Background
The data information of the enterprise comprises credit records of the enterprise, credit information of the enterprise, basic information and the like, and also comprises some credit records and the like generated by the enterprise in production and operation, along with the development of the credit investigation industry of the enterprise in China, credit investigation becomes a key part in a financial system, but the information data sharing problem of the credit investigation industry is not well solved so far, the financing problem of small enterprises is also a ubiquitous problem at present, the financing problem is mainly a credit problem, the internal information of the small enterprises is opaque, the financial is imperfect, the credit investigation of the small enterprises is high, and the information investigation of the small enterprises is difficult. At present, a credit investigation system of China people's bank is a credit information database with the most complete national information and the largest scale, but the information required for searching is not included, so that the information between enterprises needs to be shared, the problem of barriers between the enterprises needs to be solved, and the data is used for evaluating the small enterprises to solve the financing problem of the small enterprises.
The information sharing of enterprises also has a plurality of problems, the current enterprise information sharing can not meet the requirement of information sharing of a credit investigation system, the information acquisition of the credit investigation system is limited, barriers exist among the enterprises, platforms of internet credit investigation mechanisms are self-owned, independence does not exist, external cooperation does not exist, data islands are caused, the information coverage is not enough, and the data of small enterprises are less. In addition, data on the market are illegally acquired and polluted, and the legality and authenticity of the data cannot be guaranteed. Secondly, no reliable mechanism is used for monitoring and controlling the data, the authenticity and the quality of the data cannot be guaranteed, and although national mechanisms and the like have a large amount of data information, the data cannot be shared externally. And there is a risk of leakage and tampering of the data during use.
Disclosure of Invention
The invention aims to provide an enterprise data sharing model based on a block chain, which realizes management and access control of shared data of enterprise information.
The invention provides the following technical scheme:
an enterprise data sharing model based on a block chain comprises an information main body, a credit investigation agency, a credit information provider, a cloud service provider and a supervision agency, wherein after the information main body authorizes the credit investigation agency, the credit investigation agency issues an information request message, information sent to the information main body by the credit investigation agency comprises the source, the content, the purpose and the range of information use and public key information of the request message, and after the information main body authorizes the credit investigation agency, authorization information is sent to the credit investigation agency;
after obtaining authorization, the credit investigation organization issues a sharing request, the sharing request of the credit investigation organization is issued to each node, an information provider related to the issued request uploads data, the provider uploading the information gives out transaction amount according to a pricing strategy, and after a client verifies an information signature, the client issues the request to the outside and gives out a verification result;
the information provider uploads the data to the blockchain in a transaction form according to the requirement, encrypts the information and uploads the information to the server, and then broadcasts the data information to the blockchain in the transaction form;
after transaction broadcasting, the auditing alliance node verifies whether information is uploaded completely, colleagues verify the correctness of the format of data, if a result is verified, signing endorsement is carried out on the transaction, only the endorsement before enough auditing alliance nodes is passed, the transaction can be determined to be legal, otherwise, the endorsement is illegal, a main node in a service alliance packs the legal transaction, broadcasts the legal transaction to slave nodes, then each node adds a block to a block chain account, if the transaction occurs on the block chain, the requested task is uploaded completely, and key shared data can be used.
Preferably, the audit trail includes:
the information provider initiates a transaction and broadcasts the transaction to n auditing alliance nodes;
the auditing union node verifies the transaction, if the transaction passes the verification, the transaction is signed and endorsed, and then the transaction is broadcasted;
the transaction is only a legitimate transaction if a signed endorsement is obtained.
Preferably, the service federation includes:
the service alliance nodes sort the transactions, and package the transactions after sorting to generate a block proposal;
the master node sends < < PRE-PREPARE, v, n, d >, m > to the slave nodes, m is a block message, v is a view number, d is a summary of a request message, and n is the height of a new block;
verifying the message of the second step from the node, and broadcasting the message < PREPARE, v, n, d, t > to other nodes if the message passes the verification;
if one node receives more than 2f preparation messages, sending confirmation messages < COMMIT, v, n, d, t > to other nodes;
and if the number of the confirmation messages received by one node is 2f +1, recording the new block on a block chain account book, and carrying out full-network broadcasting on the block.
The invention has the beneficial effects that: the invention builds an information sharing model based on a block chain, adopts a PBFT algorithm in a consensus mechanism, improves the PBFT algorithm, solves the problem of resource waste, adopts information storage on the chain aiming at the privacy protection problem of data information, stores the information through a server under the chain, shares the data by using an encryption algorithm, and realizes the management and access control of shared data of enterprise information.
Detailed Description
The body of the enterprise data sharing model includes an information body, a credit investigation agency, a credit information provider, a cloud service provider, and a regulatory body. The following were used:
a first component: the information subject has control right on credit investigation information, the information subject information is stored in a credit institution or a financial institution, the use of the information must be authorized by the information subject, and the information subject information use condition should be informed;
and a second component: and a credit investigation organization. The credit investigation organization is responsible for sorting and analyzing the credit information and providing various credit investigation services;
and (3) assembly III: a credit information provider. The credit information provider is a financial institution and a non-financial institution, the institutions are information providers and share enterprise information;
and (4) assembly IV: a cloud service provider. The cloud service provider is mainly responsible for cloud storage and cloud computing, when the information provider shares information, if the information amount is too large, the information should be uploaded to a cloud server, and after the server passes verification, a credit investigation institution can download data from the server;
and (5) assembly V: and (5) a supervision agency. The supervising authority is mainly responsible for supervising the authorities having disputes in the sharing process.
The sharing model is a basic architecture based on a block chain, and mainly comprises a message propagation mechanism, a P2P network, a block chain structure and the like, and the basic architecture of the sharing model comprises the following components:
(1) and (4) interaction between the information body and a credit investigation institution. The user authorizes the requested data and sends the authorized data to the credit investigation mechanism, and the credit investigation mechanism can provide information for the information provider after receiving the authorization information and can send a request to the information provider;
(2) interaction with a cloud server. After a credit investigation mechanism sends a request to an information provider, the information provider encrypts the information and uploads the information to a server, the information provider uploads other information such as an abstract of data to a node of a block chain together to obtain an upload certificate, and the information requested to be recorded and uploaded is recorded on the block chain;
(3) interaction with a regulatory body. Disputes usually occur in information sharing, and a monitoring organization is an organization for handling disputes and is used as an intermediate party to maintain the benefits of each participant.
As shown in fig. 1, in the model, the consensus mechanism adopts a PBFT algorithm, and improves the PBFT algorithm, which is called RPBFT, the number of consensus nodes is redefined in the block chain, and in the consensus mechanism, the verification function of the master node is separated from other functions, so that the performance is improved.
The enterprise of the consensus node mainly comprises two alliances, namely an audit alliance and a service alliance. The audit and service federation results from the enterprise credit ranking. The enterprise audit alliance has the functions of verifying whether the information uploaded by the information provider is valid, and if the information uploaded by the information provider is valid, signing and endorsement are carried out on the transaction, and the work flow of the audit alliance is as follows:
the method comprises the following steps: the information provider initiates a transaction and broadcasts the transaction to n auditing alliance nodes;
step two: the auditing union node verifies the transaction, if the transaction passes the verification, the transaction is signed and endorsed, and then the transaction is broadcasted;
step three: the transaction is only a legitimate transaction if a signed endorsement is obtained.
The main function of the service alliance is to reach a consensus on the transaction, and the work flow is as follows:
the method comprises the following steps: the service alliance nodes sort the transactions, and package the transactions after sorting to generate a block proposal;
step two: the master node sends < < PRE-PREPARE, v, n, d >, m > to the slave nodes, m is a block message, v is a view number, d is a summary of a request message, and n is the height of a new block;
step three: verifying the message of the second step from the node, and broadcasting the message < PREPARE, v, n, d, t > to other nodes if the message passes the verification;
step four: if one node receives more than 2f preparation messages, sending confirmation messages < COMMIT, v, n, d, t > to other nodes;
step five: and if the number of the confirmation messages received by one node is 2f +1, recording the new block on a block chain account book, and carrying out full-network broadcasting on the block.
As shown in fig. 2, the basic flow of the enterprise data sharing model is as follows:
the method comprises the following steps: after the information main body authorizes the credit investigation organization, the credit investigation organization issues an information request message, the information sent by the credit investigation organization to the information main body comprises the source, the content, the purpose and the range of the information use and public key information, and after the information main body authorizes the credit investigation organization, the information main body sends authorization information to the credit investigation organization;
step two: after the credit investigation organization obtains authorization, a sharing request is issued, the sharing request of the credit investigation organization is issued to each node, the information provider related to the issued request uploads data, and in order to achieve the purpose of exciting the information provider, the provider uploading information can give out transaction amount according to a pricing strategy. After verifying the information signature, the client externally issues a request and gives a verification result;
step three: the information provider uploads the data to the blockchain in a transaction form according to the requirement, can encrypt the information and then uploads the information to the server, and then broadcasts the data information to the blockchain in the transaction form;
step four: and after the transaction is broadcast, the auditing alliance node verifies whether the information is completely uploaded, the colleagues verify the correctness of the format of the data, if the result is verified, the transaction is signed and endorsed, and only the endorsements before the auditing alliance node with enough quantity are confirmed to be legal, otherwise, the transaction is illegal. And the master node in the service alliance packs legal transactions and broadcasts the legal transactions to the slave nodes, and then each node adds the blocks to the block chain account book. If a transaction occurs on the blockchain, the requested task upload is complete and the key can be used to share data.
Although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.