Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data file security privacy storage and sharing method based on a block chain

A data file and blockchain technology, applied in the computer field, can solve problems such as undecryptable data, achieve the effects of improving security and privacy, ensuring availability and integrity, and improving control

Active Publication Date: 2019-05-17
CHONGQING UNIV OF POSTS & TELECOMM
View PDF8 Cites 94 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the data owner loses his own key, he can't even decrypt his own data, but PKG can still decrypt user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data file security privacy storage and sharing method based on a block chain
  • Data file security privacy storage and sharing method based on a block chain
  • Data file security privacy storage and sharing method based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Such as figure 1 As shown, in this embodiment, the user layer mainly uses the symmetric encryption algorithm to encrypt its own data and uploads it to the storage server of the data storage layer, and then the data storage layer returns the data storage Location information, the data owner then encrypts the location information with an encryption algorithm according to the usage of the data, and then uses an encryption algorithm to encrypt the encrypted location information and encryption key according to the data sharing situation, and formulates related access strategies to The form of ciphertext is stored in the blockchain layer. When the blockchain layer completes the authentication of the new block, it returns the transaction id to the user layer.

[0044] Such as figure 2 As shown, before the user joins the system, the system first performs an initialization. At this stage, the system verifies the identity attributes of the user, issues an identity certificate, ...

Embodiment 2

[0049] This embodiment provides a process for the data owner to share the data with the data requester, such as Figure 4 As shown, at this time, it is necessary to judge whether the number of people requesting sharing is greater than 1, or to determine whether the number of people is greater than this threshold according to a threshold n set by the system's computing power and other resources. If it is greater than this value, the system will automatically randomly select from the key space A key K2 uses symmetric encryption to encrypt the ciphertext X to obtain the ciphertext Y. At this time, the data owner stores the key K2 and combines the ciphertext Y with the previously calculated hash value of the uploaded ciphertext file. H is publicly stored in the blockchain account book together. After the consensus of the blockchain bookkeeping nodes, the returned transaction id is obtained, and the returned transaction id and K2 are distributed to the requester for data sharing. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computers and data storage, in particular to a data file security privacy storage and sharing method based on a block chain, which comprises a user layer, a blockchain layer and a data storage layer, and is characterized in that the user layer is used by a user to encrypt and upload data, encrypt and share data and receive data shared by other users; the blockchain layer is used for public storage of hash check codes of double encrypted ciphertext data and cloud storage data, and files are shared among users through transaction id; the data storage layeris used for storing and downloading ciphertext data; according to the invention, the availability and integrity of cloud storage data are effectively ensured; the user can conveniently verify the access permission, multi-user sharing of the data is achieved, the storage overhead and management overhead of the user on the secret key are reduced, the control force of the data owner on the data is improved, ciphertext sharing of the data is achieved, and the safety and privacy of the storage system are improved.

Description

technical field [0001] The present invention relates to the computer field and data storage, in particular to a method for safe and private storage and sharing of data files based on blockchain. Background technique [0002] With the rapid development of Internet technology, cloud storage has become an important business model in our daily life. It provides different types of data storage services for individuals and businesses, enabling users to access Internet resources and share data anytime and anywhere, bringing great convenience to our lives. Such cloud storage systems are very successful and increasingly accepted. With the development of Internet technology, the security of stored files and the privacy of data sharing have begun to attract more and more attention. Data is stored in third-party servers, and data storage and sharing inevitably bring some security and privacy. sexual issues. [0003] In the existing cloud storage services, the storage and sharing of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 徐光侠代小龙马创黄海辉刘勇周秀秀宋亮吴佳健吴乾隆
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products