CN117992472A - Block chain-based educational data management method, device and computer equipment - Google Patents

Block chain-based educational data management method, device and computer equipment Download PDF

Info

Publication number
CN117992472A
CN117992472A CN202410397460.6A CN202410397460A CN117992472A CN 117992472 A CN117992472 A CN 117992472A CN 202410397460 A CN202410397460 A CN 202410397460A CN 117992472 A CN117992472 A CN 117992472A
Authority
CN
China
Prior art keywords
data
target
node
initial
filter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410397460.6A
Other languages
Chinese (zh)
Inventor
谭林
侯星星
钟思琪
刘齐军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Tianhe Guoyun Technology Co Ltd
Original Assignee
Hunan Tianhe Guoyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Tianhe Guoyun Technology Co Ltd filed Critical Hunan Tianhe Guoyun Technology Co Ltd
Priority to CN202410397460.6A priority Critical patent/CN117992472A/en
Publication of CN117992472A publication Critical patent/CN117992472A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a blockchain-based education data management method, a blockchain-based education data management device and computer equipment. Comprising the following steps: when the initial educational data is obtained by the initiating node, the initial educational data can be subjected to modulo processing to obtain an initial remainder, and then transaction broadcasting is carried out according to the initial remainder so as to enable the receiving node to update the data. When the target educational data is obtained, the target block corresponding to the target educational data can be inquired out through the target filter. By adopting the method, the educational data in the blockchain educational system can be intelligently managed.

Description

Block chain-based educational data management method, device and computer equipment
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a blockchain-based educational data management method, apparatus, and computer device.
Background
In a blockchain education system, the educational data to be managed is often numerous and very sensitive, and because the blockchain platform has a centralized feature, once attacked or powered off, the operation of the whole system is affected, and the common education system causes problems in terms of privacy disclosure and query efficiency.
The prior art discloses a blockchain operation platform for tracing educational data, which adopts a mode of completely storing data based on all nodes and stores part of educational data in a disk so as to realize the inquiry of the educational data. However, the storage content of the full node also causes memory urgency with time, and storing data on disk necessarily causes a decrease in query efficiency. Therefore, how to intelligently manage the educational data in the blockchain educational system to realize efficient data query and storage optimization is a problem to be solved at present.
Disclosure of Invention
Based on this, the present application aims to provide a blockchain-based education data management method, device and computer equipment, so as to solve the technical problems mentioned in the background art.
In a first aspect, the present application provides a blockchain-based educational data management method. The blockchain comprises an initiating node and a receiving node of data; comprising the following steps:
when the initial educational data is acquired by the initiating node, performing modular processing on the initial educational data to obtain an initial remainder;
carrying out transaction broadcasting according to the initial remainder so as to enable the receiving node to carry out data updating;
Acquiring target educational data, and inquiring a target block corresponding to the target educational data through a target filter; wherein the target filter comprises a plurality of cuckoo filters; the cuckoo filter comprises a filter pointer and a block pointer; the target block corresponding to the target educational data is inquired out through the target filter, which comprises the following steps:
Traversing a plurality of cuckoo filters through the jump of the filter pointer, and jumping through the block pointer, and inquiring a target block corresponding to the target educational data from a block set managed by the cuckoo filter which is traversed currently.
In one embodiment, broadcasting the transaction according to the initial remainder includes: acquiring a remainder base corresponding to the initiating node, and recovering account information of the initial education data according to the remainder base and the initial remainder; when the account information of the initial education data is verified to be free, forwarding a transaction corresponding to the account information of the initial education data; when the transaction execution is completed, determining a variation of account information of the initial educational data and broadcasting the variation to the receiving node.
In one embodiment, the method further comprises: when a new node needs to be added into the block chain, a preset target remainder base is obtained; recovering account information of the initial education data, and performing modular processing on the initial education data according to the target remainder base to obtain a target remainder; and updating the data of the newly added node according to the target remainder.
In one embodiment, the cuckoo filter includes a blockchain layer and a filter layer; the block chain layer is formed by connecting blocks in series through block pointers; the filter layers are formed by connecting filter pointers in series.
In one embodiment, the set of blocks includes a multi-layer linked list; target educational data the target block target educational data corresponding to the target educational data is inquired out from the block set managed by the currently traversed cuckoo filter, which comprises the following steps: searching an initial block corresponding to the target educational data from a first-layer linked list through the jump of the block pointer; and taking the next hierarchical linked list of the initial block as a new first-layer linked list, returning to the process of searching the new initial block corresponding to the target educational data from the new first-layer linked list through the jump of the block pointer until the last hierarchical linked list is jumped, and searching out the target block corresponding to the target educational data.
In one embodiment, the method further comprises: acquiring an access control tree; the access control tree includes a threshold value; the threshold value characterizes the minimum node quantity meeting the node requirement when the access right is obtained; determining a set of user attributes for querying the educational data and determining decrypted educational data when the set of user attributes meets the access control tree.
In one embodiment, an access control tree includes a root node, a non-leaf node, and a leaf node; the construction process of the access control tree comprises the following steps: determining a first random polynomial corresponding to the root node according to the encryption key of the educational data and in combination with a threshold access strategy of the random polynomial; for each child node of the root node, when the current child node is a non-leaf node, determining a second random polynomial corresponding to the current child node according to the threshold value and the first random polynomial; when the current child node is a leaf node, determining the node attribute of the current child node, and processing the node attribute through a preset encapsulation algorithm to obtain an encapsulation key.
In a second aspect, the present application also provides a blockchain-based educational data management device. Comprising the following steps:
the data modulus taking module is used for carrying out modulus taking processing on the initial education data when the initial education data is acquired by the initiating node, so as to obtain an initial remainder;
The data updating module is used for carrying out transaction broadcasting according to the initial remainder so as to enable the receiving node to carry out data updating;
The data query module is used for acquiring target educational data and querying a target block corresponding to the target educational data through a target filter; wherein the target filter comprises a plurality of cuckoo filters; the cuckoo filter comprises a filter pointer and a block pointer; the target block corresponding to the target educational data is inquired out through the target filter, which comprises the following steps: traversing a plurality of cuckoo filters through the jump of the filter pointer, and jumping through the block pointer, and inquiring a target block corresponding to the target educational data from a block set managed by the cuckoo filter which is traversed currently.
In a third aspect, the present application also provides a computer device. The computer device includes a memory storing a computer program and a processor that when executing the computer program performs steps in a blockchain-based educational data management method.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which when executed by a processor performs steps in a blockchain-based educational data management method.
When the initial education data is acquired by the initiating node, the initial remainder is obtained by performing modular processing on the initial education data, and then transaction broadcasting is performed according to the initial remainder, so that the receiving node performs data updating to obtain the block chain-based education data management method, the block chain-based education data management device, the block chain-based education data management computer device and the block chain-based education data management program. When the target educational data is obtained, the target block corresponding to the target educational data can be inquired out through the target filter. Therefore, in order to solve the problem of insufficient memory capacity caused by data growth, the initial education data are stored on different nodes in a scattered manner according to a remainder modulo manner, so that data segmentation and scattered storage optimization are realized, storage redundancy is reduced, and storage efficiency is improved; in order to solve the problem of slow data query speed caused by data growth, the data verification and query speed is increased by referring to the target filter to quickly search and verify the large-scale data.
Drawings
FIG. 1 is an application environment diagram of a blockchain-based educational data management method in one embodiment;
FIG. 2 is a flow diagram of a method of blockchain-based educational data management in an embodiment;
FIG. 3 is a diagram of a skip list search architecture based on a cuckoo filter, in one embodiment;
FIG. 4 is a diagram of a multi-tier linked list structure corresponding to a cuckoo filter in one embodiment;
FIG. 5 is a schematic diagram of a model of an access control tree in one embodiment;
fig. 6 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The blockchain-based education data management method provided by the embodiment of the application can be applied to an application environment shown in figure 1. The terminals 102 corresponding to the nodes in the blockchain communicate with the server 104 through a network. When the terminal corresponding to the initiating node acquires the initial education data, performing modular processing on the initial education data to obtain an initial remainder; the server 104 is configured to perform transaction broadcasting according to the initial remainder, so that the terminal corresponding to the receiving node performs data update. The server 104 is further configured to query, through the target filter, a target block corresponding to the target educational data, so that the terminal 102 corresponding to each node obtains account information corresponding to the target educational data. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, unmanned aerial vehicle devices, intelligent vehicle devices, portable wearable devices, and the like. The server 104 may be implemented by a stand-alone server or a server cluster formed by a plurality of servers, and may also be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), and basic cloud computing services such as big data and artificial intelligence platforms.
In one embodiment, as shown in fig. 2, there is provided a blockchain-based education data management method, the blockchain including an originating node and a receiving node of data, the blockchain-based education data management method being loadable into an intelligent education system, the intelligent education system being managed by a deployed blockchain, the following method being implemented by user triggering of the intelligent education system, comprising:
And 202, when the initial educational data is acquired by the initiating node, performing modular processing on the initial educational data to obtain an initial remainder.
The initiating node is any node in a plurality of nodes of the blockchain; the initial educational data is a variety of data that the user needs to store in any node, such as student data and teaching resources. It will be readily appreciated that each node may obtain the initial educational data and that, to avoid redundancy, the following description of the data storage process will be made using the originating node alone as an example.
Specifically, when the initiating node obtains the initial educational data, a pre-stored remainder base is obtained locally, the remainder base is subjected to modulo processing through the initial educational data, a corresponding initial remainder is obtained, and the initial remainder is stored on the initiating node. Wherein the bit width of the initial remainder does not exceed a preset bit value. When each node also stores the initial educational data, i.e., the initial educational data is modulo-processed on the remainder base of the different nodes, the resulting remainder is stored on the different nodes. Therefore, the account information of the initial educational data is stored on each node separately, the bit width of the stored data is relatively smaller, the occupation of the storage space is reduced, and the effect of compressing the storage space is achieved. And the burden of data access is reduced in large-scale data management, so that the performance of the whole system is improved.
In one embodiment, the user preselects n residual bases of bit width of a predetermined bit value, n and the predetermined bit value are integers, and n residual bases are recorded as. Each node randomly selects a remainder base from Q to store locally when joining the blockchain network.
In one embodiment, the intelligent education system comprises a remainder system, a cuckoo filter and an attribute encryption algorithm, and the process of performing modulo processing can be realized by a block chain storage optimization model based on the remainder system. The reasonable design of the remainder system ensures that the node loads are relatively balanced, and excessive loads of certain nodes are avoided, so that the overall performance of the intelligent education system is improved.
And 204, carrying out transaction broadcasting according to the initial remainder so as to enable the receiving node to carry out data updating.
Specifically, the initiating node initiates a transaction according to the initial remainder and restores account information of the initial educational data according to the remainder base and the initial remainder. After the transaction execution is completed, the initiating node determines the amount of change in account information for the initial educational data and broadcasts the amount of change to the receiving node. Because the receiving node also executes the modular processing of the initial education data on the corresponding remainder base and stores the obtained remainder, the receiving node updates the remainder corresponding to the account information of the initial education data according to the variation; the account information of the initial educational data at least comprises data quantity, identification and the like; wherein, the remainder base corresponding to each and the remainder corresponding to the account information of the plurality of initial educational data are stored on different nodes.
In one embodiment, the broadcasting of the transaction according to the initial remainder includes: acquiring a remainder base corresponding to the initiating node, and recovering account information of the initial education data according to the remainder base and the initial remainder; when the account information of the initial education data is verified to be free, forwarding the transaction corresponding to the account information of the initial education data; when execution of the transaction is completed, a variance of account information of the initial educational data is determined and broadcast to the receiving node.
Specifically, the originating node restores account information of the initial educational data according to the remainder base and the initial remainder. And when the account information of the initial education data is verified to be free, forwarding and packaging the transaction corresponding to the account information of the initial education data to the local block. The initiating node performs the transaction and performs the workload certification, and upon determining that the transaction execution is completed, determines a variation of account information of the initial educational data, and broadcasts the variation to the receiving node. Thus, the need for node storage space is reduced by storing the initial educational data of the same user at different nodes in a decentralized manner during the storage phase. Since the initiating node directly determines the variation of the account information of the initial educational data when the transaction execution is completed, the broadcasting of the variation is performed, so that the receiving node performs data updating. Therefore, when the educational data in the blockchain needs to be updated, only the change amount of the account information needs to be updated, so that the system operation amount and the network communication cost are greatly reduced and saved.
In one embodiment, the method further comprises: when a new node needs to be added into the block chain, a preset target remainder base is obtained; recovering account information of the initial education data, and performing modular processing on the initial education data according to the target remainder base to obtain a target remainder; and updating the data of the newly added node according to the target remainder.
The preset target residual may be a residual selected from Q randomly.
Specifically, if a new newly added node is to be added to the blockchain network, a process of synchronizing all existing account information to be stored needs to be performed on the newly added node. The newly added node collects the remainder base and remainder of all the initial educational data from the remaining nodes, which include the originating node and the receiving node. And the newly added node restores the complete account information of all the initial educational data according to the corresponding remainder base and remainder. And the newly added node performs modulo processing on each initial educational data on the target remainder base to obtain a target remainder, and stores all the obtained target remainder into a local module, thereby realizing the data update of the newly added node.
In the above embodiment, before each new node joins the blockchain network, a target remainder base needs to be selected, and when transaction information verification is performed, all information of the educational data needs to be collected from the other nodes to restore the original account information, and when the educational data in the blockchain needs to be updated, only the variation of the account information needs to be updated, so that the system operation amount and the network communication cost amount are greatly reduced and saved.
And 206, acquiring target educational data, and inquiring a target block corresponding to the target educational data through a target filter.
The efficient data query refers to that data meeting query conditions is retrieved in a database or a data storage system in a shortest time as possible by adopting an optimized query technology. This involves the use of efficient algorithms, data structures, and query optimization strategies to improve query performance, reduce response time, and minimize resource consumption. Such as a data index and query optimizer, a data index is a data structure that can accelerate the retrieval of data in a database table. By creating an index on one or more columns of the table, records meeting the query criteria can be located and accessed more quickly. The query optimizer is part of the database management system and is responsible for analyzing query statements and determining the most efficient execution plan. It considers index, table join, filtering conditions, etc. to select the best query execution path.
Wherein the target filter comprises a cuckoo filter; the cuckoo filter comprises a blockchain layer and a filter layer; the cuckoo filter comprises a filter pointer and a block pointer; the block chain layer is formed by connecting blocks in series through block pointers; the filter layers are formed by filter pointers connected in series.
Among them, a Cuckoo Filter (Cuckoo Filter) is a probabilistic data structure for implementing an aggregate data structure, which enables a rapid examination of various educational data. The cuckoo filter applied to the application comprises two layers, wherein the bottom layer is a block chain layer, and the upper layer is a filter layer. The block chain layer maintains a classical block chain structure, mainly a chain structure formed by serial blocks of block pointers in a hash form, and can meet the requirement that the block chain cannot be tampered, and can also ensure that the structure supports various different types of block chains without modifying the block chains.
The filter layer is formed by connecting a series of cuckoo filters in series through filter pointers, the core idea is to divide the whole block chain account book into a plurality of sections, each section is a block set, each block set comprises N blocks, and each cuckoo filter manages one block set. The block of the block set registers with the valley filter according to the hash fingerprint of the block, and the filter records the information of the block. The number of N in the block set can be dynamically adjusted according to the actual scene.
In one embodiment, querying, through a target filter, a target block corresponding to target educational data includes: traversing the plurality of cuckoo filters through the jump of the filter pointer, and jumping through the block pointer, and inquiring a target block corresponding to the target educational data from the block set managed by the cuckoo filter which is traversed currently.
As shown in fig. 3, fig. 3 is a skip list search structure based on a cuckoo filter.
Specifically, when the account information of the target educational data is required to be queried, first, the first cuckoo filter is compared, and if the target block is confirmed to be contained, the first cuckoo filter is regarded as the cuckoo filter which is currently traversed. Otherwise, jumping to the next cuckoo filter through the filter pointer, and continuing to compare. By executing the search in the block set managed by the currently traversed cuckoo filter, the currently traversed cuckoo filter is confirmed to display that the set contains the target block, so that the first block in the set can be jumped to by the block pointer, and the block pointer is traversed in the set until the target block corresponding to the target educational data is successfully acquired. The filter pointer can be accurately indexed to the cuckoo filter, the block pointer is used for jumping, and a target block corresponding to target educational data is searched from a block set managed by the cuckoo filter, namely, the block where the target data is located can be quickly positioned, and further, the required educational data can be accurately searched.
In one embodiment, each node in the blockchain may generate hash fingerprints corresponding to different blocks through calculation of the block hash, and when a target block corresponding to the target educational data is determined, account information corresponding to the target educational data is determined according to the hash fingerprint of the target block.
In one embodiment, the set of blocks includes a multi-layer linked list; target educational data from the block set managed by the currently traversed cuckoo filter, the target educational data of the target block corresponding to the target educational data is inquired out, which comprises the following steps: searching an initial block corresponding to the target educational data from the first-layer linked list through the jump of the block pointer; and taking the next hierarchical linked list of the initial block as a new first-layer linked list, returning to the process of searching a new initial block corresponding to the target educational data from the new first-layer linked list through the jump of the block pointer until the last hierarchical linked list is jumped, and inquiring the target block corresponding to the target educational data.
Specifically, the filter layer firstly screens through a jump table, the core idea of the jump table is that when elements are searched in a linked list, the linked list is ordered, pointers pointing to the 2 nd node are added in the nodes, and after comparison, jumping is selected, so that the searching efficiency is improved and misjudgment is reduced by the idea of 'taking time by space'. For the currently traversed cuckoo filter, the managed block set includes multiple linked lists, such as four-layer filtering, where each layer is an ordered linked list, as shown in fig. 4, and fig. 4 is a multiple linked list structure corresponding to the cuckoo filter. If one targeted educational data x is present at the first level, then all the next levels smaller than the first level contain elemental targeted educational data, meaning that the elements of each level are a subset of the previous level, ensuring ordering between levels. Only when the result of the previous layer contains the target data, the next layer containing the target data is queried, and the step is repeated until the target block containing the target educational data is found in the last hierarchical linked list.
In the embodiment, the cuckoo filter is introduced as a data query tool, and layering treatment is carried out on the cuckoo filter, so that the system can more rapidly search and verify the existence of the elements, high-efficiency data query is realized, and unnecessary database query is reduced. The mechanism has remarkable performance improvement on frequent student inquiry, resource search and other scenes in the intelligent education system, provides faster and responsive learning experience for users, further reduces the load of the intelligent education system and improves the access efficiency of the intelligent education system.
In one embodiment, a time complexity analysis is performed on a skip list search structure based on a cuckoo filter. In the temporal complexity analysis, it is assumed that the blockchain contains M blocks, N being the number of blocks contained in the set of blocks. Compared with the traditional O (M) time complexity, the time complexity of the cuckoo filter search block provided by the application is O (k) +O (N), wherein k is a constant. The search time of the cuckoo filter is a constant term and is not influenced by the search space change. Therefore, the blockchain retrieval structure is only related to the size of the segmented blockset, and the filter retrieval time complexity is a constant term, so that the time cost required by the blockchain retrieval is greatly reduced.
In one embodiment, to prevent an increase in false positive rate, the accuracy of the filter may be maintained by periodically rebuilding the cuckoo filter, purging the existing data and reinserting.
In one embodiment, the above-mentioned blockchain-based education data management method can be applied to the field of education through an intelligent education system, and it is easy to understand that when medical data and equipment data need to be managed, the above-mentioned method can also be used for management, and the above-mentioned method can be applied to the corresponding field, such as the medical field, through a corresponding intelligent system, so that the application is not limited herein.
In the blockchain-based education data management method, when the initiating node acquires the initial education data, the initial education data can be subjected to modulo processing to obtain an initial remainder, and transaction broadcasting is further performed according to the initial remainder, so that the receiving node can update the data. When the target educational data is obtained, the target block corresponding to the target educational data can be inquired out through the target filter and the target educational data. Therefore, in order to solve the problem of insufficient memory capacity caused by data growth, the initial education data are stored on different nodes in a scattered manner according to a remainder modulo manner, so that data segmentation and scattered storage optimization are realized, storage redundancy is reduced, and storage efficiency is improved; in order to solve the problem of slow data query speed caused by data growth, the data verification and query speed is increased by referring to the target filter to quickly search and verify the large-scale data.
Among other things, there is a need to secure personal information and sensitive data against unauthorized access, use, disclosure or modification during information processing and data exchange. This concept is primarily focused on protecting individuals' privacy, ensuring that their sensitive information is not misused or compromised. For example, by using a data encryption algorithm, sensitive data is converted into a format that can be understood by only authorized parties, ensuring that even if the data is stolen, privacy protection is achieved, and helping to protect the security of educational data during transmission and storage.
In one embodiment, when the educational data is encrypted, the method further comprises: acquiring an access control tree; a set of user attributes of the query educational data is determined, and the decrypted educational data is determined when the set of user attributes meets the access control tree.
Wherein the access control tree comprises a threshold value; the threshold value represents the minimum node quantity conforming to the node attribute when the access right is obtained; each non-leaf node in the access control tree is a control threshold, and the node information includes child nodes and threshold values. For example, as shown in fig. 5, fig. 5 is a schematic diagram of a model of an access control tree, where a threshold "2/3" in a root node represents that the root node has 3 child nodes, and access rights of the root node can be obtained only when node requirements of 2 child nodes are at least satisfied.
Wherein the access control tree includes a root node, a non-leaf node, and a leaf node.
In one embodiment, the process of building the access control tree includes: determining a first random polynomial corresponding to the root node according to an encryption key of the educational data and combining a threshold access strategy of the random polynomial; for each child node of the root node, when the current child node is a non-leaf node, determining a second random polynomial corresponding to the current child node according to the threshold number and the first random polynomial; when the current child node is a leaf node, determining the node attribute of the current child node, and processing the node attribute through a preset encapsulation algorithm to obtain an encapsulation key.
Specifically, an access control tree is generally constructed from a root node, based on a threshold access policy of a random polynomial, the highest degree in a first random polynomial generated by subtracting 1 from a threshold value is used, and constant terms and coefficient terms in the first random polynomial are generated randomly, for example, a polynomial f (x) =5+2x is generated. Wherein the constant term may be an encryption key e of the educational data; the constant term and coefficient term are usually numbers satisfying the SM9 key space length. The educational data is generally encrypted in a structure of (ind, ENCRYPTEDE, tree), and the encryption key e is stored in the tree.
Then, each child node of the root node is constructed, and when the current child node is a non-leaf node, the highest degree in the second random polynomial generated by subtracting 1 from the threshold value is also passed, and each child node is marked from left to right in turn, for example, as 1,2 and 3. Substituting the preliminarily generated second random polynomial into the first random polynomial, taking the calculation result as a constant term of the finally generated second random polynomial, and randomly generating other parameters. If the current child node is a leaf node, the calculation result is marked as s, and the encapsulation key algorithm SM9-ENCKEYGEN is called according to the node attribute to generate an encapsulation key (k, C). Where k is taken as the key and ENCRYPTEDCHILD-e is generated by encrypting s so that the leaf node stores the structure (ENCRYPTEDCHILD-e, C). Wherein node attributes such as 6.1 class, students, teachers, etc.
Where it is desired to determine which information in the intelligent educational system is considered sensitive, such as personal identity information of a student, performance records, etc., proper handling of the sensitive information is ensured. When combined with an encrypted access control mechanism, it is ensured that only authorized users can access the decrypted information. This may be achieved through authentication and authorization processes.
Further, since the educational data is encrypted, it is necessary to determine a set of user attributes of the visitor who inquires the educational data after the above-mentioned constructed access control tree is obtained. User attribute sets such as 6.1 class, students, etc. When the user attribute set accords with the threshold value of each node in the access control tree, namely, the operation is performed from bottom to top in the access control tree until the decryption key of the root node is obtained, so that the decrypted educational data can be determined through the decryption key.
For example, if the visitor has (principal, 6.2 class, teacher) property, call SM9-DECKEYGEN to decrypt (principal, 6.2 class, teacher) node, for example, use threshold algorithm (i.e. process of solving equation set) to get polynomial of parent node for (6.2 class, teacher), then decrypt parent node for (principal, 2/2) upper layer until obtaining root node key e, and use key e as Encrypted field of key decryption database. When a visitor accesses data, the open data storage service can not perform identity authentication any more, and the threat of data confidentiality caused by quantum computing attack and the like is avoided.
In the embodiment, the attribute is introduced into the intelligent education system to encrypt, secret sharing based on the threshold strategy is realized through the access control tree, decryption can be performed only when the user attribute set accords with the threshold value of the access control attribute set, and the user checks the data to control the access energy, so that the privacy protection function is more effectively realized. Therefore, the privacy protection benefit of attribute encryption is to prevent unauthorized access, effectively prevent the risk of data leakage, meet the compliance requirement of privacy regulations and provide trust and security feeling for users.
In one embodiment, the attribute encryption algorithm described above remains encrypted during the data storage phase and a monitoring mechanism is deployed to detect abnormal operation or potential threats.
In summary, the above embodiments, by analyzing that current intelligent educational systems do not utilize blockchain technology for decentralization and privacy preservation, bulky systems complicate and inefficiency data interrogation. The application combines the blockchain technology, the remainder system storage optimization and the cuckoo filter to solve the data management problem in the intelligent education system. According to the application, through the decentralized storage optimization of the remainder system, the storage redundancy of teaching resources is effectively reduced, and the occupation of storage space is reduced. Meanwhile, the cuckoo filter is introduced to realize quick data existence check, so that the access efficiency of the system is improved, and unnecessary actual data query operation is reduced. The combination of attribute encryption and blockchain technology further enhances the transparency, non-tamper property and security of data, meets the requirement of an education system for protecting the privacy of the data, provides a more efficient, safer and more reliable data management mechanism for the intelligent education system, supports personalized learning and improves the user experience. The comprehensive scheme is expected to promote the intelligent education system to obtain more excellent performance in terms of data processing and management.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the present application also provides a blockchain-based educational data management device for implementing the above-mentioned blockchain-based educational data management method. The implementation of the solution provided by the apparatus is similar to that described in the above method, so specific limitations in one or more of the embodiments of the blockchain-based educational data management apparatus provided below may be found in the above limitations of the blockchain-based educational data management method, and will not be described in detail herein.
In one embodiment, there is provided a blockchain-based educational data management device, comprising: the system comprises a data module, a data updating module and a data query module, wherein:
And the data modulus taking module is used for taking modulus for the initial education data when the initial education data is acquired by the initiating node, so as to obtain an initial remainder.
And the data updating module is used for carrying out transaction broadcasting according to the initial remainder so as to enable the receiving node to update the data to obtain the data.
The data query module is used for acquiring target educational data and querying a target block corresponding to the target educational data through a target filter, wherein the target filter comprises a plurality of cuckoo filters; the cuckoo filter comprises a filter pointer and a block pointer; inquiring a target block corresponding to the target educational data through a target filter, wherein the method comprises the following steps: traversing the plurality of cuckoo filters through the jump of the filter pointer, and jumping through the block pointer, and inquiring a target block corresponding to the target educational data from the block set managed by the cuckoo filter which is traversed currently.
The various modules in the above-described blockchain-based educational data management may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing educational data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a blockchain-based educational data management method.
It will be appreciated by those skilled in the art that the structure shown in FIG. 6 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, storing a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the steps in the above-described method embodiments.
Those skilled in the art will appreciate that implementing all or part of the above-described embodiment methods may be accomplished by way of a computer program that instructs associated hardware to perform the method, and that the computer program may be stored on a non-volatile computer readable storage medium, which when executed, may comprise the embodiment flows of the above-described methods. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magneto-resistive random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (PHASE CHANGE Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in various forms such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), etc. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. A blockchain-based educational data management method, characterized in that the blockchain includes an originating node and a receiving node of data; the method comprises the following steps:
when the initial educational data is acquired by the initiating node, performing modular processing on the initial educational data to obtain an initial remainder;
carrying out transaction broadcasting according to the initial remainder so as to enable the receiving node to carry out data updating;
acquiring target educational data, and inquiring a target block corresponding to the target educational data through a target filter;
Wherein the target filter comprises a plurality of cuckoo filters; the cuckoo filter comprises a filter pointer and a block pointer; the target block corresponding to the target educational data is inquired out through the target filter, which comprises the following steps:
Traversing a plurality of cuckoo filters through the jump of the filter pointer, and jumping through the block pointer, and inquiring a target block corresponding to the target educational data from a block set managed by the cuckoo filter which is traversed currently.
2. The method of claim 1, wherein said broadcasting of transactions based on said initial remainder comprises:
Acquiring a remainder base corresponding to the initiating node, and recovering account information of the initial education data according to the remainder base and the initial remainder;
when the account information of the initial education data is verified to be free, forwarding a transaction corresponding to the account information of the initial education data;
when the transaction execution is completed, determining a variation of account information of the initial educational data and broadcasting the variation to the receiving node.
3. The method according to claim 1, wherein the method further comprises:
when a new node needs to be added into the block chain, a preset target remainder base is obtained;
Recovering account information of the initial education data, and performing modular processing on the initial education data according to the target remainder base to obtain a target remainder;
And updating the data of the newly added node according to the target remainder.
4. The method of claim 1, wherein the cuckoo filter comprises a blockchain layer and a filter layer; the block chain layer is formed by connecting blocks in series through block pointers; the filter layers are formed by connecting filter pointers in series.
5. The method of claim 1, wherein the set of blocks comprises a multi-layer linked list; target educational data the target block target educational data corresponding to the target educational data is inquired out from the block set managed by the currently traversed cuckoo filter, which comprises the following steps:
Searching an initial block corresponding to the target educational data from a first-layer linked list through the jump of the block pointer;
And taking the next hierarchical linked list of the initial block as a new first-layer linked list, returning to the process of searching the new initial block corresponding to the target educational data from the new first-layer linked list through the jump of the block pointer until the last hierarchical linked list is jumped, and searching out the target block corresponding to the target educational data.
6. The method of claim 1, wherein the educational data is encrypted, the method further comprising:
acquiring an access control tree; the access control tree includes a threshold value; the threshold value characterizes the minimum node quantity meeting the node requirement when the access right is obtained;
Determining a set of user attributes for querying the educational data and determining decrypted educational data when the set of user attributes meets the access control tree.
7. The method of claim 6, wherein the access control tree comprises a root node, a non-leaf node, and a leaf node; the construction process of the access control tree comprises the following steps:
determining a first random polynomial corresponding to the root node according to the encryption key of the educational data and in combination with a threshold access strategy of the random polynomial;
For each child node of the root node, when the current child node is a non-leaf node, determining a second random polynomial corresponding to the current child node according to the threshold value and the first random polynomial;
when the current child node is a leaf node, determining the node attribute of the current child node, and processing the node attribute through a preset encapsulation algorithm to obtain an encapsulation key.
8. A blockchain-based educational data management device, the device comprising:
the data modulus taking module is used for carrying out modulus taking processing on the initial education data when the initial education data is acquired by the initiating node, so as to obtain an initial remainder;
The data updating module is used for carrying out transaction broadcasting according to the initial remainder so as to enable the receiving node to carry out data updating;
The data query module is used for acquiring target educational data and querying a target block corresponding to the target educational data through a target filter; wherein the target filter comprises a plurality of cuckoo filters; the cuckoo filter comprises a filter pointer and a block pointer; the target block corresponding to the target educational data is inquired out through the target filter, which comprises the following steps: traversing a plurality of cuckoo filters through the jump of the filter pointer, and jumping through the block pointer, and inquiring a target block corresponding to the target educational data from a block set managed by the cuckoo filter which is traversed currently.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202410397460.6A 2024-04-03 2024-04-03 Block chain-based educational data management method, device and computer equipment Pending CN117992472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410397460.6A CN117992472A (en) 2024-04-03 2024-04-03 Block chain-based educational data management method, device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410397460.6A CN117992472A (en) 2024-04-03 2024-04-03 Block chain-based educational data management method, device and computer equipment

Publications (1)

Publication Number Publication Date
CN117992472A true CN117992472A (en) 2024-05-07

Family

ID=90895415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410397460.6A Pending CN117992472A (en) 2024-04-03 2024-04-03 Block chain-based educational data management method, device and computer equipment

Country Status (1)

Country Link
CN (1) CN117992472A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723149A (en) * 2020-05-18 2020-09-29 天津大学 Block chain storage optimization system and method based on remainder system
CN116737787A (en) * 2023-04-18 2023-09-12 昆明理工大学 Block chain data storage query method based on improved cuckoo filter

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723149A (en) * 2020-05-18 2020-09-29 天津大学 Block chain storage optimization system and method based on remainder system
CN116737787A (en) * 2023-04-18 2023-09-12 昆明理工大学 Block chain data storage query method based on improved cuckoo filter

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
冯航伟等: "基于布谷鸟过滤器的区块链检索结构", 《网络新媒体技术》, 15 January 2023 (2023-01-15), pages 1 - 7 *
梅昊娟: "基于余数系统 的区块链存储优化模型", 《中国优秀硕士论文集》, 4 February 2021 (2021-02-04), pages 23 - 29 *
王森等: "基于属性加密的数据共享管理研究", 《信息安全研究》, 5 November 2023 (2023-11-05), pages 5 *

Similar Documents

Publication Publication Date Title
Xu et al. Artificial intelligence for securing IoT services in edge computing: a survey
CN110785981B (en) Securing access to confidential data using blockchain ledgers
CN110163007B (en) Block chain-based data integrity verification method, equipment and storage medium
CN110147684B (en) Method and device for realizing privacy protection of blockchain data
US11907199B2 (en) Blockchain based distributed file systems
JP2008517354A (en) A computer with a method of building an encrypted database index for database table search
CN113742764B (en) Trusted data secure storage method, retrieval method and equipment based on block chain
CN112000632A (en) Ciphertext sharing method, medium, sharing client and system
CN115659417A (en) Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment
Wang et al. Data Security Storage Model of the Internet of Things Based on Blockchain.
CN109284624A (en) A kind of data safety partition method and device based on the storage of block chain
Wu et al. A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain
Han et al. A deletable and modifiable blockchain scheme based on record verification trees and the multisignature mechanism
Singh et al. Ring signature and improved multi‐transaction mode consortium blockchain‐based private information retrieval for privacy‐preserving smart parking system
Yao et al. Topic-based rank search with verifiable social data outsourcing
CN117992472A (en) Block chain-based educational data management method, device and computer equipment
Bu et al. SEF: a secure, efficient, and flexible range query scheme in two-tiered sensor networks
Nagesh et al. Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment
Osawaru et al. A highlight of security challenges in big data
Li et al. Post‐Quantum Privacy‐Preserving Provable Data Possession Scheme Based on Smart Contracts
CN115033187B (en) Big data based analysis management method
Zheng et al. A Secure and Trusted Data Sharing Scheme Based on Blockchain for Government Data
CN114510465B (en) Data management method, device and computer readable storage medium
Ramachandran et al. Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
He et al. Cloud computing data privacy protection method based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination