CN115484026A - Multidimensional trust system structure based on block chain in financial science and technology - Google Patents

Multidimensional trust system structure based on block chain in financial science and technology Download PDF

Info

Publication number
CN115484026A
CN115484026A CN202211073666.0A CN202211073666A CN115484026A CN 115484026 A CN115484026 A CN 115484026A CN 202211073666 A CN202211073666 A CN 202211073666A CN 115484026 A CN115484026 A CN 115484026A
Authority
CN
China
Prior art keywords
trust
block chain
block
financial
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211073666.0A
Other languages
Chinese (zh)
Inventor
宋莺
孙超豪
刘媛
骆泓玮
倪燕翎
孙宝林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan International Trade University
Wuhan Tongdexing Information Technology Co ltd
HUBEI UNIVERSITY OF ECONOMICS
Original Assignee
Wuhan International Trade University
Wuhan Tongdexing Information Technology Co ltd
HUBEI UNIVERSITY OF ECONOMICS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan International Trade University, Wuhan Tongdexing Information Technology Co ltd, HUBEI UNIVERSITY OF ECONOMICS filed Critical Wuhan International Trade University
Priority to CN202211073666.0A priority Critical patent/CN115484026A/en
Publication of CN115484026A publication Critical patent/CN115484026A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention relates to the technical field of financial science and technology, in particular to a multidimensional trust system structure based on a block chain in financial science and technology.

Description

Multidimensional trust system structure based on block chain in financial science and technology
Technical Field
The invention relates to the technical field of financial science and technology, in particular to a multidimensional trust system structure based on a block chain in the financial science and technology.
Background
In recent years, with the rapid development and wide application of new technologies such as artificial intelligence, block chaining, cloud computing, data science and the like, and the mobile and intelligent applications such as smart phones, intelligent terminal equipment, financial payment services, smart cities, intelligent transportation and the like, all flowers are spread, all things are interconnected and computed by the emerging applications, the system has the characteristics of intensive computation, strong timeliness, high data reliability and the like, particularly the applications in the field of financial science and technology, and with the adoption of new systems and models such as more new technology, three-dimensional, multi-dimensional and the like, the core of the system is mutual promotion, interaction fusion, mutual influence and the like of the financial industry and the new technology, the strategic transformation and subversion innovation of the structure of the financial industry is promoted, and each financial science and technology application can be reconstructed by the new innovation, the method has the advantages that a new financial industry organization form or organization form is formed, a financial bottom layer logic framework is remodeled, better financial technology innovation is realized, data flow among different financial subjects is accelerated by the new technology innovation, financial effective information and funds flow from financial institutions to entity industries, the financial technology is enabled to be more suitable for and promote risk prevention and control and innovation development of the financial industry, the financial technology is mainly applied to financial affairs of financial technology business such as processing, monitoring, reporting and compliance, the mobile equipment is enabled to face huge challenges in the aspects of identification capacity, trust evaluation, security authentication, computing capacity and the like, and accordingly better security mechanism, trust evaluation mechanism and computing mode are needed to improve the security and reliable processing capacity of the financial technology terminal equipment.
There is therefore a need for a block chain based multidimensional trust architecture in financial technology that improves upon the above-mentioned problems.
Disclosure of Invention
The invention aims to provide a multidimensional trust system structure based on a block chain in financial technology, so as to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme:
a multidimensional trust architecture based on a block chain in financial science and technology comprises the following steps:
the block chain is used for various applications such as digital currency, digital finance, an algorithm mechanism, an intelligent contract, right and interest certification and work certification to be carried out in the block chain layer through various terminal devices, millions of different devices and different applications are embodied in the block chain layer, and for example, a smart phone, various terminal devices and the like are connected to different internets;
an internet-level blockchain layer including a financial-technology server managing the layer, wherein the financial-technology server integrates periodically received transactions into a block with a consensus protocol and broadcasts the block to other edge servers for verification to realize decentralization, the financial-technology server is installed on a server with cloud and IT service capabilities, the financial-technology server is a blockchain manager and is responsible for managing blockchains, and the financial-technology server comprises single affairs and affair blocks which create financial-technology data, a verification mechanism, a transmission mechanism and the like, and when the affairs are generated by financial-technology terminal devices, the affairs and the affair blocks and the like are transmitted to the internet, so that the decentralization is realized, the terminal devices are connected to the nearest financial-technology server and process the requests of the terminal devices, and unlike the cloud, all the requests are put in a centralized place;
the cloud-level blockchain layer stores all data generated by financial terminal equipment, ensures the integrity of the data through digital signatures, blockchain structures, trust mechanisms, hash values and the like, and ensures that all data blocks in the chain cannot be modified once a data block is inserted into the chain, thereby ensuring that the data in the blockchain is not tampered.
As a preferable scheme of the invention, a distributed database is adopted in the cloud-level block chain layer, and due to the distributed characteristic of the block chain database, the block chain technology does not need third-party organization verification and a central authority, the distributed database performs verification through an asymmetric encryption algorithm to encrypt internal data, and simultaneously the distributed database converts all transaction data on the Internet into associated character strings and stores the character strings in a plurality of block chain data blocks.
As a preferred solution of the present invention, all blockchain data blocks form a complete blockchain, and an adjacent blockchain data block points to a previous blockchain data block through a hash pointer.
As a preferred scheme of the invention, the block chain data block is generated by adding a trust control message in the trust value data of the cloud level block layer, and selecting the node with the highest trust value as a trust verifier through the trust calculation of the cloud level block layer and generating the block chain data block; then generating chain blocks by block chain data blocks, in order to ensure the identity verification of the nodes, each node uses the public key system to encrypt and demonstrate the node,
when a trust verifier detects a malicious node or an untrusted node, the malicious node or the untrusted node is completely isolated from communication, and the node information of the malicious node or the untrusted node is written into a shared block chain;
after the transaction verification is passed, recording the transaction verification as a trust node, generating and broadcasting an encryption chain block containing attacker information by a trust verification program, and adding the block into a local block chain of all nodes in the network;
each block chain data block comprises a block hash value and a parent block hash value, and the block hash value is obtained by outputting a hash function;
the block size of the block chain is B i Suppose there is N m All mobile internet devices.
Definition 1: the hash function is a mapping, h: {0,1} i →{0,1} k Wherein {0,1} i Represents a set of bit strings of arbitrary length i, {0,1} k Represents a set of bit strings of arbitrary length k, the message x ∈ {0,1} * Image h (x) of (a) is referred to as a hash value of x.
Definition 2: the compression function is a map, f: {0,1} m →{0,1} k Wherein m is>k>0
Let the input data be M e {0,1} * The compression function is defined as 2, dividing M into k blocks M of length M-k bits 0 ,M 1 ,…,M k-1 . If M is k-1 Less than M-k bits can be padded and a packet M is added k . Randomly select h 0 ∈{0,1} k Then, a hash function h can be constructed:
h i+1 =f(h i ||M i ),i=0,1,…,k
finally output h k+1 As a hash value.
The structure verifies the data of the financial-technology terminal equipment by adding the signatures to the head packet and the tail packet of the hash chain generated in the data creation process of the financial-technology terminal equipment, and has lower cost than the method for adding the signatures to all the data packets, and particularly, the edge server can acquire the data stream M even if the first and last data packets with the signatures are lost k And checking whether the data flow of the financial technology terminal equipment is changed or not through the hash value contained in f;
the block chain data is composed of transaction data, the transaction data comprises information of an attack node, a block index, a hash value of a current block and a previous hash value, in order to guarantee the reliability of the hash value, in the delivery information of financial technology, the information of the attack node is included in a trust block chain to ensure non-repudiation, so that even if a small operation is performed on the content of a chain block, the hash value can be changed, which means that the whole block chain can be damaged when the operation is performed on the data in any chain block.
As a preferable scheme of the invention, each block chain data block in the block chain comprises a trust index, and the trust index value is determined by an evaluation value obtained by five trust relations of direct trust, indirect trust, recommended trust, feedback trust and comprehensive trust.
As a preferred scheme of the invention, the direct trust is a service requester d within a certain time i To service provider d j The direct trust is that the payment service requester evaluates the payment service provider according to the satisfaction degree of the payment service result, the trust score is obtained by aggregating the multiple payment service results of the payer, and the latest service interaction score set provided by the server i to the server j is recorded as S ij ={s 1 ,s 2 V. sn, where the payment success score is 1 and the failure score is 0, directly trusting DT ij Can be calculated by a risk probability model
Figure BDA0003830445090000041
In the formula: p is the successful times of the payment within a certain time t; q is the number of failed payments within a certain time t, and the penalty factor alpha can prevent the sudden attack of an untrusted or malicious server after high trust accumulation.
As a preferable scheme of the invention, the indirect trust value refers to that the payment process of the requester to the service provider is stored in the trust database within a certain time, the trust server calculates the trust relationship between the financial science and technology service provider and the service requester according to the trust evaluation value of the service provider, and the method is an indirect way for the financial science and technology service requester to acquire the trust relationship of the service provider, and is IT (information technology) with indirect trust pq Can be represented by the following formulaComputing
Figure BDA0003830445090000051
Wherein n represents the number of nodes, D i Self-trust value, RT, representing the ith node iq Representative node D i Confidence score, pr, at time t pi Representative node D i At node D p A trust weight of (c).
As a preferable scheme of the invention, the recommendation trust is a special type of trust formed by a service requester and a public neighbor of a service provider, in the financial technology service, only considering that the interaction behavior between the service requester and the service provider is not enough to deal with various trust relationships, the recommendation trust depends on the trust level of the recommender and the trust level of the recommender on the service provider, the direct trust of the service provider j by the service i of the public neighbor is recommended to the service requester i, and the trust evaluation server applies DT to the service evaluation server 11 ––DT nn Is set to 0, a trusted R is recommended ij Can be calculated by the following formula
Figure BDA0003830445090000052
As the preferred scheme of the invention, the feedback trust is based on the trust evaluation value formed by aggregating trust evaluation opinions of other direct neighbor servers, the feedback trust is a trust relationship formed by fusing direct trust and recommendation trust, the feedback trust comprehensively considers various trust relationships, can better describe the objective trust relationship between the servers, has the advantages of improving the trust degree of a service requester, improving the transaction payment rate and promoting the optimization and iteration of financial technology, needs to establish feedback trust evaluation for enabling the service requester to more quickly transmit the feedback trust to a financial supervision institution, and feeds back the trust FT (FT) according to various trust relationships and aggregation rules ij Can be calculated by the following two formulas
Figure BDA0003830445090000061
Figure BDA0003830445090000062
In the formula: q ij l The feedback trust value is calculated from the ith trust path from the service requester i to the service provider j; i =1,2, ·, n, j denotes the number of all servers passing through in the trust path; FT ij The method is characterized in that the method refers to an aggregation value of all trust path feedback trusts between two service providers, namely the trust relationship of a service provider i to a service provider j; l represents the total number of trust paths between the servers.
As a preferable scheme of the invention, the comprehensive trust is a trust evaluation value aggregated based on related trust such as direct trust, indirect trust, recommended trust, feedback trust and the like and trust relations of other direct neighbor servers, the trust evaluation value is a trust relation obtained by comprehensively considering a service requester to a service provider, and is a final trust evaluation value aggregated for direct trust, indirect trust, recommended trust, feedback trust and the like obtained by financial service modes within a certain time ij Can be calculated from
T ij =w 1 DT ij +w 2 IT ij +w 3 RT ij +w 4 QT ij
In the formula, w 1 、w 2 、w 3 And w 4 Adaptive weights, w, of direct trust, indirect trust, recommendation trust, feedback trust, etc., respectively 1 +w 2 +w 3 +w 4 =1(0≤w 1 ,w 2 ,w 3 ,w 4 <1)。
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, a block chain and financial technology are fused, a decentralized and non-falsifiable consensus trust mechanism on an asymmetric encryption algorithm is established, financial technology transactions can be established in a safe and verifiable manner in a decentralized financial technology ecological environment, consensus trust is formed through the decentralized mechanism, all nodes equally participate in transactions, the transactions of any node are transmitted to all nodes for verification, and the verification, accounting, storage, maintenance and transmission of data adopt a distributed method to establish a trust relationship among the nodes.
2. The invention simultaneously solves the problems of privacy protection and information transparency. Personal information protection is realized through an asymmetric encryption algorithm and an authorization technical method, information on a block chain is transparent and open, and trusted nodes can access data and develop and apply.
3. The invention has a non-tampering and tracing mechanism, adopts an asymmetric encryption algorithm to sign transaction information, utilizes a Hash algorithm and a digital signature algorithm to ensure that transaction data can not be tampered, and has a timestamp in a block chain data structure and high traceability.
4. The invention has an autonomous mechanism and collective maintenance, all nodes in the block chain follow the same consensus mechanism, and the information reliability and the safety of the block chain are maintained together.
Drawings
FIG. 1 is a basic framework diagram of the block chain and finance technology integration of the present invention;
FIG. 2 is a block chain structure diagram of a block chain according to the present invention;
FIG. 3 is a block diagram of the convergence of blockchain and trust mechanism in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, rather than all embodiments, and all other embodiments obtained by a person of ordinary skill in the art without any creative work based on the embodiments of the present invention belong to the protection scope of the present invention.
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Several embodiments of the invention are presented. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and the like are used herein for purposes of illustration only.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
Referring to fig. 1-3, the present invention provides a technical solution:
in an embodiment, referring to fig. 1,2, and 3, a multidimensional trust architecture based on a block chain in financial technology includes an application-level block chain layer, where the block chain is used for various applications such as digital currency, digital finance, an algorithm mechanism, an intelligent contract, a rights and interests certification, and a work certification to be performed in the layer through various terminal devices, and millions of different devices and different applications are embodied in the application-level block chain layer, such as a smart phone and various terminal devices are connected to different internet; an internet-level blockchain layer including a financial-technology server managing the layer, wherein the financial-technology server integrates periodically received transactions into a block with a consensus protocol and broadcasts the block to other edge servers for verification to realize decentralization, the financial-technology server is installed on a server with cloud and IT service capabilities, the financial-technology server is a blockchain manager and is responsible for managing blockchains, and the financial-technology server comprises single affairs and affair blocks which create financial-technology data, a verification mechanism, a transmission mechanism and the like, and when the affairs are generated by financial-technology terminal devices, the affairs and the affair blocks and the like are transmitted to the internet, so that the decentralization is realized, the terminal devices are connected to the nearest financial-technology server and process the requests of the terminal devices, and unlike the cloud, all the requests are put in a centralized place; the cloud-level block chain layer stores all data generated by financial terminal equipment, integrity of the data is guaranteed through digital signatures, a block chain structure, a trust mechanism, hash values and the like, once a data block is inserted into a chain, all data blocks in the chain cannot be modified, and therefore the data in the block chain cannot be tampered.
Referring to fig. 1,2 and 3, all blockchain data blocks form a complete blockchain, and an adjacent blockchain data block points to a previous blockchain data block through a hash pointer, the blockchain data block is generated by adding a trust control message in trust value data of a cloud-level block layer, a node with the highest trust value is selected as a trust verifier through cloud-level block layer trust calculation, and a blockchain data block is generated, and then the blockchain data block generates a chain block, in order to ensure the identity verification of the node, when the trust verifier detects a malicious node or an untrusted node, the node is thoroughly isolated from communication, and the node information is written into a shared blockchain, in the process of detecting the node trust value, if the node is attacked, the node sends the message to the trust verifier and writes the node information into the shared blockchain, therefore, the trust verifier can confirm according to the trust recommendation of a neighbor, the node may send a potential attack node message to isolate the trusted node, and in order to avoid the problem, if most adjacent nodes contain the same transaction information in the initial transaction information, the node can verify the transaction; after the transaction verification is passed, recording the transaction verification as a trust node, generating and broadcasting an encryption chain block containing attacker information by a trust verification program, adding the block into a local block chain by all nodes in the network, and encrypting and demonstrating each node by using a public key system of each node; each block chain data block comprises a block hash value and a parent block hash value, and the block hash value is obtained by outputting a hash function;
the data block size of the block chain is B i Assume that there is N m All mobile internet devices.
Definition 1: the hash function is a mapping, h: {0,1} i →{0,1} k Wherein {0,1} i Represents a set of bit strings of arbitrary length i, {0,1} k Represents a set of bit strings of arbitrary length k, and the message x belongs to the field of 0,1 * Image h (x) of (a) is referred to as a hash value of x.
Definition 2: the compression function is a map, f: {0,1} m →{0,1} k Wherein m is>k>0
Let the input data be M E {0,1} * The compression function is defined as 2, dividing M into k blocks M of length M-k bits 0 ,M 1 ,…,M k-1 . If M is k-1 Less than M-k bits can be padded and a packet M is added k . Randomly select h 0 ∈{0,1} k Then, a hash function h can be constructed:
h i+1 =f(h i ||M i ),i=0,1,…,k
finally output h k+1 As a hash value.
The structure verifies the data of the financial-technology terminal equipment by adding signatures to a first packet and a last packet of a hash chain generated in the data creation process of the financial-technology terminal equipmentThe overhead is smaller than the method of adding signatures to all data packets, and in particular the edge server can obtain the data stream M even if the first and last signed data packets are lost k And checking whether the data flow of the financial technology terminal equipment is changed or not through the hash value contained in f;
the block chain data is composed of transaction data, the transaction data comprises information of attack nodes, block indexes, hash values of current blocks and previous hash values, in order to guarantee the reliability of the hash values, in delivery information of financial technology, information of the attack nodes is contained in a trust block chain to ensure non-repudiation, so that the hash values can be changed even if the content of the chain blocks is subjected to small operation once, which means that the whole block chain is damaged when data in any chain block is operated, each block chain data block in the block chain comprises trust indexes, and the trust index values are determined by evaluation values obtained through five trust relationships of direct trust, indirect trust, recommended trust, feedback trust and comprehensive trust.
Direct trust as a service requestor d within a certain time i To service provider d j The direct trust is that the payment service requester evaluates the payment service provider according to the satisfaction degree of the payment service result, the trust score is obtained by aggregating the payment service results for multiple times by the payer, and the latest service interaction score set provided by the server i to the server j is recorded as S ij ={s 1 ,s 2 V. sn, wherein the payment success score is 1, the failure score is 0, and the DT is directly trusted ij Can be calculated by a risk probability model
Figure BDA0003830445090000101
In the formula: p is the successful times of the payment within a certain time t; q is the number of times of failure of payment within a certain time t, and a penalty factor alpha can prevent the sudden attack of an untrusted or malicious server after high trust accumulation.
The indirect trust value refers to storing the payment process of a requester to a service provider in a trust database within a certain time, and the trust server calculates the trust relationship between the financial science and technology service provider and the service requester according to the trust evaluation value of the service provider, which is an indirect way for the financial science and technology service requester to acquire the trust relationship of the service provider, namely an indirect trust IT pq Can be calculated by the following formula
Figure BDA0003830445090000111
Wherein n represents the number of nodes, D i Self-trust value, RT, representing the ith node iq Representative node D i Confidence score, pr, at time t pi Representative node D i At node D p A trust weight of (c).
The recommendation trust is a special type of trust formed by a service requester and a public neighbor of a service provider, in the financial science service, only considering that the interaction behavior between the service requester and the service provider is insufficient to deal with various trust relationships, the recommendation trust depends on the trust level of the recommender and the trust level of the recommender to the service provider, the direct trust of the public neighbor server i to the service provider j is recommended to the service requester i, and the trust evaluation server applies DT to the service requester i 11 ––DT nn Is set to 0, a trusted R is recommended ij Can be calculated by the following formula
Figure BDA0003830445090000112
The feedback trust is based on the trust evaluation value formed by aggregating trust evaluation opinions of other direct neighbor servers, the feedback trust is a trust relationship formed by fusing direct trust and recommendation trust, the feedback trust comprehensively considers various trust relationships, can better describe the objective trust relationship between the servers, and has the advantages of improving the trust degree of the service requester and the transaction trustPayment rate, promotion of optimization and iteration of financial technology, establishment of feedback trust evaluation for enabling service requesters to feed back trust to be transmitted to financial regulatory authorities more quickly, and feedback trust FT according to various trust relationships and aggregation rules ij Can be calculated by the following two formulas
Figure BDA0003830445090000121
Figure BDA0003830445090000122
In the formula: q ij l The feedback trust value is calculated from the ith trust path from the service requester i to the service provider j; i =1,2, ·, n, j denotes the number of all servers passing through in the trust path; FT ij The method is characterized in that the method refers to an aggregation value of all trust path feedback trusts between two service providers, namely the trust relationship of a service provider i to a service provider j; l represents the total number of trust paths between the servers.
The comprehensive trust is a trust evaluation value aggregated based on related trust such as direct trust, indirect trust, recommended trust, feedback trust and the like and trust relations of other direct neighbor servers, is a trust relation obtained by comprehensively considering a service requester to a service provider, is a final trust evaluation value aggregated by direct trust, indirect trust, recommended trust, feedback trust and the like obtained in a financial service mode within a certain time, and when no direct service record exists among financial servers, the recommended trust and the feedback trust are regarded as the comprehensive trust to construct the trust relation among strange financial servers, and the comprehensive trust T is ij Can be calculated from
T ij =w 1 DT ij +w 2 IT ij +w 3 RT ij +w 4 QT ij
In the formula, w 1 、w 2 、w 3 And w 4 Direct trust, indirect trust, recommended trust and feedback respectivelyAdaptive weight of trust etc., w 1 +w 2 +w 3 +w 4 =1(0≤w 1 ,w 2 ,w 3 ,w 4 <1)。
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. A multidimensional trust architecture based on a block chain in financial technology is characterized by comprising the following components:
the block chain layer is used for various applications such as digital currency, digital finance, an algorithm mechanism, an intelligent contract, right and interest certification, work certification and the like to be carried out in the block chain layer through various terminal devices;
the interconnection-level block chain layer comprises a financial technology server for managing the layer, periodically received transactions are integrated into blocks with a consensus protocol through the financial technology server, and the blocks are broadcasted to other edge servers for verification, so that decentralization is realized;
the cloud-level blockchain layer is used for storing all data generated by the financial terminal equipment and ensuring the integrity of the data through digital signatures, blockchain structures, trust mechanisms, hash values and the like.
2. The block chain-based multidimensional trust architecture in financial technology as claimed in claim 1, wherein: the cloud-level block chain layer adopts a distributed database, the distributed database is verified through an asymmetric encryption algorithm to encrypt internal data, and simultaneously the distributed database converts all transaction data on the Internet into associated character strings to be stored in a plurality of block chain data blocks.
3. The block chain-based multidimensional trust architecture in financial technology as claimed in claim 2, wherein: all blockchain data blocks form a complete blockchain, and adjacent blockchain data blocks point to the previous blockchain data block through hash pointers.
4. The block chain-based multidimensional trust architecture in financial technology according to claim 3, wherein: the block chain data block is generated by adding a trust control message in trust value data of a cloud level block layer and selecting a node with the highest trust value as a trust verifier and generating the block chain data block through trust calculation of the cloud level block layer;
each block chain data block comprises a block hash value and a parent block hash value, and the block hash value is obtained by outputting a hash function;
the block chain data is composed of transaction data, and the transaction data comprises information of the attack node, the block index, the hash value of the current block and the previous hash value.
5. The multi-dimensional trust architecture based on block chain in financial technology as claimed in claim 4, wherein: each block chain data block in the block chain comprises a trust index, and the trust index value is determined by an evaluation value obtained by five trust relationships of direct trust, indirect trust, recommendation trust, feedback trust and comprehensive trust.
6. The block chain-based multidimensional trust architecture in financial technology of claim 5, wherein: the direct trust is a service requester d within a certain time i To service provider d j The trust evaluation is obtained from the historical payment information, and the latest service interaction score set provided by the server i to the server j is recorded as S ij ={s 1 ,s 2 V. sn, wherein the payment success score is 1, the failure score is 0, and the DT is directly trusted ij Can be calculated by a risk probability model
Figure FDA0003830445080000021
In the formula: p is the successful times of the payment within a certain time t; q is the number of failed payments within a certain time t, and the penalty factor alpha can prevent the sudden attack of an untrusted or malicious server after high trust accumulation.
7. The block chain-based multidimensional trust architecture in financial technology of claim 5, wherein: the indirect trust value refers to that the payment process of a requester to a service provider is stored in a trust database within a certain time, the trust server calculates the trust relationship between the financial science and technology service provider and the service requester according to the trust evaluation value of the service provider, and the IT of indirect trust pq Can be calculated by the following formula
Figure FDA0003830445080000022
Wherein n represents the number of nodes, D i Self-trust value, RT, representing the ith node iq Representative node D i Confidence score at time t, pr pi Representative node D i At node D p A trust weight of (c).
8. The block chain-based multidimensional trust architecture in financial technology of claim 5, wherein: the recommendation trust is a special type of trust formed by a service requester and a public neighbor of a service provider, the recommendation trust depends on the trust level of the recommender and the trust level of the recommender to the service provider, a server i of the public neighbor directly trusts the service provider j and recommends the service provider j to the service requester i, and a trust evaluation server recommends DT 11 ––DT nn Is set to 0, a trusted R is recommended ij Can be calculated by the following formula
Figure FDA0003830445080000031
9. The multi-dimensional trust architecture based on block chain in financial technology of claim 5, wherein: the feedback trust is based on a trust evaluation value formed by aggregating trust evaluation opinions of other direct neighbor servers, the feedback trust is a trust relationship formed by fusing direct trust and recommendation trust, and the feedback trust FT ij Can be calculated by the following two formulas
Figure FDA0003830445080000032
Figure FDA0003830445080000033
In the formula: q ij l The feedback trust value is calculated from the ith trust path from the service requester i to the service provider j; i =1,2, ·, n, j denotes the number of all servers passing through in the trust path; FT ij The method is an aggregate value of all trust path feedback trusts between two servers, namely a trust relationship between a server i and a server j; l represents the total number of trust paths between the servers.
10. The block chain-based multidimensional trust architecture in financial technology of claim 5, wherein: the comprehensive trust is a trust evaluation value aggregated based on related trust such as direct trust, indirect trust, recommended trust, feedback trust and the like and trust relations of other direct neighbor servers, is a trust relation obtained by the service requester on the comprehensive consideration of a service provider, is a final trust evaluation value aggregated by direct trust, indirect trust, recommended trust, feedback trust and the like obtained in a financial service mode within a certain time, and is a comprehensive trust T ij Can be calculated from the following equation
T ij =w 1 DT ij +w 2 IT ij +w 3 RT ij +w 4 QT ij
In the formula, w 1 、w 2 、w 3 And w 4 Adaptive weights, w, of direct trust, indirect trust, recommendation trust, feedback trust, etc., respectively 1 +w 2 +w 3 +w 4 =1(0≤w 1 ,w 2 ,w 3 ,w 4 <1)。
CN202211073666.0A 2022-09-02 2022-09-02 Multidimensional trust system structure based on block chain in financial science and technology Pending CN115484026A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211073666.0A CN115484026A (en) 2022-09-02 2022-09-02 Multidimensional trust system structure based on block chain in financial science and technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211073666.0A CN115484026A (en) 2022-09-02 2022-09-02 Multidimensional trust system structure based on block chain in financial science and technology

Publications (1)

Publication Number Publication Date
CN115484026A true CN115484026A (en) 2022-12-16

Family

ID=84422479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211073666.0A Pending CN115484026A (en) 2022-09-02 2022-09-02 Multidimensional trust system structure based on block chain in financial science and technology

Country Status (1)

Country Link
CN (1) CN115484026A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117494174A (en) * 2023-12-28 2024-02-02 北京遥感设备研究所 Multidimensional data encryption range query method and device, storage medium and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117494174A (en) * 2023-12-28 2024-02-02 北京遥感设备研究所 Multidimensional data encryption range query method and device, storage medium and electronic equipment
CN117494174B (en) * 2023-12-28 2024-03-29 北京遥感设备研究所 Multidimensional data encryption range query method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
Leng et al. Blockchain security: A survey of techniques and research directions
Liu et al. Blockchain and machine learning for communications and networking systems
Li et al. Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach
US11694110B2 (en) Aggregated machine learning verification for database
US11562228B2 (en) Efficient verification of machine learning applications
CN112132198B (en) Data processing method, device and system and server
CN109993647A (en) A kind of pay taxes credit investigation system and processing method based on block chain
CN112380578A (en) Edge computing framework based on block chain and trusted execution environment
Liu et al. Spectrum trading and sharing in unmanned aerial vehicles based on distributed blockchain consortium system
US20200394470A1 (en) Efficient verification of maching learning applications
US11849046B2 (en) Freshness visibility in supply-chain
CN113302610B (en) Trusted platform based on blockchain
CN115380303A (en) Trusted platform based on block chain
Yeasmin et al. Unblocking the potential of blockchain
Liu et al. A survey on blockchain-enabled federated learning and its prospects with digital twin
Gao et al. BFR-SE: a blockchain-based fair and reliable searchable encryption scheme for IoT with fine-grained access control in cloud environment
CN115484026A (en) Multidimensional trust system structure based on block chain in financial science and technology
Zhang et al. Integration of communication and computing in blockchain-enabled multi-access edge computing systems
US11924348B2 (en) Honest behavior enforcement via blockchain
CN113302612B (en) Computer implementation method, system and device for cross-chain and cross-network data transmission
Liu et al. Blockchain-based access control approaches
CN113597608A (en) Trusted platform based on block chain
US20230092436A1 (en) Framework for demaraction of digital assets
CN113491090B (en) Trusted platform based on blockchain
KR102333322B1 (en) Credit evaluation techniques based on zero-knowledge proof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination