CN115987693B - Data transmission method and system based on block chain - Google Patents

Data transmission method and system based on block chain Download PDF

Info

Publication number
CN115987693B
CN115987693B CN202310272839.XA CN202310272839A CN115987693B CN 115987693 B CN115987693 B CN 115987693B CN 202310272839 A CN202310272839 A CN 202310272839A CN 115987693 B CN115987693 B CN 115987693B
Authority
CN
China
Prior art keywords
data
node
sending
slave
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310272839.XA
Other languages
Chinese (zh)
Other versions
CN115987693A (en
Inventor
孙晓宇
黄博
江培荣
王波
陈庭强
田凯强
刘鹏
高飞
冯俊超
张旭林
李强
麻亮
谭思涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Mingxian Store Supply Chain Management Co ltd
Original Assignee
Chengdu Yunlitchi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Yunlitchi Technology Co ltd filed Critical Chengdu Yunlitchi Technology Co ltd
Priority to CN202310272839.XA priority Critical patent/CN115987693B/en
Publication of CN115987693A publication Critical patent/CN115987693A/en
Application granted granted Critical
Publication of CN115987693B publication Critical patent/CN115987693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供了一种基于区块链的数据传输方法及系统,在区块链中,引入转发节点,利用转发节点将来自主发送节点和多个不同从发送节点的发送数据组装为新的发送数据,避免了数据传输过程中被跟踪的技术问题,显著提高了数据传输的安全性。

Figure 202310272839

The present invention provides a block chain-based data transmission method and system. In the block chain, a forwarding node is introduced, and the forwarding node is used to assemble the sending data of the main sending node and multiple different slave sending nodes into new sending data , avoiding the technical problem of being tracked during data transmission, and significantly improving the security of data transmission.

Figure 202310272839

Description

Data transmission method and system based on block chain
Technical Field
The present invention relates to the field of blockchain, and in particular, to a blockchain-based data transmission method and system.
Background
Data security refers to protecting and managing data owned by an organization to ensure the integrity, availability, and confidentiality of the data. Data security is critical to the business operations and development of an organization because data is an important property of an organization, including various business data inside an organization, personal information of a client, and the like. Protecting such data from any unauthorized access, theft, vandalism and tampering is one of the important issues that organizations need to solve.
Existing techniques include, but are not limited to, the following: using encryption protocols, such as TLS/SSL, to protect the security of the data during transmission; access control is implemented, and only authenticated users can access data; the integrity and the authenticity of the data are ensured by adopting a digital signature technology; implementing data backup and disaster recovery measures to ensure the availability of data; the firewall, the intrusion detection system and other technologies are adopted to protect the data in the network from unauthorized access and attack; secure remote connections are established using a Virtual Private Network (VPN), data is encrypted using data encryption software, secure communications are performed using Secure Sockets Layer (SSL) protocols, and so on.
Without any error, the prior art can improve the security of data transmission to some extent, but note that such security is not absolute. Because any network behavior of the user is marked, when the user's behavior is sufficiently high, even the most sophisticated encryption method is used, any data transmitted by the user is undoubtedly lost. This is because, in addition to the data itself, the user's behavior itself may be collected, for example, what time, what place, what content the user has clicked on may be known by the content provider or the operator even by ordinary people, the user may not know that his own behavior data has been collected when the behavior data is collected, and when the user's behavior is collected enough, almost any data that it transmits may be guessed.
For example, when Zhang san passes a milky tea store, a cup of milky tea is purchased and a photo is taken, when he opens the chat software, he is likely to send the photo just taken to Lisi four if he is often in contact with the IP address where Lisi four is located, and although other people do not know whether Zhang san sent a message to Lisi four or not, he does not have to send the photo he just taken, the prior art has guessed that Bajiu is not ten. This is just a simple example, but it is what has happened in reality.
To solve the above problem, zhang Sanhe tries to send the picture to Wang five, wang five then to Zhao Liu, zhao Liu then to Sun Qi, …, after a series of people, and finally to Lifour. The forwarding method can increase the security of data transmission to a certain extent, but is not an ultimate method, because when Zhang three can be found to send certain data to Wang five, wang five in turn sends certain data to Zhao Liu, however, the data can be tracked in the transmission process, and the end can be easily found only by connecting each piece of data.
The blockchain is a decentralised distributed database technology, which realizes the improvement of the security, the transparency and the credibility of data by distributing the data on a plurality of nodes and using the cryptography technology to ensure that the data cannot be tampered with.
Although the blockchain can realize transparent transmission of data, both the sender and the receiver exist in the blockchain with a certain ID identity, if the ID on the chain is known, the ID and the individual have a corresponding relationship, that is, the ID on the chain is known, and the transmission object can be known.
Therefore, forwarding nodes are specially introduced into the blockchain, and the forwarding nodes are further assembled and encrypted, so that the data tracking security problem possibly existing in the centralized network and the traditional blockchain data transmission is solved.
Disclosure of Invention
The invention provides a data transmission method based on a block chain, which is characterized by comprising the following steps:
s1, constructing a data transmission network, wherein the data transmission network is a decentralised blockchain, the blockchain is composed of a plurality of nodes, and the nodes comprise storage spaces and synchronous clocks.
S2, determining a main sending node and a main receiving node, and encrypting main sending data at the main sending node to obtain encrypted main sending data; and determining a plurality of slave sending nodes, and encrypting the plurality of slave sending data at the plurality of slave sending nodes to obtain a corresponding plurality of encrypted slave sending data.
S3, determining a master random factor f of the master transmitting node and a slave random factor hi of each slave transmitting node, wherein i represents an ith slave transmitting node.
S4, randomly dividing the encrypted main transmission data into f sub-data, and randomly dividing each encrypted sub-transmission data into hi sub-data respectively.
S5, randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes in a forwarding period T of each forwarding node to form assembled data, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the sub-data with reserved data to be received data, updating the forwarding node to be a new master sending node, and updating the assembled data to be the master sending data of the forwarding node.
S6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data.
S7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.
In addition, to implement the above method, we also propose a data transmission system based on a blockchain, which is characterized in that the system includes:
the main sending node is used for encrypting the main sending data to obtain encrypted main sending data, determining a main random factor f, randomly dividing the encrypted main sending data into f sub-data, and sending each sub-data to the forwarding node;
the slave transmitting node is used for encrypting the slave transmitting data to obtain encrypted slave transmitting data, determining a slave random factor hi, dividing the encrypted slave transmitting data into hi sub-data randomly, and transmitting each sub-data to the forwarding node.
And (3) a forwarding node: in the forwarding period T, sub-data from a master sending node and a plurality of slave sending nodes are received and assembled to form assembled data, the assembled data is updated to be a new master sending node, the assembled data is forwarded to the next forwarding node, if the forwarding node is a master receiving node, the sub-data from the master sending node is reserved in the node, and the sub-data and the reserved data are assembled to be received data.
The master receiving node: and receiving the data from the main sending node, and decrypting and restoring the data into original main sending data.
From the receiving node: data from the slave transmitting node is received and decrypted to restore the original slave transmitting data.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the following description refers to the drawings to be used in the embodiments.
Fig. 1 is a flowchart of a data transmission method based on a blockchain.
Fig. 2 is a schematic diagram of forwarding nodes forwarding data from different sending nodes in a data transmission method based on a blockchain, wherein 110a is encrypted master sending data, 110b and 110c are encrypted slave sending data, and 110d is data assembled by the forwarding nodes.
Detailed Description
The present invention will be further described with reference to the drawings in this embodiment, and it should be noted that the embodiments provided herein are only some of the embodiments of the present invention. Based on this summary, one of ordinary skill in the art can obtain other methods or products from this summary that may be used to practice the invention, and any modifications of the embodiments set forth in accordance with the embodiments of the invention or further modifications thereof as would be apparent to one of ordinary skill in the art are intended to be within the scope of this application.
Embodiment 1, fig. 1 provides a flowchart of a data transmission method based on a blockchain, which includes the following steps: s1, constructing a data transmission network, wherein the data transmission network is a decentralised blockchain, the blockchain is composed of a plurality of nodes, and the nodes comprise storage spaces and synchronous clocks.
S2, determining a main sending node and a main receiving node, encrypting main sending data at the main sending node to obtain encrypted main sending data, wherein the encrypted main sending data is shown as data indicated by 110a in FIG. 2; a plurality of slave transmitting nodes are determined, and the plurality of slave transmitting data are encrypted at the plurality of slave transmitting nodes to obtain a corresponding plurality of encrypted slave transmitting data, such as data represented by 110b and 110c in fig. 2.
In step S2, the master transmitting node and the slave transmitting node are only logically master-slave, and their positions in the blockchain are equal and master-slave. For example, for user a, node a is used as a master transmitting node, and all other nodes in the blockchain are regarded as slave transmitting nodes of node a, but at a certain moment, when other users transmit data, the other nodes are corresponding master transmitting nodes, and node a is a slave transmitting node of the master transmitting node.
S3, determining a master random factor f of the master transmitting node and a slave random factor hi of each slave transmitting node, wherein i represents an ith slave transmitting node.
S4, randomly dividing the encrypted main transmission data into f sub-data, wherein one sub-data is like a five-pointed star of 110a in FIG. 2, randomly dividing each encrypted sub-transmission data into hi sub-data respectively, and two groups of sub-encryption data are shown in FIG. 2, one group is data shown as 110b, and the other group is data shown as 110 c.
S5, randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes in a forwarding period T of each forwarding node to form assembled data, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the sub-data with reserved data to be received data, updating the forwarding node to be a new master sending node, and updating the assembled data to be the master sending data of the forwarding node.
As shown in fig. 2, the forwarding node p_a receives the encrypted master transmission data 110a from the master transmission node and the two encrypted slave transmission data 110b and 110c from the slave transmission nodes, the sub-data of which are reassembled into a plurality of sets of data in the forwarding node p_a, one of which is shown as 110 d.
In step S5, the forwarding period T is a fixed time, the forwarding period of each node is the same, the starting time of the forwarding period is the same, and the period and the starting time are synchronized according to the synchronization clock in the node; at the forwarding node, since the data from the master transmitting node and the data from the plurality of slave transmitting nodes are secondarily assembled and then transmitted in the form of new data, rather than directly forwarding the received data from a certain node, the forwarding node functions to perform new encryption on the data from different nodes in addition to forwarding the data.
S6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data.
S7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.

Claims (3)

1.一种基于区块链的数据传输方法,其特征在于,具体包括如下步骤:1. A data transmission method based on block chain, it is characterized in that, specifically comprises the following steps: S1.构建数据传输网络,所述数据传输网络为去中心化的区块链;S1. Build a data transmission network, which is a decentralized blockchain; S2.确定主发送节点、主接收节点和从发送节点,在主发送节点将主发送数据加密,得到加密后的主发送数据;确定多个从发送节点,在多个从发送节点将多个从发送数据加密,得到相应的多个加密后的从发送数据;S2. Determine the master sending node, the master receiving node and the slave sending node, encrypt the master sending data at the master sending node, and obtain the encrypted master sending data; Encrypt the sent data to obtain corresponding multiple encrypted slave sent data; S3.确定主发送节点的主随机因子f和每个从发送节点的从随机因子hi,其中i表示第i个从发送节点;S3. Determine the master random factor f of the master sending node and the slave random factor hi of each slave sending node, wherein i represents the i-th slave sending node; S4.将所述加密后的主发送数据随机分为f个子数据,将每个加密后的从发送数据分别随机分为hi个子数据;S4. The encrypted master transmission data is randomly divided into f sub-data, and each encrypted slave transmission data is randomly divided into hi sub-data respectively; S5.随机选定多个转发节点,转发并组装数据,具体包括如下步骤:随机选定多个转发节点,在每个转发节点的转发周期T中,接收并组装来自主发送节点和多个从发送节点的子数据形成组装数据,若该转发节点为所述主接收节点,则接收并保留来自主发送节点的子数据,与已经保留的数据组装为已接收数据,将所述转发节点更新为新的主发送节点,并将所述组装数据更新为转发节点的主发送数据;S5. Randomly select multiple forwarding nodes, forward and assemble data, specifically including the following steps: randomly select multiple forwarding nodes, and receive and assemble data from the master sending node and multiple slaves in the forwarding period T of each forwarding node The sub-data of the sending node forms assembled data, if the forwarding node is the main receiving node, then receive and retain the sub-data from the main sending node, assemble the received data with the reserved data, and update the forwarding node as A new primary sending node, and updating the assembled data as the primary sending data of the forwarding node; S6.递归执行步骤S2-S5,直到主接收节点已接收数据的大小与原始的加密后的主发送数据大小一致,得到最终接收数据;S6. Steps S2-S5 are recursively executed until the size of the data received by the main receiving node is consistent with the size of the original encrypted main sending data to obtain the final received data; S7.主接收节点解密在步骤S6中的最终接收数据,得到原始主发送数据。S7. The main receiving node decrypts the final received data in step S6 to obtain the original main sent data. 2.根据权利要求1所述的方法,其特征在于,所述区块链由多个节点组成,所述节点包括存储空间和同步时钟。2. The method according to claim 1, wherein the block chain is composed of a plurality of nodes, and the nodes include a storage space and a synchronous clock. 3.一种基于区块链的数据传输系统,其特征在于,该系统包括:3. A blockchain-based data transmission system, characterized in that the system includes: 主发送节点,用以将主发送数据加密,得到加密后的主发送数据,确定主随机因子f,将所述加密后的主发送数据随机分为f个子数据,将每个子数据发送到转发节点;The main sending node is used to encrypt the main sending data to obtain the encrypted main sending data, determine the main random factor f, randomly divide the encrypted main sending data into f sub-data, and send each sub-data to the forwarding node ; 从发送节点,用以将从发送数据加密,得到加密后的从发送数据,确定从随机因子hi,将所述加密后的从发送数据随机分为hi个子数据,将每个子数据发送到转发节点;The slave sending node is used to encrypt the slave sending data to obtain the encrypted slave sending data, determine the slave random factor hi, randomly divide the encrypted slave sending data into hi sub-data, and send each sub-data to the forwarding node ; 转发节点:在转发周期T中,接收并组装来自主发送节点和多个从发送节点的子数据形成组装数据,将自身更新为新的主发送节点,并将组装数据转发到下一个转发节点,若该转发节点本身为主接收节点,将来自主发送节点的子数据保留在此节点,并与已经保留的数据组装为已接收数据;Forwarding node: In the forwarding cycle T, receive and assemble sub-data from the main sending node and multiple slave sending nodes to form assembled data, update itself as the new main sending node, and forward the assembled data to the next forwarding node, If the forwarding node itself is the main receiving node, the sub-data from the main sending node will be kept at this node, and assembled with the reserved data as received data; 主接收节点:接收来自主发送节点的数据,并解密还原成原主发送数据;Main receiving node: Receive data from the main sending node, and decrypt and restore it to the original main sending data; 从接收节点:接收来自从发送节点的数据,并解密还原成原从发送数据。Slave receiving node: Receive the data from the slave sending node, and decrypt and restore it to the original data sent from the slave.
CN202310272839.XA 2023-03-21 2023-03-21 Data transmission method and system based on block chain Active CN115987693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310272839.XA CN115987693B (en) 2023-03-21 2023-03-21 Data transmission method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310272839.XA CN115987693B (en) 2023-03-21 2023-03-21 Data transmission method and system based on block chain

Publications (2)

Publication Number Publication Date
CN115987693A CN115987693A (en) 2023-04-18
CN115987693B true CN115987693B (en) 2023-06-13

Family

ID=85963501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310272839.XA Active CN115987693B (en) 2023-03-21 2023-03-21 Data transmission method and system based on block chain

Country Status (1)

Country Link
CN (1) CN115987693B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213916A1 (en) * 2017-05-23 2018-11-29 Zeu Crypto Networks Inc. A secure transmission method for blockchain data based on sctp
CN109067522A (en) * 2018-07-27 2018-12-21 深圳市汇尊区块链技术有限公司 A kind of random number Verified secret sharing method
CN109067832A (en) * 2018-06-27 2018-12-21 南京百市通数字科技有限公司 A kind of block chain transmission of transaction data method
CN111124690A (en) * 2020-01-02 2020-05-08 哈尔滨理工大学 Secure distribution method of E-mail server based on OpenMP thread optimization
CN111327591A (en) * 2020-01-19 2020-06-23 广州得众信息技术有限公司 Data transmission method, system and storage medium based on block chain
WO2021163960A1 (en) * 2020-02-20 2021-08-26 深圳市汇尊区块链技术有限公司 Blockchain-based random number generation method and system, and storage medium
CN114511322A (en) * 2022-01-26 2022-05-17 江苏大学 Relay-based chain-handling cross-link structure and access control method thereof
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium
WO2023020764A1 (en) * 2021-08-18 2023-02-23 Nchain Licensing Ag Coordinating peer-to-peer data transfer using blockchain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213916A1 (en) * 2017-05-23 2018-11-29 Zeu Crypto Networks Inc. A secure transmission method for blockchain data based on sctp
CN109067832A (en) * 2018-06-27 2018-12-21 南京百市通数字科技有限公司 A kind of block chain transmission of transaction data method
CN109067522A (en) * 2018-07-27 2018-12-21 深圳市汇尊区块链技术有限公司 A kind of random number Verified secret sharing method
CN111124690A (en) * 2020-01-02 2020-05-08 哈尔滨理工大学 Secure distribution method of E-mail server based on OpenMP thread optimization
CN111327591A (en) * 2020-01-19 2020-06-23 广州得众信息技术有限公司 Data transmission method, system and storage medium based on block chain
WO2021163960A1 (en) * 2020-02-20 2021-08-26 深圳市汇尊区块链技术有限公司 Blockchain-based random number generation method and system, and storage medium
WO2023020764A1 (en) * 2021-08-18 2023-02-23 Nchain Licensing Ag Coordinating peer-to-peer data transfer using blockchain
CN114511322A (en) * 2022-01-26 2022-05-17 江苏大学 Relay-based chain-handling cross-link structure and access control method thereof
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT;Bin Jia; Xiaosong Zhang; Jiewen Liu; Yang Zhang; Ke Huang; Yongquan Liang;《IEEE Transactions on Industrial Informatics》;第18卷(第6期);全文 *
基于消息中间件的数据交换平台传输框架设计;梁彦杰; 廉东本;《计算机系统应用》;第21卷(第04期);全文 *

Also Published As

Publication number Publication date
CN115987693A (en) 2023-04-18

Similar Documents

Publication Publication Date Title
US10554392B2 (en) Cryptographic key distribution
US9922207B2 (en) Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
US11343081B2 (en) Synchronizable hardware security module
CN105103488B (en) By the policy Enforcement of associated data
CN109194702B (en) Medical data recording method, system, computer device and storage medium
CN111160913B (en) Block chain account balance deposit certificate and recovery method and device
CN110852745B (en) Block chain distributed dynamic network key automatic updating method
US11784811B2 (en) Storage of cryptographic information
CN108768647B (en) Random number generation method for block chain
US10313123B1 (en) Synchronizable hardware security module
CN112751673A (en) Supervision-capable data privacy sharing method based on end side cloud cooperation
JP7696364B2 (en) Restoring distributed keys from backup storage
US20240356916A1 (en) Secure peer-to-peer based communication sessions via network operating system in secure data network
US12113785B2 (en) Directory server providing tag enforcement and network entity attraction in a secure peer-to-peer data network
EP4560974A1 (en) Data processing method and related devices
CN116204923A (en) Data management and data query methods and devices
US12069032B2 (en) Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network
CN115987693B (en) Data transmission method and system based on block chain
US20060053294A1 (en) System and method for proving time and content of digital data in a monitored system
Godra et al. Practical Approach to Design and Implement a P2P and E2EE Instant Messaging System
WO2024088145A1 (en) Data processing method and apparatus, and program product, computer device and storage medium
CN116614221A (en) A blockchain-based distributed key escrow method
CN115134111B (en) Encryption algorithm method for mass data distributed storage
US20230125556A1 (en) Secure autonomic recovery from unusable data structure via a trusted device in a secure peer-to-peer data network
Kasza et al. On a secure distributed data sharing system and its implementation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20250425

Address after: No. 706, 7th Floor, Unit 2, Building 11, No. 966 North Tianfu Avenue, Chengdu High tech Zone, China (Sichuan) Pilot Free Trade Zone, Chengdu, Sichuan Province 610000

Patentee after: Sichuan Mingxian Store Supply Chain Management Co.,Ltd.

Country or region after: China

Address before: 610000 No. 6a, 4th floor, No. 184, Jinyang Road, Wuhou District, Chengdu, Sichuan

Patentee before: Chengdu yunlitchi Technology Co.,Ltd.

Country or region before: China