Fair and privacy protection big data exchange scheme

A privacy protection and big data technology, applied in the field of inadvertent transfer protocol and IPFS system, can solve the problems of low transaction efficiency, inability to guarantee the privacy of buyers, data leakage, etc.

Pending Publication Date: 2021-06-08
GUIZHOU UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this will increase the storage burden and maintenance overhead of the exchange, and the transaction efficiency will be low when the amount of data is too large
At the same time, because the exchange itself is at risk of being attacked, there is a risk of data leakage
In addition, when data is exchanged through a centralized mode such as an exchange, the privacy of the buyer cannot be guaranteed, that is, what data the buyer has purchased is transparent to the owner of the data and the exchange
In summary, there is still a lack of a fair, privacy-preserving and secure data exchange method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fair and privacy protection big data exchange scheme
  • Fair and privacy protection big data exchange scheme
  • Fair and privacy protection big data exchange scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0006] (1) Definition of Tanfront Check

[0007] We use an Email Check to implement the amount of money required to purchase data to the data owner S1 to make the transaction more short and convenient. The implementation of the Tanfront check system needs to deploy two intelligent contracts (SC1, SC2), and contract SC1 is used for transactions, and contract SC2 is used to store Before S2 starts the transaction, he must have enough login stores in SC2.

[0008] The specific definition of the check is:

[0009] Cheque = (pk_s1 || token || DATE || E (r, pk_s1) || hash (r)), where pk_s1 is the public key of the data owner S1, and TOKEN is the purchase amount of the purchaser S2, Date, Date Is a timestamp, R is the random number of random number, E (r, pk_s1) is the result of the random number R of S2 using the random number generator. The result of the random number R of S1, Hash (R) is s2. The hash value calculated by Jiegi algorithm. After generating a check, the purchaser S2 signs ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fair and privacy protection big data exchange scheme. According to the scheme, the flexibility of big data exchange and the privacy of a purchaser are ensured by using an oblivious transmission protocol; it is worth mentioning that the scheme provides a check system based on an intelligent contract on Ethereum, and the existing transaction process can be optimized; in addition, the design of the scheme comprises a transaction process part based on an intelligent contract, and transaction time control is realized. Due to the design, the rights and interests of the data owner and the purchaser can be effectively guaranteed, and the big data exchange efficiency is greatly improved.

Description

Technical field [0001] The present invention relates to an inadvertent transmission protocol, an IPFS system, an Ether work check, intelligent contract, and block chain. Background technique [0002] The current large data exchange is based on the centralized data exchange, and all data transactions require via the exchange. Obviously, this increases the storage burden and maintenance overhead of the exchange. When the amount of data is too large, the transaction efficiency is low. At the same time, due to the risk of the attacked risk due to the exchange itself, there is a risk of data leakage. In addition, when data exchange is performed by the exchange equivalent mode, the purchase of the purchaser is unable to ensure that the purchaser purchases which data is purchased, and the owner and exchange of the data are transparent. In summary, a data exchange method for fair, privacy protection and security is currently still lacking. Inventive content [0003] This patent proposes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/04G06Q20/08G06Q20/12G06Q20/38
CPCG06Q20/0425G06Q20/0855G06Q20/123G06Q20/3825
Inventor 陈玉玲
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products