Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital forensic method based on blockchain privacy protection and fine-grained access control

A privacy protection and access control technology, applied in the research field of cyberspace security, it can solve problems such as tampering with evidence, harmful normative VDF procedures, and violation of digital chain of custody, and achieve the effect of ensuring legitimacy

Active Publication Date: 2020-06-23
JINAN UNIVERSITY
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it also raises a burning question: If a self-driving car is involved in a fatal crash, who is to blame, the driver who developed the self-driving algorithm, or the automaker? In the latter case, the manufacturer could be sued for unprecedented sums, saving lives, and eventually going out of business
However, conducting a vehicle forensics investigation (VDF) is not easy due to multiple security issues
In fact, there are many security and privacy issues that lead to adverse effects on VDF implementation: 1) a malicious external attacker may leak the details of the credentials to a suspicious person, which will tell the suspicious person to temporarily abandon the attack; 2) law enforcement agencies May abuse the power in their hands to obtain more data irrelevant to this forensics, or even tamper with the collected evidence; 3) There may be malicious insiders in the data source, who provide law enforcement with modified historical data, or claim that historical Data has been lost, which violates the Digital chain of custody
In addition to this, there are other issues that are detrimental to the program of standardizing VDF
Specifically, as vehicles become smarter and more complex than ever before, law enforcement agencies struggle to access forensic data due to a lack of specialized tools and instead turn to the commercial community for technical support
However, the threat of privacy leakage will be brought in the process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital forensic method based on blockchain privacy protection and fine-grained access control
  • Digital forensic method based on blockchain privacy protection and fine-grained access control
  • Digital forensic method based on blockchain privacy protection and fine-grained access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] Digital forensics methods based on blockchain privacy protection and fine-grained access control, such as figure 1 As shown, through a digital forensics system based on blockchain privacy protection and fine-grained access control, the alliance blockchain composed of law enforcement agencies, courts, alliance key management agencies, data sources (enterprises or individuals), etc., The system as figure 2 As shown, it includes the business layer, application layer, blockchain layer and distributed data storage layer connected in sequence. The business layer is web-oriented digital forensics management, supports login operations of users with different roles, and realizes convenient user interaction functions; the application layer supports functional components such as evidence collection, evidence storage, and traceability. The data interface layer based on Web3j realizes the conversion logic between user input and smart contracts; the blockchain layer is an alliance ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital forensic method based on blockchain privacy protection and fine-grained access control, comprising the following steps: a first supervisor creates a digital forensictransaction, initiates a digital forensic transaction request to a second supervisor, and transmits important information of the digital forensic transaction to the second supervisor; the second supervisor generates an attribute encryption intermediate parameter through an encryption module, and authorizes and publishes the attribute encryption intermediate parameter in the blockchain; after obtaining authorization, the first supervisor obtains the fragmentation secret key from the secret key management mechanism module through authorization information and combines the fragmentation secret key to generate a decryption secret key, and the data collection module collects data in the storage system through the decryption secret key; the first supervisor analyzes the data after acquiring thedata to obtain a data analysis result; an evidence obtaining digital report is generated, and evidence obtaining is completed; according to the invention, the potential of the block chain and the intelligent contract is utilized, and the encryption primitive is designed to construct the Internet of Vehicles digital evidence obtaining scheme based on the block chain, and the scheme has auditability, privacy protection and fine-grained data access control.

Description

technical field [0001] The invention relates to the research field of cyberspace security, in particular to a digital evidence collection method based on block chain privacy protection and fine-grained access control. Background technique [0002] With the continuous increase of vehicle sensors, control units and communication methods such as electronic control unit (ECU), Bluetooth and Wi-Fi, the function of the vehicle has been greatly enhanced. According to Ford Motor Company, modern cars have about 50-70 computers, making them a great source of digital data (e.g. where tires are open, pumps and lights on / off). These rich sensing and operating data make vehicles smarter and smarter, which will effectively promote the prosperity of the autonomous driving industry in the near future. But since everything has two sides, more and more smart vehicles also bring us a lot of safety concerns. Using vehicles as weapons to carry out terrorist attacks is not uncommon and it has ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/06H04L63/0876H04L63/10H04L67/025H04L67/1097
Inventor 翁健张斌李明袁浩宸李勇标罗伟其
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products