Internet-of-things data security access method, system and device based on blockchain and edge computing, and storage medium

An edge computing and data security technology, applied in the field of the Internet of Things, can solve problems such as the server's inability to respond to device update requests, data call failures, etc., and achieve the effect of avoiding excessive growth and solving high costs

Pending Publication Date: 2022-02-25
NARI INFORMATION & COMM TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the prior art, to provide a secure access method, system, device and storage medium for Internet of Things data based on block chain and edge computing, and to use block chain and edge computing technology to guarantee the The integrity of data collected by networked edge devices solves the technical problem that the server cannot respond to device update requests, resulting in data call failures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-things data security access method, system and device based on blockchain and edge computing, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 As shown, the embodiment of the present invention provides a secure access method for IoT data based on blockchain and edge computing, including the following steps:

[0029] (1) Perform identity verification on the edge device of the Internet of Things. If the verification is passed, the data collected by the edge device of the Internet of Things is encrypted locally or sent to the edge gateway for encryption;

[0030] The authentication of the edge device of the Internet of Things includes: verifying the identity of the edge device of the Internet of Things and obtaining the corresponding data writing permission.

[0031] Through the blockchain-based distributed identity authentication technology, the basic information of IoT edge devices is stored in the block, forming an independent identity sub-chain dedicated to storing identity information, and storing device permission information in a separate permission sub-chain Chain to realize the separati...

Embodiment 2

[0039] An embodiment of the present invention provides a secure access device for IoT data based on blockchain and edge computing, the device includes:

[0040] The acquisition and encryption module is used to authenticate the edge device of the Internet of Things. If the verification is passed, the data collected by the edge device of the Internet of Things is encrypted locally or sent to the edge gateway for encryption;

[0041] Distributed storage module, used to upload encrypted data to IPFS file storage module;

[0042] The blockchain storage module is used to obtain the storage information of the encrypted data in the IPFS file storage module, and store the storage information into the blockchain based on the data management component;

[0043] The data acquisition module is used to request the storage information of the data from the block chain, and access the IPFS file storage module to acquire data based on the storage information.

Embodiment 3

[0045] The embodiment of the present invention provides a secure access device for Internet of Things data based on blockchain and edge computing, which is characterized in that it includes a processor and a storage medium;

[0046] The storage medium is used to store instructions;

[0047] The processor is configured to operate in accordance with the instructions to perform the steps according to any one of the methods described above.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet-of-things data security access method, system and device based on a blockchain and edge computing, and a storage medium, and the method comprises the steps: carrying out the identity verification of an Internet-of-things edge device, and if the verification is passed, carrying out the local encryption of data collected by the Internet-of-things edge device or transmitting the data to an edge gateway for encryption; the encrypted data are uploaded to an IPFS file storage module; obtaining storage information of the encrypted data in an IPFS file storage module, and storing the storage information into the blockchain based on a data management component; requesting the storage information of the data from the blockchain, and the IPFS file storage module is accessed based on the storage information to obtain the data. According to the method, the blockchain and edge computing technology is utilized to ensure the secure storage of the Internet-of-things data.

Description

technical field [0001] The invention relates to a secure access method, system, device and storage medium for Internet of Things data based on blockchain and edge computing, and belongs to the technical field of Internet of Things. Background technique [0002] With the rapid development of the Internet of Things, the security problems of the edge devices of the Internet of Things are becoming more and more serious. Globally, there are a large number of cyber-attacks targeting IoT edge devices every year. One of the main attack methods of hackers is to use the firmware vulnerabilities of IoT edge devices to intrude into IoT edge devices, and use these compromised IoT edge devices as a springboard to launch further attacks on the target IoT. [0003] Traditional IoT edge device data collection usually adopts a client-server model, and the data collected by IoT edge devices is stored on the central server. As the number of IoT edge devices reaches millions or even tens of mi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/1097H04L67/12
CPCH04L63/08H04L63/0428H04L67/1097H04L67/12
Inventor 李英杰罗旺席丁鼎俞弦郝运河偰俊
Owner NARI INFORMATION & COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products