CN115987693B - Data transmission method and system based on block chain - Google Patents
Data transmission method and system based on block chain Download PDFInfo
- Publication number
- CN115987693B CN115987693B CN202310272839.XA CN202310272839A CN115987693B CN 115987693 B CN115987693 B CN 115987693B CN 202310272839 A CN202310272839 A CN 202310272839A CN 115987693 B CN115987693 B CN 115987693B
- Authority
- CN
- China
- Prior art keywords
- data
- node
- sending
- slave
- master
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a data transmission method and a system based on a block chain, wherein a forwarding node is introduced into the block chain, and the forwarding node is utilized to assemble the transmission data from a transmission node and a plurality of different slave transmission nodes into new transmission data, so that the technical problem of being tracked in the data transmission process is avoided, and the safety of data transmission is obviously improved.
Description
Technical Field
The present invention relates to the field of blockchain, and in particular, to a blockchain-based data transmission method and system.
Background
Data security refers to protecting and managing data owned by an organization to ensure the integrity, availability, and confidentiality of the data. Data security is critical to the business operations and development of an organization because data is an important property of an organization, including various business data inside an organization, personal information of a client, and the like. Protecting such data from any unauthorized access, theft, vandalism and tampering is one of the important issues that organizations need to solve.
Existing techniques include, but are not limited to, the following: using encryption protocols, such as TLS/SSL, to protect the security of the data during transmission; access control is implemented, and only authenticated users can access data; the integrity and the authenticity of the data are ensured by adopting a digital signature technology; implementing data backup and disaster recovery measures to ensure the availability of data; the firewall, the intrusion detection system and other technologies are adopted to protect the data in the network from unauthorized access and attack; secure remote connections are established using a Virtual Private Network (VPN), data is encrypted using data encryption software, secure communications are performed using Secure Sockets Layer (SSL) protocols, and so on.
Without any error, the prior art can improve the security of data transmission to some extent, but note that such security is not absolute. Because any network behavior of the user is marked, when the user's behavior is sufficiently high, even the most sophisticated encryption method is used, any data transmitted by the user is undoubtedly lost. This is because, in addition to the data itself, the user's behavior itself may be collected, for example, what time, what place, what content the user has clicked on may be known by the content provider or the operator even by ordinary people, the user may not know that his own behavior data has been collected when the behavior data is collected, and when the user's behavior is collected enough, almost any data that it transmits may be guessed.
For example, when Zhang san passes a milky tea store, a cup of milky tea is purchased and a photo is taken, when he opens the chat software, he is likely to send the photo just taken to Lisi four if he is often in contact with the IP address where Lisi four is located, and although other people do not know whether Zhang san sent a message to Lisi four or not, he does not have to send the photo he just taken, the prior art has guessed that Bajiu is not ten. This is just a simple example, but it is what has happened in reality.
To solve the above problem, zhang Sanhe tries to send the picture to Wang five, wang five then to Zhao Liu, zhao Liu then to Sun Qi, …, after a series of people, and finally to Lifour. The forwarding method can increase the security of data transmission to a certain extent, but is not an ultimate method, because when Zhang three can be found to send certain data to Wang five, wang five in turn sends certain data to Zhao Liu, however, the data can be tracked in the transmission process, and the end can be easily found only by connecting each piece of data.
The blockchain is a decentralised distributed database technology, which realizes the improvement of the security, the transparency and the credibility of data by distributing the data on a plurality of nodes and using the cryptography technology to ensure that the data cannot be tampered with.
Although the blockchain can realize transparent transmission of data, both the sender and the receiver exist in the blockchain with a certain ID identity, if the ID on the chain is known, the ID and the individual have a corresponding relationship, that is, the ID on the chain is known, and the transmission object can be known.
Therefore, forwarding nodes are specially introduced into the blockchain, and the forwarding nodes are further assembled and encrypted, so that the data tracking security problem possibly existing in the centralized network and the traditional blockchain data transmission is solved.
Disclosure of Invention
The invention provides a data transmission method based on a block chain, which is characterized by comprising the following steps:
s1, constructing a data transmission network, wherein the data transmission network is a decentralised blockchain, the blockchain is composed of a plurality of nodes, and the nodes comprise storage spaces and synchronous clocks.
S2, determining a main sending node and a main receiving node, and encrypting main sending data at the main sending node to obtain encrypted main sending data; and determining a plurality of slave sending nodes, and encrypting the plurality of slave sending data at the plurality of slave sending nodes to obtain a corresponding plurality of encrypted slave sending data.
S3, determining a master random factor f of the master transmitting node and a slave random factor hi of each slave transmitting node, wherein i represents an ith slave transmitting node.
S4, randomly dividing the encrypted main transmission data into f sub-data, and randomly dividing each encrypted sub-transmission data into hi sub-data respectively.
S5, randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes in a forwarding period T of each forwarding node to form assembled data, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the sub-data with reserved data to be received data, updating the forwarding node to be a new master sending node, and updating the assembled data to be the master sending data of the forwarding node.
S6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data.
S7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.
In addition, to implement the above method, we also propose a data transmission system based on a blockchain, which is characterized in that the system includes:
the main sending node is used for encrypting the main sending data to obtain encrypted main sending data, determining a main random factor f, randomly dividing the encrypted main sending data into f sub-data, and sending each sub-data to the forwarding node;
the slave transmitting node is used for encrypting the slave transmitting data to obtain encrypted slave transmitting data, determining a slave random factor hi, dividing the encrypted slave transmitting data into hi sub-data randomly, and transmitting each sub-data to the forwarding node.
And (3) a forwarding node: in the forwarding period T, sub-data from a master sending node and a plurality of slave sending nodes are received and assembled to form assembled data, the assembled data is updated to be a new master sending node, the assembled data is forwarded to the next forwarding node, if the forwarding node is a master receiving node, the sub-data from the master sending node is reserved in the node, and the sub-data and the reserved data are assembled to be received data.
The master receiving node: and receiving the data from the main sending node, and decrypting and restoring the data into original main sending data.
From the receiving node: data from the slave transmitting node is received and decrypted to restore the original slave transmitting data.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the following description refers to the drawings to be used in the embodiments.
Fig. 1 is a flowchart of a data transmission method based on a blockchain.
Fig. 2 is a schematic diagram of forwarding nodes forwarding data from different sending nodes in a data transmission method based on a blockchain, wherein 110a is encrypted master sending data, 110b and 110c are encrypted slave sending data, and 110d is data assembled by the forwarding nodes.
Detailed Description
The present invention will be further described with reference to the drawings in this embodiment, and it should be noted that the embodiments provided herein are only some of the embodiments of the present invention. Based on this summary, one of ordinary skill in the art can obtain other methods or products from this summary that may be used to practice the invention, and any modifications of the embodiments set forth in accordance with the embodiments of the invention or further modifications thereof as would be apparent to one of ordinary skill in the art are intended to be within the scope of this application.
S2, determining a main sending node and a main receiving node, encrypting main sending data at the main sending node to obtain encrypted main sending data, wherein the encrypted main sending data is shown as data indicated by 110a in FIG. 2; a plurality of slave transmitting nodes are determined, and the plurality of slave transmitting data are encrypted at the plurality of slave transmitting nodes to obtain a corresponding plurality of encrypted slave transmitting data, such as data represented by 110b and 110c in fig. 2.
In step S2, the master transmitting node and the slave transmitting node are only logically master-slave, and their positions in the blockchain are equal and master-slave. For example, for user a, node a is used as a master transmitting node, and all other nodes in the blockchain are regarded as slave transmitting nodes of node a, but at a certain moment, when other users transmit data, the other nodes are corresponding master transmitting nodes, and node a is a slave transmitting node of the master transmitting node.
S3, determining a master random factor f of the master transmitting node and a slave random factor hi of each slave transmitting node, wherein i represents an ith slave transmitting node.
S4, randomly dividing the encrypted main transmission data into f sub-data, wherein one sub-data is like a five-pointed star of 110a in FIG. 2, randomly dividing each encrypted sub-transmission data into hi sub-data respectively, and two groups of sub-encryption data are shown in FIG. 2, one group is data shown as 110b, and the other group is data shown as 110 c.
S5, randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes in a forwarding period T of each forwarding node to form assembled data, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the sub-data with reserved data to be received data, updating the forwarding node to be a new master sending node, and updating the assembled data to be the master sending data of the forwarding node.
As shown in fig. 2, the forwarding node p_a receives the encrypted master transmission data 110a from the master transmission node and the two encrypted slave transmission data 110b and 110c from the slave transmission nodes, the sub-data of which are reassembled into a plurality of sets of data in the forwarding node p_a, one of which is shown as 110 d.
In step S5, the forwarding period T is a fixed time, the forwarding period of each node is the same, the starting time of the forwarding period is the same, and the period and the starting time are synchronized according to the synchronization clock in the node; at the forwarding node, since the data from the master transmitting node and the data from the plurality of slave transmitting nodes are secondarily assembled and then transmitted in the form of new data, rather than directly forwarding the received data from a certain node, the forwarding node functions to perform new encryption on the data from different nodes in addition to forwarding the data.
S6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data.
S7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.
Claims (3)
1. The data transmission method based on the block chain is characterized by comprising the following steps of:
s1, constructing a data transmission network, wherein the data transmission network is a decentralised block chain;
s2, determining a master sending node, a master receiving node and a slave sending node, and encrypting the master sending data at the master sending node to obtain encrypted master sending data; determining a plurality of slave sending nodes, encrypting the plurality of slave sending data at the plurality of slave sending nodes to obtain a corresponding plurality of encrypted slave sending data;
s3, determining a master random factor f of a master sending node and a slave random factor hi of each slave sending node, wherein i represents an ith slave sending node;
s4, randomly dividing the encrypted main transmission data into f sub-data, and randomly dividing each encrypted sub-transmission data into hi sub-data respectively;
s5, randomly selecting a plurality of forwarding nodes to forward and assemble data, and specifically comprising the following steps: randomly selecting a plurality of forwarding nodes, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes to form assembled data in a forwarding period T of each forwarding node, if the forwarding node is the master receiving node, receiving and reserving the sub-data from the master sending node, assembling the reserved data into received data, updating the forwarding node into a new master sending node, and updating the assembled data into the master sending data of the forwarding node;
s6, recursively executing the steps S2-S5 until the size of the received data of the main receiving node is consistent with the size of the original encrypted main sending data, and obtaining final receiving data;
s7, the main receiving node decrypts the final received data in the step S6 to obtain the original main sending data.
2. The method of claim 1, wherein the blockchain is comprised of a plurality of nodes, the nodes including a memory space and a synchronous clock.
3. A blockchain-based data transmission system, the system comprising:
the main sending node is used for encrypting the main sending data to obtain encrypted main sending data, determining a main random factor f, randomly dividing the encrypted main sending data into f sub-data, and sending each sub-data to the forwarding node;
the slave transmitting node is used for encrypting slave transmitting data to obtain encrypted slave transmitting data, determining a slave random factor hi, dividing the encrypted slave transmitting data into hi sub-data randomly, and transmitting each sub-data to the forwarding node;
and (3) a forwarding node: in a forwarding period T, receiving and assembling sub-data from a master sending node and a plurality of slave sending nodes to form assembled data, updating the assembled data into a new master sending node, forwarding the assembled data to a next forwarding node, if the forwarding node is a master receiving node, reserving the sub-data from the master sending node in the node, and assembling the sub-data and the reserved data into received data;
the master receiving node: receiving data from a main sending node, and decrypting and restoring the data into original main sending data;
from the receiving node: data from the slave transmitting node is received and decrypted to restore the original slave transmitting data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310272839.XA CN115987693B (en) | 2023-03-21 | 2023-03-21 | Data transmission method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310272839.XA CN115987693B (en) | 2023-03-21 | 2023-03-21 | Data transmission method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115987693A CN115987693A (en) | 2023-04-18 |
CN115987693B true CN115987693B (en) | 2023-06-13 |
Family
ID=85963501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310272839.XA Active CN115987693B (en) | 2023-03-21 | 2023-03-21 | Data transmission method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115987693B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018213916A1 (en) * | 2017-05-23 | 2018-11-29 | Zeu Crypto Networks Inc. | A secure transmission method for blockchain data based on sctp |
CN109067832A (en) * | 2018-06-27 | 2018-12-21 | 南京百市通数字科技有限公司 | A kind of block chain transmission of transaction data method |
CN109067522A (en) * | 2018-07-27 | 2018-12-21 | 深圳市汇尊区块链技术有限公司 | A kind of random number Verified secret sharing method |
CN111124690A (en) * | 2020-01-02 | 2020-05-08 | 哈尔滨理工大学 | Secure distribution method of E-mail server based on OpenMP thread optimization |
CN111327591A (en) * | 2020-01-19 | 2020-06-23 | 广州得众信息技术有限公司 | Data transmission method, system and storage medium based on block chain |
WO2021163960A1 (en) * | 2020-02-20 | 2021-08-26 | 深圳市汇尊区块链技术有限公司 | Blockchain-based random number generation method and system, and storage medium |
CN114511322A (en) * | 2022-01-26 | 2022-05-17 | 江苏大学 | Relay-based chain-handling cross-link structure and access control method thereof |
CN114553532A (en) * | 2022-02-22 | 2022-05-27 | 深圳壹账通智能科技有限公司 | Data secure transmission method and device, electronic equipment and storage medium |
WO2023020764A1 (en) * | 2021-08-18 | 2023-02-23 | Nchain Licensing Ag | Coordinating peer-to-peer data transfer using blockchain |
-
2023
- 2023-03-21 CN CN202310272839.XA patent/CN115987693B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018213916A1 (en) * | 2017-05-23 | 2018-11-29 | Zeu Crypto Networks Inc. | A secure transmission method for blockchain data based on sctp |
CN109067832A (en) * | 2018-06-27 | 2018-12-21 | 南京百市通数字科技有限公司 | A kind of block chain transmission of transaction data method |
CN109067522A (en) * | 2018-07-27 | 2018-12-21 | 深圳市汇尊区块链技术有限公司 | A kind of random number Verified secret sharing method |
CN111124690A (en) * | 2020-01-02 | 2020-05-08 | 哈尔滨理工大学 | Secure distribution method of E-mail server based on OpenMP thread optimization |
CN111327591A (en) * | 2020-01-19 | 2020-06-23 | 广州得众信息技术有限公司 | Data transmission method, system and storage medium based on block chain |
WO2021163960A1 (en) * | 2020-02-20 | 2021-08-26 | 深圳市汇尊区块链技术有限公司 | Blockchain-based random number generation method and system, and storage medium |
WO2023020764A1 (en) * | 2021-08-18 | 2023-02-23 | Nchain Licensing Ag | Coordinating peer-to-peer data transfer using blockchain |
CN114511322A (en) * | 2022-01-26 | 2022-05-17 | 江苏大学 | Relay-based chain-handling cross-link structure and access control method thereof |
CN114553532A (en) * | 2022-02-22 | 2022-05-27 | 深圳壹账通智能科技有限公司 | Data secure transmission method and device, electronic equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT;Bin Jia; Xiaosong Zhang; Jiewen Liu; Yang Zhang; Ke Huang; Yongquan Liang;《IEEE Transactions on Industrial Informatics》;第18卷(第6期);全文 * |
基于消息中间件的数据交换平台传输框架设计;梁彦杰; 廉东本;《计算机系统应用》;第21卷(第04期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115987693A (en) | 2023-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108600227B (en) | Medical data sharing method and device based on block chain | |
US10554392B2 (en) | Cryptographic key distribution | |
US9922207B2 (en) | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider | |
CN101569132B (en) | Systems and methods for distributing and securing data | |
US10425225B1 (en) | Synchronizable hardware security module | |
CN110852745B (en) | Block chain distributed dynamic network key automatic updating method | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
GB2444338A (en) | Granular accessibility to data in a distributed and/or corporate network | |
CN102687133A (en) | Containerless data for trustworthy computing and data services | |
CN102460460A (en) | Secure and private backup storage and processing for trusted computing and data services | |
CN109995530B (en) | Safe distributed database interaction system suitable for mobile positioning system | |
CN112751673A (en) | Supervision-capable data privacy sharing method based on end side cloud cooperation | |
US12063213B2 (en) | Secure peer-to-peer based communication sessions via network operating system in secure data network | |
US11582241B1 (en) | Community server for secure hosting of community forums via network operating system in secure data network | |
Chen et al. | An approach to verifying data integrity for cloud storage | |
US12113785B2 (en) | Directory server providing tag enforcement and network entity attraction in a secure peer-to-peer data network | |
US20060053294A1 (en) | System and method for proving time and content of digital data in a monitored system | |
US12069032B2 (en) | Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network | |
CN102714653B (en) | For the system and method for accessing private digital content | |
CN115380502A (en) | Recovering distributed keys from backup storage | |
CN115987693B (en) | Data transmission method and system based on block chain | |
CN112562811A (en) | Thin client electronic medical data secure sharing method based on block chain | |
US11870899B2 (en) | Secure device access recovery based on validating encrypted target password from secure recovery container in trusted recovery device | |
CN109120621A (en) | Data processor | |
Kavitha et al. | A completely distributed blockchain period authentication framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |