技术领域technical field
本发明涉及的是一种大数据领域的技术,具体是一种使用区块链来完成大数据安全共享的方法及系统。The present invention relates to a technology in the field of big data, in particular to a method and system for using block chains to complete safe sharing of big data.
背景技术Background technique
传统的大数据应用框架往往是一种三角的结构。数据需求方,大数据管理平台和数据提供者构成了一个三个元素之间分别独立而又相互关联的整体。传统的框架中来自数据提供方的数据是由数据平台集中处理和管理的,这使得传统框架面临着隐私泄露和易受分布式拒绝攻击(DDOS)、女巫攻击(Sybil attacks)的安全隐患。The traditional big data application framework is often a triangular structure. The data demand side, the big data management platform and the data provider constitute an independent but interrelated whole among the three elements. In the traditional framework, the data from the data provider is centrally processed and managed by the data platform, which makes the traditional framework face security risks of privacy leakage and vulnerability to distributed denial of attack (DDOS) and Sybil attacks.
发明内容Contents of the invention
本发明针对目前集中式的大数据管理平台容易发生数据泄露或者用户隐私泄露的不足,提出了一种基于区块链的大数据安全共享方法和系统,用一个区块链和一个开源的用户界面来代替了传统中心化的大数据平台,借助区块链技术,让矿工代替中心化的数据管理平台,从而确保用户信息的安全性。Aiming at the shortcomings of the current centralized big data management platform, which are prone to data leakage or user privacy leakage, the present invention proposes a method and system for safe sharing of big data based on blockchain, using a blockchain and an open-source user interface To replace the traditional centralized big data platform, with the help of blockchain technology, miners can replace the centralized data management platform to ensure the security of user information.
本发明是通过以下技术方案实现的:The present invention is achieved through the following technical solutions:
本发明涉及一种基于区块链的大数据安全共享方法,数据需求方通过开源用户界面向数据提供方广播包含报酬信息的智能合约,并对所要求的隐私信息加密;数据提供方根据智能合约中的报酬金额决定是否接下任务,数据需求方经确认后选择接下任务并运行数据需求方发来的代码,并根据代码结构,判断有无暴露隐私信息而决定是否向合约提供数据,当未暴露隐私信息且数据提供方认可报酬,则数据提供方将结果投递至广播网络中智能合约,并在被矿工确认后获取报酬;矿工在后台执行经过编译的代码,并将结果确认交易,最终根据确认交易的工作量在后台通过智能合约赚取报酬。The present invention relates to a method for securely sharing big data based on blockchain. The data demander broadcasts a smart contract containing remuneration information to the data provider through an open source user interface, and encrypts the required privacy information; the data provider according to the smart contract The amount of remuneration in decides whether to accept the task. After confirmation, the data requester chooses to take over the task and run the code sent by the data requester, and decides whether to provide data to the contract by judging whether there is any exposure of private information according to the code structure. If the private information is not exposed and the data provider approves the reward, the data provider will deliver the result to the smart contract in the broadcast network, and get the reward after being confirmed by the miners; the miner executes the compiled code in the background, and confirms the result of the transaction, and finally Earn rewards through smart contracts in the background according to the workload of confirming transactions.
所述的数据提供方和数据需求方优选通过开源用户界获取智能合约的信息并发送任务接受和确认的信息。The data provider and the data demander preferably obtain the information of the smart contract through the open source user interface and send the information of task acceptance and confirmation.
所述的开源用户界面采用但不限于:公开的需求数据获取具体方法的说明网站。The open source user interface adopts, but is not limited to: the website explaining the specific method of obtaining demand data from the public.
技术效果technical effect
与现有技术相比,本发明具有高度匿名化:用户在分享数据的过程中将会具有更高的匿名性。其匿名化程度约等于以太币持币者的匿名性;通过使用区块链技术,本发明有效杜绝了数据共享平台易受分布式拒绝攻击(DDOS)、女巫攻击(Sybil attacks)的安全隐患。Compared with the prior art, the present invention has a high degree of anonymity: users will have higher anonymity in the process of sharing data. The degree of anonymization is approximately equal to the anonymity of the holder of the ether currency; by using the block chain technology, the present invention effectively eliminates the potential safety hazards that the data sharing platform is vulnerable to distributed denial of attack attacks (DDOS) and Sybil attacks (Sybil attacks).
附图说明Description of drawings
图1为实施例系统的结构示意图;Fig. 1 is the structural representation of embodiment system;
图2为实施例中系统经智能合约封装后的结构示意图;Fig. 2 is a schematic structural diagram of the system encapsulated by a smart contract in the embodiment;
图3为实施例中系统智能合约数据需求方发起合约流程示意图;Fig. 3 is a schematic diagram of the contract process initiated by the system smart contract data demander in the embodiment;
图4为实施例中系统智能合约数据需求方中止合约流程示意图;Fig. 4 is a schematic diagram of the contract flow diagram of the system smart contract data demander in the embodiment;
图5为实施例中系统智能合约数据提供方提交数据流程示意图。Fig. 5 is a schematic diagram of the data submission process of the system smart contract data provider in the embodiment.
具体实施方式Detailed ways
如图2所示,本实施例涉及一种将去中心化的数据管理共享平台使用智能合约封装,并将整个系统的框架简化为智能合约下的大数据安全共享系统,包括数据需求方、数据提供方以及矿工三部分,其中:数据需求方通过开源用户界面向数据提供方广播包含报酬信息的智能合约,并对所要求的隐私信息加密;数据提供方根据智能合约中的报酬金额决定是否接下任务。在通过开源用户界面对智能合约的信息进行确认后,数据需求方可以选择接下任务,随之运行数据需求方发来的代码,并根据代码结构,判断有无暴露隐私信息而决定是否向合约提供数据,当未暴露隐私信息且数据提供方认可报酬,则数据提供方将结果投递至广播网络中智能合约,并在被矿工确认后获取报酬;矿工在后台执行经过编译的代码,并将结果确认交易,最终根据确认交易的工作量在后台通过智能合约赚取报酬。As shown in Figure 2, this embodiment involves a decentralized data management sharing platform packaged with smart contracts, and the framework of the entire system is simplified into a big data security sharing system under smart contracts, including data demanders, data There are three parts: the provider and the miner, among which: the data demander broadcasts the smart contract containing remuneration information to the data provider through the open source user interface, and encrypts the required privacy information; the data provider decides whether to accept next task. After confirming the information of the smart contract through the open source user interface, the data requester can choose to take over the task, and then run the code sent by the data requester, and decide whether to submit private information to the contract according to the code structure. Provide data, when the private information is not exposed and the data provider approves the reward, the data provider will deliver the result to the smart contract in the broadcast network, and get the reward after being confirmed by the miners; the miner executes the compiled code in the background and sends the result Confirm the transaction, and finally earn rewards through the smart contract in the background according to the workload of confirming the transaction.
将三部分拼接起来,由数据需求方发起智能合约开始,到数据提供方填写合约数据以及矿工随时的确认交易,本实施例可以完整的实现本发明的技术效果,The three parts are spliced together, starting from the smart contract initiated by the data demander, and the data provider fills in the contract data and the miner confirms the transaction at any time. This embodiment can fully realize the technical effect of the present invention.
所述的智能合约是一种旨在以信息化方式传播、验证或执行合同的计算机协议,其允许在没有第三方的情况下进行可信交易,这些交易可追踪且不可逆转。本发明使用了以太坊的智能合约开发框架,借助以太币在社会上的公信力,解决了去中心化的区块链数据管理平台难以建立用户信任度的问题。Said smart contract is a computer protocol designed to disseminate, verify or enforce contracts in an informational manner, which allows trusted transactions without third parties, which are traceable and irreversible. The present invention uses the smart contract development framework of Ethereum, and with the help of the credibility of Ethereum in the society, solves the problem that it is difficult to establish user trust in a decentralized blockchain data management platform.
在图2中,数字标号简单记录了在一次大数据分享任务中整个框架的流程顺序。其中流程标号2*代表此流程2*可以与流程2同步进行,而流程标号x表示此流程可以在流程2后的任意时刻执行。另外,图2中的实线代表了必然会发生的流程,而虚线代表了可能在框架流程执行中并不会被执行的流程。In Figure 2, the number labels simply record the flow sequence of the entire framework in a big data sharing task. The process label 2* indicates that the process 2* can be performed synchronously with the process 2, and the process label x indicates that the process can be executed at any time after the process 2. In addition, the solid line in Fig. 2 represents the process that will inevitably occur, while the dotted line represents the process that may not be executed during the execution of the framework process.
所述的加密,使用RSA加密算法,在提供的代码中使用特定的公钥进行加密,最后在搜集完所有区块链里的记录后再使用私钥对隐私信息进行解密,得到原来的文本。The encryption uses the RSA encryption algorithm and uses a specific public key to encrypt in the provided code. Finally, after collecting all the records in the blockchain, the private key is used to decrypt the private information to obtain the original text.
所述的包含报酬信息是指:通过记录区块链交易的方式,将预付给矿工或者是数据提供方的报酬存入区块链中。The inclusion of remuneration information refers to: by recording blockchain transactions, the remuneration prepaid to miners or data providers is stored in the blockchain.
如图3所示,所述的发起包含报酬信息的智能合约具体为:使用了solidity平台下智能合约的payable函数,并对作为合约发起者的数据需求方所传递的信息的价值(msg.value)使用require语句进行限定,使其需要大于数据需求方所声称能够提供的报酬。与此同时,数据需求方需要向数据提供方广播数据提取程序,具体实现方案为使用TCP/IP协议对加入网络的用户进行程序传送。As shown in Figure 3, the above-mentioned initiating a smart contract containing remuneration information is specifically: using the payable function of the smart contract under the solidity platform, and the value of the information delivered by the data demander as the contract initiator (msg.value ) is limited by the require statement, so that it requires more than the remuneration that the data demander claims to be able to provide. At the same time, the data demander needs to broadcast the data extraction program to the data provider. The specific implementation plan is to use the TCP/IP protocol to transmit the program to the users who join the network.
所述的结果投递是指:数据提供方在智能合约中为用户提供提交数据的函数,并在函数体中加入对数据的分析与处理的代码片段。The result delivery refers to: the data provider provides the user with a function to submit data in the smart contract, and adds code fragments for data analysis and processing to the function body.
所述的矿工确认是指:当矿工成功编译智能合约的代码,则说明数据提供方提交的数据无误,智能合约将把数据需求方指定的报酬在这个提交数据的函数的最后转交给数据提供方。The miner confirmation refers to: when the miner successfully compiles the code of the smart contract, it means that the data submitted by the data provider is correct, and the smart contract will transfer the reward specified by the data requester to the data provider at the end of the function of submitting data .
如图4所示,所述的数据需求方有权力在认定收集到了足够的数据或者是不想收集数据了的情况下中止合约,得到合约中尚未发完的报酬,具体为:使用了智能合约记录合约创建者即数据需求者的地址,并为数据需求者编写abort函数,在数据需求者调用函数时将当前合约的余额(this.balance)返回给数据需求者。As shown in Figure 4, the data demander has the right to suspend the contract if it determines that it has collected enough data or does not want to collect the data, and get the rewards that have not been sent in the contract, specifically: using smart contract records The contract creator is the address of the data demander, and writes the abort function for the data demander, and returns the current contract balance (this.balance) to the data demander when the data demander calls the function.
本实施例的性能指标主要体现在其安全性上,主要由智能合约背后的矿工模块确认区块链中的交易所达成。安全性具体可以考察本实施例的身份验证、加密体系和匿名性、抗攻击能力四个方面。在身份验证方面,节点的进出,即用户的注册需要由以太坊提供的密钥验证,能够有效的防止身份冒用,且用户的私钥具有完整的生命周期管理,即系统中拥有完备的私钥生成、分发、存储、使用以及销毁过程。在加密体系和隐私方面,本实施例使用以太坊的“椭圆曲线算法”生成用户公私钥,相较现有的大数据共享系统,由于使用了以太坊区块链的记账方式,可以实现远超现有系统的用户匿名性,即用户的个人信息仅由在以太坊中的公开地址提供。在抗攻击能力方面,相较当前大数据共享系统拥有易受网络攻击的问题,本实施例通过智能合约中对需求方和提供方的约束,基本杜绝了分布式拒绝攻击(DDOS)、女巫攻击(Sybil attacks)The performance index of this embodiment is mainly reflected in its security, which is mainly achieved by the miner module behind the smart contract confirming the transactions in the blockchain. The security can specifically examine the four aspects of identity verification, encryption system and anonymity, and anti-attack capability of this embodiment. In terms of identity verification, the entry and exit of nodes, that is, user registration needs to be verified by the key provided by Ethereum, which can effectively prevent identity fraud, and the user's private key has complete life cycle management, that is, the system has a complete private key. Key generation, distribution, storage, use and destruction process. In terms of encryption system and privacy, this embodiment uses the "elliptic curve algorithm" of Ethereum to generate the user's public and private keys. User anonymity beyond the existing system, that is, the user's personal information is only provided by the public address in Ethereum. In terms of anti-attack capabilities, compared with the current big data sharing system that is vulnerable to network attacks, this embodiment basically eliminates distributed denial of attack (DDOS) and Sybil attacks through the constraints on the demander and provider in the smart contract. (Sybil attacks)
上述具体实施可由本领域技术人员在不背离本发明原理和宗旨的前提下以不同的方式对其进行局部调整,本发明的保护范围以权利要求书为准且不由上述具体实施所限,在其范围内的各个实现方案均受本发明之约束。The above specific implementation can be partially adjusted in different ways by those skilled in the art without departing from the principle and purpose of the present invention. The scope of protection of the present invention is subject to the claims and is not limited by the above specific implementation. Each implementation within the scope is bound by the invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810616957.7ACN108846653A (en) | 2018-06-15 | 2018-06-15 | Big data secure sharing method and system based on block chain |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810616957.7ACN108846653A (en) | 2018-06-15 | 2018-06-15 | Big data secure sharing method and system based on block chain |
| Publication Number | Publication Date |
|---|---|
| CN108846653Atrue CN108846653A (en) | 2018-11-20 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810616957.7APendingCN108846653A (en) | 2018-06-15 | 2018-06-15 | Big data secure sharing method and system based on block chain |
| Country | Link |
|---|---|
| CN (1) | CN108846653A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109831501A (en)* | 2019-01-30 | 2019-05-31 | 京东数字科技控股有限公司 | Information dispensing method and system based on block chain |
| CN110266644A (en)* | 2019-05-20 | 2019-09-20 | 阿里巴巴集团控股有限公司 | In conjunction with the receipt storage method and node of code mark and type of transaction |
| CN110648134A (en)* | 2019-08-27 | 2020-01-03 | 广东工业大学 | System and method for sharing short-distance data of Internet of vehicles users based on block chain |
| CN110691065A (en)* | 2019-05-13 | 2020-01-14 | 中国石油大学(华东) | A collaborative detection strategy for malicious URLs based on blockchain technology |
| CN111324881A (en)* | 2020-02-20 | 2020-06-23 | 铭数科技(青岛)有限公司 | Data security sharing system and method fusing Kerberos authentication server and block chain |
| CN112287392A (en)* | 2020-11-23 | 2021-01-29 | 广东科学技术职业学院 | A smart contract implementation method and system capable of protecting privacy information |
| CN113228011A (en)* | 2018-12-29 | 2021-08-06 | 上海诺基亚贝尔股份有限公司 | Data sharing |
| CN114091074A (en)* | 2021-11-25 | 2022-02-25 | 合芯科技(苏州)有限公司 | Data sharing method, device, computer equipment and storage medium |
| US12125054B2 (en) | 2018-09-25 | 2024-10-22 | Valideck International Corporation | System, devices, and methods for acquiring and verifying online information |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106529932A (en)* | 2016-11-01 | 2017-03-22 | 西安电子科技大学 | Bitcoin-based outsourcing calculating fair payment method |
| CN106843774A (en)* | 2017-02-24 | 2017-06-13 | 合肥工业大学 | A kind of mass-rent construction method of the intelligent contract based on block chain |
| US20170352027A1 (en)* | 2016-06-07 | 2017-12-07 | Cornell University | Authenticated data feed for blockchains |
| CN107464118A (en)* | 2017-08-16 | 2017-12-12 | 济南浪潮高新科技投资发展有限公司 | A kind of data trade method based on block chain intelligence contract |
| US20180089758A1 (en)* | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of providing a contract-creator application |
| CN107862548A (en)* | 2017-11-03 | 2018-03-30 | 国云科技股份有限公司 | A large-scale data sharing method based on blockchain |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170352027A1 (en)* | 2016-06-07 | 2017-12-07 | Cornell University | Authenticated data feed for blockchains |
| US20180089758A1 (en)* | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of providing a contract-creator application |
| CN106529932A (en)* | 2016-11-01 | 2017-03-22 | 西安电子科技大学 | Bitcoin-based outsourcing calculating fair payment method |
| CN106843774A (en)* | 2017-02-24 | 2017-06-13 | 合肥工业大学 | A kind of mass-rent construction method of the intelligent contract based on block chain |
| CN107464118A (en)* | 2017-08-16 | 2017-12-12 | 济南浪潮高新科技投资发展有限公司 | A kind of data trade method based on block chain intelligence contract |
| CN107862548A (en)* | 2017-11-03 | 2018-03-30 | 国云科技股份有限公司 | A large-scale data sharing method based on blockchain |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12125054B2 (en) | 2018-09-25 | 2024-10-22 | Valideck International Corporation | System, devices, and methods for acquiring and verifying online information |
| CN113228011A (en)* | 2018-12-29 | 2021-08-06 | 上海诺基亚贝尔股份有限公司 | Data sharing |
| US12170694B2 (en) | 2018-12-29 | 2024-12-17 | Nokia Technologies Oy | Data sharing |
| CN109831501A (en)* | 2019-01-30 | 2019-05-31 | 京东数字科技控股有限公司 | Information dispensing method and system based on block chain |
| CN109831501B (en)* | 2019-01-30 | 2020-09-29 | 京东数字科技控股有限公司 | Blockchain-based information distribution method and system |
| CN110691065A (en)* | 2019-05-13 | 2020-01-14 | 中国石油大学(华东) | A collaborative detection strategy for malicious URLs based on blockchain technology |
| CN110266644A (en)* | 2019-05-20 | 2019-09-20 | 阿里巴巴集团控股有限公司 | In conjunction with the receipt storage method and node of code mark and type of transaction |
| CN110648134A (en)* | 2019-08-27 | 2020-01-03 | 广东工业大学 | System and method for sharing short-distance data of Internet of vehicles users based on block chain |
| CN111324881A (en)* | 2020-02-20 | 2020-06-23 | 铭数科技(青岛)有限公司 | Data security sharing system and method fusing Kerberos authentication server and block chain |
| CN112287392A (en)* | 2020-11-23 | 2021-01-29 | 广东科学技术职业学院 | A smart contract implementation method and system capable of protecting privacy information |
| CN114091074A (en)* | 2021-11-25 | 2022-02-25 | 合芯科技(苏州)有限公司 | Data sharing method, device, computer equipment and storage medium |
| Publication | Publication Date | Title |
|---|---|---|
| CN108846653A (en) | Big data secure sharing method and system based on block chain | |
| US11809608B2 (en) | Methods and systems for using digital signatures to create trusted digital asset transfers | |
| US12015697B2 (en) | Network topology | |
| US11108566B2 (en) | Methods and systems for using digital signatures to create trusted digital asset transfers | |
| JP6873270B2 (en) | Handling of transaction activities based on smart contracts in the blockchain Caution Methods and devices for protecting data | |
| Di Pietro et al. | A blockchain-based trust system for the internet of things | |
| CN108833081B (en) | Block chain-based equipment networking authentication method | |
| CN111316615B (en) | System and method for ensuring correct execution of a computer program using a mediator computer system | |
| US10715531B2 (en) | Network topology | |
| CN107231351B (en) | Electronic certificate management method and related equipment | |
| EP3763076B1 (en) | Method and system for a trusted execution environment-based proof of stake protocol | |
| WO2021008453A1 (en) | Method and system for offline blockchain transaction based on identifier authentication | |
| CN114866323A (en) | User-controllable private data authorization sharing system and method | |
| CN115564434A (en) | A zero-knowledge proof-based privacy protection method for blockchain supervision | |
| CN109995737B (en) | Decentralized digital certificate management method and device, node and system | |
| CN113014556A (en) | Bank-enterprise communication system, communication method and electronic terminal | |
| CN118585991B (en) | Data processing method, device, equipment and storage medium | |
| CN117478418A (en) | System manager data transaction method and system based on blockchain | |
| CN116155501A (en) | Cross-chain communication method, device, equipment and medium in blockchain network | |
| Luo et al. | Incorporating security requirements into communication protocols in Multi-Agent Software Systems |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | Application publication date:20181120 | |
| RJ01 | Rejection of invention patent application after publication |