CN113489692A - Block chain access control model strategy based on main side chain cooperation - Google Patents

Block chain access control model strategy based on main side chain cooperation Download PDF

Info

Publication number
CN113489692A
CN113489692A CN202110695733.1A CN202110695733A CN113489692A CN 113489692 A CN113489692 A CN 113489692A CN 202110695733 A CN202110695733 A CN 202110695733A CN 113489692 A CN113489692 A CN 113489692A
Authority
CN
China
Prior art keywords
access control
contract
access
chain
control model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110695733.1A
Other languages
Chinese (zh)
Other versions
CN113489692B (en
Inventor
刘晶
朱炳旭
季海鹏
董瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei University of Technology
Original Assignee
Hebei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei University of Technology filed Critical Hebei University of Technology
Priority to CN202110695733.1A priority Critical patent/CN113489692B/en
Publication of CN113489692A publication Critical patent/CN113489692A/en
Application granted granted Critical
Publication of CN113489692B publication Critical patent/CN113489692B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a block chain access control model strategy based on main side chain cooperation, which comprises the following steps: s1, establishing a model strategy architecture part and configuring gateways connected with the model strategy architecture part; s2, configuring an Ethernet workshop main chain on the block chain network for identity authentication; s3, building a side chain, and establishing a connection with an Etherhouse main chain through a Plasma contract; s4, designing related intelligent contracts to be deployed on side chains according to the access control model; s5, uploading resource contents and access rules by a user to obtain a complete access control model strategy; the invention provides an industrial Internet of things access control model strategy based on main and side chain cooperation, aiming at solving the problems that single-point failure and efficient transmission need to be simultaneously solved in access control under the environment of the industrial Internet of things, and aiming at the platform, the access control model is optimized. The data transmission speed and the block chain platform throughput are remarkably improved, and the related cost of access control in the industrial Internet of things can be effectively reduced.

Description

Block chain access control model strategy based on main side chain cooperation
Technical Field
The invention relates to the field of access control, in particular to a block chain access control model strategy based on main and side chain cooperation.
Background
In the process of the rapid development of industrial internet of things, the internet of things also bears massive data from industry. However, for the traditional industrial internet of things system which highly depends on the centralized server, the development of the industrial internet of things is seriously influenced by fatal defects of data privacy protection, reliable transmission and the like. Access control is a data protection technology which can ensure that data can only be accessed by approved users, but the current access control mostly adopts a centralized server to complete authorization decision, and the design is easy to have single point failure problem and has lower reliability. Meanwhile, the traditional access control is easy to be intercepted and tampered by a third party in the data transmission process. Therefore, how to solve the problems of reliable data transmission and single point of failure of access control in the industrial internet of things becomes a hotspot problem of the development of the industrial internet of things.
The blockchain is an emerging decentralized distributed storage technology, and can establish a trust relationship in a centerless network environment. The block chain solves the safety problem caused by a centralized authorization entity from the technical aspect, and the single-point fault problem can be effectively avoided by combining the block chain with access control, so that the reliability and the safety of the access control are improved. At present, the block chain technology is applied to the internet of things by scholars and is combined with access control to solve the problems of single-point failure and reliable data transmission, and good effects are achieved. An article [ Zhangjiang Hui, Chi wave, Liru, Shijinshan ] Internet of things access control system [ J ] based on an intelligent contract, computer engineering 1-13] aims at the problems of single-point faults and data tampering easily occurring in the Internet of things environment, and an Internet of things access control system based on the intelligent contract is designed and realized; an article [ Sun Guangcheng, Lihong Hao, Lisaifei, Zhang Wei ] is an Internet of things access control system [ J ] based on a block chain, a computer and modernization, 2020(11):100 and 108] provides a new access control model combined with the block chain aiming at the problem that the conventional access control model is relatively complex, has the characteristics of flexibility, fine granularity and the like, and can be effectively deployed in an Internet of things system.
The above documents solve the problem of single point failure of access control in the internet of things environment to a certain extent, but in practical applications, especially in the industrial internet of things, massive industrial data transmission exists, and a blockchain system in the industrial internet of things is required to have a higher throughput rate and a shorter transaction confirmation time. Aiming at the problems, an article [ Wenxinglin ] license block chain efficient consensus and cross-chain mechanism research [ D ]. Shandong university, 2019] provides a credible transaction framework in a license environment, and the transaction processing capacity in unit time is increased to improve the data transmission speed; an article [ Xuxuxu Song, gold swimming, Zhangzhi, Yangjie, Chen Rong Yuan ] is applied to a layered lightweight high-flux block chain method [ J ] of industrial internet data security, a computer integrated manufacturing system, 2019,25(12) ] designs a layered expansion type block chain to meet the requirements of high efficiency and security in an industrial environment. According to the scheme, the problem of data transmission throughput rate of the block chain is solved to a certain extent, however, the block chain is required to be verified every time an access request is made by access control in the environment of the industrial Internet of things, and although the structure of the block chain is optimized, the transmission speed of data is reduced due to the large number of nodes by a high-efficiency verification mechanism in the environment of massive nodes.
Disclosure of Invention
The invention provides a block chain access control model strategy with cooperation of main chains and side chains, aiming at solving the problems that single-point failure and efficient transmission need to be simultaneously solved in access control in an industrial Internet of things environment. Firstly, a strategy architecture composed of a client, a block chain network and a device end is established, and identity authentication of the client and the device is established on the block chain network. Secondly, building a main side chain block chain network with an Ether house as a data verification main chain and a side chain as an access control carrier on the block chain network; and the designed access control model is converted into an intelligent contract to be loaded on the side chain. And finally, the user uploads the resource content and the access rule to complete a final access control strategy, so that the single-point fault is solved, and the data transmission speed is greatly improved.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a blockchain access control model policy based on master-side chain cooperation, comprising the steps of:
s1, establishing policy framework client, block chain network and equipment end. An application SDK is set at the client side, and an edge device gateway is set at the device side, so that the three parts of networks are connected and communicated;
s2, an Ethernet house main chain is built on the block chain network, and the identities of the client and the equipment terminal are confirmed in the block chain network by applying the SDK and the edge equipment gateway, so as to carry out identity verification;
s3, building a plurality of side chains according to the network requirement, packaging the data of each side chain and sending the data to the Operator of the corresponding side chain, and submitting block data to the main chain of the Ethern by the miner through a Plasma contract;
s4, compiling an intelligent contract which can be deployed on a side chain according to the access control model, sequentially deploying a pre-contract and a supervision contract in a side chain head block, and then sequentially deploying the access control contract;
s5: uploading related resources and access rules on a client, and establishing an interconnected strategy architecture to obtain a complete access control model strategy;
further, in step S4, the access control model used is:
the model comprises six components of a resource visitor (subject), a subject information point, a subject and object information processing point, an access control strategy, an object information point and a resource owner (object). The two information points separate resources, users and visitors, and the information processing point internally connects the three; therefore, when a resource access request and resource uploading occur each time, the external part can only contact two information points, and cannot directly contact the internal resource, so that the data leakage is fundamentally cut off.
Further, in step S4, the deployment mode of the intelligent contract is:
the head of the side chain deploys a preamble, which maintains an information table for recording relevant information of supervision contracts and access control contracts. And then, a supervision contract is deployed on the next block, and the time tolerance function is included in the contract and used for monitoring the access frequency of the visitor and performing batch access allowance on the access in the specified range. Meanwhile, the supervision contract maintains a violation access table for recording violation visitors and performing certain punishment. And when an access request occurs, the access control contract responds to the access request according to the formulated access strategy and the detection result of the supervision contract. And when a new access control contract is added, only the new access control contract is needed to be continuously added on the chain.
Adopt the produced beneficial effect of above-mentioned technical scheme to lie in:
the invention provides a block chain access control model strategy for master-side chain cooperation, which aims at solving the problems of single-point failure and efficient transmission of access control in an industrial Internet of things environment. The invention combines the improved block chain network and the access control model into the access control model based on the cooperation of the main chain and the side chain, and under the model method, the single-point fault problem and the efficient data transmission problem are solved. The method not only optimizes the generation speed of the access control strategy, but also greatly improves the operation stability of the block chain. Can meet the large-scale use requirement under the environment of the industrial Internet of things.
Compared with the traditional blockchain access control model, the method comprises the following steps:
(1) the cooperation of the block chain main chain and the side chain is realized by taking an ether house as a data verification main chain and carrying access control on a Plasma side chain, so that the pressure of data storage verification of the block chain is effectively shared, and the data bearing capacity of a block chain network is greatly improved; (2) adding information points to the two parts of the subject and the object in the model respectively to separate resources, users and visitors; meanwhile, an information processing point is designed inside, and the request is separated from the access control strategy. The method prevents the external entity from directly contacting the internal resource, prevents the access control strategy from being illegally tampered, and greatly improves the security of access control. (3) Decision authorization and decision information management of access control authority are completed by setting a pre-contract, a supervision contract and an access control contract, access is standardized in modes of batch access permission, violation punishment and the like, and access efficiency is greatly improved.
The main side chain combined access control model strategy provided by the invention is substituted into the main chain parameters of the block chain of the Ethernet workshop, and the effectiveness of the provided model strategy on high-efficiency data transmission is verified through experimental analysis, so that the data delay is reduced by 28% compared with the traditional single-chain access control strategy of the Ethernet workshop, and the throughput is up to 220 TPS. The data transmission delay and the storage space occupation can be obviously reduced while the throughput rate is improved.
Drawings
FIG. 1 is a block chain access control model policy architecture diagram with master-side chain collaboration;
FIG. 2 is an access control model architecture diagram;
FIG. 3 is a diagram of intelligent contract interactions;
FIG. 4 Access control strategy Generation time-contrast plot
FIG. 5 access control strategy data delay comparison graph;
FIG. 6 access control strategy throughput write request test patterns;
FIG. 7 Access control policy throughput Access resources test graph
FIG. 8 access control strategy memory growth comparison graph;
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The architecture of the invention mainly comprises a client, a block chain network and an equipment end, and the architecture diagram is shown in figure 1, and comprises the following steps:
s1, establishing policy framework client, block chain network and equipment end. An application SDK is set at the client side, and an edge device gateway is set at the device side, so that the three parts of networks are connected and communicated;
s2, an Ethernet house main chain is built on the block chain network, and the identities of the client and the equipment terminal are confirmed in the block chain network by applying the SDK and the edge equipment gateway, so as to carry out identity verification;
s3, building a plurality of side chains according to the network requirement, packaging the data of each side chain and sending the data to the Operator of the corresponding side chain, and submitting block data to the main chain of the Ethern by the miner through a Plasma contract;
and S4, after the block chain network is constructed, the intelligent contract which can be deployed on the side chain needs to be compiled according to the designed access control model. In the access control of the industrial Internet of things, not only the permission is simply and clearly divided, but also the risks of excessive authorization, privacy data leakage and the like are prevented. Therefore, the access control authority needs to be classified in a targeted manner according to the characteristics of the use scene.
FIG. 2 shows an access control model designed by the present invention, in which two information points are increased to separate resources, users and visitors, and an information processing point connects the three internally; therefore, when a resource access request and resource uploading occur each time, the external part can only contact two information points, and cannot directly contact the internal resource, so that the data leakage is fundamentally cut off.
Fig. 3 shows a deployment scenario in which the intelligent contract is implemented in the head of the side chain, which deploys a pre-contract, and maintains an information table for recording relevant information of the supervision contract and the access control contract. And then, a supervision contract is deployed on the next block, and the time tolerance function is included in the contract and used for monitoring the access frequency of the visitor and performing batch access allowance on the access in the specified range. Meanwhile, the supervision contract maintains a violation access table for recording violation visitors and performing certain punishment. And when an access request occurs, the access control contract responds to the access request according to the formulated access strategy and the detection result of the supervision contract. And when a new access control contract is added, only the new access control contract is needed to be continuously added on the chain.
S5: uploading relevant resources and access rules on the client, establishing an interconnected strategy framework, and obtaining a complete access control model strategy
The invention discloses a block chain access control model strategy test verification based on main and side chain cooperation, which comprises the following steps:
experiment-access control model performance testing
The generation time of the access control strategy is an important index for measuring the quality of an access control model. In order to verify the effect of the model in the aspect of strategy generation, a traditional blockchain Internet of things access control model is designed for experimental reference to carry out comparison experiments. This experiment prepared a set of concurrent experiments with 50, 100, 200, 500, 800 trials, and both models were tested and recorded.
Experimental results as shown in fig. 4, compared with the model in this document, the policy generation time of the conventional access control model increases with the increase of the number of concurrencies. And the master-side chain cooperation access control model can generate the access strategy more quickly, and the delay of generating the strategy tends to be stable during high-frequency access. The model is effective in solving the problems of slow strategy generation speed and high access delay at high frequency.
Experimental two-main side chain network performance test
The access control under the industrial internet of things requires that a block chain not only ensures stable transmission of data, but also reduces delay of data transmission to ensure timeliness of data requests. In order to test the stability of the main side chain network, pre-contracts are respectively deployed on the Ether house test chain and the main side chain network in an experimental selection mode, and relevant information of the access control contracts is simulated and written into the contracts. The number of writing times in the experiment was 50 times, 100 times, 200 times, 500 times, and 800 times, respectively. Fig. 5 shows the experimental results, and as shown, the experimental data of the main-side chain network is significantly better than the results obtained by the ether house test chain in terms of both delay time and stability. The effectiveness of the main side chain network in guaranteeing the stability of data and effectively reducing the data delay is proved.
The blockchain network applied to the industrial internet of things not only needs to have high data transmission efficiency, but also needs to have high throughput rate to face mass data transmission. In order to test the throughput of the blockchain network when different data volumes are met, the experiment records the strategy-abbreviated writing request and the resource access request respectively by simulating that 10 client nodes send concurrent requests to the side chain for 50 times, 100 times, 200 times, 400 times, 700 times, 1100 times and 1600 times. Fig. 6 and 7 illustrate the throughput of blockchain networks in write requests and accessing resources. As is apparent from the figure, the blockchain of the present invention is not only high throughput, but also excellent stability in the face of high concurrent requests. The effectiveness of the blockchain network of the invention in optimizing throughput and improving blockchain stability under high concurrency is proved.
Experiment result of three-strategy storage space occupation experiment
The code quantity deployed by the access control strategy can be used for measuring the storage pressure of the block chain in actual deployment, and the smaller the code quantity increases with the increase rate of the equipment, the lower the actual deployment cost of the strategy is, and the greater the benefit is. In order to analyze the storage pressure of the access control strategy on the block chain, two common access control strategies are designed for experimental reference and are compared with the access control strategy in the text, and the condition that the contract size increases along with the number of the devices is analyzed. The relevant information of the contract is shown in table 1.
TABLE 1 Intelligent contract related information
Figure BDA0003127055210000091
When an access control contract memory space growth comparison is plotted based on the contract information, as shown in fig. 8, the code amount of the RBAC policy rapidly increases as the number of devices increases, and more than 4 devices are higher than the policy designed herein. Although the code growth rate of the ABAC strategy is smaller than that of the RBAC strategy, the speed is still increased rapidly compared with the strategy provided by the invention. This demonstrates the obvious effectiveness of the proposed strategy in solving the problem of blockchain storage stress.
Conclusion
Aiming at the problem that single-point faults and efficient transmission need to be solved simultaneously in access control in the environment of the industrial Internet of things, an industrial Internet of things access control model strategy based on main and side chain cooperation is provided. A block chain network used for the industrial Internet of things is designed, and the performance of the block chain is improved; and an access control model suitable for a master side chain block chain network is designed to adapt to high-speed data transmission in the environment of the industrial Internet of things. Through experimental analysis and verification, the method optimizes multiple indexes of block chain access control, such as data transmission speed, stability, throughput rate and the like. Compared with the traditional Ether house single-chain access control strategy, the data delay is reduced by 28 percent, and the throughput is as high as 220 TPS. In the context of proven feasibility of the blockchain landing internet of things, it is shown that strategies can be used to optimize the current blockchain technology at the design level.

Claims (3)

1. A block chain access control model strategy based on main side chain cooperation is characterized by comprising the following steps:
s1, establishing policy framework client, block chain network and equipment end. An application SDK is set at the client side, and an edge device gateway is set at the device side, so that the three parts of networks are connected and communicated;
s2, an Ethernet house main chain is built on the block chain network, and the identities of the client and the equipment terminal are confirmed in the block chain network by applying the SDK and the edge equipment gateway, so as to carry out identity verification;
s3, building a plurality of side chains according to the network requirement, packaging the data of each side chain and sending the data to the Operator of the corresponding side chain, and submitting block data to the main chain of the Ethern by the miner through a Plasma contract;
s4, compiling an intelligent contract which can be deployed on a side chain according to the access control model, sequentially deploying a pre-contract and a supervision contract in a side chain head block, and then sequentially deploying the access control contract;
s5: and uploading related resources and access rules on the client, and establishing an interconnected strategy architecture to obtain a complete access control model strategy.
2. A master-sideline collaboration-based block chain access control model policy as claimed in claim 1, wherein said step S4: the access control model comprises six components of a resource visitor (subject), a subject information point, a subject and object information processing point, an access control strategy, an object information point and a resource owner (object). The two information points separate resources, users and visitors, and the information processing point internally connects the three; therefore, when a resource access request and resource uploading occur each time, the external part can only contact two information points, and cannot directly contact the internal resource, so that the data leakage is fundamentally cut off.
3. When the master-side chain cooperation-based block chain access control model policy implements an access control policy through an intelligent contract according to claim 1, the step S4 is: the head of the side chain deploys a preamble, which maintains an information table for recording relevant information of supervision contracts and access control contracts. And then, a supervision contract is deployed on the next block, and the time tolerance function is included in the contract and used for monitoring the access frequency of the visitor and performing batch access allowance on the access in the specified range. Meanwhile, the supervision contract maintains a violation access table for recording violation visitors and performing certain punishment. And when an access request occurs, the access control contract responds to the access request according to the formulated access strategy and the detection result of the supervision contract. And when a new access control contract is added, only the new access control contract is needed to be continuously added on the chain.
CN202110695733.1A 2021-06-22 2021-06-22 Block chain access control model method based on main side chain cooperation Active CN113489692B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110695733.1A CN113489692B (en) 2021-06-22 2021-06-22 Block chain access control model method based on main side chain cooperation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110695733.1A CN113489692B (en) 2021-06-22 2021-06-22 Block chain access control model method based on main side chain cooperation

Publications (2)

Publication Number Publication Date
CN113489692A true CN113489692A (en) 2021-10-08
CN113489692B CN113489692B (en) 2023-04-07

Family

ID=77935570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110695733.1A Active CN113489692B (en) 2021-06-22 2021-06-22 Block chain access control model method based on main side chain cooperation

Country Status (1)

Country Link
CN (1) CN113489692B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109165190A (en) * 2018-07-11 2019-01-08 南京邮电大学 A kind of electronic data based on block chain intelligence contract deposits card method
US20190123892A1 (en) * 2017-10-24 2019-04-25 0Chain, LLC Systems and methods of self-forking blockchain protocol
CN110213304A (en) * 2018-02-28 2019-09-06 成都高新信息技术研究院 A kind of block chain network interconnected method and system
CN110233802A (en) * 2019-05-14 2019-09-13 天津大学 A method of the block chain framework of the building more side chains of one main chain
CN110809006A (en) * 2019-11-14 2020-02-18 内蒙古大学 Block chain-based Internet of things access control architecture and method
US20200344233A1 (en) * 2019-04-29 2020-10-29 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing a role based access control and authorization validator via blockchain smart contract execution using distributed ledger technology (dlt)
US20200349054A1 (en) * 2019-05-05 2020-11-05 Huazhong University Of Science And Technology Sidechain testing system for improving security and stability of smart contract
CN111951108A (en) * 2020-08-10 2020-11-17 神话科技传媒(深圳)有限公司上海分公司 Chain structure design method with intelligent contract block chain with complete picture

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190123892A1 (en) * 2017-10-24 2019-04-25 0Chain, LLC Systems and methods of self-forking blockchain protocol
CN110213304A (en) * 2018-02-28 2019-09-06 成都高新信息技术研究院 A kind of block chain network interconnected method and system
CN109165190A (en) * 2018-07-11 2019-01-08 南京邮电大学 A kind of electronic data based on block chain intelligence contract deposits card method
US20200344233A1 (en) * 2019-04-29 2020-10-29 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing a role based access control and authorization validator via blockchain smart contract execution using distributed ledger technology (dlt)
US20200349054A1 (en) * 2019-05-05 2020-11-05 Huazhong University Of Science And Technology Sidechain testing system for improving security and stability of smart contract
CN110233802A (en) * 2019-05-14 2019-09-13 天津大学 A method of the block chain framework of the building more side chains of one main chain
CN110809006A (en) * 2019-11-14 2020-02-18 内蒙古大学 Block chain-based Internet of things access control architecture and method
CN111951108A (en) * 2020-08-10 2020-11-17 神话科技传媒(深圳)有限公司上海分公司 Chain structure design method with intelligent contract block chain with complete picture

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
史锦山等: "物联网下的区块链访问控制综述", 《软件学报》 *
薛腾飞: "《区块链应用若干问题研究》", 《中国博士学位论文库》 *

Also Published As

Publication number Publication date
CN113489692B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN113114498B (en) Architecture system of trusted block chain service platform and construction method thereof
CN102231693A (en) Method and apparatus for managing access authority
Huang et al. A new ordering method of basic events in fault tree analysis
Hong et al. Edge computing technology: Development and countermeasures
CN112583887B (en) Data credible sharing method based on block chain
CN109088741B (en) Formalized modeling and verification method for block chain system
CN111782723A (en) Double-layer product information tracing system architecture based on permission chain
Li et al. Multi-chain and data-chains partitioning algorithm in intelligent manufacturing CPS
Qiang et al. Mine consortium blockchain: the application research of coal mine safety production based on blockchain
CN114915640A (en) Data security interaction method, system, device, equipment and readable storage medium
CN113886890A (en) Digital resource co-construction sharing method and device
CN113489692B (en) Block chain access control model method based on main side chain cooperation
Cao et al. DT-SFC-6G: Digital Twins Assisted Service Function Chains in Softwarized 6G Networks for Emerging V2 X
Yindong et al. Advances and future challenges in electric power big data
Zhang et al. Research on Lightweight Blockchain Technology Based on Edge Computing
CN114168268A (en) Container technology-based intelligent distribution data acquisition and fusion method and system
CN111682934B (en) Method and system for storing, accessing and sharing comprehensive energy metering data
Gao et al. A novel cp-abe based sidechain protocol for distributed power system data storage management with the blockchain
CN113364592A (en) Engineering system file management system and method based on credit value union chain
Wang et al. Security research of power system based on Blockchain and 5G Technology
Jiang et al. The messaging model design based blockchain and edge computing for the internet of things
Chen et al. Multi-dimensional resource management system based on blockchain and cybertwin
Yu et al. A Safe Architecture of 5G Network Intelligence Based on Federated Learning and NWDAF
Gong et al. Qualitative analysis of commercial services in MEC as phased-mission systems
Guo Application of blockchain based on deep learning algorithm in enterprise Internet of Things system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant