Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security distributed aggregation and access system and method based on fog alliance chain

An access method and distributed technology, applied in the field of wireless network and information security, can solve problems such as single point of failure and illegal tampering

Active Publication Date: 2020-07-03
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the invention: In view of the above technical problems, considering that the blockchain has the characteristics of decentralization and non-tampering, it can solve security problems such as single point of failure and illegal tampering in the centralized model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security distributed aggregation and access system and method based on fog alliance chain
  • Security distributed aggregation and access system and method based on fog alliance chain
  • Security distributed aggregation and access system and method based on fog alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0137] Based on the application of the secure distributed aggregation and access method based on the alliance chain designed by the present invention in actual scenarios, figure 2 Depicts the comparison between the design method of the present invention and the other two schemes: EPPDR scheme and PPUAC scheme in terms of verification overhead. It can be seen from the figure that the design method of the present invention significantly shortens the verification time compared to the other two methods, and with As the number of signatures increases, the design method of the present invention can highlight the advantage of low verification overhead; in addition, image 3 Depicts the comparison of the total computational cost between the design method of the present invention and the SEPPDR and PPUAC methods. The design method of the present invention significantly reduces the consumption of computing resources compared to the EPPDR scheme and the PPUAC scheme. This is mainly due to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security distributed aggregation and access system and method based on a fog alliance chain, and aims to solve the problem that most of current data aggregation schemes are designed based on a centralized mode, face single-point faults and tampering threats, and have security and performance improvement space. In order to solve the challenge, a distributed aggregation framework is designed in combination with fog computing and an alliance chain, single-point faults and tampering crisis are solved, and powerful support is provided for safe collection, communication andstorage of data. Meanwhile, a Paillier homomorphic algorithm of a threshold version is fused, a safe access control mechanism with a fault-tolerant function is designed, and confidentiality and privacy of data on a chain are guaranteed. Meanwhile, an efficient anonymous authentication method is provided, and identity privacy and data integrity can be guaranteed. Finally, the comparative analysisresult of the method and the existing method shows that the method can resist malicious attacks and ensure the system security, and compared with other existing methods, the method has lower calculation and communication costs.

Description

Technical field [0001] The invention belongs to the technical field of wireless networks and information security, and specifically relates to a safe distributed aggregation and access system and method based on a fog alliance chain. Background technique [0002] The traditional Industrial Internet of Thing (IIoT) relies on cloud computing to store collected data in a centralized cloud server. Users have only limited control over the use and processing of their data and have to trust the cloud server to be able to Protect their private and confidential data. Undisputed, cloud computing has brought great benefits to IIoT, but at the same time, centralized IIoT systems face many challenges in terms of security and privacy. First, if the cloud server fails, the entire IIoT system will face a crisis of paralysis, that is, the "single point of failure" problem. Second, most of the data transmitted to cloud storage is usually unencrypted, and the privacy information carried in the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02H04W12/10H04L29/06H04L9/30
CPCH04W12/02H04L9/3066H04L63/123H04L63/0428H04W12/03H04W12/106
Inventor 陈思光李雅兰陈佳民尤子慧
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products