CN110233868A - A kind of edge calculations data safety and method for secret protection based on Fabric - Google Patents

A kind of edge calculations data safety and method for secret protection based on Fabric Download PDF

Info

Publication number
CN110233868A
CN110233868A CN201910320624.4A CN201910320624A CN110233868A CN 110233868 A CN110233868 A CN 110233868A CN 201910320624 A CN201910320624 A CN 201910320624A CN 110233868 A CN110233868 A CN 110233868A
Authority
CN
China
Prior art keywords
data
node
fabric
edge calculations
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910320624.4A
Other languages
Chinese (zh)
Inventor
张延华
王勇
杨兆鑫
吴文君
姚勇峰
邱凯
杨硕鹏
王道魁
陈冰容
何奇昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201910320624.4A priority Critical patent/CN110233868A/en
Publication of CN110233868A publication Critical patent/CN110233868A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of edge calculations data safety and method for secret protection based on Fabric, this method can not distort characteristic due to block chain itself, prevent the damage of artificial malice deletion and hacker attack to data.Since user can obtain data in the node application inquiry for arbitrarily building this Fabric, the safety of data can ensure that in the case where equipment accidental damage.It builds in the Fabric node in edge calculations equipment by broadcasting information sharing into alliance's chain network; safely information sharing is given to other edge calculations nodes for having built this Fabric in this way; since all operations in block chain network can all verify the identity of user; it ensure that the user for being only authorized to search access right can obtain data from Fabric; make the personnel not held qualification or operator that can not inquire data, completes the protection to private data.The final protection for realizing Fabric to edge calculations data safety and privacy.

Description

A kind of edge calculations data safety and method for secret protection based on Fabric
Technical field
The invention belongs to block chain technical fields, edge calculations field, data security arts, are related to a kind of based on Fabric Edge calculations data safety and method for secret protection.
Background technique
With the stable development of science and technology, Internet of Things is to push society as the another new industry after internet The important productivity of high speed development, it will inject powerful vigor for development of world economy.One important technology of Internet of Things: side Edge calculates, and is a kind of framework of distributing operation.Under this framework, by application program, data information and the operation of service, by Network Central Node, fringe node on migration cellular logic are handled.Edge calculations will be handled by central node completely originally Large-scale service is decomposed, and is cut into the smaller part with more easily management, is distributed to fringe node and goes to handle.Fringe node is more Close to data terminal unit, processing and the transmission speed of data can be accelerated, reduce delay.
Edge calculations equipment is due to large number of, and position distribution is more dispersed and environment is sufficiently complex, inside many equipment It is the weaker embedded chip system of computing capability, is difficult to realize self safeguard protection.Safety problem seriously restricts edge The development of calculating, how solving the problem of data safety of this insecure environments will be a major challenge.
Traditional data storage method lacks safety, the Shortcomings in the safe level to data protection, in number During according to processing as caused by hardware fault, power-off, crash, artificial maloperation, bugs, virus or hacker etc. Database corruption or loss of data phenomenon, the personnel or operator that certain sensitive or secrecy data may not hold qualification read It reads, and causes the consequences such as leakage of data.In addition, traditional data, which upload storage, depends on centralization database with processing method, Keep core database server load larger, and there are trust problems.
After kidnapping virus outbreak from internet in 2016, " bit coin " starts to progress into the public visual field, at that time greatly Groups of people are only limitted to a kind of virtual trading currency to the understanding of bit coin.Hereafter over 2 years, the ratio of " bit coin " and dollar It is increasingly high.At the same time, into numerous researchers and the developer visual field it is its Floor layer Technology --- " block chain ".Someone's ratio Explaining it is a kind of revolutionary technology development, more it is believed that it is that another will change the world, push the world after internet The new things of development.
Block chain is a kind of distributed cryptographic book keeping operation system that can not be distorted of transparence.As " bit coin " bottom skill Art, block chain are that the transaction of bit coin transfers accounts etc. and to provide fool proof reliable guarantee.
Summary of the invention
The present invention is directed to use block chain technology, the data safety and Privacy Protection of edge calculations node are solved.It passes The edge calculations data storage method of system Shortcomings in the safe level to data protection, during data processing by Database corruption or data caused by hardware fault, power-off, crash, artificial maloperation, bugs, virus or hacker etc. Loss, the personnel or operator that certain sensitive or secrecy data may not hold qualification read, and cause leakage of data Etc. consequences.Traditional edge calculations internet of things data uploads storage method and depends on centralization database, takes core database Business device load is larger, and there are trust problems.For this purpose, it is an object of the invention to realize based on a kind of edge by Fabric It counts according to security and privacy guard method.
To solve the above problems, the present invention adopts the following technical scheme that:
A kind of edge calculations data safety and method for secret protection based on Fabirc, implementation method function structure such as Fig. 1 It is shown: Internet of Things initial data to be acquired in the sensor network scene production scene of physical layer first, by the side of edge calculations layer Edge calculation block chain node receives data.Fabric is built on edge calculations block chain node, in each section of edge calculations The Fabric node such as host node of different function is built on point, node of endorsing submits node and anchor node, the entire net of block chain Network is formed by connecting by anchor node.By mobile network, http protocol, the data transfer modes such as TCP/IP transmit data to side The backstage Fabric on edge calculation block chain node, at that can apply data, reduced data is uploaded to by data preparation Fabric, protected data source is for sensor network scene production scene Internet of Things netting index collected in this method According to.User can be applied by Web or the behaviour such as B/S client framework traces to the source to the data in Fabric or data are analyzed Make.Characteristic can not be distorted due to block chain itself, prevent the damage of artificial malice deletion and hacker attack to data.Due to User can obtain data in the node application inquiry for arbitrarily building this Fabric, can be in the case where equipment accidental damage It ensure that the safety of data.The Fabric node in edge calculations equipment is built by broadcasting information sharing to alliance In chain network, safely information sharing is given to other edge calculations nodes for having built this Fabric in this way, due in area All operations can all verify the identity of user in block chain network, ensure that the user for being only authorized to search access right can be from Fabric obtains data, makes the personnel not held qualification or operator that can not inquire data, completes the protection to private data.
Fabric operational flow diagram is as shown in Fig. 2, the node of Fabric alliance chain has: CA node receives the note of client Volume application returns to log-in password for logging in, to obtain letter of identity;Endorsement node is only sent out in application program to node Rise transaction endorsement request when just become endorsement node, other when be common accounting nodes, only be responsible for verifying transaction simultaneously keep accounts. It executes transaction and returns to YES/NO response to the client application for generating transaction motion (proposal);Host node is responsible for With sequence service node communication, newest block is obtained from sequence service node and portion is synchronous within the organization, can force to set It sets, can also elect;Node is submitted, is responsible for verifying from the transaction in the sequence received block of service node, then by block Submit (write-in/addition) to arrive the copy of its channel account book, accounting nodes also by each transactional marking in each piece be it is effective or In vain;Anchor node, the node that can be found by every other node;Ordering joint, ordering joint are received comprising endorsement signature Transaction, is ranked up generation block to the transaction not being packaged, is broadcast to host node.Application client is called by SDK and is demonstrate,proved Book service (CA) service, is registered and is registered, and obtain letter of identity.Application client passes through SDK to block link network Network initiates a transaction motion (Proposal), and transaction motion is with this transaction Contract ID, contract method to be called Endorsement (Endorser) node is sent to information such as parameter information and client signatures.Endorsement (Endorser) node receives It trades after motion (Proposal), verifying signs and determines whether submitter has the right to execute operation, while according to tactful mould of endorsing It is quasi- to execute intelligent contract, and result and its respective CA certificate signature are returned to application client.Application client End receive endorsement (Endorser) node return information after, judge whether motion result consistent, and whether referring to specify Endorsement strategy execution, if stopping to handle without enough endorsements;Otherwise, data are bundled to one by application client It plays composition one to trade and sign, is sent to sequence service node.Sequence service node carries out common recognition row to the transaction received A batch transaction is bundled to then according to block generation strategy and generates new block together, be sent to host node by sequence;Host node After receiving block, submission node can be synchronized in portion within the organization.It submits node that can verify to every transaction in block, examines The state whether input and output that transaction relies on meet current block chain is looked into, block is appended to local block chain after the completion, And modify world state.
Method includes the following steps:
Step 1: by reading original Internet of Things netting index in real time on the acquisition of the terminal devices such as sensor acquisition, mobile phone or network According to by mobile network, http protocol, the data transfer modes such as TCP/IP send data in real time;
Step 2: setting monitors and writes data-interface on alliance's block chain backstage of edge calculations frame local node Collected initial data in receiving step 1;
Step 3: the data in step 2 being parsed on alliance's block chain backstage, is organized into and can will be counted using data According to being split variable and be packaged into an orderly manner according to the affair logic to uplink data;
Step 4: by being uploaded in the Fabric put up to uplink data by SDK application in step 3, if by It regards as trusted and has the identity of storage permission, Fabric then storing data.It is built in edge calculations equipment at this time Information is passed in Fabric network by Fabric node by broadcasting, and has safely given information sharing to other build in this way The edge calculations node of this Fabric;
Step 5: user can be applied by Web or B/S client framework is in any edge meter for having built this alliance chain Operator node calls intelligent contract to take out data to Fabric application, if being identified as trusted and having the user of storage permission Identity can then take out corresponding data and carry out data analysis application;
The present invention can be good at the characteristics of using block chain, be stored using block chain, solves traditional data and uploads Storage depends on the trust problem of centralization database.The characteristics of can not being distorted using block chain, improves Internet of Things netting index well According to the safety of the safety and data processing that are stored in edge calculations node, by the way that information is broadcasted in Fabric network Complete safe and reliable shared, the protection using Fabric to user's progress priority assignation completion to private data of information.Most It realizes eventually to the data safety and secret protection in edge computing architecture.
This method feasibility is high, highly reliable, solves traditional data and uploads storage with processing method dependent on center Change the trust problem of database.Improve the safety that data in edge calculations framework store accurate safety and data transmission Property, improve the protection to private data in edge computing architecture.It is final realize to the data safety of edge computing architecture with it is hidden Private protection.
Detailed description of the invention
Fig. 1 is system function architecture diagram;
Fig. 2 is Fabric operational flow diagram;
Fig. 3 is the logical architecture figure of system;
Specific embodiment
The present invention will be further described for 1-3 and example with reference to the accompanying drawing:
The present invention provides a kind of edge calculations data safety and method for secret protection based on Fabric, system logic architecture Figure as shown in figure 3, first acquire Internet of Things initial data, collected by the data access layer of edge calculations network node Internet of things data.By mobile network, http protocol, the data transfer modes such as TCP/IP, which transmit data to, has built Fabric The backstage Fabric on edge calculations node, in the standardized data by data preparation at json format, after standardization Data upload to Fabric.User can be applied by Web or B/S client framework traces to the source to the data in Fabric Or the operation such as data analysis.
Specifically includes the following steps:
Step 1: internet of things data acquisition;
Step 1.1 by reading original Internet of Things netting index on the acquisition of the terminal devices such as sensor acquisition, mobile phone or network in real time According to data are divided into the collected sensing data of sensor network, and the affairs type data and network data that terminal is collected into connect The network data etc. that mouth is collected into;
The collected data of step 1.2 are sent in real time by mobile network, http protocol, the data transfer modes such as TCP/IP Data are to specified edge calculations node;
Step 2: receiving the Internet of Things initial data sent from terminal;
Step 2.1: it is arranged on alliance's block chain backstage of edge calculations frame local node and monitors, it will be where server IP address in server end of the port as Http agreement, the monitoring of data is carried out to the port, is connect in an asynchronous manner Receive the data that front end is uploaded.Concern port status in real time;
Step 2.2: setting event monitoring triggers function, and when the port of edge calculations local node has, data are incoming, alliance Collected original internet of things data in data-interface receiving step 1 on block chain backstage.
Step 3: when the data-interface on alliance's block chain backstage receives the data in step 2, to reception on first time To Internet of Things initial data parsed, be organized into and data can be split variable and according to the affair logic using data It is packaged into the standardized data of json format in an orderly manner;
Step 4: data cochain;
Step 4.1: json format in step 3 being uploaded to using data by intelligence contract application and is put up In Fabric, after endorsement (Endorser) node receives upload request, verifying signs and determines whether submitter has the right to execute Operation, while intelligent contract is executed according to endorsement policy-simulative, and result and its respective CA certificate signature are returned to application Program;
Step 4.2: after application client receives the information of endorsement (Endorser) node return, judging motion result It is whether consistent, and whether referring to specified endorsement strategy execution, if stopping to handle without enough endorsements;Otherwise, it answers Data are bundled to programmatic client and forms a transaction together and signs, are sent to sequence service node.
Step 4.3: sequence service node carries out common recognition sequence to the transaction received, then according to block generation strategy, A batch transaction is bundled to and generates new block together, is sent to host node;After host node receives block, portion within the organization is understood It is synchronized to submission node.Submit node that can verify to every transaction in block, the input and output for checking that transaction relies on are Block is appended to local block chain after the completion, and modifies world state by the no state for meeting current block chain.
Step 4.4: information is passed to Fabric by broadcasting by the Fabric node built in edge calculations equipment at this time In network, safely information sharing has been given to other edge calculations nodes for having built this Fabric in this way;
Step 5: user reads the data in Fabric;
Step 5.1: wanting the users of inquiry data firstly the need of applying by Web or B/S client framework is to Fabric In certificate authority node CA carry out registration application, obtain letter of identity.All operations all can in block chain network The identity of user is verified, this ensures that the participant of each Fabric has specific identity information;
Step 5.2: user needs to apply by Web or B/S client framework is to Fabric application taking-up data, if by Fabric regards as trusted and has the node for reading permission, then can take out corresponding data and carry out data analysis application.

Claims (6)

1. a kind of edge calculations data safety and method for secret protection based on Fabirc, which is characterized in that first in physical layer Sensor network scene production scene acquire Internet of Things initial data, connect by the edge calculations block chain node of edge calculations layer Receive data;Fabric is built on edge calculations block chain node, builds different function on each node of edge calculations Fabric node such as host node, node of endorsing submit node and anchor node, the whole network of block chain connected by anchor node and At;By mobile network, http protocol, TCP/IP data transfer mode is transmitted data on edge calculations block chain node The backstage Fabric, at that can apply data, is uploading to Fabric for reduced data for data preparation;
Method includes the following steps:
Step 1: by reading original internet of things data in real time on sensor acquisition, the acquisition of mobile phone terminal equipment or network, passing through Mobile network, http protocol, TCP/IP data transfer mode send data in real time;
Step 2: setting monitors and writes data-interface reception on alliance's block chain backstage of edge calculations frame local node Collected initial data in step 1;
Step 3: the data in step 2 are parsed, be organized into and can apply data alliance block chain backstage is upper, by data into Row segmentation variable is simultaneously packaged into an orderly manner according to the affair logic to uplink data;
Step 4: by being uploaded in the Fabric put up to uplink data by SDK application in step 3, if be identified For trusted and there are the identity of storage permission, Fabric then storing data;The Fabric in edge calculations equipment is built at this time Information is passed in Fabric network by node by broadcasting, and is in this way safely to have given information sharing other to have built this The edge calculations node of Fabric;
Step 5: user can be applied by Web or B/S client framework is in any edge calculations section for having built this alliance chain Point calls intelligent contract to take out data to Fabric application, if being identified as trusted and having the user identity of storage permission, Corresponding data can then be taken out and carry out data analysis application.
2. a kind of edge calculations data safety and method for secret protection based on Fabirc according to claim 1, special Sign is that the node of Fabric alliance chain has: CA node, receives the application for registration of client, returns to log-in password and is used to log in, To obtain letter of identity;Endorsement node only just becomes section of endorsing when application program initiates transaction endorsement request to node Point, other when be common accounting nodes, only be responsible for verifying trade simultaneously keep accounts;Execute transaction and to generate trade motion The client application of proposal returns to YES/NO response;Host node, is responsible for and sequence service node communicates, and takes from sequence Newest block is obtained at business node and portion is synchronous within the organization, can be forced to be arranged, can also be elected;Node is submitted, It is responsible for verifying from the transaction in the sequence received block of service node, then block is submitted to the copy of its channel account book, kept accounts Each transactional marking in each piece is also effectively or invalid by node;Anchor node, the section that can be found by every other node Point;Ordering joint, ordering joint receive the transaction comprising endorsement signature, are ranked up generation block to the transaction not being packaged, extensively It broadcasts to host node;Application client calls cert services CA service by SDK, is registered and is registered, and obtains identity Certificate;Application client initiates a transaction motion Proposal to block chain network by SDK, and transaction motion handle has Contract ID, contract method and the parameter information and client signature information that this transaction to be called are sent to endorsement Endorser node;After endorsement Endorser node receives transaction motion Proposal, verifying signs and whether determines submitter It has the right to execute operation, while intelligent contract is executed according to endorsement policy-simulative, and result and its respective CA certificate signature are sent out Return application client;After application client receives the information that endorsement Endorser node returns, motion knot is judged Whether whether fruit is consistent, and referring to specified endorsement strategy execution, if stopping to handle without enough endorsements;Otherwise, Application client, which is bundled to data, to be formed a transaction together and signs, and sequence service node is sent to;Sequence service Node carries out common recognition sequence to the transaction received, then according to block generation strategy, a batch transaction is bundled to together, is generated New block, is sent to host node;After host node receives block, submission node can be synchronized in portion within the organization;Submit node meeting Every transaction in block is verified, checks whether the input and output of transaction dependence meet the state of current block chain, it is complete Block is appended to local block chain after, and modifies world state.
3. a kind of edge calculations data safety and method for secret protection based on Fabirc according to claim 1, special Sign is that step 1 realizes that process is as follows:
Step 1.1 is acquired by sensor, reads original internet of things data, data in real time on the acquisition of mobile phone terminal equipment or network It is divided into the collected sensing data of sensor network, the affairs type data and network data interface that terminal is collected into are collected into Network data;
The collected data of step 1.2 are sent data in real time by mobile network, http protocol, TCP/IP data transfer mode Specified edge calculations node.
4. a kind of edge calculations data safety and method for secret protection based on Fabirc according to claim 1, special Sign is that step 2 realizes that process is as follows:
Step 2.1: being arranged on alliance's block chain backstage of edge calculations frame local node and monitor, by the IP where server Server end of the port as Http agreement in address carries out the monitoring of data to the port, before receiving in an asynchronous manner Hold uploaded data;Concern port status in real time;
Step 2.2: setting event monitoring triggers function, and when the port of edge calculations local node has, data are incoming, alliance's block Collected original internet of things data in data-interface receiving step 1 on chain backstage.
5. a kind of edge calculations data safety and method for secret protection based on Fabirc according to claim 1, special Sign is that step 4 realizes that process is as follows:
Step 4.1: json format in step 3 being uploaded to using data by intelligence contract application and is put up In Fabric, after endorsement Endorser node receives upload request, verifying signs and determines whether submitter has the right to execute behaviour Make, while intelligent contract is executed according to endorsement policy-simulative, and result and its respective CA certificate signature are returned to using journey Sequence;
Step 4.2: application client receive endorsement Endorser node return information after, judge motion result whether one It causes, and whether referring to specified endorsement strategy execution, if stopping to handle without enough endorsements;Otherwise, application program Client, which is bundled to data, to be formed a transaction together and signs, and sequence service node is sent to;
Step 4.3: sequence service node carries out common recognition sequence to the transaction received, then according to block generation strategy, by one It criticizes to trade to be bundled to and generates new block together, be sent to host node;After host node receives block, it can synchronize in portion within the organization Give submission node;Submit node that can verify to every transaction in block, whether the input and output for checking that transaction relies on accord with Block, is appended to local block chain, and modify world state by the state for closing current block chain after the completion;
Step 4.4: information is passed to Fabric network by broadcasting by the Fabric node built in edge calculations equipment at this time In, safely give information sharing to other edge calculations nodes for having built this Fabric in this way.
6. a kind of edge calculations data safety and method for secret protection based on Fabirc according to claim 1, special Sign is that step 5 realizes that process is as follows:
Step 5.1: want inquiry data user firstly the need of by Web apply or B/S client framework into Fabric Certificate authority node CA carries out registration application, obtains letter of identity;All operations can all be verified in block chain network The identity of user, this ensures that the participant of each Fabric has specific identity information;
Step 5.2: user needs to apply by Web or B/S client framework is to Fabric application taking-up data, if by Fabric regards as trusted and has the node for reading permission, then can take out corresponding data and carry out data analysis application.
CN201910320624.4A 2019-04-20 2019-04-20 A kind of edge calculations data safety and method for secret protection based on Fabric Pending CN110233868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910320624.4A CN110233868A (en) 2019-04-20 2019-04-20 A kind of edge calculations data safety and method for secret protection based on Fabric

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910320624.4A CN110233868A (en) 2019-04-20 2019-04-20 A kind of edge calculations data safety and method for secret protection based on Fabric

Publications (1)

Publication Number Publication Date
CN110233868A true CN110233868A (en) 2019-09-13

Family

ID=67860824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910320624.4A Pending CN110233868A (en) 2019-04-20 2019-04-20 A kind of edge calculations data safety and method for secret protection based on Fabric

Country Status (1)

Country Link
CN (1) CN110233868A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851813A (en) * 2019-11-11 2020-02-28 北京海益同展信息科技有限公司 Identity verification method, node device of block chain system and block chain system
CN111083223A (en) * 2019-12-18 2020-04-28 安徽兆尹信息科技股份有限公司 Block chain interconnection system for asset securitization processing sub-platform and interconnection data communication method thereof
CN111125752A (en) * 2019-12-04 2020-05-08 苏州大学 Privacy protection method in edge computing environment
CN111552215A (en) * 2020-05-22 2020-08-18 中国联合网络通信集团有限公司 Internet of things equipment safety protection method and system
CN111741123A (en) * 2020-07-02 2020-10-02 承德石油高等专科学校 Network data safety monitoring management device and method based on block chain technology
CN112069520A (en) * 2020-09-10 2020-12-11 广西大学 Electric power tower monitoring data encryption method and device based on alliance block chain and Beidou
CN112132682A (en) * 2020-08-10 2020-12-25 国网浙江省电力有限公司嘉兴供电公司 Electric power transaction method, device and system based on block chain technology
CN112434113A (en) * 2020-12-09 2021-03-02 北京理工大学 MES system identification analysis data management system and method
CN112486933A (en) * 2020-12-10 2021-03-12 浙江大学德清先进技术与产业研究院 Remote sensing data sharing and exchanging method based on alliance chain
CN112600892A (en) * 2020-12-07 2021-04-02 北京邮电大学 Block chain equipment and system for Internet of things and working method
CN112653770A (en) * 2021-01-14 2021-04-13 江苏徐工信息技术股份有限公司 Distributed engineering machinery monitoring system based on block chain
CN112671580A (en) * 2020-12-23 2021-04-16 厦门大学 QAR data management method based on block chain technology
CN112732799A (en) * 2021-03-30 2021-04-30 支付宝(杭州)信息技术有限公司 Method and device for querying Fabric Block Link book data
CN112751936A (en) * 2020-12-31 2021-05-04 联通(浙江)产业互联网有限公司 Alliance chain system and alliance chain system deployment method
CN112924921A (en) * 2021-01-21 2021-06-08 国网河北省电力有限公司信息通信分公司 Credible collection mechanism of smart electric meter quality data based on block chain
WO2021128733A1 (en) * 2019-12-28 2021-07-01 南京理工大学 Hyperledger fabric blockchain private data storage and access system and method therefor
CN115150767A (en) * 2022-09-06 2022-10-04 湖南智警公共安全技术研究院有限公司 Wireless sensor network data transmission method based on edge calculation
CN117459587A (en) * 2023-12-22 2024-01-26 常州尊尚信息科技有限公司 Scheduling method of content distribution network based on edge calculation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030069973A1 (en) * 2001-07-06 2003-04-10 Elango Ganesan Content service aggregation system control architecture
CN108769031A (en) * 2018-05-31 2018-11-06 中化能源科技有限公司 The material object of edge calculations service based on block chain deposits card traceability system
CN109151013A (en) * 2018-08-13 2019-01-04 南京邮电大学 Logistics information platform based on alliance's block chain
CN109194761A (en) * 2018-09-18 2019-01-11 北京工业大学 A kind of acquisition of LORA environment of internet of things data and cochain implementation method based on edge calculations and block chain
CN109302405A (en) * 2018-10-31 2019-02-01 北京邮电大学 Industrial data detection block chain network framework and detection method based on edge calculations
CN109598616A (en) * 2018-12-09 2019-04-09 大连飞创信息技术有限公司 A method of introducing the block chain data-privacy protection of arbitration mechanism

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030069973A1 (en) * 2001-07-06 2003-04-10 Elango Ganesan Content service aggregation system control architecture
CN108769031A (en) * 2018-05-31 2018-11-06 中化能源科技有限公司 The material object of edge calculations service based on block chain deposits card traceability system
CN109151013A (en) * 2018-08-13 2019-01-04 南京邮电大学 Logistics information platform based on alliance's block chain
CN109194761A (en) * 2018-09-18 2019-01-11 北京工业大学 A kind of acquisition of LORA environment of internet of things data and cochain implementation method based on edge calculations and block chain
CN109302405A (en) * 2018-10-31 2019-02-01 北京邮电大学 Industrial data detection block chain network framework and detection method based on edge calculations
CN109598616A (en) * 2018-12-09 2019-04-09 大连飞创信息技术有限公司 A method of introducing the block chain data-privacy protection of arbitration mechanism

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
林波,杨睿哲,杨兆鑫,金凯,张延华: "基于区块链和边缘计算的智慧农业系统", 《区块链专题》 *
黄忠义: "区块链在边缘计算与物联网安全领域应用", 《网络空间安全》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851813A (en) * 2019-11-11 2020-02-28 北京海益同展信息科技有限公司 Identity verification method, node device of block chain system and block chain system
CN111125752A (en) * 2019-12-04 2020-05-08 苏州大学 Privacy protection method in edge computing environment
CN111083223A (en) * 2019-12-18 2020-04-28 安徽兆尹信息科技股份有限公司 Block chain interconnection system for asset securitization processing sub-platform and interconnection data communication method thereof
CN111083223B (en) * 2019-12-18 2020-09-01 安徽兆尹信息科技股份有限公司 Block chain interconnection system for asset securitization processing sub-platform and interconnection data communication method thereof
WO2021128733A1 (en) * 2019-12-28 2021-07-01 南京理工大学 Hyperledger fabric blockchain private data storage and access system and method therefor
CN111552215A (en) * 2020-05-22 2020-08-18 中国联合网络通信集团有限公司 Internet of things equipment safety protection method and system
CN111552215B (en) * 2020-05-22 2022-02-11 中国联合网络通信集团有限公司 Internet of things equipment safety protection method and system
CN111741123A (en) * 2020-07-02 2020-10-02 承德石油高等专科学校 Network data safety monitoring management device and method based on block chain technology
CN112132682A (en) * 2020-08-10 2020-12-25 国网浙江省电力有限公司嘉兴供电公司 Electric power transaction method, device and system based on block chain technology
CN112069520A (en) * 2020-09-10 2020-12-11 广西大学 Electric power tower monitoring data encryption method and device based on alliance block chain and Beidou
CN112600892A (en) * 2020-12-07 2021-04-02 北京邮电大学 Block chain equipment and system for Internet of things and working method
CN112434113B (en) * 2020-12-09 2023-02-28 北京理工大学 MES system identification analysis data management system and method
CN112434113A (en) * 2020-12-09 2021-03-02 北京理工大学 MES system identification analysis data management system and method
CN112486933A (en) * 2020-12-10 2021-03-12 浙江大学德清先进技术与产业研究院 Remote sensing data sharing and exchanging method based on alliance chain
CN112671580A (en) * 2020-12-23 2021-04-16 厦门大学 QAR data management method based on block chain technology
CN112671580B (en) * 2020-12-23 2023-11-24 厦门大学 QAR data management method based on blockchain technology
CN112751936A (en) * 2020-12-31 2021-05-04 联通(浙江)产业互联网有限公司 Alliance chain system and alliance chain system deployment method
CN112653770A (en) * 2021-01-14 2021-04-13 江苏徐工信息技术股份有限公司 Distributed engineering machinery monitoring system based on block chain
CN112924921A (en) * 2021-01-21 2021-06-08 国网河北省电力有限公司信息通信分公司 Credible collection mechanism of smart electric meter quality data based on block chain
CN112732799A (en) * 2021-03-30 2021-04-30 支付宝(杭州)信息技术有限公司 Method and device for querying Fabric Block Link book data
CN112732799B (en) * 2021-03-30 2021-11-02 支付宝(杭州)信息技术有限公司 Method and device for querying Fabric Block Link book data
CN115150767A (en) * 2022-09-06 2022-10-04 湖南智警公共安全技术研究院有限公司 Wireless sensor network data transmission method based on edge calculation
CN117459587A (en) * 2023-12-22 2024-01-26 常州尊尚信息科技有限公司 Scheduling method of content distribution network based on edge calculation
CN117459587B (en) * 2023-12-22 2024-03-01 常州尊尚信息科技有限公司 Scheduling method of content distribution network based on edge calculation

Similar Documents

Publication Publication Date Title
CN110233868A (en) A kind of edge calculations data safety and method for secret protection based on Fabric
CN100477833C (en) Authentication method
CN108965230A (en) A kind of safety communicating method, system and terminal device
CN109413087A (en) Data sharing method, device, digital gateway and computer readable storage medium
CN100581170C (en) Trusted network management method based on ternary peer-to-peer identification trusted network connections
CN105207780B (en) A kind of certification user method and device
CN105897782A (en) Method and device for treating call request of interface
CN104869111B (en) A kind of trusted end-user access authentication system and method
US11392615B2 (en) Process for establishing trust between multiple autonomous systems for the purposes of command and control
CN110557276B (en) Block chain computer room management system based on Fabric architecture
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN106060078A (en) User information encryption method, user registration method and user validation method applied to cloud platform
CN108990062A (en) Intelligent and safe Wi-Fi management method and system
CN111314381A (en) Safety isolation gateway
CN110417739A (en) It is a kind of based on block chain technology safety Netowrk tape in measurement method
Hu et al. Method for cyberincidents network-centric monitoring in critical information infrastructure
CN109241762A (en) Assets information acquisition methods, device and computer equipment based on block chain technology
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN109302397A (en) A kind of network safety managing method, platform and computer readable storage medium
CN112862487A (en) Digital certificate authentication method, equipment and storage medium
Zhang et al. Formal analysis of QUIC handshake protocol using ProVerif
CN112118572B (en) Data safety transmission system and method based on 5G communication in industrial network scene
DE602005004341T2 (en) Cookie-based method for authenticating MAC messages
HanataniI et al. A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication
CN116170806B (en) Smart power grid LWM2M protocol security access control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190913