CN110677234A - Privacy protection method and system based on homomorphic encryption block chain - Google Patents
Privacy protection method and system based on homomorphic encryption block chain Download PDFInfo
- Publication number
- CN110677234A CN110677234A CN201910359650.8A CN201910359650A CN110677234A CN 110677234 A CN110677234 A CN 110677234A CN 201910359650 A CN201910359650 A CN 201910359650A CN 110677234 A CN110677234 A CN 110677234A
- Authority
- CN
- China
- Prior art keywords
- information
- home intelligent
- network
- block chain
- intelligent gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a privacy protection method and a privacy protection system based on a homomorphic encryption block chain, which comprise the following steps: each home intelligent gateway is a node, and a plurality of home intelligent gateways form a block chain; distributing a pair of secret keys for each home intelligent gateway in the block chain, and setting a whole network secret key simultaneously; dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store the public key of each home intelligent gateway; each home intelligent gateway receives and stores monitoring terminal acquired information acquired by the sensor, divides the information into visible information and invisible information, homomorphically encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway; carrying out whole network verification on the data packet; and the accounting node writes all verified data into a new block in a period of time and is connected to the tail part of the main block chain.
Description
Technical Field
The invention relates to a privacy protection method, in particular to a privacy data protection method based on a block chain.
Background
With the development and integration of computer technology, Internet technology and communication technology, an Internet of things (IOT) -based smart home system has come into operation. In such systems, the effective Device-to-Device (D2D) communication is largely dependent on the computing power of the edge devices, and the development of Edge Computing (EC) technology has brought computing power closer to the user. By addressing the demand at the edge, faster response is provided to the user.
At present, in an intelligent home system, the information of the health condition and information of an individual user transmitted and stored through a mobile phone, a tablet computer, a wireless sensor and a wearable personal health device is increasing continuously. Since the medical devices in the system record the sensitive information of the user, such as Blood Pressure (BP), Heart Rate (HR), Respiratory Rate (RR), etc., if the personal sensitive information is maliciously attacked or leaked, irreparable loss will be caused. Therefore, information security and privacy protection issues in smart home edge devices are of interest to many researchers. The documents Security and privacy issues for an IoT based smart home provide a smart home IoT architecture that allows users to interact through various devices that support smart home management and analyze different scenarios to determine possible Security and privacy issues for the users. The document Low-cost flow-based security solutions for smart home IoT devices provides a solution for future smart home network-level security, namely, the flow-based monitoring not only realizes most of security advantages of packet-based monitoring, but also reduces the processing cost. Document a Host-based intrusion Detection and classification Framework for Smart Home IoT using openflow proposes an internet of things intrusion Detection and Mitigation Framework (IoT-IDM) to provide network-level protection for Smart devices deployed in a Home environment. The method is mainly used for monitoring network activities of expected intelligent devices in a home environment and investigating whether any suspicious or malicious activities exist. Although the above method protects the privacy security of the user to some extent, there still exist some architectural problems. For example, the above documents all adopt a central transaction data processing mechanism, and if a central node is trapped, the security and privacy of device data are difficult to guarantee.
Disclosure of Invention
The invention provides a novel intelligent home system data distribution and privacy protection method, which provides safer privacy guarantee for data exchange between intelligent devices facing edge computing by combining homomorphic encryption and block chain technology.
In order to solve the technical problems, the invention adopts the following technical scheme:
a privacy protection method based on a homomorphic encryption block chain comprises the following steps:
ST 1: establishing an intelligent home system model, wherein the intelligent home system model is a quintuple:
(MT,HIG,SC,CT,α,β)
wherein:
(1)MT={mti|i∈N+is a finite set of monitor terminals, where mtiIndicating the ith monitoring terminal;
(2)HIG={higi|i∈N+is a limited set of home intelligent gateways, among which higiRepresenting the ith home intelligent gateway, wherein a plurality of home intelligent gateways form a block chain;
(3)SC={sci|i∈N+is a finite set of perceptrons, with sciRepresents the ith sensor;
each home intelligent gateway is a node, and a plurality of home intelligent gateways form a block chain;
ST 2: distributing a pair of secret keys for each home intelligent gateway in a block chain, wherein the pair of secret keys comprises a public key and a private key, and meanwhile, setting a whole-network secret key, and the whole-network secret key comprises a whole-network public key and a whole-network secret key;
ST 3: dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store the public key of each home intelligent gateway;
ST 4: each home intelligent gateway receives and stores information of the monitoring terminal acquired by the sensor, divides the information into visible information and invisible information, homomorphically encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
ST 5: carrying out whole network verification on the data packet;
ST 6: and the accounting node writes all verified data into a new block in a period of time and is connected to the tail part of the main block chain.
The block data construction method of each block in the block chain comprises the following steps:
dividing information stored by each home intelligent gateway into visible information and invisible information;
homomorphic encryption is carried out on invisible information by using a whole network public key to generate a ciphertext;
the ciphertexts of the plurality of home intelligent gateways stored in the same block are stored in the block for recording;
and generating a unique root hash value after carrying out hash operation on the ciphertexts of the plurality of home intelligent gateways stored in the same block, storing the unique root hash value into a block head, and storing a full-network public key for homomorphic encryption on the ciphertexts in the block head at the same time.
In ST5, the performing full network authentication on the packet includes:
each data packet is provided with a private key signature of the home intelligent gateway, the common node determines to send the data packet to the home intelligent gateway of the network by inquiring the public key of each home intelligent gateway stored in the special node, then the node sends a homomorphic decryption request to a credible third-party service to verify the authenticity of information, and the third-party service sends decryption data to a requester for decryption after receiving the request according to the whole network private key.
In ST6, after the transaction information is successfully verified, each home intelligent gateway selects a billing node of the whole network according to the POW consensus algorithm, and the billing node writes all information in a period of time into a new block and links the new block to the tail end of the main block chain.
And randomly distributing a pair of secret keys for each home intelligent gateway through a third-party trust mechanism, and simultaneously randomly distributing a whole network secret key through the third-party trust mechanism.
A system for applying the method, comprising:
each home intelligent gateway in the home intelligent gateway set is a node, and a plurality of home intelligent gateways form a block chain;
each sensor in the sensor set can acquire monitoring information generated by the monitoring terminal and transmit the monitoring information to the corresponding home intelligent gateway;
the monitoring terminal set comprises monitoring terminals, wherein each monitoring terminal in the monitoring terminal set can generate monitoring information;
a processor capable of implementing the method of:
(1) distributing a pair of secret keys for each home intelligent gateway in a block chain, wherein the pair of secret keys comprises a public key and a private key, and meanwhile, setting a whole-network secret key, and the whole-network secret key comprises a whole-network public key and a whole-network secret key;
(2) dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store the public key of each home intelligent gateway;
(3) each home intelligent gateway receives and stores information collected by the monitoring terminal, divides the information into visible information and invisible information, homomorphically encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
(4) carrying out whole network verification on the data packet;
(5) and the accounting node writes all verified data into a new block in a period of time and is connected to the tail part of the main block chain.
The invention has the beneficial effects that: according to the invention, by implementing a homomorphic encryption and distribution protection mechanism on the sensitive data of the user, a safer privacy guarantee can be provided for data exchange between intelligent devices.
Drawings
Fig. 1 is a block chain encryption diagram.
Detailed Description
The present invention will be described in further detail with reference to specific embodiments.
The block chain is a technical scheme that any number of nodes maintain a reliable database in a decentralized and distrusted mode through a cryptographic method. The data structure of the block chain is mainly divided into two parts: 1) the block head mainly comprises a hash value of the previous block and is used for connecting the previous block to ensure the integrity of a block chain; 2) the block body contains the main information (e.g., transaction information) of the block, and these information and the hash value of the previous block and the random number together constitute the hash value of the block. The data structure of the block chain enables the information of each block on the chain to be traced back by the predecessor node and to influence the information composition of the successor node. The cryptography method ensures that malicious attacks cannot tamper information, thereby ensuring the safety and integrity of data. The building of the block chain follows a whole set of consensus and protocol mechanism, each node in the whole network can verify or write the record, but only when the correctness of a certain record is confirmed by most nodes (even all nodes) in the whole network, the corresponding data is allowed to be written into the block.
The Paillier homomorphic encryption system is an addition homomorphic encryption cryptogram constitution based on a judgment union residue problem, is proposed by a student Paillier in 1999, has the safety based on the judgment union residue problem, and supports any multiple addition homomorphic operations. The addition homomorphism can not only quickly process ciphertext data, but also meet higher safety requirements. This means that given only the public key and the encryption of m1 and m2, the encryption of m1+ m2 can be calculated.
The invention provides an intelligent household data privacy protection method based on a block chain and homomorphic encryption, therefore, the invention firstly establishes an intelligent household system model, and the intelligent household system model is a quintuple SHS:
(MT,HIG,SC,CT,α,β)
wherein:
(1)MT={mti|i∈N+is a finite set of monitor terminals, where mtiIndicating the ith monitoring terminal;
(2)HIG={higi|i∈N+is a limited set of home intelligent gateways, among which higiRepresenting the ith home intelligent gateway, wherein a plurality of home intelligent gateways form a block chain;
(3)SC={sci|i∈N+is a finite set of perceptrons, with sciRepresents the ith sensor;
The intelligent home system model divides the whole framework into three levels: an application layer, a network layer, and a perception layer. The application layer mainly accesses, analyzes and processes data and finally issues a control command, namely, a user can access the terminal through a GSM/GPRS/Internet/WIFI network; the network layer mainly relates to the access of the network and the data transmission, namely alpha and beta; the sensing layer is mainly used for collecting data generated by real-world equipment. The home gateway is the control core of the intelligent home system, is the only way for connecting an external network and a home internal network, and plays a role in starting and stopping. Upward access to any equipment which can access the GSM/GPRS/Internet/WIFI network is allowed, and downward communication data of various sensors are collected through the ZigBee/Lora/Bluetooth/WIFI network.
Namely, the monitoring terminal refers to various mobile devices in the real world, such as mobile phones, ipads, electric meters, air conditioners and the like. The sensors are sensing devices and mainly collect data generated by real-world devices.
The information that the monitor terminal produced is gathered to the perceptron and is transmitted for family's intelligent gateway, and intelligent gateway can regard as the node in the block chain, constitutes the block chain jointly, and monitor terminal can not connect intelligent gateway and carry out data access, only is the equipment that produces data.
In the block chain, each household intelligent gateway is a node of the block chain, a plurality of household intelligent gateways can form the block chain, at the moment, a block chain frame is introduced on the basis of the SHS model, and an intelligent home system PEB-SHS based on the Paillier encryption block chain is provided.
The PEB-SHS model is an octave:
(MT,HIG,SC,K,pkb,α,φ,β)
wherein MT, HIG, SC, alpha, beta have the same meanings as SHS model, and K, pkbPhi is respectively:
(1)K={pki|i∈N+the HIG public key is a limited set of HIG public keys;
(2)pkba public key for encrypting the data of the whole network;
(3) phi is used for storing information among all HIGs by adopting a P2A _ PEBC algorithm, so that the safety of the information is guaranteed.
In the embodiment of the invention, a block data structure PE-BDS based on Paillier encryption is provided for describing a data form in a PEB-SHS model. Since the transaction data in the PE-BDS mainly records health information of the user, such as blood pressure BP, heart rate HR, oxygen content OC, respiratory rate RR, etc., and these data are data that need privacy protection, the data block does not directly hash the collected information, but divides the plaintext information (such as PT1-PT4 in the figure) into visible information PVD and invisible information IPD, the former is some information that can be disclosed, and the latter is information that is private, sensitive, and only visible to the user, such as BP, HR, RR, OC, etc. And then, Paillier homomorphic encryption is carried out on the IPD by using a full-network key Block-PK to generate a ciphertext (such as CT1-CT4 in the figure) and carry out Hash operation (such as Hash 1-Hash 4 in the figure), and finally, a unique root Hash value is generated and recorded in a Block head, and the ciphertext is recorded in the Block.
In addition, the block header part of the data model is added with one piece of information pk compared with the original block chainbThe information mainly records a public key used by the block when Paillier encryption is performed on the IPD, so that real information can be conveniently checked later. The mode of encryption before hashing enhances the protection of the private data and can further prevent the leakage of the private data.
Based on the intelligent home model and the block data structure, the invention provides a privacy protection method P2A _ PEBC based on a homomorphic encryption block chain, which specifically comprises the following steps:
step 1: distribution key SHK and full network key BLOCK-PK: a third party trust authority randomly distributes a pair of SHKs for each home intelligent gateway in the block chain, and each pair of keys comprises a pair of public keys pkiAnd the private key skiMeanwhile, a third-party trust authority randomly generates a whole-network secret key, wherein the whole-network secret key BLOCK-PK comprises a whole-network public key PKbAnd the secret key sk of the whole networkb(ii) a In an embodiment of the present invention, the third party trust authority described above may select VeriSign.
Step 2: dividing nodes: dividing the whole network nodes in the block chain into special nodes SP and common nodes NP, wherein the special nodes store the public key of each home intelligent gateway; the number of the special nodes is at least 4 according to the requirement of Byzantine consensus, and K is mainly stored; the common node is mainly responsible for publishing and verifying data information in the network.
And step 3:paillier encrypts IPD-type data. Each household intelligent gateway receives and stores the information collected by the sensor, divides the information into visible information and invisible information, and passes through the whole network public key pkbAfter homomorphic encryption is carried out on invisible information, the visible information and the encrypted invisible information are packaged into a data packet DP and then pass through a private key skiSigning, and sending the signed data packet to a network through the home intelligent gateway;
DPd={Dataski|d∈N+,i∈N+}
where d is the sequence number of the Data packet, DataskiRepresenting the use of the private key skiThe signed data. Finally, HIG will DPdAnd issuing to the network through the router.
And 4, step 4: and verifying the data packet obtained in the last step by using the nodes of the whole network. First, the SP node pairs DPdThe source of (2) performs identity authentication and maintains a public ledger. Since each DPdSk with HIG thereoniSignatures so NP can query K stored in SP to determine DPdBy which HIG it is transmitting. Then NP node sends homomorphic decryption request to a credible third party service to verify the authenticity of the information, and the third party service receives the request and then checks the skbThe decrypted data is sent for the requestor.
And 5: and obtaining a block chain public account book and a local account book. After the transaction information is successfully verified, the HIGs select accounting nodes of the whole network according to a POW consensus algorithm, and the accounting nodes write all information in a period of time into a new block and are linked at the tail end of the main chain. The data structure of each tile is the PE-BDS described above, and each tile contains a plurality of node data.
The following table is a pseudo code for the above steps
In the PEB-SHS model, each SHS is equivalent to a node peer in a block chain, a sensor in a home detects the surrounding environment, the detected data is sent to an intelligent gateway through a ZigBee/Lora/Bluetooth/WIFI network, each HIG carries out corresponding processing on the information according to a P2A-PEBC algorithm, and finally, an accounting node stores the data in the block chain.
The invention also provides a system applying the method, which comprises a set of home intelligent gateways, a set of sensors and a set of monitoring terminals.
Each home intelligent gateway in the home intelligent gateway set is a node, and a plurality of home intelligent gateways form a block chain; each sensor in the sensor set can acquire information and transmit the information to a corresponding home intelligent gateway; each monitoring terminal in the monitoring terminal set can be connected with the home intelligent gateway to acquire information transmitted by the sensor.
The system of the invention also comprises a processor capable of implementing the software method of the invention:
(1) distributing a pair of secret keys for each home intelligent gateway in a block chain, wherein the pair of secret keys comprises a public key and a private key, and meanwhile, setting a whole-network secret key, and the whole-network secret key comprises a whole-network public key and a whole-network secret key;
(2) dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store the public key of each home intelligent gateway;
(3) each home intelligent gateway receives and stores information collected by the monitoring terminal, divides the information into visible information and invisible information, homomorphically encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
(4) carrying out whole network verification on the data packet;
(5) and the accounting node writes all verified data into a new block in a period of time and is connected to the tail part of the main block chain.
The processor is a broad processor, that is, the processor is not limited to only one processor, but may refer to a plurality of processors that collectively implement the method of the present invention.
As an embodiment of the invention, for a cell with a family of 800 users, the Heart Rate (HR), Blood Pressure (BP), Respiratory Rate (RR) of each user is uploaded to the HIG when information is collected. The input values and results of this homomorphic calculation are saved as a PE-BDS block and synchronized to all HIGs. The user with HIG authority can look up the statistical values of the health data through the authorized homomorphic public key at any time, and can also trace and accumulate historical data along with a chain, but because the signature of the private key is added during data preprocessing, any node cannot snoop the privacy data of other nodes before the SP permission is not obtained.
In the invention, the HIG carries out Paillier encryption and private key signature on the collected local source data, and forwards the local source data in a block chain network in a ciphertext data packet mode. If the data is intercepted through the router or in the transmission process, an external network attacker cannot acquire the data because the data cannot be verified by the SP, and HIG privacy information is difficult to acquire. For intranet attackers, such as HIG attacked by malicious programs, there are two cases: 1) if the node is a common NP node, the privacy information can not be obtained because the original HIG can not be obtained; 2) if the node is an SP node, the node must be obtained after the consensus of the SP set is completed, and according to the Byzantine consensus mechanism, the consensus needs to be supported by more than 2/3 nodes, which means that an attacker must attack 2/3 of the SP node to be possible, and the probability is almost impossible. Therefore, the method can ensure the safety of the data to a great extent.
Meanwhile, the block organization is carried out by using the PE-BDS structure, and as the block chain technology has the characteristics of tamper resistance, permanence, decentralization and openness, each HIG can obtain the permanent database in a chain block synchronization mode after forming the block, wherein PVD data can be directly obtained and calculated from the chain block, CT data related to privacy can be subjected to state calculation such as statistics and accumulation, and corresponding results can be obtained after authorization without destroying the privacy of a data set.
And various privacy data processed by the paillier algorithm are distinguished according to different families and different index items, and the encrypted result set is refined to an index level on the granularity of the data, so that nodes needing data processing and calculation can select subsets according to the needs, and statistical calculation can be carried out according to different purposes. Since the ciphertext data does not relate to individual privacy, sharing, copying and distributing the data does not affect the disclosure of privacy.
And because the block chain technology is adopted as the support, the workload is dispersed to the network, when one node breaks down, other nodes cannot be influenced, and the single-point failure is avoided. In addition, due to the characteristics of decentralized storage, non-tamper property, strong time sequence, public verification and the like of the block chain, each HIG participates in the calculation and verification process of the whole system, the calculation capability of the system is improved, and the robustness of the system is enhanced.
In the description herein, particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the scope of the present invention should be covered by the present invention.
Claims (6)
1. A privacy protection method based on a homomorphic encryption block chain is characterized by comprising the following steps:
ST 1: establishing an intelligent home system model, wherein the intelligent home system model is a quintuple:
(MT,HIG,SC,CT,α,β)
wherein:
(1)MT={mti|i∈N+is a finite set of monitor terminals, where mtiIndicating the ith monitoring terminal;
(2)HIG={higi|i∈N+is a familyA limited set of intelligent gateways, of which higiRepresenting the ith home intelligent gateway, wherein a plurality of home intelligent gateways form a block chain;
(3)SC={sci|i∈N+is a finite set of perceptrons, with sciRepresents the ith sensor;
each home intelligent gateway is a node, and a plurality of home intelligent gateways form a block chain;
ST 2: distributing a pair of secret keys for each home intelligent gateway in a block chain, wherein the pair of secret keys comprises a public key and a private key, and meanwhile, setting a whole-network secret key, and the whole-network secret key comprises a whole-network public key and a whole-network secret key;
ST 3: dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store the public key of each home intelligent gateway;
ST 4: each home intelligent gateway receives and stores information of the monitoring terminal acquired by the sensor, divides the information into visible information and invisible information, homomorphically encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
ST 5: carrying out whole network verification on the data packet;
ST 6: and the accounting node writes all verified data into a new block in a period of time and is connected to the tail part of the main block chain.
2. The privacy protection method based on the homomorphic encryption block chain according to claim 1, characterized in that:
the block data construction method of each block in the block chain comprises the following steps:
dividing information stored by each home intelligent gateway into visible information and invisible information;
homomorphic encryption is carried out on invisible information by using a whole network public key to generate a ciphertext;
the ciphertexts of the plurality of home intelligent gateways stored in the same block are stored in the block for recording;
and generating a unique root hash value after carrying out hash operation on the ciphertexts of the plurality of home intelligent gateways stored in the same block, storing the unique root hash value into a block head, and storing a full-network public key for homomorphic encryption on the ciphertexts in the block head at the same time.
3. The privacy protection method based on the homomorphic encryption block chain according to claim 1, characterized in that:
in ST5, the performing full network authentication on the packet includes:
each data packet is provided with a private key signature of the home intelligent gateway, the common node determines to send the data packet to the home intelligent gateway of the network by inquiring the public key of each home intelligent gateway stored in the special node, then the node sends a homomorphic decryption request to a credible third-party service to verify the authenticity of information, and the third-party service sends decryption data to a requester for decryption after receiving the request according to the whole network private key.
4. The privacy protection method based on the homomorphic encryption block chain according to claim 1, characterized in that:
in ST6, after the transaction information is successfully verified, each home intelligent gateway selects a billing node of the whole network according to the POW consensus algorithm, and the billing node writes all information in a period of time into a new block and links the new block to the tail end of the main block chain.
5. The privacy protection method based on the homomorphic encryption block chain according to claim 1, characterized in that:
and randomly distributing a pair of secret keys for each home intelligent gateway through a third-party trust mechanism, and simultaneously randomly distributing a whole network secret key through the third-party trust mechanism.
6. A system for applying the method of any of claims 1 to 5, comprising:
each home intelligent gateway in the home intelligent gateway set is a node, and a plurality of home intelligent gateways form a block chain;
each sensor in the sensor set can acquire monitoring information generated by the monitoring terminal and transmit the monitoring information to the corresponding home intelligent gateway;
the monitoring terminal set comprises monitoring terminals, wherein each monitoring terminal in the monitoring terminal set can generate monitoring information;
a processor capable of implementing the method of:
(1) distributing a pair of secret keys for each home intelligent gateway in a block chain, wherein the pair of secret keys comprises a public key and a private key, and meanwhile, setting a whole-network secret key, and the whole-network secret key comprises a whole-network public key and a whole-network secret key;
(2) dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store the public key of each home intelligent gateway;
(3) each home intelligent gateway receives and stores information collected by the monitoring terminal, divides the information into visible information and invisible information, homomorphically encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
(4) carrying out whole network verification on the data packet;
(5) and the accounting node writes all verified data into a new block in a period of time and is connected to the tail part of the main block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910359650.8A CN110677234B (en) | 2019-04-30 | 2019-04-30 | Privacy protection method and system based on homomorphic encryption blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910359650.8A CN110677234B (en) | 2019-04-30 | 2019-04-30 | Privacy protection method and system based on homomorphic encryption blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110677234A true CN110677234A (en) | 2020-01-10 |
CN110677234B CN110677234B (en) | 2023-06-20 |
Family
ID=69068547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910359650.8A Active CN110677234B (en) | 2019-04-30 | 2019-04-30 | Privacy protection method and system based on homomorphic encryption blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110677234B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995449A (en) * | 2020-02-27 | 2020-04-10 | 台州市相闻信息技术有限公司 | Intelligent household privacy protection system and privacy protection method based on block chain |
CN111711627A (en) * | 2020-06-16 | 2020-09-25 | 湖南天河国云科技有限公司 | Industrial Internet data security monitoring method and system based on block chain |
CN112217797A (en) * | 2020-09-09 | 2021-01-12 | 苏州工业园区凌志软件股份有限公司 | Intelligent gateway Internet of things control system and method applying block chain technology |
CN113065146A (en) * | 2021-04-02 | 2021-07-02 | 浙江永旗区块链科技有限公司 | Homomorphic encryption method for block chain data protection |
CN114205068A (en) * | 2021-12-17 | 2022-03-18 | 佛山市鑫诺家具有限公司 | Intelligent home control method and cloud server |
CN116032937A (en) * | 2022-11-28 | 2023-04-28 | 中国联合网络通信集团有限公司 | Edge computing equipment calculation transaction method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549749A (en) * | 2016-12-06 | 2017-03-29 | 杭州趣链科技有限公司 | A kind of block chain method for secret protection encrypted based on additive homomorphism |
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
WO2018137316A1 (en) * | 2017-01-24 | 2018-08-02 | 上海亿账通区块链科技有限公司 | Secure transaction method based on block chain, electronic device, system, and storage medium |
-
2019
- 2019-04-30 CN CN201910359650.8A patent/CN110677234B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN106549749A (en) * | 2016-12-06 | 2017-03-29 | 杭州趣链科技有限公司 | A kind of block chain method for secret protection encrypted based on additive homomorphism |
WO2018137316A1 (en) * | 2017-01-24 | 2018-08-02 | 上海亿账通区块链科技有限公司 | Secure transaction method based on block chain, electronic device, system, and storage medium |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
Non-Patent Citations (1)
Title |
---|
田承东: "同态加密在物联网区块链数据安全中的应用", 《网络安全技术与应用》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995449A (en) * | 2020-02-27 | 2020-04-10 | 台州市相闻信息技术有限公司 | Intelligent household privacy protection system and privacy protection method based on block chain |
CN111711627A (en) * | 2020-06-16 | 2020-09-25 | 湖南天河国云科技有限公司 | Industrial Internet data security monitoring method and system based on block chain |
CN111711627B (en) * | 2020-06-16 | 2023-03-31 | 湖南天河国云科技有限公司 | Industrial Internet data security monitoring method and system based on block chain |
CN112217797A (en) * | 2020-09-09 | 2021-01-12 | 苏州工业园区凌志软件股份有限公司 | Intelligent gateway Internet of things control system and method applying block chain technology |
CN113065146A (en) * | 2021-04-02 | 2021-07-02 | 浙江永旗区块链科技有限公司 | Homomorphic encryption method for block chain data protection |
CN114205068A (en) * | 2021-12-17 | 2022-03-18 | 佛山市鑫诺家具有限公司 | Intelligent home control method and cloud server |
CN114205068B (en) * | 2021-12-17 | 2022-09-09 | 珠海市利得科技有限公司 | Intelligent household control method |
CN116032937A (en) * | 2022-11-28 | 2023-04-28 | 中国联合网络通信集团有限公司 | Edge computing equipment calculation transaction method and system |
CN116032937B (en) * | 2022-11-28 | 2024-08-16 | 中国联合网络通信集团有限公司 | Edge computing equipment calculation transaction method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110677234B (en) | 2023-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110677234B (en) | Privacy protection method and system based on homomorphic encryption blockchain | |
Uddin et al. | Continuous patient monitoring with a patient centric agent: A block architecture | |
Xue et al. | Private blockchain-based secure access control for smart home systems | |
CN114499895B (en) | Data trusted processing method and system fusing trusted computing and block chain | |
Xin | A mixed encryption algorithm used in internet of things security transmission system | |
Wang et al. | Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
CN105530253B (en) | Wireless sensor network access authentication method under Restful framework based on CA certificate | |
CN105516980A (en) | Token authentication method for wireless sensor network based on Restful architecture | |
CN105959111A (en) | Information security big-data resource access control system based on cloud computing and credible computing | |
CN103747036A (en) | Trusted security enhancement method in desktop virtualization environment | |
CN109359464B (en) | Wireless security authentication method based on block chain technology | |
CN112417494A (en) | Power block chain system based on trusted computing | |
CN106850207A (en) | CA-free identity authentication method and system | |
CN110505055A (en) | Based on unsymmetrical key pond to and key card outer net access identity authentication method and system | |
Srikanth et al. | An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems | |
CN108959873B (en) | Authentication method for remote medical system | |
CN113259135A (en) | Lightweight blockchain communication authentication device and method for detecting data tamper | |
CN113111386A (en) | Privacy protection method for block chain transaction data | |
Puthal et al. | A user-centric security solution for Internet of Things and edge convergence | |
CN106657002A (en) | Novel crash-proof base correlation time multi-password identity authentication method | |
CN111294793A (en) | Data privacy protection method for identity authentication in wireless sensor network | |
CN110519222A (en) | Outer net access identity authentication method and system based on disposable asymmetric key pair and key card | |
CN112311553B (en) | Equipment authentication method based on challenge response | |
Dwivedi et al. | D3APTS: Design of ECC Based Authentication Protocol and Data Storage for Tactile Internet enabled IoD System With Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |