CN110516469B - Anti-hacking method in shared big data application scene based on block chain - Google Patents

Anti-hacking method in shared big data application scene based on block chain Download PDF

Info

Publication number
CN110516469B
CN110516469B CN201910699177.8A CN201910699177A CN110516469B CN 110516469 B CN110516469 B CN 110516469B CN 201910699177 A CN201910699177 A CN 201910699177A CN 110516469 B CN110516469 B CN 110516469B
Authority
CN
China
Prior art keywords
data
server
blockchain
information
dirty
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910699177.8A
Other languages
Chinese (zh)
Other versions
CN110516469A (en
Inventor
白卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Baiyang Software Co ltd
Original Assignee
Suzhou Baiyang Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Baiyang Software Co ltd filed Critical Suzhou Baiyang Software Co ltd
Priority to CN201910699177.8A priority Critical patent/CN110516469B/en
Publication of CN110516469A publication Critical patent/CN110516469A/en
Application granted granted Critical
Publication of CN110516469B publication Critical patent/CN110516469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a method for preventing hackers in a big data sharing application scene based on a blockchain, which changes source data into blockchain data (including partial dirty data), de-identifies and stores the blockchain data on a server, each server product generates blockchain data, an operator can call the data through an API, the call data is the setting of the blockchain server for matching access to a user server, and the server and the dirty data can be called after being successfully matched. The invention solves the problem that hackers or staff in companies steal part or all of the data, and the accessed server is screened by generating watermark data (API secret key) of the server, 10% of dirty data is added in the data, and the blockchain server periodically checks the dirty data, and if part of dirty data is found to be discarded, the dirty data is reported to be wrong, so that real-time detection is realized, and the safety is high.

Description

Anti-hacking method in shared big data application scene based on block chain
Technical Field
The invention relates to the technical field of data information safety protection, in particular to a hacker prevention method in a shared big data application scene based on a block chain.
Background
With the need for large explosions of data and artificial intelligence, there is an urgent need among enterprises to provide artificial intelligence services based on modeling of large data. To realize artificial intelligence, the data island needs to be broken, and the utility of the artificial intelligence can be effectively provided by utilizing the sharing information of external multi-party enterprises. However, the requirements of laws and regulations and the benefit need of protecting own digital assets are forced among enterprises, and the enterprises are not willing to share the plain text of the user information to third-party enterprises for use. Aiming at the specific scene, the invention provides a method for sharing the label data formed after the desensitization of the user information to the third party enterprise for use, which not only can protect the interests of the enterprise, but also can ensure that the user information is not leaked in the clear text, and simultaneously can meet the modeling requirement of the third party enterprise in the artificial intelligence field. In order to guarantee the efficiency of the shared data in modeling, it is very important how the shared data corpus can be deployed in a distributed weakly centralized form in a third party server to prevent hackers or internal personnel from stealing all or part of the data. The current server can not meet the requirements only through user name and password fortification. Accordingly, a person skilled in the art provides an anti-hacking method in a shared big data application scenario based on blockchain to solve the above-mentioned problems in the background art.
Disclosure of Invention
The invention aims to provide a hacker prevention method in a shared big data application scene based on a blockchain so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a method for preventing hacker in big data application scene based on block chain includes converting user information of plaintext into desensitized label data by irreversible hash algorithm; secondly, the source data is changed into blockchain data (comprising partial watermark data), then the blockchain data is de-identified and stored in a server of the other party, each server product generates different blockchain data, and an operator can call user tag data through an API. The verification server can call the blockchain server to check the validity of the local data at an irregular period, and an operator can continuously use the API to call the user tag data only if the validity of the local data is ensured. The specific method comprises the following steps:
(1) Blockchain data: to prevent the data from being altered, the general ledger technique is adopted, and the source data is written into a general ledger (blockchain technique) which cannot be tampered;
(2) Encrypting data:
encrypting the source data to obtain encrypted data, and de-identifying to obtain a scattered data information set. The obtained data set is irreversible, namely, the plaintext of the user information can not be obtained through the hashed data;
(3) Server watermark data:
extracting characteristic information of the source data, and automatically generating watermark data (imperceptible dummy data) accounting for 10% -15% of the total amount of the source data. And encrypting the watermark data, and de-identifying to obtain a scattered data information set after obtaining the encrypted data. The obtained data set is irreversible, namely, the plaintext of the watermark data cannot be obtained through the hashed data;
(4) Merging data
Storing all the data sets in the steps (2) and (3) in a server, wherein the scattered data information can be retrieved and matched by a third party after access authorization is obtained;
(5) API call data:
a. the block chain server is matched with the access user server, the block chain data and the watermark data are successfully matched with the access user server, and the data are successfully called;
b. the blockchain server does not match the accessing user server:
b1. the blockchain data is not matched with the access user server, and the data cannot be used;
b2. dirty data does not match the access user server and cannot be used.
As a further scheme of the invention: the digital digest algorithm in step (2) may employ, but is not limited to, a hash algorithm.
As still further aspects of the invention: the server watermark algorithm in the step (3) may be a hash algorithm.
As still further aspects of the invention: the data information abstract not only contains specific digital information, but also contains information content, information sources, information storage modes and information storage.
As still further aspects of the invention: when the access user and the third party use the data, the access user and the third party search the wanted data through the digital abstract information, if the data is needed to be used, the access user data is matched with the server information, if the matching is successful, the access user and the third party can call out corresponding data blocks from the general ledger, and data matching or analysis is carried out;
if a hacker or staff in a company copies part or all of the data, the hacking preventing method can reject access through matching of the watermark data and the dirty data of the server, so that the purpose of protection is achieved.
Compared with the prior art, the invention has the beneficial effects that:
the invention solves the problem that hackers or staff in companies steal part or all of the data, and the accessed server is screened by generating watermark data (API secret key) of the server, 10% of dirty data is added in the data, and the blockchain server periodically checks the dirty data, and if part of dirty data is found to be discarded, the dirty data is reported to be wrong, so that real-time detection is realized, and the safety is high.
Drawings
Fig. 1 is a flowchart of a hacking prevention method in a shared big data application scenario based on a blockchain.
Fig. 2 is a schematic block diagram of a data blockchain in a hacking prevention method in a blockchain-based shared big data application scenario.
Fig. 3 is a schematic block diagram of source data encryption in a hacking prevention method in a shared big data application scenario based on a blockchain.
Fig. 4 is a schematic block diagram of server watermark data in a hacking prevention method in a shared big data application scenario based on a blockchain.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the embodiment of the invention, as shown in fig. 1, source data is changed into blockchain data (including partial dirty data) and then de-identified, and the blockchain data is stored on a server, each server product generates blockchain data, an operator can call the data through an API, the call data is the setting that the blockchain server is matched with the access user server, and the server and the dirty data can be called after being matched successfully, the specific method is as follows:
(1) Blockchain data: to prevent the data from being altered, the general ledger technique is adopted, and the source data is written into a non-tamperable general ledger (blockchain technique) as shown in fig. 2;
(2) Encrypting data:
encrypting the source data, wherein the source data information can encrypt the data through a digital summary algorithm to obtain encrypted data, 10% dirty data is automatically added in the encryption process, then the encrypted data is de-identified to obtain a data information summary, and the data information summary can be retrieved and matched by a third party after authorization, as shown in fig. 3;
(3) And (3) storing: storing the encrypted data in the step (2) in a server;
(4) Server watermark data:
after the data is stored in the server, the server forms watermark data with the access user information and the server information through an algorithm, and the watermark data is irreversible as shown in fig. 4;
(5) API call data:
a. the block chain server is matched with the access user server, the block chain data and the dirty data are successfully matched with the access user server, and the data calling is successful;
b. the blockchain server does not match the accessing user server:
b1. the blockchain data is not matched with the access user server, and the data cannot be used;
b2. dirty data does not match the access user server and cannot be used.
The digital digest algorithm in step (2) may employ, but is not limited to, a hash algorithm.
The server watermark algorithm in the step (3) may be a hash algorithm.
The data information abstract not only contains specific digital information, but also contains information content, information sources, information storage modes and information storage.
When the access user and the third party use the data, the access user and the third party search the wanted data through the digital abstract information, if the data is needed to be used, the access user data is matched with the server information, if the matching is successful, the access user and the third party can call out corresponding data blocks from the general ledger, and data matching or analysis is carried out; if a hacker or staff in a company copies part or all of the data, the hacking preventing method can reject access through matching of the watermark data and the dirty data of the server, so that the purpose of protection is achieved.
The invention solves the problem that hackers or staff in companies steal part or all of the data, and the accessed server is screened by generating watermark data (API secret key) of the server, 10% of dirty data is added in the data, and the blockchain server periodically checks the dirty data, and if part of dirty data is found to be discarded, the dirty data is reported to be wrong, so that real-time detection is realized, and the safety is high.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical scheme of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.

Claims (5)

1. A method for preventing hacker in big data application scene based on block chain is characterized in that source data is changed into block chain data, partial watermark data is contained in the data, the data is de-identified and stored on a server, each server product generates different block chain data, an operator calls the data through an API, the calling data is the setting that the block chain server is matched with a user server, and the data can be called after the server and dirty data are successfully matched, the method is as follows:
(1) Blockchain data:
in order to prevent the data from being changed, adopting a general ledger technique to write the source data into a general ledger book which cannot be tampered with;
(2) Encrypting data:
encrypting the source data, encrypting the source data information through a digital abstracting algorithm to obtain encrypted data, automatically adding 10% dirty data in the encryption process, and then de-marking the encrypted data to obtain a data information abstract, wherein the data information abstract can be retrieved and matched by a third party after authorization;
(3) And (3) storing: storing the encrypted data in the step (2) in a server;
(4) Server watermark data:
after the data is stored in the server, the server forms watermark data with access user information and server information through an algorithm, and the watermark data is irreversible;
(5) API call data:
a. the block chain server is matched with the access user server, the block chain data and the dirty data are successfully matched with the access user server, and the data calling is successful;
b. the blockchain server does not match the accessing user server:
b1. the blockchain data is not matched with the access user server, and the data cannot be used;
b2. dirty data does not match the access user server and cannot be used.
2. The method for preventing hackers in a shared big data application scenario based on blockchain according to claim 1, wherein the digital digest algorithm in the step (2) uses a hash algorithm.
3. The method for preventing hackers in a shared big data application scenario based on blockchain according to claim 1, wherein the algorithm of the server watermark in the step (4) adopts a hash algorithm.
4. The method for preventing hackers in a shared big data application scenario based on blockchain according to claim 1, wherein the data information abstract not only contains specific digital information, but also contains information content, information source, information storage mode and information storage.
5. The method for preventing hackers in the big data sharing application scenario based on blockchain as claimed in claim 1, wherein when the accessing user and the third party use the data, the accessing user and the third party retrieve the wanted data through the digital abstract information, if the data is needed to be used, the accessing user data is needed to be matched with the server information, if the matching is successful, the accessing user and the third party call out the corresponding data blocks from the general ledger for data matching or analysis.
CN201910699177.8A 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain Active CN110516469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910699177.8A CN110516469B (en) 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910699177.8A CN110516469B (en) 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain

Publications (2)

Publication Number Publication Date
CN110516469A CN110516469A (en) 2019-11-29
CN110516469B true CN110516469B (en) 2023-05-26

Family

ID=68624102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910699177.8A Active CN110516469B (en) 2019-07-31 2019-07-31 Anti-hacking method in shared big data application scene based on block chain

Country Status (1)

Country Link
CN (1) CN110516469B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831984A (en) * 2019-04-23 2020-10-27 苏州白杨软件有限公司 Method for determining and verifying digital information property in digital economy
US20210314139A1 (en) * 2020-04-01 2021-10-07 International Business Machines Corporation Noisy transaction for protection of data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017191472A1 (en) * 2016-05-05 2017-11-09 Invasec Ltd. A verification system and method
CN108615148A (en) * 2018-03-26 2018-10-02 北交金科金融信息服务有限公司 A kind of preposition method of commerce of secured assets and system based on block chain technology
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
CN109190399A (en) * 2018-09-05 2019-01-11 贝富(广州)新技术有限公司 Method for anti-counterfeit, system and storage medium based on block chain
CN109241753A (en) * 2018-08-09 2019-01-18 南京简诺特智能科技有限公司 A kind of data sharing method and system based on block chain
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN109981641A (en) * 2019-03-26 2019-07-05 北京邮电大学 A kind of safe distribution subscription system and distribution subscription method based on block chain technology

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10158479B2 (en) * 2017-02-06 2018-12-18 Northern Trust Corporation Systems and methods for generating, uploading and executing code blocks within distributed network nodes
GB2569278A (en) * 2017-10-23 2019-06-19 Cygnetise Ltd Methods and apparatus for verifying a user transaction

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017191472A1 (en) * 2016-05-05 2017-11-09 Invasec Ltd. A verification system and method
CN108615148A (en) * 2018-03-26 2018-10-02 北交金科金融信息服务有限公司 A kind of preposition method of commerce of secured assets and system based on block chain technology
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
CN109241753A (en) * 2018-08-09 2019-01-18 南京简诺特智能科技有限公司 A kind of data sharing method and system based on block chain
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN109190399A (en) * 2018-09-05 2019-01-11 贝富(广州)新技术有限公司 Method for anti-counterfeit, system and storage medium based on block chain
CN109981641A (en) * 2019-03-26 2019-07-05 北京邮电大学 A kind of safe distribution subscription system and distribution subscription method based on block chain technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Blockchain for digital rights management;ZhaofengMa et al.;《Future Generation Computer Systems》;20181231;第746-764页 *
基于DSL和区块链技术的可编程智能合约设计与实现;基于DSL和区块链技术的可编程智能合约设计与实现;《中国优秀硕士学位论文全文数据库信息科技辑》;20180615;第I138-121页 *
基于区块链的生产线数据共享方案研究;呼阳等;《国外电子测量技术》;20190515(第05期);第123-127页 *

Also Published As

Publication number Publication date
CN110516469A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
Bandari Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types
US20140156991A1 (en) Method and system for securing electronic data
CN103268456B (en) Method and device for file safety control
CN108768990A (en) It is a kind of that encryption method can search for based on block chain
CN109829333B (en) OpenID-based key information protection method and system
CN110516469B (en) Anti-hacking method in shared big data application scene based on block chain
CN107864157A (en) Protecting data encryption and ownership mandate decryption application process and system based on ownership
CN106295403A (en) A kind of data safety processing method based on hbase and system
CN110837634A (en) Electronic signature method based on hardware encryption machine
Opderbeck Encryption Policy and Law Enforcement in the Cloud
Siledar et al. A distortion-free watermarking approach for verifying integrity of relational databases
CN105989482A (en) Data encryption method
CN102456115A (en) Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption
Vaidya et al. Data leakage detection and security in cloud computing
Walker Privacy in the Digital Age: Encryption Policy-A Call for Congressional Action
Ovsyanitskaya et al. Information security of small business: modern condition, problems and the ways of their solutions
CN113452661A (en) Server side key safety protection method, equipment and medium
Grinberg End-to-End Authentication: A First Amendment Hook to the Encryption Debate
Palaniappan Highly secure cryptography algorithm method to safeguard audios and visuals
Zhuravka et al. Modern Approches to Solving Problems of Information Security for a Small Enterprise
CN106971119A (en) The key data in database safe read-write authentication method of trusted identity
Pawar et al. Enhancement of Data Leakage Detection Using Encryption Technique
Chawla et al. Study of Image Data Security with Cloud
Baul et al. Analyzing Database Security and A Study of Ownership Protection using Watermarking Algorithm
Drakokhrust et al. Security Issues and Liability for Unauthorized Access to Online Platforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant