Block chain-based big data security authentication method and system

A security authentication and big data technology, applied in the field of big data, can solve the problems of paralysis of the whole network authentication system, node data leakage, heavy operation and maintenance workload, etc., to improve the network robustness, simplify the management process, and save the operation and maintenance cost. Effect

Inactive Publication Date: 2017-02-01
北京明朝万达科技股份有限公司
View PDF3 Cites 104 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) There are many distributed storage and computing nodes for big data. If a node is compromised, it will lead to a large amount of data leakage of this node and other nodes
[0008] (2) Once the unified identity authentication center service node is breached, it will cause the paralysi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based big data security authentication method and system
  • Block chain-based big data security authentication method and system
  • Block chain-based big data security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Glossary:

[0042] Hadoop: It is a software framework capable of distributed processing of large amounts of data, the core design is HDFS and MapReduce. HDFS provides storage for massive data, and MapReduce provides calculation for massive data.

[0043] Decentralization: The influence between nodes will form a non-linear causal relationship through the network. Decentralization refers to an open, flat, and equal system phenomenon or structure.

[0044] Blockchain, a technical solution for collectively maintaining a reliable database through decentralization and trustlessness. It is mostly used in user authentication, custody of assets and smart contracts, etc., and value exchange can be completed without third-party access.

[0045] The process of applying blockchain technology is essentially the process of organizing block content and demonstrating the rationality of consensus agreements.

[0046] A smart contract is a computer program based on the blockchain that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a block chain-based big data security authentication method and system. The method comprises the following steps that a big data node A broadcasts its identity authentication in the whole network; all other big data nodes in the whole network record the identity authentication; if the big data node A is accessed in authentication, the big data node A releases a transaction package including a timestamp in the whole network, the other big data nodes in the whole network check the transaction package, and determine whether the transaction package is consistent with transaction packages stored by the other big data nodes; if the determining results of other big data nodes are consistent, the transaction package is determined legal, and the big data node A is added to a big data block chain; and the security authentication of the big data node A succeeds. Through adoption of the method and system, the network robustness is improved, the management process is simplified, and the operation and maintenance cost is saved.

Description

technical field [0001] The invention relates to the field of big data technology, in particular to a security authentication method and system based on big data technology. Background technique [0002] The current big data center is mainly built on the basis of the Hadoop ecosystem. The exposure of the big data platform makes the big data containing massive data and potential value easier to attract hackers, and it is easier to generate identity verification, authorization process and input verification, etc. A large number of security issues; there are loopholes in the security protection of big data itself. Although cloud computing provides convenience for big data, the security control of big data is still not enough. [0003] According to the degree of confidentiality of big data and the needs of users, different permission levels can be set for big data and users, and strict access control can be carried out to ensure the application security of big data. Therefore, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3236H04L9/3297H04L63/08H04L63/083H04L2463/121H04L67/1001
Inventor 杨巨杰王志海喻波何晋昊魏力
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products