A design method of IoT security proxy data sharing module using blockchain technology
A security agent and data sharing technology, which is applied in the field of Internet of Things security agent data sharing module design using blockchain technology, can solve problems such as user revocation and cloud server collusion attacks, and achieve the effect of eliminating dependence and efficient and safe access
Active Publication Date: 2021-08-17
HANGZHOU YUNXIANG NETWORK TECH
View PDF21 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
In order to ensure effective data sharing and user revocation, some scholars have proposed a system model using key policy-based attribute encryption and proxy re-encryption, however, this model is vulnerable to collusion attacks using revoked users and cloud servers
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
specific Embodiment
[0097] like figure 1 As shown, the Internet of Things data security sharing system of the present invention includes a blockchain network, a cloud server, a data owner and a data user. The data owner refers to the entity whose data is to be accessed, and the data can only be accessed when the private key of the data user corresponds to the attribute set specified by the data owner; the data user refers to the entity whose data is used by the system, and the data owner Both users and data users need to make predictions on the blockchain. The cloud server is a data repository, and all encrypted files are sent to the server through a secure channel.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention discloses a design method of an Internet of Things security agent data sharing module using block chain technology. A blockchain network is integrated, and its processing node acts as a proxy server. When the user is a registered member of the network, it is verified through the blockchain network, and the user can access the data. The proxy also converts the policy set in the process of sharing data. To re-encrypt the data, the blockchain network and the cloud server work together to ensure an anti-collusion scheme. The invention also realizes fine-grained access control to the data. The experimental results show that the proxy re-encryption increases the delay, but the use of the blockchain All interactions between entities are recorded, eliminating dependence on trusted third parties and ensuring efficient and secure access to IoT data.
Description
technical field [0001] The invention relates to a design method for a data sharing module of an Internet of Things security agent, in particular to a design method for a data sharing module of an Internet of Things security agent using block chain technology. Background technique [0002] Advances in wireless communication, embedded computing, actuation, and sensing have enabled devices to become interconnected entities in a cyber-physical world, the "Internet of Things." It is estimated that by 2030, the number of devices connected to the Internet will increase significantly compared with today, and the boundary between the physical world and the digital world will be significantly reduced. The Internet of Things is expected to fundamentally change the daily life mode of human beings, forming a new way of free interaction between people and people (H2H), machines and machines (M2M), and people and machines (H2M). The services provided by the Internet of Things that can ens...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/0869H04L9/3271H04L63/0227H04L63/0428H04L63/10H04L63/20H04L67/104
Inventor 黄步添周伟华闫凤喜陈建海杨正清刘振广
Owner HANGZHOU YUNXIANG NETWORK TECH




