计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 15-19.doi: 10.11896/j.issn.1002-137X.2018.02.003
所属专题: 区块链技术
王海龙,田有亮,尹鑫
WANG Hai-long, TIAN You-liang and YIN Xin
摘要: 数据确权一直是大数据交易面临的挑战性之一。传统的确权手段采用提交权属证明和专家评审的模式,但是缺乏技术可信度,且存在潜在的篡改等不可控因素。为解决这些问题,迫切需要操作性强的确权方案。基于区块链技术和数字水印技术,提出了一种新的大数据确权方案。首先,引入审计中心和水印中心,以分离大数据完整性审计和水印生成的职责。其次,基于数据持有性证明技术和抽样技术,实现对大数据完整性的轻量级审计。再次,利用数字水印技术的特殊安全性质,实现对大数据起源的确认。最后,针对整个确权过程中涉及到的证据的完整性和持久性,利用区块链的原生特点实现确权结果与相关证据的强一致性。正确性和安全性分析结果表明,该方案能够为大数据的所有权界定提供新的技术思路和方法。
[1] DU Z H.Research on Data Confirmation Right in Big Data Application[J].Mobile Communications,2015(13):12-16.(in Chinese) 杜振华.大数据应用中数据确权问题探究[J].移动通信,2015(13):12-16. [2] PENG Y.Research on Authenticating Data Rights in Big Data environment[J].Modern Science &Technology of Telecommunications,2016,6(5):17-20.(in Chinese) 彭云.大数据环境下数据确权问题研究[J].现代电信科技,2016,6(5):17-20. [3] TU Y H.Study on the Legal Rights of Big Data [J].Journal of Foshan University(Social Science Edition),2016,4(5):83-87.(in Chinese) 涂燕辉.大数据的法律确权研究[J].佛山科学技术学院学报(社会科学版),2016,34(5):83-87. [4] GUO B,LI Q,DUAN X L,et al.Personal Data Bank:A New Model of Personal Big Data Asset Management and Value-Ad-ded Services Based on Bank Architecture[J].Chinese Journal of Computers,2017,0(1):126-143.(in Chinese) 郭兵,李强,段旭良,等.个人数据银行——一种基于银行架构的个人大数据资产管理与增值服务的新模式[J].计算机学报,2017,0(1):126-143. [5] 王帅宇,李晨.一种基于区块链技术的大数据确权方法及系统:中国,CN106815728A[P].2017-06-09. [6] PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information Hiding-a Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078. [7] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash system.https://bitcoin.org/bitcoin.pdf. [8] BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil pairing[C]∥International Conference on the Theory and Application of Cryptology and Information Security.Springer Berlin Heidelberg,2001:514-532. [9] WANG C,CHOW S S M,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375. [10] DU W,JIA J,MANGAL M,et al.Uncheatable Grid Computing[C]∥International Conference on Distributed Computing Systems,2004.IEEE,2004:4-11. [11] ZHANG F G.From Bilinear Pairings to Multilinear Maps[J].Journal of Cryptologic Research,2016,3(3):211-228.(in Chinese) 张方国.从双线性对到多线性映射[J].密码学报,2016,3(3):211-228. [12] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]∥ACM Conference on Computer and Communications Security.ACM,2007:598-609. [13] WANG B,LI B,LI H.Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud[C]∥IEEE Fifth International Conference on Cloud Computing.IEEE Computer Society,2012:295-302. [14] fabric.(2017-10-20).https://github.com/hyperledger/fabric. |
No related articles found! |
|