CN112202552B - Method, device, medium and electronic equipment for monitoring quality of block chain data - Google Patents
Method, device, medium and electronic equipment for monitoring quality of block chain data Download PDFInfo
- Publication number
- CN112202552B CN112202552B CN202011019182.9A CN202011019182A CN112202552B CN 112202552 B CN112202552 B CN 112202552B CN 202011019182 A CN202011019182 A CN 202011019182A CN 112202552 B CN112202552 B CN 112202552B
- Authority
- CN
- China
- Prior art keywords
- data
- shared data
- identity information
- voting
- members
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Factory Administration (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the application discloses a method, a device, a medium and an electronic device for monitoring the quality of block chain data. The method comprises the following steps: receiving shared data of a data provider, and acquiring identity information of the data provider; encrypting the identity information to obtain an encryption result; transmitting the shared data and the encryption result association to a block chain; responding to a shared data tracing request of a data user, and initiating voting to a member of the alliance associated with the shared data; and if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality. By executing the scheme, the quality of data provided by a data provider can be monitored, and the healthy development of the whole block chain data sharing network is ensured.
Description
Technical Field
The embodiment of the application relates to the technical field of block chains, in particular to a method, a device, a medium and electronic equipment for monitoring the quality of block chain data.
Background
Sharing data on the blockchain means that a blockchain participant (data provider) stores data into an intelligent account book of the blockchain by calling an intelligent contract of the blockchain, and other blockchain participants (data users) can inquire the shared data by calling the intelligent contract of the blockchain.
When sharing data, the data provider may provide the data in real name, and in order to protect privacy, the data provider may provide the data anonymously. When the real name is provided, the data provider uses a self-published address to access the block chain; while anonymous provisioning, data providers typically use a random address to access the blockchain.
Whether provided by real name or anonymous, the data provider may provide some data with problematic data quality for various purposes, and the data user may have adverse effects after using the data with problematic data quality, and the whole block chain data sharing network becomes increasingly unreliable while the service of the user is affected.
Disclosure of Invention
The embodiment of the application provides a method, a device, a medium and an electronic device for monitoring the quality of blockchain data, which can monitor the quality of data provided by a data provider and ensure the healthy development of the whole blockchain data sharing network.
In a first aspect, an embodiment of the present application provides a method for monitoring quality of block chain data, where the method includes:
receiving shared data of a data provider, and acquiring identity information of the data provider;
encrypting the identity information to obtain an encryption result; transmitting the shared data and the encryption result association to a block chain;
responding to a shared data tracing request of a data user, and initiating voting to a member of the alliance associated with the shared data;
and if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality.
In a second aspect, an embodiment of the present application provides an apparatus for monitoring quality of block chain data, where the apparatus includes:
the shared data receiving module is used for receiving shared data of a data provider and acquiring identity information of the data provider;
the encrypted result obtaining module is used for encrypting the identity information to obtain an encrypted result; transmitting the shared data and the encryption result association to a block chain;
the voting initiation module is used for responding to a shared data tracing request of a data user and initiating voting to the alliance members related to the shared data;
and the identity information obtaining module is used for decrypting the encrypted result by adopting a decryption algorithm if the voting result meets the preset condition to obtain the identity information of the data provider so as to monitor the quality.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method for quality monitoring of blockchain data according to an embodiment of the present application.
In a fourth aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable by the processor, where the processor executes the computer program to implement the method for monitoring quality of blockchain data according to the embodiment of the present application.
According to the technical scheme, shared data of a data provider are received, identity information of the data provider is obtained, encryption processing is carried out on the identity information, an encryption result is obtained, the shared data and the encryption result are transmitted to a block chain in an associated mode, voting is initiated to a member of a union associated with the shared data in response to a shared data tracing request of a data user, if the voting result meets a preset condition, a decryption algorithm is adopted to decrypt the encryption result, the identity information of the data provider is obtained, and quality monitoring is carried out. By executing the technical scheme, the quality of data provided by a data provider can be monitored, and the healthy development of the whole block chain data sharing network is ensured.
Drawings
Fig. 1 is a flowchart of a method for monitoring quality of blockchain data according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a method for monitoring quality of blockchain data according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of a device for monitoring quality of blockchain data according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example one
Fig. 1 is a flowchart of a method for monitoring quality of blockchain data according to an embodiment of the present invention, where the method is applicable to a data quality monitoring situation, and the method can be executed by a device for monitoring quality of blockchain data according to an embodiment of the present invention, where the device can be implemented by software and/or hardware, and can be integrated in an electronic device such as an intelligent terminal for monitoring data quality.
As shown in fig. 1, the method for monitoring quality of block chain data includes:
s110, receiving shared data of a data provider, and acquiring identity information of the data provider.
The shared data may be a code, a document, or a picture. The data provider may provide any form of shared data.
In this embodiment, the identity information may be the name, address, number, etc. of the data provider, and the identity information of the data provider is obtained to trace the data provider. For example, the identity information of the data provider is a name, and the data provider identity can be determined. Preferably, the identity information may be a number, and different users may use the respective numbers on the blockchain, and the corresponding data provider may be found through the numbers.
In this embodiment, the blockchain server is used to receive the shared data provided by the data provider. The data sharing on the blockchain means that a blockchain participant (data provider) stores data into an intelligent account book of the blockchain by calling an intelligent contract of the blockchain, and other blockchain participants (data users) can inquire the shared data by calling the intelligent contract of the blockchain. A block chain (block chain) is a decentralized database. The distributed node consensus algorithm is a brand new distributed infrastructure and computing mode which uses a block chain data structure to store data, uses a distributed node consensus algorithm to verify and update data, uses cryptography to ensure the safety of data transmission and access, and uses automated script codes to operate data.
S120, encrypting the identity information to obtain an encryption result; and transmitting the shared data and the encryption result association to a block chain.
Among other things, encryption is a technique for restricting access to data transmitted over a network. The encoded data resulting from the original data being encrypted by the encryption device and the key is referred to as ciphertext. The process of restoring the ciphertext to the original plaintext is called decryption, which is the reverse process of encryption, but the decryptor must decrypt the ciphertext with the same type of encryption device and key.
In this embodiment, the encryption processing on the identity information may be symmetric encryption or asymmetric encryption. In the symmetric encryption algorithm, a data sender and a data receiver use the same set of rules to encrypt and decrypt data; asymmetric encryption refers to encryption techniques integrated into a blockchain to meet security requirements and ownership verification requirements. It differs from symmetric encryption mainly in that symmetric encryption uses a shared key to decrypt data, whereas asymmetric encryption uses a "key pair" to decrypt data, the key pair comprising two parts: one public key and one private key. Preferably, the identity information is encrypted by adopting an asymmetric encryption mode. The identity information is encrypted in an asymmetric encryption mode, so that the safety of the ciphertext in the transmission process can be ensured.
In the present embodiment, the encryption result may be an unreadable code, document, or picture. Only holding the corresponding decryption key can decrypt the encrypted information into readable plain text.
In this embodiment, the shared data and the encryption result are associated and transmitted to the blockchain, that is, the corresponding encryption result can be determined by the shared data. The data user can obtain the shared data sent by the data provider, and can also obtain the ciphertext of the identity information of the data provider, when finding the data with problems, the data user can initiate tracing, decrypt the ciphertext of the identity information of the data provider to obtain the identity information of the data provider.
In this technical solution, optionally, the encrypting the identity information to obtain an encryption result includes:
processing the identity information by adopting a threshold encryption algorithm to obtain at least two key fragments;
and encrypting the at least two key fragments by adopting the encryption public keys stored by the at least two coalition members associated with the shared data to obtain key fragment ciphertexts.
In this embodiment, the threshold encryption algorithm may be an algorithm that divides the identity information into multiple pieces of information and encrypts the pieces of information respectively during encryption. For example, the identity information may be divided into n shares using a threshold encryption algorithm.
In this embodiment, the encryption public key stored by the federation member associated with the shared data is used to encrypt the key fragment, so as to obtain a key fragment ciphertext. Namely, the encryption public keys stored by different alliance members are adopted for encrypting each key fragment. It can be understood that when there are n key fragments, n coalition members are required to encrypt the key fragments by using the stored encryption public keys to obtain key fragment ciphertexts.
The encryption public keys stored by the at least two coalition members associated with the shared data are used for encrypting the at least two key fragments to obtain the key fragment ciphertexts, so that each key fragment can be encrypted by adopting different encryption methods, and the safety of the key fragment is ensured.
In the present technical solution, optionally, the number of the coalition members is the same as the number of the key fragments;
the encrypting the at least two key fragments by using the encryption public keys stored by the at least two coalition members associated with the shared data includes:
and distributing the at least two key fragments to at least two alliance members to encrypt by adopting alliance member encryption public keys corresponding to the key fragments.
In this embodiment, the number of the coalition members is the same as the number of the key fragments, that is, the identity information may be divided into a plurality of key fragments with the same number as the number of the coalition members according to the number of the coalition members. For example, when the number of the coalition members is 5, the identity information is divided into 5 key fragments; when the number of the coalition members is 2, the identity information is divided into 2 key fragments.
In this embodiment, when the number of the coalition members is the same as the number of the key fragments, the key fragments may be distributed to each coalition member, and each coalition member may encrypt the key fragments by using the encryption public key. For example, if the number of the coalition members is 2, and a and B are used for representing the coalition members respectively, the identity information can be divided into 2 ciphertext fragments, a and B are used for representing the ciphertext fragments respectively, the ciphertext fragment a can be distributed to the member of the coalition a for encryption, and the ciphertext fragment B can be distributed to the member of the coalition B for encryption; and if the ciphertext fragment a is distributed to the member of the B alliance for encryption, the ciphertext fragment B is distributed to the member of the A alliance for encryption.
At least two key fragments are encrypted by adopting the encryption public keys stored by at least two coalition members related to shared data, so that the identity information of a data provider can be effectively kept secret.
In this technical solution, optionally, after encrypting by using the public encryption key of the federation member corresponding to the key fragment, the method further includes:
and associating and transmitting the member number of the coalition member and the key fragment ciphertext to a block chain.
In this embodiment, the member number may be a numeric number or an alphabetical number. According to the block chain requirement setting. For example, federation members may be numbered with 1, 2, and 3, or with A, B, and C.
In this embodiment, the member number of the coalition member is associated with the key fragment ciphertext, that is, the key fragment ciphertext corresponding to the member number of the coalition member can be found through the member number of the coalition member, and the coalition member corresponding to the key fragment ciphertext can also be found through the key fragment ciphertext.
The member number of the coalition member and the key fragment ciphertext are transmitted to the block chain in an associated mode, so that subsequent coalition members can decrypt the key fragment ciphertext conveniently.
S130, responding to a shared data tracing request of a data user, and initiating voting to the alliance members related to the shared data.
In this embodiment, the shared data tracing request may be that when the data user uses the shared data, the data user considers that the data is in a problem, sends the shared data tracing request, and queries the identity information of the data provider. The shared data tracing request may be a tracing request in a form of sending a data quality complaint, or a tracing request in a form of clicking complaint operation.
In this embodiment, a federation member may be a member that supervises data. The coalition members initiate proposals by calling a block chain intelligent contract, any member in the coalition can initiate proposals for a certain event, and the data quality governance relates to a plurality of operation events, but the operation events are initiated by a coalition co-governance mode, namely, no member can independently execute and decide a certain operation. The intelligent contract is also called an intelligent contract and is a program which is event-driven, has a state, obtains multiple-party approval, runs on a block chain and can automatically process assets according to preset conditions, and the intelligent contract has the greatest advantage of utilizing a program algorithm to substitute for human arbitration and execution of the contract.
In this embodiment, when a data consumer finds data problematic, a vote may be initiated to a coalition member associated with the shared data, the coalition member voting proposal by invoking the block chain intelligent contract. The result of the voting by the members of the alliance is 'agreement' or 'rejection', when the 'agreement' or 'rejection' exceeds a certain proportion, the final result of the proposal is 'pass' or 'fail', and the proposal passing the proposal will generate the final execution effect. When the final result is 'pass', the alliance member can acquire the information of the data provider and transmit the information to the block chain; when the final result is 'fail', the federation members can reject the shared data tracing request of the data user. Preferably, the proposed end result is a pass when the league member votes that the agreed proportion is greater than the rejected proportion. For example, when 5 of the voting results of the members in the alliance agree and 4 reject the voting results, the proposed final result is pass; when there are 4 agrees and 5 rejections in the voting results of the coalition members, the proposed final result is fail.
In this embodiment, the shared data and the coalition members are associated with a certain rule, that is, the coalition members corresponding to the shared data can be determined by the shared data. Wherein, certain rules can be numbering, sorting, and the like. For example, the shared data is divided into a data and B data, the federation members can be divided into A members and B members, the a data can be associated with the A members, and the a data can be associated with the B members. The rules may be set according to requirements on the blockchain.
In this technical solution, optionally, responding to the request for tracing to the source of the shared data of the data user includes:
determining whether the shared data tracing request has problem information or evidence information uploaded by a data user;
and if so, sending the problem information or the evidence information to the coalition members associated with the shared data.
In this embodiment, the problem information or the evidence information uploaded by the data user may be used to prove that the data has a problem, and is used for the coalition members to determine whether the shared data has a problem. The question information or the evidence information may be information in a form or information in a document form.
By sending the issue information or evidence information to the coalition members associated with the shared data. The method and the device can be used for the coalition members to judge the shared data uploaded by the data provider, improve the voting accuracy of the coalition members and save the voting time.
In this technical solution, optionally, determining whether the shared data tracing request has problem information or evidence information includes:
and if a problem information or evidence information uploading request of a data user is received, providing a form to the data user so that the data user fills in the problem information or evidence information in the form.
In this embodiment, the form may be in the form of Word or in the form of Excel.
In this embodiment, the request for uploading the problem information or the evidence information of the data user may be sending the request for uploading through a click operation, or may be sending the request for uploading through a sending code.
In this embodiment, when the shared data tracing request has problem information or evidence information and receives a problem information or evidence information uploading request of a data user, a form may be provided to the data user for the data user to fill the problem information or evidence information in the form.
By receiving the problem information or evidence information uploading request of the data user and providing the form to the data user, more standard problem information or evidence information can be obtained, and the working efficiency and accuracy of the voting of the members in the alliance are improved.
And S140, if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality.
In this embodiment, the preset condition may be that a plurality of voting results pass. For example, there may be 5 votes passing through the coalition members; or there may be 3 votes passing in the coalition members. The setting can be made according to the members of the alliance.
In this embodiment, the decryption algorithm corresponds to the encryption algorithm, that is, the encryption algorithm uses public key encryption and the decryption algorithm uses private key decryption, or the encryption algorithm uses private key encryption and the decryption algorithm uses public key decryption. Preferably, the decryption algorithm is decrypted by using a private key, so that the security of the identity information of the data provider in the transmission process can be ensured.
In this embodiment, the identity information of the data provider is obtained for quality monitoring. The quality monitoring can be completed by carrying out failure processing on the problem data, or can be completed by controlling the shared data uploaded by the data provider.
In this technical solution, optionally, the voting result meets a preset condition, which includes:
and the voting agrees to the number of the members in the alliance is larger than or equal to a set threshold value.
In this embodiment, the threshold may be set according to the number of coalition members. For example, the threshold value may be 3 or 5.
In this embodiment, the federation members vote on the shared data tracing request of the data user, some of the federation members vote that the result is agreed, and some of the federation members vote that the result is not agreed, the results of all the tables are counted, the number of the agreed voting results and the number of the disagreeable voting results are determined, and whether the number of the agreed federation members is greater than or equal to the set threshold value or not is judged.
And determining whether the voting result meets the preset condition or not by setting a threshold value, and determining whether to decrypt the encrypted result or not by using the voting result of the members in the alliance, so as to ensure the healthy development of the whole block chain data sharing network.
In this technical solution, optionally, after initiating the voting to the coalition members associated with the shared data, the method further includes:
and if the voting agrees that the number of the alliance members is smaller than the set threshold value, the voting result does not accord with the preset condition, and shared data tracing request rejection information is fed back to the data user.
In this embodiment, the rejection information may be fed back to the data user in the form of an email or in the form of a document. The reject information may be reject tracing or failure of the tracing request.
In this embodiment, when the number of the coalition members agreed by the voting is less than the set threshold, it indicates that most of the coalition members do not agree to decrypt the encrypted result, and then the shared data tracing request rejection information is fed back to the data user.
By feeding back the shared data tracing request rejection information to the data user, the data user can be prompted to check the shared data tracing request, and whether the shared data has problems or not can be determined again.
In this technical solution, optionally, decrypting the encrypted result by using a decryption algorithm to obtain the identity information of the data provider includes:
decrypting each key fragment ciphertext by adopting a private key of a coalition member to obtain key fragments;
and splicing all the decrypted key fragments to obtain the identity information.
In this embodiment, when the voting result meets the preset condition, the private key of the coalition member is used to decrypt each key fragment ciphertext to obtain the key fragment, and the key fragment is transmitted to the block chain. When the private key of the coalition member is adopted to decrypt each key fragment ciphertext, the association between the coalition member and the key fragment ciphertext needs to be determined firstly, and the key fragment ciphertext can only be decrypted by the associated coalition member by adopting the private key. For example, if the federation member a is associated with the key fragment ciphertext a and the federation member B is associated with the key fragment ciphertext B, the federation member a may decrypt the key fragment ciphertext a but may not decrypt the key fragment ciphertext B.
In this embodiment, the coalition members decrypt each key fragment ciphertext respectively to obtain a plurality of key fragments, and splice the key fragments to obtain the identity information. The key fragments can be spliced according to the fragment sequence of the key fragments.
The identity information can be obtained by decrypting each key fragment ciphertext by the coalition members, thereby realizing tracing to the data provider and ensuring the healthy development of the whole block chain data sharing network.
In this technical solution, optionally, before decrypting each key fragment ciphertext by using a private key of a coalition member to obtain a key fragment, the method further includes:
reading member numbers related to each key fragment ciphertext; and the member number is stored in an associated manner after being encrypted by the public encryption key of the coalition member.
The member number associated with each key fragment ciphertext is read, so that the coalition members associated with the key fragment ciphertext can decrypt each key fragment ciphertext, and the working efficiency is improved.
In this technical solution, optionally, after obtaining the identity information of the data provider, the method further includes:
and carrying out data uploading authority control on the data provider.
In this embodiment, the authority control may be to control the number of times the data provider uploads the shared data, may be to control the frequency of uploading the shared data by the data provider, or may be to control the size of uploading the shared data by the data provider. For example, the control data provider can upload shared data only 3 times a day.
By controlling the data uploading authority of the data provider, the quality of the shared data uploaded by the network can be improved, and the healthy development of the whole block chain data sharing network is ensured.
According to the technical scheme, shared data of a data provider are received, identity information of the data provider is obtained, encryption processing is carried out on the identity information, an encryption result is obtained, the shared data and the encryption result are transmitted to a block chain in an associated mode, voting is initiated to a member of a union associated with the shared data in response to a shared data tracing request of a data user, if the voting result meets a preset condition, a decryption algorithm is adopted to decrypt the encryption result, the identity information of the data provider is obtained, and quality monitoring is carried out. By executing the technical scheme, the quality of data provided by a data provider can be monitored, and the healthy development of the whole block chain data sharing network is ensured.
Example two
Fig. 2 is a schematic diagram of a method for monitoring quality of block chain data according to a second embodiment of the present invention, which is further optimized based on the first embodiment. The concrete optimization is as follows: after obtaining the identity information of the data provider, the method further comprises: acquiring communication information of the data provider; and feeding back the communication information to the coalition members so as to enable the coalition members to communicate with the data provider. The details of the content which is not described in detail in this embodiment are shown in the first embodiment. As shown in fig. 2, the method comprises the steps of:
s210, receiving shared data of a data provider, and acquiring identity information of the data provider.
S220, encrypting the identity information to obtain an encryption result; and transmitting the shared data and the encryption result to a block chain in an associated mode.
And S230, responding to a shared data tracing request of a data user, and initiating voting to the coalition members associated with the shared data.
S240, if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality.
And S250, acquiring the communication information of the data provider.
In this embodiment, the communication information of the data provider may be a mailbox, a telephone, or an address. The data provider can be contacted by acquiring the communication information of the data provider, and the problem shared data can be treated.
S260, feeding the communication information back to the alliance member so that the alliance member can communicate with the data provider.
In this embodiment, the coalition members communicate with the data provider to communicate the problematic shared data, so that the shared data can be managed, and the quality of the shared data can be improved.
According to the technical scheme, shared data of a data provider are received, identity information of the data provider is obtained, encryption processing is carried out on the identity information, an encryption result is obtained, the shared data and the encryption result are transmitted to a block chain in an associated mode, voting is initiated to a member of a union associated with the shared data in response to a shared data tracing request of a data user, if the voting result meets a preset condition, a decryption algorithm is adopted to decrypt the encryption result, the identity information of the data provider is obtained, and quality monitoring is carried out. And by the coalition members to communicate with the data provider. By executing the technical scheme, the quality of data provided by a data provider can be monitored, and the healthy development of the whole block chain data sharing network is ensured.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a device for monitoring quality of blockchain data according to a third embodiment of the present invention, and as shown in fig. 3, the device for monitoring quality of blockchain data includes:
a shared data receiving module 310, configured to receive shared data of a data provider, and acquire identity information of the data provider;
an encryption result obtaining module 320, configured to perform encryption processing on the identity information to obtain an encryption result; transmitting the shared data and the encryption result association to a block chain;
a voting initiating module 330, configured to initiate voting to a coalition member associated with the shared data in response to a shared data tracing request of a data consumer;
and the identity information obtaining module 340 is configured to, if the voting result meets a preset condition, decrypt the encrypted result by using a decryption algorithm to obtain the identity information of the data provider, so as to perform quality monitoring.
In this technical solution, optionally, the encryption result obtaining module 320 includes:
the key fragment obtaining unit is used for processing the identity information by adopting a threshold encryption algorithm to obtain at least two key fragments;
and the key fragment ciphertext obtaining unit is used for encrypting the at least two key fragments by adopting the encryption public keys stored by the at least two alliance members associated with the shared data to obtain the key fragment ciphertext.
In the present technical solution, optionally, the number of the coalition members is the same as the number of the key fragments;
the cipher key fragment ciphertext obtaining unit comprises:
and the public key encryption subunit is used for distributing the at least two key fragments to at least two coalition members so as to encrypt by adopting the coalition member encryption public keys corresponding to the key fragments.
In this technical solution, optionally, the key fragment ciphertext obtaining unit further includes:
and the member number and key fragment ciphertext association uploading subunit is used for uploading the member number of the coalition member and the key fragment ciphertext association to a block chain for transmission.
In this technical solution, optionally, the identity information obtaining module 340 includes:
the number of the units is larger than or equal to a set threshold value, and the number of the members of the alliance for voting agreement is larger than or equal to the set threshold value.
In this technical solution, optionally, the identity information obtaining module 340 further includes:
and the number is less than a set threshold value unit, which is used for feeding back shared data tracing request rejection information to the data user if the voting agreed number of the alliance members is less than the set threshold value and the voting result does not accord with the preset condition.
In this technical solution, optionally, the identity information obtaining module 340 further includes:
the key fragment decryption unit is used for decrypting each key fragment ciphertext by adopting a private key of a coalition member to obtain key fragments;
and the identity information obtaining unit is used for splicing all the decrypted key fragments to obtain the identity information.
In this technical solution, optionally, the identity information obtaining module 340 further includes:
the member number reading unit is used for reading the member numbers associated with the cipher texts of the key fragments; and the member number is stored in an associated manner after being encrypted by the public encryption key of the coalition member.
In this technical solution, optionally, the voting initiating module 330 includes:
the problem information or evidence information determining unit is used for determining whether the shared data tracing request has problem information or evidence information uploaded by a data user;
and the problem information or evidence information sending unit is used for sending the problem information or evidence information to the coalition members related to the shared data if the problem information or evidence information exists.
In this technical solution, optionally, the problem information or evidence information determining unit includes:
and the form providing subunit is used for providing a form to the data user if a request for uploading the problem information or the evidence information of the data user is received, so that the data user fills the problem information or the evidence information in the form.
In this technical solution, optionally, the identity information obtaining module 340 further includes:
a communication information acquisition unit for acquiring communication information of the data provider;
and the communication information feedback unit is used for feeding the communication information back to the coalition members so as to enable the coalition members to communicate with the data provider.
In this technical solution, optionally, the identity information obtaining module 340 further includes:
and the data uploading authority control unit is used for carrying out data uploading authority control on the data provider.
The product can execute the method provided by the embodiment of the application, and has corresponding functional modules and beneficial effects of the execution method.
Example four
Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a method for quality monitoring of blockchain data, the method comprising:
receiving shared data of a data provider, and acquiring identity information of the data provider;
encrypting the identity information to obtain an encryption result; transmitting the shared data and the encryption result association to a block chain;
responding to a shared data tracing request of a data user, and initiating voting to a member of the alliance associated with the shared data;
and if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality.
Storage medium-any of various types of memory electronics or storage electronics. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in the computer system in which the program is executed, or may be located in a different second computer system connected to the computer system through a network (such as the internet). The second computer system may provide the program instructions to the computer for execution. The term "storage medium" may include two or more storage media that may reside in different unknowns (e.g., in different computer systems connected by a network). The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the above-described quality monitoring operation of blockchain data, and may also perform related operations in the method for quality monitoring of blockchain data provided in any embodiment of the present application.
EXAMPLE five
The embodiment of the application provides electronic equipment, and the quality monitoring device of the block chain data provided by the embodiment of the application can be integrated in the electronic equipment. Fig. 4 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application. As shown in fig. 4, the present embodiment provides an electronic device 400, which includes: one or more processors 420; the storage device 410 is configured to store one or more programs, and when the one or more programs are executed by the one or more processors 420, the one or more processors 420 implement the method for monitoring quality of blockchain data provided in the embodiment of the present application, the method includes:
receiving shared data of a data provider, and acquiring identity information of the data provider;
encrypting the identity information to obtain an encryption result; transmitting the shared data and the encryption result association to a block chain;
responding to a shared data tracing request of a data user, and initiating voting to a member of the alliance associated with the shared data;
and if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality.
Of course, those skilled in the art can understand that the processor 420 also implements the technical solution of the method for monitoring quality of blockchain data provided in any embodiment of the present application.
The electronic device 400 shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 4, the electronic device 400 includes a processor 420, a storage device 410, an input device 430, and an output device 440; the number of the processors 420 in the electronic device may be one or more, and one processor 420 is taken as an example in fig. 4; the processor 420, the storage device 410, the input device 430, and the output device 440 in the electronic apparatus may be connected by a bus or other means, and are exemplified by a bus 450 in fig. 4.
The storage device 410 is a computer-readable storage medium, and can be used to store software programs, computer-executable programs, and module units, such as program instructions corresponding to the method for monitoring quality of blockchain data in the embodiments of the present application.
The storage device 410 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the storage 410 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, storage 410 may further include memory located remotely from processor 420, which may be connected via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 430 may be used to receive input numbers, character information, or voice information, and to generate key signal inputs related to user settings and function control of the electronic device. Output device 440 may include a display screen, speakers, or other electronic equipment.
The electronic equipment provided by the embodiment of the application can achieve the purposes of improving the quality monitoring speed and the processing effect of the block chain data.
The quality monitoring device, the storage medium and the electronic device for block chain data provided in the above embodiments may execute the method for monitoring quality of block chain data provided in any embodiment of the present application, and have corresponding functional modules and beneficial effects for executing the method. For the technical details not described in detail in the above embodiments, reference may be made to the method for monitoring the quality of the blockchain data provided in any embodiment of the present application.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. Those skilled in the art will appreciate that the present application is not limited to the particular embodiments described herein, but is capable of many obvious modifications, rearrangements and substitutions without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.
Claims (15)
1. A method for quality monitoring of blockchain data, the method comprising:
receiving shared data of a data provider, and acquiring identity information of the data provider;
encrypting the identity information to obtain an encryption result; transmitting the shared data and the encryption result association to a block chain;
responding to a shared data tracing request of a data user, and initiating voting to a member of the alliance associated with the shared data; the source tracing request of the shared data is a request sent by inquiring the identity information of the data provider when the shared data is in a problem when the data user uses the shared data; the shared data tracing request is a tracing request in a form of sending data quality complaints, or a tracing request in a form of clicking complaint operation; the federation members are members supervising the shared data;
if the voting result meets the preset condition, decrypting the encrypted result by adopting a decryption algorithm to obtain the identity information of the data provider so as to monitor the quality;
wherein, after the voting is initiated to the coalition members associated with the shared data, the voting comprises:
the coalition members vote proposals by calling block chain intelligent contracts, and the voting results comprise pass and fail;
when the voting result is passed, the alliance member acquires the identity information of the data provider and transmits the identity information to the block chain; and when the voting result is failed, the alliance members reject the shared data tracing request of the data user.
2. The method of claim 1, wherein encrypting the identity information to obtain an encrypted result comprises:
processing the identity information by adopting a threshold encryption algorithm to obtain at least two key fragments;
and encrypting the at least two key fragments by adopting the encryption public keys stored by the at least two coalition members associated with the shared data to obtain key fragment ciphertexts.
3. The method of claim 2, wherein the number of federation members is the same as the number of key shards;
the encrypting at least two key fragments by using the encryption public keys stored by the at least two coalition members associated with the shared data includes:
and distributing the at least two key fragments to at least two alliance members to encrypt by adopting alliance member encryption public keys corresponding to the key fragments.
4. The method of claim 3, wherein after encrypting with the federation member public encryption key corresponding to the key shard, the method further comprises:
and associating and transmitting the member number of the coalition member and the key fragment ciphertext to a block chain.
5. The method of claim 2, wherein the voting result satisfies a predetermined condition, comprising:
and the voting agrees to the number of the members in the alliance is larger than or equal to a set threshold value.
6. The method of claim 5, wherein after initiating the vote to a coalition member associated with the shared data, the method further comprises:
and if the voting agrees that the number of the alliance members is smaller than the set threshold value, the voting result does not accord with the preset condition, and shared data tracing request rejection information is fed back to the data user.
7. The method of claim 2, wherein decrypting the encrypted result using a decryption algorithm to obtain the identity information of the data provider comprises:
decrypting each key fragment ciphertext by adopting a private key of a coalition member to obtain key fragments;
and splicing all the decrypted key fragments to obtain the identity information.
8. The method of claim 7, wherein before decrypting each key fragment ciphertext using a private key of a federation member to obtain a key fragment, the method further comprises:
reading member numbers related to each key fragment ciphertext; and the member number is stored in an associated manner after being encrypted by the public encryption key of the coalition member.
9. The method of claim 1, wherein responding to a request for tracing the shared data from a data consumer comprises:
determining whether the shared data tracing request has problem information or evidence information uploaded by a data user;
and if so, sending the problem information or the evidence information to the coalition members associated with the shared data.
10. The method of claim 9, wherein determining whether the request for tracing the shared data has problem information or evidence information comprises:
and if a problem information or evidence information uploading request of a data user is received, providing a form to the data user so that the data user fills the problem information or the evidence information in the form.
11. The method of claim 1, wherein after obtaining identity information of the data provider, the method further comprises:
acquiring communication information of the data provider;
and feeding back the communication information to the coalition members so as to enable the coalition members to communicate with the data provider.
12. The method of claim 1, wherein after obtaining identity information of the data provider, the method further comprises:
and carrying out data uploading authority control on the data provider.
13. An apparatus for quality monitoring of blockchain data, the apparatus comprising:
the shared data receiving module is used for receiving shared data of a data provider and acquiring identity information of the data provider;
the encrypted result obtaining module is used for encrypting the identity information to obtain an encrypted result; transmitting the shared data and the encryption result association to a block chain;
the voting initiation module is used for responding to a shared data tracing request of a data user and initiating voting to the alliance members related to the shared data; the shared data tracing request is a request sent by inquiring the identity information of the data provider when the shared data is in a problem when the data user uses the shared data; the shared data tracing request is a tracing request in a form of sending data quality complaints, or a tracing request in a form of clicking complaint operation; the federation members are members supervising the shared data;
the identity information obtaining module is used for decrypting the encrypted result by adopting a decryption algorithm if the voting result meets the preset condition to obtain the identity information of the data provider so as to monitor the quality;
a voting result determination module, configured to, after the voting is initiated to a coalition member associated with the shared data, the coalition member votes for an offer by invoking a block chain intelligent contract, and the voting result includes pass and fail; when the voting result is passed, the alliance member acquires the identity information of the data provider and transmits the identity information to the block chain; and when the voting result is that the shared data cannot pass, the federation member refuses the shared data tracing request of the data user.
14. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method of quality monitoring of blockchain data according to any one of claims 1 to 12.
15. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for quality monitoring of blockchain data according to any of claims 1 to 12 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011019182.9A CN112202552B (en) | 2020-09-24 | 2020-09-24 | Method, device, medium and electronic equipment for monitoring quality of block chain data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011019182.9A CN112202552B (en) | 2020-09-24 | 2020-09-24 | Method, device, medium and electronic equipment for monitoring quality of block chain data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112202552A CN112202552A (en) | 2021-01-08 |
CN112202552B true CN112202552B (en) | 2022-12-13 |
Family
ID=74007225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011019182.9A Active CN112202552B (en) | 2020-09-24 | 2020-09-24 | Method, device, medium and electronic equipment for monitoring quality of block chain data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112202552B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN108154050A (en) * | 2017-11-30 | 2018-06-12 | 深圳市轱辘车联数据技术有限公司 | A kind of vehicle condition data managing method and device |
CN109672529A (en) * | 2019-01-07 | 2019-04-23 | 苏宁易购集团股份有限公司 | A kind of method and system for going anonymization of combination block chain and privacy sharing |
CN110046511A (en) * | 2019-03-16 | 2019-07-23 | 深圳壹账通智能科技有限公司 | Leaking data method, apparatus, equipment and storage medium are prevented based on alliance's chain |
CN111221903A (en) * | 2019-12-18 | 2020-06-02 | 中思博安科技(北京)有限公司 | Data tracing method, system and computer storage medium |
CN111464591A (en) * | 2020-03-04 | 2020-07-28 | 链农(深圳)信息科技有限公司 | Method and system for processing disputes between nodes in block chain |
CN111683082A (en) * | 2020-06-04 | 2020-09-18 | 杭州溪塔科技有限公司 | Data sharing method and system based on block chain and electronic equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12079200B2 (en) * | 2019-02-21 | 2024-09-03 | Fiducia DLT LTD | Method and system for audit and payment clearing of electronic trading systems using blockchain database |
-
2020
- 2020-09-24 CN CN202011019182.9A patent/CN112202552B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN108154050A (en) * | 2017-11-30 | 2018-06-12 | 深圳市轱辘车联数据技术有限公司 | A kind of vehicle condition data managing method and device |
CN109672529A (en) * | 2019-01-07 | 2019-04-23 | 苏宁易购集团股份有限公司 | A kind of method and system for going anonymization of combination block chain and privacy sharing |
CN110046511A (en) * | 2019-03-16 | 2019-07-23 | 深圳壹账通智能科技有限公司 | Leaking data method, apparatus, equipment and storage medium are prevented based on alliance's chain |
CN111221903A (en) * | 2019-12-18 | 2020-06-02 | 中思博安科技(北京)有限公司 | Data tracing method, system and computer storage medium |
CN111464591A (en) * | 2020-03-04 | 2020-07-28 | 链农(深圳)信息科技有限公司 | Method and system for processing disputes between nodes in block chain |
CN111683082A (en) * | 2020-06-04 | 2020-09-18 | 杭州溪塔科技有限公司 | Data sharing method and system based on block chain and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN112202552A (en) | 2021-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110601816B (en) | Lightweight node control method and device in block chain system | |
US20050187966A1 (en) | Data communicating apparatus, data communicating method, and program | |
CN111861473B (en) | Electronic bidding system and method | |
CN112653556B (en) | TOKEN-based micro-service security authentication method, device and storage medium | |
CN111866042B (en) | Method and device for synchronizing telecommunication account number change | |
CN111464295B (en) | Bank card making method and device | |
JP6965463B2 (en) | Management of trust points in the ledger system | |
CN113239403A (en) | Data sharing method and device | |
CN106533677A (en) | User login method, user terminal and server | |
CN108846671B (en) | Online secure transaction method and system based on block chain | |
CN111259428A (en) | Data processing method and device based on block chain, node equipment and storage medium | |
CN112261002B (en) | Data interface docking method and device | |
US11856091B2 (en) | Data distribution system, data processing device, and program | |
CN116506227B (en) | Data processing method, device, computer equipment and storage medium | |
CN112202552B (en) | Method, device, medium and electronic equipment for monitoring quality of block chain data | |
CN115001720B (en) | Optimization method, device, medium and equipment for safe transmission of federal learning modeling | |
CN111382451A (en) | Security level identification method and device, electronic equipment and storage medium | |
KR101992402B1 (en) | Method for Protecting Personal Data Using Homomorphic Encryption | |
CN111125734B (en) | Data processing method and system | |
CN113497827B (en) | Information sharing method and equipment | |
JP7098065B1 (en) | Preventing data manipulation and protecting user privacy in telecommunications network measurements | |
EP3811560B1 (en) | Systems and methods for permissioned blockchain infrastructure with fine-grained access control and confidentiality-preserving publish/subscribe messaging | |
CN114091059A (en) | Data security processing method, device, terminal, medium and system | |
CN113626848A (en) | Sample data generation method and device, electronic equipment and computer readable medium | |
CN113535852A (en) | File processing method, file access method, device and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220923 Address after: 25 Financial Street, Xicheng District, Beijing 100033 Applicant after: CHINA CONSTRUCTION BANK Corp. Address before: 12 / F, 15 / F, 99 Yincheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200120 Applicant before: Jianxin Financial Science and Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |