Privacy protection data subscription method in block chain Internet of Vehicles

A technology of privacy protection and data subscription, which is applied in vehicle components, digital transmission systems, vehicle wireless communication services, etc., can solve problems such as single point of failure and incorrect query results, and achieve high reliability, data privacy protection, and strong reliability sexual effect

Pending Publication Date: 2022-07-08
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to address the defects of the existing technology, in order to solve the technical problems of single point of failure and incorrect query results in the data subscription of the Internet of Vehicles, and at the same time realize the protection of the data privacy of the subscription service provider and the query privacy of the user. proposed a privacy-preserving data subscription method in the blockchain Internet of Vehicles

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection data subscription method in block chain Internet of Vehicles
  • Privacy protection data subscription method in block chain Internet of Vehicles
  • Privacy protection data subscription method in block chain Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0079] like figure 1 As shown, a privacy protection data subscription method in the blockchain Internet of Vehicles includes the following steps:

[0080] Step 1: System initialization.

[0081] The subscription service provider first needs to initialize the data subscription query system and generate a series of keys. Specifically, it includes the following steps:

[0082] Step 1.1: The subscription service provider generates a master key k and a public-private key pair (pk, sk) for generating a digital signature.

[0083] Step 1.2: The subscription service provider generates two hash chains U={u 1 , ..., u L } and V={v 1 ,...,v L }, each hash chain is composed of L hashes with a length of 256 bits, where L represents the maximum number of updates that the system can support, which is set by the subscription service provider. Specifically, the hash u in U i The calculation rule is: when i=1, u i is a random string with a length of 256 bits, when 1i =H(u i-1 ), where...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a privacy protection data subscription method in a block chain Internet of Vehicles, and belongs to the technical field of block chains and privacy information protection. According to the method, data and indexes in a ciphertext form are stored in the block chain, and queried themes are confused, so that on the premise of ensuring the correctness of a query result, an external attacker cannot deduce the content of a plaintext according to the ciphertext data stored on the chain, and cannot deduce the themes queried by a user. According to the method, a subscription key management and distribution method based on a Hash chain is adopted, a user can inquire the content of a specified theme in a subscription period through a subscription key and decrypt an inquiry result, and the user cannot inquire and decrypt the content outside the subscription period and the subscription theme of the user. And after the user decrypts the query result, the integrity of the query result can be authenticated in batches, so that efficient verifiability of the subscription query result of the Internet of Vehicles is realized.

Description

technical field [0001] The invention relates to a data privacy protection method, specifically including a privacy protection data subscription method in a blockchain Internet of Vehicles, and belongs to the technical field of blockchain and privacy information protection. Background technique [0002] With the development of intelligent networked vehicle technology, the Internet of Vehicles has attracted more and more people's attention. The Internet of Vehicles takes the smart car loaded with the on-board unit OBU as the carrier, and realizes the communication between the vehicle and the vehicle (V2V), the vehicle and the infrastructure (V2I) and even the vehicle and the everything (V2X) through its own network module and the roadside unit RSU and other infrastructure. . [0003] The emergence of the Internet of Vehicles has brought more convenience to vehicle users. Taking data subscription as a typical application in the Internet of Vehicles as an example, the subscrip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L9/40H04L67/1097H04W4/40
CPCH04L9/0643H04L9/0861H04L9/3247H04L63/10H04L67/1097H04W4/40
Inventor 祝烈煌张璨徐畅丁瑶玲
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products