CN110457926A - It is a kind of industry Internet of Things in based on data encryption storage data sharing method - Google Patents
It is a kind of industry Internet of Things in based on data encryption storage data sharing method Download PDFInfo
- Publication number
- CN110457926A CN110457926A CN201910743124.1A CN201910743124A CN110457926A CN 110457926 A CN110457926 A CN 110457926A CN 201910743124 A CN201910743124 A CN 201910743124A CN 110457926 A CN110457926 A CN 110457926A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- aggregator
- block
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to industrial circles and computer field, more particularly to a kind of data sharing method based on data encryption storage in industrial Internet of Things, including alliance's catenary system, alliance's catenary system includes data aggregator, proof of work module, data block generation module, intelligent contract processing module;The data aggregator includes local controller and record pond;The proof of work module is used to determine the data accounting management permission in some period;The data block generation module is used to the transaction record stored in the data aggregator for possessing effective proof of work in proof of work module being stored in data storage in systems according to chronological order;The intelligence contract processing module is to verify whether sharing request meets access constraints condition during data sharing;The present invention effectively can solve the problems, such as how to store and utilize existing agricultural data by the system, to avoid the information island effect of agricultural data.
Description
Technical field
The present invention relates to deposited in industrial circle and computer field more particularly to a kind of industrial Internet of Things based on data encryption
The data sharing method of storage.
Background technique
Industrial Internet of Things is that will have perception, all kinds of acquisitions of monitoring capacity, control sensor or controller, and movement
The technologies such as communication, intellectual analysis are constantly dissolved into industrial processes links, to greatly improve manufacture efficiency, improve and produce
Quality, reduces product cost and resource consumption, and final realize promotes traditional industry to the intelligentized new stage.
In recent years, China's construction of agricultural informationization is quickly grown, and all parts of the country establish a large amount of Agricultural Information Websites, agricultural
Data are effectively accumulated.But since attention degree of the scientific research in China to data sharing is insufficient, so that the benefit of data
It is very low with rate, the great wasting of resources is caused, while Construction of Agricultural Information Website is relatively independent, regional significant, each agricultural letter
Breath lacks unified specification between website, for example the form of data storage is different etc., causes data mutually indepedent, to be formed
Information island effect, so that agricultural data is difficult to directly utilize.Conventional data sharing mode is all to transmit data to one
A reliable central node carries out data storage and shares, but is faced with the mode that central node carries out data sharing
Common defect, for example, the malicious attack concentrated;The Single Point of Faliure of central node;The malice of data center's storing data is distorted
The problems such as.Therefore, how to store and be that IT application to agriculture is for study and solve the problems, such as using available data.
Block chain technology refers to the technology that an authentic data library is safeguarded by decentralization collective, has and goes trust, nothing
The common recognition feature such as center, multi-party participation, authentic data library.Block chain technology realizes block data using asymmetric encryption techniques
Storage knows together algorithm using distributed node to generate and more new data.Data can be guaranteed using distributed data method
Secure storage, while it being not need to rely on global believable third party, so as to avoid the malicious attack concentrated.Cause
This, these technologies and feature of block chain provide solution with sharing problem for data storage in industrial Internet of Things.
Summary of the invention
In order to facilitate the storage of Agricultural Information and shared, the present invention proposes to deposit in a kind of industrial Internet of Things based on data encryption
The data sharing method of storage, including alliance's catenary system, alliance's catenary system include data aggregator, encryption information generation mould
Block, data encryption module, proof of work module, data block generation module, intelligent contract processing module;The data aggregate
Device includes local controller and record pond;When carrying out data storage in alliance's chain, alliance's catenary system is raw using encryption information
Certificate, private key, public key and signature are generated at module, data encryption module will according to node certificate, private key, public key and signature
The data encryption of node is stored in the record pond of data aggregator, if data to be uploaded are authentic and valid, passes through workload
Module is proved to determine the node for possessing book keeping operation power, writes data into block chain using data block generation module by the node
In;When requesting shared data in alliance's catenary system, if if a node initiates request of data, intelligent contract to another node
Processing module judges whether the nodes sharing data for agreeing to receive request of data, if agreeing to share, the data of encryption are sent to
The node of heat request of data, the node for initiating request of data are decrypted data using the private key of oneself, and it is total to complete data
It enjoys.
Further, the specific steps of progress data storage include: in alliance's chain
S101, system are that each legal node issues the public key for encryption data, private key and number label in the whole network
Name simultaneously generates certificate for each legitimate node;When system is initialized, node is from the record pond of neighbouring data aggregator
Middle acquisition block data storage location concordance list;
When S102, node upload monitoring data, the digital signature of node is first sent to data aggregator and carries out identity
Verifying, using the public key encryption monitoring data of node, encloses the signature of encrypted monitoring data after receiving confirmation and replying
Data aggregator is sent jointly to together with encrypted monitoring data afterwards, data aggregator is using public key itself to the number received
According to being encrypted, data to be uploaded are obtained;
S103, data aggregator carry out legitimacy detection to data to be uploaded, that is, judge whether data to be uploaded are safe
Effectively, if by detection, should data to be uploaded save in the record pond of data aggregator, otherwise, directly ignore this to upper
Pass data;
S104, data accounting management permission in some period is determined by way of proof of work, obtain permission
Data aggregator mays be eligible to for the data of signature being written in data block chain, i.e., data aggregator will be in local a period of time
The valid data being collected into carry out packing signature, and subsequent data aggregator can compete qualification for the number of signature by proof of work
According in block write-in data block chain;
Consensus rules are executed between S105, data aggregator, to keep block data consistent, are known together and are calculated by Byzantine failure tolerance
Method come realize data sharing alliance catenary system block common recognition.
Further, the process of shared data is requested to specifically include in alliance's catenary system:
S201, node NmTo node NiIssue data sharing request, node NiFirst verify node NmThe legitimacy of identity, is tested
After card passes through, node NiFor node NmThe access constraints that data are arranged are regular (data sharing range, timeliness, number), with deutomerite
Point NiThe private key of these constraint rules and accessed data block is sent to corresponding data aggregator;
S202, data aggregator are checked after receiving transaction data, automatic to execute intelligent contract after verifying;
If S203, node NmWith node NiCorresponding is same data aggregator, then the current data for executing intelligent contract
Shared data is transmitted directly to node N by polymerizerm;Otherwise, the data aggregator of the intelligent contract of current execution is by shared number
According to being sent to node NmCorresponding data aggregator, and by node NmCorresponding data aggregator sends the data to node Nm;
S204, node NmAfter the shared data for receiving return, the number of results received is carried out using the private key of itself
Decryption obtains data.
Further, monitoring data include metadata type, metadata tag, upload information and timestamp;Wherein supervise
The data that measured data as needs to upload, upload information include agricultural product supplier and products in circulation process involved by production
Quotient.
Further, qualification is competed for the process packet in the data block write-in data block chain of signature by proof of work
It includes: by the combination P_ of the cryptographic Hash of a random number x and previous block, the Merkel root of timestamp and current data block
Cryptographic Hash of the Hash of data as current block, is expressed as
Hash (x+P_data), using the cryptographic Hash as proof of work, if the proof of work is in data sharing alliance
Data aggregator in catenary system is at war with calculating, calculates the data aggregator of the value of random number x at first as host node,
It obtains the qualification of signed data block write-in block chain, other data aggregators are used as from node;Wherein Hash (x+P_data)
< difficulty, difficulty are the threshold values for controlling the value speed that data aggregator calculates x.
Further, the area sended over as the data aggregator from node by the data aggregator as host node
Block Hash and digital signature carry out the legitimacy and correctness of verify data block, and using each data aggregator as from node
Auditing result enclose respective digital signature and be broadcast to other as the data aggregator from node, to realize as from section
Mutual supervision and common examination between the data aggregator of point.
Further, node NiFirst verify node NmWhen the legitimacy of identity, need to verify node NmThe data sharing of sending
The details of data access in request, including access target, access time and access frequency, are accessed by verify data
Details legitimacy, to judge the legitimacy of node identities.
Further, the process that data aggregator executes intelligent contract automatically includes according to node NiThe access constraints of setting
Rule locking script, and using the private key of data block to data deciphering, by the shared data and node N after decryptionmPublic key into
The public key of shared data and node after decryption is carried out the later content of asymmetric encryption as execution by row asymmetric encryption
The output result of intelligent contract.
Data storage alliance catenary system used in the present invention, compared with traditional information sharing, the main body of superiority
Now, firstly, it guarantees the secure storage of data using Distributed Storage mode, global believable third party is not depended on
Entity is subject to the risk of malicious attack so as to avoid the central node of conventional center date storage method;Secondly, anti-
Only deliberately distort storing data.These speciality can effectively ensure the authenticity and effectively stored for shared agricultural data
Property, to avoid the information island effect of current agricultural data.
Detailed description of the invention
Fig. 1 is that data of the present invention store and shared system structure diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment 1
In the present embodiment, the data sharing method based on data encryption storage in a kind of industrial Internet of Things is provided, including
Alliance's catenary system, alliance's catenary system include data aggregator, encryption information generation module, data encryption module, workload
Prove module, data block generation module, intelligent contract processing module;The data aggregator includes local controller and note
Record pond;Wherein:
Encryption information module is used to be that legitimate node in system generates certificate and is that legitimate node in system promulgates use
In the public key, private key and signature of encryption data;
Data encryption module is docked for the public key encryption monitoring data of node and using data aggregator public key itself
The data received are encrypted;
The proof of work module is used for before block chain is added in new data block, between the data aggregator of pre-selection
Acquisition book keeping operation be at war with temporary, effective proof of work is found in competition between each data aggregator, is most found fastly effectively
The data aggregator of proof of work will be rewarded, which is responsible for audit transactions and records and transaction record is set up
At data block new in system;
The data block generation module is for gathering the data for possessing effective proof of work in proof of work module
The transaction record stored in clutch is stored in data storage in systems according to chronological order;
The intelligence contract processing module is used for when meeting intelligent contract, automatic to execute task clause, according to setting in advance
The share and access of fixed Authority Contro1 data operates;
The local controller is used to be used to the data for the required storage that integration node uploads;
The record pond is used to store the data of local controller integration.
Further, when the data that local controller uploads node are integrated, need to judge the information that node uploads
Legitimacy, if upload information it is legal, legal information integrate and be stored in record pond;Otherwise directly ignore on the node
The data of biography.
In alliance's chain carry out data storage when, alliance's catenary system using encryption information generation module generate certificate, private key,
The data encryption of node is stored in by public key and signature, data encryption module according to node certificate, private key, public key and signature
In the record pond of data aggregator, if data to be uploaded are authentic and valid, determined by proof of work module and possess note
The node of account power, is write data into block chain by the node using data block generation module;It is requested in alliance's catenary system
When shared data, if intelligent contract processing module judges whether to agree to if a node initiates request of data to another node
The nodes sharing data of request of data are received, if agreeing to share, the data of encryption are sent to the node of heat request of data, are sent out
The node for playing request of data is decrypted data using the private key of oneself, completes data sharing.
Embodiment 2
In the present embodiment, on the basis of embodiment 1, a kind of specific step that data storage is carried out in alliance's chain is proposed
Suddenly, comprising:
S101, system are that each legal node issues the public key for encryption data, private key and number label in the whole network
Name obtains data storage location concordance list from the record pond of corresponding data aggregator with posterior nodal point;
When S102, node upload monitoring data, the digital signature of node is first sent to data aggregator and carries out identity
Verifying, using the public key encryption monitoring data of node, encloses the signature of encrypted monitoring data after receiving confirmation and replying
Data aggregator is sent jointly to together with encrypted monitoring data afterwards, data aggregator is using public key itself to the number received
According to being encrypted, data to be uploaded are obtained;
S103, data aggregator carry out legitimacy detection to data to be uploaded, if by detection, it should data to be uploaded
In the record pond for saving data aggregator, otherwise, directly ignore the data to be uploaded;
Data in local a period of time can be carried out packing signature, subsequent data aggregator meeting by S104, data aggregator
It competes qualification by proof of work the data block of signature is written in data block chain;
Consensus rules are executed between S105, data aggregator, to keep block data consistent, are known together and are calculated by Byzantine failure tolerance
Method come realize data sharing alliance catenary system block common recognition.
Further, system is that each legal node passes through BLS short signature technology generation certificate;It and is each legal
Node issues the public key, private key and signature for encryption data, and a node is expressed as public key, private key is expressed as with signingWhereinIt for the public key of node, is generated by BLS short signature technology, effect is
For encrypting data to be uploaded;For node private key by BLS short signature technology generate, effect be to data into
Row decryption;It is the signature of node, is generated by BLS short signature technology, effect is to carry out authentication.
Further, node NiWhen uploading monitoring data, first by node NiSignature Sig_1 and certificateIt is sent to
Data aggregator carries out the verifying of identity, after receiving confirmation and replying, uses the public key of nodeIt encrypts to be uploaded
Data Data is enclosed and is sent jointly to local data polymerizer (such as BS after the signature of encryption dataj), data aggregator utilizes
Public key itselfThe data received are encrypted, to obtain final upload data Record, detailed process can be with
It indicates are as follows:
Wherein:
Wherein, BSjIndicate j-th of data aggregator;Record indicates final and uploads data;It indicates to use number
According to polymerizer BSjPublic key encryption information m;Data_1 indicates data of the data Data after encryption;Indicate label
Name;Timestamp indicates timestamp;
Further, data aggregator BSjLegitimacy detection is carried out to the data Record of upload, if by detection,
Just data are saved in the memory block of polymerizer, otherwise, directly ignore the data.
Further, the data of local a period of time (such as 10min) can be carried out packing signature by data aggregator, then
Data aggregator can compete qualification by proof of work and the data block of signature is written in data block chain;Wherein, workload
Prove to be actually by cryptographic Hash, the Merkel root of timestamp and current data block of a random number x and previous block
Combination P_data cryptographic Hash of the Hash as current block, Hash (x+P_data) is expressed as, using the cryptographic Hash as work
Work amount proof, the calculating if data aggregator of the proof of work in data sharing alliance catenary system is at war with, is counted at first
The data aggregator of the value of random number x is calculated as host node, is obtained the qualification of signed data block write-in block chain, other numbers
It is used as according to polymerizer from node;Wherein Hash (x+P_data) < difficulty, difficulty are control data aggregator
Calculate the threshold values of the value speed of x.
Further, the area sended over as the data aggregator from node by the data aggregator as host node
Block Hash and digital signature carry out the legitimacy and correctness of verify data block, and using each data aggregator as from node
Auditing result enclose respective digital signature and be broadcast to other as the data aggregator from node, to realize as from section
Mutual supervision and common examination between the data aggregator of point.
Further, consensus rules are executed between data aggregator, to keep block data consistent, data sharing alliance linkwork
The block common recognition of system knows together algorithm by Byzantine failure tolerance to realize.
Embodiment 3
The present embodiment proposes a kind of specific steps that data storage is carried out in alliance's chain on the basis of embodiment 1, if
Node NiCorresponding data aggregator, node N are stored data according to the method for embodiment 2mAccording to the following steps to node Ni
Request data is shared, comprising:
Node NiCorresponding data aggregator, node N are stored data according to the method for embodiment 2mAccording to the following steps
To node NiRequest data is shared:
S201, node NmTo node NiIssue data sharing request, node NiFirst verify node NmThe legitimacy of identity, is tested
After card passes through, for node NmThe access authority rule of data is set, with posterior nodal point NiThese constraint rules and accessed data
The private key of block is sent to corresponding data aggregator;Wherein, access constraints rule includes the range, timeliness, number of data sharing,
When meeting these rules, data sharing could be effectively carried out;
S202, data aggregator are checked after receiving transaction data, automatic to execute intelligent contract after verifying;
S203, shared data is sent, if node NmWith node NiCorresponding is same data aggregator, then current execute
Shared data is transmitted directly to node N by the data aggregator of intelligent contractm;Otherwise, the data of the intelligent contract of current execution
Shared data is sent to node N by polymerizermCorresponding data aggregator, and by node NmCorresponding data aggregator is by data
It is sent to node Nm;
S204, node NmAfter the shared data for receiving return, the number of results received is carried out using the private key of itself
Decryption obtains data.
Further, node NmTo node NiIt issues data sharing and requests Req, include the detailed letter of data access in request
Breath, such as access target, access time, access frequency etc., node NiFirst verify node NmThe legitimacy of identity, after being verified,
Node NmFor node NiAccess constraints condition C onstrainsts (such as data sharing range, timeliness, the number of data are set
Deng), with posterior nodal point NmThe private key of these constraint rules and accessed data blockIt is sent to corresponding data aggregator
BSj, the procedural representation are as follows:
Wherein, Request indicates request;Expression is encrypted using the public key of node Nk;Indicate node
NmSignature;Expression is encrypted using the public key of data aggregator BSj;Constrants indicates access constraints rule;Indicate the private key of accessed data block;Indicate node NmPublic key;Indicate node NiSignature.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (8)
1. the data sharing method based on data encryption storage in a kind of industry Internet of Things, including alliance's catenary system, the alliance
Catenary system includes data aggregator, encryption information generation module, data encryption module, proof of work module, data block life
At module, intelligent contract processing module;The data aggregator includes local controller and record pond;It is characterized in that, In
When carrying out data storage in alliance's chain, alliance's catenary system generates certificate, private key, public key and label using encryption information generation module
The data encryption of node is stored in data aggregator according to node certificate, private key, public key and signature by name, data encryption module
Record pond in, if data to be uploaded are authentic and valid, determined by proof of work module possess book keeping operation power node,
It is write data into block chain by the node using data block generation module;When requesting shared data in alliance's catenary system,
If a node initiates request of data to another node, intelligent contract processing module judges whether to agree to that this receives request of data
Node carry out shared data, if agreeing to shared, the data of encryption are sent to the node for initiating request of data, data is initiated and asks
The node asked is decrypted data using the private key of oneself, completes data sharing.
2. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 1, special
Sign is that the specific steps that data storage is carried out in alliance's chain include:
S101, system be the whole network in each legal node issue for encryption data public key, private key and digital signature simultaneously
Certificate is generated for each legitimate node;When system is initialized, node is obtained from the record pond of neighbouring data aggregator
Take block data storage location concordance list;
When S102, node upload monitoring data, the digital signature of node is first sent to data aggregator and carries out authentication, etc.
To receiving after confirmation replys, using the public key encryption monitoring data of node, enclose after the signature of encrypted monitoring data together with
Encrypted monitoring data send jointly to data aggregator, and data aggregator carries out the data received using public key itself
Encryption, obtains data to be uploaded;
S103, data aggregator carry out legitimacy detection to data to be uploaded, that is, judge whether data to be uploaded are safe and effective,
If by detection, should data to be uploaded save in the record pond of data aggregator, otherwise, directly ignore the number to be uploaded
According to;
S104, data accounting management permission in some period is determined by way of proof of work, obtain the data of permission
Polymerizer mays be eligible to for the data of signature being written in data block chain, i.e., data aggregator will collect in local a period of time
To valid data carry out packing signature, subsequent data aggregator determines the qualified data block by signature by proof of work
The data aggregator in data block chain is written;
Consensus rules are executed between S105, data aggregator, it is real by Byzantine failure tolerance common recognition algorithm to keep block data consistent
The block common recognition of existing data sharing alliance catenary system.
3. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 2, special
Sign is that monitoring data include metadata type, metadata tag, upload information and timestamp.
4. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 2, special
Sign is that competing the process that the data block of signature is written in data block chain for qualification by proof of work includes: by one
The Hash of the combination P_data of the cryptographic Hash of random number x and previous block, the Merkel root of timestamp and current data block
As the cryptographic Hash of current block, it is expressed as Hash (x+P_data), using the cryptographic Hash as proof of work, if the workload
Prove that data aggregator in data sharing alliance catenary system is at war with calculating, calculates the number of the value of random number x at first
According to polymerizer as host node, obtain the qualification of signed data block write-in block chain, other data aggregators are used as from node;
Wherein Hash (x+P_data) < difficulty, difficulty are the valve for controlling the value speed that data aggregator calculates x
Value.
5. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 2, special
Sign is, the block Hash sum number sended over as the data aggregator from node by the data aggregator as host node
Word signature carrys out the legitimacy and correctness of verify data block, and using each as the auditing result of the data aggregator from node
It encloses respective digital signature and is broadcast to other as the data aggregator from node, realize as the data aggregate from node
Mutual supervision and common examination between device.
6. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 1, special
Sign is, requests the process of shared data to specifically include in alliance's catenary system:
S201, node NmTo node NiIssue data sharing request, node NiFirst verify node NmThe legitimacy of identity, is verified
Afterwards, for node NmThe access constraints rule of data, node N are setiThese constraint rules and the private key of accessed data block are sent out
Give corresponding data aggregator;
S202, data aggregator are checked after receiving transaction data, automatic to execute intelligent contract after verifying;
If S203, node NmWith node NiCorresponding is same data aggregator, then the current data aggregate for executing intelligent contract
Shared data is transmitted directly to node N by devicem;Otherwise, the data aggregator of the intelligent contract of current execution sends out shared data
Give node NmCorresponding data aggregator, and by node NmCorresponding data aggregator sends the data to node Nm;
S204, node NmAfter the shared data for receiving return, the number of results received is decrypted using the private key of itself,
Obtain data.
7. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 6, special
Sign is, node NiFirst verify node NmWhen the legitimacy of identity, need to verify node NmNumber in the data sharing request of sending
According to the details of access, including access target, access time and access frequency, the details accessed by verify data
Legitimacy, to judge the legitimacy of node identities.
8. the data sharing method based on data encryption storage in a kind of industrial Internet of Things according to claim 6, special
Sign is that the process that data aggregator executes intelligent contract automatically includes according to node NiThe access constraints rule of setting locks foot
This, and using the private key of data block to data deciphering, by the shared data and node N after decryptionmPublic key carry out it is asymmetric plus
It is close, the public key of shared data and node after decryption is subjected to the later content of asymmetric encryption as the intelligent contract of execution
Export result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910743124.1A CN110457926A (en) | 2019-08-13 | 2019-08-13 | It is a kind of industry Internet of Things in based on data encryption storage data sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910743124.1A CN110457926A (en) | 2019-08-13 | 2019-08-13 | It is a kind of industry Internet of Things in based on data encryption storage data sharing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110457926A true CN110457926A (en) | 2019-11-15 |
Family
ID=68486080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910743124.1A Pending CN110457926A (en) | 2019-08-13 | 2019-08-13 | It is a kind of industry Internet of Things in based on data encryption storage data sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110457926A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111049657A (en) * | 2019-12-10 | 2020-04-21 | 成都理工大学 | CAN bus network equipment node access authority management method and system |
CN111046411A (en) * | 2019-12-27 | 2020-04-21 | 北京中电普华信息技术有限公司 | Power grid data safe storage method and system |
CN111352996A (en) * | 2020-02-26 | 2020-06-30 | 百度在线网络技术(北京)有限公司 | Data sharing method, device, equipment and medium based on block chain network |
CN111639369A (en) * | 2020-06-03 | 2020-09-08 | 科大讯飞股份有限公司 | Data sharing method, device, storage medium and data sharing system |
CN111865563A (en) * | 2020-07-27 | 2020-10-30 | 北京航空航天大学 | Civil aviation passenger data safety protection and anti-falsification scheme based on alliance chain |
CN112182608A (en) * | 2020-09-25 | 2021-01-05 | 中国人民大学 | Regular sharing method and system for encrypted data of alliance chain |
CN112214544A (en) * | 2020-08-28 | 2021-01-12 | 国网江西省电力有限公司信息通信分公司 | Ubiquitous power Internet of things edge data safe storage method based on permission block chain |
CN112351001A (en) * | 2020-10-21 | 2021-02-09 | 广州纳诺科技股份有限公司 | Industrial Internet of things data sharing method, device and equipment based on block chain |
CN112583598A (en) * | 2020-11-10 | 2021-03-30 | 周口师范学院 | Complex Internet of things alliance chain system communication mechanism |
CN113610513A (en) * | 2021-05-20 | 2021-11-05 | 山东省农业科学院科技信息研究所 | Decentralized agricultural Internet of things system based on block chain |
WO2021227867A1 (en) * | 2020-05-11 | 2021-11-18 | 徐皓 | Method and system for forming decentralized distributed database, electronic device, and computer readable storage medium |
CN113746829A (en) * | 2021-08-31 | 2021-12-03 | 平安银行股份有限公司 | Multi-source data association method, device, equipment and storage medium |
CN114785602A (en) * | 2022-04-26 | 2022-07-22 | 国网四川省电力公司经济技术研究院 | Power utilization data security sharing model, method and system |
CN115378640A (en) * | 2022-07-13 | 2022-11-22 | 重庆邮电大学 | Cross-link data secure sharing method based on alliance link |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104982006A (en) * | 2013-04-10 | 2015-10-14 | 华为技术有限公司 | System and method for providing a software defined protocol stack |
CN107018125A (en) * | 2017-02-17 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of block catenary system, date storage method and device |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
WO2019072301A2 (en) * | 2018-12-21 | 2019-04-18 | Alibaba Group Holding Limited | Verifying integrity of data stored in a consortium blockchain using a public sidechain |
CN109768987A (en) * | 2019-02-26 | 2019-05-17 | 重庆邮电大学 | A kind of storage of data file security privacy and sharing method based on block chain |
-
2019
- 2019-08-13 CN CN201910743124.1A patent/CN110457926A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104982006A (en) * | 2013-04-10 | 2015-10-14 | 华为技术有限公司 | System and method for providing a software defined protocol stack |
CN107018125A (en) * | 2017-02-17 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of block catenary system, date storage method and device |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
WO2019072301A2 (en) * | 2018-12-21 | 2019-04-18 | Alibaba Group Holding Limited | Verifying integrity of data stored in a consortium blockchain using a public sidechain |
CN109768987A (en) * | 2019-02-26 | 2019-05-17 | 重庆邮电大学 | A kind of storage of data file security privacy and sharing method based on block chain |
Non-Patent Citations (1)
Title |
---|
吴振铨 等: ""基于联盟区块链的智能电网数据安全存储与共享系统"", 《计算机应用》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111049657A (en) * | 2019-12-10 | 2020-04-21 | 成都理工大学 | CAN bus network equipment node access authority management method and system |
CN111046411A (en) * | 2019-12-27 | 2020-04-21 | 北京中电普华信息技术有限公司 | Power grid data safe storage method and system |
CN111352996A (en) * | 2020-02-26 | 2020-06-30 | 百度在线网络技术(北京)有限公司 | Data sharing method, device, equipment and medium based on block chain network |
CN111352996B (en) * | 2020-02-26 | 2023-09-19 | 百度在线网络技术(北京)有限公司 | Data sharing method, device, equipment and medium based on block chain network |
WO2021227867A1 (en) * | 2020-05-11 | 2021-11-18 | 徐皓 | Method and system for forming decentralized distributed database, electronic device, and computer readable storage medium |
CN111639369B (en) * | 2020-06-03 | 2022-12-06 | 科大讯飞股份有限公司 | Data sharing method, device, storage medium and data sharing system |
CN111639369A (en) * | 2020-06-03 | 2020-09-08 | 科大讯飞股份有限公司 | Data sharing method, device, storage medium and data sharing system |
CN111865563A (en) * | 2020-07-27 | 2020-10-30 | 北京航空航天大学 | Civil aviation passenger data safety protection and anti-falsification scheme based on alliance chain |
CN111865563B (en) * | 2020-07-27 | 2022-01-14 | 北京航空航天大学 | Civil aviation passenger data security protection and anti-falsification method based on alliance chain |
CN112214544A (en) * | 2020-08-28 | 2021-01-12 | 国网江西省电力有限公司信息通信分公司 | Ubiquitous power Internet of things edge data safe storage method based on permission block chain |
CN112182608A (en) * | 2020-09-25 | 2021-01-05 | 中国人民大学 | Regular sharing method and system for encrypted data of alliance chain |
CN112182608B (en) * | 2020-09-25 | 2023-10-20 | 中国人民大学 | Method and system for regularly sharing alliance chain encryption data |
CN112351001A (en) * | 2020-10-21 | 2021-02-09 | 广州纳诺科技股份有限公司 | Industrial Internet of things data sharing method, device and equipment based on block chain |
CN112583598A (en) * | 2020-11-10 | 2021-03-30 | 周口师范学院 | Complex Internet of things alliance chain system communication mechanism |
CN113610513A (en) * | 2021-05-20 | 2021-11-05 | 山东省农业科学院科技信息研究所 | Decentralized agricultural Internet of things system based on block chain |
CN113746829A (en) * | 2021-08-31 | 2021-12-03 | 平安银行股份有限公司 | Multi-source data association method, device, equipment and storage medium |
CN114785602A (en) * | 2022-04-26 | 2022-07-22 | 国网四川省电力公司经济技术研究院 | Power utilization data security sharing model, method and system |
CN114785602B (en) * | 2022-04-26 | 2023-08-25 | 国网四川省电力公司经济技术研究院 | Electricity data safety sharing model, method and system |
CN115378640A (en) * | 2022-07-13 | 2022-11-22 | 重庆邮电大学 | Cross-link data secure sharing method based on alliance link |
CN115378640B (en) * | 2022-07-13 | 2024-03-26 | 重庆邮电大学 | Cross-chain data security sharing method based on alliance chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110457926A (en) | It is a kind of industry Internet of Things in based on data encryption storage data sharing method | |
US20230023857A1 (en) | Data processing method and apparatus, intelligent device, and storage medium | |
CN109451467B (en) | Vehicle-mounted self-organizing network data secure sharing and storage system based on block chain technology | |
Cui et al. | Secure and efficient data sharing among vehicles based on consortium blockchain | |
Dai et al. | Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks | |
Rathore et al. | A blockchain-based deep learning approach for cyber security in next generation industrial cyber-physical systems | |
Li et al. | Blockchain-based trust management model for location privacy preserving in VANET | |
Li et al. | LBS meets blockchain: an efficient method with security preserving trust in SAGIN | |
CN109964446B (en) | Consensus method based on voting | |
Hsiao et al. | Employing blockchain technology to strengthen security of wireless sensor networks | |
Sun et al. | Voting-based decentralized consensus design for improving the efficiency and security of consortium blockchain | |
CN109450638A (en) | Electronic component data management system and method based on block chain | |
Wang et al. | Secure ride-sharing services based on a consortium blockchain | |
CN112085504A (en) | Data processing method and device, computer equipment and storage medium | |
Hsiao et al. | Utilizing blockchain technology to improve WSN security for sensor data transmission | |
CN109979550A (en) | A kind of block chain medical data management method and system based on distributed nature signature | |
CN113919846B (en) | Block link point dynamic grouping method and device, computer equipment and storage medium | |
CN116383869A (en) | Agricultural product supply chain credible traceability model based on PBFT consensus mechanism and implementation method | |
Javed et al. | Secure message handling in vehicular energy networks using blockchain and artificially intelligent IPFS | |
Xia et al. | Design of traceability system for medical devices based on blockchain | |
Li et al. | Breaking down data sharing barrier of smart city: A digital twin approach | |
CN112948886A (en) | Method for improving data transmission security based on block chain | |
Chen et al. | A blockchain-based security model for IoT systems | |
CN112464253A (en) | Large-scale agricultural product traceability management system based on block chain technology | |
Mershad et al. | Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191115 |