Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things security agent data sharing module design method adopting a block chain technology

A security proxy and data sharing technology, which is applied in the field of IoT security proxy data sharing module design using blockchain technology, and can solve problems such as using revocation users and cloud server collusion attacks.

Active Publication Date: 2019-09-20
HANGZHOU YUNXIANG NETWORK TECH
View PDF23 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure effective data sharing and user revocation, some scholars have proposed a system model using key policy-based attribute encryption and proxy re-encryption, however, this model is vulnerable to collusion attacks using revoked users and cloud servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security agent data sharing module design method adopting a block chain technology
  • Internet of Things security agent data sharing module design method adopting a block chain technology
  • Internet of Things security agent data sharing module design method adopting a block chain technology

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0097] Such as figure 1 As shown, the Internet of Things data security sharing system of the present invention includes a blockchain network, a cloud server, a data owner and a data user. The data owner refers to the entity whose data is to be accessed, and the data can only be accessed when the private key of the data user corresponds to the attribute set specified by the data owner; the data user refers to the entity whose data is used by the system, and the data owner Both users and data users need to make predictions on the blockchain. The cloud server is a data repository, and all encrypted files are sent to the server through a secure channel.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things security agent data sharing module design method adopting a block chain technology. A block chain network is integrated; a processing node serves as a proxy server; when the user is a registered member of the network, verification is carried out through a block chain network, a user can access data, the agent also re-encrypts the data by transforming the policy set during the process of sharing the data, the block chain network and the cloud server work cooperatively, and anti-collaboration scheme is ensured. According to the method and the system, fine-grained access control on the data is further realized, experimental results show that agent re-encryption increases delay, and the use of the block chain records all interactions among entities, so that dependence on a trusted third party is eliminated, and efficient and safe access to Internet of Things data is ensured.

Description

technical field [0001] The invention relates to a design method for a data sharing module of an Internet of Things security agent, in particular to a design method for a data sharing module of an Internet of Things security agent using block chain technology. Background technique [0002] Advances in wireless communication, embedded computing, actuation, and sensing have enabled devices to become interconnected entities in a cyber-physical world, the "Internet of Things." It is estimated that by 2030, the number of devices connected to the Internet will increase significantly compared with today, and the boundary between the physical world and the digital world will be significantly reduced. The Internet of Things is expected to fundamentally change the daily life mode of human beings, forming a new way of free interaction between people and people (H2H), machines and machines (M2M), and people and machines (H2M). The services provided by the Internet of Things that can ens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/0869H04L9/3271H04L63/0227H04L63/0428H04L63/10H04L63/20H04L67/104
Inventor 黄步添周伟华闫凤喜陈建海杨正清刘振广
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products