Unlock instant, AI-driven research and patent intelligence for your innovation.

A tamper-proof method for cloud governance super data based on block chain technology

A block chain and anti-tampering technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as tampering or destruction, inability to determine responsibility for illegal and over-limit transportation of vehicles, and inability to determine responsibility for illegal acts. To achieve the effect of recovering precise control, improving utilization rate and ensuring safety

Active Publication Date: 2020-11-03
HANGZHOU ZCITS TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process from the collection of various detection sites to the processing of the penalty system, the data on super-control will pass through many different entities (station roadside units, storage units at all levels, super-control centers, cloud service providers, etc.). The collection of data processors is complex, and administrators or authorized employees of various entities may abuse their powers to tamper or destroy information in the chain of evidence (including various structured data, pictures, and videos), thereby making the evidence illegal. The chain of evidence for the behavior is invalid, making it impossible to determine responsibility for the illegal behavior
[0004] At present, the protection of Zhichao data mainly relies on the verification evidence of Zhichao (the hash value of Zhichao data) to judge whether the Zhichao data has been damaged, but the data hash value cannot meet the tamper-proof requirements of data, and can only roughly Judging the integrity of the data, there is a lack of anti-tampering protection for the over-control data, and then it is impossible to determine the responsibility for the illegal over-limit transportation of vehicles after the over-control data has been tampered with or destroyed, which needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A tamper-proof method for cloud governance super data based on block chain technology
  • A tamper-proof method for cloud governance super data based on block chain technology
  • A tamper-proof method for cloud governance super data based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0047] like Figure 1 to Figure 4 As shown, a cloud governance super data anti-tampering method based on blockchain technology includes the following steps:

[0048] Step 1. The registration center initializes the system public key and private key (S K , P K ), public and private keys of system users (S id , P id ) and the shared secret key Key of various governance sites (ZS) z-s ;

[0049] Step 2, when the vehicle (V i ) overrun, the overrun control station (ZS) will automa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud overload control data tamper-proofing method based on a blockchain technology, and relates to the technical field of highway overload control systems, and the method comprises the following steps: step 1, a registration center initializes a system public key and private key (SK, PK), a system user public key and private key (Sid, Pid), and shared keys Keyz-s of various overload control stations; step 2, the overload control data is encrypted to form a ciphertext CT1 and a block CT2, wherein the block CT2 is stored on a block chain; step 3, the overload control site integrates the ciphertext CT1, the block number BlockID and the timestamp T1 and sends the ciphertext CT1, the block number BlockID and the timestamp T1 to an overload control center cloud server;step 4 timeliness is verified and overload treatment is performed by a law enforcement department; step 5, overload treatment data is marked; step 6, the overload control center executes overload control data security check; 7, a judgment is made as to whether a data recovery mechanism is triggered or not; and step 8, the tampered or damaged ciphertext CT1 is covered with the source data by the overload control center. The invention has the effects of tamper-proofing of overload treatment data and accurate overload treatment.

Description

technical field [0001] This application relates to the technical field of highway governance system, in particular to a method for anti-tampering of cloud governance data based on blockchain technology. Background technique [0002] In order to ensure the safety of road transportation and road facilities, and establish a sound and orderly road transportation and road construction and maintenance system, transportation departments at all levels have established an off-site law enforcement network for overrunning, relying on over-limit detection stations, non-stop over-limit detection, Mobile detection, source weighing detection, and all-round supervision of various traffic violations, especially vehicle over-limit and overloading, so as to achieve scientific and technological governance. Among them, anti-tampering of the evidence chain in the collection, storage, transmission, and processing of super data is a research hotspot. [0003] In the process from the collection of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F21/62G06F21/60
CPCG06F21/602G06F21/6218G06F21/64
Inventor 李小村陈振宇夏莹杰卢志珊王传华
Owner HANGZHOU ZCITS TECH