Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A design method of IoT security proxy data sharing module using blockchain technology

A security agent and data sharing technology, which is applied in the field of Internet of Things security agent data sharing module design using blockchain technology, can solve problems such as user revocation and cloud server collusion attacks, and achieve the effect of eliminating dependence and efficient and safe access

Active Publication Date: 2021-08-17
HANGZHOU YUNXIANG NETWORK TECH
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure effective data sharing and user revocation, some scholars have proposed a system model using key policy-based attribute encryption and proxy re-encryption, however, this model is vulnerable to collusion attacks using revoked users and cloud servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A design method of IoT security proxy data sharing module using blockchain technology
  • A design method of IoT security proxy data sharing module using blockchain technology
  • A design method of IoT security proxy data sharing module using blockchain technology

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0097] like figure 1 As shown, the Internet of Things data security sharing system of the present invention includes a blockchain network, a cloud server, a data owner and a data user. The data owner refers to the entity whose data is to be accessed, and the data can only be accessed when the private key of the data user corresponds to the attribute set specified by the data owner; the data user refers to the entity whose data is used by the system, and the data owner Both users and data users need to make predictions on the blockchain. The cloud server is a data repository, and all encrypted files are sent to the server through a secure channel.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a design method of an Internet of Things security agent data sharing module using block chain technology. A blockchain network is integrated, and its processing node acts as a proxy server. When the user is a registered member of the network, it is verified through the blockchain network, and the user can access the data. The proxy also converts the policy set in the process of sharing data. To re-encrypt the data, the blockchain network and the cloud server work together to ensure an anti-collusion scheme. The invention also realizes fine-grained access control to the data. The experimental results show that the proxy re-encryption increases the delay, but the use of the blockchain All interactions between entities are recorded, eliminating dependence on trusted third parties and ensuring efficient and secure access to IoT data.

Description

technical field [0001] The invention relates to a design method for a data sharing module of an Internet of Things security agent, in particular to a design method for a data sharing module of an Internet of Things security agent using block chain technology. Background technique [0002] Advances in wireless communication, embedded computing, actuation, and sensing have enabled devices to become interconnected entities in a cyber-physical world, the "Internet of Things." It is estimated that by 2030, the number of devices connected to the Internet will increase significantly compared with today, and the boundary between the physical world and the digital world will be significantly reduced. The Internet of Things is expected to fundamentally change the daily life mode of human beings, forming a new way of free interaction between people and people (H2H), machines and machines (M2M), and people and machines (H2M). The services provided by the Internet of Things that can ens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/0869H04L9/3271H04L63/0227H04L63/0428H04L63/10H04L63/20H04L67/104
Inventor 黄步添周伟华闫凤喜陈建海杨正清刘振广
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products