CN115987693B - Data transmission method and system based on block chain - Google Patents

Data transmission method and system based on block chain Download PDF

Info

Publication number
CN115987693B
CN115987693B CN202310272839.XA CN202310272839A CN115987693B CN 115987693 B CN115987693 B CN 115987693B CN 202310272839 A CN202310272839 A CN 202310272839A CN 115987693 B CN115987693 B CN 115987693B
Authority
CN
China
Prior art keywords
data
node
sending
slave
master
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310272839.XA
Other languages
Chinese (zh)
Other versions
CN115987693A (en
Inventor
孙晓宇
黄博
江培荣
王波
陈庭强
田凯强
刘鹏
高飞
冯俊超
张旭林
李强
麻亮
谭思涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Yunlitchi Technology Co ltd
Original Assignee
Chengdu Yunlitchi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Yunlitchi Technology Co ltd filed Critical Chengdu Yunlitchi Technology Co ltd
Priority to CN202310272839.XA priority Critical patent/CN115987693B/en
Publication of CN115987693A publication Critical patent/CN115987693A/en
Application granted granted Critical
Publication of CN115987693B publication Critical patent/CN115987693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a data transmission method and a system based on a block chain, wherein a forwarding node is introduced into the block chain, and the forwarding node is utilized to assemble the transmission data from a transmission node and a plurality of different slave transmission nodes into new transmission data, so that the technical problem of being tracked in the data transmission process is avoided, and the safety of data transmission is obviously improved.

Description

Data transmission method and system based on block chain
Technical Field
The present invention relates to the field of blockchain, and in particular, to a blockchain-based data transmission method and system.
Background
Data security refers to protecting and managing data owned by an organization to ensure the integrity, availability, and confidentiality of the data. Data security is critical to the business operations and development of an organization because data is an important property of an organization, including various business data inside an organization, personal information of a client, and the like. Protecting such data from any unauthorized access, theft, vandalism and tampering is one of the important issues that organizations need to solve.
Existing techniques include, but are not limited to, the following: using encryption protocols, such as TLS/SSL, to protect the security of the data during transmission; access control is implemented, and only authenticated users can access data; the integrity and the authenticity of the data are ensured by adopting a digital signature technology; implementing data backup and disaster recovery measures to ensure the availability of data; the firewall, the intrusion detection system and other technologies are adopted to protect the data in the network from unauthorized access and attack; secure remote connections are established using a Virtual Private Network (VPN), data is encrypted using data encryption software, secure communications are performed using Secure Sockets Layer (SSL) protocols, and so on.
Without any error, the prior art can improve the security of data transmission to some extent, but note that such security is not absolute. Because any network behavior of the user is marked, when the user's behavior is sufficiently high, even the most sophisticated encryption method is used, any data transmitted by the user is undoubtedly lost. This is because, in addition to the data itself, the user's behavior itself may be collected, for example, what time, what place, what content the user has clicked on may be known by the content provider or the operator even by ordinary people, the user may not know that his own behavior data has been collected when the behavior data is collected, and when the user's behavior is collected enough, almost any data that it transmits may be guessed.
For example, when Zhang san passes a milky tea store, a cup of milky tea is purchased and a photo is taken, when he opens the chat software, he is likely to send the photo just taken to Lisi four if he is often in contact with the IP address where Lisi four is located, and although other people do not know whether Zhang san sent a message to Lisi four or not, he does not have to send the photo he just taken, the prior art has guessed that Bajiu is not ten. This is just a simple example, but it is what has happened in reality.
To solve the above problem, zhang Sanhe tries to send the picture to Wang five, wang five then to Zhao Liu, zhao Liu then to Sun Qi, …, after a series of people, and finally to Lifour. The forwarding method can increase the security of data transmission to a certain extent, but is not an ultimate method, because when Zhang three can be found to send certain data to Wang five, wang five in turn sends certain data to Zhao Liu, however, the data can be tracked in the transmission process, and the end can be easily found only by connecting each piece of data.
The blockchain is a decentralised distributed database technology, which realizes the improvement of the security, the transparency and the credibility of data by distributing the data on a plurality of nodes and using the cryptography technology to ensure that the data cannot be tampered with.
Although the blockchain can realize transparent transmission of data, both the sender and the receiver exist in the blockchain with a certain ID identity, if the ID on the chain is known, the ID and the individual have a corresponding relationship, that is, the ID on the chain is known, and the transmission object can be known.
Therefore, forwarding nodes are specially introduced into the blockchain, and the forwarding nodes are further assembled and encrypted, so that the data tracking security problem possibly existing in the centralized network and the traditional blockchain data transmission is solved.
Disclosure of Invention
The invention provides a data transmission method based on a block chain, which is characterized by comprising the following steps:
s1, constructing a data transmission network, wherein the data transmission network is a decentralised blockchain, the blockchain is composed of a plurality of nodes, and the nodes comprise storage spaces and synchronous clocks.
S2, determining a main sending node and a main receiving node, and encrypting main sending data at the main sending node to obtain encrypted main sending data; and determining a plurality of slave sending nodes, and encrypting the plurality of slave sending data at the plurality of slave sending nodes to obtain a corresponding plurality of encrypted slave sending data.
S3, determining a master random factor f of the master transmitting node and a slave random factor hi of each slave transmitting node, wherein i represents an ith slave transmitting node.
S4, randomly dividing the encrypted main transmission data into f sub-data, and randomly dividing each encrypted sub-transmission data into hi sub-data respectively.
S5, randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes in a forwarding period T of each forwarding node to form assembled data, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the sub-data with reserved data to be received data, updating the forwarding node to be a new master sending node, and updating the assembled data to be the master sending data of the forwarding node.
S6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data.
S7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.
In addition, to implement the above method, we also propose a data transmission system based on a blockchain, which is characterized in that the system includes:
the main sending node is used for encrypting the main sending data to obtain encrypted main sending data, determining a main random factor f, randomly dividing the encrypted main sending data into f sub-data, and sending each sub-data to the forwarding node;
the slave transmitting node is used for encrypting the slave transmitting data to obtain encrypted slave transmitting data, determining a slave random factor hi, dividing the encrypted slave transmitting data into hi sub-data randomly, and transmitting each sub-data to the forwarding node.
And (3) a forwarding node: in the forwarding period T, sub-data from a master sending node and a plurality of slave sending nodes are received and assembled to form assembled data, the assembled data is updated to be a new master sending node, the assembled data is forwarded to the next forwarding node, if the forwarding node is a master receiving node, the sub-data from the master sending node is reserved in the node, and the sub-data and the reserved data are assembled to be received data.
The master receiving node: and receiving the data from the main sending node, and decrypting and restoring the data into original main sending data.
From the receiving node: data from the slave transmitting node is received and decrypted to restore the original slave transmitting data.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the following description refers to the drawings to be used in the embodiments.
Fig. 1 is a flowchart of a data transmission method based on a blockchain.
Fig. 2 is a schematic diagram of forwarding nodes forwarding data from different sending nodes in a data transmission method based on a blockchain, wherein 110a is encrypted master sending data, 110b and 110c are encrypted slave sending data, and 110d is data assembled by the forwarding nodes.
Detailed Description
The present invention will be further described with reference to the drawings in this embodiment, and it should be noted that the embodiments provided herein are only some of the embodiments of the present invention. Based on this summary, one of ordinary skill in the art can obtain other methods or products from this summary that may be used to practice the invention, and any modifications of the embodiments set forth in accordance with the embodiments of the invention or further modifications thereof as would be apparent to one of ordinary skill in the art are intended to be within the scope of this application.
Embodiment 1, fig. 1 provides a flowchart of a data transmission method based on a blockchain, which includes the following steps: s1, constructing a data transmission network, wherein the data transmission network is a decentralised blockchain, the blockchain is composed of a plurality of nodes, and the nodes comprise storage spaces and synchronous clocks.
S2, determining a main sending node and a main receiving node, encrypting main sending data at the main sending node to obtain encrypted main sending data, wherein the encrypted main sending data is shown as data indicated by 110a in FIG. 2; a plurality of slave transmitting nodes are determined, and the plurality of slave transmitting data are encrypted at the plurality of slave transmitting nodes to obtain a corresponding plurality of encrypted slave transmitting data, such as data represented by 110b and 110c in fig. 2.
In step S2, the master transmitting node and the slave transmitting node are only logically master-slave, and their positions in the blockchain are equal and master-slave. For example, for user a, node a is used as a master transmitting node, and all other nodes in the blockchain are regarded as slave transmitting nodes of node a, but at a certain moment, when other users transmit data, the other nodes are corresponding master transmitting nodes, and node a is a slave transmitting node of the master transmitting node.
S3, determining a master random factor f of the master transmitting node and a slave random factor hi of each slave transmitting node, wherein i represents an ith slave transmitting node.
S4, randomly dividing the encrypted main transmission data into f sub-data, wherein one sub-data is like a five-pointed star of 110a in FIG. 2, randomly dividing each encrypted sub-transmission data into hi sub-data respectively, and two groups of sub-encryption data are shown in FIG. 2, one group is data shown as 110b, and the other group is data shown as 110 c.
S5, randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes in a forwarding period T of each forwarding node to form assembled data, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the sub-data with reserved data to be received data, updating the forwarding node to be a new master sending node, and updating the assembled data to be the master sending data of the forwarding node.
As shown in fig. 2, the forwarding node p_a receives the encrypted master transmission data 110a from the master transmission node and the two encrypted slave transmission data 110b and 110c from the slave transmission nodes, the sub-data of which are reassembled into a plurality of sets of data in the forwarding node p_a, one of which is shown as 110 d.
In step S5, the forwarding period T is a fixed time, the forwarding period of each node is the same, the starting time of the forwarding period is the same, and the period and the starting time are synchronized according to the synchronization clock in the node; at the forwarding node, since the data from the master transmitting node and the data from the plurality of slave transmitting nodes are secondarily assembled and then transmitted in the form of new data, rather than directly forwarding the received data from a certain node, the forwarding node functions to perform new encryption on the data from different nodes in addition to forwarding the data.
S6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data.
S7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.

Claims (3)

1. The data transmission method based on the block chain is characterized by comprising the following steps of:
s1, constructing a data transmission network, wherein the data transmission network is a decentralised block chain;
s2, determining a master sending node, a master receiving node and a slave sending node, and encrypting the master sending data at the master sending node to obtain encrypted master sending data; determining a plurality of slave sending nodes, encrypting the plurality of slave sending data at the plurality of slave sending nodes to obtain a corresponding plurality of encrypted slave sending data;
s3, determining a master random factor f of a master sending node and a slave random factor hi of each slave sending node, wherein i represents an ith slave sending node;
s4, randomly dividing the encrypted main transmission data into f sub-data, and randomly dividing each encrypted sub-transmission data into hi sub-data respectively;
s5, randomly selecting a plurality of forwarding nodes to forward and assemble data, and specifically comprising the following steps: randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes to form assembled data in a forwarding period T of each forwarding node, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the reserved data into received data, updating the forwarding node into a new master sending node, and updating the assembled data into the master sending data of the forwarding node;
s6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data;
s7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.
2. The method of claim 1, wherein the blockchain is comprised of a plurality of nodes, the nodes including a memory space and a synchronous clock.
3. A blockchain-based data transmission system, the system comprising:
the main sending node is used for encrypting the main sending data to obtain encrypted main sending data, determining a main random factor f, randomly dividing the encrypted main sending data into f sub-data, and sending each sub-data to the forwarding node;
the slave transmitting node is used for encrypting slave transmitting data to obtain encrypted slave transmitting data, determining a slave random factor hi, dividing the encrypted slave transmitting data into hi sub-data randomly, and transmitting each sub-data to the forwarding node;
and (3) a forwarding node: in a forwarding period T, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes to form assembled data, updating the assembled data into a new master sending node, forwarding the assembled data to a next forwarding node, if the forwarding node is a master receiving node, reserving the sub-data from the master sending node in the node, and assembling the sub-data and the reserved data into received data;
the master receiving node: receiving data from a main sending node, and decrypting and restoring the data into original main sending data;
from the receiving node: data from the slave transmitting node is received and decrypted to restore the original slave transmitting data.
CN202310272839.XA 2023-03-21 2023-03-21 Data transmission method and system based on block chain Active CN115987693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310272839.XA CN115987693B (en) 2023-03-21 2023-03-21 Data transmission method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310272839.XA CN115987693B (en) 2023-03-21 2023-03-21 Data transmission method and system based on block chain

Publications (2)

Publication Number Publication Date
CN115987693A CN115987693A (en) 2023-04-18
CN115987693B true CN115987693B (en) 2023-06-13

Family

ID=85963501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310272839.XA Active CN115987693B (en) 2023-03-21 2023-03-21 Data transmission method and system based on block chain

Country Status (1)

Country Link
CN (1) CN115987693B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213916A1 (en) * 2017-05-23 2018-11-29 Zeu Crypto Networks Inc. A secure transmission method for blockchain data based on sctp
CN109067832A (en) * 2018-06-27 2018-12-21 南京百市通数字科技有限公司 A kind of block chain transmission of transaction data method
CN109067522A (en) * 2018-07-27 2018-12-21 深圳市汇尊区块链技术有限公司 A kind of random number Verified secret sharing method
CN111124690A (en) * 2020-01-02 2020-05-08 哈尔滨理工大学 Secure distribution method of E-mail server based on OpenMP thread optimization
CN111327591A (en) * 2020-01-19 2020-06-23 广州得众信息技术有限公司 Data transmission method, system and storage medium based on block chain
WO2021163960A1 (en) * 2020-02-20 2021-08-26 深圳市汇尊区块链技术有限公司 Blockchain-based random number generation method and system, and storage medium
CN114511322A (en) * 2022-01-26 2022-05-17 江苏大学 Relay-based chain-handling cross-link structure and access control method thereof
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium
WO2023020764A1 (en) * 2021-08-18 2023-02-23 Nchain Licensing Ag Coordinating peer-to-peer data transfer using blockchain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213916A1 (en) * 2017-05-23 2018-11-29 Zeu Crypto Networks Inc. A secure transmission method for blockchain data based on sctp
CN109067832A (en) * 2018-06-27 2018-12-21 南京百市通数字科技有限公司 A kind of block chain transmission of transaction data method
CN109067522A (en) * 2018-07-27 2018-12-21 深圳市汇尊区块链技术有限公司 A kind of random number Verified secret sharing method
CN111124690A (en) * 2020-01-02 2020-05-08 哈尔滨理工大学 Secure distribution method of E-mail server based on OpenMP thread optimization
CN111327591A (en) * 2020-01-19 2020-06-23 广州得众信息技术有限公司 Data transmission method, system and storage medium based on block chain
WO2021163960A1 (en) * 2020-02-20 2021-08-26 深圳市汇尊区块链技术有限公司 Blockchain-based random number generation method and system, and storage medium
WO2023020764A1 (en) * 2021-08-18 2023-02-23 Nchain Licensing Ag Coordinating peer-to-peer data transfer using blockchain
CN114511322A (en) * 2022-01-26 2022-05-17 江苏大学 Relay-based chain-handling cross-link structure and access control method thereof
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT;Bin Jia; Xiaosong Zhang; Jiewen Liu; Yang Zhang; Ke Huang; Yongquan Liang;《IEEE Transactions on Industrial Informatics》;第18卷(第6期);全文 *
基于消息中间件的数据交换平台传输框架设计;梁彦杰; 廉东本;《计算机系统应用》;第21卷(第04期);全文 *

Also Published As

Publication number Publication date
CN115987693A (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN108600227B (en) Medical data sharing method and device based on block chain
US10554392B2 (en) Cryptographic key distribution
US9922207B2 (en) Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
CN101569132B (en) Systems and methods for distributing and securing data
US10425225B1 (en) Synchronizable hardware security module
CN110852745B (en) Block chain distributed dynamic network key automatic updating method
CN106104562A (en) Safety of secret data stores and recovery system and method
GB2444338A (en) Granular accessibility to data in a distributed and/or corporate network
CN102687133A (en) Containerless data for trustworthy computing and data services
CN102460460A (en) Secure and private backup storage and processing for trusted computing and data services
CN109995530B (en) Safe distributed database interaction system suitable for mobile positioning system
CN112751673A (en) Supervision-capable data privacy sharing method based on end side cloud cooperation
US12063213B2 (en) Secure peer-to-peer based communication sessions via network operating system in secure data network
US11582241B1 (en) Community server for secure hosting of community forums via network operating system in secure data network
Chen et al. An approach to verifying data integrity for cloud storage
US12113785B2 (en) Directory server providing tag enforcement and network entity attraction in a secure peer-to-peer data network
US20060053294A1 (en) System and method for proving time and content of digital data in a monitored system
US12069032B2 (en) Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network
CN102714653B (en) For the system and method for accessing private digital content
CN115380502A (en) Recovering distributed keys from backup storage
CN115987693B (en) Data transmission method and system based on block chain
CN112562811A (en) Thin client electronic medical data secure sharing method based on block chain
US11870899B2 (en) Secure device access recovery based on validating encrypted target password from secure recovery container in trusted recovery device
CN109120621A (en) Data processor
Kavitha et al. A completely distributed blockchain period authentication framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant