A data security sharing system and method integrating kerberos authentication server and blockchain

An authentication server and data security technology, applied in data processing applications, digital data authentication, digital data protection, etc., can solve problems such as data leakage, difficulty in data fusion and association, damage to the interests of data owners, etc., to achieve high security, improve safety effect

Active Publication Date: 2020-10-30
铭数科技(青岛)有限公司
View PDF19 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] With the continuous improvement of social informatization, various information systems have accumulated a large amount of data resources, and these data generally have the problem of being difficult to integrate and correlate
The traditional data sharing method, that is, the centralized data sharing method, not only easily causes data leakage and damages the interests of data owners, but also is extremely cumbersome in the confirmation process and security access control confirmation process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security sharing system and method integrating kerberos authentication server and blockchain
  • A data security sharing system and method integrating kerberos authentication server and blockchain
  • A data security sharing system and method integrating kerberos authentication server and blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Such as figure 1 As shown, the present embodiment provides a data security sharing system that integrates a Kerberos authentication server and a block chain, including a data providing terminal, a data demand terminal, an AS server, a TGS server, a block chain, and a cloud storage platform;

[0067] The data supply terminal is respectively connected to the cloud storage platform and the blockchain, the data demand terminal is respectively connected to the cloud storage platform, the AS server, and the TGS server, and the TGS server is connected to the blockchain;

[0068] Among them, data transmission is performed between the data providing terminal and the cloud storage platform through the OpenSSL protocol, data transmission is performed between the data providing terminal and the blockchain through the OpenSSL protocol, and data is transmitted between the data demand terminal and the cloud storage platform through the OpenSSL protocol. Transmission, data transmission...

Embodiment 2

[0082] Such as figure 1 with figure 2 As shown, a data security sharing method of a data security sharing system that integrates a Kerberos authentication server and a block chain is based on the data security sharing system described in Embodiment 1, and its working method includes the following steps:

[0083] Step 1. Key generation and data encryption

[0084] After the data security sharing system described in Embodiment 1 is networked, the system first generates the shared key K of the AS server and the TGS server tgs , the shared key K between the TGS server and the cloud storage platform v ;

[0085] When the data provider terminal is registered in the system, the smart contract in the blockchain will generate a public-private key pair (PK, SK) according to the corresponding rules, and distribute it to the data provider terminal. The data provider terminal uses the P key pair distributed by the blockchain. K Encrypt the data to form ciphertext data and upload it to...

Embodiment 3

[0114] As described in Embodiment 2, a data security sharing method that integrates a Kerberos authentication server and a blockchain data security sharing system is different from Embodiment 2 in that:

[0115] Data provider terminals set or modify data access policies, and data demand terminals apply for data access permissions are automatically executed on the chain by smart contracts. After the data is uploaded to the chain, it cannot be tampered with, and any data access operation can be traced back.

[0116] In addition, during the endorsement process of each blockchain node, regulatory nodes such as government departments can be added to ensure the security and legality of data access authorization.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data security sharing system and method integrating a Kerberos authentication server and a block chain. The data security sharing system comprises a data providing terminal,a data demand terminal, an AS server, a TGS server, the block chain and a cloud storage platform. Wherein the data providing terminal is connected with the cloud storage platform and the block chain,the data demand terminal is connected with the cloud storage platform, the AS server and the TGS server, and the TGS server is connected with the block chain. According to the method, data privacy security and communication security are ensured by using symmetric encryption and asymmetric encryption algorithms, and multiple parties participate in authority management by using the decentralizationcharacteristic of the blockchain, so that the problem of data security access which cannot be provided by a traditional data sharing method can be solved. According to the method, the management right and the verification right of the data are separately realized, so that the burden of the blockchain network is reduced, the throughput is large, and the expandability and the robustness are relatively good.

Description

technical field [0001] The invention relates to a data security sharing system and method integrating a Kerberos authentication server and a block chain, and belongs to the technical field of network data transmission. Background technique [0002] Blockchain is a new type of decentralized protocol, which can safely store digital currency transactions or other data. The information cannot be forged and tampered with. The transaction confirmation on the blockchain is completed by all nodes on the blockchain. The consensus algorithm To ensure its consistency, a public ledger is maintained on the blockchain, and the public ledger is visible to any node on the storage block, thus ensuring that it cannot be forged and tampered with. [0003] A smart contract is an assembly language programmed on the blockchain. It is an automatically executable program deployed on the blockchain. A smart contract in a broad sense includes programming languages, compilers, virtual machines, events...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33G06F21/60G06F21/64G06Q40/04
CPCG06F21/335G06F21/602G06F21/64G06Q40/04
Inventor 郑相涵张生音杨旸
Owner 铭数科技(青岛)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products