred embodiments, but the scope of protection of the invention is not limited thereby.
As shown in fig. 1, the data sharing and utilizing method based on the blockchain in this embodiment includes the following steps:
s01, a block chain platform receives a data dictionary issued by a data storage party, wherein the data dictionary contains information of data owned by the data storage party;
s02, after receiving the intelligent contracts which are submitted by the data demand side and contain the data operation program, the blockchain platform carries out security detection on the received intelligent contracts and deploys the received intelligent contracts on all computing nodes after the security detection is passed, and the data operation program is used for carrying out required operation on data owned by the data storage side according to the data dictionary;
s03, after receiving the trigger of executing the intelligent contract initiated by the data demand party, notifying a target computing node where the data storage party is located to execute the intelligent contract through the blockchain platform, and triggering a predictor to execute under the condition of intelligent contract safety so as to start a terminal process of the data source to execute a data operation program, forming blockchain consensus according to a computing result and synchronizing the blockchain consensus to the computing node where the data demand party is located, thereby completing data use.
The embodiment is based on a blockchain architecture, and realizes data sharing by adopting a distributed data cross-domain utilization mode and sequentially passing through three parts of a data dictionary issuing process, intelligent contract safety detection and deployment including a data operation program, intelligent contract execution and data use program execution, compared with the traditional data collection sharing utilization mode, the original data can be effectively protected from being separated from an original storage domain, the gathering party is prevented from combining multi-source data to realize privacy snooping, the permanent benefit of the data storage party on data assets is protected, and the data availability invisible and data non-domain output are truly realized. Meanwhile, a trust basis of data circulation in the field of data elements is constructed based on a block chain architecture, and a method for carrying out security detection on intelligent contracts is adopted, so that the trust problem of a data storage party on a data utilization computing program (data operation program) of a data demand party can be solved, and the trust comprises the following steps: protection of private data, protection of original data (avoiding malicious disclosure of data by a data utilization computing program, unintended vulnerability disclosure or destruction of data, etc.).
In this embodiment, the data storage side actively issues the data dictionary to the blockchain platform, and the data dictionary includes the header or the column name of the data record, the attribute of the data record, and the like. In a specific application embodiment, the information of the data owned by the data storage party may specifically include: the data attribute name, the data type, the data storage length, whether the data is possibly empty, the data attribute description and the like, so that a data demand party can know the structure, the type and the data attribute condition description of the data owned by the data storage party, and the data demand party/data using party can develop a program of the data analysis/data model without knowing the original data. The specific content and format of the data dictionary can be configured according to actual requirements.
The data storage party is an object storing data, and is not necessarily a data ownership party, for example, a large amount of hospital physical examination data or health medical data is stored in a medical institution, and the data is only used as a study of the medical institution.
According to the embodiment, the data dictionary is stored on the blockchain, compared with the direct data uplink, the method and the device can be beneficial to protecting the privacy security of original data and avoiding data leakage, can be beneficial to acquiring all computing nodes and security detection nodes which access the blockchain, and can be convenient for a data gateway to intercept data leakage.
In this embodiment, the step of performing security detection on the received smart contract in step S02 and deploying the received smart contract at each computing node after the security detection is passed includes:
s201, after receiving the intelligent contract containing the data operation program, the computing node forwards the intelligent contract to the security detection node for security detection of the contract;
s202, after the security detection is passed, the security detection node deploys the received intelligent contract into a blockchain platform;
s203, synchronizing the deployed intelligent contracts to all computing nodes;
s204, the computing node submitting the intelligent contract sends an intelligent contract deployment success notification.
In this embodiment, a blockchain database system is commonly maintained for multiple computing nodes, as shown in fig. 2, where the blockchain database system includes a class of functional nodes for security detection functions, that is, security detection nodes, through which an intelligent contract program is deployed. The method comprises the steps that a data demand party or a data user develops an intelligent contract program according to a data dictionary in advance, programs are written in remote data (data owned by a data storage party) to operate, namely data operation programs, the data operation programs are packaged in the developed intelligent contracts to form intelligent contracts containing the data operation programs, the intelligent contracts are submitted to a blockchain platform through a terminal, after receiving the intelligent contract programs (the intelligent contracts with the data operation programs) by a computing node in the blockchain platform, the intelligent contract programs are forwarded to a security detection node to conduct contract security detection, after the security detection is passed, the security detection node deploys the intelligent contracts to the blockchain platform, the deployed intelligent contracts are resynchronized to all computing nodes, and finally the computing node submitting the intelligent contracts (namely the computing node where the data demand party is located) sends deployment success notification through the terminal, and the intelligent contract deployment is completed.
In this embodiment, step S03 includes the steps of triggering the predictor to execute in case of security of the smart contract:
s301, inquiring whether the received intelligent contract is subjected to security detection or not by the target computing node on the chain;
s302, if the received intelligent contract does not pass the security detection, terminating executing the current intelligent contract;
s303, triggering execution by the predictor if the received intelligent contract passes the security detection.
The prophetic machine is a program body connected with the intelligent contract, can play the role of connecting the intelligent contract chain up and down, and solves the limitation that the intelligent contract is difficult to directly communicate with the data under the chain. According to the method, the device and the system, the operation of the data is performed by triggering the intelligent combination on the data storage side, so that the original data can be effectively protected from being separated from the original storage domain, the collection side is prevented from combining the multi-source data to realize privacy snooping, meanwhile, the safety detection is carried out on the intelligent contract by adopting the safety detection node, the intelligent contract can be deployed after the safety detection, the possibility of artificial disfigurement can be eliminated, and the safety and reliability of data sharing are further improved.
In this embodiment, the executing the data operation program by the terminal process for starting the data source in step S03 includes:
s311, starting a data gateway by the predictor program, and transmitting a data operation program to a terminal process of a data source through the data gateway;
s312, receiving the original data returned by the inquiry of the terminal process of the data source to the data source database, receiving the calculation result of the data operation program of the terminal process of the data source on the returned original data, and sending the received calculation result through the data gateway.
According to the embodiment, the data security gateway is added to the data storage side on the basis of performing security detection on the intelligent contract by adopting the security detection node, the original data is prevented from flowing outwards by the data security gateway, meanwhile, authorized original data is reserved for user requirements requiring the original data to be issued outwards, large-scale data leakage under the unauthorized condition can be avoided, the security and reliability of data sharing are ensured to the greatest extent, and the possibility of artificial dislike is eliminated.
The step S312 of the present embodiment sends the received calculation result through the data gateway, including: and controlling transmission of the original data according to whether the original data acquisition permission exists, wherein if the original data acquisition permission does not exist, the data gateway only authorizes to send out a calculation result, and if the original data acquisition permission exists, the calculation result and the original data are sent out together. By the method, a channel can be reserved for data authorization outgoing, if a data storage party agrees to send out the data, a data user can obtain the data, or the data is used as incoming data to carry out comprehensive analysis with related data of other storage parties, otherwise, only the calculation result is sent out.
In step S03 of this embodiment, forming a blockchain consensus according to the calculation result and synchronizing to the calculation node where the data demander is located includes:
s321, the obtained calculation result is uplink through a target calculation node to be used as a final calculation result of the intelligent contract, and a block chain consensus is formed;
s322, synchronizing the obtained calculation result to a target calculation node initiating the intelligent contract through block chain consensus;
s323, sending a completion data use notification to the target computing node initiating the intelligent contract.
According to the method, the execution of the under-chain propulsor is started through the intelligent contract after the on-chain triggering security detection, the propulsor acquires the authorized data through the data gateway to calculate, a calculation result is finally returned to the user node, the intelligent contract execution of the data and the operation of sharing and utilizing the original data are limited to the data storage side, and the security of the original data can be protected to the greatest extent.
The embodiment further includes a data dictionary classification management step in step S01, specifically including:
s101, receiving a data dictionary sent by a data storage party, and verifying a digital signature of the data storage party;
s102, checking information of the data dictionary, and determining a data storage party and a data type corresponding to the checked digital dictionary;
s103, generating a catalog list for the checked data dictionary and issuing the catalog list to provide the catalog list for a data demander to inquire.
The catalog list specifically comprises a data storage party, a data type, a data attribute name, a data storage length, whether the data is empty or not, data attribute description and other information corresponding to the data dictionary, and the catalog list can be specifically configured according to actual requirements.
In the data sharing process, the data user can only see the data dictionary and cannot see actual data, meanwhile, the data user can use the original data to analyze to obtain a calculation result (such as statistics, correlation analysis, calculation of a complex model and the like), so that the data can be used and invisible, meanwhile, the data storage side does not need to send out the data, the data operation is carried out in a controllable domain of the data storage side, the privacy security of the data can be effectively ensured, and the data of the data storage side is protected from being leaked. In the data sharing process, the data of the incoming data storage party is only used for comparing and analyzing with the data of the data storage party, so that the data generally exist in the memory and the data security of the data storage party is not affected.
In a specific application embodiment, a data sharing and utilizing center is adopted to classify and manage a data dictionary so as to facilitate a user to inquire and screen required data, and the detailed flow is as follows:
(1) The data storage party organizes the data to generate data dictionary information such as data type, data storage length and the like, and attaches a digital signature of the data dictionary information to send the data dictionary information to the data sharing utilization center;
(2) The data sharing utilization center firstly verifies the digital signature of the data storage party, then examines the related information of the data dictionary, and determines the data storage party and the data type of the examined digital dictionary;
(3) The data sharing utilization center generates a catalog list for the verified data dictionary and issues the catalog list for the data demander to inquire.
In a specific application embodiment, as shown in fig. 3, the detailed flow for implementing the data sharing and utilizing based on the blockchain by adopting the method of the present invention is as follows:
step 1: after the intelligent contract is deployed to the blockchain, a terminal of a data demand party initiates triggering of executing the intelligent contract;
step 2: the computing node informs the computing node where the data storage party is located to execute the intelligent contract through the blockchain platform, namely the target computing node executes the intelligent contract;
step 3: the target computing node inquires whether the intelligent contract passes the security detection on the chain, and if the intelligent contract does not pass the security detection, the intelligent contract is terminated;
step 4: under the condition that the intelligent combination is about safe, triggering and executing the prophetic machine;
step 5: the predictor program starts the data gateway and transmits the data using code (intelligent contract with data operation program) to the terminal process of the data source T through the data gateway;
step 6: executing the data using code by the terminal process of the data source T, and inquiring data from the data source T database;
step 7: obtaining returned original data, analyzing the original data by a data application program, and obtaining a calculation result;
step 8: returning the calculation result to the data gateway, and judging whether the calculation result is the original data by the data gateway;
step 9: if the original data acquisition permission does not exist, the data gateway intercepts the unauthorized data to pass through and only gives out the calculation result sent by authorization;
step 10: the calculation result is uplink through a target calculation node to be used as a final calculation result of the intelligent contract to form a block chain consensus;
step 11: and after the calculation result of the intelligent contract is synchronized to the calculation node initiating the intelligent contract through the block chain consensus, notifying the submitting terminal, and ending the data use process.
The invention ensures that the data cannot go out of the domain by using a three-layer protection mechanism:
(A) Trusted architecture of blockchain: the blockchain is maintained by multiple parties together, and the intelligent contract program is open-source for the multiple parties and can check and examine various vulnerabilities;
(B) Based on the security detection node, performing special security detection service, detecting whether codes of the original data are hidden and pulled, and providing a trusted authentication professional service for a data storage party;
(C) And a data security gateway is adopted to prevent unauthorized original data from being issued to the outside.
By using the three-layer protection mechanism, the consistent consensus and trust basis of all parties of the data reference to the whole technical framework can be ensured by using a basic system with trusted blockchain, and the blockchain intelligent contract opens sources for all parties to ensure that the program is detected and audited by multiple parties; by introducing special intelligent contract security detection nodes to detect intelligent contracts, the data use security of a data storage party can be further improved, the uplink and downlink intercommunication of a target computing node chain can be realized by combining a prediction mechanism of successful intelligent contract deployment, and the reliability of a data analysis result is ensured by carrying out a data analysis and computation process on the data storage party, so that the situation that the available data is invisible and the data cannot go out of the domain is truly realized; by setting the data security gateway, unauthorized data leakage process can be blocked.
The data sharing and utilizing device based on the block chain in the embodiment comprises the following components:
the system comprises a receiving module, a block chain platform, a data storage part and a data request part, wherein the receiving module is used for receiving a data dictionary issued by the data storage part and an intelligent contract submitted by the data request part and containing data operation programs, the data dictionary contains information of data owned by the data storage part, and the data operation programs are used for carrying out required operation on the data owned by the data storage part according to the data dictionary;
the system comprises a security detection node, a data processing module and a block chain platform, wherein the security detection node is used for performing security detection on the received intelligent contract after receiving the intelligent contract which is submitted by a data demand party and contains a data operation program, and deploying the received intelligent contract on each computing node after the security detection is passed;
and the intelligent contract execution module is used for notifying a target computing node where the data storage party is positioned to execute the intelligent contract through the blockchain platform after receiving the trigger of executing the intelligent contract initiated by the data demand party, triggering the predictor to execute under the condition of intelligent contract safety so as to start the terminal process of the data source to execute the data operation program, forming blockchain consensus according to the computing result and synchronizing the blockchain consensus to the computing node where the data demand party is positioned, and completing data use.
The data sharing and utilizing device based on the block chain in this embodiment corresponds to the data sharing and utilizing method based on the block chain, and will not be described in detail herein.
The present embodiment further includes a computer readable storage medium storing a computer program which when executed performs a method as described above.
The method and the device can be used for realizing data sharing and use under the scene of insufficient willingness of a large data storage party to share data in various industrial fields, ensure that the original data can be used and invisible and the data can not be used out of the domain, avoid the problem of data ownership right determination, and further facilitate the mining of the use value of the data.
The foregoing is merely a preferred embodiment of the present invention and is not intended to limit the present invention in any way. While the invention has been described with reference to preferred embodiments, it is not intended to be limiting. Therefore, any simple modification, equivalent variation and modification of the above embodiments according to the technical substance of the present invention shall fall within the scope of the technical solution of the present invention.

Claims (8)

1. The data sharing and utilizing method based on the block chain is characterized by comprising the following steps:
the blockchain platform receives a data dictionary issued by a data storage party, wherein the data dictionary contains information of data owned by the data storage party, and the information of the data owned by the data storage party comprises: any one or more of data attribute names, data types, data storage lengths, whether the data is possibly empty or not and data attribute descriptions;
after receiving the intelligent contracts submitted by the data demand party and containing the data operation program, the blockchain platform carries out security detection on the received intelligent contracts and deploys the received intelligent contracts on all computing nodes of the blockchain after the security detection is passed, wherein the data operation program is used for operating the data owned by the data storage party according to the data dictionary;
after receiving the triggering of executing the intelligent contract initiated by the data demand party, notifying a target computing node where the data storage party is located to execute the intelligent contract through the blockchain platform, triggering a predictor to execute under the condition of intelligent contract security, starting a terminal process of a data source to execute the data operation program, triggering the intelligent comprising the data operation program to execute at the data storage party, forming blockchain consensus according to a calculation result, and synchronizing to the computing node where the data demand party is located, so as to finish data use;
the terminal process for starting the data source executes the data operation program, which comprises the following steps:
the predictor starts a data gateway and transmits a data operation program to a terminal process of a data source through the data gateway;
and receiving the calculation result of the data operation program, which is executed on the returned original data by the terminal process of the data source, and sending the received calculation result through the data gateway.
2. The blockchain-based data sharing utilization method of claim 1, wherein the steps of security detecting the received smart contract and deploying the received smart contract at each computing node of the blockchain after the security detection passes include:
after receiving the intelligent contract containing the data operation program, the computing node forwards the intelligent contract to the security detection node for security detection of the contract;
after the security detection is passed, the security detection node deploys the received intelligent contract into a blockchain platform;
synchronizing the deployed intelligent contracts to each computing node;
the compute node submitting the smart contract sends a smart contract deployment success notification.
3. The blockchain-based data sharing utilization method of claim 1, wherein the step of triggering the predictor to execute if the smart contract is secure comprises:
the target computing node inquires whether the received intelligent contract is subjected to security detection on a chain;
if the received intelligent contract does not pass the security detection, terminating executing the current intelligent contract;
and triggering execution by the prophetic machine if the received intelligent contract passes the security detection.
4. The blockchain-based data sharing utilization method of claim 1, wherein the sending the received calculation result through a data gateway includes: and controlling transmission of the original data according to whether the original data acquisition permission exists, wherein if the original data acquisition permission does not exist, the data gateway only authorizes to send out a calculation result, and if the original data acquisition permission exists, the calculation result and the original data are sent out together.
5. The blockchain-based data sharing method of claim 1, wherein the forming the blockchain consensus based on the calculation result and synchronizing to the computing node where the data demander is located includes:
the obtained calculation result is uplink through a target calculation node to be used as a final calculation result of the intelligent contract, so that block chain consensus is formed;
synchronizing the obtained calculation result to a target calculation node initiating an intelligent contract through the blockchain consensus;
and sending a completion data use notification to the target computing node initiating the intelligent contract.
6. The blockchain-based data sharing and utilizing method according to any of claims 1-5, further comprising a data dictionary classification management step, specifically comprising:
receiving a data dictionary sent by a data storage party, and verifying the digital signature of the data storage party;
checking the information of the data dictionary, and determining a data storage party and a data type corresponding to the checked digital dictionary;
and generating a catalog list for the verified data dictionary and issuing the catalog list to provide the catalog list for a data demander to inquire.
7. A blockchain-based data sharing and utilizing device arranged in a blockchain platform, the device comprising:
the system comprises a receiving module, a data dictionary and a data demand party, wherein the receiving module is used for receiving a data dictionary issued by the data storage party and an intelligent contract submitted by the data demand party and containing data operation programs, the data dictionary contains information of data owned by the data storage party, the data operation programs are used for operating the data owned by the data storage party according to the data dictionary, and the information of the data owned by the data storage party comprises: any one or more of data attribute names, data types, data storage lengths, whether the data is possibly empty or not and data attribute descriptions;
the security detection node is used for carrying out security detection on the received intelligent contract after receiving the intelligent contract which is submitted by the data demand party and contains the data operation program, and deploying the received intelligent contract on each computing node of the blockchain after the security detection is passed;
the intelligent contract execution module is used for notifying a target computing node where the data storage party is located to execute the intelligent contract after receiving the trigger of executing the intelligent contract initiated by the data demand party, triggering the predictor to execute under the condition of intelligent contract safety so as to start a terminal process of the data source to execute the data operation program, triggering the intelligent contract containing the data operation program to execute at the data storage party, forming a block chain consensus according to a calculation result and synchronizing the block chain consensus to the computing node where the data demand party is located, and completing data use; the terminal process for starting the data source executes the data operation program, which comprises the following steps:
the predictor starts a data gateway and transmits a data operation program to a terminal process of a data source through the data gateway;
and receiving the calculation result of the data operation program, which is executed on the returned original data by the terminal process of the data source, and sending the received calculation result through the data gateway.
8. A computer readable storage medium storing a computer program, characterized in that the computer program, when executed, implements the method according to any one of claims 1-6.
CN202210676162.1A 2022-06-15 2022-06-15 Block chain-based data sharing utilization method, device and medium Active CN115296811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210676162.1A CN115296811B (en) 2022-06-15 2022-06-15 Block chain-based data sharing utilization method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210676162.1A CN115296811B (en) 2022-06-15 2022-06-15 Block chain-based data sharing utilization method, device and medium

Publications (2)

Publication Number Publication Date
CN115296811A CN115296811A (en) 2022-11-04
CN115296811B true CN115296811B (en) 2023-10-31

Family

ID=83819946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210676162.1A Active CN115296811B (en) 2022-06-15 2022-06-15 Block chain-based data sharing utilization method, device and medium

Country Status (1)

Country Link
CN (1) CN115296811B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581292A (en) * 2020-05-18 2020-08-25 中国工业互联网研究院 Industrial Internet data asset right confirming and trading method and platform
CN111698322A (en) * 2020-06-11 2020-09-22 福州数据技术研究院有限公司 Medical data safety sharing method based on block chain and federal learning
CN114357508A (en) * 2021-12-27 2022-04-15 东北大学秦皇岛分校 Internet of things data sharing system and method based on prediction machine and block chain
CN114598554A (en) * 2022-05-09 2022-06-07 山东省计算中心(国家超级计算济南中心) Method and system for protecting user privacy data in application program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434313A (en) * 2020-11-11 2021-03-02 北京邮电大学 Data sharing method, system, electronic device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581292A (en) * 2020-05-18 2020-08-25 中国工业互联网研究院 Industrial Internet data asset right confirming and trading method and platform
CN111698322A (en) * 2020-06-11 2020-09-22 福州数据技术研究院有限公司 Medical data safety sharing method based on block chain and federal learning
CN114357508A (en) * 2021-12-27 2022-04-15 东北大学秦皇岛分校 Internet of things data sharing system and method based on prediction machine and block chain
CN114598554A (en) * 2022-05-09 2022-06-07 山东省计算中心(国家超级计算济南中心) Method and system for protecting user privacy data in application program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种高效安全的去中心化数据共享模型;董祥千;郭兵;沈艳;段旭良;申云成;张洪;;计算机学报(第05期);全文 *

Also Published As

Publication number Publication date
CN115296811A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
US10554420B2 (en) Wireless connections to a wireless access point
Jabbar et al. Blockchain for the Internet of vehicles: How to use blockchain to secure vehicle-to-everything (V2X) communication and payment?
CN109891456B (en) Real estate management system, method, and program
Johnson et al. pwnpr3d: an attack-graph-driven probabilistic threat-modeling approach
CN110009494B (en) Method and device for monitoring transaction content in block chain
CN112073400A (en) Access control method, system and device and computing equipment
US8719956B2 (en) Method and apparatus for sharing licenses between secure removable media
JP2022540896A (en) Systems and methods for securing devices in computing environments
CN112182635B (en) Method, device, equipment and medium for realizing joint modeling
CN116992458A (en) Programmable data processing method and system based on trusted execution environment
CN110647583B (en) Block chain construction method, device, terminal and medium
CN112446050B (en) Business data processing method and device applied to block chain system
CN113962577A (en) Multi-system intelligent park platform
CN112037870B (en) Double-server light-weight searchable encryption method and system supporting data partitioning
CN115296811B (en) Block chain-based data sharing utilization method, device and medium
US20200184430A1 (en) Electronic ticket management system, electronic ticket management method and electronic ticket management program
CN114897177A (en) Data modeling method and device, electronic equipment and storage medium
CN110457959B (en) Information transmission method and device based on Trust application
Boussard et al. A process for generating concrete architectures
CN116155565B (en) Data access control method and device
CN107066874A (en) Method and device for interactively verifying information between container systems
CN115795556B (en) Data processing method, device, computer equipment and storage medium
Subrahmanyam et al. Network security architecture for demand response/sensor networks
Ambrosio et al. Securing mHealth applications using IoTsecM security modelling: Dentify. Me mApp case study for urgent care management
Ajayi Blockchain-Based Architecture for Secured Cyberattack Signatures and Features Distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant