CN119254404A - Data security circulation method based on blockchain in hierarchical new cloud manufacturing application scenario - Google Patents
Data security circulation method based on blockchain in hierarchical new cloud manufacturing application scenario Download PDFInfo
- Publication number
- CN119254404A CN119254404A CN202411365242.0A CN202411365242A CN119254404A CN 119254404 A CN119254404 A CN 119254404A CN 202411365242 A CN202411365242 A CN 202411365242A CN 119254404 A CN119254404 A CN 119254404A
- Authority
- CN
- China
- Prior art keywords
- node
- data
- blockchain
- nodes
- hierarchical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a data security circulation method based on a blockchain in a hierarchical novel cloud manufacturing application scene. Aiming at the data security problems of data leakage, data tampering, data difficult traceability and the like in the data circulation and data storage processes of the novel cloud manufacturing system, the design provides a block chain-based data security circulation method in the hierarchical novel cloud manufacturing application scene in combination with the hierarchical structure of the cloud manufacturing application scene, and considering privacy data protection requirements. The data security circulation system based on the blockchain in the hierarchical novel cloud manufacturing application scene is composed of a blockchain network, a distributed account book database, a node admission approval process, a node state updating algorithm, an authorization approval mechanism, a chain up-chain and chain down-chain low-overhead storage method and other modules. The invention realizes the efficient circulation of data among peer nodes and the safe convergence among non-peer nodes through redesign of the block chain platform service, ensures the availability of private data to be invisible through a data ciphertext storage mode and a data encryption logic on the chain, and realizes the on-chain closed-loop management of the data through a data management component based on intelligent contracts. In conclusion, the method ensures the authenticity, the integrity and the confidentiality of the data in the hierarchical novel cloud manufacturing application scene, and realizes the authority management and the hierarchical propagation of the private data.
Description
Technical Field
The invention relates to a data security technology of a novel cloud manufacturing system. More particularly, the invention relates to a blockchain-based data secure circulation method in a hierarchical novel cloud manufacturing application scenario.
Background
In the novel cloud manufacturing system, user data are gathered on the cloud from the edges and ends, and after being processed on the cloud, the user data are returned to the edges and ends. In the process of bidirectional circulation and storage of the user data, the data security problems such as data leakage, data tampering, data difficult to trace and the like exist.
When the new cloud manufacturing system cloud manufacturing platform fails to resist the network attack, the data of the platform may have a risk of disclosure. Mass data interaction exists in links of outsourcing, online supply-demand butt joint, collaborative design manufacturing and the like of the novel cloud manufacturing system, the authority of an administrator in the traditional centralized management mode is overlarge, the possibility of manually tampering data exists, public confidence is lacked, and the enthusiasm of developing business on a user line can be seriously influenced. Enterprise users of the novel cloud manufacturing system are reluctant to disclose private information such as transaction information and model data of all supply chains or high-value attribute data, so that the supply chain data is lost, the sources of the data cannot be bound with enterprises, the model data is difficult to multiplex, difficulty is caused in product quality tracing, and complex business cooperation efficiency is reduced.
To achieve the above objective, existing work generally adopts blockchain technology to design new cloud manufacturing systems. The blockchain technology is a distributed data flow account book realized based on specific network topology, data structure, consensus mechanism and cryptography principle, and has the characteristics of non-falsification, collective maintenance, traceability, decentralization and the like. The problems of data protection, trust establishment, quality tracing and the like in the novel cloud manufacturing system can be solved by utilizing the blockchain technology.
However, in a novel cloud manufacturing system related to complex product manufacturing and large enterprises, the enterprises are built based on a hierarchical system with single or multiple mechanisms layered and clear responsibilities, the cooperation relationship among the enterprises is set according to hierarchy, and the corresponding responsibilities are larger and the management scope is larger along with the improvement of the enterprise hierarchy. Taking complex product cooperation matching as an example, an enterprise is divided into three layers of a headquarter, a part and a matching unit, wherein the headquarter is the highest level, the headquarter is the next level, and the matching unit is the lowest level. The data management relationship is vertical, and each level enterprise is a relationship of direct upper and lower levels in data management. Data is converged to a first-level enterprise, and hierarchical control is performed. The enterprise management and the data circulation are primary management and primary, and the upper level authorizes and approves the lower level and the lower level to apply for the upper level and obeys the upper level, so that a high-efficiency consensus mechanism is formed.
Disadvantages of conventional blockchains in the application of the novel cloud manufacturing system are mainly reflected in three aspects. Firstly, the hierarchical structure contradiction is that the novel cloud manufacturing system application is not a simple distributed manufacturer to centralized data convergence relation, and particularly corresponds to the manufacturing of a complex system or equipment, and the hierarchical structure contradiction is also that the novel cloud manufacturing system application is in an upper-lower relation, and the novel cloud manufacturing system application is in a structural contradiction with a traditional flattened blockchain network. The existing blockchain nodes are peer-to-peer in node roles and peer in information, no vertical management relation exists among the nodes, the data flow direction is not fixed, and the existing flattened blockchain network architecture design is not in accordance with the hierarchical system management data flow requirement. The traditional block chain system data interaction mode is generally transverse interaction, and in the novel cloud manufacturing system hierarchical application scene, two data circulation relations of transverse interaction and longitudinal convergence are included. The transverse interaction refers to data sharing among non-matched relation nodes, and the longitudinal aggregation refers to data aggregation of a lower node to an upper node. Thirdly, the data of the traditional block chain system is stored on the chain in a public transparent mode, and all data on the chain can be directly accessed by the peer-to-peer network nodes. In the new cloud manufacturing system, the cloud manufacturing process often corresponds to a hierarchical management process, and access control requirements of different institutions and different hierarchies on data are different. It is difficult to adapt a single data storage mode in a conventional blockchain to diversified and multi-demand cloud manufacturing data access control.
In summary, the conventional flattened blockchain network structure is not suitable for the above-mentioned hierarchical cloud manufacturing application scenario, and the mode stored on the full-data plaintext chain is also not suitable for the requirements of the cloud manufacturing mechanism on the protection of sensitive data in the novel cloud manufacturing system scenario. Blockchain-based secure circulation of data becomes very challenging in an applicable hierarchical new cloud manufacturing application scenario.
In order to solve the problems, unlike the existing work, the system is applicable to safe circulation of data based on block chains in a hierarchical novel cloud manufacturing application scene. Specifically, the patent focuses on the block chain node design, the ledger design, the contract design and the storage mode design on the basis of considering the existing block chain hierarchical network design and the common design. The blockchain in the hierarchical novel cloud manufacturing system data security circulation system divides service nodes into 4 different types according to functions. Each node of the hierarchical novel cloud manufacturing system data security circulation system blockchain maintains a hierarchical data ledger. The patent comprehensively considers the review confirmation design of adding the superior mechanism, realizes the approval confirmation of the intelligent contract, allows the authority to enter the hierarchical blockchain system through the signing contract execution, and realizes the influence of the superior mechanism on the control of the blockchain key data, results and instructions. In addition, the patent specifically provides a data security circulation participation node admission control, a data security circulation participation node state update and a data security circulation authorization approval mechanism. And consider a low overhead storage design on-chain, including a storage design on-chain index encryption storage, and a storage design on-chain data ciphertext fragment storage. By combining the factors, the method constructs the data security circulation application implementation based on the blockchain in the hierarchical novel cloud manufacturing application scene, utilizes various services provided by the blockchain platform to realize the efficient circulation of data among peer nodes and the security convergence among non-peer nodes, protects the data privacy through data encryption, and utilizes means such as intelligent contracts to realize the on-chain closed-loop management of the data, so that the authenticity, the integrity and the confidentiality of the data in the hierarchical novel cloud manufacturing application scene can be ensured, and the realization of the authority management, the hierarchical propagation and the survivability resistance of the data is facilitated.
Disclosure of Invention
The invention aims to provide a block chain-based data security circulation system node design, a distributed account book database design, a node approval design and a chain up-chain and down-chain storage mode design in a hierarchical novel cloud manufacturing application scene, and provides a lower block chain-based data security circulation service application scheme on the basis.
In order to achieve the above purpose, the invention adopts the following technical scheme:
according to a first aspect of the invention, a hierarchical novel data security circulation system node design method based on a blockchain for cloud manufacturing application scenes is provided. The bottom layer of the data security circulation system based on the block chain realizes the data security circulation function by depending on the block chain system, and nodes in the block chain system are communication main bodies for realizing data circulation. Multiple different types of nodes may run on the same physical server. In the hierarchical novel cloud manufacturing application scene, service nodes are divided into 4 different types according to functions in a data security circulation system based on a block chain, wherein the service nodes are respectively client nodes, full-function nodes, consensus nodes and query nodes.
According to a second aspect of the invention, a hierarchical novel cloud manufacturing application scenario block-chain-based data security circulation system distributed ledger database design method is provided. In the data security circulation system based on the blockchain, data is synchronously circulated through an account book of a bottom layer blockchain platform, and the invention establishes a data security circulation blockchain network structure of the novel cloud manufacturing system by adopting the existing hierarchical blockchain network according to the characteristic that the novel cloud manufacturing system has a hierarchical relationship.
According to a third aspect of the invention, a hierarchical novel cloud manufacturing application scenario data security circulation system node approval method based on blockchain is provided. The novel cloud manufacturing system data circulation realized based on the blockchain system can bring the benefits of safety, trust establishment among institutions, problem tracking and tracing, and the like, but the use of the blockchain can also cause redundant data sharing and distribution and the problem of difficult management and control of the system on the data uplink of the cloud manufacturing participation institutions. Typically, the correctness and availability of existing blockchain contract automation execution results can only be determined by the completeness of the contract design and the security of the execution environment, and cannot be controlled by the upper-level institutions. Therefore, a review confirmation design of the superior mechanism is required to be added, so that the approval confirmation of the intelligent contract is realized, the authority is allowed to enter the hierarchical blockchain system through the signing contract execution, and the superior mechanism is used for controlling the blockchain key data, results and instructions.
According to a fourth aspect of the invention, a method for designing a low-overhead storage under a chain of a block chain-based data security circulation system of a hierarchical novel cloud manufacturing application scene is provided. The invention designs the on-chain and off-chain storage design of the on-chain index encryption storage and the off-chain data ciphertext fragment storage. The only information on the blockchain chain and data is the digest of the data and the encrypted index value. After the data receiver obtains the authorization of the data owner and the decryption key corresponding to the index ciphertext, the data receiver can decrypt and obtain the index value plaintext, and obtain a plurality of ciphertexts of the data under the chain from the partitioned storage system according to the index value, and the complete ciphertext data is obtained by combining. The data receiver uses the decryption key corresponding to the ciphertext data to decrypt and obtain the data plaintext, and the data circulation from the data owner to the data receiver is realized.
According to the aspect of the invention, a hierarchical novel cloud manufacturing application scenario is constructed for a blockchain-based data security circulation application. The data security circulation of the hierarchical novel cloud manufacturing application scene mainly utilizes a block chain platform to gather and manage data from bottom to top, and confidentiality, integrity and usability of data circulation process data of the novel cloud manufacturing system are guaranteed. The hierarchical block chain design is utilized to provide hierarchical communication, hierarchical consensus and hierarchical account book, so that the authenticity, the integrity and the confidentiality of data are ensured, the authority management, the hierarchical propagation and the survivability resistance of the data are conveniently realized, and the hierarchical block chain service is provided for upper-layer applications. The data circulation application realizes the efficient circulation of data among peer nodes and the safe convergence among non-peer nodes by utilizing various services provided by the platform, protects the data privacy by data encryption, and realizes the on-chain closed-loop management of the data by utilizing means such as intelligent contracts.
To sum up, the data security circulation method based on the blockchain in the application scene of the hierarchical novel cloud manufacturing comprises the following steps:
s1, designing a data security circulation system node based on a block chain in a hierarchical novel cloud manufacturing application scene;
Preferably, the blockchain in the novel cloud manufacturing system data security circulation system divides the service nodes into 4 different types according to functions, wherein the service nodes are respectively client nodes, full-function nodes, consensus nodes and query nodes, and a blockchain network formed by the nodes is shown in figure 2.
Wherein the client node installs a command line client program or application program representing an entity operated by the user. Communication with the blockchain network can only be established if the client node is connected to a blockchain service node, such as submitting a data query request to any node or submitting a transaction request to a billing node. The full function node can receive a transaction application from the client node, package the transaction into block data, and broadcast the block data to the blockchain network for consensus. The full-function node itself also participates in the consensus process, and after the sequence and the content of each node agree on the block, the data is locally landed. The client node may query the in-chain data through the full function node, which queries from locally stored ledger data and returns the results to the client node. The consensus node can participate in the consensus process of the block data, verify the correctness and the integrity of the data, and store the block data into a local account after the block chain node in the network achieves consensus. Meanwhile, the consensus node can receive a data query application from the client node and return a query result. The query node cannot receive the transaction application, does not participate in the data consensus process, and is only used for querying the data on the chain. And broadcasting a next block request message to other nodes to acquire the block information on the chain one by one, so that a complete account book data is saved. The organization represents the infrastructure of the blockchain composed of different types of nodes and ensures the operation and security of the blockchain network. In the hierarchical novel cloud manufacturing scene, the first-level blockchain represents the blockchain formed by the first-layer nodes, the second-level blockchain represents the blockchain formed by the second-layer nodes, and the third-level blockchain represents the blockchain formed by the third-layer nodes. BaaS (Blockchain AS A SERVICE), namely "blockchain as a service", is a service for embedding blockchain technology into a cloud computing platform, and provides a convenient and high-performance blockchain ecological environment and matched service for developers.
S2, designing a hierarchical novel cloud manufacturing application scene data security circulation system distributed account book database based on block chains;
Preferably, X represents a system node, i represents a level of the node in the system, j, f and g represent positions of the node in the same level, k, o and l represent sibling nodes of a certain node, a, b and c represent three nodes of the same layer respectively, and z represents a certain node of a certain layer, so that the system can be described as follows, namely, an i-th layer node X i,j,Xi,j+1,…,Xi,j+k is a child node of an i+1th layer node X i+1,a in the system, formalized as { X i,j,Xi,j+1,…,Xi,j+k}∈Xi+1,a, an i+1th layer node X i+1,a,Xi+1,b,Xi+1,c is a child node of an i+2th layer node X i+2,z, formalized as { X i+1,a,Xi+1,b,Xi+1,c}∈Xi+2,z, a node X i,j,…,Xi,j+k has the same father node X i+1,a, is a mutual sibling node, and is a non-sibling node without a common direct father node. The novel cloud manufacturing system level block chain consensus process comprises a two-stage mode of a lower consensus process and an upper consensus process, wherein the i+1th layer node realizes consensus with a corresponding node of the i layer through the lower consensus process, and the i+1th layer node completes consensus with the i+2th layer node through the upper consensus process.
Hierarchical novel cloud manufacturing application scenario each node of a blockchain-based data security circulation system maintains a hierarchical data ledger. In the blockchain network, a data consensus process occurs between a father node and a child node thereof, after the data is completely consensus, the child node lands the data and records the data on an account book, if the father node does not have the father node, the data after the consensus is also recorded on a local account book, otherwise, the father node continues to consensus the data to the network of the father node and the father node thereof. Thus, a set of account books is maintained among brothers, an ancestor node (top node) maintains a set of account books, and the data range of the account books is gradually expanded from a lower node to a higher node.
The blockchain ledger is a hierarchical association ledger structure, and is a ledger formed among brother nodes of each layer after consensus. The account book association is a data association relationship between account books, the high-level account book data comprises low-level sub-node account book data, and a novel cloud manufacturing system level block chain account book structure is shown in fig. 3. The ledger structure is described as follows, layer i+1node X i+1,a, node X i+1,b, node X i+1,c together maintain ledger Ledger i+1,abc (t), layer i node { X i,j,Xi,j+1,…,Xi,j+k } maintain ledger Ledger ij (t), node { X i,f,Xi,f+1,…,Xi,f+o } maintain ledger Ledger if (t), node { X i,g,Xi,g+1,…,Xi,g+l } maintain ledger Ledger ig (t). The (i+1) -th ledger data includes data of the (i) -th ledger, i.e., the (i+1) -th ledger Ledger i+1,abc (t) -th data includes data of the (i) -th ledgers Ledger ij(t)、Ledgerif (t) and Ledger ig (t).
S3, designing a hierarchical novel cloud manufacturing application scene data security circulation system node approval method based on block chains;
The adoption of the mechanism for setting the admission of the blockchain node realizes that unnecessary nodes do not join the network, and in addition, in order to prevent the operations such as offline and deleting of the nodes from affecting the safety and stability of the blockchain network, a node admission control mechanism and a node state detection mechanism are required to be set, so that data security events caused by offline of part of the nodes are prevented. The method specifically comprises the following steps:
Preferably, aiming at the requirement that the hierarchical novel cloud manufacturing application scene based on the blockchain data security circulation system carries out corresponding admission control on the blockchain network among a plurality of levels and each level, an authorization control mechanism carried out when nodes join and exit the blockchain network is realized by designing node admission control contracts.
Preferably, the node admission control flow is specifically that before admission, the identity of the node needs to be verified, and the node carrying the legal certificate can be allowed to join the blockchain network. Whether or not the start-up operation information of the node is successfully started up, the start-up operation information of the node needs to be reported to the father node. The node admission control request is initiated by the node end, then a starting verification method of the admission control contract is executed, and the validity and the effectiveness of the identity certificate of the node are verified. If the verification is passed, the node is agreed to be started, otherwise, the node is refused to be started. And sending the contract execution result to the management end, and selecting a node uplink by the management end to record the starting information of the node. The node admission control flow is shown in figure 4.
Preferably, the node admission control flow is specifically that a management end selects a full-function node from father nodes which normally operate the node, then the node starting information is reported to the node, the node executes a data uplink method of admission control contracts, and finally the information is uplink. The admission control is divided into two parts for deployment, the verification method starting part is a built-in system contract and can be directly invoked, and the data uplink method part can be invoked after manual deployment.
Before admission, whether the node exits the network or not needs to be judged, and the consensus process of other nodes in the network is affected, so that data cannot be normally converged. The stop operation information of the node is reported to its parent node whether or not the node can exit the network. in fig. 5, count hie(Xi,j) represents the number of consensus nodes whose hierarchical properties agree with those of the node except for X i,j, count father(Xi,j) represents the number of parent nodes of node X i,j (assuming that the hierarchical property value of node { X i,j、Xi,j+1……Xi,j+k } is a-b-c, then the parent node of node { X i+1,m、Xi+1,m+1……Xi+1,m+o } whose hierarchical property is a-b is { X i,j、Xi,j+1……Xi,j+k }, and { X i,j、Xi,j+1……Xi,j+k } is a child node of { X i+1,m、Xi+1,m+1……Xi+1,m+o }), count uc(Xi,j) represents the number of nodes which can participate in consensus among nodes_up X(i,j) except for X i,j, count son(Xi,j) represents the number of child nodes of node X i,j, and Count dc(Xi,j) represents the number of nodes which can participate in consensus except for X i,j, nodes_down X(i,j).
The node admission control is initiated by the platform management end, a user initiates a node stop request at the management point interface, and then the management end judges whether the node stop can influence the consensus of the subsequent data of other nodes of the layer and the transmission of the lower layer data. Firstly judging whether the layer has a consensus node with the same level attribute as the node after the node stops, if not, refusing to stop the node, otherwise, carrying out the next round of judgment. And judging whether the node has a father node, if so, judging whether the peer node can also complete upward consensus, if not, refusing to stop the node, and if so, entering the next round of judgment. And then judging whether the child node of the node can complete upward consensus after stopping the node, if so, agreeing to stop the node, otherwise, refusing to stop the node. The node stopping result is reported to the management end, the management end selects a full-function node from father nodes which normally operate the node, then the node stopping information is reported to the node, and the node executes a data uplink method of a quasi-output control contract to uplink the information. The node admission control flow is shown in fig. 5.
Preferably, for node state update requirements in daily operation of the data security circulation system of the hierarchical novel cloud manufacturing application scene based on the blockchain, contracts used for recording the state of the node on the blockchain are designed. All nodes need to periodically call a node state update contract to update the attribute state of the node, and the superior node of the node can check the latest attribute state at any time.
After the node is successfully started, executing a timing task and periodically reporting the self state information to the father node. The method comprises the steps that a node sends information such as a name, IP (Internet Protocol) addresses, hierarchical attributes and a current state to a management end, after the management end receives the state information, the management end selects a full-function node from father nodes which normally operate the node, then calls a father node function interface, stores the node state information and the current time into a new node state set newMap, and finally the father node executes a data uplink method of a node state information update contract to link the state information of the child nodes. The new node state set newMap and the old node state set oldMap are new and old node state sets, and are composed of key-value pairs, wherein a key is node and state information thereof, and a value is current system time. The father node screens the abnormal state of the nodes according to the information of the two sets, and a hierarchical novel cloud manufacturing application scene is based on a data security circulation participation node state updating algorithm of a block chain, which is shown in fig. 6.
Preferably, aiming at the requirement that the upper node needs to confirm and authorize before operations such as data query, modification and the like of the lower node in the hierarchical novel cloud manufacturing application scene based on the data security circulation system, the process of authorizing and approving the contract specifically comprises the steps that a user initiates a service application through an application system, and after the application system processes corresponding data, an intelligent contract is called to uplink service application information. The approval user of the service logs in the application system, inquires the application information on the chain, approves according to the service flow, stores the approval comments on the blockchain through the intelligent contract, and updates the state of the application behavior. And the user inquires the service state through the application system, and if the user is approved, the user can continue to develop the subsequent service according to the approval result. The block chain-based data security circulation system authorization approval flow of the hierarchical novel cloud manufacturing application scenario is shown in fig. 7.
S4, designing a hierarchical novel cloud manufacturing application scene based on a block chain data security circulation system chain uplink and downlink low-overhead storage method;
Preferably, aiming at the requirements of a hierarchical novel cloud manufacturing application scene based on the data security circulation system of the blockchain on the data circulation security, convenience and certainty, the design flow of on-chain index encryption storage and off-chain data ciphertext fragment storage is specifically that information on the blockchain and data only has the abstract and encrypted index value of the data. After the data receiver obtains the authorization of the data owner and the decryption key corresponding to the index ciphertext, the data receiver can decrypt and obtain the index value plaintext, and obtain a plurality of ciphertexts of the data under the chain from the partitioned storage system according to the index value, and the complete ciphertext data is obtained by combining. The data receiver uses the decryption key corresponding to the ciphertext data to decrypt and obtain the data plaintext, and the data circulation from the data owner to the data receiver is realized.
S5, realizing the data security circulation application of the hierarchical novel cloud manufacturing application scene based on the block chain.
Preferably, in the hierarchical novel cloud manufacturing application scenario, the participants comprise a data provider and a data receiver. Different participants access the bottom layer blockchain network through the security suite, the data provider completes data uplink and transmission by calling the intelligent contract on the chain, data circulation is completed through synchronization of the account book, and the data receiver also completes data reading on the chain through intelligent contract calling, so that sharing of cloud manufacturing production service data is realized. In the specific implementation process, the data security circulation application disassembles and repacks the received cloud manufacturing service data, packages the cloud manufacturing service data into standard data packets, and links the standard data packets in a data security circulation blockchain network. When the data on the chain is required to be read, the hash value of the data or the file is searched through transaction hash, and the hash value is returned to a data reader in a standardized data packet format, so that the safety circulation requirements of different business party applications on the data are met. A schematic diagram of a hierarchical new cloud manufacturing application scenario for implementing a blockchain-based data security circulation application is shown in fig. 8.
The beneficial effects of the invention are as follows:
The technical scheme of the invention can improve the challenging problem of safe circulation of data based on the blockchain in the application scene of the hierarchical novel cloud manufacturing. Aiming at the problems that the user data safety exchange circulation, trust establishment and resource sharing requirements of enterprises of the novel cloud manufacturing system and the requirements of a flattened structure unsuitable hierarchy system of a traditional blockchain network cannot meet the data safety circulation of a cloud manufacturing application scene of a multi-hierarchy system of the novel cloud manufacturing system, the invention provides a blockchain-based data safety circulation technology of the novel hierarchical cloud manufacturing application scene, and provides a blockchain link point design, an account book design, a node approval design and a storage mode design.
Drawings
The following describes the embodiments of the present invention in further detail with reference to the drawings;
fig. 1 illustrates a block chain based data security flow diagram in an implementation-layering novel cloud manufacturing application scenario.
Fig. 2 shows a block chain network composition diagram in a hierarchical novel cloud manufacturing application scenario.
Fig. 3 shows a block chain ledger structure diagram of a data security circulation system in a hierarchical novel cloud manufacturing application scenario.
Fig. 4 illustrates a data security flow system blockchain node admission control flow diagram in a hierarchical novel cloud manufacturing application scenario.
Fig. 5 shows a block chain node admission control flow diagram of a data security flow system in a hierarchical novel cloud manufacturing application scenario.
Fig. 6 illustrates a data security flow system blockchain participation node status update algorithm in a hierarchical novel cloud manufacturing application scenario.
Fig. 7 shows a block chain-based data security flow system authorization approval flow diagram in a hierarchical novel cloud manufacturing application scenario.
Fig. 8 shows a schematic diagram of a blockchain-based data security circulation application implementation in a hierarchical novel cloud manufacturing application scenario.
Detailed Description
In order to more clearly illustrate the present invention, the present invention will be further described with reference to preferred examples and drawings. Like parts in the drawings are denoted by the same reference numerals. It is to be understood by persons skilled in the art that the following detailed description is illustrative and not restrictive, and that this invention is not limited to the details given herein.
As shown in fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, fig. 7 and fig. 8, the invention discloses a block chain-based data security circulation method in an application scene of hierarchical novel cloud manufacturing, which comprises the following steps:
s1, designing a data security circulation system node based on a block chain in a hierarchical novel cloud manufacturing application scene;
In the blockchain-based data secure streaming system proposed in this patent, a client node installs a command line client program or application program, representing an entity operated by a user. Communication with the blockchain network can only be established if the client node is connected to a blockchain service node, such as submitting a data query request to any node or submitting a transaction request to a billing node. The full function node can receive a transaction application from the client node, package the transaction into block data, and broadcast the block data to the blockchain network for consensus. The full-function node itself also participates in the consensus process, and after the sequence and the content of each node agree on the block, the data is locally landed. The client node may query the in-chain data through the full function node, which queries from locally stored ledger data and returns the results to the client node. The consensus node can participate in the consensus process of the block data, verify the correctness and the integrity of the data, and store the block data into a local account after the block chain node in the network achieves consensus. Meanwhile, the consensus node can receive a data query application from the client node and return a query result. The query node cannot receive the transaction application, does not participate in the data consensus process, and is only used for querying the data on the chain. And broadcasting a next block request message to other nodes to acquire the block information on the chain one by one, so that a complete account book data is saved. The organization represents the infrastructure of the blockchain composed of different types of nodes and ensures the operation and security of the blockchain network. In the hierarchical novel cloud manufacturing scene, the first-level blockchain represents the blockchain formed by the first-layer nodes, the second-level blockchain represents the blockchain formed by the second-layer nodes, and the third-level blockchain represents the blockchain formed by the third-layer nodes. BaaS (Blockchain AS A SERVICE), namely "blockchain as a service", is a service for embedding blockchain technology into a cloud computing platform, and provides a convenient and high-performance blockchain ecological environment and matched service for developers.
S2, designing a distributed account book database of a data security circulation system based on block chains in a hierarchical novel cloud manufacturing application scene;
The system node is represented by X, i represents the level of the node in the system, j, f and g represent the positions of the nodes in the same level, k, o and l represent the sibling nodes of a certain node, a, b and c represent three nodes of the same layer respectively, and z represents a certain node of a certain layer. The ith node X i,j,Xi,j+1,…,Xi,j+k is a child node of the (i+1) th node X i+1,a in the system, the formal description is { X i,j,Xi,j+1,…,Xi,j+k}∈Xi+1,a }, the (i+1) th node X i+1,a,Xi+1,b,Xi+1,c is a child node of the (i+2) th node X i+2,z, the formal description is { X i+1,a,Xi+1,b,Xi+1,c}∈Xi+2,z }, the nodes X i,j,…,Xi,j+k have identical father nodes X i+1,a, are brother nodes, and are non-brother nodes without common direct father nodes. The novel cloud manufacturing system level block chain consensus process comprises a two-stage mode of a lower consensus process and an upper consensus process, wherein the i+1th layer node realizes consensus with a corresponding node of the i layer through the lower consensus process, and the i+1th layer node completes consensus with the i+2th layer node through the upper consensus process.
Each node of the blockchain-based data security circulation system maintains a hierarchical data ledger in a hierarchical novel cloud manufacturing application scene. In a common blockchain network, all service nodes are completely peer-to-peer and together maintain a set of data ledgers. In a hierarchical blockchain network, there is a hierarchical relationship of data flows mapped from managed vertical relationships between nodes, forming a hierarchical ledger. In the hierarchical blockchain network, a data consensus process occurs between a father node and a child node of the father node, after the data is completely consensus, the child node lands the data and records the data on an account book, if the father node does not have the father node, the data after the consensus is also recorded on a local account book, otherwise, the father node continues to consensus the data to the network of the father node and the father node. Thus, a set of account books is maintained among brothers, an ancestor node (top node) maintains a set of account books, and the data range of the account books is gradually expanded from a lower node to a higher node.
The hierarchical blockchain ledger is a hierarchical association ledger structure, and is a ledger formed among brother nodes of each layer after consensus. The ledger association is a data association relationship between ledgers, and the high-level ledger data includes low-level child node ledger data. The ledger structure is described as follows, layer i+1node X i+1,a, node X i+1,b, node X i+1,c together maintain ledger Ledger i+1,abc (t), layer i node { X i,j,Xi,j+1,…,Xi,j+k } maintain ledger Ledger ij (t), node { X i,f,Xi,f+1,…,Xi,f+o } maintain ledger Ledger if (t), node { X i,g,Xi,g+1,…,Xi,g+l } maintain ledger Ledger ig (t). The (i+1) -th ledger data includes data of the (i) -th ledger, i.e., the (i+1) -th ledger Ledger i+1,abc (t) -th data includes data of the (i) -th ledgers Ledger ij(t)、Ledgerif (t) and Ledger ig (t).
S3, designing a hierarchical novel data security circulation system node approval method based on block chains in a cloud manufacturing application scene;
The adoption of the mechanism for setting the admission of the blockchain node realizes that unnecessary nodes do not join the network, and in addition, in order to prevent the operations such as offline and deleting of the nodes from affecting the safety and stability of the blockchain network, a node admission control mechanism and a node state detection mechanism are required to be set, so that data security events caused by offline of part of the nodes are prevented. Aiming at the requirement that a blockchain-based data security circulation system in a hierarchical novel cloud manufacturing application scene carries out corresponding admission control on a plurality of levels and blockchain networks among the levels, an authorization control mechanism carried out when nodes join and exit the blockchain network is realized by designing node admission control contracts.
The node admission control flow is specifically that before admission, the identity of the node needs to be verified, and the node carrying the legal certificate can be allowed to join the blockchain network. Whether or not the start-up operation information of the node is successfully started up, the start-up operation information of the node needs to be reported to the father node. The node admission control request is initiated by the node end, then a starting verification method of the admission control contract is executed, and the validity and the effectiveness of the identity certificate of the node are verified. If the verification is passed, the node is agreed to be started, otherwise, the node is refused to be started. And sending the contract execution result to the management end, and selecting a node uplink by the management end to record the starting information of the node.
The node admission control flow is that the management end selects a full-function node from father nodes which normally operate the node, then reports the node starting information to the node, the node executes the data linking method of admission control contract, and finally links the information. The admission control is divided into two parts for deployment, the verification method starting part is a built-in system contract and can be directly invoked, and the data uplink method part can be invoked after manual deployment.
Before admission, whether the node exits the network or not needs to be judged, and the consensus process of other nodes in the network is affected, so that data cannot be normally converged. The stop operation information of the node is reported to its parent node whether or not the node can exit the network. In the figure, count hie(Xi,j) represents the number of consensus nodes whose hierarchical properties agree with that node except X i,j, count father(Xi,j) represents the parent node number of node X i,j (assuming that the hierarchical property value of node { X i,j、Xi,j+1……Xi,j+k } is a-b-c, then the parent node of node { X i+1,m、Xi+1,m+1……Xi+1,m+o } whose hierarchical property is a-b is { X i,j、Xi,j+1……Xi,j+k }, and { X i,j、Xi,j+1……Xi,j+k } is a child node of { X i+1,m、Xi+1,m+1……Xi+1,m+o }), count uc(Xi,j) represents the number of nodes that can participate in consensus in nodes_up X(i,j) except X i,j, count son(Xi,j) represents the number of child nodes of node X i,j, and Count dc(Xi,j) represents the number of nodes that can participate in consensus in node_down X(i,j) except X i,j.
The node admission control is initiated by the platform management end, a user initiates a node stop request at the management point interface, and then the management end judges whether the node stop can influence the consensus of the subsequent data of other nodes of the layer and the transmission of the lower layer data. Firstly judging whether the layer has a consensus node with the same level attribute as the node after the node stops, if not, refusing to stop the node, otherwise, carrying out the next round of judgment. And judging whether the node has a father node, if so, judging whether the peer node can also complete upward consensus, if not, refusing to stop the node, and if so, entering the next round of judgment. And then judging whether the child node of the node can complete upward consensus after stopping the node, if so, agreeing to stop the node, otherwise, refusing to stop the node. The node stopping result is reported to the management end, the management end selects a full-function node from father nodes which normally operate the node, then the node stopping information is reported to the node, and the node executes a data uplink method of a quasi-output control contract to uplink the information.
Aiming at node state updating requirements in daily operation of a data security circulation system based on a blockchain in a hierarchical novel cloud manufacturing application scene, contracts used for recording the states of the nodes on the blockchain are designed. All nodes need to periodically call a node state update contract to update the attribute state of the node, and the superior node of the node can check the latest attribute state at any time. After the node is successfully started, executing a timing task and periodically reporting the self state information to the father node. The method comprises the steps that a node sends information such as a name, an IP address, a hierarchical attribute, a current state and the like to a management end, the management end receives the state information, then selects a full-function node from father nodes which normally operate the node, calls a father node function interface, stores the node state information and the current time into a new node state set newMap, and finally the father node executes a data uplink method of a node state information update contract to link the state information of the child nodes. newMap and oldMap are new and old node state sets, and are composed of key-value pairs, wherein a key is node and state information thereof, and a value is current system time. And the father node screens the abnormal state of the node according to the information of the two sets.
Aiming at the requirement that the upper node needs to confirm and authorize before operations such as data query, modification and the like of the lower node in the data security circulation system based on the blockchain in the hierarchical novel cloud manufacturing application scene, the process of authorizing and approving contracts specifically comprises the steps that a user initiates a service application through an application system, and after the application system processes corresponding data, an intelligent contract is called to uplink service application information. The approval user of the service logs in the application system, inquires the application information on the chain, approves according to the service flow, stores the approval comments on the blockchain through the intelligent contract, and updates the state of the application behavior. And the user inquires the service state through the application system, and if the user is approved, the user can continue to develop the subsequent service according to the approval result.
S4, designing a low-overhead storage method for the uplink and the downlink of a block chain-based data security circulation system chain in a hierarchical novel cloud manufacturing application scene;
aiming at the requirements of the hierarchical novel cloud manufacturing application scene on the security, convenience and certainty of data circulation, the on-chain index encryption storage and the off-chain data ciphertext fragment storage on-chain and off-chain storage design flow is specifically that information related to data on a blockchain chain only has the abstract and encrypted index value of the data. After the data receiver obtains the authorization of the data owner and the decryption key corresponding to the index ciphertext, the data receiver can decrypt and obtain the index value plaintext, and obtain a plurality of ciphertexts of the data under the chain from the partitioned storage system according to the index value, and the complete ciphertext data is obtained by combining. The data receiver uses the decryption key corresponding to the ciphertext data to decrypt and obtain the data plaintext, and the data circulation from the data owner to the data receiver is realized.
S5, realizing data security circulation application based on block chains in the hierarchical novel cloud manufacturing application scene.
Under the hierarchical novel cloud manufacturing application scene, the method comprises the specific steps that the data security circulation application disassembles and repacks the received cloud manufacturing service data, packages the data security circulation application into standard data packets, and uplinks in a data security circulation blockchain network. When the data on the chain is required to be read, the hash value of the data or the file is searched through transaction hash, and the hash value is returned to a data reader in a standardized data packet format, so that the safety circulation requirements of different business side applications on the data are met.
The data flow application is in butt joint with the hierarchical blockchain platform, platform resources need to be planned, and subsequent data related operations can be subjected to uplink management. Firstly, a demand person puts forward the construction demands of a service chain and each cloud manufacturing node according to specific services, provides a reference basis for the deployment of a bottom layer block chain service of data circulation application, and provides a guarantee for the normal operation of subsequent applications. Then, system maintainers deploy the hierarchical blockchain platform, start platform services, log in the hierarchical blockchain platform by each node user, create corresponding types of nodes and start node services. After the preparation work is completed, the deployment work of the data flow application can be developed, the corresponding system configuration of the application is modified according to the deployment environment, and then the application system is started. And then, each node user can log in the application system to start each data circulation service, and the blockchain service can uplink the information records such as service data, user behaviors and the like in the service operation process and is used for supporting the data circulation management function of the application. The system administrator can perform data audit and chain audit operations, and audit data such as data records, data maintenance records, user use records of the data, user behavior records and the like.
It should be understood that the foregoing examples of the present invention are provided merely for clearly illustrating the present invention and are not intended to limit the embodiments of the present invention, and that various other changes and modifications may be made therein by one skilled in the art without departing from the spirit and scope of the present invention as defined by the appended claims.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411365242.0A CN119254404A (en) | 2024-09-29 | 2024-09-29 | Data security circulation method based on blockchain in hierarchical new cloud manufacturing application scenario |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411365242.0A CN119254404A (en) | 2024-09-29 | 2024-09-29 | Data security circulation method based on blockchain in hierarchical new cloud manufacturing application scenario |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN119254404A true CN119254404A (en) | 2025-01-03 |
Family
ID=94027558
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411365242.0A Pending CN119254404A (en) | 2024-09-29 | 2024-09-29 | Data security circulation method based on blockchain in hierarchical new cloud manufacturing application scenario |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119254404A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116170276A (en) * | 2023-02-15 | 2023-05-26 | 北京计算机技术及应用研究所 | A Design Method for Consortium Blockchain Basic Platform Supporting Non-Peer Node Relationships |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111523131A (en) * | 2020-04-16 | 2020-08-11 | 丝链(常州)控股有限公司 | Encrypted data storage method with high safety |
| CN114785804A (en) * | 2022-04-29 | 2022-07-22 | 蚂蚁区块链科技(上海)有限公司 | System and method for cross-block chain interaction |
| CN116170276A (en) * | 2023-02-15 | 2023-05-26 | 北京计算机技术及应用研究所 | A Design Method for Consortium Blockchain Basic Platform Supporting Non-Peer Node Relationships |
| CN116455549A (en) * | 2023-03-10 | 2023-07-18 | 重庆邮电大学 | A Consensus Optimization Method for Blockchain Sharding Based on Aggregate Signature |
-
2024
- 2024-09-29 CN CN202411365242.0A patent/CN119254404A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111523131A (en) * | 2020-04-16 | 2020-08-11 | 丝链(常州)控股有限公司 | Encrypted data storage method with high safety |
| CN114785804A (en) * | 2022-04-29 | 2022-07-22 | 蚂蚁区块链科技(上海)有限公司 | System and method for cross-block chain interaction |
| CN116170276A (en) * | 2023-02-15 | 2023-05-26 | 北京计算机技术及应用研究所 | A Design Method for Consortium Blockchain Basic Platform Supporting Non-Peer Node Relationships |
| CN116455549A (en) * | 2023-03-10 | 2023-07-18 | 重庆邮电大学 | A Consensus Optimization Method for Blockchain Sharding Based on Aggregate Signature |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116170276A (en) * | 2023-02-15 | 2023-05-26 | 北京计算机技术及应用研究所 | A Design Method for Consortium Blockchain Basic Platform Supporting Non-Peer Node Relationships |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12032558B2 (en) | Blockchain maintenance method and apparatus, server, and computer-readable storage medium | |
| CN115210741B (en) | partially ordered blockchain | |
| CN110870254B (en) | Method and system for providing distributed private subspaced data structures | |
| US20200371995A1 (en) | System or method to implement right to be forgotten on metadata driven blockchain using shared secrets and consensus on read | |
| US8365298B2 (en) | Comprehensive security architecture for dynamic, web service based virtual organizations | |
| CN111144881A (en) | Selective access to asset transfer data | |
| CN112866380B (en) | Chain network architecture based on block chain | |
| CN113850599B (en) | Cross-link transaction method and system applied to alliance link | |
| CN111737352B (en) | Supply chain information collaborative management method based on block chain | |
| CN111221914A (en) | Data exchange sharing tracing method based on block chain | |
| CN112615847A (en) | Data sharing and privacy protection method based on block chain | |
| WO2020228531A1 (en) | Consortium blockchain governance method and apparatus, computer device and storage medium | |
| CN119254404A (en) | Data security circulation method based on blockchain in hierarchical new cloud manufacturing application scenario | |
| WO2024244249A1 (en) | Data processing method and apparatus based on blockchain, and device and medium | |
| CN116800541A (en) | Classified and hierarchical access control and access method for flight operation data | |
| Guo et al. | Antitampering scheme of evidence transfer information in judicial system based on blockchain | |
| CN116611840A (en) | A blockchain-based distributed data asset circulation traceability system and method | |
| CN114239044B (en) | A decentralized traceable shared access system | |
| CN117786635A (en) | A ship data management system based on user rights management in the ship supply chain | |
| JP4967056B2 (en) | Policy determination apparatus, method, and program | |
| CN117896130A (en) | Industrial Internet data access control method, device, equipment and medium | |
| CN119067657A (en) | Blockchain-based data processing method, device, equipment and storage medium | |
| WO2021254282A1 (en) | Blockchain-based interconnection method and apparatus, and computer storage medium | |
| CN112348539A (en) | Industrial product circulation life cycle tracing management system based on license chain and application thereof | |
| JP4967055B2 (en) | Information processing system, method and program |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |