CN113761492A - Trusted data storage method and system, computer equipment and terminal - Google Patents

Trusted data storage method and system, computer equipment and terminal Download PDF

Info

Publication number
CN113761492A
CN113761492A CN202110945527.1A CN202110945527A CN113761492A CN 113761492 A CN113761492 A CN 113761492A CN 202110945527 A CN202110945527 A CN 202110945527A CN 113761492 A CN113761492 A CN 113761492A
Authority
CN
China
Prior art keywords
data
data storage
ipfs
storage
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110945527.1A
Other languages
Chinese (zh)
Inventor
严莉
汤琳琳
张悦
张建辉
邢宏伟
李恩堂
徐崇豪
李向阳
张华栋
田诚信
徐康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Shandong Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd
Shandong Luruan Digital Technology Co Ltd
Original Assignee
State Grid Shandong Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd
Shandong Luruan Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Shandong Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd, Shandong Luruan Digital Technology Co Ltd filed Critical State Grid Shandong Electric Power Co Ltd
Priority to CN202110945527.1A priority Critical patent/CN113761492A/en
Publication of CN113761492A publication Critical patent/CN113761492A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2219Large Object storage; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Mathematical Physics (AREA)
  • Fuzzy Systems (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of trusted storage of block chain data, and discloses a trusted data storage method, a trusted data storage system, computer equipment and a terminal. According to the trusted data storage method provided by the invention, the scheme that IPFS is used as trusted data storage is adopted, and the decentralized trusted data storage problem of data storage and record separation is solved based on the block chain, the distributed identity and the IPFS. The invention designs a data storage mechanism based on IPFS storage network technology based on a distributed identity authentication management mode, and realizes decentralized trusted data storage based on block chain technology. Meanwhile, the data is encrypted and stored in the IPFS system by using a data storage and record separation mode, so that the confidentiality and the integrity of the data are protected; IPFS storage objects are all data in smart grid transactions, single-point faults are avoided, and DDoS attacks are prevented.

Description

Trusted data storage method and system, computer equipment and terminal
Technical Field
The invention belongs to the technical field of trusted storage of block chain data, and particularly relates to a trusted data storage method, a trusted data storage system, computer equipment and a terminal.
Background
At present, data generated by a user in the process of using a smart grid platform has the characteristics of wide sources, large data volume and the like, and relates to user privacy. Aiming at the problems of data malicious tampering, single-point fault attack and the like in the centralized data storage scheme, the existing solution is to use a block chain technology for trusted storage. However, the storage capacity of the blockchain is limited, and if a large amount of complete data is directly stored on the blockchain, a large amount of calculation power is necessarily consumed, and the system is in a high-load state for a long time. To solve these problems, a solution that employs IPFS as a trusted data store is needed.
IPFS storage objects are all data in smart grid transactions, single-point faults are avoided, DDoS attacks are prevented, and nodes do not need to trust each other. Distributed content delivery may save bandwidth. In a traditional smart grid, massive data such as power data and transaction data can be generated. These data sources are extensive, data-intensive and involve a lot of user privacy. Data generated by devices such as the intelligent electric meter and the like need to be uploaded to the control center and stored on the server in a centralized mode. The centralized storage is easily attacked maliciously, and once the central server goes down, huge loss is easily caused to the whole intelligent power grid system. Therefore, a new trusted data storage method, system, computer device, and terminal are needed.
Through the above analysis, the problems and defects of the prior art are as follows:
(1) the centralized data storage scheme has the problems of data malicious tampering, single-point fault attack and the like.
(2) The storage capacity of the blockchain is limited, and if a large amount of complete data is directly stored on the blockchain, a large amount of calculation power is necessarily consumed, and the system is in a high-load state for a long time.
(3) The centralized storage is easily attacked maliciously, and once the central server goes down, huge loss is easily caused to the whole intelligent power grid system.
The difficulty in solving the above problems and defects is: aiming at the problems of low data storage efficiency, low expandability and the like on a block chain, a set of decentralized off-chain trusted storage scheme is designed by matching with a block chain account book distributed environment; aiming at the privacy protection problem, a set of distributed identity authentication system needs to be designed to distinguish the users in fine granularity.
The significance of solving the problems and the defects is as follows: the method and the system for storing the out-of-chain trusted data based on the block chain and the IPFS are designed, so that the calculation and storage pressure of the block chain account book is greatly relieved, and the system operation efficiency is improved. In addition, data storage and record are separated, a distributed identity authentication system is introduced, and privacy and reliability of data storage are further improved.
Disclosure of Invention
The invention provides a trusted data storage method, a system, computer equipment and a terminal, and particularly relates to an off-link trusted data storage method, a system, computer equipment and a terminal based on a block chain and IPFS in a smart grid.
The invention is realized in such a way that the trusted data storage system comprises an identity authentication module, a data storage module and a data reading module.
The identity authentication module is used for managing the identity and the operation authority of a user by using a distributed identity authentication system;
the data storage module is used for completing the function of distributed storage of trusted data, storing the data by using an IPFS (internet protocol file system), and storing records by using a block chain;
and the data query module is used for finishing the fine-grained data query function of different users.
Further, the trusted data storage system further includes:
the client is used for calling the distributed identity identifier and the API of the IPFS, and accessing the block chain through an intelligent contract to generate user data;
the distributed identity identification is used for carrying out identity authentication, user identity management and authority management on the user by using the MaskID;
the IPFS is used for performing distributed storage on data generated by the client;
the intelligent contract is used for connecting the client, the distributed identity identifier and the IPFS to the block chain platform through the intelligent contract;
and the block chain platform is used for carrying the intelligent contract of the distributed identity identifier and the IPFS and storing the data storage record.
Another object of the present invention is to provide a trusted data storage method using the trusted data storage system, where the trusted data storage method includes the following steps:
step one, identity authentication: and the identity authentication module is used for managing the identity and the operation authority of the user by using a distributed identity authentication system. The privacy protection capability and the reliability of the system are improved;
step two, data distributed storage: the data storage module is used for completing the function of distributed storage of the trusted data, IPFS is used for storing the data, and a block chain is used for storing the records. Improving the data storage capacity of the block chain account book;
step three, fine-grained reading of data: and finishing the fine-grained data query function of different users through a data query module.
Further, in step one, the identity authentication includes:
(1) the distributed identity authentication system is used for carrying out fine-grained differentiation on users, and users with different identities have different operation authorities and inquiry authorities;
(2) when the intelligent contract is called for data storage, identity authentication is carried out, and whether a user has storage authority or not is inquired;
(3) and when the intelligent network is called to perform data query, identity authentication is performed to query whether the user has the authority of querying data.
In the step (1), the users with different identities refer to administrators, organizations and ordinary users.
Further, in step two, the trusted data distributed storage includes:
(1) the client generates data and performs storage operation;
(2) calling the IPFS, storing the data into the IPFS, and generating a storage record;
(3) and calling an intelligent contract and storing the data storage record to the block chain.
Further, in the step (1), the client performs identity authentication before generating data, and has a stored operation right after the identity authentication is passed;
in the step (2), the storage records comprise the mechanism distributed identity, the user distributed identity and the CID generated by storing data to the IPFS.
Further, in step three, the fine-grained reading of data includes:
(1) the client performs identity authentication to inquire whether the user has inquiry authority;
(2) calling an intelligent contract and inquiring related data storage records;
(3) according to the data storage record, reading the related data by the data CID at the IPFS.
Further, in step (1), the user right refers to that an organization can query all data stored by the organization, and a common user can query all data related to the user.
It is a further object of the invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
the identity and the operation authority of the user are managed by using a distributed identity authentication system through an identity authentication module; the data storage module is used for completing the function of distributed storage of data, IPFS is used for storing the data, and a block chain is used for storing records; and finishing the fine-grained data query function of different users through a data query module.
Another object of the present invention is to provide an information data processing terminal for implementing the trusted data storage system.
By combining all the technical schemes, the invention has the advantages and positive effects that: according to the trusted data storage method provided by the invention, the scheme that IPFS is used as trusted data storage is adopted, and the decentralized trusted data storage problem of data storage and record separation is solved based on the block chain, the distributed identity and the IPFS.
Aiming at the problems of low storage efficiency, low expandability, privacy risks and the like of the data on the chain, the invention designs a data storage mechanism based on an IPFS (internet protocol file system) storage network technology based on a distributed identity authentication management mode, and realizes decentralized trusted data storage based on a block chain technology. The invention realizes the data encryption and storage to the IPFS system by using a data storage and record separation mode, thereby protecting the confidentiality and the integrity of the data. IPFS storage objects are all data in smart grid transactions, single-point faults are avoided, DDoS attacks are prevented, and nodes do not need to trust each other. Distributed content delivery may save bandwidth.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a trusted data storage method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a trusted storage system for smart grid data according to an embodiment of the present invention.
Fig. 3 is a flowchart of a distributed trusted storage of data according to an embodiment of the present invention.
Fig. 4 is a flowchart of a fine-grained data reading method according to an embodiment of the present invention.
Fig. 5 is a flowchart of fine-grained reading of data according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a trusted data storage method, system, computer device, and terminal, and the following describes the present invention in detail with reference to the accompanying drawings.
As shown in fig. 1, a trusted data storage method provided in an embodiment of the present invention includes the following steps:
s101, identity authentication: the identity and the operation authority of the user are managed by using a distributed identity authentication system through an identity authentication module;
s102, data distributed storage: the method comprises the steps that the function of distributed storage of trusted data is completed through a data storage module, IPFS is used for storing the data, and a block chain is used for storing records;
s103, fine-grained data reading: and finishing the fine-grained data query function of different users through a data query module.
As shown in fig. 2, the smart grid data storage system provided in the embodiment of the present invention includes:
the client 1 calls the distributed identity identifier and the API of the IPFS, and accesses the block chain through an intelligent contract to generate user data;
the distributed identity identification 2 is used for carrying out identity authentication, user identity management and authority management on the user by using a MaskID;
IPFS 3, which stores the data generated by the client in a distributed manner;
the client, the distributed identity identifier and the IPFS are connected to the block chain platform through the intelligent contract;
and the block chain platform 5 carries the distributed identity and an intelligent contract of the IPFS and stores data storage records.
The trusted data storage system provided by the embodiment of the invention further comprises an identity authentication module, a data storage module and a data reading module.
The identity authentication module is used for managing the identity and the operation authority of a user by using a distributed identity authentication system;
the data storage module is used for completing the function of distributed storage of trusted data, storing the data by using an IPFS (internet protocol file system), and storing records by using a block chain;
and the data query module is used for finishing the fine-grained data query function of different users.
The technical solution of the present invention will be further described with reference to the following examples.
Example 1
In the application of the smart grid, an IPFS private network needs to be built to ensure the safety of data storage, and the main process is as follows:
(1) initializing a warehouse;
(2) creating a shared private key of a private network;
(3) removing a default bootstrap node;
(4) the IPFS node uses a shared key to join a private network;
(5) the private network is successfully built.
As shown in fig. 3, the data distributed trusted storage process proposed by the present invention is as follows:
(1) the client side carries out identity authentication;
(2) the client generates user data;
(3) checking the operation authority of the user, and if the user does not have the authority, failing to store;
(4) the data are stored to the IPFS in a distributed mode, a data storage record is generated, and if the data storage record is not connected with the IPFS node, the data storage fails;
(5) calling an intelligent contract, and storing a data storage record to a block chain;
(6) the data distributed storage is successful.
As shown in fig. 4, the data reading method provided by the present invention is divided into the following three methods according to different specific fine granularities of the user identity and the query function:
(1) the related data of the organization is inquired, and a specific organization can only inquire the related data generated by the organization;
(2) user-related data query, wherein a specific user can only query data related to the user;
(3) and specific data inquiry, directly reading by using a data CID.
As shown in fig. 5, the fine-grained data reading process proposed by the present invention is as follows:
(1) the client side carries out identity authentication;
(2) selecting a method for reading data;
(3) checking the operation authority of the user, and if the user does not have the authority, reading fails;
(4) reading a data storage record on a block chain;
(5) reading data on the IPFS according to the data storage records, and if the data are not connected with the IPFS node, the data reading fails;
(6) the data reading is successful.
Example 2
The present embodiment further describes the present invention in detail by taking an example of issuing a credential to a user by an organization. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The specific process is as follows:
the method comprises the following steps: the method comprises the steps of building a platform, wherein the platform comprises a client, a block chain platform, a distributed identity authentication system and an IPFS private network;
step two: a manager logs in a client and respectively registers identities for an organization user and a common user by using a distributed identity of a distributed identity authentication system carried by a platform;
step three: an organization user logs in a client by using a private key;
step four: the mechanism generates a certificate for the user according to the user information;
step five: the generated certificate is stored in an IPFS private network in a distributed mode, and a storage record is generated;
step six: storing the credential storage record to a blockchain;
step seven: the organization user can read all certificates issued by the organization at the client according to the identity of the organization in the distributed identity system;
step eight: a common user logs in a client by using a private key;
step nine: the common user can read all the certificates owned by the user at the client according to the identity of the user in the distributed identity system;
step ten: the organization user or the ordinary user can directly read the specific certificate issued by the organization or owned by the user according to the CID corresponding to the certificate on the IPFS.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When used in whole or in part, can be implemented in a computer program product that includes one or more computer instructions. When loaded or executed on a computer, cause the flow or functions according to embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.)). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. The trusted data storage system is characterized by comprising an identity authentication module, a data storage module and a data reading module;
the identity authentication module is used for managing the identity and the operation authority of a user by using a distributed identity authentication system;
the data storage module is used for completing the function of distributed storage of trusted data, storing the data by using an IPFS (internet protocol file system), and storing records by using a block chain;
and the data query module is used for finishing the fine-grained data query function of different users.
2. The trusted data storage system of claim 1, wherein said trusted data storage system further comprises:
the client is used for calling the distributed identity identifier and the API of the IPFS, and accessing the block chain through an intelligent contract to generate user data;
the distributed identity identification is used for carrying out identity authentication, user identity management and authority management on the user by using the MaskID;
the IPFS is used for performing distributed storage on data generated by the client;
the intelligent contract is used for connecting the client, the distributed identity identifier and the IPFS to the block chain platform through the intelligent contract;
and the block chain platform is used for carrying the intelligent contract of the distributed identity identifier and the IPFS and storing the data storage record.
3. A trusted data storage method for implementing a trusted data storage system as claimed in any one of claims 1 to 2, wherein said trusted data storage method comprises the steps of:
step one, identity authentication: the identity and the operation authority of the user are managed by using a distributed identity authentication system through an identity authentication module;
step two, data distributed storage: the method comprises the steps that the function of distributed storage of trusted data is completed through a data storage module, IPFS is used for storing the data, and a block chain is used for storing records;
step three, fine-grained reading of data: and finishing the fine-grained data query function of different users through a data query module.
4. The trusted data storage method of claim 3, wherein in step one, said identity authentication comprises:
(1) the distributed identity authentication system is used for carrying out fine-grained differentiation on users, and users with different identities have different operation authorities and inquiry authorities;
(2) when the intelligent contract is called for data storage, identity authentication is carried out, and whether a user has storage authority or not is inquired;
(3) when the intelligent network is called to perform data query, identity authentication is performed, and whether a user has the authority of querying data is queried;
in the step (1), the users with different identities refer to administrators, organizations and ordinary users.
5. The trusted data storage method according to claim 3, wherein in step two, the distributed storage of the trusted data comprises:
(1) the client generates data and performs storage operation;
(2) calling the IPFS, storing the data into the IPFS, and generating a storage record;
(3) and calling an intelligent contract and storing the data storage record to the block chain.
6. The trusted data storage method according to claim 5, wherein in step (1), the client performs identity authentication before generating data, and has the stored operation right after the identity authentication is passed;
in the step (2), the storage records comprise the mechanism distributed identity, the user distributed identity and the CID generated by storing data to the IPFS.
7. The trusted data storage method of claim 3, wherein in step three, said fine-grained reading of data comprises:
(1) the client performs identity authentication to inquire whether the user has inquiry authority;
(2) calling an intelligent contract and inquiring related data storage records;
(3) according to the data storage record, reading the related data by the data CID at the IPFS.
8. The trusted data storage method according to claim 7, wherein in step (1), said user authority means that an organization can inquire all data stored by the organization and a common user can inquire all data related to the user.
9. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
the identity and the operation authority of the user are managed by using a distributed identity authentication system through an identity authentication module; the data storage module is used for completing the function of distributed storage of data, IPFS is used for storing the data, and a block chain is used for storing records; and finishing the fine-grained data query function of different users through a data query module.
10. An information data processing terminal, characterized in that the information data processing terminal is used for implementing a trusted data storage system according to any one of claims 1 to 2.
CN202110945527.1A 2021-08-17 2021-08-17 Trusted data storage method and system, computer equipment and terminal Pending CN113761492A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110945527.1A CN113761492A (en) 2021-08-17 2021-08-17 Trusted data storage method and system, computer equipment and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110945527.1A CN113761492A (en) 2021-08-17 2021-08-17 Trusted data storage method and system, computer equipment and terminal

Publications (1)

Publication Number Publication Date
CN113761492A true CN113761492A (en) 2021-12-07

Family

ID=78790154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110945527.1A Pending CN113761492A (en) 2021-08-17 2021-08-17 Trusted data storage method and system, computer equipment and terminal

Country Status (1)

Country Link
CN (1) CN113761492A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN110278462A (en) * 2019-06-20 2019-09-24 北京工业大学 A kind of mobile film projection authorization management method based on block chain
US20200117818A1 (en) * 2018-10-10 2020-04-16 Sap Se Secure data sharing
CN111327597A (en) * 2020-01-21 2020-06-23 暨南大学 Digital evidence obtaining method based on block chain privacy protection and fine-grained access control
CN111478769A (en) * 2020-03-18 2020-07-31 西安电子科技大学 Distributed credible identity authentication method, system, storage medium and terminal
CN111783128A (en) * 2020-07-24 2020-10-16 国网湖南省电力有限公司 Verifiable distributed database access control method
CN112232828A (en) * 2020-11-23 2021-01-15 国网能源研究院有限公司 Power grid data transaction method and system
CN112637278A (en) * 2020-12-09 2021-04-09 云南财经大学 Data sharing method and system based on block chain and attribute-based encryption and computer readable storage medium
CN113127811A (en) * 2021-03-09 2021-07-16 西北大学 Cultural relic digital resource safety sharing method, cultural relic digital resource safety sharing system and information data processing terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200117818A1 (en) * 2018-10-10 2020-04-16 Sap Se Secure data sharing
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN110278462A (en) * 2019-06-20 2019-09-24 北京工业大学 A kind of mobile film projection authorization management method based on block chain
CN111327597A (en) * 2020-01-21 2020-06-23 暨南大学 Digital evidence obtaining method based on block chain privacy protection and fine-grained access control
CN111478769A (en) * 2020-03-18 2020-07-31 西安电子科技大学 Distributed credible identity authentication method, system, storage medium and terminal
CN111783128A (en) * 2020-07-24 2020-10-16 国网湖南省电力有限公司 Verifiable distributed database access control method
CN112232828A (en) * 2020-11-23 2021-01-15 国网能源研究院有限公司 Power grid data transaction method and system
CN112637278A (en) * 2020-12-09 2021-04-09 云南财经大学 Data sharing method and system based on block chain and attribute-based encryption and computer readable storage medium
CN113127811A (en) * 2021-03-09 2021-07-16 西北大学 Cultural relic digital resource safety sharing method, cultural relic digital resource safety sharing system and information data processing terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李瑾 等;: "基于区块链的分布式电能量数据可信存储机制", 网络与信息安全学报 *
梅文明 等;: "一种面向分布式新能源网络的终端安全接入技术", 电网技术 *

Similar Documents

Publication Publication Date Title
CN107465656B (en) Security monitoring big data processing method and system based on cloud computing
US9270703B1 (en) Enhanced control-plane security for network-accessible services
Yutaka et al. Using ethereum blockchain for distributed attribute-based access control in the internet of things
KR20200087327A (en) System and method for providing data reliability based on blockchain for iot services
Rui et al. Research on secure transmission and storage of energy IoT information based on Blockchain
CN113271311B (en) Digital identity management method and system in cross-link network
Lu et al. A Fine‐Grained IoT Data Access Control Scheme Combining Attribute‐Based Encryption and Blockchain
US20230104103A1 (en) Custodial systems for non-fungible tokens
EP3777022A1 (en) Distributed access control
Meetei et al. Security issues in cloud computing
CN114519197A (en) Data storage architecture and method based on block chain and cloud service
Huang et al. BPS: A reliable and efficient pub/sub communication model with blockchain-enhanced paradigm in multi-tenant edge cloud
CN111932259A (en) Transaction block system with high security
Zhang et al. Blockchain based big data security protection scheme
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
CN113011960A (en) Block chain-based data access method, device, medium and electronic equipment
Lim et al. AuthChain: a decentralized blockchain-based authentication system
CN112583586A (en) Network security information processing system
CN113761492A (en) Trusted data storage method and system, computer equipment and terminal
CN117118640A (en) Data processing method, device, computer equipment and readable storage medium
CN115098893A (en) Data storage method and device based on block chain
US11647020B2 (en) Satellite service for machine authentication in hybrid environments
Ramesh et al. Public auditing for shared data with efficient user revocation in the cloud
Derong Application of cloud computing technology in computer network security storage
CN111027047A (en) Application program sensitive information control method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination