[go: up one dir, main page]

CN113364735B - Data cross-link access control method, system, equipment and terminal under multi-link scene - Google Patents

Data cross-link access control method, system, equipment and terminal under multi-link scene Download PDF

Info

Publication number
CN113364735B
CN113364735B CN202110486731.1A CN202110486731A CN113364735B CN 113364735 B CN113364735 B CN 113364735B CN 202110486731 A CN202110486731 A CN 202110486731A CN 113364735 B CN113364735 B CN 113364735B
Authority
CN
China
Prior art keywords
data
chain
access
cross
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110486731.1A
Other languages
Chinese (zh)
Other versions
CN113364735A (en
Inventor
董学文
张志为
刘森鹏
崔志浩
沈玉龙
王建东
祝幸辉
宋阳子
习宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202110486731.1A priority Critical patent/CN113364735B/en
Publication of CN113364735A publication Critical patent/CN113364735A/en
Application granted granted Critical
Publication of CN113364735B publication Critical patent/CN113364735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to the technical field of data access control, and discloses a data cross-link access control method, a system, equipment and a terminal under a multi-link scene, wherein the data cross-link access control method under the multi-link scene comprises the following steps: the method comprises a registration stage, data uploading, data chaining, data access, record chaining access and data acquisition. The invention can meet the data cross-chain access control requirement under the multi-chain-oriented scene, and provides a cross-chain access control scheme aiming at the problems of insufficient performance and capacity of a block chain technology under a single-chain framework and the asset exchange and information exchange requirements of the traditional technology which can not meet or realize complex cross-block chain service. The invention allows asset exchange, data sharing and contract calling among heterogeneous chains under a multi-chain scene; the deployment architecture can be flexibly organized according to scene guidance, has the core function characteristics of a universal cross-chain transmission protocol and a heterogeneous transaction verification engine, and provides reliable bottom-layer technical support for service block chain business safety management and block chain Internet formation.

Description

多链场景下数据跨链访问控制方法、系统、设备及终端Data cross-chain access control method, system, device and terminal in multi-chain scenario

技术领域technical field

本发明属于数据访问控制技术领域,尤其涉及一种多链场景下数据跨链访问控制方法、系统、设备及终端。The invention belongs to the technical field of data access control, and in particular relates to a method, system, device and terminal for data cross-chain access control in a multi-chain scenario.

背景技术Background technique

目前,当前的区块链应用和底层技术平台呈现出百花齐放的状态,但主流区块链应用中的每条链大多仍是一个独立的、垂直的封闭体系。在业务形式日益复杂的商业应用场景下,链与链之间缺乏统一的互联互通机制,这极大限制了区块链上数字资产价值的流动性,跨链需求由此而来。At present, the current blockchain applications and underlying technology platforms are in a state of blooming, but each chain in mainstream blockchain applications is still an independent, vertical closed system. In the business application scenarios with increasingly complex business forms, there is a lack of a unified interconnection mechanism between chains, which greatly limits the liquidity of the value of digital assets on the blockchain, resulting in cross-chain demand.

跨链指的是通过连接相对独立的区块链系统,实现不同账本的可信互操作。跨链依据其交换内容的不同可以大体分为数字资产交换和信息交换。在数字资产交换方面,当前资产交换主要依靠中心化的交易所来完成,中心化的交换方式既不安全、规则也不透明,业界也出现了去中心化的资产交换方式如Uniswap、Curve、SushiSwap等,但是当前的去中心化资产交易多数只能实现同一个区块链上不同合约资产的交换,对跨链数字资产去中心化交换仍不完善,事实上仍处于互相隔离的状态,信息交换由于涉及链与链之间的数据同步和相应的跨链调用,实现更为复杂,因此每个区块链应用之间互通壁垒极高,无法有效地进行链上信息共享。Cross-chain refers to the realization of trusted interoperability of different ledgers by connecting relatively independent blockchain systems. Cross-chain can be roughly divided into digital asset exchange and information exchange according to the different exchange contents. In terms of digital asset exchange, the current asset exchange mainly relies on centralized exchanges. The centralized exchange method is neither safe nor transparent. There are also decentralized asset exchange methods in the industry, such as Uniswap, Curve, SushiSwap, etc. However, most of the current decentralized asset transactions can only realize the exchange of different contract assets on the same blockchain, and the decentralized exchange of cross-chain digital assets is still not perfect. In fact, they are still isolated from each other. It involves data synchronization between chains and corresponding cross-chain calls, and the implementation is more complicated. Therefore, the interoperability barriers between each blockchain application are extremely high, and it is impossible to effectively share information on the chain.

另一方面,区块链技术在单链架构下本身存在着性能差、容量不足等问题。单链受限于去中心化、可扩展性和安全性的权衡,难以支撑高交易吞吐量低延迟的商业场景应用。此外,随着区块链运行时间的增长,其存储容量也将逐渐增长,且这种数据增长的速度甚至会超过单链存储介质的容量上限,故通过跨链技术实现多链协作的多层多链体系架构是解决区块链性能瓶颈的可取之道。因此,亟需一种多链场景下数据跨链访问控制方法、系统、设备及终端。On the other hand, the blockchain technology itself has problems such as poor performance and insufficient capacity under the single-chain architecture. A single chain is limited by the trade-offs of decentralization, scalability and security, and it is difficult to support business scenarios with high transaction throughput and low latency. In addition, as the running time of the blockchain increases, its storage capacity will also gradually increase, and the speed of this data growth will even exceed the upper limit of the capacity of a single-chain storage medium. A multi-chain architecture is a desirable way to solve blockchain performance bottlenecks. Therefore, there is an urgent need for a data cross-chain access control method, system, device and terminal in a multi-chain scenario.

通过上述分析,现有技术存在的问题及缺陷为:Through the above analysis, the existing problems and defects in the prior art are:

(1)中心化的交换方式既不安全、规则也不透明。(1) The centralized exchange method is neither safe nor transparent.

(2)当前去中心化资产交易多数只能实现同一个区块链上不同合约资产的交换,对跨链数字资产去中心化交换仍不完善,事实上仍处于互相隔离的状态。(2) Most of the current decentralized asset transactions can only realize the exchange of different contract assets on the same blockchain. The decentralized exchange of cross-chain digital assets is still not perfect, and in fact is still isolated from each other.

(3)信息交换由于涉及链与链之间的数据同步和相应的跨链调用,实现更为复杂,故每个区块链应用之间互通壁垒极高,无法有效地进行链上信息共享。(3) Information exchange is more complicated because it involves data synchronization between chains and corresponding cross-chain calls. Therefore, the barriers to interoperability between each blockchain application are extremely high, and it is impossible to effectively share information on the chain.

(4)区块链技术在单链架构下本身存在着性能差、容量不足等问题,单链受限于去中心化、可扩展性和安全性的权衡,难以支撑高交易吞吐量低延迟的商业场景应用。(4) The blockchain technology itself has problems such as poor performance and insufficient capacity under the single-chain architecture. The single-chain is limited by the balance of decentralization, scalability and security, and it is difficult to support high transaction throughput and low latency. Business scenario application.

(5)随着区块链运行时间的增长,其存储容量也将逐渐增长,且数据增长速度甚至会超过单链存储介质的容量上限,极大限制了区块链技术的健康发展。(5) As the running time of the blockchain increases, its storage capacity will gradually increase, and the data growth rate will even exceed the upper limit of the capacity of a single-chain storage medium, which greatly limits the healthy development of blockchain technology.

解决以上问题及缺陷的难度为:The difficulty of solving the above problems and defects is as follows:

(1)跨链交易的验证问题,如何确认记录交易发生的区块得到了足够的确认,即交易事务中各分布式网络间的数据一致性问题;(1) The verification problem of cross-chain transactions, how to confirm that the block that records the transaction has been confirmed enough, that is, the problem of data consistency between the distributed networks in the transaction transaction;

(2)跨链事务的原子性问题,如何管理跨链事务中的各子交易确保跨链事务整体完整的原子性,即跨链事务的发生只存在两中状态完成或失败;(2) The atomicity of cross-chain transactions, how to manage each sub-transaction in a cross-chain transaction to ensure the complete atomicity of the cross-chain transaction as a whole, that is, there are only two states of completion or failure in the occurrence of a cross-chain transaction;

(3)不同区块链之间的协议适配问题,如何对采用不同架构与协议的区块链之间进行适配,需要跨链协议中设计可以兼容多种异构区块链的数据结构、命名规范以及通信方式等。(3) Protocol adaptation between different blockchains, how to adapt blockchains with different architectures and protocols requires the design of a data structure compatible with multiple heterogeneous blockchains in the cross-chain protocol , naming conventions, and communication methods.

解决以上问题及缺陷的意义为:通过解决上述问题,一种多链场景下数据跨链访问控制方案,结合区块链去中心化、可追溯、不可篡改等技术特点,构建一个高可扩展、强鲁棒性、易升级的区块链跨链平台,为去中心化应用提供通信枢纽,支撑链上可信数据资产高效流动,服务区块链业务安全治理,为区块链互联网的形成提供可靠的底层技术支撑。保证跨链交易的安全性、灵活性与可靠性。The significance of solving the above problems and defects is: by solving the above problems, a cross-chain data access control scheme in a multi-chain scenario, combined with the technical characteristics of blockchain decentralization, traceability, and non-tampering, build a highly scalable, Robust and easy-to-upgrade blockchain cross-chain platform, providing a communication hub for decentralized applications, supporting the efficient flow of trusted data assets on the chain, serving the security governance of blockchain business, and providing services for the formation of the blockchain Internet Reliable underlying technical support. Ensure the security, flexibility and reliability of cross-chain transactions.

发明内容SUMMARY OF THE INVENTION

针对现有技术存在的问题,本发明提供了一种多链场景下数据跨链访问控制方法、系统、设备及终端。In view of the problems existing in the prior art, the present invention provides a data cross-chain access control method, system, device and terminal in a multi-chain scenario.

本发明是这样实现的,一种多链场景下数据跨链访问控制方法,所述多链场景下数据跨链访问控制方法包括以下步骤:The present invention is implemented as follows: a method for controlling data cross-chain access in a multi-chain scenario, the method for controlling data cross-chain access in a multi-chain scenario includes the following steps:

步骤一,注册阶段:每个域中用户或物联网设备在其各自归属域中进行身份注册与认证,获取身份属性信息,使得每个用户或物联网的数据分类存放,方便进行访问控制;Step 1, registration phase: users or IoT devices in each domain perform identity registration and authentication in their respective domains to obtain identity attribute information, so that the data of each user or IoT can be classified and stored, facilitating access control;

步骤二,数据上传:将加密过的数据上传至服务端存储,数据所有者DO生成随机文件密钥k,使用密钥k执行对称加密算法AES加密明文数据M生成密文C上传至服务端存储,同时记录数据M元数据信息;Step 2, data upload: upload the encrypted data to the server for storage, the data owner DO generates a random file key k, and uses the key k to execute the symmetric encryption algorithm AES to encrypt the plaintext data M to generate the ciphertext C and upload it to the server for storage , and record data M metadata information at the same time;

步骤三,数据上链:方便用户查找服务端的现有数据,数据所有者DO设定该数据访问结构策略树T,结合访问策略执行CP-ABE算法加密密钥k生成文件对称加密密钥的密文ET(k),将步骤二中元数据信息、访问策略及ET(k)生成区块,更新至数据信息链;Step 3, data upload to the chain: it is convenient for users to find the existing data on the server, the data owner DO sets the data access structure policy tree T, and executes the CP-ABE algorithm encryption key k in combination with the access policy to generate the encryption key of the file symmetric encryption key. In the text ET(k), the metadata information, access policy and ET(k) in step 2 are generated into blocks and updated to the data information chain;

步骤四,数据访问:通过中继链实现访问控制,数据请求者DU在所在域D1发起数据访问请求;若涉及跨域数据,则D1跨链通过调用中继链对数据所在域D2申请访问;D2对申请者进行判决,若判决成功,则D1传输密文数据给DU;Step 4, data access: access control is implemented through the relay chain, and the data requester DU initiates a data access request in the domain D1 where it is located; if cross-domain data is involved, D1 cross-chain applies for access to the domain D2 where the data is located by calling the relay chain; D2 makes a judgment on the applicant, if the judgment is successful, D1 transmits the ciphertext data to the DU;

步骤五,访问记录上链:记录数据的访问情况,步骤四中访问控制判定结束后,数据所在域将此次访问请求及结果的相关信息上链记录,以供后续查询与审计;Step 5: Upload the access record to the chain: record the access status of the data. After the access control determination in step 4 is completed, the domain where the data is located will record the relevant information of the access request and the result on the chain for subsequent query and audit;

步骤六,数据获取:用户解密获得数据,DU使用CP-ABE算法解密数据信息链中的ET(k)获取文件密钥k,然后使用k通过AES算法解密密文C获取明文数据M。Step 6, data acquisition: the user decrypts to obtain data, DU uses the CP-ABE algorithm to decrypt ET(k) in the data information chain to obtain the file key k, and then uses k to decrypt the ciphertext C through the AES algorithm to obtain the plaintext data M.

进一步,步骤二中,所述数据M元数据信息,包括哈希值、上传域、文件大小、上传时间和所有者。Further, in step 2, the metadata information of the data M includes hash value, upload domain, file size, upload time and owner.

进一步,步骤二中,所述数据跨链调用,包括:Further, in step 2, the data cross-chain call includes:

(1)进行跨链访问时,应用链A在所在域D1向自治域D2的应用链B发出跨链访问请求时;(1) When performing cross-chain access, when application chain A sends a cross-chain access request to application chain B in autonomous domain D2 in its domain D1;

(2)应用链A通过调用中继链进行跨链访问,中继链对访问链进行身份认证与合法性确认,通过属性映射将域D1属性映射为域D2属性,使得请求者获取域D2属性;(2) Application chain A performs cross-chain access by calling the relay chain. The relay chain performs identity authentication and legality confirmation on the access chain, and maps the domain D1 attribute to the domain D2 attribute through attribute mapping, so that the requester can obtain the domain D2 attribute. ;

(3)中继链根据映射后的D2属性集生成D2颁发的公私钥对分发至数据请求者,并将调用请求转发至应用链B;(3) The relay chain generates the public and private key pair issued by D2 according to the mapped D2 attribute set and distributes it to the data requester, and forwards the call request to application chain B;

(4)应用链B传输密文数据信息至数据请求者。(4) Application chain B transmits ciphertext data information to the data requester.

进一步,步骤二和步骤六中,所述CP-ABE算法,包括:Further, in step 2 and step 6, the CP-ABE algorithm includes:

(1)系统初始化算法(1τ)→(PK,MK):输入一个安全参数τ,输出系统公钥PK和主密钥MK;(1) System initialization algorithm (1 τ )→(PK, MK): input a security parameter τ, and output the system public key PK and master key MK;

(2)密钥生成算法(PK,MK,S)→(SK):输入一个属性集合S、主密钥MK和公钥PK,输出用户私钥SK;(2) Key generation algorithm (PK, MK, S)→(SK): input an attribute set S, master key MK and public key PK, and output user private key SK;

(3)加密算法(PK,M,AS)→(CT):输入一个需要加密的明文M、公钥PK和访问结构AS,输出包含访问策略的密文CT;(3) Encryption algorithm (PK, M, AS) → (CT): input a plaintext M, public key PK and access structure AS that need to be encrypted, and output the ciphertext CT containing the access policy;

(4)解密算法(PK,SK,CT)→(M):输入包含访问策略AS的密文CT、由属性集合所生成的公钥PK和私钥SK,如果属性集合S满足访问策略时,用户即可成功解密出明文M。(4) Decryption algorithm (PK, SK, CT) → (M): input the ciphertext CT containing the access policy AS, the public key PK and the private key SK generated by the attribute set, if the attribute set S satisfies the access policy, The user can successfully decrypt the plaintext M.

进一步,所述多链场景下数据跨链访问控制方法还包括数据跨域访问,所述数据跨域访问,包括:Further, the data cross-chain access control method in the multi-chain scenario further includes data cross-domain access, and the data cross-domain access includes:

(1)完成区块链网络内各个云组织之间属性映射,由跨链服务管理平台维护属性映射表;(1) Complete the attribute mapping between various cloud organizations in the blockchain network, and the cross-chain service management platform maintains the attribute mapping table;

(2)用户进行身份注册,自动化生成用户公私钥对和用户属性;(2) The user performs identity registration, and automatically generates the user's public-private key pair and user attributes;

(3)数据所有者DO生成随机文件密钥k,使用密钥k执行对称加密算法加密明文数据M生成密文C上传至自治域,并记录数据M元数据信息;其中,所述数据M元数据信息包括:数据所在域FileAddr、数据关键词集合Keywords和加密文件的散列值hash;(3) The data owner DO generates a random file key k, uses the key k to perform a symmetric encryption algorithm to encrypt the plaintext data M, generates a ciphertext C and uploads it to the autonomous domain, and records the data M metadata information; wherein, the data M element The data information includes: the data domain FileAddr, the data keyword set Keywords and the hash value of the encrypted file;

(4)DO设定该数据访问结构策略树T,调用跨链服务管理平台属性映射接口完成各域间属性映射扩展;(4) DO sets the data access structure strategy tree T, and invokes the cross-chain service management platform attribute mapping interface to complete the extension of attribute mapping between domains;

(5)DO执行CP-ABE算法加密密钥k生成ET(k),将元数据信息、访问策略及ET(k)生成区块,将生成的文件信息经过共识算法上链;(5) DO executes the CP-ABE algorithm encryption key k to generate ET(k), generates a block with metadata information, access policy and ET(k), and uploads the generated file information to the chain through a consensus algorithm;

(6)数据使用者DU可通过文件信息链FIC检索多域下所有数据信息,调用跨链接口发起数据访问请求;(6) The data user DU can retrieve all data information in multiple domains through the file information chain FIC, and call the cross-chain interface to initiate a data access request;

(7)跨链服务管理平台通过文件信息链FIC和中继链自动查询数据访问策略和用户属性,进行访问判决,若DU属性匹配策略,转步骤(9);否则拒绝访问,流程结束;(7) The cross-chain service management platform automatically queries the data access policy and user attributes through the file information chain FIC and the relay chain, and makes an access judgment. If the DU attribute matches the policy, go to step (9); otherwise, the access is refused, and the process ends;

(8)目标链所在域传输数据密文C给DU;(8) The domain where the target chain is located transmits the data ciphertext C to the DU;

(9)DU首先通过解密数据信息链中的ET(k)获取文件密钥k,然后使用k通过解密密文C获取明文数据。(9) DU first obtains the file key k by decrypting ET(k) in the data information chain, and then uses k to obtain the plaintext data by decrypting the ciphertext C.

进一步,所述多链场景下数据跨链访问控制方法,还包括基于多云共识的共识机制Raft更新区块,当系统中有用户发起的新提案时,由于当前区块链的记账权由领导者节点掌握,跟随者节点具体工作;其中,所述区块更新,包括:Further, the data cross-chain access control method in the multi-chain scenario also includes the multi-cloud consensus-based consensus mechanism Raft to update the block. When there is a new proposal initiated by the user in the system, since the accounting right of the current blockchain is led by the leader. The follower node masters, and the follower node works specifically; wherein, the block update includes:

(1)跟随者将提案行为发送给领导者节点;(1) The follower sends the proposal behavior to the leader node;

(2)领导者节点验证证书的数字签名,校验通过后将收到的数字证书和操作类型打包成区块,并把该区块向所有跟随者节点广播;(2) The leader node verifies the digital signature of the certificate. After the verification is passed, the received digital certificate and operation type are packaged into a block, and the block is broadcast to all follower nodes;

(3)跟随者节点验证区块内容后向领导者节点返回响应;(3) The follower node returns a response to the leader node after verifying the block content;

(4)领导者节点在收获超过一半的节点响应后,通知所有跟随者节点确认写入该区块,跟随者节点再通知各自域内节点更新区块链,完成账本更新。(4) After the leader node receives more than half of the node responses, it notifies all the follower nodes to confirm the writing of the block, and the follower nodes then notify the nodes in their respective domains to update the blockchain and complete the ledger update.

本发明的另一目的在于提供一种应用所述的多链场景下数据跨链访问控制方法的多链场景下数据跨链访问控制系统,所述多链场景下数据跨链访问控制系统包括:Another object of the present invention is to provide a data cross-chain access control system in a multi-chain scenario that applies the method for data cross-chain access control in a multi-chain scenario. The data cross-chain access control system in the multi-chain scenario includes:

用户模块,由用户实体组成,是数据调用的实际参与者,用于用户身份注册、访问数据和上传数据;User module, composed of user entities, is the actual participant of data call, used for user identity registration, access data and upload data;

多链自治模块,由多个服务自治域D组成,用于负责用户身份注册与属性颁发,以及用于属性加密的密钥生成与分发,同时记录数据信息,每个域拥有其独立维护的数据信息链与访问记录链;The multi-chain autonomous module consists of multiple service autonomous domains D. It is responsible for user identity registration and attribute issuance, as well as key generation and distribution for attribute encryption, and records data information at the same time. Each domain has its own independently maintained data Information chain and access record chain;

数据存储模块,由具有强大计算能力和大存储容量的云服务提供商CSP和其他物联网设备组成,用于负责数据的存储及下载服务。The data storage module is composed of cloud service provider CSPs with powerful computing power and large storage capacity and other IoT devices, which are responsible for data storage and download services.

进一步,所述用户模块包括用于用户身份注册、属性分配的认证单元,用于根据用户操作要求对数据进行上传、下载、修改等动作的操作单元,用于记录用户的访问请求与对应结果的访问记录链ARC。Further, the user module includes an authentication unit for user identity registration and attribute distribution, an operation unit for uploading, downloading, and modifying data according to user operation requirements, and for recording user access requests and corresponding results. Access Chain of Records ARC.

所述访问记录链ARC包括数据访问用户DU、访问用户所在域D、数据访问时间FileTime、数据所在域FileAddr及访问结果AccessResult。The access record chain ARC includes the data access user DU, the domain D where the access user is located, the data access time FileTime, the data domain FileAddr and the access result AccessResult.

所述多链自治模块包括采用Raft协议使域内各节点达成共识的共识机制,用于进行跨链调用和域间差异化属性映射的中继链,用于维护数据所有者DO上传数据的元信息的文件信息链FIC。The multi-chain autonomous module includes a consensus mechanism that uses the Raft protocol to make each node in the domain reach a consensus, a relay chain used for cross-chain calls and differentiated attribute mapping between domains, and is used to maintain the metadata of the data uploaded by the data owner DO. The file information link FIC.

所述文件信息链FIC包括数据所在域FileAddr、数据关键词集合Keywords、加密文件的散列值hash及经过属性基CP-ABE加密后,用户加密文件所使用的文件对称加密密钥的密文ET(k)。The file information chain FIC includes the domain FileAddr where the data is located, the data keyword set Keywords, the hash value hash of the encrypted file, and the ciphertext ET of the file symmetric encryption key used by the user to encrypt the file after being encrypted by the attribute base CP-ABE. (k).

所述数据存储模块,用于存储经过数据所有者DO加密上传后的数据,接受数据访问者DU的请求并提供密文下载服务。The data storage module is used to store the data encrypted and uploaded by the data owner DO, accept the request of the data visitor DU and provide the ciphertext download service.

本发明的另一目的在于提供一种计算机设备,所述计算机设备包括存储器和处理器,所述存储器存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行如下步骤:Another object of the present invention is to provide a computer device, the computer device includes a memory and a processor, the memory stores a computer program, and when the computer program is executed by the processor, the processor executes the following step:

(1)注册阶段:每个域中用户或物联网设备在其各自归属域中进行身份注册与认证,获取身份属性信息;(1) Registration stage: users or IoT devices in each domain perform identity registration and authentication in their respective home domains to obtain identity attribute information;

(2)数据上传:数据所有者DO生成随机文件密钥k,使用密钥k执行对称加密算法AES加密明文数据M生成密文C上传至服务端存储,同时记录数据M元数据信息;(2) Data upload: The data owner DO generates a random file key k, and uses the key k to execute the symmetric encryption algorithm AES to encrypt the plaintext data M to generate the ciphertext C and upload it to the server for storage, while recording the metadata information of the data M;

(3)数据上链:数据所有者DO设定该数据访问结构策略树T,结合访问策略执行CP-ABE算法加密密钥k生成ET(k),将步骤二中元数据信息、访问策略及ET(k)生成区块,更新至数据信息链;(3) Data on-chain: The data owner DO sets the data access structure policy tree T, executes the CP-ABE algorithm encryption key k in combination with the access policy to generate ET(k), and combines the metadata information, access policy and ET(k) generates a block and updates it to the data information chain;

(4)数据访问:数据请求者DU在所在域D1发起数据访问请求;若涉及跨域数据,则D1跨链通过调用中继链对数据所在域D2申请访问;D2对申请者进行判决,若判决成功,则D1传输密文数据给DU;(4) Data access: The data requester DU initiates a data access request in the domain D1 where it is located; if cross-domain data is involved, D1 cross-chain applies for access to the domain D2 where the data is located by calling the relay chain; D2 makes a judgment on the applicant, if If the judgment is successful, D1 transmits the ciphertext data to the DU;

(5)访问记录上链:步骤四中访问控制判定结束后,数据所在域将此次访问请求及结果的相关信息上链记录,以供后续查询与审计;(5) The access record is uploaded to the chain: After the access control judgment in step 4 is completed, the domain where the data is located will record the relevant information of the access request and the result on the chain for subsequent query and audit;

(6)数据获取:DU使用CP-ABE算法解密数据信息链中的ET(k)获取文件密钥k,然后使用k通过AES算法解密密文C获取明文数据M。(6) Data acquisition: DU uses the CP-ABE algorithm to decrypt ET(k) in the data information chain to obtain the file key k, and then uses k to decrypt the ciphertext C through the AES algorithm to obtain the plaintext data M.

本发明的另一目的在于提供一种信息数据处理终端,所述信息数据处理终端用于实现所述的多链场景下数据跨链访问控制系统。Another object of the present invention is to provide an information data processing terminal, which is used to implement the data cross-chain access control system in the multi-chain scenario.

结合上述的所有技术方案,本发明所具备的优点及积极效果为:本发明提供的多链场景下数据跨链访问控制方法,能够满足面向多链场景下的数据跨链访问控制需求,针对区块链技术在单链架构下存在着性能、容量不足问题和传统技术无法满足或者实现复杂的跨区块链业务的资产交换和信息交换需求提出了跨链访问控制方案。本发明允许多链场景下异构链间的资产交换、数据共享及合约调用。依据场景导向可灵活组织部署架构,具有通用跨链传输协议、异构交易验证引擎核心功能特性,保证跨链交易的安全性、灵活性与可靠性。该方案为去中心化应用提供通信枢纽,支撑了链上可信数据资产高效流动,为服务区块链业务安全治理、区块链互联网的形成提供了可靠的底层技术支撑。Combining all the above technical solutions, the advantages and positive effects of the present invention are as follows: the data cross-chain access control method in a multi-chain scenario provided by the present invention can meet the data cross-chain access control requirements in a multi-chain scenario. Blockchain technology has problems of insufficient performance and capacity under the single-chain architecture, and traditional technologies cannot meet or realize complex cross-blockchain business asset exchange and information exchange requirements. A cross-chain access control scheme is proposed. The present invention allows asset exchange, data sharing and contract invocation between heterogeneous chains in a multi-chain scenario. The deployment architecture can be flexibly organized and deployed according to the scenario orientation. It has the core functional characteristics of a general cross-chain transmission protocol and a heterogeneous transaction verification engine to ensure the security, flexibility and reliability of cross-chain transactions. This solution provides a communication hub for decentralized applications, supports the efficient flow of trusted data assets on the chain, and provides reliable underlying technical support for serving blockchain business security governance and the formation of blockchain Internet.

附图说明Description of drawings

为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例中所需要使用的附图做简单的介绍,显而易见地,下面所描述的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the following will briefly introduce the accompanying drawings that need to be used in the embodiments of the present invention. Obviously, the drawings described below are only some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort.

图1是本发明实施例提供的多链场景下数据跨链访问控制方法流程图。FIG. 1 is a flowchart of a method for data cross-chain access control in a multi-chain scenario provided by an embodiment of the present invention.

图2是本发明实施例提供的数据跨链访问控制方法的跨链访问流程图。FIG. 2 is a flow chart of cross-chain access of a data cross-chain access control method provided by an embodiment of the present invention.

图3是本发明实施例提供的多链场景下数据跨链访问控制系统结构框图;3 is a structural block diagram of a data cross-chain access control system in a multi-chain scenario provided by an embodiment of the present invention;

图中:1、用户模块;2、多链自治模块;3、数据存储模块。In the figure: 1. User module; 2. Multi-chain autonomous module; 3. Data storage module.

图4是本发明实施例提供的多链场景下数据跨链访问控制系统结构原理图。FIG. 4 is a schematic structural diagram of a data cross-chain access control system in a multi-chain scenario provided by an embodiment of the present invention.

图5是本发明实施例提供的数据跨链访问控制方法的跨域属性映射示意图。FIG. 5 is a schematic diagram of cross-domain attribute mapping of a method for data cross-chain access control provided by an embodiment of the present invention.

图6是本发明实施例提供的数据跨链访问控制方法的跨链调用流程图。FIG. 6 is a flowchart of a cross-chain call of a data cross-chain access control method provided by an embodiment of the present invention.

图7是本发明实施例提供的数据跨链访问控制方法的CP-ABE原理示意图。FIG. 7 is a schematic diagram of a CP-ABE principle of a data cross-chain access control method provided by an embodiment of the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

针对现有技术存在的问题,本发明提供了一种多链场景下数据跨链访问控制方法、系统、设备及终端,下面结合附图对本发明作详细的描述。In view of the problems existing in the prior art, the present invention provides a method, system, device and terminal for data cross-chain access control in a multi-chain scenario. The present invention is described in detail below with reference to the accompanying drawings.

如图1所示,本发明实施例提供的多链场景下数据跨链访问控制方法包括以下步骤:As shown in FIG. 1 , the method for data cross-chain access control in a multi-chain scenario provided by an embodiment of the present invention includes the following steps:

S101,注册阶段:每个域中用户或物联网设备在其各自归属域中进行身份注册与认证,获取身份属性信息;S101, registration stage: the user or IoT device in each domain performs identity registration and authentication in its respective home domain to obtain identity attribute information;

S102,数据上传:数据所有者DO生成随机文件密钥k,使用密钥k执行对称加密算法AES加密明文数据M生成密文C上传至服务端存储,同时记录数据M元数据信息;S102, data upload: the data owner DO generates a random file key k, and uses the key k to execute the symmetric encryption algorithm AES to encrypt the plaintext data M to generate the ciphertext C and upload it to the server for storage, and record the metadata information of the data M at the same time;

S103,数据上链:数据所有者DO设定该数据访问结构策略树T,结合访问策略执行CP-ABE算法加密密钥k生成文件对称加密密钥的密文ET(k),将S102中元数据信息、访问策略及ET(k)生成区块,更新至数据信息链;S103, the data is uploaded to the chain: the data owner DO sets the data access structure policy tree T, and executes the CP-ABE algorithm encryption key k in combination with the access policy to generate the ciphertext ET(k) of the file symmetric encryption key, and converts the S102 central element Data information, access policies and ET(k) generation blocks are updated to the data information chain;

S104,数据访问:数据请求者DU在所在域D1发起数据访问请求;若涉及跨域数据,则D1跨链通过调用中继链对数据所在域D2申请访问;D2对申请者进行判决,若判决成功,则D1传输密文数据给DU;S104, data access: the data requester DU initiates a data access request in the domain D1 where it is located; if cross-domain data is involved, D1 cross-chain applies for access to the domain D2 where the data is located by calling the relay chain; D2 makes a judgment on the applicant, if the judgment is made If successful, D1 transmits ciphertext data to DU;

S105,访问记录上链:S104中访问控制判定结束后,数据所在域将此次访问请求及结果的相关信息上链记录,以供后续查询与审计;S105, the access record is uploaded to the chain: after the access control determination in S104 is completed, the domain where the data is located will record the relevant information of the access request and the result on the chain for subsequent query and audit;

S106,数据获取:DU使用CP-ABE算法解密数据信息链中的ET(k)获取文件密钥k,然后使用k通过AES算法解密密文C获取明文数据M。S106, data acquisition: DU uses the CP-ABE algorithm to decrypt ET(k) in the data information chain to obtain the file key k, and then uses k to decrypt the ciphertext C through the AES algorithm to obtain plaintext data M.

本发明实施例提供的数据跨链访问控制方法的跨链访问流程图如图2所示。The cross-chain access flowchart of the data cross-chain access control method provided by the embodiment of the present invention is shown in FIG. 2 .

如图3所示,本发明实施例提供的多链场景下数据跨链访问控制系统包括:As shown in FIG. 3 , the data cross-chain access control system in the multi-chain scenario provided by the embodiment of the present invention includes:

用户模块1,由用户实体组成,是数据调用的实际参与者,用于用户身份注册、访问数据和上传数据;User module 1, composed of user entities, is the actual participant of data invocation, used for user identity registration, access data and upload data;

多链自治模块2,由多个服务自治域D组成,用于负责用户身份注册与属性颁发,以及用于属性加密的密钥生成与分发,同时记录数据信息,每个域拥有其独立维护的数据信息链与访问记录链;Multi-chain autonomous module 2, composed of multiple service autonomous domains D, is responsible for user identity registration and attribute issuance, as well as key generation and distribution for attribute encryption, and records data information at the same time. Each domain has its own independent maintenance. Data information chain and access record chain;

数据存储模块3,由具有强大计算能力和大存储容量的云服务提供商CSP和其他物联网设备组成,用于负责数据的存储及下载服务。The data storage module 3 is composed of a cloud service provider CSP with powerful computing power and large storage capacity and other IoT devices, and is used for data storage and download services.

本发明实施例提供的多链场景下数据跨链访问控制系统结构原理图如图4所示。FIG. 4 is a schematic structural diagram of a data cross-chain access control system in a multi-chain scenario provided by an embodiment of the present invention.

下面结合实施例对本发明的技术方案作进一步描述。The technical solutions of the present invention will be further described below in conjunction with the embodiments.

实施例1Example 1

本发明实施例提供的数据跨链访问控制系统,包括:The data cross-chain access control system provided by the embodiment of the present invention includes:

由用户实体组成的用户模块,是数据调用的实际参与者,用于用户身份注册、访问数据和上传数据。The user module, which is composed of user entities, is the actual participant of the data call, which is used for user identity registration, access data and upload data.

多个自治域(domain,D)组成的多链自治模块,负责用户身份注册与属性颁发,以及用于属性加密的密钥生成与分发,同时记录数据信息,每个域拥有其独立维护的数据信息链与访问记录链。A multi-chain autonomous module composed of multiple autonomous domains (domain, D) is responsible for user identity registration and attribute issuance, as well as key generation and distribution for attribute encryption, and records data information at the same time. Each domain has its own independently maintained data Information chain and access record chain.

由具有强大计算能力和大存储容量的云服务提供商(cloud service provider,CSP)和其他物联网设备组成的数据存储模块,负责数据的存储及下载服务。A data storage module composed of cloud service providers (CSPs) with powerful computing power and large storage capacity and other IoT devices, is responsible for data storage and download services.

本发明实施例提供的用户模块包括用于用户身份注册、属性分配的认证单元,用于根据用户操作要求对数据进行上传、下载、修改等动作的操作单元,用于记录用户的访问请求与对应结果的访问记录链ARC。The user module provided by the embodiment of the present invention includes an authentication unit for user identity registration and attribute allocation, an operation unit for uploading, downloading, and modifying data according to user operation requirements, and for recording user access requests and corresponding The resulting access record chain ARC.

进一步,所述访问记录链ARC包括数据访问用户DU、访问用户所在域D、数据访问时间FileTime、数据所在域FileAddr及访问结果AccessResult。Further, the access record chain ARC includes the data access user DU, the domain D where the access user is located, the data access time FileTime, the domain where the data is located FileAddr, and the access result AccessResult.

本发明实施例提供的多链自治模块包括采用Raft协议使各节点达成共识的共识机制,用于维护数据所有者DO上传数据的元信息的文件信息链FIC。The multi-chain autonomous module provided by the embodiment of the present invention includes a consensus mechanism that uses the Raft protocol to make each node reach a consensus, and a file information chain FIC used to maintain the metadata of the data uploaded by the data owner DO.

本发明实施例提供的文件信息链FIC主要包括数据所在域FileAddr、数据关键词集合Keywords、加密文件的散列值hash及经过属性基CP-ABE加密后,用户加密文件所使用的文件对称加密密钥的密文ET(k)。The file information chain FIC provided by the embodiment of the present invention mainly includes the domain FileAddr where the data is located, the data keyword set Keywords, the hash value hash of the encrypted file, and the file symmetric encryption key used by the user to encrypt the file after the attribute-based CP-ABE encryption. The ciphertext ET(k) of the key.

本发明实施例提供的数据存储模块,存储经过数据所有者(data owner,DO)加密上传后的数据,接受数据访问者(data user,DU)的请求并提供密文下载服务。The data storage module provided by the embodiment of the present invention stores data encrypted and uploaded by a data owner (DO), accepts requests from a data user (DU), and provides a ciphertext download service.

实施例2Example 2

如图5所示,本发明实施例提供的数据跨链访问控制方法的跨域属性映射示意图。该模型中各个域内都采用基于密文策略的属性基加密CP-ABE进行数据访问控制,各域资源属性分为通用属性与映射属性,通用属性表示各域内具有普适性的通用型属性,如姓名、性别、年龄等;映射属性表示仅适用于本域内,跨域调用时需要进行属性映射的局部属性。在进行数据跨链访问时,数据所在链通过中继链完成策略属性映射。当其中任意一个自治域D1中的用户向自治域D2发出跨链访问请求时,通过属性映射可以把自治域D2中的属性通过中继链映射给域D1,使得域D1中用户获得域D2中的属性,进而可以对域D2内的某些资源进行访问操作。As shown in FIG. 5 , a schematic diagram of cross-domain attribute mapping of the data cross-chain access control method provided by the embodiment of the present invention is shown. In this model, attribute-based encryption CP-ABE based on ciphertext strategy is used for data access control in each domain. The resource attributes of each domain are divided into general attributes and mapping attributes. Common attributes represent universal general attributes in each domain, such as Name, gender, age, etc.; the mapped attributes represent local attributes that are only applicable in this domain, and need to be mapped when calling across domains. When accessing data across chains, the chain where the data resides completes policy attribute mapping through the relay chain. When a user in any one of the autonomous domains D1 sends a cross-chain access request to the autonomous domain D2, the attributes in the autonomous domain D2 can be mapped to the domain D1 through the relay chain through the attribute mapping, so that the users in the domain D1 can obtain the information in the domain D2. , and then you can access some resources in domain D2.

图6是本发明的数据跨链访问调用的流程图。具体工作流程如下:FIG. 6 is a flowchart of the data cross-chain access call of the present invention. The specific workflow is as follows:

步骤一,应用链A在所在域D1向自治域D2的应用链B发出跨链访问请求时;Step 1, when application chain A sends a cross-chain access request to application chain B in autonomous domain D2 in its domain D1;

步骤二,应用链A通过调用中继链进行跨链访问,中继链对访问链进行身份认证与合法性确认,通过属性映射将域D1属性映射为域D2属性,使得请求者获取域D2属性;Step 2: Application chain A performs cross-chain access by calling the relay chain. The relay chain performs identity authentication and legality confirmation on the access chain, and maps the domain D1 attribute to the domain D2 attribute through attribute mapping, so that the requester can obtain the domain D2 attribute. ;

步骤三,中继链根据映射后的D2属性集生成D2颁发的公私钥对分发至数据请求者,并将调用请求转发至应用链B;Step 3, the relay chain generates a public-private key pair issued by D2 according to the mapped D2 attribute set and distributes it to the data requester, and forwards the call request to application chain B;

步骤四,应用链B传输密文数据信息至数据请求者。Step 4: The application chain B transmits the ciphertext data information to the data requester.

图7是本发明实施例提供的数据跨链访问控制方法的CP-ABE原理示意图。具体步骤如下:FIG. 7 is a schematic diagram of a CP-ABE principle of a data cross-chain access control method provided by an embodiment of the present invention. Specific steps are as follows:

步骤一,系统初始化算法(1τ)→(PK,MK):输入一个安全参数τ,输出系统公钥PK和主密钥MK;Step 1, system initialization algorithm (1 τ )→(PK, MK): input a security parameter τ, output the system public key PK and master key MK;

步骤二,密钥生成算法(PK,MK,S)→(SK):输入一个属性集合S、主密钥MK和公钥PK,输出用户私钥SK;Step 2, key generation algorithm (PK, MK, S)→(SK): input an attribute set S, master key MK and public key PK, and output the user private key SK;

步骤三,加密算法(PK,M,AS)→(CT):输入一个需要加密的明文M、公钥PK和访问结构AS,输出包含访问策略的密文CT;Step 3, encryption algorithm (PK, M, AS) → (CT): input a plaintext M, public key PK and access structure AS that need to be encrypted, and output the ciphertext CT containing the access policy;

步骤四,解密算法(PK,SK,CT)→(M):输入包含访问策略AS的密文CT、由属性集合所生成的公钥PK和私钥SK,如果属性集合S满足访问策略时,用户就可以成功的解密出明文M。Step 4: Decryption algorithm (PK, SK, CT) → (M): input the ciphertext CT containing the access policy AS, the public key PK and the private key SK generated by the attribute set, if the attribute set S satisfies the access policy, The user can successfully decrypt the plaintext M.

综上,数据跨链访问控制系统,能够满足面向多链场景下的数据跨链访问需求,针对区块链技术在单链架构下存在着性能、容量不足问题和传统技术无法满足或者实现复杂的跨区块链业务的资产交换和信息交换需求提出了跨链访问控制方案。允许多链场景下异构链间的资产交换、数据共享及合约调用。依据场景导向可灵活组织部署架构,具有通用跨链传输协议、异构交易验证引擎核心功能特性,保证跨链交易的安全性、灵活性与可靠性。该方案为去中心化应用提供通信枢纽,支撑了链上可信数据资产高效流动,为服务区块链业务安全治理、区块链互联网的形成提供了可靠的底层技术支撑。In summary, the data cross-chain access control system can meet the data cross-chain access requirements in multi-chain scenarios. For the blockchain technology in the single-chain architecture, there are problems of insufficient performance and capacity, and traditional technologies cannot meet or achieve complex problems. The asset exchange and information exchange requirements of cross-blockchain business propose a cross-chain access control scheme. It allows asset exchange, data sharing and contract invocation between heterogeneous chains in multi-chain scenarios. The deployment architecture can be flexibly organized and deployed according to the scenario orientation. It has the core functional characteristics of a general cross-chain transmission protocol and a heterogeneous transaction verification engine to ensure the security, flexibility and reliability of cross-chain transactions. This solution provides a communication hub for decentralized applications, supports the efficient flow of trusted data assets on the chain, and provides reliable underlying technical support for serving blockchain business security governance and the formation of blockchain Internet.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用全部或部分地以计算机程序产品的形式实现,所述计算机程序产品包括一个或多个计算机指令。在计算机上加载或执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输)。所述计算机可读取存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘SolidState Disk(SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in whole or in part in the form of a computer program product, the computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center by wireline (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.)). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, etc. that includes one or more available mediums integrated. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.

以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,都应涵盖在本发明的保护范围之内。The above are only specific embodiments of the present invention, but the protection scope of the present invention is not limited to this. Any person skilled in the art is within the technical scope disclosed by the present invention, and all within the spirit and principle of the present invention Any modifications, equivalent replacements and improvements made within the scope of the present invention should be included within the protection scope of the present invention.

Claims (9)

1. A data cross-link access control method under a multi-link scene is characterized by comprising the following steps:
a registration stage: the method comprises the steps that a user or Internet of things equipment in each domain performs identity registration and authentication in the home domain of the user or the Internet of things equipment to acquire identity attribute information;
and (3) data uploading: a data owner DO generates a random file key k, a symmetric encryption algorithm AES is executed by using the key k to encrypt plaintext data M to generate a ciphertext C, the ciphertext C is uploaded to a server side to be stored, and meanwhile metadata information of the data M is recorded;
data uplink: the data owner DO sets the data access structure strategy tree T, executes a CP-ABE algorithm encryption key k to generate an ET (k) by combining an access strategy, and updates the metadata information, the access strategy and an ET (k) generation block to a data information chain;
data access: the data requestor DU initiates a data access request in the domain D1; if the cross-domain data is involved, D1 cross-link applies for access to the domain D2 where the data is located by calling a relay link; d2 judges the applicant, if the judgment is successful, D2 transmits the ciphertext data to DU;
access to the record uplink: after the access control judgment is finished, the domain where the data is located records the access request and the related information uplink of the result for subsequent inquiry and audit;
data acquisition: the DU decrypts ET (k) in the data information chain by using a CP-ABE algorithm to obtain a file key k, and then decrypts the ciphertext C by using k through an AES algorithm to obtain plaintext data M;
the data cross-chain calling comprises the following steps:
(1) when cross-link access is carried out, the application chain A is in a state that the domain D1 sends a cross-link access request to the application chain B of the autonomous domain D2;
(2) the application chain A calls the relay chain to perform cross-chain access, the relay chain performs identity authentication and validity confirmation on the access chain, and the domain D1 attribute is mapped into the domain D2 attribute through attribute mapping, so that the requester acquires the domain D2 attribute;
(3) the relay chain generates a public and private key pair issued by D2 according to the mapped D2 attribute set, distributes the public and private key pair to a data requester, and forwards a call request to an application chain B;
(4) the application chain B transmits the ciphertext data message to the data requestor.
2. The method for controlling data cross-chain access in a multi-chain scenario according to claim 1, wherein the data M metadata information includes a hash value, an upload domain, a file size, an upload time, and an owner.
3. The method for controlling data cross-chain access in a multi-chain scenario according to claim 1, wherein the CP-ABE algorithm includes:
(1) system initialization algorithm (1) τ ) → (PK, MK): inputting a security parameter tau, and outputting a system public key PK and a master key MK;
(2) key generation algorithm (PK, MK, S) → (SK): inputting an attribute set S, a master key MK and a public key PK, and outputting a user private key SK;
(3) encryption algorithm (PK, M, AS) → (CT): inputting a plaintext M to be encrypted, a public key PK and an access structure AS, and outputting a ciphertext CT containing an access strategy;
(4) decryption algorithm (PK, SK, CT) → (M): and inputting a ciphertext CT containing an access strategy AS, a public key PK generated by the attribute set and a private key SK, and if the attribute set S meets the access strategy, successfully decrypting the plaintext M by the user.
4. The method for controlling data cross-chain access in a multi-chain scenario according to claim 1, wherein the method for controlling data cross-chain access in a multi-chain scenario further comprises data cross-domain access, and the data cross-domain access comprises:
(1) completing attribute mapping among all cloud organizations in a block chain network, and maintaining an attribute mapping table by a cross-chain service management platform;
(2) the user registers identity, and automatically generates a user public and private key pair and user attributes;
(3) a data owner DO generates a random file key k, a symmetric encryption algorithm is executed by using the key k to encrypt plaintext data M, a ciphertext C is generated and uploaded to an autonomous domain, and metadata information of the data M is recorded; wherein the data M metadata information includes: the method comprises the following steps that a field FileAddr where data are located, a data keyword set key and a hash value hash of an encrypted file are obtained;
(4) the DO sets the strategy tree T of the data access structure, and invokes a cross-chain service management platform attribute mapping interface to complete the mapping expansion of each inter-domain attribute;
(5) the DO executes the CP-ABE algorithm encryption key k to generate an ET (k), the metadata information, the access strategy and the ET (k) are generated into a block, and the generated file information is uplinked through a consensus algorithm;
(6) the data user DU can retrieve all data information under multiple domains through a file information link FIC and call a cross-link interface to initiate a data access request;
(7) automatically querying a data access strategy and user attributes through a file information chain FIC and a relay chain by the cross-link service management platform, carrying out access judgment, and if the DU attributes match the strategy, turning to the step (9); otherwise, access is refused, and the process is ended;
(8) transmitting a data ciphertext C to the DU by the domain where the target link is located;
(9) the DU first obtains a file key k by decrypting et (k) in the data information chain, and then obtains plaintext data by decrypting ciphertext C using k.
5. The method for controlling data cross-chain access in a multi-chain scene according to claim 1, further comprising a knowledge mechanism Raft update block based on multi-cloud consensus, wherein when a new proposal initiated by a user is in the system, the follower node specifically works because the accounting right of the current block chain is mastered by the leader node; wherein the block update comprises:
(1) the follower sends the proposal behavior to the leader node;
(2) the leader node verifies the digital signature of the certificate, packs the received digital certificate and the operation type into a block after the verification is passed, and broadcasts the block to all the follower nodes;
(3) the follower node returns a response to the leader node after verifying the block content;
(4) and after the leader node obtains more than half of the node responses, informing all follower nodes to confirm writing in the block, and informing the follower nodes of the nodes in each domain to update the block chain to complete the account book update.
6. A data cross-chain access control system under a multi-chain scene for implementing the data cross-chain access control method under the multi-chain scene according to any one of claims 1 to 5, wherein the data cross-chain access control system under the multi-chain scene comprises:
the user module consists of user entities, is an actual participant of data calling, and is used for registering user identities, accessing data and uploading data;
the multi-chain autonomous module consists of a plurality of service autonomous domains D and is used for being responsible for user identity registration and attribute issuance, generating and distributing a key for attribute encryption and simultaneously recording data information, and each domain has a data information chain and an access record chain which are independently maintained;
the data storage module consists of a cloud service provider CSP with strong computing capacity and large storage capacity and other Internet of things equipment and is used for being responsible for data storage and downloading services.
7. The system according to claim 6, wherein the user module includes an authentication unit for user identity registration and attribute assignment, an operation unit for uploading, downloading, modifying and the like of data according to user operation requirements, and an access record chain ARC for recording an access request of a user and a corresponding result;
the access record chain ARC comprises a data access user DU, a domain D where the access user is located, data access time FileTime, a domain FileAddr where the data is located and an access result AccessResult;
the multi-chain autonomous module comprises a consensus mechanism which adopts a Raft protocol to enable all nodes in a domain to achieve consensus, a relay chain which is used for performing cross-chain calling and inter-domain differentiated attribute mapping, and a file information chain FIC which is used for maintaining meta-information of data uploaded by a data owner DO;
the file information chain FIC comprises a field FileAddr where data are located, a data keyword set Keywords, a hash value hash of an encrypted file and a ciphertext ET (k) of a file symmetric encryption key used by a user encrypted file after being encrypted by an attribute base CP-ABE;
and the data storage module is used for storing the data which is encrypted and uploaded by the data owner DO, receiving the request of the data visitor DU and providing ciphertext downloading service.
8. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
(1) a registration stage: the method comprises the steps that a user or Internet of things equipment in each domain performs identity registration and authentication in the home domain of the user or the Internet of things equipment to acquire identity attribute information;
(2) and (3) data uploading: a data owner DO generates a random file key k, a symmetric encryption algorithm AES is executed by using the key k to encrypt plaintext data M to generate a ciphertext C, the ciphertext C is uploaded to a server to be stored, and metadata information of the data M is recorded;
(3) data uplink: the data owner DO sets the data access structure policy tree T, executes the CP-ABE algorithm encryption key k to generate ET (k) by combining the access policy, and updates the metadata information, the access policy and the ET (k) generation block in the second step to the data information chain;
(4) data access: the data requester DU initiates a data access request in the located domain D1; if the cross-domain data is involved, D1 cross-link applies for access to the domain D2 where the data is located by calling a relay link; d2 judges the applicant, if the judgment is successful, D2 transmits the ciphertext data to DU;
(5) access to the record uplink: after the access control judgment in the fourth step is finished, the domain where the data is located records the access request and the related information of the result in an uplink manner for subsequent inquiry and audit;
(6) data acquisition: the DU decrypts ET (k) in the data information chain by using a CP-ABE algorithm to obtain a file key k, and then decrypts the ciphertext C by using k through an AES algorithm to obtain plaintext data M;
the data cross-chain calling comprises the following steps:
(1) when cross-link access is carried out, the application chain A is in a state that the domain D1 sends a cross-link access request to the application chain B of the autonomous domain D2;
(2) the application chain A carries out cross-chain access by calling the relay chain, the relay chain carries out identity authentication and validity confirmation on the access chain, and the attribute of the domain D1 is mapped into the attribute of the domain D2 through attribute mapping, so that a requester obtains the attribute of the domain D2;
(3) the relay chain generates a public and private key pair issued by the D2 according to the mapped D2 attribute set, distributes the public and private key pair to a data requester, and forwards a call request to an application chain B;
(4) the application chain B transmits the ciphertext data message to the data requestor.
9. An information data processing terminal, characterized in that the information data processing terminal is used for implementing the data cross-link access control system in the multi-link scenario as claimed in any one of claims 6 to 7.
CN202110486731.1A 2021-05-01 2021-05-01 Data cross-link access control method, system, equipment and terminal under multi-link scene Active CN113364735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110486731.1A CN113364735B (en) 2021-05-01 2021-05-01 Data cross-link access control method, system, equipment and terminal under multi-link scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110486731.1A CN113364735B (en) 2021-05-01 2021-05-01 Data cross-link access control method, system, equipment and terminal under multi-link scene

Publications (2)

Publication Number Publication Date
CN113364735A CN113364735A (en) 2021-09-07
CN113364735B true CN113364735B (en) 2022-08-19

Family

ID=77525723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110486731.1A Active CN113364735B (en) 2021-05-01 2021-05-01 Data cross-link access control method, system, equipment and terminal under multi-link scene

Country Status (1)

Country Link
CN (1) CN113364735B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113722285B (en) * 2021-11-03 2022-02-11 江苏荣泽信息科技股份有限公司 Multi-chain-based cross-chain distributed file storage and verification system
CN114117469B (en) * 2021-11-05 2025-07-29 弥达斯科技(深圳)有限公司 Totally decentralised system-on-chain architecture
CN113837760B (en) * 2021-11-25 2022-08-26 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer equipment and storage medium
CN114465730A (en) * 2022-01-10 2022-05-10 浙商银行股份有限公司 Internet of things equipment mutual authentication method and device based on block chain technology
CN114374700B (en) * 2022-01-10 2024-05-03 之江实验室 Trusted identity management method supporting wide area collaboration based on master-slave multiple chains
CN114511322A (en) * 2022-01-26 2022-05-17 江苏大学 Relay-based chain-handling cross-link structure and access control method thereof
CN114528346B (en) * 2022-01-27 2023-01-13 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114531305B (en) * 2022-04-23 2022-07-19 东南大学 Block chain cross-chain supervision method for chain management
CN114553604B (en) * 2022-04-26 2022-07-08 南京邮电大学 A method for access control of IoT terminal nodes
CN114745198A (en) * 2022-05-05 2022-07-12 杭州云象网络技术有限公司 File management method, system and device based on block chaining operation and maintenance management
CN114866328A (en) * 2022-05-23 2022-08-05 南京理工大学 Block chain-based cross-domain access control method and system in edge computing environment
CN115499129B (en) * 2022-06-14 2024-09-10 广州链融信息技术有限公司 A multi-mode trust cross-chain consensus method, system, medium, device and terminal
CN115361110B (en) * 2022-07-04 2024-12-17 南京航空航天大学 Method for verifying correctness of block chain cross-chain interaction data calculation result
CN116015685B (en) * 2023-01-03 2025-08-05 江苏大学 A layered cross-chain supervision system for blockchain and its reuse implementation method
CN116800435B (en) * 2023-08-21 2023-12-19 成都信息工程大学 Access control methods, systems and storage media based on zero-knowledge proof and cross-chain
CN117914627B (en) * 2024-03-15 2024-07-19 北方健康医疗大数据科技有限公司 Data element circulation system based on DMZ network architecture
CN118413325B (en) * 2024-07-03 2024-09-13 贵州大学 Cross-chain data sharing method, device, medium and product
CN118900169A (en) * 2024-07-12 2024-11-05 四川大学 Supply chain-oriented secure cross-chain data interconnection and business collaboration method, device and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487443A (en) * 2020-11-11 2021-03-12 昆明理工大学 Energy data fine-grained access control method based on block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112003889B (en) * 2020-07-10 2022-11-08 南京邮电大学 Distributed cross-link system and cross-link information interaction and system access control method
CN112532591B (en) * 2020-11-06 2022-03-11 西安电子科技大学 Cross-domain access control method, system, storage medium, computer equipment and terminal
CN112287029B (en) * 2020-11-17 2023-05-16 北京物资学院 A blockchain multi-chain cross-chain system and its implementation mechanism
CN112637189B (en) * 2020-12-18 2022-06-24 重庆大学 Multi-layer blockchain cross-domain authentication method in IoT application scenarios

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487443A (en) * 2020-11-11 2021-03-12 昆明理工大学 Energy data fine-grained access control method based on block chain

Also Published As

Publication number Publication date
CN113364735A (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN113364735B (en) Data cross-link access control method, system, equipment and terminal under multi-link scene
US11995618B2 (en) Blockchain network interaction controller
CN113132103B (en) Data cross-domain security sharing system and method
US11296937B2 (en) Decentralized data storage and processing for IoT devices
CN108683747B (en) Resource acquisition, distribution, download method, device, device and storage medium
CN112235420B (en) Blockchain-based data synchronization method, system and related equipment
CN111027970B (en) Authentication management method, device, medium and electronic equipment of block chain system
CN110602138A (en) Data processing method and device for block chain network, electronic equipment and storage medium
CN115412568B (en) Distributed data transmission methods, devices and systems
CN110543525A (en) Management and control method, device, equipment and storage medium of block chain network
WO2023221719A1 (en) Data processing method and apparatus, computer device, and readable storage medium
WO2023029655A1 (en) Data sharing method, network side device, system, electronic device, and storage medium
CN101542495B (en) Methods for delivering resources and methods for providing information
CN114172730B (en) Cross-chain method and intermediate system for combining file block chains in chain-up and chain-down
US20240330939A1 (en) Transaction uploading method, associated apparatus, and medium
CN111357023A (en) Method and system for transferring data in a blockchain system
US20250036793A1 (en) Data obfuscation and protection in a web3 environment
US11201857B2 (en) Domain transcendent file cryptology network
WO2024092929A1 (en) Cross-domain data authorization method and apparatus, and electronic device
KR102524515B1 (en) Method and Apparatus for providing distribution trust service based on block chain
CN114491468A (en) Equipment flow recording method, device, equipment and storage medium
CN120238959B (en) A fast and efficient content caching optimization method based on ZKP
CN117726446B (en) Method, system and equipment for cross-chain transaction of supervision digital asset
CN115914243B (en) Information processing method, device and storage medium
HK40038159A (en) Method and system for synchronizing data based on blockchain and relevant device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant