Internet of Things data security sharing method based on privacy protection
A data security and privacy protection technology, applied in the field of information security, can solve the problems of exposing personal identity information, reducing computing and communication overhead, and inability to flexibly protect sensitive data, so as to avoid collusion attacks, reduce computing and communication overhead, and guarantee safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0065] In the case of complex data sharing, the certification center CA in the domain needs to authenticate the terminal members of the data information sharing, but when providing the identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who meet the access policy can share information. Aiming at this application background, the present invention provides a privacy protection-based industrial IoT data security sharing method, such as figure 1 As shown, the steps are as follows: ① The terminal members participating in the sharing of information resources first perform parameter initialization and generate their own public / private key pairs respectively; Terminal members perf...
Embodiment 2
[0098] A method for secure sharing of industrial IoT data based on privacy protection, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of terminal members participating in information resource sharing is 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal memberships is expressed as The authentication center CA defines the attribute set of all terminal members as Attr={A 1 ,A 2 ,A 3 }, terminal member u i The attribute set of (1≤i≤10) is attr i ={a i,1 ,a i,2 ,a i,3 }, terminal member u υ The attribute set of (1≤υ≤10,υ≠i) is attr υ ={a υ,1 ,a υ,2 }. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help the understanding of the implementation method of the present inven...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com