计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 15-19.doi: 10.11896/j.issn.1002-137X.2018.02.003

• 区块链技术 • 上一篇    下一篇

基于区块链的大数据确权方案

王海龙,田有亮,尹鑫   

  1. 贵州大学计算机科学与技术学院 贵阳550025贵州省公共大数据重点实验室贵州大学 贵阳550025贵州大学密码学与数据安全研究所 贵阳550025,贵州大学计算机科学与技术学院 贵阳550025贵州省公共大数据重点实验室贵州大学 贵阳550025贵州大学密码学与数据安全研究所 贵阳550025,贵州大学计算机科学与技术学院 贵阳550025贵州省公共大数据重点实验室贵州大学 贵阳550025贵州大学密码学与数据安全研究所 贵阳550025
  • 出版日期:2018-02-15 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金(61363068,9,61772008)资助

Blockchain-based Big Data Right Confirmation Scheme

WANG Hai-long, TIAN You-liang and YIN Xin   

  • Online:2018-02-15 Published:2018-11-13

摘要: 数据确权一直是大数据交易面临的挑战性之一。传统的确权手段采用提交权属证明和专家评审的模式,但是缺乏技术可信度,且存在潜在的篡改等不可控因素。为解决这些问题,迫切需要操作性强的确权方案。基于区块链技术和数字水印技术,提出了一种新的大数据确权方案。首先,引入审计中心和水印中心,以分离大数据完整性审计和水印生成的职责。其次,基于数据持有性证明技术和抽样技术,实现对大数据完整性的轻量级审计。再次,利用数字水印技术的特殊安全性质,实现对大数据起源的确认。最后,针对整个确权过程中涉及到的证据的完整性和持久性,利用区块链的原生特点实现确权结果与相关证据的强一致性。正确性和安全性分析结果表明,该方案能够为大数据的所有权界定提供新的技术思路和方法。

关键词: 数据确权,区块链,数字水印技术,密码学

Abstract: Data right confirmation has always been one of the most challenging problems in big data trading.Traditional means of right confirmation adopt the model of submitting the ownership evidence and expert reviewing,but they lack technological credibility and there are some uncontrollable factors such as potential tampering.In order to solve these problems,a strongly operational confirmation scheme is urgently needed.This paper put forward a new big data right confirmation scheme based on the technologies of blockchain and digital watermarking.Firstly,the auditing center and watermarking center are brought in to separate the duties of the integrity auditing of big data and watermarking generation.Secondly,using provable data possession technique and sampling technique,the lightweight audit of the integrity of big data is realized.Thirdly,the special security properties of digital watermarking technology are used to confirm the origin of big data.Finally,in the light of the integrity and persistence of evidence involved in the right confirmation,the native features of blockchain,such as the shared ledger,are used to implement strong consistency of the right confirmation result and relevant evidence.Correctness and security analysis results show that the proposed scheme can provide a new technical solution for the definition of ownership of big data.

Key words: Data right confirmation,Blockchain,Digital watermarking technology,Cryptography

[1] DU Z H.Research on Data Confirmation Right in Big Data Application[J].Mobile Communications,2015(13):12-16.(in Chinese) 杜振华.大数据应用中数据确权问题探究[J].移动通信,2015(13):12-16.
[2] PENG Y.Research on Authenticating Data Rights in Big Data environment[J].Modern Science &Technology of Telecommunications,2016,6(5):17-20.(in Chinese) 彭云.大数据环境下数据确权问题研究[J].现代电信科技,2016,6(5):17-20.
[3] TU Y H.Study on the Legal Rights of Big Data [J].Journal of Foshan University(Social Science Edition),2016,4(5):83-87.(in Chinese) 涂燕辉.大数据的法律确权研究[J].佛山科学技术学院学报(社会科学版),2016,34(5):83-87.
[4] GUO B,LI Q,DUAN X L,et al.Personal Data Bank:A New Model of Personal Big Data Asset Management and Value-Ad-ded Services Based on Bank Architecture[J].Chinese Journal of Computers,2017,0(1):126-143.(in Chinese) 郭兵,李强,段旭良,等.个人数据银行——一种基于银行架构的个人大数据资产管理与增值服务的新模式[J].计算机学报,2017,0(1):126-143.
[5] 王帅宇,李晨.一种基于区块链技术的大数据确权方法及系统:中国,CN106815728A[P].2017-06-09.
[6] PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information Hiding-a Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
[7] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash system.https://bitcoin.org/bitcoin.pdf.
[8] BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil pairing[C]∥International Conference on the Theory and Application of Cryptology and Information Security.Springer Berlin Heidelberg,2001:514-532.
[9] WANG C,CHOW S S M,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[10] DU W,JIA J,MANGAL M,et al.Uncheatable Grid Computing[C]∥International Conference on Distributed Computing Systems,2004.IEEE,2004:4-11.
[11] ZHANG F G.From Bilinear Pairings to Multilinear Maps[J].Journal of Cryptologic Research,2016,3(3):211-228.(in Chinese) 张方国.从双线性对到多线性映射[J].密码学报,2016,3(3):211-228.
[12] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]∥ACM Conference on Computer and Communications Security.ACM,2007:598-609.
[13] WANG B,LI B,LI H.Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud[C]∥IEEE Fifth International Conference on Cloud Computing.IEEE Computer Society,2012:295-302.
[14] fabric.(2017-10-20).https://github.com/hyperledger/fabric.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .