CN110457926A - It is a kind of industry Internet of Things in based on data encryption storage data sharing method - Google Patents

It is a kind of industry Internet of Things in based on data encryption storage data sharing method Download PDF

Info

Publication number
CN110457926A
CN110457926A CN201910743124.1A CN201910743124A CN110457926A CN 110457926 A CN110457926 A CN 110457926A CN 201910743124 A CN201910743124 A CN 201910743124A CN 110457926 A CN110457926 A CN 110457926A
Authority
CN
China
Prior art keywords
data
node
aggregator
block
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910743124.1A
Other languages
Chinese (zh)
Inventor
马创
赵娟
杨松菱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910743124.1A priority Critical patent/CN110457926A/en
Publication of CN110457926A publication Critical patent/CN110457926A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to industrial circles and computer field, more particularly to a kind of data sharing method based on data encryption storage in industrial Internet of Things, including alliance's catenary system, alliance's catenary system includes data aggregator, proof of work module, data block generation module, intelligent contract processing module;The data aggregator includes local controller and record pond;The proof of work module is used to determine the data accounting management permission in some period;The data block generation module is used to the transaction record stored in the data aggregator for possessing effective proof of work in proof of work module being stored in data storage in systems according to chronological order;The intelligence contract processing module is to verify whether sharing request meets access constraints condition during data sharing;The present invention effectively can solve the problems, such as how to store and utilize existing agricultural data by the system, to avoid the information island effect of agricultural data.

Description

It is a kind of industry Internet of Things in based on data encryption storage data sharing method
Technical field
The present invention relates to deposited in industrial circle and computer field more particularly to a kind of industrial Internet of Things based on data encryption The data sharing method of storage.
Background technique
Industrial Internet of Things is that will have perception, all kinds of acquisitions of monitoring capacity, control sensor or controller, and movement The technologies such as communication, intellectual analysis are constantly dissolved into industrial processes links, to greatly improve manufacture efficiency, improve and produce Quality, reduces product cost and resource consumption, and final realize promotes traditional industry to the intelligentized new stage.
In recent years, China's construction of agricultural informationization is quickly grown, and all parts of the country establish a large amount of Agricultural Information Websites, agricultural Data are effectively accumulated.But since attention degree of the scientific research in China to data sharing is insufficient, so that the benefit of data It is very low with rate, the great wasting of resources is caused, while Construction of Agricultural Information Website is relatively independent, regional significant, each agricultural letter Breath lacks unified specification between website, for example the form of data storage is different etc., causes data mutually indepedent, to be formed Information island effect, so that agricultural data is difficult to directly utilize.Conventional data sharing mode is all to transmit data to one A reliable central node carries out data storage and shares, but is faced with the mode that central node carries out data sharing Common defect, for example, the malicious attack concentrated;The Single Point of Faliure of central node;The malice of data center's storing data is distorted The problems such as.Therefore, how to store and be that IT application to agriculture is for study and solve the problems, such as using available data.
Block chain technology refers to the technology that an authentic data library is safeguarded by decentralization collective, has and goes trust, nothing The common recognition feature such as center, multi-party participation, authentic data library.Block chain technology realizes block data using asymmetric encryption techniques Storage knows together algorithm using distributed node to generate and more new data.Data can be guaranteed using distributed data method Secure storage, while it being not need to rely on global believable third party, so as to avoid the malicious attack concentrated.Cause This, these technologies and feature of block chain provide solution with sharing problem for data storage in industrial Internet of Things.
Summary of the invention
In order to facilitate the storage of Agricultural Information and shared, the present invention proposes to deposit in a kind of industrial Internet of Things based on data encryption The data sharing method of storage, including alliance's catenary system, alliance's catenary system include data aggregator, encryption information generation mould Block, data encryption module, proof of work module, data block generation module, intelligent contract processing module;The data aggregate Device includes local controller and record pond;When carrying out data storage in alliance's chain, alliance's catenary system is raw using encryption information Certificate, private key, public key and signature are generated at module, data encryption module will according to node certificate, private key, public key and signature The data encryption of node is stored in the record pond of data aggregator, if data to be uploaded are authentic and valid, passes through workload Module is proved to determine the node for possessing book keeping operation power, writes data into block chain using data block generation module by the node In;When requesting shared data in alliance's catenary system, if if a node initiates request of data, intelligent contract to another node Processing module judges whether the nodes sharing data for agreeing to receive request of data, if agreeing to share, the data of encryption are sent to The node of heat request of data, the node for initiating request of data are decrypted data using the private key of oneself, and it is total to complete data It enjoys.
Further, the specific steps of progress data storage include: in alliance's chain
S101, system are that each legal node issues the public key for encryption data, private key and number label in the whole network Name simultaneously generates certificate for each legitimate node;When system is initialized, node is from the record pond of neighbouring data aggregator Middle acquisition block data storage location concordance list;
When S102, node upload monitoring data, the digital signature of node is first sent to data aggregator and carries out identity Verifying, using the public key encryption monitoring data of node, encloses the signature of encrypted monitoring data after receiving confirmation and replying Data aggregator is sent jointly to together with encrypted monitoring data afterwards, data aggregator is using public key itself to the number received According to being encrypted, data to be uploaded are obtained;
S103, data aggregator carry out legitimacy detection to data to be uploaded, that is, judge whether data to be uploaded are safe Effectively, if by detection, should data to be uploaded save in the record pond of data aggregator, otherwise, directly ignore this to upper Pass data;
S104, data accounting management permission in some period is determined by way of proof of work, obtain permission Data aggregator mays be eligible to for the data of signature being written in data block chain, i.e., data aggregator will be in local a period of time The valid data being collected into carry out packing signature, and subsequent data aggregator can compete qualification for the number of signature by proof of work According in block write-in data block chain;
Consensus rules are executed between S105, data aggregator, to keep block data consistent, are known together and are calculated by Byzantine failure tolerance Method come realize data sharing alliance catenary system block common recognition.
Further, the process of shared data is requested to specifically include in alliance's catenary system:
S201, node NmTo node NiIssue data sharing request, node NiFirst verify node NmThe legitimacy of identity, is tested After card passes through, node NiFor node NmThe access constraints that data are arranged are regular (data sharing range, timeliness, number), with deutomerite Point NiThe private key of these constraint rules and accessed data block is sent to corresponding data aggregator;
S202, data aggregator are checked after receiving transaction data, automatic to execute intelligent contract after verifying;
If S203, node NmWith node NiCorresponding is same data aggregator, then the current data for executing intelligent contract Shared data is transmitted directly to node N by polymerizerm;Otherwise, the data aggregator of the intelligent contract of current execution is by shared number According to being sent to node NmCorresponding data aggregator, and by node NmCorresponding data aggregator sends the data to node Nm
S204, node NmAfter the shared data for receiving return, the number of results received is carried out using the private key of itself Decryption obtains data.
Further, monitoring data include metadata type, metadata tag, upload information and timestamp;Wherein supervise The data that measured data as needs to upload, upload information include agricultural product supplier and products in circulation process involved by production Quotient.
Further, qualification is competed for the process packet in the data block write-in data block chain of signature by proof of work It includes: by the combination P_ of the cryptographic Hash of a random number x and previous block, the Merkel root of timestamp and current data block Cryptographic Hash of the Hash of data as current block, is expressed as
Hash (x+P_data), using the cryptographic Hash as proof of work, if the proof of work is in data sharing alliance Data aggregator in catenary system is at war with calculating, calculates the data aggregator of the value of random number x at first as host node, It obtains the qualification of signed data block write-in block chain, other data aggregators are used as from node;Wherein Hash (x+P_data) < difficulty, difficulty are the threshold values for controlling the value speed that data aggregator calculates x.
Further, the area sended over as the data aggregator from node by the data aggregator as host node Block Hash and digital signature carry out the legitimacy and correctness of verify data block, and using each data aggregator as from node Auditing result enclose respective digital signature and be broadcast to other as the data aggregator from node, to realize as from section Mutual supervision and common examination between the data aggregator of point.
Further, node NiFirst verify node NmWhen the legitimacy of identity, need to verify node NmThe data sharing of sending The details of data access in request, including access target, access time and access frequency, are accessed by verify data Details legitimacy, to judge the legitimacy of node identities.
Further, the process that data aggregator executes intelligent contract automatically includes according to node NiThe access constraints of setting Rule locking script, and using the private key of data block to data deciphering, by the shared data and node N after decryptionmPublic key into The public key of shared data and node after decryption is carried out the later content of asymmetric encryption as execution by row asymmetric encryption The output result of intelligent contract.
Data storage alliance catenary system used in the present invention, compared with traditional information sharing, the main body of superiority Now, firstly, it guarantees the secure storage of data using Distributed Storage mode, global believable third party is not depended on Entity is subject to the risk of malicious attack so as to avoid the central node of conventional center date storage method;Secondly, anti- Only deliberately distort storing data.These speciality can effectively ensure the authenticity and effectively stored for shared agricultural data Property, to avoid the information island effect of current agricultural data.
Detailed description of the invention
Fig. 1 is that data of the present invention store and shared system structure diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment 1
In the present embodiment, the data sharing method based on data encryption storage in a kind of industrial Internet of Things is provided, including Alliance's catenary system, alliance's catenary system include data aggregator, encryption information generation module, data encryption module, workload Prove module, data block generation module, intelligent contract processing module;The data aggregator includes local controller and note Record pond;Wherein:
Encryption information module is used to be that legitimate node in system generates certificate and is that legitimate node in system promulgates use In the public key, private key and signature of encryption data;
Data encryption module is docked for the public key encryption monitoring data of node and using data aggregator public key itself The data received are encrypted;
The proof of work module is used for before block chain is added in new data block, between the data aggregator of pre-selection Acquisition book keeping operation be at war with temporary, effective proof of work is found in competition between each data aggregator, is most found fastly effectively The data aggregator of proof of work will be rewarded, which is responsible for audit transactions and records and transaction record is set up At data block new in system;
The data block generation module is for gathering the data for possessing effective proof of work in proof of work module The transaction record stored in clutch is stored in data storage in systems according to chronological order;
The intelligence contract processing module is used for when meeting intelligent contract, automatic to execute task clause, according to setting in advance The share and access of fixed Authority Contro1 data operates;
The local controller is used to be used to the data for the required storage that integration node uploads;
The record pond is used to store the data of local controller integration.
Further, when the data that local controller uploads node are integrated, need to judge the information that node uploads Legitimacy, if upload information it is legal, legal information integrate and be stored in record pond;Otherwise directly ignore on the node The data of biography.
In alliance's chain carry out data storage when, alliance's catenary system using encryption information generation module generate certificate, private key, The data encryption of node is stored in by public key and signature, data encryption module according to node certificate, private key, public key and signature In the record pond of data aggregator, if data to be uploaded are authentic and valid, determined by proof of work module and possess note The node of account power, is write data into block chain by the node using data block generation module;It is requested in alliance's catenary system When shared data, if intelligent contract processing module judges whether to agree to if a node initiates request of data to another node The nodes sharing data of request of data are received, if agreeing to share, the data of encryption are sent to the node of heat request of data, are sent out The node for playing request of data is decrypted data using the private key of oneself, completes data sharing.
Embodiment 2
In the present embodiment, on the basis of embodiment 1, a kind of specific step that data storage is carried out in alliance's chain is proposed Suddenly, comprising:
S101, system are that each legal node issues the public key for encryption data, private key and number label in the whole network Name obtains data storage location concordance list from the record pond of corresponding data aggregator with posterior nodal point;
When S102, node upload monitoring data, the digital signature of node is first sent to data aggregator and carries out identity Verifying, using the public key encryption monitoring data of node, encloses the signature of encrypted monitoring data after receiving confirmation and replying Data aggregator is sent jointly to together with encrypted monitoring data afterwards, data aggregator is using public key itself to the number received According to being encrypted, data to be uploaded are obtained;
S103, data aggregator carry out legitimacy detection to data to be uploaded, if by detection, it should data to be uploaded In the record pond for saving data aggregator, otherwise, directly ignore the data to be uploaded;
Data in local a period of time can be carried out packing signature, subsequent data aggregator meeting by S104, data aggregator It competes qualification by proof of work the data block of signature is written in data block chain;
Consensus rules are executed between S105, data aggregator, to keep block data consistent, are known together and are calculated by Byzantine failure tolerance Method come realize data sharing alliance catenary system block common recognition.
Further, system is that each legal node passes through BLS short signature technology generation certificate;It and is each legal Node issues the public key, private key and signature for encryption data, and a node is expressed as public key, private key is expressed as with signingWhereinIt for the public key of node, is generated by BLS short signature technology, effect is For encrypting data to be uploaded;For node private key by BLS short signature technology generate, effect be to data into Row decryption;It is the signature of node, is generated by BLS short signature technology, effect is to carry out authentication.
Further, node NiWhen uploading monitoring data, first by node NiSignature Sig_1 and certificateIt is sent to Data aggregator carries out the verifying of identity, after receiving confirmation and replying, uses the public key of nodeIt encrypts to be uploaded Data Data is enclosed and is sent jointly to local data polymerizer (such as BS after the signature of encryption dataj), data aggregator utilizes Public key itselfThe data received are encrypted, to obtain final upload data Record, detailed process can be with It indicates are as follows:
Wherein:
Wherein, BSjIndicate j-th of data aggregator;Record indicates final and uploads data;It indicates to use number According to polymerizer BSjPublic key encryption information m;Data_1 indicates data of the data Data after encryption;Indicate label Name;Timestamp indicates timestamp;
Further, data aggregator BSjLegitimacy detection is carried out to the data Record of upload, if by detection, Just data are saved in the memory block of polymerizer, otherwise, directly ignore the data.
Further, the data of local a period of time (such as 10min) can be carried out packing signature by data aggregator, then Data aggregator can compete qualification by proof of work and the data block of signature is written in data block chain;Wherein, workload Prove to be actually by cryptographic Hash, the Merkel root of timestamp and current data block of a random number x and previous block Combination P_data cryptographic Hash of the Hash as current block, Hash (x+P_data) is expressed as, using the cryptographic Hash as work Work amount proof, the calculating if data aggregator of the proof of work in data sharing alliance catenary system is at war with, is counted at first The data aggregator of the value of random number x is calculated as host node, is obtained the qualification of signed data block write-in block chain, other numbers It is used as according to polymerizer from node;Wherein Hash (x+P_data) < difficulty, difficulty are control data aggregator Calculate the threshold values of the value speed of x.
Further, the area sended over as the data aggregator from node by the data aggregator as host node Block Hash and digital signature carry out the legitimacy and correctness of verify data block, and using each data aggregator as from node Auditing result enclose respective digital signature and be broadcast to other as the data aggregator from node, to realize as from section Mutual supervision and common examination between the data aggregator of point.
Further, consensus rules are executed between data aggregator, to keep block data consistent, data sharing alliance linkwork The block common recognition of system knows together algorithm by Byzantine failure tolerance to realize.
Embodiment 3
The present embodiment proposes a kind of specific steps that data storage is carried out in alliance's chain on the basis of embodiment 1, if Node NiCorresponding data aggregator, node N are stored data according to the method for embodiment 2mAccording to the following steps to node Ni Request data is shared, comprising:
Node NiCorresponding data aggregator, node N are stored data according to the method for embodiment 2mAccording to the following steps To node NiRequest data is shared:
S201, node NmTo node NiIssue data sharing request, node NiFirst verify node NmThe legitimacy of identity, is tested After card passes through, for node NmThe access authority rule of data is set, with posterior nodal point NiThese constraint rules and accessed data The private key of block is sent to corresponding data aggregator;Wherein, access constraints rule includes the range, timeliness, number of data sharing, When meeting these rules, data sharing could be effectively carried out;
S202, data aggregator are checked after receiving transaction data, automatic to execute intelligent contract after verifying;
S203, shared data is sent, if node NmWith node NiCorresponding is same data aggregator, then current execute Shared data is transmitted directly to node N by the data aggregator of intelligent contractm;Otherwise, the data of the intelligent contract of current execution Shared data is sent to node N by polymerizermCorresponding data aggregator, and by node NmCorresponding data aggregator is by data It is sent to node Nm
S204, node NmAfter the shared data for receiving return, the number of results received is carried out using the private key of itself Decryption obtains data.
Further, node NmTo node NiIt issues data sharing and requests Req, include the detailed letter of data access in request Breath, such as access target, access time, access frequency etc., node NiFirst verify node NmThe legitimacy of identity, after being verified, Node NmFor node NiAccess constraints condition C onstrainsts (such as data sharing range, timeliness, the number of data are set Deng), with posterior nodal point NmThe private key of these constraint rules and accessed data blockIt is sent to corresponding data aggregator BSj, the procedural representation are as follows:
Wherein, Request indicates request;Expression is encrypted using the public key of node Nk;Indicate node NmSignature;Expression is encrypted using the public key of data aggregator BSj;Constrants indicates access constraints rule;Indicate the private key of accessed data block;Indicate node NmPublic key;Indicate node NiSignature.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (8)

1. the data sharing method based on data encryption storage in a kind of industry Internet of Things, including alliance's catenary system, the alliance Catenary system includes data aggregator, encryption information generation module, data encryption module, proof of work module, data block life At module, intelligent contract processing module;The data aggregator includes local controller and record pond;It is characterized in that, In When carrying out data storage in alliance's chain, alliance's catenary system generates certificate, private key, public key and label using encryption information generation module The data encryption of node is stored in data aggregator according to node certificate, private key, public key and signature by name, data encryption module Record pond in, if data to be uploaded are authentic and valid, determined by proof of work module possess book keeping operation power node, It is write data into block chain by the node using data block generation module;When requesting shared data in alliance's catenary system, If a node initiates request of data to another node, intelligent contract processing module judges whether to agree to that this receives request of data Node carry out shared data, if agreeing to shared, the data of encryption are sent to the node for initiating request of data, data is initiated and asks The node asked is decrypted data using the private key of oneself, completes data sharing.
2. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 1, special Sign is that the specific steps that data storage is carried out in alliance's chain include:
S101, system be the whole network in each legal node issue for encryption data public key, private key and digital signature simultaneously Certificate is generated for each legitimate node;When system is initialized, node is obtained from the record pond of neighbouring data aggregator Take block data storage location concordance list;
When S102, node upload monitoring data, the digital signature of node is first sent to data aggregator and carries out authentication, etc. To receiving after confirmation replys, using the public key encryption monitoring data of node, enclose after the signature of encrypted monitoring data together with Encrypted monitoring data send jointly to data aggregator, and data aggregator carries out the data received using public key itself Encryption, obtains data to be uploaded;
S103, data aggregator carry out legitimacy detection to data to be uploaded, that is, judge whether data to be uploaded are safe and effective, If by detection, should data to be uploaded save in the record pond of data aggregator, otherwise, directly ignore the number to be uploaded According to;
S104, data accounting management permission in some period is determined by way of proof of work, obtain the data of permission Polymerizer mays be eligible to for the data of signature being written in data block chain, i.e., data aggregator will collect in local a period of time To valid data carry out packing signature, subsequent data aggregator determines the qualified data block by signature by proof of work The data aggregator in data block chain is written;
Consensus rules are executed between S105, data aggregator, it is real by Byzantine failure tolerance common recognition algorithm to keep block data consistent The block common recognition of existing data sharing alliance catenary system.
3. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 2, special Sign is that monitoring data include metadata type, metadata tag, upload information and timestamp.
4. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 2, special Sign is that competing the process that the data block of signature is written in data block chain for qualification by proof of work includes: by one The Hash of the combination P_data of the cryptographic Hash of random number x and previous block, the Merkel root of timestamp and current data block As the cryptographic Hash of current block, it is expressed as Hash (x+P_data), using the cryptographic Hash as proof of work, if the workload Prove that data aggregator in data sharing alliance catenary system is at war with calculating, calculates the number of the value of random number x at first According to polymerizer as host node, obtain the qualification of signed data block write-in block chain, other data aggregators are used as from node; Wherein Hash (x+P_data) < difficulty, difficulty are the valve for controlling the value speed that data aggregator calculates x Value.
5. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 2, special Sign is, the block Hash sum number sended over as the data aggregator from node by the data aggregator as host node Word signature carrys out the legitimacy and correctness of verify data block, and using each as the auditing result of the data aggregator from node It encloses respective digital signature and is broadcast to other as the data aggregator from node, realize as the data aggregate from node Mutual supervision and common examination between device.
6. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 1, special Sign is, requests the process of shared data to specifically include in alliance's catenary system:
S201, node NmTo node NiIssue data sharing request, node NiFirst verify node NmThe legitimacy of identity, is verified Afterwards, for node NmThe access constraints rule of data, node N are setiThese constraint rules and the private key of accessed data block are sent out Give corresponding data aggregator;
S202, data aggregator are checked after receiving transaction data, automatic to execute intelligent contract after verifying;
If S203, node NmWith node NiCorresponding is same data aggregator, then the current data aggregate for executing intelligent contract Shared data is transmitted directly to node N by devicem;Otherwise, the data aggregator of the intelligent contract of current execution sends out shared data Give node NmCorresponding data aggregator, and by node NmCorresponding data aggregator sends the data to node Nm
S204, node NmAfter the shared data for receiving return, the number of results received is decrypted using the private key of itself, Obtain data.
7. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 6, special Sign is, node NiFirst verify node NmWhen the legitimacy of identity, need to verify node NmNumber in the data sharing request of sending According to the details of access, including access target, access time and access frequency, the details accessed by verify data Legitimacy, to judge the legitimacy of node identities.
8. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 6, special Sign is that the process that data aggregator executes intelligent contract automatically includes according to node NiThe access constraints rule of setting locks foot This, and using the private key of data block to data deciphering, by the shared data and node N after decryptionmPublic key carry out it is asymmetric plus It is close, the public key of shared data and node after decryption is subjected to the later content of asymmetric encryption as the intelligent contract of execution Export result.
CN201910743124.1A 2019-08-13 2019-08-13 It is a kind of industry Internet of Things in based on data encryption storage data sharing method Pending CN110457926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910743124.1A CN110457926A (en) 2019-08-13 2019-08-13 It is a kind of industry Internet of Things in based on data encryption storage data sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910743124.1A CN110457926A (en) 2019-08-13 2019-08-13 It is a kind of industry Internet of Things in based on data encryption storage data sharing method

Publications (1)

Publication Number Publication Date
CN110457926A true CN110457926A (en) 2019-11-15

Family

ID=68486080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910743124.1A Pending CN110457926A (en) 2019-08-13 2019-08-13 It is a kind of industry Internet of Things in based on data encryption storage data sharing method

Country Status (1)

Country Link
CN (1) CN110457926A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049657A (en) * 2019-12-10 2020-04-21 成都理工大学 CAN bus network equipment node access authority management method and system
CN111046411A (en) * 2019-12-27 2020-04-21 北京中电普华信息技术有限公司 Power grid data safe storage method and system
CN111352996A (en) * 2020-02-26 2020-06-30 百度在线网络技术(北京)有限公司 Data sharing method, device, equipment and medium based on block chain network
CN111639369A (en) * 2020-06-03 2020-09-08 科大讯飞股份有限公司 Data sharing method, device, storage medium and data sharing system
CN111865563A (en) * 2020-07-27 2020-10-30 北京航空航天大学 Civil aviation passenger data safety protection and anti-falsification scheme based on alliance chain
CN112182608A (en) * 2020-09-25 2021-01-05 中国人民大学 Regular sharing method and system for encrypted data of alliance chain
CN112214544A (en) * 2020-08-28 2021-01-12 国网江西省电力有限公司信息通信分公司 Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN112351001A (en) * 2020-10-21 2021-02-09 广州纳诺科技股份有限公司 Industrial Internet of things data sharing method, device and equipment based on block chain
CN112583598A (en) * 2020-11-10 2021-03-30 周口师范学院 Complex Internet of things alliance chain system communication mechanism
CN113610513A (en) * 2021-05-20 2021-11-05 山东省农业科学院科技信息研究所 Decentralized agricultural Internet of things system based on block chain
WO2021227867A1 (en) * 2020-05-11 2021-11-18 徐皓 Method and system for forming decentralized distributed database, electronic device, and computer readable storage medium
CN113746829A (en) * 2021-08-31 2021-12-03 平安银行股份有限公司 Multi-source data association method, device, equipment and storage medium
CN114785602A (en) * 2022-04-26 2022-07-22 国网四川省电力公司经济技术研究院 Power utilization data security sharing model, method and system
CN115378640A (en) * 2022-07-13 2022-11-22 重庆邮电大学 Cross-link data secure sharing method based on alliance link

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104982006A (en) * 2013-04-10 2015-10-14 华为技术有限公司 System and method for providing a software defined protocol stack
CN107018125A (en) * 2017-02-17 2017-08-04 阿里巴巴集团控股有限公司 A kind of block catenary system, date storage method and device
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
WO2019072301A2 (en) * 2018-12-21 2019-04-18 Alibaba Group Holding Limited Verifying integrity of data stored in a consortium blockchain using a public sidechain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104982006A (en) * 2013-04-10 2015-10-14 华为技术有限公司 System and method for providing a software defined protocol stack
CN107018125A (en) * 2017-02-17 2017-08-04 阿里巴巴集团控股有限公司 A kind of block catenary system, date storage method and device
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
WO2019072301A2 (en) * 2018-12-21 2019-04-18 Alibaba Group Holding Limited Verifying integrity of data stored in a consortium blockchain using a public sidechain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴振铨 等: ""基于联盟区块链的智能电网数据安全存储与共享系统"", 《计算机应用》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049657A (en) * 2019-12-10 2020-04-21 成都理工大学 CAN bus network equipment node access authority management method and system
CN111046411A (en) * 2019-12-27 2020-04-21 北京中电普华信息技术有限公司 Power grid data safe storage method and system
CN111352996A (en) * 2020-02-26 2020-06-30 百度在线网络技术(北京)有限公司 Data sharing method, device, equipment and medium based on block chain network
CN111352996B (en) * 2020-02-26 2023-09-19 百度在线网络技术(北京)有限公司 Data sharing method, device, equipment and medium based on block chain network
WO2021227867A1 (en) * 2020-05-11 2021-11-18 徐皓 Method and system for forming decentralized distributed database, electronic device, and computer readable storage medium
CN111639369B (en) * 2020-06-03 2022-12-06 科大讯飞股份有限公司 Data sharing method, device, storage medium and data sharing system
CN111639369A (en) * 2020-06-03 2020-09-08 科大讯飞股份有限公司 Data sharing method, device, storage medium and data sharing system
CN111865563A (en) * 2020-07-27 2020-10-30 北京航空航天大学 Civil aviation passenger data safety protection and anti-falsification scheme based on alliance chain
CN111865563B (en) * 2020-07-27 2022-01-14 北京航空航天大学 Civil aviation passenger data security protection and anti-falsification method based on alliance chain
CN112214544A (en) * 2020-08-28 2021-01-12 国网江西省电力有限公司信息通信分公司 Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN112182608A (en) * 2020-09-25 2021-01-05 中国人民大学 Regular sharing method and system for encrypted data of alliance chain
CN112182608B (en) * 2020-09-25 2023-10-20 中国人民大学 Method and system for regularly sharing alliance chain encryption data
CN112351001A (en) * 2020-10-21 2021-02-09 广州纳诺科技股份有限公司 Industrial Internet of things data sharing method, device and equipment based on block chain
CN112583598A (en) * 2020-11-10 2021-03-30 周口师范学院 Complex Internet of things alliance chain system communication mechanism
CN113610513A (en) * 2021-05-20 2021-11-05 山东省农业科学院科技信息研究所 Decentralized agricultural Internet of things system based on block chain
CN113746829A (en) * 2021-08-31 2021-12-03 平安银行股份有限公司 Multi-source data association method, device, equipment and storage medium
CN114785602A (en) * 2022-04-26 2022-07-22 国网四川省电力公司经济技术研究院 Power utilization data security sharing model, method and system
CN114785602B (en) * 2022-04-26 2023-08-25 国网四川省电力公司经济技术研究院 Electricity data safety sharing model, method and system
CN115378640A (en) * 2022-07-13 2022-11-22 重庆邮电大学 Cross-link data secure sharing method based on alliance link
CN115378640B (en) * 2022-07-13 2024-03-26 重庆邮电大学 Cross-chain data security sharing method based on alliance chain

Similar Documents

Publication Publication Date Title
CN110457926A (en) It is a kind of industry Internet of Things in based on data encryption storage data sharing method
US20230023857A1 (en) Data processing method and apparatus, intelligent device, and storage medium
CN109451467B (en) Vehicle-mounted self-organizing network data secure sharing and storage system based on block chain technology
Cui et al. Secure and efficient data sharing among vehicles based on consortium blockchain
Dai et al. Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks
Rathore et al. A blockchain-based deep learning approach for cyber security in next generation industrial cyber-physical systems
Li et al. Blockchain-based trust management model for location privacy preserving in VANET
Li et al. LBS meets blockchain: an efficient method with security preserving trust in SAGIN
CN109964446B (en) Consensus method based on voting
Hsiao et al. Employing blockchain technology to strengthen security of wireless sensor networks
Sun et al. Voting-based decentralized consensus design for improving the efficiency and security of consortium blockchain
CN109450638A (en) Electronic component data management system and method based on block chain
Wang et al. Secure ride-sharing services based on a consortium blockchain
CN112085504A (en) Data processing method and device, computer equipment and storage medium
Hsiao et al. Utilizing blockchain technology to improve WSN security for sensor data transmission
CN109979550A (en) A kind of block chain medical data management method and system based on distributed nature signature
CN113919846B (en) Block link point dynamic grouping method and device, computer equipment and storage medium
CN116383869A (en) Agricultural product supply chain credible traceability model based on PBFT consensus mechanism and implementation method
Javed et al. Secure message handling in vehicular energy networks using blockchain and artificially intelligent IPFS
Xia et al. Design of traceability system for medical devices based on blockchain
Li et al. Breaking down data sharing barrier of smart city: A digital twin approach
CN112948886A (en) Method for improving data transmission security based on block chain
Chen et al. A blockchain-based security model for IoT systems
CN112464253A (en) Large-scale agricultural product traceability management system based on block chain technology
Mershad et al. Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191115