[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114338016B - Hazardous waste block chain supervision system and method based on group key negotiation - Google Patents

Hazardous waste block chain supervision system and method based on group key negotiation Download PDF

Info

Publication number
CN114338016B
CN114338016B CN202210017028.0A CN202210017028A CN114338016B CN 114338016 B CN114338016 B CN 114338016B CN 202210017028 A CN202210017028 A CN 202210017028A CN 114338016 B CN114338016 B CN 114338016B
Authority
CN
China
Prior art keywords
information
dangerous waste
blockchain
group
waste
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210017028.0A
Other languages
Chinese (zh)
Other versions
CN114338016A (en
Inventor
叶新荣
邓子豪
张爱清
王勇
彭光宇
杨璐璐
聂雪丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Normal University
Original Assignee
Anhui Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Normal University filed Critical Anhui Normal University
Priority to CN202210017028.0A priority Critical patent/CN114338016B/en
Publication of CN114338016A publication Critical patent/CN114338016A/en
Application granted granted Critical
Publication of CN114338016B publication Critical patent/CN114338016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02WCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO WASTEWATER TREATMENT OR WASTE MANAGEMENT
    • Y02W30/00Technologies for solid waste management
    • Y02W30/50Reuse, recycling or recovery technologies
    • Y02W30/82Recycling of waste of electrical or electronic equipment [WEEE]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02WCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO WASTEWATER TREATMENT OR WASTE MANAGEMENT
    • Y02W90/00Enabling technologies or technologies with a potential or indirect contribution to greenhouse gas [GHG] emissions mitigation

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a hazardous waste blockchain supervision system and method based on group key negotiation, belonging to the technical fields of blockchains, internet of things and privacy protection. Comprising the following steps: the dangerous waste recycling bin monitoring module is used for monitoring dangerous waste state information; the dangerous and useless operation end comprises a group key management module which is used for generating a group encryption key and a group decryption key and carrying out group key management on the following related information: dangerous waste state information, dangerous waste recycling information, dangerous waste transportation information and dangerous waste modification information; the block chain module is used for acquiring encrypted related information through the intelligent contract, so that the service node can write the agreed transaction data into the block chain to form new block chain data; and the blockchain network monitoring module is used for monitoring the blockheight, the intelligent divisor and the number of member nodes of the blockchain. The application protects the sensitive data information by adopting a group key negotiation mode, and utilizes a blockchain network to carry out efficient and safe data storage.

Description

Hazardous waste block chain supervision system and method based on group key negotiation
Technical Field
The application relates to the technical field of blockchains, internet of things and privacy protection, in particular to a system and a method for supervising a hazardous waste blockchain based on group key negotiation.
Background
With the rapid development of socioeconomic performance, a large amount of hazardous waste materials are discharged from some enterprises in production, and the hazardous waste materials pollute the environment and influence human health. The supervision of small and medium-sized enterprises is always a pain point in the industry, and the enterprises are huge in quantity and wide in distribution and lack a complete supervision system. Therefore, a perfect, transparent and credible supervision system needs to be established to deal with the problems existing in the industry.
The block chain technology has the characteristics of decentralization, non-falsification and the like, and relates to the aspects of cryptography, a distributed network, a container technology, a consensus algorithm, intelligent contracts and the like. The blockchain technology is a brand-new distributed infrastructure technology which uses a blockchain data structure to verify and store data, uses a distributed node consensus algorithm to generate and update the data, uses a cryptography mode to ensure the security of data transmission and access and uses an intelligent contract to automatically execute operation, and simultaneously performs non-certification and authenticatable asymmetric group key negotiation based on a non-certification public key cryptography system, wherein a participant only has KGC (key generation center) and n group members. The platform realizes authentication of group membership, correctness of public information and verification of integrity, and ensures safe communication among group members.
Disclosure of Invention
The application aims to provide a hazardous waste block chain supervision system and a hazardous waste block chain supervision method based on group key negotiation, which protect sensitive data information by adopting a group key negotiation mode and utilize a block chain network to store data efficiently and safely.
To achieve the above object, an embodiment of the present application provides a compromised waste blockchain supervision system based on group key negotiation, the compromised waste blockchain supervision system based on group key negotiation comprising:
the dangerous waste recycling bin monitoring module is used for monitoring dangerous waste state information, sending notification information to an enterprise through a dangerous waste operation terminal when the stock of the dangerous waste information displayed by the dangerous waste state information exceeds a preset stock threshold value, and arranging a transport vehicle to recycle according to the dangerous waste information;
the dangerous waste operation end comprises:
a group key management module for generating a group encryption key and a group decryption key, and performing group key management on the following related information so that the related information can be shared inside a specific member: dangerous waste state information, dangerous waste waiting recycling information, dangerous waste transportation information and dangerous waste modification information from the transport vehicle and the dangerous waste recycling bin monitoring module;
the block chain module is used for acquiring the encrypted related information through the intelligent contract and sending the related information to all service nodes in the block chain, so that the service nodes can write the agreed transaction data into the block chain to form new block chain data;
and the blockchain network monitoring module is used for monitoring the blockheight, the intelligent divisor and the number of member nodes of the blockchain.
Preferably, the group key management module includes:
a channel forming sub-module, configured to form a channel by a group of supervisors, in which information is managed, wherein each supervisors registers as a blockchain node through a certificate provided by a member service; the public and private keys of each member of the supervisor group correspond to the Fabric network and can interact with the CA to perform identity management and verification;
the system parameter generating sub-module is used for generating system parameters through a polynomial, generating cyclic groups on elliptic curves with two orders of prime numbers q, generating elements of the groups, calculating a main public key by using random numbers as main keys, selecting four safe hash functions by the system, randomly selecting identity information by a user, calculating part of public keys, generating public key pairs, entering a key negotiation process, wherein each block chain node calculates corresponding message content, performs block encapsulation and transmission on the message content, and executing the following steps:
(1) Initializing a system: inputting a safety parameter m to generate a system parameter params= (q, g) 1 ,g 2 ,e,p,pb,h 1 ,h 2 ,h 3 ,h 4 ) Wherein g 1 And g 2 Is a cyclic group g on an elliptic curve with two orders of prime number q 1 G is addition group g 2 For multiplication groups, map e: g 1 *g 2 →g 2 For a bilinear map, p is the group g 1 Is a generator of (1);selecting the hash number, h 1 ,h 2 ,h 3 {0,1} * ∈g 1 ,/>
(2) Generating a public and private key of a user: each member selects identity id i ∈{0,1} * Partial public key Q i =h i (id), partial private Key D i =sQ i Transmitting part of public key to each user through channel, user selecting random numberAs another part of the private key, another part of the public key is P i =x i p;
(3) Signature: each member u in the group i With the same state information θ, t messages to be signed are (m 1 ,m 2 ,…,m t ) Selecting a random number r i ∈Z * Calculating R i =r i P is as follows; calculate v=h 2 (θ),h i =h 4 (θ\\D i \\P i \\R i ) Calculating T for each message j =h 3 (θ\\m j ) Wherein 1 is<=j<=t; calculating t signature values s i,j =D i +x i (h i *pub+V)+r i T j ;u i Output delta i =(R i ,s i,1 ,s i,2 ,…,s i,t ) As a batch signature message;
and the encryption sub-module is used for encrypting the dangerous waste state information by using a public key before the user stores the dangerous waste state information in a uplink, and after the dangerous waste state information is stored by using a blockchain, the dangerous waste state information can be decrypted by using a private key to inquire multi-ring throttling information corresponding to the dangerous waste state information, wherein the public key is stored on the blockchain by the user, and the private key is stored locally.
Preferably, the blockchain module includes:
the supervision certificate acquisition sub-module is used for acquiring a certificate through MSP service based on a fabric alliance chain network member and taking the certificate as a node joining channel;
the contract deployment sub-module is used for deploying an intelligent contract in each node, wherein the intelligent contract is used for acquiring the dangerous waste information, the dangerous waste recycling information, the transportation information and the rectifying information encrypted by the group key management module; wherein the smart contract is configured to be written in a Go language;
the data writing sub-module is used for sending the dangerous waste recycling information, the transportation information and the rectifying information to all service nodes in the blockchain, so that the service nodes can write the agreed transaction data into the blockchain to form new blockchain data;
and the distributed storage sub-module is used for carrying out distributed storage on the dangerous waste state information on the blockchain.
Preferably, the blockchain network monitoring module includes:
the storage sub-module is used for accessing the configuration information of the blockchain module at fixed time intervals, collecting the log and the node state related data of the blockchain module and storing the log and the node state related data in a database;
and the display sub-module is used for displaying the block height, the intelligent divisor and the number of member nodes on the block chain.
Preferably, the hazardous waste blockchain supervision system based on group key negotiation further comprises:
the internet of things equipment is connected with the hazardous waste recycling bin monitoring module and the hazardous waste operation end and is used for sending the hazardous waste state information to the hazardous waste operation end; wherein the internet of things device is configured to use a 5G network.
In addition, the application also provides a hazardous waste block chain supervision method based on group key negotiation, which is characterized in that the hazardous waste block chain supervision system based on the group key negotiation is used, and the hazardous waste block chain supervision method based on the group key negotiation comprises the following steps:
the dangerous waste state information monitored by the dangerous waste recycling bin monitoring module is sent to a dangerous waste operation end through Internet of things equipment;
when the stock of the dangerous waste information displayed by the dangerous waste state information exceeds a preset stock threshold, sending notification information to an enterprise through a dangerous waste operation end, and arranging a transport vehicle to recycle according to the dangerous waste information;
generating, by the group key management module, a group encryption key and a group decryption key, and performing group key management on the following related information so that the related information can be shared inside a specific member: dangerous waste state information, dangerous waste waiting recycling information, dangerous waste transportation information and dangerous waste modification information from the transport vehicle and the dangerous waste recycling bin monitoring module;
acquiring the encrypted related information through an intelligent contract, and sending the related information to all service nodes in a blockchain, so that the service nodes can write the agreed transaction data into the blockchain to form new blockchain data; and
the group members can acquire the block height, the intelligent reduction number and the member node number of the blockchain obtained through monitoring.
Preferably, the hazardous waste recycling information comprises at least one of enterprise names, managers and contact ways and hazardous waste recycling addresses;
the transportation information comprises at least one of transportation serial number, transportation license plate number, transportation personnel, transportation person contact telephone, recycling enterprise number, freight bill state, creation time, uplink hash and operation detail information;
the correction information comprises at least one of enterprise name, correction responsible person, correction person contact, correction time, correction state, uplink time, uplink hash and correction operation information.
In addition, the application also provides a machine-readable storage medium, wherein the machine-readable storage medium is stored with instructions for causing a machine to execute the above-mentioned hazardous waste block chain supervision method based on group key agreement.
In addition, the present application also provides a processor for executing a program, wherein the program is executed to execute: the above-described compromised waste blockchain supervision method based on group key agreement.
According to the technical scheme, the recovery information is acquired through the Internet of things module, the information in the hazardous waste treatment process is transmitted to the hazardous waste blockchain supervision system based on group key negotiation, the sensitive data information is protected in a group key negotiation mode, and the blockchain network is utilized for efficient and safe data storage.
Additional features and advantages of embodiments of the application will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain, without limitation, the embodiments of the application. In the drawings:
FIG. 1 is a block diagram illustrating a compromised waste blockchain supervision system based on group key agreement in accordance with the present application;
FIG. 2 is a flow chart of group key negotiation and fabric interactions
FIG. 3 is a fabric transaction flow diagram;
FIG. 4 is a block diagram of a group key negotiation design;
fig. 5 is a block diagram of a compromised waste blockchain supervision system module based on group key agreement.
Detailed Description
The following describes the detailed implementation of the embodiments of the present application with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the application, are not intended to limit the application.
Fig. 1 is a block diagram of a compromised waste blockchain supervision system based on group key agreement, provided by the application, comprising: the dangerous waste recycling bin monitoring module is used for monitoring dangerous waste state information, sending notification information to an enterprise through a dangerous waste operation terminal when the stock of the dangerous waste information displayed by the dangerous waste state information exceeds a preset stock threshold value, and arranging a transport vehicle to recycle according to the dangerous waste information; wherein, through thing networking equipment such as camera, sensor, real-time relevant information transmission to danger waste material in storage, transportation, processing link to danger useless operation end through 5G network, when the danger waste material reaches the useless stock threshold value of danger of settlement, danger useless operation end will inform the enterprise, arranges the transport vechicle simultaneously and retrieves.
The dangerous waste operation end comprises:
a group key management module for generating a group encryption key and a group decryption key, and performing group key management on the following related information so that the related information can be shared inside a specific member: dangerous waste state information, dangerous waste waiting recycling information, dangerous waste transportation information and dangerous waste modification information from the transport vehicle and the dangerous waste recycling bin monitoring module;
the block chain module is used for acquiring the encrypted related information through the intelligent contract and sending the related information to all service nodes in the block chain, so that the service nodes can write the agreed transaction data into the block chain to form new block chain data;
wherein, the dangerous waste state information transmitted by the dangerous waste recycling bin and the transport vehicle is obtained through the Internet of things equipment, the dangerous waste state information, the dangerous waste waiting recycling information, the dangerous waste transport information and the dangerous waste modification information are displayed in real time, the information is subjected to data encryption through group key management, the system is shared among the specified group members, privacy protection is realized, encrypted dangerous waste state information, dangerous waste to-be-recovered information, dangerous waste transportation information and dangerous waste correction information are stored and uplink through a block chain module.
The dangerous waste recycling information comprises at least one of enterprise names, management persons, contact ways and dangerous waste recycling addresses. The transportation information comprises at least one of transportation serial number, transportation license plate number, transportation personnel, transportation person contact telephone, recycling enterprise number, freight bill state, creation time, uplink hash and operation detail information; the rectifying information comprises at least one of enterprise name, rectifying responsible person, rectifying person contact way, rectifying time, rectifying state, uplink time, uplink hash and rectifying operation information.
And the blockchain network monitoring module is used for monitoring the blockheight, the intelligent divisor and the number of member nodes of the blockchain.
Preferably, as shown in fig. 2, the group key negotiation and fabric interaction flow, the group key management module may include:
a channel forming sub-module, configured to form a channel by a group of supervisors, in which information is managed, wherein each supervisors registers as a blockchain node through a certificate provided by a member service; wherein the public and private keys of each member of the supervisor group correspond to a Fabric network capable of interacting with a certificate authority (CA, certificate Authority) for identity management and verification; wherein,
the system parameter generating sub-module is used for generating system parameters through a polynomial, generating cyclic groups on elliptic curves with two orders of prime numbers q, generating elements of the groups, calculating a main public key by using random numbers as main keys, selecting four safe hash functions by the system, randomly selecting identity information by a user, calculating part of public keys, generating public key pairs, entering a key negotiation process, wherein each block chain node calculates corresponding message content, performs block encapsulation and transmission on the message content, and executing the following steps:
(1) Initializing a system: inputting a safety parameter m to generate a system parameter params= (q, g) 1 ,g 2 ,e,p,pb,h 1 ,h 2 ,h 3 ,h 4 ) Wherein g 1 And g 2 Elliptic curve with two orders of prime qCycle group, g 1 G is addition group g 2 For multiplication groups, map e: g 1 *g 2 →g 2 For a bilinear map, p is the group g 1 Is a generator of (1);selecting the hash number, h 1 ,h 2 ,h 3 {0,1} * ∈g 1 ,/>
(2) Generating a public and private key of a user: each member selects identity id i ∈{0,1} * Partial public key Q i =h i (id), partial private Key D i =sQ i Transmitting part of public key to each user through channel, user selecting random numberAs another part of the private key, another part of the public key is P i =x i p;
(3) Signature: each member u in the group i With the same state information θ, t messages to be signed are (m 1 ,m 2 ,…,m t ) Selecting a random number r i ∈Z * Calculating R i =r i P is as follows; calculate v=h 2 (θ),h i =h 4 (θ\\D i \\P i \\R i ) Calculating T for each message j =h 3 (θ\\m j ) Wherein 1 is<=j<=t; calculating t signature values s i,j =D i +x i (h i *pub+V)+r i T j ;u i Output delta i =(R i ,s i,1 ,s i,2 ,…,s i,t ) As a batch signature message;
and the encryption sub-module is used for encrypting the dangerous waste state information by using a public key before the user stores and uplinks the dangerous waste state information, namely, the group members encrypt the information by using the public key before the user stores and uplinks the dangerous waste state information, after the dangerous waste state information is stored by using the blockchain, the dangerous waste state information can be decrypted by using a private key to inquire multi-ring throttling information corresponding to the dangerous waste state information, wherein the public key is stored on the blockchain by the user, and the private key is stored locally. The user stores the public key on the blockchain and the private key is stored locally, so that the information is prevented from being stolen and tampered by members outside the group.
Preferably, the blockchain module may include: a supervision certificate acquisition sub-module, configured to acquire a certificate through a management service provider (MSP, managed Service provider) based on a fabric alliance chain network member, as a node joining channel; the contract deployment sub-module is used for deploying an intelligent contract in each node, wherein the intelligent contract is used for acquiring the dangerous waste information, the dangerous waste recycling information, the transportation information and the rectifying information encrypted by the group key management module; wherein the smart contract is configured to be written in a Go language; the data writing sub-module is used for sending the dangerous waste recycling information, the transportation information and the rectifying information to all service nodes in the blockchain, so that the service nodes can write the agreed transaction data into the blockchain to form new blockchain data; and the distributed storage sub-module is used for carrying out distributed storage on the dangerous waste state information on the blockchain.
Specifically, the blockchain module obtains certificates through MSP services by members such as enterprises, transport vehicles, supervisors and the like in the supervision system based on a fabric alliance chain network, the certificates are used as node joining channels, intelligent contracts written in Go language are deployed in each node, the intelligent contracts are used for obtaining dangerous waste information and dangerous waste recycling information encrypted by the group key management module, the transportation information is modified, the dangerous waste recycling information is transported, the modification information is then sent to all service nodes in the blockchain, the service nodes write the agreed transaction data into the blockchain to form new blockchain data, and the transaction flow is simulated, sequenced and booked to realize distributed storage of data on the blockchain. The user may query the information on the chain from the blockchain module and decrypt with the private key generated in the group key management module.
Preferably, the blockchain network monitoring module may include: the storage sub-module is used for accessing the configuration information of the blockchain module at fixed time intervals, collecting the log and the node state related data of the blockchain module and storing the log and the node state related data in a database; and the display sub-module is used for displaying the block height, the intelligent divisor and the number of member nodes on the block chain. The blockchain network monitoring module is built through a Promitus monitoring technology, accesses blockchain network configuration information at fixed time intervals through an HTTP protocol, collects data such as logs and node states of the blockchain module, and stores the data in a MySQL database built by a cloud server, so that characteristic information such as the height of a block on the blockchain, intelligent reduction numbers and the number of member nodes are displayed in real time.
Preferably, the compromised waste blockchain supervision system based on group key agreement may further comprise: the internet of things equipment is connected with the hazardous waste recycling bin monitoring module and the hazardous waste operation end and is used for sending the hazardous waste state information to the hazardous waste operation end; wherein the internet of things device is configured to use a 5G network.
In the present application, the hazardous waste blockchain supervision system based on group key negotiation, as shown in fig. 4 and 5, includes a data acquisition layer, a data processing layer, and an application layer: the data acquisition layer is composed of Internet of things equipment installed on enterprises and transport vehicles, and monitors dangerous waste stock, type, state and other data in real time. The data processing layer processes the received dangerous waste data through the group key management and the blockchain network of fig. 5, and schedules personnel to dispatch and recycle; the application layer is used for displaying data in the supervision flow, carrying out real-time monitoring and management on dangerous wastes through all-around and multi-flow, acquiring required information on a blockchain, decrypting private information by using a group decryption key generated by a group key management module, and communicating with nodes such as enterprises, transport vehicles, dangerous waste recycling positions and the like to realize information sharing among group members as shown in fig. 4.
In addition, the application also provides a hazardous waste block chain supervision method based on group key negotiation, which is characterized in that the hazardous waste block chain supervision system based on the group key negotiation is used, and the hazardous waste block chain supervision method based on the group key negotiation comprises the following steps:
the dangerous waste state information monitored by the dangerous waste recycling bin monitoring module is sent to a dangerous waste operation end through Internet of things equipment;
when the stock of the dangerous waste information shown by the dangerous waste state information exceeds a preset stock threshold, sending notification information to an enterprise through a dangerous waste operation end, and arranging a transport vehicle to recycle the dangerous waste information;
generating, by the group key management module, a group encryption key and a group decryption key, and performing group key management on the following related information so that the related information can be shared inside a specific member: dangerous waste state information, dangerous waste waiting recycling information, dangerous waste transportation information and dangerous waste modification information from the transport vehicle and the dangerous waste recycling bin monitoring module;
acquiring the encrypted related information through an intelligent contract, and sending the related information to all service nodes in a blockchain, so that the service nodes can write the agreed transaction data into the blockchain to form new blockchain data; and
the group members can acquire the block height, the intelligent reduction number and the member node number of the blockchain obtained through monitoring.
Preferably, the hazardous waste recycling information comprises at least one of enterprise names, managers and contact ways and hazardous waste recycling addresses;
the transportation information comprises at least one of transportation serial number, transportation license plate number, transportation personnel, transportation person contact telephone, recycling enterprise number, freight bill state, creation time, uplink hash and operation detail information;
the correction information comprises at least one of enterprise name, correction responsible person, correction person contact, correction time, correction state, uplink time, uplink hash and correction operation information.
In addition, the application also provides a machine-readable storage medium, wherein the machine-readable storage medium is stored with instructions for causing a machine to execute the above-mentioned hazardous waste block chain supervision method based on group key agreement.
In addition, the present application also provides a processor for executing a program, wherein the program is executed to execute: the above-described compromised waste blockchain supervision method based on group key agreement.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (7)

1. A group key agreement based hazardous waste blockchain supervision system, the group key agreement based hazardous waste blockchain supervision system comprising:
the dangerous waste recycling bin monitoring module is used for monitoring dangerous waste state information, sending notification information to an enterprise through a dangerous waste operation terminal when the stock of the dangerous waste information displayed by the dangerous waste state information exceeds a preset stock threshold value, and arranging a transport vehicle to recycle according to the dangerous waste information;
the dangerous waste operation end comprises:
a group key management module for generating a group encryption key and a group decryption key, and performing group key management on the following related information so that the related information can be shared inside a specific member: dangerous waste state information, dangerous waste waiting recycling information, dangerous waste transportation information and dangerous waste modification information from the transport vehicle and the dangerous waste recycling bin monitoring module;
the block chain module is used for acquiring the encrypted related information through the intelligent contract and sending the related information to all service nodes in the block chain, so that the service nodes can write the agreed transaction data into the block chain to form new block chain data;
the block chain network monitoring module is used for monitoring the block height, the intelligent divisor and the number of member nodes of the block chain;
the group key management module includes:
a channel forming sub-module, configured to form a channel by a group of supervisors, in which information is managed, wherein each supervisors registers as a blockchain node through a certificate provided by a member service; wherein the public and private keys of each member of the supervisor group correspond to a Fabric network, and are capable of interacting with a certificate authority for identity management and verification;
the system parameter generating sub-module is used for generating system parameters through a polynomial, generating cyclic groups on elliptic curves with two orders of prime numbers q, generating elements of the groups, calculating a main public key by using random numbers as main keys, selecting four safe hash functions by the system, randomly selecting identity information by a user, calculating part of public keys, generating public key pairs, entering a key negotiation process, wherein each block chain node calculates corresponding message content, performs block encapsulation and transmission on the message content, and executing the following steps:
(1) Initializing a system: inputting a safety parameter m to generate a system parameter params= (q, g) 1 ,g 2 ,e,p,pb,h 1 ,h 2 ,h 3 ,h 4 ) Wherein g 1 And g 2 Is a cyclic group g on an elliptic curve with two orders of prime number q 1 G is addition group g 2 For multiplication groups, map e: g 1 *g 2 →g 2 For a bilinear map, p is the group g 1 Is a generator of (1);selecting the hash number, h 1 ,h 2 ,h 3 {0,1} * ∈g 1 ,/>
(2) Generating a public and private key of a user: each member selects identity id i ∈{0,1} * Partial public key Q i =h i (id), partial private Key D i =sQ i Transmitting part of public key to each user through channel, user selecting random numberAs another part of the private key, another part of the public key is P i =x i p;
(3) Signature: each member ui in the group has the same status information θ, and t messages to be signed are (m 1 ,m 2 ,…,m t ) Selecting a random number r i ∈Z * Calculating R i =r i P is as follows; calculate v=h 2 (θ),h i =h 4 (θ\\D i \\P i \\R i ) Calculating T for each message j =h 3 (θ\\m j ) Wherein 1 is<=j<=t; calculating t signature values s i ,j=D i +x i (h i *pub+V)+r i T j ;u i Output delta i =(R i ,s i ,1,s i ,2,···,s i T) as a bulk signature message;
the encryption sub-module is used for encrypting the dangerous waste state information by using a public key before the user stores the dangerous waste state information in a chain, and after the dangerous waste state information is stored in a block chain, the dangerous waste state information can be decrypted by using a private key to inquire multi-ring throttle information corresponding to the dangerous waste state information, wherein the public key is stored in the block chain by the user, and the private key is stored locally;
the blockchain module includes:
the supervision certificate acquisition sub-module is used for acquiring a certificate based on a fabric alliance chain network member through a management service provider and taking the certificate as a node joining channel;
the contract deployment sub-module is used for deploying an intelligent contract in each node, wherein the intelligent contract is used for acquiring the dangerous waste information, the dangerous waste recycling information, the transportation information and the rectifying information encrypted by the group key management module; wherein the smart contract is configured to be written in a Go language;
the data writing sub-module is used for sending the dangerous waste recycling information, the transportation information and the rectifying information to all service nodes in the blockchain, so that the service nodes can write the agreed transaction data into the blockchain to form new blockchain data;
and the distributed storage sub-module is used for carrying out distributed storage on the dangerous waste state information on the blockchain.
2. The group key negotiation-based hazard waste blockchain supervision system of claim 1, wherein the blockchain network monitoring module comprises:
the storage sub-module is used for accessing the configuration information of the blockchain module at fixed time intervals, collecting the log and the node state related data of the blockchain module and storing the log and the node state related data in a database;
and the display sub-module is used for displaying the block height, the intelligent divisor and the number of member nodes on the block chain.
3. The group key negotiation based hazard waste blockchain supervision system of claim 1, further comprising:
the internet of things equipment is connected with the hazardous waste recycling bin monitoring module and the hazardous waste operation end and is used for sending the hazardous waste state information to the hazardous waste operation end; wherein the internet of things device is configured to use a 5G network.
4. A group key negotiation based jeopardy waste blockchain supervision method, characterized in that the group key negotiation based jeopardy waste blockchain supervision system of any one of claims 1-3 is used, the group key negotiation based jeopardy waste blockchain supervision method comprising:
the dangerous waste state information monitored by the dangerous waste recycling bin monitoring module is sent to a dangerous waste operation end through Internet of things equipment;
when the stock of the dangerous waste information displayed by the dangerous waste state information exceeds a preset stock threshold, sending notification information to an enterprise through a dangerous waste operation end, and arranging a transport vehicle to recycle according to the dangerous waste information;
generating, by the group key management module, a group encryption key and a group decryption key, and performing group key management on the following related information so that the related information can be shared inside a specific member: dangerous waste state information, dangerous waste waiting recycling information, dangerous waste transportation information and dangerous waste modification information from the transport vehicle and the dangerous waste recycling bin monitoring module;
acquiring the encrypted related information through an intelligent contract, and sending the related information to all service nodes in a blockchain, so that the service nodes can write the agreed transaction data into the blockchain to form new blockchain data; and
the group members can acquire the block height, the intelligent reduction number and the member node number of the blockchain obtained through monitoring.
5. The group key negotiation-based hazard waste blockchain supervision method of claim 4, wherein the hazardous waste recovery information comprises at least one of a business name, a manager and contact, and a hazardous waste recovery address;
the transportation information comprises at least one of transportation serial number, transportation license plate number, transportation personnel, transportation person contact telephone, recycling enterprise number, freight bill state, creation time, uplink hash and operation detail information;
the correction information comprises at least one of enterprise name, correction responsible person, correction person contact, correction time, correction state, uplink time, uplink hash and correction operation information.
6. A machine-readable storage medium having instructions stored thereon for causing a machine to perform the group key negotiation based hazard waste blockchain supervision method of any of claims 4, 5.
7. A processor configured to execute a program, wherein the program is configured to, when executed, perform: a method of compromised waste blockchain supervision based on group key agreement as recited in any one of claims 4, 5.
CN202210017028.0A 2022-01-08 2022-01-08 Hazardous waste block chain supervision system and method based on group key negotiation Active CN114338016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210017028.0A CN114338016B (en) 2022-01-08 2022-01-08 Hazardous waste block chain supervision system and method based on group key negotiation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210017028.0A CN114338016B (en) 2022-01-08 2022-01-08 Hazardous waste block chain supervision system and method based on group key negotiation

Publications (2)

Publication Number Publication Date
CN114338016A CN114338016A (en) 2022-04-12
CN114338016B true CN114338016B (en) 2023-11-24

Family

ID=81024912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210017028.0A Active CN114338016B (en) 2022-01-08 2022-01-08 Hazardous waste block chain supervision system and method based on group key negotiation

Country Status (1)

Country Link
CN (1) CN114338016B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114928617B (en) * 2022-06-15 2023-07-21 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN116109225B (en) * 2022-10-27 2023-08-11 大连理工大学 Block chain-based dangerous waste treatment service platform, device and storage medium
CN115580402B (en) * 2022-12-09 2023-03-17 蓝象智联(杭州)科技有限公司 Data hiding query method for secure multi-party computation
CN115994754B (en) * 2023-03-24 2023-06-27 浙江蓝景科技有限公司 Ocean plastic garbage electronic bill management system based on block chain technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2124381A1 (en) * 2007-06-08 2009-11-25 Huawei Technologies Co., Ltd. Method, system and device for generating group key
CN110011795A (en) * 2019-04-12 2019-07-12 郑州轻工业学院 Symmetric group cryptographic key negotiation method based on block chain
CN110266482A (en) * 2019-06-21 2019-09-20 郑州轻工业学院 A kind of asymmetric group key agreement method based on block chain
CN113744103A (en) * 2021-08-06 2021-12-03 中荣环境科技(江苏)有限公司 Dangerous waste treatment supervision platform based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2124381A1 (en) * 2007-06-08 2009-11-25 Huawei Technologies Co., Ltd. Method, system and device for generating group key
CN110011795A (en) * 2019-04-12 2019-07-12 郑州轻工业学院 Symmetric group cryptographic key negotiation method based on block chain
CN110266482A (en) * 2019-06-21 2019-09-20 郑州轻工业学院 A kind of asymmetric group key agreement method based on block chain
CN113744103A (en) * 2021-08-06 2021-12-03 中荣环境科技(江苏)有限公司 Dangerous waste treatment supervision platform based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
会话密钥协商协议研究进展;胡志言;杜学绘;曹利峰;;计算机应用与软件(第05期);全文 *

Also Published As

Publication number Publication date
CN114338016A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN114338016B (en) Hazardous waste block chain supervision system and method based on group key negotiation
CN111935075B (en) Digital identity issuing method, device and medium based on blockchain
Rahman et al. EduChain: CIA-compliant blockchain for intelligent cyber defense of microservices in education industry 4.0
CN107342861A (en) A kind of data processing method, apparatus and system
CN113704210A (en) Data sharing method and electronic equipment
CN112332975A (en) Internet of things equipment secure communication method and system
CN102821098A (en) System and method for self-dissolving instant messaging under cloud environment
CN104053149A (en) Method and system for realizing security mechanism of vehicle networking equipment
CN114244534A (en) Data storage method, device, equipment and storage medium
CN110866261A (en) Data processing method and device based on block chain and storage medium
CN110717190A (en) Distributed data storage method and device and data storage equipment
CN104160651A (en) Byzantine fault tolerance and threshold coin tossing
CN112579112B (en) Mirror image security processing and deploying method, device and storage medium
CN112989406A (en) Information processing method, device, equipment and storage medium
CN111460465A (en) Identity authentication method, equipment and medium based on block chain
CN111460466A (en) Block chain-based electronic ticket management method, device and medium
CN107016267B (en) Resource operation method and system in offline state
CN115208630B (en) Block chain-based data acquisition method and system and block chain system
CN117035890A (en) Transaction security method, device, system, medium and equipment of electronic invoice
CN113132109B (en) Electronic deposit certificate management method and device based on block chain and electronic equipment
CN115409511A (en) Personal information protection system based on block chain
CN114301710B (en) Method for determining whether message is tampered, secret pipe platform and secret pipe system
CN112699391A (en) Target data sending method and privacy computing platform
CN111431880A (en) Information processing method and device
CN117010000B (en) Data security service method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant