Internet of Things private data segmentation encryption method and block chain system

A technology of privacy data and encryption method, applied in the blockchain field, can solve problems such as data unauthorized access, data privacy leakage, separation, etc., and achieve the effect of flexible access control, ensuring privacy security, and ensuring efficient sharing and supervision

Pending Publication Date: 2022-05-13
TAISHAN UNIV
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the system data and operations are stored in plain text and are transparent to all nodes in the entire network, once the data is uploaded to the chain, the ownership and control of the data will be separated, and the data will face many security issues such as data privacy leaks and unauthorized data access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things private data segmentation encryption method and block chain system
  • Internet of Things private data segmentation encryption method and block chain system
  • Internet of Things private data segmentation encryption method and block chain system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1 of this application introduces a method for segmenting and encrypting privacy data of the Internet of Things.

[0048] Such as figure 1 A method for segmenting and encrypting privacy data of the Internet of Things shown, is characterized in that, comprising the following steps:

[0049] Obtain IoT data;

[0050] Carry out data horizontal segmentation on the acquired IoT data to obtain unstructured data and structured data;

[0051] Segmenting the unstructured data and the structured data to obtain IoT privacy data;

[0052] Based on symmetric encryption and data attribute encryption, a hybrid encryption scheme for the privacy data of the Internet of Things is constructed to realize the encryption of privacy data of the Internet of Things.

[0053] Collect IoT data based on IoT devices, divide the collected data into structured data and unstructured data, and divide them into public data and private data respectively.

[0054] The segmentation steps of st...

Embodiment 2

[0066] Embodiment 2 of the present application introduces a fine-grained access control method for Internet of Things data, which is implemented on the basis of the method for segmenting and encrypting private Internet of Things data introduced in Embodiment 1.

[0067] The fine-grained access control of IoT data is completed when the attributes of the device are encrypted. IoT data sharing is not open to everyone, but needs to be open to people from different organizations, different identities, and different locations, so it needs to be set.

[0068] A fine-grained access control method for Internet of Things data, comprising:

[0069] Step 1, using IoT devices as an effective means of data access control, realizes the binding of data access control and data sources.

[0070] The IoT device as an effective means of data access control specifically includes: the IoT device first registers to the network, and the administrator assigns key parameters such as a key for symmetric...

Embodiment 3

[0094] Embodiment 3 of this application introduces a block chain system for dividing and encrypting privacy data of the Internet of Things.

[0095] Such as Figure 4 An IoT privacy data segmentation encrypted blockchain system is shown, including:

[0096] The acquisition module is configured to obtain the Internet of Things data based on the Internet of Things device;

[0097] The segmentation module is configured to perform data horizontal segmentation on the acquired IoT data to obtain unstructured data and structured data, and segment the unstructured data and the structured data to obtain IoT privacy data ;

[0098] The encryption module is configured to construct a hybrid encryption scheme for the privacy data of the Internet of Things based on symmetric encryption and data attribute encryption, so as to realize the encryption of privacy data of the Internet of Things;

[0099]The fine-grained access control module is configured to set the control authority for Inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of block chains, and particularly relates to an Internet of Things private data segmentation encryption method and a block chain system, and the method comprises the following steps: obtaining Internet of Things data; performing data transverse segmentation on the acquired Internet of Things data to obtain unstructured data and structured data; segmenting the unstructured data and the structured data to obtain privacy data of the Internet of Things; and constructing a hybrid encryption scheme of the Internet of Things private data based on symmetric encryption and data attribute encryption to realize encryption of the Internet of Things private data. Through cryptography, IPFS and block chain technologies, fine-grained and flexible access control of data of the Internet of Things is realized, privacy security of chained data on the Internet of Things is ensured, and it is ensured that data collected by the Internet of Things cannot be tampered and is secure and credible.

Description

technical field [0001] The application belongs to the technical field of block chain, and specifically relates to a method for segmenting and encrypting privacy data of the Internet of Things and a block chain system. Background technique [0002] The statements in this section merely provide background technical information relevant to this application and do not necessarily constitute prior art. [0003] As the core key technology of informatization, the Internet of Things has achieved enough outstanding achievements in the world. Nevertheless, it also faces problems such as data privacy leakage and untrustworthy data. The decentralization, non-tampering, and traceability of blockchain technology provide new technologies and new ideas for the development of Internet of Things informatization. [0004] Blockchain can better empower industry applications and accelerate the process of blockchain technology landing. However, if the system data and operations are stored in p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/12G16Y30/10G16Y40/50
CPCH04L63/045H04L67/12G16Y30/10G16Y40/50
Inventor 张国锋张楚陈晓冯斌董春燕李秋玲王法壹类成臻沈杰王占平
Owner TAISHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products