Secure data storage method and device based on alliance block chain

A data security storage and data storage technology, which is applied in the field of data security storage based on the alliance blockchain, can solve the problems of malicious tampering in the data center, opaque data sharing, centralized malicious attacks, etc., so that it is not easy to lose and improve the transparency of sharing , the effect of improving safety

Active Publication Date: 2017-08-25
GUANGDONG UNIV OF TECH
8 Cites 41 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, the methods provided by the existing technology are based on the mode of centralized data storage. In this mode, there will be information security pr...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

A kind of data security storage device based on alliance block chain provided by the present invention collects and stores grid data based on alliance block chain technology, and through a broadcast mechanism, the grid data stored by a certain data storage node Broadcasting and storing to other data storage nodes realizes decentralized storage of grid data, so that grid data is not only stored in a single node, but also backed up in multiple data storage nodes. Therefore, even if the power grid data in a certain data storage node is lost, the user can obtain the data through other data storage nodes. It can be seen that, while improving the transparency of power grid data sharing, the method ensures that the stored power grid data is not easily lost, and improves the security of the power grid data. In addition, since multiple nodes jointly process grid data, the pressure on the system to calculate and transmit grid data is also reduced.
In this step, the grid data that the data acquisition node encrypts by the public key of the target data acquisition node can only be decrypted by the private key of the target data acquisition node itself, which further ensures that when the grid data is accessed It is more secure and reliable when making transmissions.
In this step, the unique information consensus algorithm of the alliance block chain can be run by the data storage node and the target data storage node, and the power grid data stored in the data storage node and the target data storage node are compressed within a specified time to generate a block And join the blockchain, the grid data added to the blockchain can be accessed by any node that can access the grid data, which has the advantage of further increasing the transparency of grid data sharing. The consensus algorithm can be Proof of Work or Proof of Sake, and the specified time can be determined according to the experience of those skilled in the art, such as 10 minutes, which are not limited here.
[0047] The encrypted grid data received by the data storage node is the grid data encrypted by the data collection node using the public key of the data storage node. The advantage of this is that the grid data encrypted...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a secure data storage method and device based on an alliance block chain. The method comprises the following steps that a data collection node sends an uploading request to a data storage node after the data collection node obtains power grid data; after the data storage node authenticates the uploading request, the data storage node receives encrypted power grid data and decrypts the encrypted power grid data through an own private key in order to obtain power grid data; after the data storage node verifies that the power grid data conforms to requirements, the data storage node stores the power grid data into a local database; and the data storage node broadcasts the stored power grid data to other target data storage nodes. According to the method, the data sharing transparency of the power grid data is improved, and meanwhile, the stored power grid data is guaranteed to be difficult to lose, and the security of the power grid data is improved. In addition, the secure data storage device based on the alliance block chain also has the effects.

Application Domain

Technology Topic

Image

  • Secure data storage method and device based on alliance block chain
  • Secure data storage method and device based on alliance block chain
  • Secure data storage method and device based on alliance block chain

Examples

  • Experimental program(4)

Example Embodiment

[0036] Example one
[0037] figure 1 It is a flowchart of a method for secure data storage based on alliance blockchain provided by an embodiment of the present invention. Please refer to figure 1 , The specific steps of the data security storage method based on the alliance blockchain include:
[0038] Step S10: After obtaining the grid data, the data collection node sends an upload request to the data storage node.
[0039] In this step, the data collection node is used to obtain the grid data generated during the operation of the grid, and the data needs to be stored in the data storage node for subsequent viewing of the grid data by the user. It is understandable that the data collection node needs to first send an upload request to the data storage node to request the data storage node to verify itself and agree to receive the grid data obtained by itself.
[0040] Step S11: The data storage node verifies whether the upload request is passed, and if so, execute step S12.
[0041] It is understandable that, if the upload request contains the identity information of the data collection node, the data storage node determines whether the upload request can be passed through the content in the upload request. For example, the data storage node can verify whether the digital certificate of the data collection node and the digital signature of the data collection node in the upload request are correct according to the upload request, or whether the data collection node that uploads the data is in the preset uploadable data Within the node range, etc.
[0042] As a preferred implementation manner, the upload request includes: the digital certificate of the data collection node and the digital signature of the data collection node.
[0043] Correspondingly, in step S11, the data storage node verifies whether the upload request is passed, specifically:
[0044] The data storage node verifies whether the digital certificate of the data collection node and the digital signature of the data collection node in the upload request are correct, and if they are, it determines that the upload request is passed.
[0045] Step S12: The data storage node receives the encrypted power grid data, and decrypts the encrypted power grid data with its own private key to obtain the power grid data.
[0046] Wherein, the encrypted grid data in step S12 is obtained by the data collection node encrypting the grid data using the public key of the data storage node.
[0047] The encrypted power grid data received by the data storage node is power grid data encrypted by the data acquisition node using the public key of the data storage node. The advantage of this is that the grid data encrypted with the public key of the data storage node can only be decrypted by the private key of the data storage node to obtain the grid data before encryption, thus ensuring that the data collection node sends to the data storage node Only the data storage node can parse the data of the grid, and other data storage nodes cannot decrypt because they do not know the private key of the data storage node, thereby ensuring the security of grid data transmission.
[0048] Step S13: The data storage node verifies whether the grid data meets the requirements, and if so, execute step S14.
[0049] In order to prevent abnormalities in the transmission process, such as incomplete grid data or errors in the transmission destination, it is necessary to verify whether the grid data meets the requirements in this step. The main purpose is to ensure that all grid data stored on the data storage node are meaningful data that can correctly reflect the true situation of the grid system.
[0050] Step S14: The data storage node stores the grid data in the local database.
[0051] The data storage node stores the grid data that meets the verification requirements in the local database so that users can view the grid data.
[0052] Step S15: The data storage node broadcasts the stored grid data to other target data storage nodes.
[0053] The purpose of the data storage node broadcasting the grid data stored by itself to other target data storage nodes is that other target data storage nodes can also obtain the grid data in the data storage node, ensuring the transparency of data sharing. It is understandable that when the data storage node fails or is attacked and the grid data is lost, the user can still obtain the grid data from other target data storage nodes, which ensures that the stored grid data is not easily lost and improves the grid data Security.
[0054] The data security storage method based on the alliance blockchain provided in this embodiment collects and stores power grid data based on the alliance blockchain technology, and broadcasts the power grid data stored in a certain data storage node and stores it to others through a broadcast mechanism The data storage node realizes the decentralized storage of effective grid data, so that the grid data is not only stored in a single node, but also backed up in multiple data storage nodes. Therefore, even if the grid data in a certain data storage node is lost, the user can also obtain the data through other data storage nodes. It can be seen that this method not only improves the transparency of grid data sharing, but also ensures that the stored grid data is not easily lost, and improves the security of the grid data. In addition, because multiple nodes process grid data together, it also reduces the pressure on the overall system to calculate and transmit grid data.

Example Embodiment

[0055] Example two
[0056] figure 2 It is a flowchart of another data secure storage method based on alliance blockchain provided by an embodiment of the present invention. figure 2 Steps S10-S15 and figure 1 It is the same and will not be repeated here.
[0057] Such as figure 2 As shown, as a preferred embodiment, it further includes:
[0058] Step S20: The target data storage node receives the power grid data and verifies whether the power grid data meets the requirements, and if so, execute step S21.
[0059] The target data storage node can specifically verify whether the grid data is safe and effective. The main purpose is to ensure that all grid data stored on the target data storage node are meaningful data that can correctly reflect the true situation of the grid system.
[0060] Step S21: The target data storage node stores the grid data in the local database.
[0061] It is understandable that the target data storage node stores the grid data of the data storage node in its relatively safe and reliable database, which is equivalent to making a safer backup of the grid data. When the data storage node fails or is attacked After the grid data is lost, the user can still obtain the grid data from other target data storage nodes.
[0062] Such as figure 2 As shown, as a preferred embodiment, it further includes:
[0063] Step S22: The data storage node and the target data storage node compress the grid data stored within the specified time to generate a block, and add it to the blockchain.
[0064] In this step, the information consensus algorithm unique to the alliance blockchain can be run through the data storage node and the target data storage node to compress the grid data stored in the data storage node and the target data storage node within the specified time to generate a block and add it to the zone. In the block chain, the grid data added to the block chain can be accessed by any node that can access the grid data. The advantage of this is that it further increases the degree of transparency in grid data sharing. The consensus algorithm can be a Proof of Work algorithm or a Proof of Sake algorithm. The prescribed time can be determined based on the experience of those skilled in the art, such as 10 minutes, which is not limited here.

Example Embodiment

[0065] Example three
[0066] Corresponding to the data collection node storing the grid data in the data storage node, this embodiment further provides a method for the target data collection node to access the grid data of the data collection node. For specific steps, please refer to image 3.
[0067] image 3 This is a flowchart of a method for accessing grid data based on alliance blockchain provided by an embodiment of the present invention. Such as image 3 As shown, on the basis of the foregoing embodiment, it further includes:
[0068] Step S30: The data collection node sets access conditions to control other target data collection nodes to access grid data.
[0069] In this step, the access conditions may include: the target data collection node is within the allowed access node range set by the data collection node, the grid data accessed by the target data collection node is within the grid data sharing range set by the data collection node, and the target data The access time of the collection node meets the timeliness requirements and so on. The purpose of setting access conditions is to prevent grid data from leaking to target data collection nodes that are not allowed to access the data collection node, thereby further ensuring and improving the security of grid data. It is understandable that the parameter of the above access condition is only a specific application scenario, and does not mean that there are only several parameters.
[0070] On this basis, it further includes:
[0071] S31: The data collection node judges whether the target data collection node meets the access conditions, and if so, sends the grid data to the target data collection node.
[0072] In this step, it can be specifically that the data collection node obtains the grid data from the data storage node and then sends the grid data to the target data collection node, or the data collection node controls the data storage node to directly send the grid data to the target Data collection node. Since all nodes in the alliance blockchain can theoretically communicate, the specific method for the above-mentioned data collection node to send grid data to the target data collection node can be determined according to the actual situation.
[0073] In addition, on the basis of the foregoing embodiment, as a preferred implementation manner, the data collection node sends the power grid data to the target data collection node, which can be specifically: encrypt the power grid data through the public key of the target data collection node, and send it To the target data collection node. Correspondingly, step S31 is further specifically:
[0074] The data collection node encrypts the grid data through the public key of the target data collection node and sends it to the target data collection node.
[0075] In this step, the grid data encrypted by the data collection node using the public key of the target data collection node can only be decrypted by the private key of the target data collection node itself, which further ensures that when the grid data is accessed for transmission More secure and reliable.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Resistance reduction mud and preparation method thereof

Owner:国网吉林省电力有限公司超高压公司 +2

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products