A block chain-based secure auditing Internet of Things data sharing system and method

A data sharing and blockchain technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as occupying large communication bandwidth, unsuitable for IoT systems, and unable to realize outsourced decryption functions, etc. To achieve the effect of preventing impersonation attacks

Pending Publication Date: 2022-02-11
STATE GRID CORP OF CHINA +2
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0032] Disadvantages: This invention uses access control strategies to control data transfer, but it cannot limit the number of times users can use data resources. Once authorized, data resources can be used unlimited times
[0035] Disadvantages: The invention uses the attribute-based encryption method to fine-grained control the use of data, but cannot realize the outsourced decryption function, and the user needs to perform a large number of calculations to recover the ciphertext
[0038] Disadvantages: The invention combines blockchain technology to realize identity authentication between IoT devices, but cannot realize secure sharing of IoT data, and does not consider fine-grained security control of data
[0041] Disadvantages: This invention uses private chains for data security sharing. The application scenarios are not as wide as public chains and alliance chains. The scope of use is first, and it is not suitable for public service-oriented Internet of Things systems.
[0044] Disadvantages: The invention uses attribute-based and proxy re-encryption functions to protect the security of IoT data, but the encryption and decryption processes of the scheme involve a large number of bilinear pairing operations and power exponent operations, which is not suitable for the resource-constrained IoT Device usage, because a large amount of computing will quickly exhaust the computing resources and power of sensor nodes, and will occupy a large amount of communication bandwidth
Therefore, the second challenge is how to prevent denial of service attacks against ABE schemes
(3) Resource usage audit issues
Therefore, the third major challenge is how to achieve efficient auditing of cloud resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block chain-based secure auditing Internet of Things data sharing system and method
  • A block chain-based secure auditing Internet of Things data sharing system and method
  • A block chain-based secure auditing Internet of Things data sharing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0135] In order to make the features and advantages of this patent more obvious and easy to understand, the following special examples are described in detail as follows:

[0136] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0137] The system architecture of this embodiment is as follows figure 1 As shown, each role includes key generation center (KGC: key generation center), cloud server, blockchain, Internet of Things and data users. The functions of each entity in the system and the operations performed are outlined below. The definitions of symbols in the system of this embodiment are shown in Table 1.

[0138] Key generation center: responsible for establishing the system and generating public parameters PP, and distributing keys for entities in the system (step ①): distributing public-private key pairs (PK O ,SK O ), distribute public-private key pairs (PK U ,SK U )...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a block chain-based secure auditing Internet of Things data sharing system and method. The security of Internet of Things secure data sharing is improved by using a block chain technology. Fine-grained control over the data access authority of the Internet of Things is achieved in an attribute-based encryption mode, and the computing overhead of a user side is reduced through an outsourcing decryption technology. One core function of the system is to control the number of access times of the user, and manage each access of the user by using algorithms such as synchronous aggregation signature and verifiable random function. And in the payment use model, the system distributes limited number of Internet of Things data access permissions according to the payment condition of the user to the data. Meanwhile, the intelligent contract function of the block chain provides user management, signature verification and access auditing functions for the system.

Description

technical field [0001] The invention belongs to the technical fields of information security, Internet of Things and information sharing, and in particular relates to a secure and auditable Internet of Things data sharing system and method based on blockchain. Background technique [0002] 1. Blockchain and smart contracts [0003] Blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is a cryptographically guaranteed non-tamperable and unforgeable distributed ledger. Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses automated A new distributed infrastructure and computing paradigm for programming and manipulating data through smart contracts composed of script codes. [0004] A smart contract is a special proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/604G06F21/64G06F2221/2141
Inventor 李宏发李霄铭熊军李洋余翔杨启帆
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products