CN114500531A - Equipment quality information management and control framework based on alliance block chain - Google Patents

Equipment quality information management and control framework based on alliance block chain Download PDF

Info

Publication number
CN114500531A
CN114500531A CN202210001903.6A CN202210001903A CN114500531A CN 114500531 A CN114500531 A CN 114500531A CN 202210001903 A CN202210001903 A CN 202210001903A CN 114500531 A CN114500531 A CN 114500531A
Authority
CN
China
Prior art keywords
layer
data
network
cloud
consensus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210001903.6A
Other languages
Chinese (zh)
Other versions
CN114500531B (en
Inventor
吴启武
甘波
姜灵芝
单南良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Engineering University of Chinese Peoples Armed Police Force
Original Assignee
Engineering University of Chinese Peoples Armed Police Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Engineering University of Chinese Peoples Armed Police Force filed Critical Engineering University of Chinese Peoples Armed Police Force
Priority to CN202210001903.6A priority Critical patent/CN114500531B/en
Publication of CN114500531A publication Critical patent/CN114500531A/en
Application granted granted Critical
Publication of CN114500531B publication Critical patent/CN114500531B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The invention discloses an equipment quality information management and control framework based on an alliance block chain, which consists of a sensing layer, a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein the framework node deployment is mainly carried out by depending on the original 'cloud-edge-end' framework of an MCS. By adopting multi-chain and multi-consensus and combining three network states, a credible solution based on the block chain is provided for user terminal access control, quality data sharing, quality information storage, artificial intelligence model parameter storage and the like, and the requirements of severe communication environment on perception, cooperation, decision, time delay, storage and the like can be met.

Description

Equipment quality information management and control framework based on alliance block chain
Technical Field
The invention belongs to the technical field of networks, and particularly relates to an equipment quality information management and control framework based on an alliance block chain.
Background
As more and more informationized equipment such as sensors are interconnected through internet of things technology in the future, a large amount of generated data needs to be processed through cloud computing, so that intelligence is provided for the equipment. In traditional cloud computing, all data must be uploaded to a centralized server and after computing, the results need to be sent back to the sensors and devices. Edge computing migrates data computation or storage to the network "edge" near the battlefield. Compared with the traditional cloud service, the distributed structure can balance network traffic, avoid traffic peaks in the internet of things network, reduce transmission delay between the edge/cloud server and the end user, and reduce response time of real-time internet of things application. In addition, the life of the battery-powered limited equipment may be extended. In equipment quality information management, it is necessary to improve the response speed and the information processing capability, and to improve the information processing and controlling capability of the edge terminal.
The edge network is a highly dynamic heterogeneous environment consisting of static nodes and mobile nodes, and has the characteristics of being far away from a cloud center, limited in computing capacity and communication resources, dynamically changing in environment and the like. As shown in fig. 1, a Mobile Cloud Service (MCS) model facing an Edge of an internet of things is divided into a Mobile ad hoc Cloud, a local micro Cloud, and a remote Cloud from bottom to top, where a tactical Mobile network is located between the Mobile ad hoc Cloud and the local micro Cloud, and a Mobile core network is located between the local micro Cloud and the remote Cloud. The basic process is as follows:
firstly, when the network condition is good, the edge node unloads a computing task to a remote cloud server through a wireless base station to realize mobile cloud computing;
when the mobile cloud computing environment is in a DIL (discrete, interrupt, limited) environment, utilizing a local micro cloud node which is close to the battlefield edge to perform local cloud computing or perform preprocessing, caching, scheduling and the like of mobile cloud computing;
and thirdly, when the connection with the local micro cloud is limited or the load of the local micro cloud is too heavy, the edge node performs real-time local computation in a self-organizing cloud mode.
The current MCS model is designed by combining an edge architecture, a command control architecture and a functional architecture, mainly aims at improving the edge information exchange and processing capability of the harsh communication environment of the Internet of things, and does not relate to mechanisms such as information security, evidence storage and source tracing, information sharing and the like.
Disclosure of Invention
In view of the above drawbacks or shortcomings of the MCS model, an object of the present invention is to provide an equipment quality information management and control framework based on a federation blockchain.
In order to realize the task, the invention adopts the following technical solution:
the utility model provides an equip quality information management and control frame based on alliance block chain which characterized in that comprises perception layer, data layer, network layer, consensus layer, contract layer and application layer, and frame node deployment mainly relies on the original "cloud-limit-end" framework of MCS to carry out, wherein:
the perception layer is mainly used for acquiring original data of the surrounding environment and is used as a source for subsequent related model operation training, data uplink storage and transmission; the intelligent wearable device comprises an intelligent wearable device, an unmanned aerial vehicle, a pose monitoring foot pad, a mobile workbench, a heart rhythm testing device and an intelligent command terminal;
the data layer is a non-falsifiable and distributed database, and is used for bearing the function of data storage in the framework and ensuring the non-falsification and traceability of data information in the distributed database by using cryptographic algorithms such as asymmetric encryption, hash function and the like; the method comprises the following steps of block, hash function, asymmetric encryption, Merkle tree, digital signature and digital certificate;
the network layer is mainly oriented to a network architecture of tactical edge cloud, and comprises remote cloud, local micro cloud, mobile self-organization cloud and node deployment, and the essence of the network layer is P2P network;
the consensus layer, namely a consensus algorithm, aims to ensure that all nodes in the network achieve distributed consistency so as to ensure the order and reliability of the accounting of the whole network; selecting two consensus algorithms of PBFT and Raft, and applying the consensus algorithms according to the situation under different services and network conditions;
the contract layer mainly comprises various scripts and codes, intelligent contracts and algorithms and can realize service logic programming; by setting the constraint conditions, the business processing can be realized under the condition of not needing a third party to endorse;
the application layer comprises four-aspect scene services, namely access control, namely separation of access rights of various users to system resources; data sharing, namely, the terminal carries out data sharing under a local micro cloud or a mobile self-organization cloud; thirdly, storing information, namely storing quality information of the terminal equipment; fourthly, model parameter storage, namely, storing the parameters of the training process of the AI algorithm model; and different scene services are isolated by constructing a plurality of chains.
The equipment quality information control framework based on the alliance block chain adopts multi-chain and multi-consensus and combines three network states, provides a credible solution based on the block chain for user terminal access control, quality data sharing, quality information storage, artificial intelligence model parameter storage and the like, and can meet the requirements of severe communication environments on perception, cooperation, decision, time delay, storage and the like.
Drawings
FIG. 1 is a schematic diagram of an IoT Edge organized Mobile Cloud Service (MCS) model facing an Edge of an Internet of things;
fig. 2 is a schematic structural diagram of an equipment quality information management and control framework based on a federation block chain according to the present invention;
FIG. 3 is a schematic diagram of a node deployment relationship;
FIG. 4 is an access control flow diagram;
FIG. 5 is a quality data sharing flow diagram;
FIG. 6 is a flow chart of information credentialing;
FIG. 7 is a flow chart of model parameter verification.
The invention is further described in detail below with reference to the figures and examples.
Detailed Description
The embodiment provides an equipment quality information management and control framework based on an alliance block chain, combines an MCS framework, relies on an alliance block chain technology, constructs the alliance chain framework, and fully makes up for the security deficiency of the MCS.
The detailed implementation is as follows.
1. Frame structure
The alliance block chain-based equipment quality information management and control framework structure provided by the embodiment is divided into a six-layer structure: a sensing layer, a data layer, a network layer, a consensus layer, a contract layer, and an application layer. Wherein:
firstly, the perception layer is mainly responsible for the original data acquisition of the surrounding environment and is used as a source for subsequent related model operation training, data uplink storage and transmission. Mainly contain intelligence wearing equipment, unmanned aerial vehicle, position appearance monitoring callus on the sole, mobile workbench, rhythm of the heart test equipment and intelligent command terminal. It is noted that the perception layer is not the source of all input data to the system, such as access control processes.
The core of the data layer is a database which is not falsifiable and has the characteristics of distribution and the like, the data layer bears the function of data storage in the framework, and the cryptographic algorithms such as asymmetric encryption, hash function and the like are utilized to ensure the non-falsification and traceability of data information in the distributed database; including blocks, hash functions, asymmetric encryption, Merkle trees, digital signatures, and digital certificates.
The network layer is mainly oriented to a network architecture of tactical edge cloud, and comprises remote cloud, local micro cloud, mobile self-organization cloud and node deployment, and the essence of the network layer is a P2P network;
and fourthly, a consensus layer, namely a consensus algorithm, aiming at enabling all nodes in the network to achieve distributed consistency so as to ensure the order and reliability of the accounting of the whole network. Two consensus algorithms of PBFT and Raft are selected and applied according to the situation under different services and network conditions.
The contract layer mainly comprises various scripts, intelligent contracts and algorithms, and can realize the programming realization of business logic. By setting the constraint conditions, the business processing can be realized without the endorsement of a third party.
The application layer comprises four scene services: firstly, access control, namely separating access authorities of various users to system resources; data sharing, namely, the terminal carries out data sharing under a local micro cloud or a mobile self-organization cloud; thirdly, storing information, namely storing quality information of the terminal equipment; and fourthly, storing the model parameters, namely storing the parameters of the training process of the AI algorithm model. And different scene services are isolated by constructing a plurality of chains.
The frame node deployment is mainly carried out by relying on the original 'cloud-edge-end' framework of the MCS. The detailed description is mainly made from the following four aspects:
the first is that, in terms of hardware deployment level, the architecture is divided into three layers: a remote cloud server, a local micro cloud server, and an internet of things terminal (edge terminal), as shown in fig. 3 (a). The local micro cloud server and the terminal equipment are both located at the edge, and the remote cloud server is located at a position far away from the network edge.
Secondly, in terms of a public key infrastructure layer, due to the admission characteristics of the federation chain nodes and the reality of user data confidentiality, a public key infrastructure needs to be deployed in a framework, and the public key infrastructure comprises a Certificate Authority (CA), a Key Management Center (KMC), a Certificate Revocation List (CRL) and the like, and the deployment of the public key infrastructure should be at a remote cloud server with the highest security, so that the public key infrastructure is centralized to some extent, but is beneficial to the management of the federation chain and the security of a system.
Thirdly, in terms of the common recognition node level, no matter the PBFT or the Raft algorithm is applied, each node such as the remote cloud server, the local micro cloud server, the internet of things terminal and the like is equivalent, and each node is displayed as a virtual equivalent node in the tactical mobile cloud and is responsible for achieving the distributed consistency, as shown in fig. 3 (b). When the terminal equipment is disconnected with the local micro cloud server and is in the mobile self-organization cloud, the mobile cloud marked in the drawing is correspondingly changed into the mobile self-organization cloud, and at the moment, in order to reduce communication occupation, new blocks of part service chains such as an information evidence storing chain and the like are generated and are in a suspended state; the rest service chains are operated in the mobile self-organizing network, and the generation and the uplink of the new block are not influenced.
And fourthly, regarding the node type level, the method is divided into a full node and a light node. The lightweight terminal equipment belongs to a lightweight node, a block header is downloaded whenever a block appears in the network, and a distributed hash table is used for tracking a prefix node. This can greatly relieve its storage and communication pressure. The whole nodes are arranged on high-performance Internet of things equipment, remote clouds, local micro cloud servers and the like, and all block chain data are synchronized. In order to deal with the storage problem, the non-server nodes in the whole nodes discard original data after carrying out full data verification and synchronization in some service chains, and only store block headers, such as an information storage chain.
2. Consensus algorithm
In P2P networks, the consensus algorithm is used to achieve consensus among all nodes in the system. It is oriented to the process of consensus among distributed nodes, with the end result being a steady state consensus.
The PBFT algorithm can provide (n-1)/3 fault tolerance on the premise of ensuring activity and safety. The Raft algorithm is an easy-to-understand implementation of the Paxos algorithm. The PBFT algorithm is mainly proposed to solve the problem of the Byzantine general, namely the condition that a node is possibly malignant, so that the capacity of tolerating the Byzantine node is obtained at the cost of improving the communication complexity through a three-stage protocol; the Raft algorithm is a traditional distributed consistency algorithm, which can only deal with the condition of node failure, but has no tolerance capability for doing malicious nodes. The characteristic comparison is shown in table 1.
The different services are separated into different service chains, and the common identification is selected differently. For access control chain and evidence storing chain, the safety requirement is higher, the service data volume is small, the communication frequency is lower, and the method is suitable for PBFT algorithm; for the quality data sharing chain, one is that the data volume is large, the number of nodes is large, and the method is suitable for an algorithm with low communication complexity; the second is that the data is general data, and the safety requirement is lower than that of professional data; and thirdly, the data is required to be instantly shared, and the requirements on delay and TPS are high, so that the method is suitable for the Raft algorithm.
Table 1: common consensus characteristics of PBFT and Raft
Figure BDA0003454959070000061
On one hand, the alliance chain facing the Internet of things is network closed, a sensor network of the Internet of things is isolated from a public network, and an attacker cannot access a main node server on the public network, so that a public network computer cannot be used for initiating remote attack to the main node server; on the other hand, the remote cloud server and the local micro cloud server are provided with an encryption link, data are stored in a multi-node backup mode, and the data cannot be tampered. For a currently common Attack mode for a block chain, the equipment quality information management and control framework based on the alliance block chain provided in this embodiment can resist, for example, in Sybil Attack (Sybil attach), a few nodes are disguised as a large number of nodes to Attack by forging or stealing identities. The PKI system is established in the safe environment, the entering of the nodes is supervised and authenticated, and Sybil attack can be effectively prevented. Other security precautions are shown in table 2.
Table 2: safety precautions
Figure BDA0003454959070000071
3. Business process
The quality information management and control framework based on the alliance block chain adopts multiple chains to divide different services, so that on one hand, complex services can be met, and on the other hand, the expansibility of the framework can be increased.
The four types of business processes mentioned are explained below.
(1) Access control flow
Information such as equipment quality data needs to be distinguished according to identities, grades and the like of a commander and other personnel. The basic access control principles are: the access right of the commander is higher than that of other personnel, the access right of the upper level is higher than that of the lower level personnel, and the access rights of different groups for information such as the field environment, the situation and the like are separated.
As shown in fig. 4, the access control policy is stored in the federation chain in the form of an intelligent contract, and when a commander or other personnel needs to access a certain resource, the director or other personnel needs to perform identity authentication first and run the access control contract at the same time to determine whether the node obtains the right of the corresponding resource; and then the terminal broadcasts the access information in the consensus node group, and generates and updates the next block and adds the block into the access control chain.
The access control contract is stored in the edge terminal equipment in a distributed mode, and tampering of the access control contract by a malicious node can be prevented. If the node is attacked, the access control contract is tried to be tampered, the access right of the higher-level resource is obtained, and therefore a large amount of confidential information stored in the cloud is obtained, and when the tampered contract is issued, the contract cannot be accepted by the common identification node group, and therefore the node fails.
(2) Quality data sharing
The data shared by the quality data mainly comprises two types: the first is general quality data, and the original data of the general quality data is stored in a quality data sharing chain. Due to the decentralized, multi-party maintenance nature of blockchains, its data is naturally shared by all terminals at the network edge during the uplink process. The second is special quality data, which is mainly quality data generated by multi-unit and multi-party combined action. A quality data sharing chain is constructed, and the problems in three aspects are mainly solved:
the data quality is improved. In practical application, data sources are diverse, and particularly in joint action, all parties need to share equipment quality data, so that the accuracy and the reliability of the data are difficult to ensure;
② tracking data usage. The use condition and the process of the data are difficult to control;
and thirdly, quantizing the data contribution. In the multi-party joint action, the data contribution of each party is difficult to quantify, and the data sharing is difficult to stimulate.
As shown in fig. 5, after each terminal device collects or generates corresponding information, the information is broadcasted in the network, and after receiving the information, the rest terminals verify the information, and then display the information through the display layer application, and meanwhile, the accounting node performs block generation and uplink. In the uplink process, only the digital abstract of the original data and the data use log are uplink processed. By recording and credibly storing the field data, the shared data can be prevented from being tampered, the data can be tracked by calling, the data contribution can be quantified, and the method has positive effects on tracing the quality data of the action, copying, evaluating and exciting and the like.
(3) Information evidence storing process
The information evidence storage mainly relates to the quality information storage of all equipment for executing tasks. At the network edge, the communication of the nodes becomes a main bottleneck, so the block interval T of the information evidence link is set to be longer, and a new block is generated only when the nodes are connected to the local micro cloud server, so that the communication requirement caused by the information evidence among the nodes is reduced.
As shown in fig. 6, the equipment quality information record is collected by the terminal at a fixed period T, recorded according to the communication situation and coordinates within a time period, and stored locally. T-T before arrival block generation0+tnAfter the moment, broadcasting is carried out in the network, each terminal node verifies the record and only stores the record hash locally; and the local micro cloud server stores the original data so as to reduce the storage pressure of the terminal node. If at T-T0And (4) at the moment, the terminal is disconnected with the local micro cloud server, and then the next period is continued. Wherein, T0To estimate the uplink duration parameter, t, of a blocknFor broadcasting the delay parameter, n is the end node number (n is 0, 1, 2, …), so as to avoid network congestion.
And under the condition of accessing the mobile core network, the local micro cloud server backs up the evidence storage information in the remote cloud. Each terminal node only stores the information of the certificate of the node and the head of the block, and deletes the record before the aT period to release the storage (a is more than or equal to 6). And if the data of the local micro cloud server is damaged or lost under the condition of no backup, the server requests the terminal node for the data again, and the information recovery information storage certificate chain complete data is combined with the last backup data after the remote cloud is connected.
(4) Model parameter storage certificate
In the motion, the equipment quality dynamic analysis model, the field equipment situation analysis model and other models run on the terminal equipment, so that the real-time and reliable equipment information is provided for the motion, and the command and the motion are assisted. Therefore, the security and accuracy of the model is critical to the action. In the process of the combined modeling of the initial model, once a certain terminal breaks down or is invaded, the overall model is polluted by inaccurate or misleading input data, and the accuracy of the subsequent model is influenced. Gradient parameters, historical data and the like in each round of training are stored and verified through a block chain, so that the problems of tampering, loss and the like caused by centralized storage of a local cloud server can be avoided, and the parameters of the algorithm model are guaranteed to be not tampered and traceable. And the polluted data source can be traced under the condition that the global model is polluted, and a healthy and accurate combat algorithm model can be recovered.
As shown in fig. 7, in the algorithm model construction of the network edge, an initial model is issued to the terminals by the remote cloud server or the local micro cloud server, and then the initial model is locally trained by each terminal in combination with data obtained in training or tasks, so as to reduce the data transmission amount in the severe communication environment of the network edge. And when the server and each terminal iterate the algorithm model in each round, performing uplink storage of the model parameters. The uplink data includes digital fingerprint of input data, model version number, terminal code, training result gradient data, etc. Because the original data can not be recovered from the digital fingerprint and the gradient data, the safety of the quality data of the overall equipment can still be ensured under the condition that the terminal is lost, invaded or the communication is monitored. In addition, the contribution quantization standard of the equipment quality model construction process can be established through parameter storage, effective data collection by each squad through a mobile terminal is promoted, construction of the overall model is accelerated, and the quality of model training is improved.
In summary, the alliance block chain-based equipment quality information management and control framework provided by this embodiment adopts multi-chain and multi-consensus, combines three network states, provides a block chain-based trusted solution for user terminal access control, quality data sharing, quality information evidence storage, artificial intelligence model parameter evidence storage, and the like, and can meet the requirements of a severe communication environment on perception, cooperation, decision, delay, storage, and the like.

Claims (1)

1. The utility model provides an equip quality information management and control frame based on alliance block chain which characterized in that comprises perception layer, data layer, network layer, consensus layer, contract layer and application layer, and frame node deployment mainly relies on the original "cloud-limit-end" framework of MCS to carry out, wherein:
the perception layer is mainly used for acquiring original data of the surrounding environment and is used as a source for subsequent related model operation training, data uplink storage and transmission; the intelligent wearable device comprises an intelligent wearable device, an unmanned aerial vehicle, a pose monitoring foot pad, a mobile workbench, a heart rhythm testing device and an intelligent command terminal;
the data layer is a non-falsifiable and distributed database, and is used for bearing the function of data storage in the framework and ensuring the non-falsification and traceability of data information in the distributed database by using cryptographic algorithms such as asymmetric encryption, hash function and the like; the method comprises the following steps of blocks, hash functions, asymmetric encryption, a Merkle tree, digital signatures and digital certificates;
the network layer is mainly oriented to a network architecture of tactical edge cloud, and comprises remote cloud, local micro cloud, mobile self-organization cloud and node deployment, and the essence of the network layer is P2P network;
the consensus layer, namely a consensus algorithm, aims to ensure that all nodes in the network achieve distributed consistency so as to ensure the order and reliability of the accounting of the whole network; selecting two consensus algorithms of PBFT and Raft, and applying the consensus algorithms according to the situation under different services and network conditions;
the contract layer mainly comprises various scripts and codes, intelligent contracts and algorithms and can realize service logic programming; by setting the constraint conditions, the business processing can be realized under the condition of not needing a third party to endorse;
the application layer comprises four-aspect scene services, namely access control, namely separation of access rights of various users to system resources; secondly, battlefield data sharing is carried out, namely, the terminal carries out data sharing under a local micro cloud or a mobile self-organization cloud; thirdly, storing information, namely storing quality information of the terminal equipment; fourthly, model parameter storage, namely, storing the parameters of the training process of the AI algorithm model; and different scene services are isolated by constructing a plurality of chains.
CN202210001903.6A 2022-01-04 2022-01-04 Equipment quality information management and control frame based on alliance block chain Active CN114500531B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210001903.6A CN114500531B (en) 2022-01-04 2022-01-04 Equipment quality information management and control frame based on alliance block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210001903.6A CN114500531B (en) 2022-01-04 2022-01-04 Equipment quality information management and control frame based on alliance block chain

Publications (2)

Publication Number Publication Date
CN114500531A true CN114500531A (en) 2022-05-13
CN114500531B CN114500531B (en) 2023-10-13

Family

ID=81510483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210001903.6A Active CN114500531B (en) 2022-01-04 2022-01-04 Equipment quality information management and control frame based on alliance block chain

Country Status (1)

Country Link
CN (1) CN114500531B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685486A (en) * 2018-11-28 2019-04-26 杭州云象网络技术有限公司 A kind of polymeric chain framework based on block chain technology
CN110071969A (en) * 2019-04-17 2019-07-30 杭州云象网络技术有限公司 A kind of data safety sharing method based on multichain framework
CN112003886A (en) * 2020-07-03 2020-11-27 北京工业大学 Block chain-based Internet of things data sharing system and method
CN112235368A (en) * 2020-09-29 2021-01-15 中国人民武装警察部队工程大学 RFID equipment management system based on alliance block chain
CN112529508A (en) * 2020-12-23 2021-03-19 杭州电子科技大学 Electric power material management system based on PBFT alliance chain
JP2021512525A (en) * 2018-03-21 2021-05-13 南京郵電大学Nanjing University Of Posts And Telecommunications Fog computing architecture in the Internet of Things environment
CN113656495A (en) * 2021-07-28 2021-11-16 复旦大学 Credible edge Internet of things system with deployment of end edge cloud cooperation of block chain
CN113783696A (en) * 2021-08-14 2021-12-10 西安电子科技大学 Internet of things perception data sharing transaction platform, control method, equipment and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021512525A (en) * 2018-03-21 2021-05-13 南京郵電大学Nanjing University Of Posts And Telecommunications Fog computing architecture in the Internet of Things environment
CN109685486A (en) * 2018-11-28 2019-04-26 杭州云象网络技术有限公司 A kind of polymeric chain framework based on block chain technology
CN110071969A (en) * 2019-04-17 2019-07-30 杭州云象网络技术有限公司 A kind of data safety sharing method based on multichain framework
CN112003886A (en) * 2020-07-03 2020-11-27 北京工业大学 Block chain-based Internet of things data sharing system and method
CN112235368A (en) * 2020-09-29 2021-01-15 中国人民武装警察部队工程大学 RFID equipment management system based on alliance block chain
CN112529508A (en) * 2020-12-23 2021-03-19 杭州电子科技大学 Electric power material management system based on PBFT alliance chain
CN113656495A (en) * 2021-07-28 2021-11-16 复旦大学 Credible edge Internet of things system with deployment of end edge cloud cooperation of block chain
CN113783696A (en) * 2021-08-14 2021-12-10 西安电子科技大学 Internet of things perception data sharing transaction platform, control method, equipment and terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIANGJUN ZHANG、等: "Falcon:A blockchain-based edge service migration framework in MFC", 《MOBILE INFORMATION SYSTEMS》 *
闫莅;: "移动云计算领域的网络安全解决方案探究", 信息技术, no. 01 *

Also Published As

Publication number Publication date
CN114500531B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
Yang et al. Distributed blockchain-based trusted multidomain collaboration for mobile edge computing in 5G and beyond
CN111478902B (en) Power edge gateway equipment and sensing data uplink storage method based on same
CN109922162B (en) Flat building equipment Internet of things monitoring system and method based on block chain
Ali et al. Secure data provenance in cloud-centric internet of things via blockchain smart contracts
CN109919771B (en) Industrial internet transaction device applying hierarchical block chain technology
CN111447234B (en) Block chain structure suitable for edge calculation
CN112712182A (en) Model training method and device based on federal learning and storage medium
Li et al. Security and privacy for edge intelligence in 5G and beyond networks: Challenges and solutions
Qiu et al. Blockchain-based distributed software-defined vehicular networks via deep Q-learning
CN114422201B (en) Network target range large-scale user remote access method and system
CN111930598B (en) Information processing method based on block chain and big data analysis and big data platform
CN112214544A (en) Ubiquitous power Internet of things edge data safe storage method based on permission block chain
Lin et al. Optimizing MEC networks for healthcare applications in 5G communications with the authenticity of users’ priorities
Karakaya et al. A novel IoT-based health and tactical analysis model with fog computing
CN116366673A (en) Data analysis and sharing method oriented to management of power grid information machine room
CN115460613A (en) Safe application and management method for power 5G slice
Erroutbi et al. Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes
Ni et al. A novel design method of high throughput blockchain for 6g networks: Performance analysis and optimization model
Ruggeri et al. An innovative blockchain-based orchestrator for osmotic computing
Shao et al. Data Trusted Sharing Delivery: A Blockchain-Assisted Software-Defined Content Delivery Network
CN112532753B (en) Data synchronization method, device, medium and electronic equipment of block chain system
CN114500531B (en) Equipment quality information management and control frame based on alliance block chain
Wang et al. Big data in 5G
Zhang Blockchain
Yassein et al. Features, Challenges and Issues of Fog Computing: A Comprehensive Review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant