CN105262755B - The Internet of things node secure storage method of data for preventing sensitive information from leaking - Google Patents

The Internet of things node secure storage method of data for preventing sensitive information from leaking Download PDF

Info

Publication number
CN105262755B
CN105262755B CN201510719659.7A CN201510719659A CN105262755B CN 105262755 B CN105262755 B CN 105262755B CN 201510719659 A CN201510719659 A CN 201510719659A CN 105262755 B CN105262755 B CN 105262755B
Authority
CN
China
Prior art keywords
data
node
unit
recovery
work
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510719659.7A
Other languages
Chinese (zh)
Other versions
CN105262755A (en
Inventor
张明武
陈泌文
沈华
谢海涛
赵玲
张语荻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201510719659.7A priority Critical patent/CN105262755B/en
Publication of CN105262755A publication Critical patent/CN105262755A/en
Application granted granted Critical
Publication of CN105262755B publication Critical patent/CN105262755B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of Internet of things node secure storage method of data for preventing sensitive information from leaking, it is characterized in that, restore two steps including data conversion and data, data conversion process successively includes processing construction of function unit, Date Conversion Unit, verifying key generation unit, file distributing unit;Data recovery procedure successively includes node confirmation unit, restores ciphertext production unit, data recovery unit, data verification units.The present invention has high security, integrality and resistance to leakage, and data conversion and data restore highly efficient, largely guarantee data in Internet of things node, the beneficial effect for effectivelying prevent nodal information leakage, losing or destroying.

Description

The Internet of things node secure storage method of data for preventing sensitive information from leaking
Technical field
It, will be quick in node in particular to using Internet of things node as memory carrier the present invention relates to data transmission security field Sense information is object, and cryptological technique is combined with data storage prevents one kind of node sensitive information leakage from preventing sensitive letter Cease the Internet of things node secure storage method of data of leakage.
Background technique
The third wave that world information industry develops after computer, internet is Internet of Things.It is responsible for data collection Internet of things node (such as sensor) be Internet of Things composition important foundation, and node data privacy and integrity security threaten Through one of the critical issue for becoming limitation Internet of Things development.The most degree of intelligence of current Internet of things node is lower, does not have self Defencive function is highly prone to attacker's malicious sabotage, if physical damage, node are stolen, leads to loss of data and leakage.Separately Outside, data transmission is most between Internet of things node and control terminal uses wireless channel, and transmission data are easy to be stolen, modify, break It is bad.Therefore, a kind of net networked node data safety storage scheme for protecting sensitive information leakage is significantly.
Cipher mechanism is the important means for protecting Internet of things node data storage and transmission, and secure storage scheme is answered extensively With then since the degree of intelligence of Internet of things node differs greatly, many node computing capabilitys are not strong, therefore secure storage scheme Computing cost is also contemplated that while considering safety.In addition, physical damage causes number since Internet of things node is exposed outside The problems such as being leaked according to loss, storing data, therefore, secure storage scheme ensures data integrity and resistance to leakage.
Secure storage scheme used in current Internet of things node commonly uses two kinds of technologies: data encryption, data are restored.Data Encryption can effectively solve data leakage problem present in node storage and transmission process, and data are restored then to be responsible for recovery Data are destroyed, are guaranteed data integrity.However, there are more problems for Current protocols:
1, Encryption Algorithm complexity is high, is not suitable for the low node of degree of intelligence, there is scope limitation;
2, data recovering efficiency is low, majority can not decrypt the encryption data being destroyed and node by physical damage or It loses, data recovery can not then carry out;
3, data can not be examined, node collect data be it is unknown, can not check number after encryption data is decrypted According to correctness.For the deficiency for making up existing scheme, the present invention uses data conversion and data recovery technique, and node data is turned Multiple encryption subdatas are changed into be respectively stored in different Internet of things node.When needing using data, by Partial encryption The extensive restored data of data realizes the secure storage of node data to data verification is restored.Computation complexity is being reduced, is being improved While restoring data efficiency, the single point failure problem that node can be effectively prevent to be caused by physical damage and loss.
Summary of the invention
Present invention aim to solve deficiency existing for above-mentioned background technique, a kind of high security, integrality are proposed And resistance to leakage, data conversion and data restore highly efficient, largely guarantee data in Internet of things node, effectively The Internet of things node secure storage method of data for preventing sensitive information from leaking for preventing nodal information leakage, losing or destroying.
In order to achieve the goal above, a kind of Internet of things node data safety for preventing sensitive information from leaking provided by the invention Storage method, which is characterized in that restore two steps including data conversion and data, specifically:
Data conversion process successively includes processing construction of function unit, Date Conversion Unit, verifying key generation unit, data Dispatching Unit, in which:
Handle the course of work of construction of function unit are as follows: at the information and neighbouring node number generation collected according to node Function is managed, function is responsible for follow-up data conversion, and Internet of things node number is n, node identifier xi, node xiThe data of collection For Si(i=1,2, n) and, the number of change data needed for extensive restored data is k, node xiGenerate k-1 rank multinomial f (x), the nonzero integer that wherein multinomial coefficient is randomly choosed and is not mutually equal, polynomial repressentation are as follows: fi(x)=ai0+ai1x +···+ai(k-1)xk-1, wherein ai≠aj, wherein i ≠ j;
The course of work of Date Conversion Unit are as follows: according to the processing function that processing construction of function unit generates, generate each The subdata of server, while data being used and handle function representation, according to known to processing construction of function unit, Internet of things node mark Know xiAnd processing function fi(x), the change data { f of node is generatedi(x1),···,fi(xn), and the section with opposite mark Corresponding, the simultaneous selection w of pointi,di, make its Si=dif(wi) set up, wherein i=1,2, n;
Verify the course of work of key generation unit are as follows: node xiIt generates to examine for all nodes and restores testing for the data true and false Key is demonstrate,proved, realization detects the data of recovery, and whether confirmation data are restored correctly, to use random selection t-1 rank multinomialG (x is calculated as the generation function for generating verifying keyi) as verifying share, select viAnd ui, generate verifying key (Yi,Xi) it is made to meet Yi=S+Xi·g(ui)·vi
The course of work of file distributing unit are as follows: send subdata, verifying key and the verifying share after conversion to other Adjacent Internet of things node, Internet of things node receive and mark the data from which node, realize data safety storage, node xi By subdata { fi(x1),···,fi(xn)}、(Yi,Xi) and g (xi) corresponding identifier is transferred to as { x1,···,xn} Internet of things node.And public information is broadcasted, including { wi,di}、{vi,ui, wherein i=1,2, n;
Data recovery procedure successively includes node confirmation unit, restore ciphertext production unit, data recovery unit, data are tested Unit is demonstrate,proved, that need to restore is node xiData, node xiIt has been be destroyed that, carry out recovery nodes x using other nodesi's Data,
The course of work of node confirmation unit are as follows: selection restore the Internet of things node of data, and determination can carry out data The node of recovery announces recovery nodes identifier and information transmission mode, and a node confirmation of h (h > k) will be to node xiNumber According to being restored, identifier { x is announcedi1,···,xih, whereinAnnouncement information transmission mode is xi1 →xi2→···→xih→xi1, indicate that node will carry out information transmitting according to above-mentioned ring mode;
Restore the course of work of ciphertext production unit are as follows: the data that each node is stored according to itself are calculated for restoring data Ciphertext, prevent the data for directly transmitting storage from being eavesdropped by opponent, guarantee the secret of data, according to node confirmation unit determine List { xi1,···,xih, each node is calculated according to the information of the information of announcement and itself storage restores ciphertext.Node xij(j=1, h) data ciphertext:With
The course of work of data recovery unit are as follows: according to ring communication mode, carry out data transmission, carry out recovery nodes conduct The starting point of ring takes the lead in sending data, and after traversing entire ring, recovery nodes decrypt information acquisition and restore data, by node confirmation form The starting point of ring in member is set as xi1, the node is for recovery nodes xiData, starting point node xi1Select random number r1, by message (r1+Ci1 1,r1+Ci1 2) send next node x in ringi2, node xi2In conjunction with data ciphertext and message, by (r1+Ci1 1+Ci2 1, r1+Ci1 2+Ci2 2) it is sent to node xi3, and so on, node xihIt will be message (r1+Ci1 1+···+Cih 1,r1+Ci1 2 +···+Cih 2) it is sent to starting point node xi1, node xi1Utilize random number r1, according to mathematical knowledge it is found that being saved after decryption Point xiData S=Ci1 1+···+Cih 1, g (u1)=Ci1 2+···+Cih 2, data recovery completion;
As a preferred embodiment of the present invention, data recovery procedure further includes data verification units, data verification units The course of work are as follows: recovery nodes using verifying key the data of recovery are detected, it is ensured that the data of recovery are correct, node xi1 Verifying key as starting point master is (Y1,X1), verify equation Y1=S+X1·g(u1)·v1If set up, restore correct, no Establishment then reselects node and is restored.
Detailed description of the invention
Fig. 1 is the present invention program frame diagram;
Fig. 2 is data conversion flow chart in the present invention;
Fig. 3 is Data Recovery Process figure in the present invention.
Fig. 4 is 3 node cycle communication mode flow chart in the present invention
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the invention will be further described.
A kind of embodiment: Internet of things node secure storage method of data for preventing sensitive information from leaking, which is characterized in that packet It includes data conversion and data restores two steps, specifically:
Data conversion process successively includes: processing construction of function unit 1.1, Date Conversion Unit 1.2, verifying key generation list First 1.3, file distributing unit 1.4.
Wherein:
Handle construction of function unit 1.1.The information and neighbouring node number collected according to node generate processing function, letter The responsible follow-up data conversion of number.In the present embodiment, it is assumed that Internet of things node number is n, node identifier xi, node xiIt collects Data Si(i=1,2, n) and, the number of change data needed for extensive restored data is k.According to above-mentioned parameter, node xi It generates k-1 rank multinomial f (x), the nonzero integer that wherein multinomial coefficient is randomly choosed and is not mutually equal is represented by fi(x) =ai0+ai1x+···+ai(k-1)xk-1, wherein ai≠aj, wherein i ≠ j.
Date Conversion Unit 1.2.According to the processing function that processing construction of function unit 1.1 generates, each server is generated Subdata, while by data with processing function representation.In the present embodiment, according to known to processing construction of function unit 1.1, Internet of Things Net node identification xiAnd processing function fi(x), the change data data { f of node is generatedi(x1),···,fi(xn), and with The node of opposite mark is corresponding.Simultaneous selection wi,di, make its Si=difi(wi) set up, wherein i=1,2, n.
Verify key generation unit 1.3.Node xiThe verifying key for restoring the data true and false can be examined by generating for all nodes, be realized The data of recovery are detected, whether confirmation data restore correct.In the present embodiment, random selection t-1 rank multinomial is usedG (x is calculated as the generation function for generating verifying keyi) as verifying share, select viAnd uI,Generate verifying key (Yi,Xi) it is made to meet Yi=S+Xi·g(ui)·vi
File distributing unit 1.4.By after conversion subdata, verifying key with verifying share send other adjacent Internet of Things to Node, Internet of things node receive and mark the data from which node, realize data safety storage.In the present embodiment, node xiBy subdata { fi(x1),···,fi(xn)}、(Yi,Xi) and g (xi) corresponding identifier is transferred to as { x1,···, xnInternet of things node.And public information is broadcasted, including { wi,di}、{vi,ui, wherein i=1,2, n.
Data recovery procedure is as follows: node xiAfter collected data are converted, recovery nodes x is needediWhen data, then need Data recovery module is wanted to restore data, such as Fig. 3, data recovery procedure successively includes: node confirmation unit 2.1, restores Ciphertext production unit 2.2, data recovery unit 2.3, data verification units 2.4.
Assuming that recovery nodes xiData specific example in, node xiIt has been be destroyed that, therefore carried out using other nodes Recovery nodes xiData.
Node confirmation unit 2.1.Selection restore the Internet of things node of data, and determination can carry out the section of data recovery Point announces recovery nodes identifier and information transmission mode (such as Fig. 4).In the present embodiment, it is assumed that a node confirmation of h (h > k) It will be to node xiData restored, announce identifier { xi1,···,xih, whereinAnnounce letter Breath transmission mode is xi1→xi2→···→xih→xi1, indicate that node will carry out information transmitting according to above-mentioned ring mode.
Restore ciphertext production unit 2.2.The data that each node is stored according to itself calculate the ciphertext for restoring data, It prevents the data for directly transmitting storage from being eavesdropped by opponent, guarantees the secret of data.In the present embodiment, according to node confirmation unit 2.1 list { the x determinedi1,···,xih, each node is calculated according to the information of the information of announcement and itself storage to be restored Ciphertext, node xijCalculate data ciphertext are as follows:WithIts In (j=1, h).
Data recovery unit 2.3.According to the ring communication mode of Fig. 4 (3 nodes), carries out data transmission, carry out recovery section Starting point of the point (having certain computing capability) as ring, takes the lead in sending data, and after traversing entire ring, recovery nodes decrypt information acquisition Restore data.In the present embodiment, the starting point of the ring in node confirmation unit 2.1 is set as xi1, the node is for recovery nodes xi Data, starting point node xi1Select random number r1, by message (r1+Ci1 1,r1+Ci1 2) send next node x in ringi2, node xi2 In conjunction with data ciphertext and message, by (r1+Ci1 1+Ci2 1,r1+Ci1 2+Ci2 2) it is sent to node xi3, and so on, node xih It will be message (r1+Ci1 1+···+Cih 1,r1+Ci1 2+···+Cih 2) it is sent to starting point node xi1, node xi1Using random Number r1, according to mathematical knowledge it is found that obtaining node x after decryptioniData S=Ci1 1+···+Cih 1, g (u1)=Ci1 2+···+ Cih 2, data recovery completion.
Data verification units 2.4.Recovery nodes detect the data of recovery using verifying key, it is ensured that the data of recovery Correctly.In the present embodiment, node xi1Verifying key as starting point master is (Y1,X1), verify equation Y1=S+X1·g(u1)·v1, If set up, restore correct, it is invalid, it reselects node and is restored.
The present invention is had the following advantages and beneficial effects: compared with prior art
Firstly, Internet of things node data safety storage at present uses data encryption technology, it is limited to Internet of things node equipment System, it is desirable that its degree of intelligence is higher, is not suitable for that low side configuration equipment, and the present invention uses data transfer device, uses t-1 rank Multinomial is to data processing, and lower to equipment requirement, adaptation range is wider.
Secondly, encryption technology applied by current, in decryption restoration data, it is often required that encryption data is complete, once Breakage, which may cause, normally to decrypt, and cause ciphertext data unavailable or incorrect;And particularity (the exposure of Internet of things node In outside) it usually will appear loss or physics corrupted, so there is single point failure using existing encipherment scheme.The present invention is logical It crosses and saves former data conversion at the different Internet of things node that is placed on of multiple subdatas, asked so that efficiently solving single point failure Topic, so that remaining to restore the data in egress, guaranteeing integrality after single Internet of things node destroys.
Again, the prior art is confirmatory to the data deficiency of recovery, and the received information of Internet of things node is after encryption, nothing The correctness of data after method judgement decryption.This programme data conversion previous existence at verifying key so that the later period restore data after, can be right Data Detection.
Finally, the present invention utilizes cryptography tool, data safety storage, high-efficient, at low cost, highly-safe, Shandong are realized The advantages that stick is strong, strong operability, that is, be used in the Internet of things node of height intelligence, and can be used for the Internet of Things section of more low side Point simultaneously can be used for the Internet of things node of increasingly complex environment.
The above described is only a preferred embodiment of the present invention, not being done in any form to structure of the invention Limitation.Any simple modification, equivalent change and modification to the above embodiments according to the technical essence of the invention, In the range of still falling within technical solution of the present invention.

Claims (2)

1. a kind of Internet of things node secure storage method of data for preventing sensitive information from leaking, which is characterized in that turn including data It changes and restores two steps with data, specifically:
Data conversion process successively includes the course of work, the work of Date Conversion Unit (1.2) for handling construction of function unit (1.1) The course of work, the course of work of file distributing unit (1.4) made process, verify key generation unit (1.3), in which:
Handle the course of work of construction of function unit (1.1) are as follows: the information and neighbouring node number collected according to node generate Function is handled, function is responsible for follow-up data conversion, and Internet of things node number is n, node identifier xi, node xiThe number of collection According to for Si(i=1,2 ..., n), the number of change data needed for extensive restored data are k, node xiIt generates k-1 rank multinomial f (x), Wherein multinomial coefficient is the nonzero integer for randomly choosing and being not mutually equal, and is represented by fi(x)=ai0+ai1x+…+ai(k-1) xk-1, wherein ai≠aj, wherein i ≠ j;
The course of work of Date Conversion Unit (1.2) are as follows: raw according to the processing function that processing construction of function unit (1.1) generates At the subdata of each server, while data being used and handle function representation, it is known according to processing construction of function unit (1.1), Internet of things node identifies xiAnd processing function fi(x), the change data for generating node is { fi(x1),…,fi(xn), and with phase It is corresponding to the node of mark, simultaneous selection wi,di, make Si=difi(wi) set up, wherein i=1,2 ..., n;
Verify the course of work of key generation unit (1.3) are as follows: node xiIt generates to examine for all nodes and restores testing for the data true and false Key is demonstrate,proved, realization detects the data of recovery, and whether confirmation data are restored correctly, to use randomly selected t-1 rank multinomialG (x is calculated as the generation function for generating verifying keyi) as verifying share, select viAnd ui, generate verifying key (Yi,Xi) it is made to meet Yi=S+Xi·g(ui)·vi
The course of work of file distributing unit (1.4) are as follows: send subdata, verifying key and the verifying share after conversion to other Adjacent Internet of things node, Internet of things node receive and mark the data from which node, realize data safety storage, node xi By subdata { fi(x1),…,fi(xn)}、(Yi,Xi) and g (xi) corresponding identifier is transferred to as { x1,…,xnInternet of Things Node, and public information is broadcasted, including { wi,di}、{vi,ui, wherein i=1,2 ..., n;
Data recovery procedure successively includes the course of work of node confirmation unit (2.1), the work for restoring ciphertext production unit (2.2) The course of work for making process, the course of work of data recovery unit (2.3), data verification units (2.4), need to restore is section Point xiData, node xiIt has been be destroyed that, carry out node x using other nodesiData recovery,
The course of work of node confirmation unit (2.1) are as follows: selection restore the Internet of things node of data, and determination can carry out data The node of recovery announces recovery nodes identifier and information transmission mode, and a node confirmation of h (h > k) will be to node xiNumber According to being restored, identifier { x is announcedi1,…,xih, whereinAnnouncement information transmission mode is xi1→xi2 →…→xih→xi1, indicate that node will carry out information transmitting according to above-mentioned ring mode;
Restore the course of work of ciphertext production unit (2.2) are as follows: the data that each node is stored according to itself are calculated for restoring The ciphertext of data prevents the data for directly transmitting storage from being eavesdropped by opponent, guarantees the secret of data, according to node confirmation unit (2.1) list { x determinedi1,…,xih, each node is calculated according to the information of the information of announcement and itself storage restores close Text, node xijCalculate data ciphertext are as follows:WithWherein (j=1 ..., h),
The course of work of data recovery unit (2.3) are as follows: according to ring communication mode, carry out data transmission, carry out recovery nodes work It for the starting point of ring, takes the lead in sending data, after traversing entire ring, recovery nodes decrypt information acquisition and restore data, and node is confirmed The starting point of ring in unit (2.1) is set as xi1, the node is for recovery nodes xiData, starting point node xi1Select random number r1, by message (r1+Ci1 1,r1+Ci1 2) send next node x in ringi2, node xi2In conjunction with data ciphertext and message, by (r1+ Ci1 1+Ci2 1,r1+Ci1 2+Ci2 2) it is sent to node xi3, and so on, node xihIt will be message (r1+Ci1 1+…+Cih 1,r1+Ci1 2 +…+Cih 2) it is sent to starting point node xi1, node xi1Utilize random number r1, according to mathematical knowledge it is found that obtaining node x after decryptioni Data S=Ci1 1+…+Cih 1, g (u1)=Ci1 2+…+Cih 2, data recovery completion.
2. the Internet of things node secure storage method of data according to claim 1 for preventing sensitive information from leaking, feature Be: data recovery procedure further includes the course of work of data verification units (2.4), data verification units (2.4) it is worked Journey are as follows: recovery nodes detect the data of recovery using verifying key, it is ensured that the data of recovery are correct, node xi1As starting point Verifying key be (Y1,X1), verify equation Yi=S+Xi·g(ui)·viIf set up, restore correct, it is invalid then again Selection node is restored.
CN201510719659.7A 2015-10-29 2015-10-29 The Internet of things node secure storage method of data for preventing sensitive information from leaking Expired - Fee Related CN105262755B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510719659.7A CN105262755B (en) 2015-10-29 2015-10-29 The Internet of things node secure storage method of data for preventing sensitive information from leaking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510719659.7A CN105262755B (en) 2015-10-29 2015-10-29 The Internet of things node secure storage method of data for preventing sensitive information from leaking

Publications (2)

Publication Number Publication Date
CN105262755A CN105262755A (en) 2016-01-20
CN105262755B true CN105262755B (en) 2019-03-26

Family

ID=55102260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510719659.7A Expired - Fee Related CN105262755B (en) 2015-10-29 2015-10-29 The Internet of things node secure storage method of data for preventing sensitive information from leaking

Country Status (1)

Country Link
CN (1) CN105262755B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259185B (en) * 2018-01-26 2021-06-15 湖北工业大学 Anti-leakage group key negotiation system and method in group communication

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098161A (en) * 2009-12-15 2011-06-15 索尼公司 Actor node, sensor node, coverage block change method, parameter change method and information processing system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101046992B1 (en) * 2009-10-29 2011-07-06 한국인터넷진흥원 Sensor data security method, system and recording media

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098161A (en) * 2009-12-15 2011-06-15 索尼公司 Actor node, sensor node, coverage block change method, parameter change method and information processing system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage;Hiroaki Kikuchi;《JCIS》;20150129;全文
Secure secret reconstruction and multi-secret sharing schemes with unconditional security;Lein Harn;《Security and Communication Networks》;20140331;第7卷(第3期);全文
基于Shamir秘密共享的密钥分发与恢复算法;荣辉桂等;《通信学报》;20150331;第36卷(第3期);全文
秘密共享方案的研究;王海艳等;《微机发展》;20050331;第15卷(第3期);全文

Also Published As

Publication number Publication date
CN105262755A (en) 2016-01-20

Similar Documents

Publication Publication Date Title
CN109756338B (en) Authentication apparatus, computer-implemented method of authentication apparatus, and computer-readable medium
Hameed et al. Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
US8347094B2 (en) Securing wireless body sensor networks using physiological data
EP2361462B1 (en) Method for generating an encryption/decryption key
CN108989045B (en) Apparatus and system for preventing global tampering
US9762560B2 (en) Method for generating cryptographic “one-time pads” and keys for secure network communications
CN106104562A (en) Safety of secret data stores and recovery system and method
CN105009507A (en) Generating a key derived from a cryptographic key using a physically unclonable function
CN105228157B (en) A kind of wireless sensor network security light weight reprogramming method
CN106611128A (en) Secondary encryption-based data validation and data recovery algorithm in cloud storage
Jolfaei et al. A lightweight integrity protection scheme for low latency smart grid applications
JP6473876B2 (en) Secure network communication method
Chen et al. Enhanced authentication protocol for the Internet of Things environment
CN115442112A (en) Authentication and key agreement method and equipment based on PUF
Feiri et al. Efficient and secure storage of private keys for pseudonymous vehicular communication
CN117390637B (en) Method and system for protecting safety of safety access area system
CN105262755B (en) The Internet of things node secure storage method of data for preventing sensitive information from leaking
CN106341384A (en) Methods for facilitating secure communication
CN111490874B (en) Distribution network safety protection method, system, device and storage medium
Ding et al. A reversible watermarking scheme based on difference expansion for wireless sensor networks
KLEF An efficient light weight cryptography algorithm scheme for WSN devices using chaotic map and GE
US8681972B2 (en) Method of executing a cryptographic calculation
CN107277054A (en) A kind of method and system of data integrity validation
Lin et al. Quantum blind signature based on quantum circuit
Nesa et al. Combining merkle hash tree and chaotic cryptography for secure data fusion in iot

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190326

Termination date: 20211029

CF01 Termination of patent right due to non-payment of annual fee