CN116611840A - Distributed data asset circulation traceability system and method based on blockchain - Google Patents

Distributed data asset circulation traceability system and method based on blockchain Download PDF

Info

Publication number
CN116611840A
CN116611840A CN202310272260.3A CN202310272260A CN116611840A CN 116611840 A CN116611840 A CN 116611840A CN 202310272260 A CN202310272260 A CN 202310272260A CN 116611840 A CN116611840 A CN 116611840A
Authority
CN
China
Prior art keywords
data
data asset
metadata
asset
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310272260.3A
Other languages
Chinese (zh)
Inventor
周晓磊
范强
严浩
张骁雄
王芳潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202310272260.3A priority Critical patent/CN116611840A/en
Publication of CN116611840A publication Critical patent/CN116611840A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
    • H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers, e.g. based on distributed hash tables [DHT] 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a distributed data asset circulation traceability system and method based on a blockchain, wherein the system comprises the following components: the access module specifically performs: providing an access entry, registering and inquiring operation authority, and giving the operation authority to determine public data which can be inquired by the operation authority; the data asset linking and tracing module specifically performs: unified coding of data assets, one-by-one uplink, on-link circulation, data asset metadata extraction and blood-margin analysis management; the block chain module comprises a plurality of odd distributed nodes, and the distributed nodes adopt a P2P network to carry out communication transmission. The application realizes the trusted storage and the trusted verification of the traceability record, further researches the re-uplink traceability after the modification of the data under the chain, supplements the data flow traceability under the block chain through metadata extraction and analysis, and realizes the closed loop of the data flow traceability.

Description

Distributed data asset circulation traceability system and method based on blockchain
Technical Field
The application relates to a distributed data asset circulation tracing system and method based on a blockchain, and belongs to the technical field of data circulation tracing.
Background
A data asset is a data asset that is owned or controlled by an individual or business and is physically or electronically recorded to bring future economic benefits to the business. In particular, a data asset refers to a type of asset that exists in the form of data relative to a physical asset in the form of file-borne data such as photographs, documents, drawings, video, digital rights, and the like of an individual or business. Data assets are considered one of the most important asset forms in the digital age.
A blockchain is a chain of blocks each holding certain information that are linked into a chain according to the respective time sequence of generation. This chain is kept in all servers, and the entire blockchain is safe as long as one server in the entire system can work. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the blockchain is to be modified, it is necessary to sign consent of more than half of the nodes and modify the information in all the nodes, which are usually held in different subject hands, so it is an extremely difficult thing to tamper with the information in the blockchain. Compared with the traditional network, the blockchain has two main core characteristics: firstly, the data is difficult to tamper, and secondly, the data is decentralised. Based on the two characteristics, the information recorded by the blockchain is more real and reliable, and can help solve the problem that people are not trusted each other.
The metadata realizes the description of information and the formatting of classification, can effectively manage data assets and clarify the relationship among the data. The metadata can help research and development personnel to know the conditions of the platform, such as data contained in the platform, space occupied by data storage, data storage positions, data output information and the like, and can perform operation and maintenance alarm work on the basis of the conditions. In addition, the method is also beneficial to making a standard of platform data statistics, combing out unified data caliber, calculation index and upstream and downstream association relation, and laying a foundation for data asset flow tracing.
The prior art does not have a more sophisticated scheme for a data asset transfer system. Relatively sophisticated data asset transfer methods, devices and apparatus based on blockchain are disclosed, such as CN202010969238.0, which are applied to the blockchain field. Comprising the following steps: acquiring the use requirement information of the data demander for the original data serving as the data asset; based on the distributed identity mark bound by the original data, applying a use authorization request for the original data to a data owner of the original data; after receiving confirmation information of a data owner for a use authorization request, processing the original data based on a use requirement to obtain processing result data; the processing result data is sent to the data demander and a verifiable statement is generated for recording usage information for the original data.
Disclosure of Invention
The prior art scheme focuses on how to perfect the circulation tracing of the data asset by using the blockchain, solves the problem of circulation tracing of the data asset, but must meet the premise that the data circulates on the chain, and the research category does not relate to the data tracing scene which does not circulate on the chain and has a certain limitation.
The application provides a distributed data asset circulation tracing system and a distributed data asset circulation tracing method based on a blockchain, which realize trusted storage and trusted verification of a tracing record, further study on re-uplink tracing after modification of data under the chain, supplement the data circulation tracing under the blockchain through metadata extraction and analysis, and realize closed loop of the data circulation tracing.
The application adopts the following technical scheme: a blockchain-based distributed data asset flow traceback system, comprising:
the access module specifically performs: providing an access entry, registering and inquiring operation authority, and giving the operation authority to determine public data which can be inquired by the operation authority;
the data asset linking and tracing module specifically performs: unified coding of data assets, one-by-one uplink, on-link circulation, data asset metadata extraction and blood-margin analysis management;
the system comprises a block chain module, a data processing module and a data processing module, wherein the block chain module comprises a plurality of odd distributed nodes, and the distributed nodes adopt a P2P network to carry out communication transmission;
the access module is in communication connection with the data asset linking and tracing module, and the data asset linking and tracing module is in communication connection with the blockchain module.
As a preferred embodiment, the access module includes a browser access module and an API interface module, where the browser access module executes all information with a query authority level being disclosed, and the API interface module executes the data asset uplink, the data asset circulation, and the data asset tracing query in the authorization according to whether the data related operation authority is owned by the API interface.
As a preferred embodiment, the data asset linking and tracing module further comprises: the data asset tracing and inquiring module comprises the following steps: accepting the access request and determining the authorization range; receiving a block chain query address; the data asset information within the authorized range is traced back.
As a preferred embodiment, the data asset linking and tracing module further comprises: the system comprises a data asset uplink module, wherein an asset uplink mode of the data asset uplink module is realized by adopting an intelligent contract, the intelligent contract is communicated with each other through multi-message Messages and a shared memory database, one message represents a single operation, one service transaction is one or a collection of the multi-message Messages, the contract and an account are communicated through the multi-message Messages, and the multi-message Messages can be sent singly or in a collection; when the service Transaction of the multi-message messages is carried out, the multi-message messages are successful or fail completely, the tracing records are stored on the blockchain through the intelligent contracts, and the intelligent contracts are regarded as autonomous agents in the blockchain and are executed by themselves when preset conditions are met.
As a preferred embodiment, the data asset linking and tracing module includes:
the data asset chain circulation module specifically performs: the data asset owner flows the data asset in the account number;
the system comprises a data asset access authority control module, a data asset management module and a data management module, wherein the data asset access authority control module specifically executes identity authentication and data access authority control, the authority of a system data access range is divided into a public level, an organization level, a department level and a post level, the data access authority control module is used for realizing data access authority control based on the input of an organization interface provided by the outside, and after the identity authentication and the access authority verification are correct, a request result is responded;
the metadata management module specifically performs: providing a metadata extraction function of the data asset, and providing a metadata manual modification function on the basis of extracting metadata of the discovered data asset; simultaneously providing metadata cataloging and inquiring functions, and searching metadata contents online;
the data blood edge analysis and management module specifically performs: providing a comparison function of metadata of the data assets, comparing metadata of different data to give possible blood edge relations, and providing a modification function of the blood edges of the metadata to determine the blood edge relations among the data assets.
The application also provides a distributed data asset flow tracing method based on the block chain, which comprises the following steps:
a data asset chain up-stream traceback step comprising: based on the distributed accounting and tamper-proof capability of the block chain, user information, data asset circulation information and traceability information are stored in an uplink mode, and circulation traceability of the data asset chain is achieved;
a data asset chain downflow traceback step comprising: metadata extraction is carried out on the data assets under the chain and the data assets on the chain, metadata comparison is carried out one by one, possible blood relationship of the data assets under the chain is listed, and then tracing of the data assets under the chain is completed in a configuration mode.
As a preferred embodiment, the step of tracing the data asset up stream includes the steps of:
step SS11: the user system carries out uplink registration, firstly, user information is authenticated, and a user public key/private key pair is generated;
step SS12: each user issues data assets to the blockchain through an API interface; specifically, the data asset owner can flow the data asset in the account number by registering the data asset on the asset catalog and simultaneously sending the asset information to the blockchain;
step SS13: the user searches the needed data through the data asset catalogue, processes and modifies the data on the basis of the access authority management of the data asset, and adds asset circulation information to the blockchain;
step SS14: and searching the circulation information according to the requirement by a user, tracing the data asset, and uploading the tracing information to the blockchain.
As a preferred embodiment, the step SS11 specifically includes: each party is firstly registered as a user in the blockchain, each user generates a public key/private key pair after registration, the public key is used for identifying the identity of the user in the system, the private key is used for digital signature, the authenticity of the identity of the user is ensured, and a receiver of data is allowed to be used for confirming the source of the data and preventing the falsification of the user.
As a preferred embodiment, the data asset downlink circulation tracing step includes the following steps:
step SS21: the metadata management module extracts data asset metadata on a chain, wherein the data asset metadata comprises business metadata, technical metadata and management metadata;
step SS22: performing field-level data asset metadata blood-edge analysis on the data asset metadata on the chain through a graph database, and constructing a data asset blood-edge relation graph;
step SS23: the metadata management module extracts the metadata of the data assets under the chain;
step SS24: comparing the data asset metadata under the chain with the data asset metadata on the chain, and listing the similar blood edges of the data assets under the chain;
step SS25: analyzing and screening the possible blood edges, and confirming the blood edge father node of the data asset under the chain;
step SS26: adding the data assets under the chain into a data asset blood relationship map, and synchronously adding and modifying blood relationship in the map;
step SS27: re-registering the data asset under the chain to a data asset directory and linking the data asset information;
step SS28: and searching blood margin information according to the requirement by a user, tracing the data asset, and uploading the tracing information to the blockchain.
As a preferred embodiment, the step SS21 specifically includes: the service metadata records related conceptual information of the service in the system, including service terms, information classification, index definition and service rules; the technical metadata describes related conceptual information in the technical field in the system, and comprises data structures, data processing aspect feature descriptions, and information of data source interfaces, data warehouses, data sets and stored comprehensive data processing links; the management metadata defines related conceptual information related to the management field in the system, and comprises descriptions of project management, IT operation and maintenance and IT resource equipment related information.
The beneficial effects achieved by the application are as follows: (1) central control side: there is no central controller in the blockchain, and none of the data flow participants can control the formation of ledger data, and can only coordinate through each node to generate a consistent ledger. The traditional system is controlled by a mechanism and uniformly schedules each node to participate in operation. (2) consistency problem: the negative influence of the fraudulent node can be reduced based on circulation tracing of the block chain, and when the node intentionally violates a protocol and transmits wrong data, a consistency algorithm is adopted; while the conventional system only needs to consider the situations of node failure and communication errors, a consistency algorithm such as raft, paxos, gossip is often adopted, and the algorithm cannot resist the fraud nodes. (3) calculation mode: the business calculation of the block chain is completed through intelligent contracts, so that fairness is guaranteed, and the block chain cannot be tampered through a central node. The operation of the traditional system is only carried out on one or a few nodes, and the result is not verified by other nodes, so that high efficiency can be obtained. (4) blood-edge analysis of the data under the chain: and the association of the blood edges of the data assets under the chain and the data assets on the chain is completed based on metadata extraction and analysis, so that the defect that the blood edges of the data assets after the data assets under the chain cannot be traced by tracing the data asset circulation based on the blockchain is overcome.
Drawings
FIG. 1 is a schematic diagram of a distributed data asset flow traceback system based on a blockchain in accordance with the present application.
FIG. 2 is a schematic diagram of a metadata management module according to the present application.
FIG. 3 is a flow chart of the data asset in-chain flow traceback step of the present application.
FIG. 4 is a flow chart of the data asset chain downflow traceback step of the present application.
Detailed Description
The application is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and are not intended to limit the scope of the present application.
Example 1: the application is realized by the following technical scheme: a distributed data asset circulation traceability system based on a blockchain comprises an access module, a data asset management module and a blockchain module, as shown in figure 1.
(1) The access module comprises a browser access module and an API interface module and is used for providing access entrance, registering and inquiring operation authority and giving the operation authority to determine the public data which can be inquired by the authority. The system access layer provides two types of access modes, namely browser access and API interface access, and all information with the authority level being public can be queried through the browser. Through the API interface provided by the system, the data asset uplink, the data asset circulation and the data asset tracing and inquiring in the authorization can be realized according to whether the system has the data-related operation authority.
(2) The data asset linking and tracing module comprises a data asset linking module, a data asset streaming module, a data asset tracing and inquiring module, a data asset access right control module, a metadata management module and a data blood-edge analysis and management module, and is used for unified coding of data assets, one-by-one uplink, on-link circulation, and data asset metadata extraction and blood-edge analysis management.
And the asset uplink mode of the data asset uplink module is realized by adopting an intelligent contract. Smart contracts are communicated with each other through messages and shared memory databases, and spam problems caused by asynchronous communications are addressed by resource restriction algorithms. One message represents a single operation, and one transaction is a collection of one or more Messages through which contracts and accounts communicate, which may be sent individually or collectively if it is desired to perform a batch process at a time. When the transactions of the multiple messages are performed, these messages will all succeed or all fail. The tracing records are stored on the blockchain through the intelligent contracts, the contracts can be regarded as autonomous agents in the blockchain and are automatically executed when preset conditions are met, manual intervention is reduced, and therefore trusted storage and trusted verification of the tracing records are achieved.
The data asset authority control module comprises an organization mechanism interface sub-module, an identity authentication sub-module and a data authority interface sub-module, and is used for realizing identity authentication and data access authority control, and trusted identity authenticity verification is a first barrier for secure data tracing. Data tracing involves numerous participating principals including data sources, data passers, data auditors, data consumers, which participate in the blockchain together. The system business layer considers that the user is a large-scale organization across regions, and the organization comprises three layers [ assumption: organization, department, post, the system data access range authority is divided into public, organization level, department level, post level. The system is based on the external organization interface input, the data authority interface input, and the data access authority control is realized. The system performs identity authentication, and responds to a request result after the access right is checked to be correct.
The data asset tracing and inquiring module tracing mode comprises the following steps:
1) Accepting the access request and determining the authorization range;
2) Receiving a block chain query address;
3) Data asset information within the authorized range.
Specifically, a browser is opened through a mobile phone or a computer to input a blockchain query address, so that data asset circulation information in an authorized range can be queried, and information assets can be traced.
The metadata management module provides a metadata extraction function of the data asset, and can provide a metadata manual modification function on the basis of automatically extracting and finding the metadata of the data asset; while providing metadata cataloging and querying functions, metadata content may be searched online, as shown in fig. 2.
The data blood-edge analysis and management module provides a comparison function of metadata of the data assets, can compare metadata of different data to give possible blood-edge relationships, and provides a modification function of the blood-edge of the metadata, and can manually determine the blood-edge relationships among the data assets.
(3) The block chain module comprises a plurality of odd distributed nodes. And the distributed nodes adopt P2P network transmission. The P2P technology belongs to the category of Overlay networks (Overlay networks), and is a Network information exchange manner relative to a client/server (C/S) mode. In the C/S mode, data is distributed using a dedicated server from which multiple clients all acquire data. The advantage of this mode is: the consistency of the data is easy to control, and the system is easy to manage. However, this mode has the disadvantage that: because the number of the servers is only one (even a plurality of servers are very limited), a single failure point easily occurs in the system; a single server faces a plurality of clients, and due to the limitations of CPU capacity, memory size and network bandwidth, the clients capable of simultaneously serving are very limited and have poor expandability. P2P technology is one peer-to-peer network architecture proposed to address these issues. In a P2P network, each node may be served from or to other nodes. Thus, huge terminal resources are utilized, and two defects in the C/S mode are overcome at one time.
The blockchain module adopts BFT-Dpos consensus algorithm to control the consistency and the non-codification modification of data. The BFT-DPoS (delegated rights and interests consensus with Bayesian fault tolerance) consensus principle is as follows:
1) Every 0.5 seconds, each block-out person continuously produces 6 blocks (interval time is 0.5 seconds) for a total of 3 seconds;
2) The 21 nodes sequentially go out of the block, and the block sequence is drawn out by themselves (if random, 0.5 time is insufficient, and the node which needs to go out of the block does not receive the information of the last block, and the time is up, so that each block-out person goes out of 6 blocks);
3) If 6 blocks are not all received by the next witness at a given time (e.g., 4 blocks are received and two more 2 blocks are not received), then a bifurcation occurs, the received witness produces 6 blocks based on the last block of the received blocks (e.g., 4 blocks) and sends the 6 blocks to other witness approval, and the longest chain is the main chain through the Bayesian algorithm, and all the blocks produced later are returned to the main chain.
Example 2: the application also provides a distributed data asset circulation tracing method based on the block chain, which comprises a data asset chain circulation tracing method and a data asset chain circulation tracing method.
The data asset chain up-stream tracing method is mainly based on distributed accounting and tamper-proof capabilities of the blockchain, stores user information, data asset stream information, tracing information and the like in a up-chain mode, and achieves data asset chain up-stream tracing, as shown in fig. 3:
(1) The user system carries out uplink registration, firstly, user information is authenticated, a user public key/private key pair is generated, specific parties are firstly registered as users in the block chain, and each user generates a public key/private key pair after registration. The public key is used for identifying the identity of a user in the system, the private key is used for digital signature, the authenticity of the identity of the user is ensured, a receiver of data is allowed to be used for confirming the source of the data, and the falsification of the receiver by a person is prevented;
(2) Each user can issue data assets to the blockchain through an API interface, specifically, the data assets are registered to an asset catalog and simultaneously asset information is sent to the blockchain, and a data asset owner can flow the data assets in the account;
(3) The user searches the needed data through the data asset catalogue, processes and modifies the data on the basis of the access authority management of the data asset, and adds asset circulation information to the blockchain;
(4) And searching the circulation information according to the requirement by a user, tracing the data asset, and uploading the tracing information to the blockchain.
4.3 method for tracing down stream of data asset chain
The data asset under-chain circulation tracing based on metadata management mainly comprises the steps of extracting metadata from the under-chain data asset and the on-chain data asset, comparing the metadata one by one, listing possible blood relationship of the under-chain data asset, and completing tracing of the under-chain data asset in a manual configuration mode, as shown in fig. 4.
(1) The metadata management module extracts data asset metadata on the chain, including business metadata, technical metadata, management metadata and the like. The service metadata mainly records related conceptual information of the service in the system, including service terms, information classification, index definition, service rules and the like; related conceptual information in the technical field of the technical metadata description system comprises data structures, characteristic descriptions in the aspect of data processing, and information of comprehensive data processing links such as a data source interface, a data warehouse, a data mart, storage and the like; information such as related concepts related to the management field in the management metadata definition system, for example, description of related information such as project management, IT operation and maintenance, IT resource equipment and the like;
(2) Performing field-level data asset metadata blood-edge analysis through a graph database, and constructing a data asset blood-edge relation graph;
(3) The metadata management module extracts the metadata of the data assets under the chain;
(4) Comparing the metadata of the data assets below the chain with the metadata of the data assets above the chain, and listing the similar blood edges of the data assets below the chain;
(5) Analyzing and screening possible blood edges in a manual intervention mode, and confirming blood edge father nodes of the data assets under the chain;
(6) Adding the data assets under the chain into a data asset blood relationship map, and synchronously adding and modifying blood relationship in the map;
(7) Re-registering the data asset under the chain to a data asset directory and linking the data asset information;
(8) And searching blood margin information according to the requirement by a user, tracing the data asset, and uploading the tracing information to the blockchain.
The distributed data asset circulation tracing system and method based on the blockchain provided by the application realize the trusted storage and the trusted verification of the tracing record, further study on the re-uplink tracing after the modification of the data under the chain, supplement the data circulation tracing under the blockchain through metadata extraction and analysis, and realize the closed loop of the data circulation tracing.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present application and not for limiting the same, and although the present application has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the application without departing from the spirit and scope of the application, which is intended to be covered by the claims.

Claims (10)

1. A blockchain-based distributed data asset flow traceback system, comprising:
the access module specifically performs: providing an access entry, registering and inquiring operation authority, and giving the operation authority to determine public data which can be inquired by the operation authority;
the data asset linking and tracing module specifically performs: unified coding of data assets, one-by-one uplink, on-link circulation, data asset metadata extraction and blood-margin analysis management;
the system comprises a block chain module, a data processing module and a data processing module, wherein the block chain module comprises a plurality of odd distributed nodes, and the distributed nodes adopt a P2P network to carry out communication transmission;
the access module is in communication connection with the data asset linking and tracing module, and the data asset linking and tracing module is in communication connection with the blockchain module.
2. The distributed data asset flow traceback system based on the blockchain according to claim 1, wherein the access module comprises a browser access module and an API interface module, the browser access module executes all information with the query authority level being disclosed, and the API interface module executes the data asset flow traceback query through the API interface according to whether the data related operation authority is possessed or not, and the data asset flow is realized.
3. The blockchain-based distributed data asset flow traceback system of claim 1, wherein the data asset chaining and traceback module further comprises: the data asset tracing and inquiring module comprises the following steps: accepting the access request and determining the authorization range; receiving a block chain query address; the data asset information within the authorized range is traced back.
4. The blockchain-based distributed data asset flow traceback system of claim 1, wherein the data asset chaining and traceback module further comprises: the system comprises a data asset uplink module, wherein an asset uplink mode of the data asset uplink module is realized by adopting an intelligent contract, the intelligent contract is communicated with each other through multi-message Messages and a shared memory database, one message represents a single operation, one service transaction is one or a collection of the multi-message Messages, the contract and an account are communicated through the multi-message Messages, and the multi-message Messages can be sent singly or in a collection; when the service Transaction of the multi-message messages is carried out, the multi-message messages are successful or fail completely, the tracing records are stored on the blockchain through the intelligent contracts, and the intelligent contracts are regarded as autonomous agents in the blockchain and are executed by themselves when preset conditions are met.
5. The blockchain-based distributed data asset flow traceback system of claim 1, wherein the data asset chaining and traceback module comprises:
the data asset chain circulation module specifically performs: the data asset owner flows the data asset in the account number;
the system comprises a data asset access authority control module, a data asset management module and a data management module, wherein the data asset access authority control module specifically executes identity authentication and data access authority control, the authority of a system data access range is divided into a public level, an organization level, a department level and a post level, the data access authority control module is used for realizing data access authority control based on the input of an organization interface provided by the outside, and after the identity authentication and the access authority verification are correct, a request result is responded;
the metadata management module specifically performs: providing a metadata extraction function of the data asset, and providing a metadata manual modification function on the basis of extracting metadata of the discovered data asset; simultaneously providing metadata cataloging and inquiring functions, and searching metadata contents online;
the data blood edge analysis and management module specifically performs: providing a comparison function of metadata of the data assets, comparing metadata of different data to give possible blood edge relations, and providing a modification function of the blood edges of the metadata to determine the blood edge relations among the data assets.
6. The distributed data asset flow tracing method based on the blockchain is characterized by comprising the following steps of:
a data asset chain up-stream traceback step comprising: based on the distributed accounting and tamper-proof capability of the block chain, user information, data asset circulation information and traceability information are stored in an uplink mode, and circulation traceability of the data asset chain is achieved;
a data asset chain downflow traceback step comprising: metadata extraction is carried out on the data assets under the chain and the data assets on the chain, metadata comparison is carried out one by one, possible blood relationship of the data assets under the chain is listed, and then tracing of the data assets under the chain is completed in a configuration mode.
7. The distributed data asset flow traceback method based on a blockchain as in claim 6, wherein the data asset chain flow traceback step comprises the steps of:
step SS11: the user system carries out uplink registration, firstly, user information is authenticated, and a user public key/private key pair is generated;
step SS12: each user issues data assets to the blockchain through an API interface; specifically, the data asset owner can flow the data asset in the account number by registering the data asset on the asset catalog and simultaneously sending the asset information to the blockchain;
step SS13: the user searches the needed data through the data asset catalogue, processes and modifies the data on the basis of the access authority management of the data asset, and adds asset circulation information to the blockchain;
step SS14: and searching the circulation information according to the requirement by a user, tracing the data asset, and uploading the tracing information to the blockchain.
8. The method for traceback of distributed data asset flow based on blockchain as in claim 7, wherein the step SS11 specifically comprises: each party is firstly registered as a user in the blockchain, each user generates a public key/private key pair after registration, the public key is used for identifying the identity of the user in the system, the private key is used for digital signature, the authenticity of the identity of the user is ensured, and a receiver of data is allowed to be used for confirming the source of the data and preventing the falsification of the user.
9. The distributed data asset flow traceback method based on a blockchain of claim 6, wherein the data asset chain downstream flow traceback step comprises the steps of:
step SS21: the metadata management module extracts data asset metadata on a chain, wherein the data asset metadata comprises business metadata, technical metadata and management metadata;
step SS22: performing field-level data asset metadata blood-edge analysis on the data asset metadata on the chain through a graph database, and constructing a data asset blood-edge relation graph;
step SS23: the metadata management module extracts the metadata of the data assets under the chain;
step SS24: comparing the data asset metadata under the chain with the data asset metadata on the chain, and listing the similar blood edges of the data assets under the chain;
step SS25: analyzing and screening the possible blood edges, and confirming the blood edge father node of the data asset under the chain;
step SS26: adding the data assets under the chain into a data asset blood relationship map, and synchronously adding and modifying blood relationship in the map;
step SS27: re-registering the data asset under the chain to a data asset directory and linking the data asset information;
step SS28: and searching blood margin information according to the requirement by a user, tracing the data asset, and uploading the tracing information to the blockchain.
10. The method for traceback of distributed data asset flow based on blockchain as in claim 9, wherein the step SS21 specifically comprises: the service metadata records related conceptual information of the service in the system, including service terms, information classification, index definition and service rules; the technical metadata describes related conceptual information in the technical field in the system, and comprises data structures, data processing aspect feature descriptions, and information of data source interfaces, data warehouses, data sets and stored comprehensive data processing links; the management metadata defines related conceptual information related to the management field in the system, and comprises descriptions of project management, IT operation and maintenance and IT resource equipment related information.
CN202310272260.3A 2023-03-20 2023-03-20 Distributed data asset circulation traceability system and method based on blockchain Pending CN116611840A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310272260.3A CN116611840A (en) 2023-03-20 2023-03-20 Distributed data asset circulation traceability system and method based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310272260.3A CN116611840A (en) 2023-03-20 2023-03-20 Distributed data asset circulation traceability system and method based on blockchain

Publications (1)

Publication Number Publication Date
CN116611840A true CN116611840A (en) 2023-08-18

Family

ID=87682511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310272260.3A Pending CN116611840A (en) 2023-03-20 2023-03-20 Distributed data asset circulation traceability system and method based on blockchain

Country Status (1)

Country Link
CN (1) CN116611840A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116932656A (en) * 2023-09-18 2023-10-24 中孚安全技术有限公司 Data blood edge storage method, system, equipment and medium based on block chain
CN117557380A (en) * 2023-11-14 2024-02-13 冠帝智能科技(南京)有限公司 Digital vault management system based on blockchain and big data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116932656A (en) * 2023-09-18 2023-10-24 中孚安全技术有限公司 Data blood edge storage method, system, equipment and medium based on block chain
CN116932656B (en) * 2023-09-18 2024-01-09 中孚安全技术有限公司 Data blood edge storage method, system, equipment and medium based on block chain
CN117557380A (en) * 2023-11-14 2024-02-13 冠帝智能科技(南京)有限公司 Digital vault management system based on blockchain and big data
CN117557380B (en) * 2023-11-14 2024-05-24 冠帝智能科技(南京)有限公司 Digital vault management system based on blockchain and big data

Similar Documents

Publication Publication Date Title
CN109034833B (en) Product tracing information management system and method based on block chain
CN109871669B (en) Data sharing solution based on block chain technology
CN109729168A (en) A kind of data share exchange system and method based on block chain
CN111539750A (en) Commodity traceability system based on block chain and big data technology
CN116611840A (en) Distributed data asset circulation traceability system and method based on blockchain
CN111191283B (en) Beidou positioning information security encryption method and device based on alliance block chain
CN110069475B (en) Manufacturing industry cross-data entity tracing method based on block chain multi-party self-maintenance
CN109784857B (en) Data processing method, device and system based on block chain
CN112612856B (en) Block chain-based data processing method and device
CN111291394B (en) False information management method, false information management device and storage medium
WO2020134631A1 (en) Block chain-based data processing method and apparatus
CN110071897B (en) Block chain system based on mobile terminal
CN110990879B (en) Data evidence storing method based on block chain
CN110766551A (en) Alliance chain based on improved Kafka consensus mechanism and transaction method
US20190109889A1 (en) Method and system for controlling data transmission
CN111738743A (en) Block chain-based customer service interaction method and device
CN113348656A (en) Network transaction verification method based on multiple nodes, system and storage medium thereof
CN114861211A (en) Meta-universe scene-oriented data privacy protection method, system and storage medium
Ardina et al. Design of a blockchain-based employee attendance system
CN114553440A (en) Cross-data center identity authentication method and system based on block chain and attribute signature
Guo et al. Antitampering scheme of evidence transfer information in judicial system based on blockchain
CN117435671A (en) Legal prosecution and certification system based on blockchain technology and operation method
CN116860709A (en) Sharing and using method of transaction decision data
WO2023065467A1 (en) Method for collaborative work between blockchain and internet of things
CN114978893A (en) Decentralized federal learning method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination