Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital forensics method based on blockchain privacy protection and fine-grained access control

A privacy protection and access control technology, applied in the research field of cyberspace security, it can solve the problems of tampering with evidence, violating the digital chain of custody, harmful normative VDF procedures, etc., to achieve the effect of ensuring legality

Active Publication Date: 2022-02-11
JINAN UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it also raises a burning question: If a self-driving car is involved in a fatal crash, who is to blame, the driver who developed the self-driving algorithm, or the automaker? In the latter case, the manufacturer could be sued for unprecedented sums, saving lives, and eventually going out of business
However, conducting a vehicle forensics investigation (VDF) is not easy due to multiple security issues
In fact, there are many security and privacy issues that lead to adverse effects on VDF implementation: 1) a malicious external attacker may leak the details of the credentials to a suspicious person, which will tell the suspicious person to temporarily abandon the attack; 2) law enforcement agencies May abuse the power in their hands to obtain more data irrelevant to this forensics, or even tamper with the collected evidence; 3) There may be malicious insiders in the data source, who provide law enforcement with modified historical data, or claim that historical Data has been lost, which violates the Digital chain of custody
In addition to this, there are other issues that are detrimental to the program of standardizing VDF
Specifically, as vehicles become smarter and more complex than ever before, law enforcement agencies struggle to access forensic data due to a lack of specialized tools and instead turn to the commercial community for technical support
However, the threat of privacy leakage will be brought in the process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital forensics method based on blockchain privacy protection and fine-grained access control
  • Digital forensics method based on blockchain privacy protection and fine-grained access control
  • Digital forensics method based on blockchain privacy protection and fine-grained access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] Digital forensics methods based on blockchain privacy protection and fine-grained access control, such as figure 1 As shown, through a digital forensics system based on blockchain privacy protection and fine-grained access control, the alliance blockchain composed of law enforcement agencies, courts, alliance key management agencies, data sources (enterprises or individuals), etc., The system as figure 2 As shown, it includes the business layer, application layer, blockchain layer and distributed data storage layer connected in sequence. The business layer is web-oriented digital forensics management, supports login operations of users with different roles, and realizes convenient user interaction functions; the application layer supports functional components such as evidence collection, evidence storage, and traceability. The data interface layer based on Web3j realizes the conversion logic between user input and smart contracts; the blockchain layer is an alliance ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital forensics method based on blockchain privacy protection and fine-grained access control. The first supervisor creates a digital forensics transaction, initiates a digital forensics transaction request to the second supervisor, and transmits important information of the digital forensics transaction to the second supervisor. Two regulators; the second regulator generates attribute encryption intermediate parameters through the encryption module, and authorizes and publishes them in the blockchain; after the first regulator is authorized, it obtains the shard key from the key management institution module through the authorization information, and Combine the fragmentation keys to generate a decryption key, and the data acquisition module collects data in the storage system through the decryption key; the first supervisor analyzes the data after collecting the data, and obtains the data analysis results; then generates a digital report for forensics, and the forensics is completed ; The present invention utilizes the potential of blockchain and smart contracts, and designs encryption primitives to build a blockchain-based Internet of Vehicles digital forensics solution, which has auditability, privacy protection and fine-grained data access control.

Description

technical field [0001] The invention relates to the research field of cyberspace security, in particular to a digital evidence collection method based on block chain privacy protection and fine-grained access control. Background technique [0002] With the continuous increase of vehicle sensors, control units and communication methods such as electronic control unit (ECU), Bluetooth and Wi-Fi, the function of the vehicle has been greatly enhanced. According to Ford Motor Company, modern cars have about 50-70 computers, making them a great source of digital data (e.g. where tires are open, pumps and lights on / off). These rich sensing and operating data make vehicles smarter and smarter, which will effectively promote the prosperity of the autonomous driving industry in the near future. But since everything has two sides, more and more smart vehicles also bring us a lot of safety concerns. Using vehicles as weapons to carry out terrorist attacks is not uncommon and it has ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1097
CPCH04L63/06H04L63/0876H04L63/10H04L67/025H04L67/1097
Inventor 翁健张斌李明袁浩宸李勇标罗伟其
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products