Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things data security sharing method based on privacy protection

A data security and privacy protection technology, applied in the field of information security, can solve the problems of exposing personal identity information, reducing computing and communication overhead, and inability to flexibly protect sensitive data, so as to avoid collusion attacks, reduce computing and communication overhead, and guarantee safety effect

Active Publication Date: 2021-01-01
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problems that personal identity information is easily exposed and sensitive data cannot be flexibly protected during the identity authentication process of the existing information resource sharing method, the present invention proposes a privacy protection-based Internet of Things data security sharing method, which adopts the hidden attribute identity Authentication technology realizes identity authentication in the identity authentication process of resource information sharing and at the same time protects personal privacy very well, and combines blockchain technology to store shared data. According to the tamper-proof and traceable characteristics of blockchain technology The security of shared data is guaranteed, and the communication and computing load is distributed to each node in a balanced manner, reducing the computing and communication overhead of each participant. Identity authentication and attribute permission parameter matching are adopted to avoid collusion of terminals without permissions attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things data security sharing method based on privacy protection
  • Internet of Things data security sharing method based on privacy protection
  • Internet of Things data security sharing method based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] In the case of complex data sharing, the certification center CA in the domain needs to authenticate the terminal members of the data information sharing, but when providing the identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who meet the access policy can share information. Aiming at this application background, the present invention provides a privacy protection-based industrial IoT data security sharing method, such as figure 1 As shown, the steps are as follows: ① The terminal members participating in the sharing of information resources first perform parameter initialization and generate their own public / private key pairs respectively; Terminal members perf...

Embodiment 2

[0098] A method for secure sharing of industrial IoT data based on privacy protection, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of terminal members participating in information resource sharing is 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal memberships is expressed as The authentication center CA defines the attribute set of all terminal members as Attr={A 1 ,A 2 ,A 3 }, terminal member u i The attribute set of (1≤i≤10) is attr i ={a i,1 ,a i,2 ,a i,3 }, terminal member u υ The attribute set of (1≤υ≤10,υ≠i) is attr υ ={a υ,1 ,a υ,2 }. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help the understanding of the implementation method of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Internet of Things data security sharing method based on privacy protection. The method comprises the following steps: initializing protocol parameters in an information sharing network domain; registering a terminal member; enabling the terminal member to acquire own attribute authority parameters, calculating encryption keys according to the Chinese remainder theorem, encrypting shared information resources and storing the encrypted information resources in an off-chain database; calculating intermediate parameters required for storing the information resources, generating index information of the shared ciphertext and packaging the index information in a block, and so on, enabling each terminal member to store related information of the ciphertext in the blockto generate a block chain; and accessing and sharing the ciphertext. Identity and attribute parameter matching dual authentication is adopted to prevent collusion attacks and protect personal privacy,an attribute matching access control strategy is combined with a block chain technology to guarantee the safety of shared resource information, the storage burden is reduced, information resource sharing in the industrial Internet of Things is more flexible, efficient and practical, and the method has important field research significance and commercial application value.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a privacy protection-based industrial Internet of Things data security sharing method. Background technique [0002] The rapid development and continuous innovation of computer technology and the Internet of Things have improved the efficiency of information storage and real-time exchange. Modern industrial systems require the application of industrial Internet of Things systems to achieve a higher level of data sharing, which must enable data interaction between different Internet of Things systems in the form of an open network. However, this highly open network is vulnerable to illegal attacks, resulting in the destruction or loss of various data, which seriously affects the normal operation of industrial systems. Privacy protection and data security are security issues that need to be guaranteed for resource sharing. Access control is one of the cornerst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L63/0421H04L63/0876H04L63/10H04L67/1097H04L9/3247H04L9/3297H04L9/0869H04L67/1001H04L9/50
Inventor 王锐芳李勇李永娇赵坤园朱亮李健勇袁俊岭甘勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products