Data authorization method of blockchain
Glossary
Term definitionBlockchain is a decentralized distributed database technology with the characteristics of decentralization, openness, transparency, immutability and trustworthiness. Smart contract is a program described in code on the blockchain and triggered by transactions in the blockchain system. Authorization token is generated by the smart contract and is used to indicate that the data user has obtained the credentials for data access rights. Data owner is the entity that owns and controls the access rights to the target data. The entity that the data user requests to access the target data. Privacy computing platform is a platform that provides data access and computing services to data users under the premise of protecting data privacy. Transaction log is a log file that records transaction information on the blockchain and can be used for event monitoring and response mechanisms. Trusted Execution Environment (TEE) is a secure extension based on CPU hardware, which is completely isolated from the outside world and provides a safe and reliable code execution and data storage environment. Off-chain storage space refers to storage space outside the blockchain network, such as cloud storage, database, etc.
Short answer question
Briefly describe the characteristics and applicable scenarios of blockchain technology. Blockchain technology has the characteristics of decentralization, openness, transparency, immutability and trustworthiness, and is suitable for application scenarios with high requirements for data reliability, such as supply chain finance, electronic invoices, digital identity authentication, etc.
Explain what smart contracts are and their role in blockchain-based data authorization. Smart contracts are programs described in code on the blockchain and triggered by transactions in the blockchain system. In data authorization, smart contracts can define logic such as data access rights, verify data user identities, and generate authorization tokens to achieve automated and trusted data authorization management.
How do data users request data authorization through the blockchain network? Data users can request data authorization by submitting an authorization request transaction to the blockchain network and calling the request interface defined in the smart contract. The transaction contains data description information, user identity information, data owner information, etc., and triggers the smart contract to record the authorization request event in the transaction log.
How does the data owner confirm the authorization request of the data user? The data owner can confirm the authorization request of the data user by listening to the authorization request event in the transaction log. If the authorization is agreed, the data owner can submit an authorization confirmation transaction to the blockchain network, call the authorization interface in the smart contract, and update the authorization status of the data user to authorized.
What does the authorization token contain and what is its role? The authorization token contains user ID, encryption key, authorization content, data verification information, etc. The role of the authorization token is to indicate that the data user has obtained data access rights. The privacy computing platform can provide the target data or calculation results to the data user based on the authorization token.
How does the privacy computing platform obtain the target data? The privacy computing platform can obtain the target data by decrypting the encrypted target data stored in the blockchain network or from the off-chain storage space. In order to ensure data security, the target data is usually encrypted with the public key of the data owner, and only the entity with the corresponding private key can decrypt and obtain the data.
How does the privacy computing platform protect the privacy of the target data? The privacy computing platform can protect the privacy of the target data and prevent data leakage by encrypting the target data or returning the calculation results after performing predetermined calculation operations on the target data.
Briefly describe the application of the trusted execution environment (TEE) in blockchain-based data authorization. The trusted execution environment (TEE) can provide a safe and reliable environment for data encryption, decryption and smart contract execution, prevent external factors from interfering, and enhance the security of data authorization.
What role does the off-chain storage space play in blockchain-based data authorization? The off-chain storage space can store the data owner's data, reduce the storage pressure of the blockchain network, and at the same time, through interaction with smart contracts, it can realize authorized access and privacy protection of off-chain data.
In practical applications, how can we process target data differently according to the privacy level of the data? For data with a lower privacy level, it can be directly provided to the data user; for data with a higher privacy level, it needs to be encrypted or the predetermined calculation operation needs to be performed before returning the calculation result to protect the data privacy.