Edge computing data security and privacy protection method based on Fabric

An edge computing and privacy protection technology, applied in the field of edge computing and blockchain technology, can solve problems such as database damage, data leakage, data loss, etc., and achieve the effect of improving accuracy, security, and protection.

Inactive Publication Date: 2019-09-13
BEIJING UNIV OF TECH
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional data storage method lacks security, and it has deficiencies in the security level of data protection. In the process of data processing, due to hardware failure, power failure, crash, human misoperation, program defects, viruses or hackers, etc. Database damage or data loss, so...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge computing data security and privacy protection method based on Fabric
  • Edge computing data security and privacy protection method based on Fabric
  • Edge computing data security and privacy protection method based on Fabric

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Attached below Figure 1-3 The present invention is further described with example:

[0023] The present invention provides a Fabric-based edge computing data security and privacy protection method, the system logic architecture diagram is as follows image 3 As shown, the raw data of the Internet of Things is collected first, and the data access layer of the edge computing network node receives the collected Internet of Things data. Send the data to the Fabric background on the edge computing node through the mobile network, HTTP protocol, TCP / IP and other data transmission methods, organize the data into standardized data in json format, and upload the standardized data to Fabric. Users can perform operations such as traceability or data analysis on the data in Fabric through the web application or B / S client architecture.

[0024] Specifically include the following steps:

[0025] Step 1: IoT data collection;

[0026] Step 1.1 Through sensor collection, mobile ph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an edge computing data security and privacy protection method based on Fabric, and the method prevents the data from being damaged by artificial malicious deletion and hacker attack due to the non-tamper characteristic of a block chain. Due to the fact that a user can apply for inquiring and obtaining data at any node for building the Fabric, the data safety can be guaranteed under the condition that equipment is accidentally damaged. And the Fabric node built on the edge computing device shares the information to the alliance chain network through broadcasting. In thisway, the information is safely shared to other edge computing nodes which build the Fabric. Due to the fact that all operation on the block chain network can verify the identity of the user, it is guaranteed that only the user authorized with the query authority can obtain data from Fabric, personnel or operators who do not have qualification cannot inquire the data, and privacy data protection is completed. And finally, the protection of the Fabric on the security and privacy of the edge computing data is realized.

Description

technical field [0001] The invention belongs to the technical field of blockchain, the field of edge computing, and the field of data security, and relates to a method for data security and privacy protection of edge computing based on Fabric. Background technique [0002] With the steady development of science and technology, the Internet of Things, as another emerging industry after the Internet, is an important productivity that promotes the rapid development of society, and it will surely inject strong vitality into the development of the world economy. An important technology of the Internet of Things: edge computing is a distributed computing architecture. Under this architecture, the calculation of applications, data and services is moved from the central node of the network to the logical edge nodes of the network for processing. Edge computing decomposes large-scale services that were originally processed by central nodes, cuts them into smaller and easier-to-manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/32
CPCH04L67/12H04L63/0823H04L9/3247H04L67/565H04L9/50
Inventor 张延华王勇杨兆鑫吴文君姚勇峰邱凯杨硕鹏王道魁陈冰容何奇昌
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products