CN115622762A - Cloud edge data distribution method based on block chain and cross-chain interaction method - Google Patents

Cloud edge data distribution method based on block chain and cross-chain interaction method Download PDF

Info

Publication number
CN115622762A
CN115622762A CN202211221163.3A CN202211221163A CN115622762A CN 115622762 A CN115622762 A CN 115622762A CN 202211221163 A CN202211221163 A CN 202211221163A CN 115622762 A CN115622762 A CN 115622762A
Authority
CN
China
Prior art keywords
chain
node
information
consensus
cross
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211221163.3A
Other languages
Chinese (zh)
Other versions
CN115622762B (en
Inventor
张翀
吴菲
杨济伟
何春辉
徐浩
葛斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202211221163.3A priority Critical patent/CN115622762B/en
Publication of CN115622762A publication Critical patent/CN115622762A/en
Application granted granted Critical
Publication of CN115622762B publication Critical patent/CN115622762B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain-based cloud edge data distribution method and a cross-chain interaction method aiming at the defects of the safety of the existing cloud edge data distribution method and the cross-chain interaction, wherein the method comprises the following steps: encrypting data to be distributed through an uploading node and a downloading node to construct a data certificate structure; uploading the data to a block chain network by an uploading node, verifying the consensus by a consensus node, and storing the verified data certificate structure into an intelligent contract; the downloading node downloads the information of the storage space, compares the information with a data certificate structure stored in an intelligent contract, and triggers downloading consensus to complete the safe interaction of the data after the comparison is successful; building a block chain network architecture, and designing a cross-chain architecture method and a credibility coordination method thereof. By adopting the method, the safety and credibility of the data information in the global cross-chain interaction can be ensured, the data information interaction rate is improved, the method is suitable for various current scenes of the Internet of things, has a wide application prospect and has obvious benefits.

Description

Cloud edge data distribution method based on block chain and cross-chain interaction method
Technical Field
The application relates to the technical field of digital information transmission, in particular to a block chain-based cloud edge data distribution method and a cross-chain interaction method.
Background
With the continuous and deep development of mobile computing, edge computing, internet of things technology and application, a cloud edge-end architecture formed by a cloud center, an edge computing node and a sensor is becoming a mainstream industrial internet of things computing architecture. Because the cloud side architecture has good adaptability and flexibility, a large number of scenes of the internet of things adopt the mode to perform service cooperation. And heterogeneous conditions exist among the cloud side end architecture, the cloud side and the side end management and control party, which provides higher challenges for the information interaction security credibility in the cloud side end architecture.
The block chain technology is applied to solve the safety problem, and when the block chain technology is applied to solve the safety problem of information interaction among the three cloud side ends, the block chain technology is often adopted to solve the safety credibility problem of information interaction only when information interaction is carried out on a layer of structure in a cloud side end framework in the traditional technology, and the cross-chain design is not considered; meanwhile, in the conventional consensus method, when a block is packaged by a consensus node which obtains the accounting right and the block is received by other consensus nodes, the data of the block body needs to be verified, such as whether the block is double-flower or not, whether the balance is enough or not, and the like.
The interaction between the cloud side and the cloud side is lack of a credibility mechanism, information can only be recorded in an independent closed block chain in a credibility mode, global security service cooperation is not supported, the credibility is not high in the interaction processes of network communication protocols, data transmission and distribution and the like among the cloud side and the cloud side, an explicit confirmation mechanism is not provided, and the global security service cooperation capability is lacked.
Disclosure of Invention
Based on the fact that heterogeneous conditions exist in a cloud side end architecture, uncertainty of information transmission in an interaction process and lack of global security service cooperation capability of a cloud side end, a cloud side end data distribution method based on a block chain and a cross-chain interaction method are provided.
The invention develops a block chain-based cloud edge data reliable distribution method and a cross-chain trusted interaction method from the aspects of cloud edge data reliable distribution and cross-chain trusted interaction, and is applied to a Yun Bianduan block chain network architecture, wherein the Yun Bianduan block chain network architecture comprises the following steps: an end layer structure, an edge layer structure and a cloud layer structure; the terminal layer structure comprises a controller and sensor equipment, wherein the sensor equipment is used for acquiring task data, and the controller is used for executing instructions; the edge layer structure comprises edge calculation nodes, and a lightweight block chain is formed by the edge calculation nodes; the cloud layer structure comprises cloud center computing nodes, and the cloud center computing nodes form a main block chain;
the uploading node takes a hash value of the data to be distributed to obtain a plaintext hash value, encrypts the data to be distributed according to a public key of the downloading node to obtain a first encryption value, encrypts the first encryption value by adopting a private key of the uploading node to obtain a second encryption value, and takes the hash of the second encryption value to obtain an encrypted hash value;
the uploading node stores the first encryption value and the second encryption value into a storage space and feeds back a storage path in the storage space;
the uploading node constructs a data certificate structure according to uploading node information of the uploading node, downloading node information of the downloading node, a plaintext hash value, an encrypted hash value and a storage path;
uploading the data certificate structure to a cloud edge block chain network architecture, verifying the data certificate structure through a consensus node in the cloud edge block chain network architecture, adding the data certificate structure into the cloud edge block chain network architecture, taking the uploading node information and the downloading node information as key values, and storing a plaintext hash value as a value in an intelligent contract; the consensus node is an edge computing node or a cloud center computing node;
the downloading node downloads according to the storage path of the data certificate structure to obtain a first encryption to be confirmed, decrypts the first encryption value to be confirmed according to the private key of the downloading node to obtain a plaintext hash value to be confirmed, calls an intelligent contract, compares the plaintext hash value to be confirmed with the plaintext hash value, and determines that the data to be distributed of the uploading node is distributed to the downloading node when the plaintext hash value to be confirmed and the plaintext hash value are the same.
The data certificate structure is verified and added into the cloud edge block chain network architecture through the consensus node in the cloud edge block chain network architecture, and the method comprises the following steps:
receiving a data certificate structure uploaded by an uploading node through a common identification node in a cloud edge block chain network architecture, downloading the data certificate structure according to a storage path, and analyzing the data certificate structure to obtain uploading node information, a plaintext hash value and an encrypted hash value; after the data certificate structure is verified according to the uploading node information and the encrypted hash value, mounting a block corresponding to the data certificate structure in a block queue of a cloud edge block chain network architecture; and sending the data certificate structure to other common identification nodes for secondary verification, if the verification is not passed, discarding the block, and if the verification is passed, mounting the block corresponding to the data certificate structure in a block queue of the cloud edge block chain network architecture. And all the consensus nodes in the cloud edge block chain network continuously monitor the data certificate structure, and the data certificate structure is verified and confirmed to form uploading consensus confirmation. Through uploading consensus confirmation, the consensus node calls a storage function of the intelligent contract, and analyzes the data certificate structure to obtain uploading node information, downloading node information and a plaintext hash value; and according to the uploading node information, the downloading node information and the plaintext hash value, taking the uploading node information and the downloading node information as key values, taking the plaintext hash value as a value to be stored, and setting the stored position as an intelligent contract in the cloud edge terminal block chain network.
In one embodiment, the method further comprises the following steps: uploading data to be distributed to a storage space by an uploading node, chaining a storage certificate to a block chain network, and writing an access authority rule into an intelligent contract; setting access authority according to an RBAC mechanism in the intelligent contract, and refining access control to data items; when downloading data information, a downloading node firstly calls an intelligent contract check authority, and the intelligent contract returns an item which can be accessed by the node and a corresponding storage address; and the downloading node downloads the corresponding data entry and links the downloading result. Wherein, RBAC mechanism is Role-Based Access Control mechanism.
In one embodiment, the method further comprises the following steps: taking the main block chain as a main chain and the lightweight block chain as a side chain; the cloud center computing node calls a side chain to read a block head of the cloud center computing node, and uplink information is generated based on the block head information of the side chain and comprises a data certificate structure; the side chain carries out consensus confirmation on the data certificate structure, and after the consensus confirmation, the side chain calls a main chain SPV (shortest Path bridging) verification contract to verify the uplink information; when the verification is passed, the side chain defines uplink according to the uplink information in the main chain SPV verification contract; the edge computing node calls a main chain to read a block header of the edge computing node, and generates uplink information based on block header information of the main chain, wherein the uplink information comprises a data certificate structure; the main chain carries out consensus confirmation on the data certificate structure, and after the consensus confirmation, the main chain calls a side chain SPV (session protocol video) verification contract; when the verification is passed, the main chain defines the upper chain according to the upper chain information in the side chain SPV verification contract.
After the data certificate structure is identified in common, the cloud center computing node verifies the result of the data certificate structure after identification confirmation through a block head of a side chain, a Merkle tree root corresponding to the side chain and a storage path, and when the verification result is passed, an uplink is defined in a main chain SPV verification contract; after the data certificate structure is identified, the edge computing node verifies the result of the data certificate structure after identification confirmation through the block head of the main chain, the Merkle tree root corresponding to the main chain and the storage path, and when the verification result is passed, the chain link is verified according to the regulations in the side chain SPV verification contract.
In one embodiment, the method further comprises the following steps: the method comprises the steps that an end sensor collects data to be distributed, a data certificate structure is built for the data to be distributed through a reliable distribution mechanism, the data certificate structure is stored to an edge computing node, and a stored certificate is linked to a lightweight block chain; the edge computing node links the data certificate structure to a lightweight block chain or a main block chain, the consensus node verifies the data certificate structure, triggers a comparison function of an intelligent contract, extracts a code from the information characteristic of the data certificate structure after the comparison is passed, and downloads the code to the edge computing node; the edge computing node sends a cross-chain request to the main block chain to verify the correctness of the code and extracts information characteristics; the edge computing node links the extracted information features to a lightweight block chain, and calls an SPV (shortest Path verification) contract after the lightweight block chain consensus verification to cross-link the information features to a main block chain; after the main block chain consensus confirms the information characteristics, generating an instruction for issuing to the end layer structure; and the instruction calls a lightweight block chain (SPV) verification contract after the main block chain consensus is verified, the instruction is linked to the lightweight block chain in a cross mode, and the instruction is distributed to a controller appointed in the end layer structure to carry out corresponding instruction operation after the instruction is confirmed to the lightweight block chain consensus.
In one embodiment, the method further comprises the following steps: taking a lightweight block chain as an A chain and taking another lightweight block chain as a B chain; initiating a first cross-chain uplink action by an edge computing node in the chain A, wherein the first cross-chain uplink action enters the chain A after passing the chain A consensus verification, namely a first cross-chain event; after receiving the first chain-crossing event, the event collection node verifies the authenticity of the data certificate structure of the first chain-crossing uplink action, after the verification is passed, a Merkle tree root of the first chain-crossing uplink action is constructed, a third encryption value is formed by using a private key signature of the event collection node, the third encryption value is linked to a cloud center main chain, and the cloud center main chain node verifies the legality and achieves consensus; after monitoring the consensus, the event collection node initiates a second cross-link uplink action on the service chain, wherein the second cross-link uplink action is verified by the consensus node and enters a chain B after verification, namely a second cross-link event; after monitoring a second chain-crossing event, the event collection node verifies the data certificate structure of the second chain-crossing uplink action, after the second chain-crossing uplink action passes the verification, a Merkle tree root of the second chain-crossing uplink action is constructed, a fourth encryption value is formed by using a private key signature of the event collection node, the fourth encryption value is linked to a cloud center main chain, and the cloud center main chain node performs validity verification and achieves consensus; and after monitoring the consensus, the event collection node initiates a chain crossing action on the chain A to complete the closed loop of the cross-domain request.
The event collection node collects the consensus events of the main blockchain and the lightweight blockchain and triggers one chain to the other chain to obtain the consensus event.
In one embodiment, the method further comprises the following steps: one lightweight blockchain is a first domain, the other lightweight blockchain is a second domain, a first node is arranged in the first domain, and a second node is arranged in the second domain; the first node requesting authentication of the second node in the second domain; the method comprises the steps that a first node initiates an authentication uplink request in a first domain, an edge computing node performs consensus confirmation on the identity of the first node, the uplink request is subjected to cross-link to a main block chain after the consensus confirmation, and the cross-link is submitted to a second domain after the main block chain performs consensus on the uplink request; the second domain performs consensus confirmation on the identity of the second node, the uplink request is subjected to consensus confirmation, the uplink request is sent to the main block chain, and after the main block chain performs consensus on the uplink request, the main block chain submits the uplink request to the first domain in a cross-chain mode; after the consensus, the first node can perform service interaction with the second node.
Compared with the prior art, the cloud edge end data distribution method and the cross-link interaction method based on the block link are characterized in that a series of encryption is carried out on data to be distributed through an uploading node and a downloading node, an encrypted hash value is finally obtained, the encrypted value in the encryption process is stored in a storage space, a corresponding storage path is fed back, a data certificate structure is built through the encrypted hash value, the storage path and the information of the node, the data certificate structure is stored in an intelligent contract through a repeated and strict verification mechanism and an application block link technology to form uploading consensus confirmation, finally the downloading node downloads and decrypts the plaintext hash value to be confirmed according to the corresponding storage path, the intelligent contract is called for comparison, distribution interaction of the data is completed, a reliable, reliable and provenance-traceable guarantee mechanism is established for data transmission interaction under the condition that a control party is heterogeneous, reliable and efficient interaction of data information in a block link network is achieved, cross-link interaction efficiency is improved, and a credible basis is provided for cross-link application.
Drawings
FIG. 1 is a block chain-based cloud edge data distribution process diagram in one embodiment;
FIG. 2 is a design diagram of a cloud-edge-oriented cross-chain architecture in one embodiment;
FIG. 3 is a schematic flow chart of a data enhancement consensus algorithm in an embodiment;
FIG. 4 is a schematic flow diagram illustrating a vertical cloud-edge chaining method in one embodiment;
FIG. 5 is a schematic flow chart illustrating a vertical cloud-edge chain-crossing trusted collaboration method according to an embodiment;
FIG. 6 is a flowchart illustrating a cross-domain edge-cloud-edge chaining method according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The application provides a cloud edge data distribution method and a cross-chain interaction method based on a block chain, which comprise the following steps:
yun Bianduan blockchain network architecture includes: an end layer structure, an edge layer structure and a cloud layer structure; the terminal layer structure comprises a controller and sensor equipment, wherein the sensor equipment is used for acquiring task data, and the controller is used for executing instructions; the edge layer structure comprises edge calculation nodes, and a lightweight block chain is formed by the edge calculation nodes; the cloud layer structure comprises cloud center computing nodes, and the cloud center computing nodes form a main block chain.
In an embodiment, as shown in fig. 1, a block chain-based cloud edge-side data distribution method and a cross-chain interaction method are provided, and are applied to a cloud edge-side cross-chain architecture as shown in fig. 2, where the method includes:
step 302: the uploading node obtains a plaintext Hash value from the data to be distributed, encrypts the data to be distributed according to a public key of the downloading node to obtain a first encryption value, encrypts the first encryption value by using a private key of the uploading node to obtain a second encryption value, and obtains an encrypted Hash value by taking the Hash of the second encryption value.
The uploading node and the downloading node exist in a blockchain network architecture, the uploading node is mainly responsible for encrypting and uploading the data to the storage space, and then chaining the storage address and the encrypted hash value to the blockchain network; the downloading node is responsible for encrypting the plaintext Hash value by using a public key of the downloading node to obtain a first encryption value.
Step 304: and the uploading node stores the first encryption value and the second encryption value in a storage space and feeds back a storage path in the storage space.
In this step, a storage space exists in the blockchain network architecture, and the storage space is mainly responsible for storing the first encrypted value, the second encrypted value and the plaintext hash value after the subsequent verification uploaded by the upload node, and feeding back the first encrypted value, the second encrypted value and the plaintext hash value to a storage path in the storage space of the upload node, so as to facilitate the tracing of the subsequent information data and the downloading of the download node.
Step 306: and the uploading node constructs a data certificate structure according to the uploading node information of the uploading node, the downloading node information of the downloading node, the plaintext hash value, the encryption hash value and the storage path.
Uploading node information, downloading node information and a storage path are used as secondary information, and the encrypted hash value is used as core information, wherein the secondary information is used for tracing and positioning information to be confirmed in an interaction process, so that the integrity of the information to be confirmed is ensured, and the core information provides an encryption strategy with high reliability, so that the authenticity of the information to be confirmed is ensured. The data certificate structure is constructed through the steps.
Step 308: uploading the data certificate structure to a cloud edge block chain network architecture, verifying the data certificate structure through a consensus node in the cloud edge block chain network architecture, adding the data certificate structure into the cloud edge block chain network architecture, taking the uploading node information and the downloading node information as key values, and storing a plaintext hash value as a value in an intelligent contract; the consensus node is an edge computing node or a cloud center computing node;
in this embodiment, the consensus node needs to verify the data certificate structure, specifically, information stored in the data certificate structure may be verified in a comparison manner, and the plaintext hash value is stored in the storage space after the verification is passed; the uploading node calls a storage function of the intelligent contract and stores corresponding information into the intelligent contract according to the intelligent contract rule so that the subsequent downloading node can correctly download the corresponding information in the intelligent contract for verification.
Step 310: the downloading node downloads according to the storage path of the data certificate structure to obtain a first encryption value to be confirmed, decrypts the first encryption value to be confirmed according to the private key of the downloading node to obtain a plaintext hash value to be confirmed, calls an intelligent contract, compares the plaintext hash value to be confirmed with the plaintext hash value, and determines that data to be distributed of the uploading node is distributed to the downloading node when the plaintext hash value to be confirmed and the plaintext hash value are the same.
The downloading node calls a comparison function of the intelligent contract, and compares a plaintext hash value to be confirmed, which is obtained by decrypting corresponding information in the intelligent contract, with a plaintext hash value downloaded from a storage space according to a corresponding storage path.
The data to be distributed is encrypted in a series through an uploading node and a downloading node, an encrypted hash value is obtained finally, the encrypted value in the encryption process is stored in a storage space, a corresponding storage path is fed back, a data certificate structure is constructed through the encrypted hash value, the storage path and the information of the node, the data certificate structure is stored in an intelligent contract through a repeated strict verification mechanism and an application block chain technology, uploading common identification confirmation is formed, finally the downloading node downloads and decrypts the data certificate according to the corresponding storage path to obtain a plaintext hash value to be confirmed, the intelligent contract is called for comparison, distribution interaction of the data is completed, a credible, reliable, traceable and verifiable mechanism guarantee is established for transmission interaction of the data under the condition that a control party is heterogeneous at a cloud side, reliable and efficient interaction of the data information in a block chain network architecture is achieved, efficiency of cross-chain interaction is improved, and a credible basis is provided for cross-chain application.
Further, the verification method specifically comprises: the consensus node receives information of a chain data certificate structure of the uploading node, downloads a previously stored encrypted value from a storage space, and analyzes the data certificate structure to obtain uploading node information, a plaintext hash value and an encrypted hash value in the data certificate structure; then comparing the stored encryption value with the encryption value obtained by analysis for verification, if the verification is passed, packaging the data certificate structure into blocks, and storing the plaintext hash value into a storage space so as to be conveniently corresponding to the plaintext hash value in the intelligent contract in the follow-up process, otherwise, discarding the uplink request; the common identification node verifies other data information in the data certificate structure, and after the verification is passed, the common identification node is mounted behind the current block of the block chain network, so that the traceability tracking of the data information is ensured; after other common identification nodes receive the block which is just mounted in the block chain network, finding the data with the uploading type, downloading the encrypted value data stored in the storage space according to the storage path, and carrying out the verification in the same way, if the verification is passed, packaging the data certificate structure into a block, and storing the plaintext hash value into the storage space so as to be convenient for subsequent correspondence with the plaintext hash value in the intelligent contract, otherwise, discarding the uplink request; and when all the information in the block passes the verification, mounting the block behind the current block.
The further storage process is specifically as follows: through uploading consensus confirmation, the consensus node calls a storage function of the intelligent contract, and analyzes the data certificate structure to obtain uploading node information, downloading node information and a plaintext hash value; and according to the uploading node information, the downloading node information and the plaintext hash value, taking the uploading node information and the downloading node information as key values, taking the plaintext hash value as a value to be stored, and setting the stored position as an intelligent contract in the cloud edge terminal block chain network.
The authenticity and the integrity of the data information in the distribution interaction process are ensured through the method, but in the cloud side architecture, due to the heterogeneous environment among the three, the privacy of the data information needs to be used as an important factor for strengthening mutual trust of the three during data information interaction.
In one embodiment, the method further comprises the following steps: uploading data to be distributed to a storage space by an uploading node, linking a storage certificate to a block chain network, and writing an access authority rule into an intelligent contract; setting access authority according to an RBAC mechanism in the intelligent contract, and refining access control to data items; when downloading data information, downloading a node, firstly calling an intelligent contract checking authority, and returning an item which can be accessed by the node and a corresponding storage address by the intelligent contract; and downloading the corresponding data items by the downloading node, and linking the downloading result. Wherein, RBAC mechanism is Role-Based Access Control mechanism. The rule of the access authority is written into the intelligent contract through the uploading node, wherein the access rule is that the downloading node needs a unique and corresponding downloading token to correspond to the intelligent contract, and the access authority can be obtained through the intelligent contract identification, so that the data information has privacy protection when cross-chain interaction is carried out. By introducing the RBAC mechanism, in the RBAC model, the authority is associated with the role, different roles have different authorities, and after the user obtains the authority users of different roles by being distributed to different roles and is associated with the role, the user can carry out autonomous authorization and authority specialization at the same time, and authorization information must be controlled through the roles to realize access control, so that the privacy protection is controllable and adjustable, and is very flexible.
By the method, the integrity, authenticity and privacy of the data information during distribution interaction are guaranteed, and a reliable and safe foundation is laid for the application of the data certificate structure in the block chain network framework.
As shown in fig. 2, a design diagram of a cloud-edge-oriented chain-spanning architecture is shown, where the cloud-edge-oriented chain-spanning architecture includes: the system comprises a main block chain formed by cloud center nodes, a lightweight block chain formed by edge computing nodes and event collection nodes. The main block chain can be used as a main chain, the lightweight block chain can be used as a side chain, and a vertical cloud-edge spanning chain architecture is constructed; the main block chain can also be used as a relay chain, the lightweight block chain is used as a sub-chain, and the sub-chain is divided into a demand chain and a service chain to form a cross-domain edge-cloud-edge cross-chain architecture; the event collection node is specially responsible for collecting the consensus events of the main block chain and the lightweight block chain, and triggers one chain to link the consensus events on the other chain, so that complex cross-chain trusted interaction of information is completed.
In the vertical cloud-edge chain-crossing structure, the side chain is mainly used for expanding the performance of the main chain, the main chain is used as a brain, and the side chain is used as four limbs to finish a series of different operation scenes; in the cross-domain edge-cloud-edge cross-link architecture, the relay link is biased to pull through the service of each sub-chain, the relay link is used as a verification mechanism, one end of each sub-chain is a demand side, and the other end of each sub-chain is a service side, and the information sharing between the demand side and the service side is achieved through the verification of the relay link.
In the following, the reliable distribution and cross-chain trusted interaction are respectively performed for the two proposed architectures
In one embodiment, as shown in fig. 4, the reliable distribution and cross-chain trusted interaction steps based on the vertical cloud-edge cross-chain architecture are as follows:
step 402, the cloud center computing node calls a side chain to read a block header of the cloud center computing node, and uplink information is generated based on the block header information of the side chain, wherein the uplink information comprises a data certificate structure.
It should be noted that the specific process of uploading the data credential structure is as follows: the cloud center computing node reads a block header from a side chain through an RPC (Remote Procedure Call), generates uplink information based on information of the block header in the side chain, and then uplinks the uplink information to a main chain, wherein the information in the block header includes a data credential structure constructed in a block chain network of the side chain. The data certificate structure is linked from the side chain to the block chain network of the main chain through the steps.
In step 404, the side chain identifies and confirms the data certificate structure, and invokes the main chain SPV validation contract to validate the uplink information.
And the consensus confirmation is specifically that all consensus nodes in the cloud edge block chain network continuously monitor the data certificate structure until the data certificate structure is verified and confirmed to form an uploading consensus confirmation. Through the steps, a consensus confirmation mechanism can ensure that data information is real and reliable, and an SPV (Simple Payment Verification) contract can ensure that information data is efficient during interaction.
In step 406, it is verified that the side chain links the uplink information to the main chain according to the specification of the main chain SPV contract.
In the step, after the uplink information passes the simple payment verification, the side chain transmits the uplink information to the main chain after the simple verification according to the rule in the SPV contract, so that the high efficiency of the uplink information in chain crossing is maintained.
Step 408, the edge computing node calls a main chain to read a block header of the edge computing node, and uplink information is generated based on the block header, wherein the uplink information comprises a data certificate structure;
similarly, the edge computing node reads the block header from the main chain through the RPC, generates uplink information based on information of the block header in the main chain, and then uplink the uplink information to the side chain, where the information in the block header includes a data credential structure constructed in the block chain network of the main chain. The data credential structure is linked from the main chain to the block chain network of the side chain by this step.
Step 410, the main chain identifies and confirms the data certificate structure, and calls a side chain SPV (shortest Path bridging) verification contract to verify the uplink information;
similarly, step 112 verifies the uplink information by applying SPV contract verification of the side chain and consensus confirmation of the main chain.
In step 412, it is verified that the backbone chains link the uplink information to the side chains according to the side chain SPV contract.
And through SPV verification contract verification of the side chain, the main chain transmits the uplink information to the side chain according to contract regulations in the SPV contract, so that the uplink from the main chain to the side chain is completed, and the bidirectional anchoring of the main chain and the side chain is completed.
According to the method for applying the data certificate structure to the vertical cloud-edge chain-crossing architecture, aiming at the requirement that the cloud-edge needs to be subjected to trusted interaction, a chain-crossing mechanism in two directions from the cloud to the edge and from the edge to the cloud is designed by utilizing a side chain-crossing technology, and the mutual recognition confirmation of the common recognition node in the block chain network and the SPV verification mechanism realize the bidirectional anchoring of the chain and the chain, so that the safety of information interaction between the cloud and the edge is ensured, and the efficiency of the method is improved.
In one embodiment, the SPV verification process includes: after the data certificate structure is identified and confirmed, the cloud center computing node verifies the result of the data certificate structure after the identification and confirmation through the block head of the block chain, the Merkle tree root corresponding to the block chain and the storage path, and when the verification result is passed, the chain link is determined according to the main chain SPV verification contract, so that the traceability of the data information in the efficient interaction process is ensured.
In an embodiment, as shown in fig. 5, a block chain-based cloud edge data distribution method and a cross-chain interaction method are provided, and the method is applied to a trusted collaboration method in the vertical cross-chain mechanism in fig. 2, and includes:
step 502, an end sensor collects data to be distributed, encrypts the data to be distributed through a reliable distribution mechanism to form information characteristics, stores the information characteristics to an edge computing node, and links a stored certificate to a lightweight block chain;
the data to be distributed is task data acquired by sensor equipment of an end-layer structure, the reliable distribution mechanism is to encrypt a series of data to be distributed and obtain hash values through an uploading node and a downloading node in a block chain network architecture, and the information characteristics are encrypted hash values finally obtained through the reliable distribution mechanism.
Step 504, the edge computing node links the information features to a blockchain network, a consensus node in the blockchain network verifies the information features, a comparison function of the intelligent contract is triggered, after the comparison is passed, the downloading node extracts codes of the information features, and the codes are downloaded to the edge computing node;
the block chain network is a lightweight block chain network, and the extracted code is a data certificate structure. In the lightweight block chain network architecture, a data voucher structure is constructed by taking the encrypted hash value as core information, a voucher is uploaded to the lightweight block chain network, and an edge computing node in the block chain network is used as a consensus node to perform consensus confirmation on the data voucher structure.
Step 506, the edge computing node sends a cross-chain request to the main block chain to verify the correctness of the code, and the information characteristic of the code is extracted after the verification is passed;
in this step, the cross-chain mode is a vertical cloud-side cross-chain mode, and the verification mode is also a verification mode in the vertical cloud-side cross-chain method, namely consensus verification and SPV verification. And verifying and analyzing the data structure certificate of the uplink in the master blockchain network, and obtaining the encrypted hash value, namely the information characteristic again. The safety and reliability of the information during cross-chain interaction are ensured.
Step 508, the edge computing node links the extracted information features to the lightweight block chain, and calls an SPV (shortest Path verification) contract after the lightweight block chain consensus verification to cross-link the information features to the main block chain;
where the informative features are the correct ones that have been verified, the cross-chaining from side chain to main chain is done by the correct informative features of step 208.
Step 510, generating an instruction issue of an opposite end layer structure after the main block chain consensus confirms the information characteristics;
the command issuing is mainly aimed at a controller of an end layer structure, and through the step, the consensus confirmation of the information characteristics in the main chain is completed and the issued command is generated.
Step 512, the instruction calls a lightweight block chain SPV verification contract after the main block chain consensus is verified, and the instruction is linked to the lightweight block chain in a cross mode;
the instruction is the instruction which passes the verification and is correct, and the instruction as the information passes the consensus verification and the SPV verification of the block chain network, so that the core information of the information in the conversion process is kept consistent all the time.
And 514, after the command is confirmed to the lightweight block chain consensus, distributing the command to a controller appointed in the end layer structure for corresponding command operation.
The homologism instruction is used as the consensus confirmation of the information through the lightweight block chain network, the core information of the information in the conversion process is kept consistent all the time, and the information is ensured to be accurately sent to the corresponding controller.
According to the credible service cooperation method of the vertical cloud-edge-crossing chain architecture, credible interaction services from the end sensor to the edge computing node and then to the cloud center node are designed by means of the reality and the integrity of the consensus algorithm and the block chain technology, so that safe and credible guarantee is provided for vertical cloud edge-end application, and a foundation is laid for design and development of upper-layer application.
In one embodiment, as shown in fig. 6, the steps of reliable distribution and cross-chain trusted interaction based on the cross-domain cloud-edge-cloud cross-chain architecture are as follows:
step 602, taking a lightweight block chain as an a chain, another lightweight block chain as a B chain, and a main block chain as a relay chain;
the A chain is a demand chain, the B chain is a service chain, the lightweight block chain is used as a sub-chain of the main block chain, the main block chain is a relay chain, the relay chain is heavier than pulling services among the sub-chains, the demand information uploaded by the demand chain is legally verified to form a consensus, meanwhile, the feedback information of the service chain is legally verified to form a consensus, and the service chain and the demand chain are matched with each other when the two pieces of information are matched. And establishing a trusted bridge for information interaction between the child chains.
Step 604, the edge computing node in the A chain initiates a first cross-chain uplink action, the first cross-chain uplink action enters the A chain after the A chain consensus verification is passed, and the event is used as a first cross-chain event;
in this step, the first cross-link uplink action is to link the data credential structure in the a-chain architecture to the block chain network of the a-chain, and perform consensus verification by using a consensus node in the block chain network of the a-chain, where the encrypted data information in the data credential structure is the required information. The first cross-link event is to link the data certificate structure to the block chain network, and form consensus confirmation after consensus verification.
Step 606, after receiving the first cross-chain event, the event collection node verifies the authenticity of the first cross-chain uplink action, after the verification is passed, a Merkle tree root of the first cross-chain uplink action is constructed, a third encrypted value is formed by using a private key signature of the event collection node, the third encrypted value is linked to a cloud center main chain, and the cloud center main chain node verifies the validity and achieves a first consensus;
the third encryption value contains the requirement information uploaded by the requirement chain, and the requirement information forms a consensus confirmation after being legally verified by the relay chain node, namely the first consensus, and the requirement information is submitted from the requirement chain to the relay chain. The cochain action ensures the integrity and authenticity of the data information through authenticity verification and encryption processing.
Step 608, after receiving the first common identity, the event collection node initiates a second cross-link uplink action on the B-chain, where the second cross-link uplink action is verified by the common identity node, and enters the B-chain after verification, and this event is used as a second cross-link event;
in this step, the uplink area is a network of a service chain, the event collection node transmits the first common identification event to the service chain, the authenticity of the first common identification event is verified through the common identification node in the service chain network, and the first common identification event is linked to the intelligent contract of the service chain after the authenticity of the first common identification event passes the verification.
Step 610, after receiving the second cross-chain event, the event collection node verifies the authenticity of the first cross-chain uplink action, after the verification is passed, a Merkle tree root of the first cross-chain uplink action is constructed, a fourth encryption value is formed by using a private key signature of the event collection node, the fourth encryption value is uplink to the cloud center main chain, and the cloud center main chain node verifies the validity and achieves a second consensus;
similarly, the fourth encrypted value includes feedback information of the service chain, and the feedback information forms a consensus confirmation, i.e., a second consensus, after the validity of the relay chain is verified. In the step, the integrity and the authenticity of the data information are ensured through the authenticity verification and the encryption processing of the uplink action.
Step 612, after receiving the second consensus, the event collection node initiates a new round of inter-chain actions on the chain a to complete the inter-domain request closed loop.
In the step, the requirement information of the requirement chain is compared and matched with the feedback information of the service chain, and the service chain is matched with the requirement chain when the requirement information is matched with the feedback information of the service chain. The cross-domain cross-chain of the data information from the demand chain to the service chain is realized.
According to the cross-domain type edge-cloud-edge chain crossing method, aiming at the requirement of trusted interaction on edge-cloud-edge, a chain crossing mechanism from the edge (a requirement chain) to the cloud (a main chain) and then to another edge (a service chain) is designed by using a chain crossing technology of a cloud center block chain as a relay chain, and cochain is continuously collected and triggered through an event collection node, so that the request and response between the requirement chain, the main chain and the service chain are very efficient, the problem that a consensus node plays multiple roles is avoided, the efficiency of cross-domain trusted interaction is improved, and meanwhile, the security and the credibility of data information during the cross-domain interaction are ensured through consensus verification and encryption information of a data certificate structure.
In one embodiment, a cross-domain edge-cloud-edge trusted service coordination method is provided, which includes the steps of: one lightweight blockchain is a first domain, the other lightweight blockchain is a second domain, a first node is arranged in the first domain, and a second node is arranged in the second domain; the first node requesting authentication of the second node in the second domain; the method comprises the steps that a first node initiates an authentication uplink request in a first domain, an edge computing node performs consensus confirmation on the identity of the first node, the uplink request is subjected to cross-link to a main block chain after the consensus confirmation, and the cross-link is submitted to a second domain after the main block chain performs consensus on the uplink request; the second domain performs common identification confirmation on the identity of the second node, the uplink request is subjected to common identification confirmation, the uplink request is sent to the main block chain, and after the main block chain performs common identification on the uplink request, the main block chain submits the uplink request in a cross-chain mode to the first domain; after the consensus, the first node can perform service interaction with the second node.
The cross-domain cloud edge trusted service cooperation method establishes a trusted authentication mechanism between one edge computing domain and another edge computing domain by utilizing a cross-domain edge-cloud-edge cross-chain architecture and a block chain consensus mechanism based on the authenticity and integrity of a consensus algorithm, ensures that data information is safe and trusted during cross-domain interaction, and provides a trusted basis for cross-domain application.
Furthermore, the event collection node is specially responsible for collecting the consensus events of the main blockchain and the lightweight blockchain, and triggers one chain to link the consensus event to the other chain, so that the complex cross-chain credible interaction of information is completed, the problem that the consensus nodes in the blockchain network need to collect the consensus events and confirm the authenticity of the consensus events is solved, and the efficiency of the data processing process is improved.
It should be understood that, although the steps in the flowcharts of fig. 3, 4, 5, and 6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A cloud edge end data distribution method and a cross-chain interaction method based on a block chain are characterized in that the method is applied to a Yun Bianduan block chain network architecture, and the Yun Bianduan block chain network architecture comprises the following steps: an end layer structure, an edge layer structure and a cloud layer structure; the end layer structure comprises a controller and sensor equipment, wherein the sensor equipment is used for collecting task data, and the controller is used for executing instructions; the edge layer structure comprises edge computing nodes, and a lightweight block chain is formed by the edge computing nodes; the cloud layer structure comprises cloud center computing nodes, and the cloud center computing nodes form a main block chain;
the method comprises the following steps:
the uploading node obtains a plaintext Hash value from the data to be distributed, encrypts the data to be distributed according to a public key of the downloading node to obtain a first encryption value, encrypts the first encryption value by using a private key of the uploading node to obtain a second encryption value, and obtains an encrypted Hash value by taking the Hash of the second encryption value;
the uploading node stores the first encryption value and the second encryption value in a storage space and feeds back a storage path in the storage space;
the uploading node constructs a data certificate structure according to uploading node information of the uploading node, downloading node information of the downloading node, a plaintext hash value, an encrypted hash value and the storage path;
uploading the data certificate structure to the cloud edge block chain network architecture, verifying the data certificate structure through a consensus node in the Yun Bianduan block chain network architecture, adding the data certificate structure into the Yun Bianduan block chain network architecture, taking the uploading node information and the downloading node information as key values, and storing the plaintext hash value as a value in an intelligent contract; the consensus node is the edge computing node or the cloud center computing node;
and the downloading node downloads the data to be distributed according to the storage path of the data certificate structure to obtain a first encryption value to be confirmed, decrypts the first encryption value to be confirmed according to a private key of the downloading node to obtain a plaintext hash value to be confirmed, calls the intelligent contract, compares the plaintext hash value to be confirmed with the plaintext hash value, and determines that the data to be distributed of the uploading node is distributed to the downloading node when the plaintext hash value to be confirmed is the same as the plaintext hash value.
2. The method of claim 1, wherein validating and joining the data credential structure to the Yun Bianduan block-chain network architecture by a consensus node in the Yun Bianduan block-chain network architecture comprises:
receiving the data certificate structure uploaded by the uploading node through a consensus node in the Yun Bianduan block chain network architecture, downloading the data certificate structure according to the storage path, and analyzing the data certificate structure to obtain uploading node information, a plaintext hash value and an encrypted hash value;
after the data certificate structure is verified according to the uploading node information and the encrypted hash value, mounting a block corresponding to the data certificate structure in a block queue of the Yun Bianduan block chain network architecture; sending the data certificate structure to other common identification nodes for secondary verification, if the verification is not passed, discarding the block, and if the verification is passed, mounting the block corresponding to the data certificate structure in a block queue of the Yun Bianduan block chain network architecture;
and all the consensus nodes in the cloud edge block chain network continuously monitor the data certificate structure, and the data certificate structure is verified and confirmed to form uploading consensus confirmation.
3. The method according to claim 1, wherein the consensus node takes the uploading node information and the downloading node information as key values, and the plaintext hash value is stored as a value in an intelligent contract, comprising:
through the uploading consensus confirmation, the consensus node calls a storage function of the intelligent contract and analyzes the data certificate structure to obtain uploading node information, downloading node information and a plaintext hash value;
and according to the uploading node information, the downloading node information and the plaintext hash value, taking the uploading node information and the downloading node information as key values, taking the plaintext hash value as a value for storage, and taking the stored position as an intelligent contract in the cloud edge terminal block chain network.
4. The method according to claim 1, wherein the block chain-based cloud edge data distribution method and the cross-chain interaction method further include:
the main block chain is used as a main chain, and the lightweight block chain is used as a side chain to form a vertical cloud-edge spanning chain structure;
the cloud center computing node calls the side chain to read the block head of the cloud center computing node, and uplink information is generated based on the block head information of the side chain, wherein the uplink information comprises a data certificate structure;
the side chain carries out consensus confirmation on the data certificate structure, and after the consensus confirmation, the side chain calls a main chain SPV (shortest path variable) verification contract to verify the uplink information;
when the verification is passed, the side chain specifies uplink according to the uplink information in the main chain SPV verification contract;
the edge computing node calls the main chain to read the block head of the edge computing node, and generates uplink information based on the block head information of the main chain, wherein the uplink information comprises a data certificate structure;
the main chain carries out the consensus confirmation on the data certificate structure, and after the consensus confirmation, the main chain calls a side chain SPV verification contract;
when the verification is passed, the main chain specifies the uplink information according to the side chain SPV verification contract.
5. The method of claim 4, wherein the main chain SPV validation contract and the side chain SPV validation contract validate the uplink information, comprising:
after the data certificate structure is confirmed by the consensus, the cloud center computing node verifies the result of the data certificate structure after the consensus confirmation through the block head of the side chain, the Merkle tree root corresponding to the side chain and the storage path, and when the verification result is passed, the uplink is verified according to the rule in the main chain SPV verification contract;
after the data certificate structure is subjected to the consensus confirmation, the edge computing node verifies the result of the data certificate structure subjected to the consensus confirmation through the block head of the main chain, the Merkle tree root corresponding to the main chain and the storage path, and when the verification result is passed, the upper chain is verified according to the regulations in the side chain SPV verification contract.
6. The method according to claim 1, wherein the block chain-based cloud edge data distribution method and the cross-chain interaction method further include:
the end sensor collects data to be distributed, encrypts the data to be distributed through a reliable distribution mechanism to form information characteristics, stores the information characteristics to an edge computing node, and links a stored certificate to a lightweight block chain;
the edge computing node links the information features to a blockchain network, a consensus node in the blockchain network verifies the information features, a comparison function of the intelligent contract is triggered, a downloading node extracts codes of the information features after comparison is passed, and the codes are downloaded to the edge computing node;
the edge computing node sends a cross-chain request to the main block chain to verify the correctness of the code, and the information characteristic of the code is extracted after the verification is passed;
the edge computing node links the extracted information features to the lightweight block chain, calls an SPV (shortest path distance) verification contract after the lightweight block chain consensus verification, and links the information features to a main block chain in a cross-linking mode;
after the main block chain consensus confirms the information characteristics, generating and issuing an instruction to the end layer structure;
the instruction calls the light weight block chain SPV verification contract after the main block chain consensus is verified, and the instruction is linked to the light weight block chain in a cross mode;
and after the command is confirmed to the lightweight block chain consensus, the command is distributed to a designated controller in the end layer structure to carry out corresponding command operation.
7. The method according to claim 1, wherein the block chain-based cloud edge data distribution method and the cross-chain interaction method further include:
taking a lightweight block chain as an A chain, taking another lightweight block chain as a B chain, taking a main block chain as a relay chain, and constructing a cross-domain cloud-edge-cloud cross-chain architecture;
initiating a first cross-chain uplink action by an edge computing node in the A chain, wherein the first cross-chain uplink action enters the A chain after passing the A chain consensus verification, namely a first cross-chain event;
after receiving the first cross-chain event, the event collection node verifies the authenticity of the first cross-chain uplink action, after the first cross-chain uplink action passes the verification, a Merkle tree root of the first cross-chain uplink action is constructed, a third encryption value is formed by using a private key signature of the event collection node, the third encryption value is linked to the cloud center main chain, and the cloud center main chain node verifies the validity and achieves a first common identification;
after receiving the first common identifier, the event collection node initiates a second cross-link uplink action on the service chain, wherein the second cross-link uplink action is verified by the common identifier node and enters the B chain after the verification, namely a second cross-link event;
after the event collection node monitors the second cross-link event, authenticity verification is conducted on the second cross-link chain loading action, after the second cross-link chain loading action passes the verification, a Merkle tree root of the second cross-link chain loading action is constructed, a fourth encrypted value is formed by using a private key signature of the event collection node, the fourth encrypted value is chain loaded to the cloud center main chain, and the cloud center main chain node conducts validity verification and achieves second common identification;
and after monitoring the second consensus, the event collection node initiates a chain crossing action on the chain A to complete the closed loop of the cross-domain request.
8. The method of claim 7, wherein the trusted service coordination method specifically applied to the data credential structure in the information cross-domain interaction is as follows:
the first lightweight blockchain is a first domain, the other lightweight blockchain is a second domain, a first node is arranged in the first domain, and a second node is arranged in the second domain; the first node requesting authentication of a second node in a second domain;
the first node initiates an authenticated uplink request in the first domain, the edge computing node performs the consensus confirmation on the identity of the first node, after the consensus confirmation, the uplink request is linked to the main blockchain in a cross mode, and after the main blockchain performs the consensus confirmation on the uplink request, the main blockchain submits the link to the second domain in a cross mode; the second domain performs the common identification confirmation on the identity of the second node, and also performs the common identification confirmation on the uplink request, the uplink request is uplink to the main block chain, and after the main block chain identifies the uplink request, the main block chain submits the uplink request in a cross-chain manner to the first domain;
after the consensus, the first node can perform service interaction with the second node.
9. The method of claim 7 wherein the event collection node collects consensus events for both master and lightweight blockchains and triggers the consensus event to be linked one to the other.
10. The method of claim 1, wherein the upload node, download node, and storage do not belong to a blockchain network; the consensus node and the intelligent contract belong to a block chain network, and the block chain network architecture comprises a block chain network, an uploading node, a downloading node and a storage and event collection node.
CN202211221163.3A 2022-10-08 2022-10-08 Cloud edge end data distribution method and cross-chain interaction method based on block chain Active CN115622762B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211221163.3A CN115622762B (en) 2022-10-08 2022-10-08 Cloud edge end data distribution method and cross-chain interaction method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211221163.3A CN115622762B (en) 2022-10-08 2022-10-08 Cloud edge end data distribution method and cross-chain interaction method based on block chain

Publications (2)

Publication Number Publication Date
CN115622762A true CN115622762A (en) 2023-01-17
CN115622762B CN115622762B (en) 2024-07-30

Family

ID=84861515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211221163.3A Active CN115622762B (en) 2022-10-08 2022-10-08 Cloud edge end data distribution method and cross-chain interaction method based on block chain

Country Status (1)

Country Link
CN (1) CN115622762B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107136A (en) * 2019-12-05 2020-05-05 上海中信信息发展股份有限公司 Block chain cross-chain relay method based on IPFS
WO2020207264A1 (en) * 2019-04-08 2020-10-15 阿里巴巴集团控股有限公司 Network system, service provision and resource scheduling method, device, and storage medium
CN111866086A (en) * 2020-06-28 2020-10-30 青岛万民科技有限公司 Block chain control method and system based on cloud edge
CN112163045A (en) * 2020-10-29 2021-01-01 杭州谐云科技有限公司 Block chain-based edge data secure storage system
CN113010922A (en) * 2021-02-28 2021-06-22 昆明理工大学 Tamper-proof energy industry internet multi-edge chain data sharing method
CN114553883A (en) * 2022-03-02 2022-05-27 北京中科锐链科技有限公司 Cloud edge terminal cooperative data acquisition and privacy protection method and system based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020207264A1 (en) * 2019-04-08 2020-10-15 阿里巴巴集团控股有限公司 Network system, service provision and resource scheduling method, device, and storage medium
CN111107136A (en) * 2019-12-05 2020-05-05 上海中信信息发展股份有限公司 Block chain cross-chain relay method based on IPFS
CN111866086A (en) * 2020-06-28 2020-10-30 青岛万民科技有限公司 Block chain control method and system based on cloud edge
CN112163045A (en) * 2020-10-29 2021-01-01 杭州谐云科技有限公司 Block chain-based edge data secure storage system
CN113010922A (en) * 2021-02-28 2021-06-22 昆明理工大学 Tamper-proof energy industry internet multi-edge chain data sharing method
CN114553883A (en) * 2022-03-02 2022-05-27 北京中科锐链科技有限公司 Cloud edge terminal cooperative data acquisition and privacy protection method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YUGUO AN ET.AL: "Trusted collection, management and sharing of data based on blockchain and IoT devices", 《2019 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS》, 13 January 2020 (2020-01-13) *

Also Published As

Publication number Publication date
CN115622762B (en) 2024-07-30

Similar Documents

Publication Publication Date Title
US11283797B2 (en) Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
CN110177354A (en) A kind of wireless control method and system of vehicle
US20090307486A1 (en) System and method for secured network access utilizing a client .net software component
CN109862040A (en) A kind of safety certifying method and Verification System
CN101409619B (en) Flash memory card and method for implementing virtual special network key exchange
CN109525671A (en) Date storage method, electronic equipment and storage medium based on block chain
CN109753815A (en) Data processing method, data processing network and electronic equipment based on block chain
CN107040513A (en) A kind of credible access registrar processing method, user terminal and service end
CN109741068A (en) Internetbank inter-bank contracting method, apparatus and system
CN110493237A (en) Identity management method, device, computer equipment and storage medium
CN114866323B (en) User-controllable privacy data authorization sharing system and method
CN113141365B (en) Distributed micro-service data transmission method, device, system and electronic equipment
CN109587100A (en) A kind of cloud computing platform user authentication process method and system
CN115580414A (en) Data opening system and method based on privacy computation
CN116975901A (en) Identity verification method, device, equipment, medium and product based on block chain
CN110838919B (en) Communication method, storage method, operation method and device
CN114781006A (en) Outsourcing data integrity auditing method and system based on block chain and SGX
CN111327591A (en) Data transmission method, system and storage medium based on block chain
CN112235276B (en) Master-slave equipment interaction method, device, system, electronic equipment and computer medium
CN113205342A (en) User identity authentication method and device based on multi-terminal payment
CN110851804B (en) Alliance chain identity authentication mode based on electronic contract
CN115622762A (en) Cloud edge data distribution method based on block chain and cross-chain interaction method
CN116961911A (en) Information processing method and device and communication equipment
CN114495352A (en) Electronic fund payment system and method based on payment terminal identity authentication control mechanism
CN113347004A (en) Encryption method for power industry

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant