Internet of Things data privacy protection method based on block chain and trusted hardware

A data privacy and blockchain technology, applied in the field of IoT data privacy protection based on blockchain and trusted hardware, can solve problems such as the inability to limit the actual use of data, data leakage, and the inability to monitor the actual use of data. High reliability and programmability, ensuring safety and reliability, and realizing the effect of convenient adjustment

Active Publication Date: 2019-08-02
GUANGZHOU UNIVERSITY
View PDF7 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem that the Internet of Things privacy data access control relies on third-party implementation and the existing technical solutions cannot monitor and limit the actual use of data, the present invention proposes a method for protecting Internet of Things data privacy based on blockchain and trusted hardware. With the blockchain platform as the core, combined with the network and trusted hardware, it solves some data leakage problems caused by the traditional implementation of access control that relies on cloud storage service providers, and the problem that the actual use of data cannot be restricted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things data privacy protection method based on block chain and trusted hardware
  • Internet of Things data privacy protection method based on block chain and trusted hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Other embodiments obtained by those skilled in the art based on the solution ideas and embodiments of the present invention all belong to the protection category of the present invention.

[0017] Such as figure 1 As shown, the IoT data privacy protection method provided by the present invention has several entities, such as trusted entity IDA, data owner, data user, cloud storage provider (i.e. cloud), data owner, data user and The trusted entity IDA acts as a node to form the entire blockchain network; the cloud storage provider is connected to the IoT device through the IoT perception layer a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of Things data privacy protection method based on a block chain and the trusted hardware. The method comprises three stages of secret key management and data generation, data access control strategy definition and intelligent contract deployment and data access and intelligent contract execution, and Internet of Things data is encrypted by a hardware trusted entity IDA and uploaded to a cloud for storage; when there is an operation request, the trusted entity calls an access control authentication interface of the smart contract to carry out authority authentication; after the authority authentication passes, the trusted entity carries out security authentication on the operation execution server and sends the secret key to the data operation executionserver through a security channel; and the server downloads the data from the cloud, then decrypts the data and executes the operation, and writes the data use record into the block chain after the data analysis operation is completed. According to the scheme, the block chain is combined with the trusted entity, the data is effectively operated under the condition that the original data privacy isnot leaked, and the integrity and the safety of the data use records are guaranteed.

Description

technical field [0001] The invention belongs to the fields of Internet of Things privacy protection, block chains, and trusted hardware, and in particular relates to a method for protecting Internet of Things data privacy based on block chains and trusted hardware. Background technique [0002] With the development of Internet of Things technology, the application of Internet of Things in daily life is becoming more and more popular, including smart home, smart wearables, Internet of Vehicles, smart medical care, etc. A large amount of data is generated in IoT devices and uploaded to the service provider's cloud database to provide various IoT services. For example, in the Samsung smart home system, various data generated by the IoT devices in the user's home are uploaded to the service provider's cloud database, which facilitates the system cloud server to realize intelligent management and control by processing these data; users wear smart bracelets to monitor in real time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06F21/62
CPCH04L63/10H04L63/0407H04L63/06H04L63/20H04L63/12H04L9/3247H04L67/12G06F21/6263H04L67/53
Inventor 李进黄悦芳姜冲
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products