CN117879787B - Safe transmission method and system for mine data based on block chain - Google Patents

Safe transmission method and system for mine data based on block chain Download PDF

Info

Publication number
CN117879787B
CN117879787B CN202410279276.1A CN202410279276A CN117879787B CN 117879787 B CN117879787 B CN 117879787B CN 202410279276 A CN202410279276 A CN 202410279276A CN 117879787 B CN117879787 B CN 117879787B
Authority
CN
China
Prior art keywords
data
mine
sensitive
transmission
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410279276.1A
Other languages
Chinese (zh)
Other versions
CN117879787A (en
Inventor
陆茂兵
韦善阳
吉州童
苟园园
王宏东
孙飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou University
Original Assignee
Guizhou University
Filing date
Publication date
Application filed by Guizhou University filed Critical Guizhou University
Priority to CN202410279276.1A priority Critical patent/CN117879787B/en
Publication of CN117879787A publication Critical patent/CN117879787A/en
Application granted granted Critical
Publication of CN117879787B publication Critical patent/CN117879787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to the field of data security, and discloses a method and a system for realizing safe transmission of mine data based on a blockchain, wherein the method comprises the following steps: arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, and performing sensitive equivalent replacement on the mine data to obtain equivalent mine data; homomorphic encryption is carried out on equivalent mine data to obtain encrypted mine data, and a mine block chain network of a mine is constructed; the encrypted mine data are stored in the corresponding block nodes of the mine block chain network in a distributed mode, and a unit block chain is obtained; extracting a data transmission record in a data storage process in a unit block chain, constructing a transmission transaction tree of the data transmission record, and verifying the transmission transaction tree to obtain verification data; generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol. The invention can improve the safety of mine data transmission.

Description

Safe transmission method and system for mine data based on block chain
Technical Field
The invention relates to the field of data security, in particular to a method and a system for realizing safe transmission of mine data based on a blockchain.
Background
The data security transmission refers to that various technical means and management measures are adopted in the data transmission process, so that the data is not illegally accessed, tampered, leaked or damaged in the storage, processing and transmission processes, the integrity, confidentiality and usability of the data are guaranteed, the data security transmission can prevent the data from being influenced by malicious attack, accidental damage or misoperation in the transmission process, and the safety and reliability of the data in the transmission process are guaranteed.
At present, mine data is transmitted safely by encrypting the mine data and constructing a firewall channel, and the method is too centralized in data, so that a large amount of data is leaked if the encrypted data is attacked and cracked, and the transmission security of the data is poor.
Disclosure of Invention
The invention provides a safe transmission method and system for mine data based on a blockchain, and the method and system are mainly used for improving the safety of mine data transmission.
In order to achieve the above purpose, the invention provides a safe transmission method for mine data based on block chain, comprising the following steps:
The method comprises the steps of arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, constructing a sensitive dictionary of the mine data, identifying sensitive characters of the mine data based on the sensitive dictionary, calculating a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary composed of characters with sensitive degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are the sensitive degrees of the sensitive data through the sensitive values, calculating sensitive weights of the sensitive characters, and calculating the data safety level of the mine data through the sensitive weights and the sensitive values.
Wherein,The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
Analyzing the data attribute of the equivalent mine data, determining a homomorphic encryption function of the equivalent mine data based on the data attribute, constructing an encryption modulus of the homomorphic encryption function, homomorphic encrypting the equivalent mine data by using the homomorphic encryption function through the encryption modulus to obtain the encrypted mine data, analyzing the data transmission requirement of the encrypted mine data, determining an architecture selection factor of the mine, quantizing the architecture selection factor through the data transmission requirement to obtain an architecture selection factor value, constructing an architecture selection threshold of the mine through the architecture selection factor value, determining a block chain architecture of the mine, performing data slicing on the encrypted mine data through the mine block chain network to obtain a data slice, identifying the access frequency of the data slice, storing the encrypted mine data into the corresponding nodes of the unit block links in a distributed manner through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing a unit block chain of the encrypted mine data based on the block nodes, wherein the architecture selection factor refers to a factor influencing the chain architecture selection of the mine, the architecture selection factor value refers to a value obtained by digitizing the architecture selection factor, the architecture selection threshold refers to a factor threshold obtained by constructing the architecture selection factor value, the data slice performs slicing processing on the encrypted data so that each slice contains a certain number of slices of data records, the access frequency refers to the frequency of accessing the data in the data slice, the node slicing refers to a slicing state obtained by uploading sliced data to a node corresponding to the unit block link, the sliced data is distributed and stored to each node in a mine block chain network, the block nodes refer to the node sliced data stored in a distributed mode and divided into a plurality of blocks according to a certain rule, and each block comprises a certain number of data slices and is associated with other blocks through a hash algorithm;
The encrypted mine data are stored in the corresponding block nodes of the mine block chain network in a distributed mode, and unit block chains are obtained;
Extracting a data transmission record of a data storage process in the unit block chain, dividing the data transmission record into data blocks, and calculating a hash value of the data blocks by using the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
In order to solve the above problems, the present invention further provides a system for realizing safe transmission of mine data based on blockchain, the system comprising:
The sensitive data replacing module is used for arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, constructing a sensitive dictionary of the mine data, identifying sensitive characters of the mine data based on the sensitive dictionary, and calculating a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary consisting of characters with sensitive degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are data related to the sensitive degrees of the sensitive data through the sensitive values, calculating sensitive weights of the sensitive characters, and calculating the data safety level of the mine data through the sensitive weights and the sensitive values.
Wherein,The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
The block chain network construction module is used for analyzing the data attribute of the equivalent mine data, determining a homomorphic encryption function of the equivalent mine data based on the data attribute, constructing an encryption module of the homomorphic encryption function, homomorphic encrypting the equivalent mine data by the homomorphic encryption function through the encryption module to obtain the encrypted mine data, analyzing the data transmission requirement of the encrypted mine data, determining the framework selection factor of the mine, quantizing the framework selection factor through the data transmission requirement to obtain the framework selection factor value, constructing a framework selection threshold of the mine through the framework selection factor value, determining the block chain framework of the mine, slicing the encrypted mine data through the mine block chain network, obtaining data slices, identifying access frequency of the data slices, storing the encrypted mine data into corresponding nodes of unit block links in a distributed mode through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing a unit block chain of the encrypted mine data based on the block nodes, wherein architecture selection factors refer to factors influencing chain architecture selection of the mine, architecture selection factor values refer to values obtained by digitizing the architecture selection factors, architecture selection threshold refers to factor threshold values obtained by constructing architecture selection through the architecture selection factor values, slicing the encrypted data so that each slice contains a certain number of data record slices, the access frequency refers to the frequency of data access in the data slice, the node slice refers to the slice state obtained by uploading slice data to the corresponding node of the unit block link, the sliced data is distributed and stored to each node in the mine block chain network, the block node refers to the node slice data which is distributed and stored is divided into a plurality of blocks according to a certain rule, and each block contains a certain number of data slices and is associated with other blocks through a hash algorithm;
The data storage module is used for storing the encrypted mine data into corresponding block nodes of the mine block chain network in a distributed mode to obtain unit block chains;
The data verification module is used for extracting a data transmission record in the data storage process in the unit block chain, dividing the data transmission record into data blocks, and calculating the hash value of the data blocks by using the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
And the intelligent contract construction module is used for generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
According to the embodiment of the invention, sensitive equivalent replacement is carried out on the mine data through the data security level, so that the equivalent mine data can be obtained, and the sensitive data in the mine data can be replaced, thereby reducing the risk caused by data leakage; according to the embodiment of the invention, the equivalent mine data is homomorphic encrypted, so that the encrypted mine data can be calculated in an encrypted state, and the privacy and the safety of the data are protected; further, according to the embodiment of the invention, the mine blockchain network of the mine is constructed through the blockchain architecture, so that the operation efficiency, data safety and sustainability of the mine industry are improved. The network combines the blockchain technology with the mine service scene to realize intelligent management and collaborative combat of mining equipment, data, assets and the like; further, the embodiment of the invention verifies the transmission transaction tree through the unit blockchain corresponding trusted node, and obtains verification data which has the advantages of decentralization, safety, reliability, transparency, traceability and the like, and is helpful for guaranteeing transaction safety in a blockchain network. Therefore, the method and the system for realizing the safe transmission of the mine data based on the blockchain can improve the safety of the mine data transmission.
Drawings
FIG. 1 is a schematic flow chart of a method for realizing safe transmission of mine data based on blockchain according to an embodiment of the invention;
FIG. 2 is a functional block diagram of a system for implementing secure transmission of mine data based on blockchain according to an embodiment of the present invention;
Fig. 3 is a schematic structural diagram of an electronic device of a system for implementing safe transmission of mine data based on blockchain according to an embodiment of the present invention;
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the application provides a safe transmission method for realizing mine data based on a block chain. The execution main body of the method for realizing the safe transmission of the mine data based on the blockchain comprises at least one of electronic equipment, such as a server side, a terminal and the like, which can be configured to execute the method provided by the embodiment of the application. In other words, the safe transmission method based on the blockchain to realize mine data can be executed by software or hardware installed in a terminal device or a server device, wherein the software can be a blockchain platform. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Referring to fig. 1, a flow chart of a method for implementing safe transmission of mine data based on blockchain according to an embodiment of the invention is shown. In this embodiment, the method for implementing safe transmission of mine data based on blockchain includes:
S1, arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, analyzing the data security level of the mine data, and carrying out equivalent replacement on sensitive data corresponding to the classified data based on the data security level to obtain equivalent classified data.
In the embodiment of the invention, the data acquisition unit refers to a device unit capable of acquiring data of a mine, such as a temperature sensor, an imaging system and the like, and the mine data refers to data acquired by the data acquisition unit, such as mine internal structure data, mine environment data and the like.
Furthermore, the embodiment of the invention can analyze the sensitivity degree of the data by calculating the data sensitivity value of the mine data so as to provide a data basis for data security protection in the later stage. Wherein the data sensitivity value refers to the sensitivity degree of the mine data.
As one embodiment of the present invention, the analyzing the data security level of the mine data includes: constructing a sensitive dictionary of the mine data; identifying sensitive characters of the mine data based on the sensitive dictionary; calculating the sensitive value of the sensitive character; and calculating the data security level of the mine data through the sensitive value.
The sensitive dictionary is a dictionary composed of characters with sensitivity degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, such as mine exploitation data, personnel information, production data, safety monitoring data and the like, and the sensitive values are the sensitivity degrees of the sensitive data.
Further, in an optional embodiment of the present invention, the calculating the data security level of the mine data according to the sensitivity value includes: calculating the sensitivity weight of the sensitive character through the sensitivity value; calculating the data security level of the mine data through the sensitive weight and the sensitive value:
Wherein, The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the i-th type.
Further, in the embodiment of the invention, sensitive equivalent replacement is performed on the mine data through the data security level, so that the equivalent mine data can be obtained to replace sensitive data in the mine data, and the risk caused by data leakage is reduced. The equivalent mine data refers to a data set with the same data meaning obtained by replacing sensitive data in mine data with other forms of data.
As an embodiment of the present invention, the performing sensitive equivalent replacement on the mine data based on the data security level to obtain equivalent mine data includes: extracting sensitive data of the mine data based on the data security level; analyzing a data structure of the sensitive data; constructing equivalent virtual data of the sensitive data through the data structure; based on the equivalent virtual data, equivalent replacement of sensitive data corresponding to the mine data is realized, and equivalent mine data is obtained.
The sensitive data is a data set with a data security level reaching a certain level, the data structure is a mode and a method for storing, organizing and managing data in a computer, the data structure mainly comprises a linear structure, a tree structure, a graph structure and the like, and the equivalent virtual data is virtual data for replacing the sensitive data, such as symbols, shapes and the like.
S2, homomorphic encryption is carried out on the equivalent mine data to obtain encrypted mine data, data transmission requirements of the encrypted mine data are analyzed, a block chain architecture of the mine is selected according to the data transmission requirements, and a mine block chain network of the mine is constructed according to the block chain architecture.
According to the embodiment of the invention, the equivalent mine data is homomorphic encrypted, so that the encrypted mine data can be calculated in an encrypted state, and the privacy and the safety of the data are protected. The encrypted mine data is a data set obtained by encrypting the mine data.
As an embodiment of the present invention, the homomorphic encryption of the equivalent mine data to obtain encrypted mine data includes: analyzing the data attribute of the equivalent mine data; determining homomorphic encryption functions of the equivalent mine data based on the data attributes; constructing an encryption modulus of the homomorphic encryption function; and homomorphic encryption is carried out on the equivalent mine data by utilizing the homomorphic encryption function through the encryption modulus, so as to obtain the encrypted mine data.
Wherein the data attribute refers to various information describing the characteristics of the data, which may include type, format, source, structure, integrity, security, etc. of the data, the encryption modulus refers to the product of two large primes d and q, and in homomorphic encryption, the encryption modulus generally refers to a large integer which is the product of two large primes d and q, i.e., n=dQ. Such modulus is used in the encryption process because it can provide adequate security. In the encryption process, the plaintext message is converted into an integer, and then modular exponentiation is performed with a random encryption key (typically, a power of n) to generate an encrypted ciphertext, and the ciphertext is subjected to modular multiplication to obtain a final encryption result. In the decryption process, the encryption result is homomorphically decrypted by using the private key to obtain plaintext data. The encryption modulus ensures the consistency and the safety of the encryption and decryption processes, and the homomorphic encryption function refers to a function used for homomorphic encryption of equivalent mine data, such as functions of an RSA encryption algorithm, an ElGamal encryption algorithm and the like.
The embodiment of the invention can ensure the safety, timeliness and compliance of the data in the transmission process by analyzing the data transmission requirement of the encrypted mine data, wherein the data transmission requirement mainly comprises the aspects of data safety, bandwidth requirement, instantaneity, anti-interference performance, system compatibility, easiness in management and maintenance, regulation compliance and the like in the data transmission of the encrypted mine data.
Furthermore, according to the embodiment of the invention, the block chain architecture of the mine can be selected to ensure stable output of data by selecting the block chain architecture with the best data transmission effect according to the data transmission requirement. Wherein the blockchain architecture refers to an architecture for constructing a blockchain network, the blockchain architecture comprising: the system comprises a Taifang (Ethereum), a super ledger (HYPERLEDGER), an ant chain (AntChain), an interstellar file system (IPFS) and other structures.
As an embodiment of the present invention, the selecting, by the data transmission requirement, a blockchain architecture of the mine includes: determining a framework selection factor for the mine; quantizing the framework selection factor through the data transmission requirement to obtain the framework selection factor value; constructing a framework selection threshold of the mine through the framework selection factor value; and determining the block chain architecture of the mine through the architecture selection threshold.
The architecture selection factor refers to factors affecting the chain architecture selection of the mine, such as data transmission speed, data security, expandability, system stability and the like, the architecture selection factor value refers to a value obtained by digitizing the architecture selection factor, such as5 mega per second data security 5 grade equivalent, and the architecture selection threshold refers to a factor threshold for constructing architecture selection through the architecture selection factor value.
Further, according to the embodiment of the invention, the mine blockchain network of the mine is constructed through the blockchain architecture, so that the operation efficiency, data safety and sustainability of the mine industry are improved. The network combines the blockchain technology with mine business scenes to realize intelligent management and collaborative combat of mining equipment, data, assets and the like. The mine blockchain network is a special network constructed based on a blockchain technology in the mine industry.
And S3, the encrypted mine data are stored in block nodes corresponding to the mine block chain network in a distributed mode through the mine block chain network, and the unit block chain is obtained.
According to the embodiment of the invention, the unit block link of the data acquisition unit is established through the mine block chain network, so that safe and efficient storage and management of data are realized. The unit block link refers to an information management system based on a block chain technology, and the chain is formed by integrating links such as data acquisition, processing, storage, transmission, application and the like on a unified platform.
As one embodiment of the present invention, the storing the encrypted mine data in the corresponding block nodes of the mine block chain network in a distributed manner through the mine block chain network to obtain unit block chains includes: carrying out data slicing on the encrypted mine data through the mine blockchain network to obtain data slices; identifying an access frequency of the data slice; the encrypted mine data are stored in a distributed mode to the corresponding nodes of the unit block links through the access frequency, and node slice data are obtained; performing block division on the node slice data to obtain block nodes; and constructing a unit block chain of the encrypted mine data based on the block nodes.
And the data slicing is used for slicing the encrypted data, so that each slice contains a certain number of slices of data records, the access frequency refers to the frequency of data access in the data slice, the node slicing refers to the slicing state obtained by uploading the sliced data to the corresponding node of the unit block link, and the sliced data are distributed and stored to each node in the mine block chain network. The block node refers to dividing node slice data stored in a distributed mode into a plurality of blocks according to a certain rule. Each block contains a certain number of data slices and remains associated with other blocks through a hashing algorithm.
S4, extracting data transmission records of the data storage process in the unit block chain, constructing a transmission transaction tree of the data transmission records, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data.
In the embodiment of the invention, the data transmission record refers to transaction data generated during uploading, and the transaction data comprises information such as addresses of both transaction parties, transaction amount and the like.
The embodiment of the invention can provide a data basis for block verification in the later stage by constructing the transmission transaction tree of the data transmission record. Wherein, the transmission transaction tree refers to the generation of the merck tree from the prepared transaction data. The merck tree is a tree structure that compresses data into a fixed length, where each node contains the hash value of the previous node.
As one embodiment of the present invention, the constructing a transmission transaction tree of the data transmission record includes: dividing the data transmission record into data blocks; calculating a hash value of the data block using the following formula:
Wherein, Representing the hash value of the data block,Representing the cardinality, which is an integer greater than 1,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstA number of data blocks;
and constructing a transmission transaction tree of the data transmission record through the hash value.
Wherein, the data block refers to grouping transaction data according to a certain capacity, and the grouping is called a data block. This partitioning facilitates data storage, processing and analysis. For example, daily transaction data may be stored as a data block, or each transaction data may be stored as a data block, the base (base) is an integer greater than 1, and a larger value, such as 131 or 13331, is typically selected to reduce the probability of hash collisions, the shift value (shift) is a positive integer used to adjust the position of the hash value, and the recursive function is used to calculate the hash value of the data block.
Further, the embodiment of the invention verifies the transmission transaction tree through the unit block chain corresponding trusted node, and the obtained verification data has the advantages of decentralization, safety, reliability, transparency, traceability and the like, and is beneficial to guaranteeing the transaction safety in a block chain network. Wherein, the verification data refers to data which can be trusted and is left after verification.
As an embodiment of the present invention, the trusted node may verify the transmission transaction tree by retrieving transaction data from the transmission transaction tree by the trusted node. The verification process includes checking whether the transaction meets preset rules, verifying the digital identity of both parties to the transaction, etc. Authenticated transactions are packed into new blocks.
S5, generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
The embodiment of the invention can ensure that the access authority of the data can avoid data loss caused by override operation by generating the authority intelligent contract and the secure transmission protocol of the verification data, thereby improving the security of the data. The right intelligent contract is a contract which is written by programming language based on the blockchain technology and is used for normalizing and controlling the behaviors of all parties, and the secure transmission protocol is a protocol aiming at protecting the transmission security of data in a network. They are mainly concerned with providing encryption, message authentication, integrity assurance, and replay protection functions on the basis of real-time transport protocols. Such as SSL (Secure Sockets Layer), TLS (Transport Layer Security), etc.
Further, according to the embodiment of the invention, the secure transmission of the verification data is carried out through the authority intelligent contract and the secure transmission protocol, so that the secure transmission of the verification data can be stored.
According to the embodiment of the invention, sensitive equivalent replacement is carried out on the mine data through the data security level, so that the equivalent mine data can be obtained, and the sensitive data in the mine data can be replaced, thereby reducing the risk caused by data leakage; according to the embodiment of the invention, the equivalent mine data is homomorphic encrypted, so that the encrypted mine data can be calculated in an encrypted state, and the privacy and the safety of the data are protected; further, according to the embodiment of the invention, the mine blockchain network of the mine is constructed through the blockchain architecture, so that the operation efficiency, data safety and sustainability of the mine industry are improved. The network combines the blockchain technology with the mine service scene to realize intelligent management and collaborative combat of mining equipment, data, assets and the like; further, the embodiment of the invention verifies the transmission transaction tree through the unit block chain corresponding trusted node, and the obtained verification data has the advantages of decentralization, safety, reliability, transparency, traceability and the like, and is beneficial to guaranteeing the transaction safety in a block chain network. The right intelligent contract is a contract which is written by programming language based on the blockchain technology and is used for normalizing and controlling the behaviors of all parties, and the secure transmission protocol is a protocol aiming at protecting the transmission security of data in a network. Therefore, the safe transmission method for the mine data based on the block chain can improve the safety of mine data transmission.
Fig. 2 is a functional block diagram of a system for implementing mine data based on blockchain according to an embodiment of the present invention.
The system 200 for realizing the safe transmission of mine data based on the blockchain can be installed in electronic equipment. Depending on the functions implemented, the blockchain-based secure transmission system 200 for implementing mine data may include a sensitive data replacement module 201, a blockchain network construction module 202, a data storage module 203, a data verification module 204, and an intelligent contract construction module 205. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
The sensitive data replacing module 201 is configured to arrange a data acquisition unit of a mine, acquire mine data of the mine through the data acquisition unit, construct a sensitive dictionary of the mine data, identify sensitive characters of the mine data based on the sensitive dictionary, and calculate a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary composed of characters with sensitivity degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are data related to the sensitivity degrees of the sensitive data through the sensitive values, calculate a sensitive weight of the sensitive characters, and calculate a data safety level of the mine data through the sensitive weight and the sensitive values:
Wherein, The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
The blockchain network construction module 202 is configured to analyze data attributes of the equivalent mine data, determine homomorphic encryption functions of the equivalent mine data based on the data attributes, construct encryption moduli of the homomorphic encryption functions, homomorphic encrypt the equivalent mine data by the homomorphic encryption functions to obtain the encrypted mine data, analyze data transmission requirements of the encrypted mine data, determine architecture selection factors of the mine, quantize the architecture selection factors by the data transmission requirements to obtain the architecture selection factor values, construct architecture selection thresholds of the mine by the architecture selection factor values, determine blockchain architectures of the mine by the architecture selection thresholds, slice the encrypted mine data by the mine blockchain network, obtaining data slices, identifying access frequency of the data slices, storing the encrypted mine data into corresponding nodes of unit block links in a distributed mode through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing a unit block chain of the encrypted mine data based on the block nodes, wherein architecture selection factors refer to factors influencing chain architecture selection of the mine, architecture selection factor values refer to values obtained by digitizing the architecture selection factors, architecture selection threshold refers to factor threshold values obtained by constructing architecture selection through the architecture selection factor values, slicing the encrypted data so that each slice contains a certain number of data record slices, the access frequency refers to the frequency of data access in the data slice, the node slice refers to the slice state obtained by uploading slice data to the corresponding node of the unit block link, the sliced data is distributed and stored to each node in the mine block chain network, the block node refers to the node slice data which is distributed and stored is divided into a plurality of blocks according to a certain rule, and each block contains a certain number of data slices and is associated with other blocks through a hash algorithm;
the data storage module 203 is configured to store the encrypted mine data in a distributed manner to corresponding block nodes of the mine block chain network, so as to obtain a unit block chain;
The data verification module 204 is configured to extract a data transmission record of a data storage process in the unit block chain, divide the data transmission record into data blocks, and calculate a hash value of the data blocks according to the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
The smart contract construction module 205 is configured to generate a rights smart contract and a secure transmission protocol of the verification data, and perform data secure transmission of the verification data through the rights smart contract and the secure transmission protocol.
In detail, each module in the system 200 for safely transmitting mine data based on blockchain in the embodiment of the present invention adopts the same technical means as the method for safely transmitting mine data based on blockchain in the drawings, and can produce the same technical effects, which are not described herein.
The embodiment of the invention provides electronic equipment for realizing a safe transmission method of mine data based on a blockchain.
Referring to fig. 3, the electronic device may include a processor 30, a memory 31, a communication bus 32, and a communication interface 33, and may further include a computer program stored in the memory 31 and executable on the processor 30, such as a program for implementing a secure transmission method of mine data based on a blockchain.
The processor may be formed by an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed by a plurality of integrated circuits packaged with the same function or different functions, including one or more central processing units (Central Processing Unit, CPU), microprocessors, digital processing chips, graphics processors, and combinations of various control chips. The processor is a Control Unit (Control Unit) of the electronic device, connects various components of the entire electronic device using various interfaces and lines, executes or executes programs or modules stored in the memory (for example, executes a secure transmission program for implementing mine data based on a blockchain, etc.), and invokes data stored in the memory to perform various functions of the electronic device and process data.
The memory includes at least one type of readable storage medium including flash memory, removable hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory may in some embodiments be an internal storage unit of the electronic device, such as a mobile hard disk of the electronic device. The memory may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), etc. that are provided on the electronic device. Further, the memory may also include both internal storage units and external storage devices of the electronic device. The memory can be used for storing application software installed in the electronic equipment and various data, such as codes based on a safe transmission program for realizing mine data based on a blockchain, and the like, and can be used for temporarily storing data which is output or is to be output.
The communication bus may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, or the like. The bus may be classified as an address bus, a data bus, a control bus, etc. The bus is arranged to enable a connection communication between the memory and at least one processor or the like.
The communication interface is used for communication between the electronic equipment and other equipment, and comprises a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), or alternatively a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device and for displaying a visual user interface.
For example, although not shown, the electronic device may further include a power source (such as a battery) for powering the respective components, and preferably, the power source may be logically connected to the at least one processor through a power management system, so as to perform functions of charge management, discharge management, and power consumption management through the power management system. The power supply may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like. The electronic device may further include various sensors, bluetooth modules, wi-Fi modules, etc., which are not described herein.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The safe transmission program stored in the memory of the electronic device and based on the blockchain realizes mine data is a combination of a plurality of instructions, and when the safe transmission program runs in the processor, the safe transmission program can realize:
The method comprises the steps of arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, constructing a sensitive dictionary of the mine data, identifying sensitive characters of the mine data based on the sensitive dictionary, calculating a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary composed of characters with sensitive degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are the sensitive degrees of the sensitive data through the sensitive values, calculating sensitive weights of the sensitive characters, and calculating the data safety level of the mine data through the sensitive weights and the sensitive values.
Wherein,The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
Analyzing the data attribute of the equivalent mine data, determining a homomorphic encryption function of the equivalent mine data based on the data attribute, constructing an encryption modulus of the homomorphic encryption function, homomorphic encrypting the equivalent mine data by using the homomorphic encryption function through the encryption modulus to obtain the encrypted mine data, analyzing the data transmission requirement of the encrypted mine data, determining an architecture selection factor of the mine, quantizing the architecture selection factor through the data transmission requirement to obtain an architecture selection factor value, constructing an architecture selection threshold of the mine through the architecture selection factor value, determining a block chain architecture of the mine, performing data slicing on the encrypted mine data through the mine block chain network to obtain a data slice, identifying the access frequency of the data slice, storing the encrypted mine data into the corresponding nodes of the unit block links in a distributed manner through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing a unit block chain of the encrypted mine data based on the block nodes, wherein the architecture selection factor refers to a factor influencing the chain architecture selection of the mine, the architecture selection factor value refers to a value obtained by digitizing the architecture selection factor, the architecture selection threshold refers to a factor threshold obtained by constructing the architecture selection factor value, the data slice performs slicing processing on the encrypted data so that each slice contains a certain number of slices of data records, the access frequency refers to the frequency of accessing the data in the data slice, the node slicing refers to a slicing state obtained by uploading sliced data to a node corresponding to the unit block link, the sliced data is distributed and stored to each node in a mine block chain network, the block nodes refer to the node sliced data stored in a distributed mode and divided into a plurality of blocks according to a certain rule, and each block comprises a certain number of data slices and is associated with other blocks through a hash algorithm;
The encrypted mine data are stored in the corresponding block nodes of the mine block chain network in a distributed mode, and unit block chains are obtained;
Extracting a data transmission record of a data storage process in the unit block chain, dividing the data transmission record into data blocks, and calculating a hash value of the data blocks by using the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
Specifically, the specific implementation method of the above instruction by the processor may refer to descriptions of related steps in the corresponding embodiment of the drawings, which are not repeated herein.
Further, the electronic device integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. The computer readable storage medium may be volatile or nonvolatile. For example, the computer readable medium may include: any entity or system capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The present invention also provides a computer readable storage medium storing a computer program which, when executed by a processor of an electronic device, can implement:
The method comprises the steps of arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, constructing a sensitive dictionary of the mine data, identifying sensitive characters of the mine data based on the sensitive dictionary, calculating a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary composed of characters with sensitive degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are the sensitive degrees of the sensitive data through the sensitive values, calculating sensitive weights of the sensitive characters, and calculating the data safety level of the mine data through the sensitive weights and the sensitive values.
Wherein,The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
Analyzing the data attribute of the equivalent mine data, determining a homomorphic encryption function of the equivalent mine data based on the data attribute, constructing an encryption modulus of the homomorphic encryption function, homomorphic encrypting the equivalent mine data by using the homomorphic encryption function through the encryption modulus to obtain the encrypted mine data, analyzing the data transmission requirement of the encrypted mine data, determining an architecture selection factor of the mine, quantizing the architecture selection factor through the data transmission requirement to obtain an architecture selection factor value, constructing an architecture selection threshold of the mine through the architecture selection factor value, determining a block chain architecture of the mine, performing data slicing on the encrypted mine data through the mine block chain network to obtain a data slice, identifying the access frequency of the data slice, storing the encrypted mine data into the corresponding nodes of the unit block links in a distributed manner through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing a unit block chain of the encrypted mine data based on the block nodes, wherein the architecture selection factor refers to a factor influencing the chain architecture selection of the mine, the architecture selection factor value refers to a value obtained by digitizing the architecture selection factor, the architecture selection threshold refers to a factor threshold obtained by constructing the architecture selection factor value, the data slice performs slicing processing on the encrypted data so that each slice contains a certain number of slices of data records, the access frequency refers to the frequency of accessing the data in the data slice, the node slicing refers to a slicing state obtained by uploading sliced data to a node corresponding to the unit block link, the sliced data is distributed and stored to each node in a mine block chain network, the block nodes refer to the node sliced data stored in a distributed mode and divided into a plurality of blocks according to a certain rule, and each block comprises a certain number of data slices and is associated with other blocks through a hash algorithm;
The encrypted mine data are stored in the corresponding block nodes of the mine block chain network in a distributed mode, and unit block chains are obtained;
Extracting a data transmission record of a data storage process in the unit block chain, dividing the data transmission record into data blocks, and calculating a hash value of the data blocks by using the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus, system and method may be implemented in other manners. For example, the system embodiments described above are merely illustrative, e.g., the division of the modules is merely a logical function division, and other manners of division may be implemented in practice.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Wherein artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) is the theory, method, technique, and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. Multiple units or systems as set forth in the system claims may also be implemented by means of one unit or system in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (2)

1. A method for realizing safe transmission of mine data based on a blockchain, the method comprising:
the method comprises the steps of arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, constructing a sensitive dictionary of the mine data, identifying sensitive characters of the mine data based on the sensitive dictionary, and calculating a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary composed of characters with sensitive degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are the sensitive degrees of the sensitive data through the sensitive values, calculating the sensitive weights of the sensitive characters, and calculating the data safety level of the mine data through the sensitive weights and the sensitive values.
Wherein,The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
Analyzing the data attribute of the equivalent mine data, determining a homomorphic encryption function of the equivalent mine data based on the data attribute, constructing an encryption modulus of the homomorphic encryption function, homomorphic encrypting the equivalent mine data by using the homomorphic encryption function through the encryption modulus to obtain encrypted mine data, analyzing the data transmission requirement of the encrypted mine data, determining a framework selection factor of the mine, quantizing the framework selection factor through the data transmission requirement to obtain a framework selection factor value, constructing a framework selection threshold of the mine through the framework selection factor value, determining a blockchain framework of the mine through the framework selection threshold, performing data slicing on the encrypted mine data through the mine blockchain network to obtain data slices, identifying the access frequency of the data slice, storing the encrypted mine data into corresponding nodes of a unit block chain in a distributed mode through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing the unit block chain of the encrypted mine data based on the block nodes, wherein the architecture selection factor is a factor influencing the chain architecture selection of the mine, the architecture selection factor value is a value obtained by digitizing the architecture selection factor, the architecture selection threshold is a factor threshold obtained by constructing the architecture selection factor value, the data slice is used for slicing the encrypted data, each slice comprises a certain number of slices of data records, the access frequency is the frequency of the data in the data slice, the node slicing refers to a slicing state obtained by uploading sliced data to a corresponding node of the unit block chain, the sliced data is distributed and stored to each node in a mine block chain network, the block nodes refer to the node sliced data stored in a distributed mode and divided into a plurality of blocks according to a certain rule, and each block comprises a certain number of data slices and is associated with other blocks through a hash algorithm;
The encrypted mine data are stored in the corresponding block nodes of the mine block chain network in a distributed mode, and unit block chains are obtained;
Extracting a data transmission record of a data storage process in the unit block chain, dividing the data transmission record into data blocks, and calculating a hash value of the data blocks by using the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
2. A blockchain-based secure transmission system for implementing mine data, for executing the blockchain-based secure transmission method of mine data according to any one of claim 1, the system comprising:
The sensitive data replacing module is used for arranging a data acquisition unit of a mine, acquiring mine data of the mine through the data acquisition unit, constructing a sensitive dictionary of the mine data, identifying sensitive characters of the mine data based on the sensitive dictionary, and calculating a sensitive value of the sensitive characters, wherein the sensitive dictionary is a dictionary consisting of characters with sensitive degrees of the mine data, the sensitive characters are data related to safety risks in the mine data, the sensitive values are data related to the sensitive degrees of the sensitive data through the sensitive values, calculating sensitive weights of the sensitive characters, and calculating the data safety level of the mine data through the sensitive weights and the sensitive values.
Wherein,The data security level of the mine data is represented,Representing the number of types of sensitive characters in the mine data,Representing the sensitive character of the i-th type,A sensitivity value calculation function representing the sensitive character,The sensitivity weight of the sensitive character is represented,A weight calculation function representing the sensitive character,Representing the number of sensitive characters of the ith type, extracting sensitive data of the mine data based on the data security level, analyzing a data structure of the sensitive data, constructing equivalent virtual data of the sensitive data through the data structure, and realizing equivalent replacement of the sensitive data corresponding to the mine data based on the equivalent virtual data to obtain equivalent mine data;
The block chain network construction module is used for analyzing the data attribute of the equivalent mine data, determining a homomorphic encryption function of the equivalent mine data based on the data attribute, constructing an encryption module of the homomorphic encryption function, homomorphic encrypting the equivalent mine data by the homomorphic encryption function through the encryption module to obtain the encrypted mine data, analyzing the data transmission requirement of the encrypted mine data, determining the framework selection factor of the mine, quantizing the framework selection factor through the data transmission requirement to obtain the framework selection factor value, constructing a framework selection threshold of the mine through the framework selection factor value, determining the block chain framework of the mine, slicing the encrypted mine data through the mine block chain network, obtaining data slices, identifying access frequency of the data slices, storing the encrypted mine data into corresponding nodes of unit block links in a distributed mode through the access frequency to obtain node slice data, dividing the node slice data into blocks to obtain block nodes, constructing a unit block chain of the encrypted mine data based on the block nodes, wherein architecture selection factors refer to factors influencing chain architecture selection of the mine, architecture selection factor values refer to values obtained by digitizing the architecture selection factors, architecture selection threshold refers to factor threshold values obtained by constructing architecture selection through the architecture selection factor values, slicing the encrypted data so that each slice contains a certain number of data record slices, the access frequency refers to the frequency of data access in the data slice, the node slice refers to the slice state obtained by uploading slice data to the corresponding node of the unit block link, the sliced data is distributed and stored to each node in the mine block chain network, the block node refers to the node slice data which is distributed and stored is divided into a plurality of blocks according to a certain rule, and each block contains a certain number of data slices and is associated with other blocks through a hash algorithm;
The data storage module is used for storing the encrypted mine data into corresponding block nodes of the mine block chain network in a distributed mode to obtain unit block chains;
The data verification module is used for extracting a data transmission record in the data storage process in the unit block chain, dividing the data transmission record into data blocks, and calculating the hash value of the data blocks by using the following formula:
Wherein, Representing the hash value of the data block,The representation radix, which is an integer greater than 1, is typically chosen to be a large value to reduce the probability of hash collisions,The displacement value representing the radix is used to represent,The recursive function is represented as a function of the recursion,Represent the firstConstructing a transmission transaction tree of the data transmission record through the hash value, and verifying the transmission transaction tree through the unit block chain corresponding trusted node to obtain verification data;
And the intelligent contract construction module is used for generating an authority intelligent contract and a secure transmission protocol of the verification data, and executing data secure transmission of the verification data through the authority intelligent contract and the secure transmission protocol.
CN202410279276.1A 2024-03-12 Safe transmission method and system for mine data based on block chain Active CN117879787B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410279276.1A CN117879787B (en) 2024-03-12 Safe transmission method and system for mine data based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410279276.1A CN117879787B (en) 2024-03-12 Safe transmission method and system for mine data based on block chain

Publications (2)

Publication Number Publication Date
CN117879787A CN117879787A (en) 2024-04-12
CN117879787B true CN117879787B (en) 2024-06-28

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110910139A (en) * 2019-12-04 2020-03-24 北汽蓝谷信息技术有限公司 Trusted hardware based on block chain and high-performance decentralized anonymous encryption algorithm
CN111669442A (en) * 2019-11-27 2020-09-15 朱培培 Data transmission method based on block chain and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669442A (en) * 2019-11-27 2020-09-15 朱培培 Data transmission method based on block chain and electronic equipment
CN110910139A (en) * 2019-12-04 2020-03-24 北汽蓝谷信息技术有限公司 Trusted hardware based on block chain and high-performance decentralized anonymous encryption algorithm

Similar Documents

Publication Publication Date Title
US11956357B2 (en) Traceable key block-chain ledger
Abouzakhar et al. Internet of things security: A review of risks and threats to healthcare sector
CN111786950B (en) Network security monitoring method, device, equipment and medium based on situation awareness
CN111934879A (en) Data transmission encryption method, device, equipment and medium for internal and external network system
US11799630B2 (en) Method and device for blockchain nodes
CN113704781B (en) File secure transmission method and device, electronic equipment and computer storage medium
Jayaraman et al. RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud
CN105791207A (en) network security method and network security service system
CN114826553A (en) Cloud storage data security protection method and device based on group signature and homomorphic encryption
CN104463012A (en) Virtual machine image file exporting and importing method and device
CN108596496A (en) A kind of modularization mixing cloud service system for generating equipment data analysis
Yang et al. An effective and scalable VM migration strategy to mitigate cross-VM side-channel attacks in cloud
CN114301670B (en) Terminal authentication method, device, equipment and medium based on IPV6 address
CN117459327B (en) Cloud data transparent encryption protection method, system and device
CN114885325A (en) Credible auditing method and system for regulating and controlling service network security suitable for 5G network
CN114978664A (en) Data sharing method and device and electronic equipment
Liu et al. Data integrity audit scheme based on quad Merkle tree and blockchain
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
CN117879787B (en) Safe transmission method and system for mine data based on block chain
CN116975884A (en) Data security storage method and device
CN114978649B (en) Information security protection method, device, equipment and medium based on big data
Cao et al. Design and implementation for MD5-based data integrity checking system
CN115119197B (en) Wireless network risk analysis method, device, equipment and medium based on big data
CN117879787A (en) Safe transmission method and system for mine data based on block chain
Du et al. Secure and verifiable keyword search in multiple clouds

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant