Data distribution method and credible traceability method based on block chain

Pending Publication Date: 2022-03-04
STATE GRID JIANGSU ELECTRIC POWER CO LTD MARKETING SERVICE CENT +1
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Regarding data security sharing, in 1979, Shamir proposed the first secret sharing scheme, called (k,n) threshold scheme, whose core idea is to divide the secret data D to be shared into n blocks, any k blocks or more than k blocks The secret data can be reconstructed by combination, but any combination of k-1 blocks or below k-1 blocks can not get any information about the data D
In 2010, Yu et al. achieved fine-grained data sharing under the semi-honest server model, but it cannot achieve flexible data sharing, and as the number of users increases, the complexity of creating files, user authorization, and revocation decreases linearly. increase
In 2015, Shao et al. proposed a data sharing scheme in a mobile cloud environment based on attribute-based proxy re-encryption technology and transformation key technology, which allows data sharers to outsource part of the decryption authority, but the offline computing overhead of mobile users is still high
[0006] Although there are some data encryption and decryption technologies based on the blockchain network in the existing technology, the methods of these encryption and decryption technologies are relatively simple, and the encryption methods are usually single-layer
Patent document CN113570369A discloses a blockchain privacy transaction method, device, equipment and readable storage medium, which discloses a layered encryption method for the first transaction data, although this method enhances data security to a certain extent performance, but does not perform more reasonable encryption for the characteristics of different data
[0007] Therefore, the encryption technology of the blockchain in the prior art is still relatively simple, with low security, and cannot perform reasonable encryption and decryption according to the characteristics of different data. While reducing the content of data broadcasting, it can provide sufficient data for data requesters. index
In addition, the methods in the prior art cannot provide targeted encryption protection against key leakage and other situations, or provide effective traceability for leaked keys and data.
In short, the existing blockchain encryption technology still has the problems of high centralization of data distribution, unclear authority distribution, low distribution efficiency, and complicated traceability conditions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data distribution method and credible traceability method based on block chain
  • Data distribution method and credible traceability method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The application will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, but not to limit the protection scope of the present application.

[0037] figure 1 It is a schematic flowchart of the steps of data distribution in a blockchain-based data distribution method of the present invention. Such as figure 1 Shown is a blockchain-based data distribution method, wherein the method includes steps 1 to 3.

[0038] Step 1, broadcast the data-related information of the data owner in the blockchain, and judge the access authority of the data requester based on the data request of the data requester.

[0039] By adopting the data distribution method in the present invention, the non-tamperable and safe sharing of data can be realized through the data sending and receiving process. In order to realize the distribution of data, in the present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data distribution method based on a block chain is characterized in that the method comprises the following steps: step 1, broadcasting data related information of a data owner in the block chain, and determining an access right of a data requester based on a data request of the data requester; step 2, when the data requester has the access authority, indicating the data owner to encrypt a data file C and then send the encrypted data file C to the data requester based on the smart contract; and step 3, after the data requester receives the encrypted data, judging whether the data related information broadcasted by the data owner is consistent with the characteristics of the encrypted data received by the data requester, and judging whether the data file C is successfully transacted according to the data related information. According to the method, the data security is effectively improved, and data leakage is prevented.

Description

technical field [0001] The present invention relates to the field of block chains, and more specifically, to a data distribution method and a trusted traceability method based on block chains. Background technique [0002] In 2020, the country will position "data" as a new factor of production, which puts forward higher requirements for the security of data distribution interaction, and needs to ensure the security of the data distribution process, the availability of data, and the traceability of data leakage problems . As a national key infrastructure, the power system serves all walks of life. Its safe and stable operation is related to national security and has become the focus of power. Power data includes real power consumption data of residents and enterprises that reflect social life and production, and has a wide range of application scenarios and deep use value. In the power grid, each business department usually transmits power data to the data center, and then ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08H04L9/30G06F21/60G06F21/62
CPCH04L63/10H04L63/126H04L63/0428H04L9/0643H04L9/0825H04L9/0838H04L9/3066G06F21/6218G06F21/602
Inventor 邹云峰祝宇楠单超朱峰范环宇
Owner STATE GRID JIANGSU ELECTRIC POWER CO LTD MARKETING SERVICE CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products