CN110677234A - A privacy protection method and system based on homomorphic encryption blockchain - Google Patents
A privacy protection method and system based on homomorphic encryption blockchain Download PDFInfo
- Publication number
- CN110677234A CN110677234A CN201910359650.8A CN201910359650A CN110677234A CN 110677234 A CN110677234 A CN 110677234A CN 201910359650 A CN201910359650 A CN 201910359650A CN 110677234 A CN110677234 A CN 110677234A
- Authority
- CN
- China
- Prior art keywords
- information
- network
- home intelligent
- intelligent gateway
- home
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012544 monitoring process Methods 0.000 claims abstract description 33
- 238000004891 communication Methods 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 claims description 7
- 238000012795 verification Methods 0.000 claims description 7
- 238000010276 construction Methods 0.000 claims description 2
- 230000036772 blood pressure Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000036387 respiratory rate Effects 0.000 description 7
- 230000008520 organization Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 description 3
- 230000036541 health Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- SGEJQUSYQTVSIU-UHFFFAOYSA-N Pebulate Chemical compound CCCCN(CC)C(=O)SCCC SGEJQUSYQTVSIU-UHFFFAOYSA-N 0.000 description 2
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000116 mitigating effect Effects 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明提供一种基于同态加密区块链的隐私保护方法和系统,包括:每个家庭智能网关为一个节点,多个家庭智能网关形成区块链;为区块链中每个家庭智能网关分配一对秘钥,同时设置全网秘钥;将区块链中的全网节点分为特殊节点和普通节点,所述特殊节点存放每个家庭智能网关的公钥;每个家庭智能网关接收并保存感知器采集的监控终端采集信息,并将信息分为可见信息和不可见信息,通过全网公钥对不可见信息进行同态加密后,将可见信息和不可见信息打包为数据包后通过私钥进行签名,签名后的数据包通过家庭智能网关发送至网络;对数据包做全网验证;记账节点对一段时间内所有验证后的数据写入一个新的区块,连接在主区块链的尾部。
The invention provides a privacy protection method and system based on a homomorphic encryption blockchain, including: each home intelligent gateway is a node, and a plurality of home intelligent gateways form a blockchain; each home intelligent gateway in the blockchain Allocate a pair of secret keys, and set the whole network secret key at the same time; divide the whole network nodes in the blockchain into special nodes and ordinary nodes, and the special nodes store the public key of each home intelligent gateway; each home intelligent gateway receives And save the information collected by the monitoring terminal collected by the sensor, and divide the information into visible information and invisible information. After the invisible information is homomorphically encrypted by the public key of the whole network, the visible information and invisible information are packaged into data packets. The private key is used to sign, and the signed data package is sent to the network through the home smart gateway; the whole network is verified for the data package; the accounting node writes all the verified data within a period of time into a new block, which is connected to the main The tail of the blockchain.
Description
技术领域technical field
本发明涉及一种隐私保护方法,尤其涉及一种基于区块链的隐私数据保护方法。The invention relates to a privacy protection method, in particular to a blockchain-based privacy data protection method.
背景技术Background technique
随着计算机技术、互联网技术和通信技术的发展融合,基于物联网(Internet ofthings,IOT)的智能家居系统应运而生。在这类系统中,设备到设备之间 (Device-to-Device,D2D)的有效通讯很大程度上取决于边缘设备的计算能力,边缘计算(EdgeComputing,EC)技术的发展使得计算能力更加靠近用户。通过将需求在边缘端解决,从而为用户提供更快的响应。With the development and integration of computer technology, Internet technology and communication technology, a smart home system based on the Internet of Things (IOT) emerges as the times require. In such systems, effective device-to-device (D2D) communication largely depends on the computing capabilities of edge devices. The development of edge computing (EC) technology has brought computing capabilities closer to user. By addressing needs at the edge, it provides users with a faster response.
目前在智能家居系统中,通过手机、平板电脑、无线传感器和可穿戴个人健康设备传输和存储的个人用户健康状况和信息的信息在不断增加。由于系统中的医疗设备记录了用户的敏感信息,如血压(blood pressure,BP),心率(heart rate, HR),呼吸频率(respiratory rate,RR)等,如果个人敏感信息被恶意攻击或泄露,将会造成无法挽回的损失。因此,智能家居边缘设备中的信息安全和隐私保护问题为众多研究人员所关注。文献Security and privacy issues for an IoT based smart home提供了一种智能家居IoT架构,使用户可以通过支持智能房屋管理的各种设备进行交互,并分析了不同的场景,以确定用户可能的安全和隐私问题。文献 Low-cost flow-based security solutions forsmart-home IoT devices为未来智能家居网络级安全提供了一种解决方案,即基于流的监控不仅实现了基于分组的监控的大多数安全优势,还降低了处理成本。文献A Host-BasedIntrusion Detection and Mitigation Framework for Smart Home IoT UsingOpenFlow提出了一种物联网入侵检测和缓解框架(intrusion detection andmitigation,IoT-IDM),为家庭环境中部署的智能设备提供网络级保护。主要用于监控家庭环境中预期智能设备的网络活动,并调查是否存在任何可疑或恶意活动。上述方法虽在一定程度上保护了用户的隐私安全,但仍存在一些体系结构上的问题。例如,上述文献都采用了中心式事务数据处理机制,如果中心节点被攻陷,设备数据的安全性和隐私性就很难保证。Currently in smart home systems, there is an ever-increasing amount of information about individual user health status and information transmitted and stored through cell phones, tablets, wireless sensors, and wearable personal health devices. Since the medical equipment in the system records the user's sensitive information, such as blood pressure (BP), heart rate (HR), respiratory rate (RR), etc., if personal sensitive information is maliciously attacked or leaked, will cause irreparable losses. Therefore, the information security and privacy protection issues in smart home edge devices have attracted the attention of many researchers. The document Security and privacy issues for an IoT based smart home provides a smart home IoT architecture that enables users to interact through various devices that support smart home management, and analyzes different scenarios to determine the user's possible security and privacy question. The literature Low-cost flow-based security solutions forsmart-home IoT devices provides a solution for future smart home network-level security, that is, flow-based monitoring not only achieves most of the security advantages of packet-based monitoring, but also reduces processing costs. cost. The document A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow proposes an IoT intrusion detection and mitigation framework (IoT-IDM) to provide network-level protection for smart devices deployed in home environments. Mainly used to monitor the network activity of expected smart devices in the home environment and investigate for any suspicious or malicious activity. Although the above method protects the privacy of users to a certain extent, there are still some architectural problems. For example, the above-mentioned documents all adopt a central transaction data processing mechanism. If the central node is compromised, it is difficult to guarantee the security and privacy of device data.
发明内容SUMMARY OF THE INVENTION
本发明提供一种新的智能家居系统数据分发与隐私保护方法,通过结合同态加密与区块链技术,为面向边缘计算的智能设备间数据交换提供了更为安全的隐私保障。The present invention provides a new method for data distribution and privacy protection of a smart home system. By combining homomorphic encryption and block chain technology, a more secure privacy guarantee is provided for data exchange between smart devices oriented to edge computing.
为解决上述技术问题,本发明采用以下技术方案:In order to solve the above-mentioned technical problems, the present invention adopts the following technical solutions:
一种基于同态加密区块链的隐私保护方法,包括:A privacy protection method based on homomorphic encryption blockchain, including:
ST1:建立智能家居系统模型,所述智能家居系统模型为一个五元组:ST1: Build a smart home system model, the smart home system model is a quintuple:
(MT,HIG,SC,CT,α,β)(MT,HIG,SC,CT,α,β)
其中:in:
(1)MT={mti|i∈N+}为监控终端的有限集,其中mti表示第i个监控终端;(1) MT={mt i |i∈N + } is a finite set of monitoring terminals, where mt i represents the ith monitoring terminal;
(2)HIG={higi|i∈N+}为家庭智能网关的有限集,其中higi表示第i个家庭智能网关,多个家庭智能网关组成区块链;(2) HIG={hig i |i∈N + } is a finite set of home smart gateways, where hig i represents the i-th home smart gateway, and multiple home smart gateways form a blockchain;
(3)SC={sci|i∈N+}为感知器的有限集,其中sci表示第i个感知器;(3) SC={sc i |i∈N + } is a finite set of perceptrons, where sc i represents the ith perceptron;
(4)为MT到HIG的通信网络;(4) It is the communication network from MT to HIG;
(5)为HIG到SC的通信网络;(5) It is the communication network from HIG to SC;
每个家庭智能网关为一个节点,多个家庭智能网关形成区块链;Each home smart gateway is a node, and multiple home smart gateways form a blockchain;
ST2:为区块链中每个家庭智能网关分配一对秘钥,所述一对秘钥包括公钥和私钥,同时设置全网秘钥,所述全网秘钥包括全网公钥和全网秘钥;ST2: Assign a pair of secret keys to each home smart gateway in the blockchain, the pair of secret keys includes a public key and a private key, and set a network-wide secret key at the same time, the network-wide secret key includes the network-wide public key and The whole network secret key;
ST3:将区块链中的全网节点分为特殊节点和普通节点,所述特殊节点存放每个家庭智能网关的公钥;ST3: Divide the entire network nodes in the blockchain into special nodes and ordinary nodes, and the special nodes store the public key of each home intelligent gateway;
ST4:每个家庭智能网关接收并保存感知器采集的监控终端的信息,并将信息分为可见信息和不可见信息,通过全网公钥对不可见信息进行同态加密后,将可见信息和不可见信息打包为数据包后通过私钥进行签名,签名后的数据包通过家庭智能网关发送至网络;ST4: Each home intelligent gateway receives and saves the information of the monitoring terminal collected by the sensor, and divides the information into visible information and invisible information. After the invisible information is homomorphically encrypted with the public key of the whole network, the visible information and The invisible information is packaged into a data package and signed with a private key, and the signed data package is sent to the network through the home smart gateway;
ST5:对数据包做全网验证;ST5: Perform network-wide verification on data packets;
ST6:记账节点对一段时间内所有验证后的数据写入一个新的区块,连接在主区块链的尾部。ST6: The accounting node writes a new block to all verified data within a period of time, which is connected to the tail of the main blockchain.
所述区块链中各区块的区块数据构成方法为:The block data composition method of each block in the block chain is as follows:
将每个家庭智能网关保存的信息划分为可见信息和不可见信息;Divide the information stored by each smart home gateway into visible information and invisible information;
对不可见信息使用全网公钥进行同态加密,生成密文;Homomorphic encryption is performed on invisible information using the public key of the entire network to generate ciphertext;
同一区块中存储的多个家庭智能网关的密文存入区块体中进行记录;The ciphertexts of multiple home smart gateways stored in the same block are stored in the block body for recording;
同一区块中存储的多个家庭智能网关的密文哈希运算后生成唯一的根哈希值存入区块头,同时区块头中还存储对密文进行同态加密的全网公钥。After the ciphertext hash operation of multiple smart home gateways stored in the same block, a unique root hash value is generated and stored in the block header. At the same time, the block header also stores the network-wide public key for homomorphic encryption of the ciphertext.
所述ST5中,对数据包做全网验证包括:In the ST5, the network-wide verification of the data packet includes:
每个数据包中均具有家庭智能网关的私钥签名,普通节点通过查询特殊节点中存储的每个家庭智能网关的公钥,确定发送该数据包至网络的家庭智能网关,然后节点向一个可信的第三方服务发送同态解密请求以验证信息的真实性,第三方服务收到请求后根据全网秘钥为请求者发送解密数据进行解密。Each data packet is signed by the private key of the home intelligent gateway. The ordinary node determines to send the data packet to the home intelligent gateway of the network by querying the public key of each home intelligent gateway stored in the special node, and then the node sends the data to a valid home intelligent gateway. The trusted third-party service sends a homomorphic decryption request to verify the authenticity of the information. After receiving the request, the third-party service sends decrypted data for the requester according to the network-wide secret key for decryption.
所述ST6中,交易信息验证成功后,由各家庭智能网关根据POW共识算法选出全网的记账节点,记账节点将一段时间之内所有的信息写进一个新的区块,链接在主区块链的尾端。In the ST6, after the transaction information is successfully verified, each home intelligent gateway selects the accounting node of the entire network according to the POW consensus algorithm, and the accounting node writes all the information within a period of time into a new block, which is linked in The tail end of the main blockchain.
通过第三方信任机构随机为每个家庭智能网关分配一对秘钥,同时通过第三方信任机构随机分配全网秘钥。A pair of secret keys is randomly assigned to each home smart gateway through a third-party trust organization, and the whole network secret key is randomly assigned through a third-party trust organization.
一种应用所述方法的系统,包括:A system for applying the method, comprising:
家庭智能网关集合,家庭智能网关集合中的每个家庭智能网关为一个节点,多个家庭智能网关形成区块链;A set of home smart gateways, each home smart gateway in the home smart gateway set is a node, and multiple home smart gateways form a blockchain;
感知器集合,感知器集合中的每个感知器均能够获取监控终端产生的监控信息并传输给对应的家庭智能网关;A sensor set, each sensor in the sensor set can obtain monitoring information generated by the monitoring terminal and transmit it to the corresponding home intelligent gateway;
监控终端集合,监控终端集合中的每个监控终端均能产生监控信息;Monitoring terminal set, each monitoring terminal in the monitoring terminal set can generate monitoring information;
处理器,所述处理器能够实现以下方法:a processor capable of implementing the following methods:
(1)为区块链中每个家庭智能网关分配一对秘钥,所述一对秘钥包括公钥和私钥,同时设置全网秘钥,所述全网秘钥包括全网公钥和全网秘钥;(1) Allocate a pair of secret keys to each home intelligent gateway in the blockchain, the pair of secret keys includes a public key and a private key, and set up a network-wide secret key at the same time, and the network-wide secret key includes a network-wide public key and the whole network key;
(2)将区块链中的全网节点分为特殊节点和普通节点,所述特殊节点存放每个家庭智能网关的公钥;(2) Divide the entire network nodes in the blockchain into special nodes and ordinary nodes, and the special nodes store the public key of each home intelligent gateway;
(3)每个家庭智能网关接收并保存监控终端采集的信息,并将信息分为可见信息和不可见信息,通过全网公钥对不可见信息进行同态加密后,将可见信息和不可见信息打包为数据包后通过私钥进行签名,签名后的数据包通过家庭智能网关发送至网络;(3) Each home intelligent gateway receives and saves the information collected by the monitoring terminal, and divides the information into visible information and invisible information. After the invisible information is homomorphically encrypted by the public key of the whole network, the visible information and invisible information After the information is packaged into a data package, it is signed with a private key, and the signed data package is sent to the network through the home smart gateway;
(4)对数据包做全网验证;(4) Verify the entire network of data packets;
(5)记账节点对一段时间内所有验证后的数据写入一个新的区块,连接在主区块链的尾部。(5) The accounting node writes a new block to all the verified data for a period of time, which is connected to the tail of the main blockchain.
本发明的有益效果:本发明通过对用户的敏感数据实施同态加密和分发保护机制,能够为智能设备间数据交换提供更为安全的隐私保障。Beneficial effects of the present invention: The present invention can provide a more secure privacy guarantee for data exchange between smart devices by implementing homomorphic encryption and distribution protection mechanism for sensitive data of users.
附图说明Description of drawings
图1为区块链加密示意图。Figure 1 is a schematic diagram of blockchain encryption.
具体实施方式Detailed ways
下面结合具体实施方式对本发明作进一步详细说明。The present invention will be further described in detail below in conjunction with specific embodiments.
区块链是一种由任意多的节点通过密码学方法,以去中心化、去信任化的方式,来集体维护一个可靠数据库的技术方案。区块链的数据结构主要分为两个部分:1)区块头,主要包含上一个区块的哈希散列值,用来连接前一区块,保证区块链的完整性;2)区块主体,包含本区块的主要信息(如,交易信息),这些信息和上一个区块的哈希散列值以及随机数共同构成本区块的哈希散列值。区块链的数据结构使得链上每个区块的信息都可以由前驱节点追溯,并影响后继节点的信息构成。其密码学方法保证了恶意攻击无法篡改信息,从而确保数据的安全性和完整性。区块链的构建遵循一整套共识和协议机制,全网每一个节点都可验证或写入记录,但只有当全网大部分节点(甚至全部节点)一致确认某个记录的正确性,相应数据才允许被写入区块中。Blockchain is a technical solution in which any number of nodes collectively maintain a reliable database in a decentralized and trustless manner through cryptographic methods. The data structure of the blockchain is mainly divided into two parts: 1) the block header, which mainly contains the hash value of the previous block, which is used to connect the previous block to ensure the integrity of the blockchain; 2) the block The block body contains the main information of this block (such as transaction information), which together with the hash value of the previous block and the random number together constitute the hash value of this block. The data structure of the blockchain enables the information of each block on the chain to be traced back to the predecessor node and affects the information of the successor nodes. Its cryptography method ensures that malicious attacks cannot tamper with information, thereby ensuring the security and integrity of data. The construction of the blockchain follows a set of consensus and protocol mechanisms. Every node in the entire network can verify or write records, but only when most nodes (or even all nodes) in the entire network consistently confirm the correctness of a record, the corresponding data Only allowed to be written into the block.
Paillier同态加密体制是第一个基于判定合数剩余类问题的加法同态加密密码体质,于1999年由学者Paillier提出,其安全性是基于判定合数剩余问题,该机制支持任意多次加法同态操作。其加法同态性不仅可以快速地处理密文数据,还能满足较高的安全性需求。这意味着,只给出公钥和m1和m2的加密,就可以计算m1+m2的加密。The Paillier homomorphic encryption system is the first additive homomorphic encryption cryptosystem based on the problem of determining the composite residue class. It was proposed by the scholar Paillier in 1999. Its security is based on the problem of determining the composite residue. This mechanism supports any number of additions. Homomorphic operation. Its additive homomorphism can not only process ciphertext data quickly, but also meet high security requirements. This means that, given only the public key and the encryption of m1 and m2, the encryption of m1+m2 can be calculated.
本发明提供的是一种基于区块链和同态加密的智能家居数据隐私保护方法,因此,本发明首先建立一个智能家居系统模型,智能家居系统模型为一个五元组 SHS:The present invention provides a smart home data privacy protection method based on blockchain and homomorphic encryption. Therefore, the present invention first establishes a smart home system model, and the smart home system model is a quintuple SHS:
(MT,HIG,SC,CT,α,β)(MT,HIG,SC,CT,α,β)
其中:in:
(1)MT={mti|i∈N+}为监控终端的有限集,其中mti表示第i个监控终端;(1) MT={mt i |i∈N + } is a finite set of monitoring terminals, where mt i represents the ith monitoring terminal;
(2)HIG={higi|i∈N+}为家庭智能网关的有限集,其中higi表示第i个家庭智能网关,多个家庭智能网关组成区块链;(2) HIG={hig i |i∈N + } is a finite set of home smart gateways, where hig i represents the i-th home smart gateway, and multiple home smart gateways form a blockchain;
(3)SC={sci|i∈N+}为感知器的有限集,其中sci表示第i个感知器;(3) SC={sc i |i∈N + } is a finite set of perceptrons, where sc i represents the ith perceptron;
(4)为MT到HIG的GSM/GPRS/Internet/WIFI通信网络;(4) GSM/GPRS/Internet/WIFI communication network from MT to HIG;
(5)为HIG到SC的ZigBee/Lora/Bluetooth/WIFI通信网络。(5) ZigBee/Lora/Bluetooth/WIFI communication network from HIG to SC.
智能家居系统模型将整个框架分成了三个层次:应用层、网络层和感知层。其中,应用层主要是进行数据的访问、分析和处理,最后下达控制命令,即用户可以通过GSM/GPRS/Internet/WIFI网络进行终端的访问;网络层主要涉及到网络的接入以及数据传输,即α和β;感知层主要是采集现实世界设备产生的数据。家庭网关是智能家居系统的控制核心,它是连接外部网络和家庭内部网络的唯一途径,起着承上启下的作用。向上允许接入任何可以访问GSM/GPRS/Internet/ WIFI网络的设备,向下通过ZigBee/Lora/Bluetooth/WIFI网络收集各种传感器的通信数据。The smart home system model divides the whole framework into three layers: application layer, network layer and perception layer. Among them, the application layer mainly conducts data access, analysis and processing, and finally issues control commands, that is, the user can access the terminal through the GSM/GPRS/Internet/WIFI network; the network layer mainly involves network access and data transmission. Namely α and β; the perception layer mainly collects data generated by real-world devices. The home gateway is the control core of the smart home system. It is the only way to connect the external network and the home internal network, and plays a role in linking the previous and the next. Upward allows access to any device that can access the GSM/GPRS/Internet/WIFI network, and downwards collects communication data of various sensors through ZigBee/Lora/Bluetooth/WIFI network.
即上述的监控终端指现实世界的各种移动设备,如手机,iPad,电表,空调等设备。感知器则是一些传感设备,主要采集现实世界设备产生的数据。That is, the above monitoring terminal refers to various mobile devices in the real world, such as mobile phones, iPads, electricity meters, air conditioners and other devices. Perceptrons are sensing devices that mainly collect data generated by real-world devices.
感知器采集监控终端产生的信息传输给家庭智能网关,智能网关可作为区块链中的节点,共同组成区块链,监控终端并不能连接智能网关进行数据访问,仅是产生数据的设备。The sensor collects the information generated by the monitoring terminal and transmits it to the home smart gateway. The smart gateway can be used as a node in the blockchain to form a blockchain. The monitoring terminal cannot connect to the smart gateway for data access, but is only a device that generates data.
而在区块链中,每个家庭智能网关为区块链的一个节点,多个家庭智能网关能够构成形成区块链,此时,在上述SHS模型的基础上,引入区块链框架,给出一种基于Paillier加密区块链的智能家居系统PEB-SHS。In the blockchain, each home smart gateway is a node of the blockchain, and multiple home smart gateways can form a blockchain. At this time, on the basis of the above SHS model, the blockchain framework is introduced to give A smart home system PEB-SHS based on Paillier encrypted blockchain is developed.
PEB-SHS模型为一个八元组:The PEB-SHS model is an octet:
(MT,HIG,SC,K,pkb,α,φ,β)(MT,HIG,SC,K,pk b ,α,φ,β)
其中MT,HIG,SC,α,β的含义与SHS模型一致,K,pkb,φ分别为:Among them, the meanings of MT, HIG, SC, α, β are consistent with the SHS model, and K, pk b , and φ are:
(1)K={pki|i∈N+}为HIG公钥的有限集;(1) K={pk i |i∈N + } is a finite set of HIG public keys;
(2)pkb为全网数据加密的公钥;(2) pk b is the public key for data encryption of the entire network;
(3)φ为各个HIG之间采用下述的P2A_PEBC算法进行信息存储,保障信息的安全性。(3) φ is the following P2A_PEBC algorithm for information storage between each HIG to ensure information security.
本发明的实施例中,给出一种基于Paillier加密的区块数据结构PE-BDS用以描述PEB-SHS模型中的数据形式。由于PE-BDS中的交易数据主要记录用户的健康信息,如血压BP,心率HR,氧含量OC,呼吸频率RR等,而这些数据为需要进行隐私保护的数据,因此该数据区块不是将采集到的信息直接hash,而是先将明文信息(如图中的PT1-PT4)划分成可见信息PVD和不可见信息IPD 两类,前者是一些可以公开的信息,后者则是隐私、敏感、仅用户可见的信息,如BP、HR、RR、OC等。随后,利用全网秘钥Block-PK对IPD进行Paillier同态加密,生成密文(如图中的CT1-CT4)并进行hash运算(如图中的Hash1- Hash4),最后生成唯一的根哈希值记入区块头,区块体中则记录密文。In the embodiment of the present invention, a block data structure PE-BDS based on Paillier encryption is provided to describe the data form in the PEB-SHS model. Because the transaction data in PE-BDS mainly records the user's health information, such as blood pressure BP, heart rate HR, oxygen content OC, respiratory rate RR, etc., and these data are data that need to be protected by privacy, so this data block will not be collected. The received information is directly hashed, but the plaintext information (PT1-PT4 in the figure) is first divided into visible information PVD and invisible information IPD. The former is some information that can be disclosed, and the latter is privacy, sensitive, Only user-visible information, such as BP, HR, RR, OC, etc. Then, use the whole network secret key Block-PK to perform Paillier homomorphic encryption on IPD, generate ciphertext (CT1-CT4 in the figure) and perform hash operation (Hash1-Hash4 in the figure), and finally generate a unique root hash The value is recorded in the block header, and the ciphertext is recorded in the block body.
此外,该数据模型的区块头部分相比于原来区块链增加了一个信息pkb,该信息主要记录了本区块在对IPD进行Paillier加密时所用的公钥,以便于以后查看真实信息。这种先加密后哈希的方式增强了对隐私数据的保护,能够进一步防范隐私数据的泄露。In addition, compared with the original block chain, the block header part of the data model adds a piece of information pk b , which mainly records the public key used in the Paillier encryption of the IPD in this block, so that the real information can be checked later. This method of encrypting first and then hashing enhances the protection of private data and can further prevent the leakage of private data.
基于上述智能家居模型和区块数据结构,本发明给出一种基于同态加密区块链的隐私保护方法P2A_PEBC,该方法具体包括以下步骤:Based on the above-mentioned smart home model and block data structure, the present invention provides a privacy protection method P2A_PEBC based on a homomorphic encryption block chain, and the method specifically includes the following steps:
步骤1:分配密钥SHK和全网密钥BLOCK-PK:由第三方信任机构随机的为区块链中每个家庭智能网关分配一对SHK,每对密钥中都包含一对公钥pki和私钥ski,同时由第三方信任机构随机的产生全网秘钥,全网秘钥BLOCK-PK包括全网公钥pkb和全网秘钥秘钥skb;在本发明的实施例中,上述的第三方信任机构可以选择VeriSign。Step 1: Assign key SHK and network-wide key BLOCK-PK: A pair of SHK is randomly assigned to each home smart gateway in the blockchain by a third-party trust organization, and each pair of keys contains a pair of public keys pk i and the private key sk i , and the whole network secret key is randomly generated by a third-party trust organization at the same time, and the whole network secret key BLOCK-PK includes the whole network public key pk b and the whole network secret key sk b ; in the implementation of the present invention For example, the above-mentioned third-party trust authority can choose VeriSign.
步骤2:划分节点:将区块链中的全网节点分为特殊节点SP和普通节点NP,特殊节点存放每个家庭智能网关的公钥;特殊节点其数量根据拜占庭共识要求,至少为4个,主要存放K;普通节点主要负责发布及验证网络中的数据信息。Step 2: Divide nodes: Divide the entire network nodes in the blockchain into special nodes SP and ordinary nodes NP. The special nodes store the public key of each home intelligent gateway; the number of special nodes is at least 4 according to the requirements of Byzantine consensus , which mainly stores K; ordinary nodes are mainly responsible for publishing and verifying data information in the network.
步骤3:Paillier加密IPD型数据。每个家庭智能网关接收并保存传感器采集的信息,并将信息分为可见信息和不可见信息,通过全网公钥pkb对不可见信息进行同态加密后,将可见信息和加密后的不可见信息打包为数据包DP后通过私钥ski进行签名,签名后的数据包通过家庭智能网关发送至网络;Step 3: Paillier encrypts the IPD type data. Each home intelligent gateway receives and saves the information collected by the sensor, and divides the information into visible information and invisible information. The visible information is packaged into a data packet DP and signed by the private key ski , and the signed data packet is sent to the network through the home intelligent gateway;
DPd={Dataski|d∈N+,i∈N+}DP d = {Data ski |d∈N + ,i∈N + }
其中,d为数据包的序号,Dataski表示使用私钥ski签名的数据。最后,HIG将 DPd通过路由器发布至网络。Among them, d is the serial number of the data packet, and Data ski represents the data signed with the private key ski . Finally, HIG publishes DP d to the network through the router.
步骤4:对上一步得到的数据包作全网节点进行验证。首先由SP节点对DPd的来源进行身份认证,并维护公共账本。由于每个DPd上都有HIG的ski签名,因此NP可以查询SP中存储的K,从而确定DPd是由哪个HIG发送的。再由NP节点向一个可信的第三方服务发送同态解密请求以验证信息的真实性,第三方服务收到请求后根据skb为请求者发送解密数据。Step 4: The data packets obtained in the previous step are verified by the whole network node. First, the SP node authenticates the source of DP d and maintains the public ledger. Since each DP d has the HIG 's ski signature on it, the NP can query the K stored in the SP to determine which HIG sent the DP d . Then, the NP node sends a homomorphic decryption request to a trusted third-party service to verify the authenticity of the information. After receiving the request, the third-party service sends decrypted data to the requester according to sk b .
步骤5:得到区块链公共账本和本地账本。交易信息验证成功后,由各HIG 根据POW共识算法选出全网的记账节点,记账节点将一段时间之内所有的信息写进一个新的区块,链接在主链的尾端。每个区块的数据结构为上述的PE-BDS,且每个区块中包含多个节点数据。Step 5: Get the blockchain public ledger and local ledger. After the transaction information is successfully verified, each HIG selects the accounting node of the entire network according to the POW consensus algorithm, and the accounting node writes all the information within a period of time into a new block, which is linked to the end of the main chain. The data structure of each block is the above-mentioned PE-BDS, and each block contains multiple node data.
下表为上述步骤的伪代码The following table is the pseudo code of the above steps
PEB-SHS模型中,每个SHS相当于区块链中的一个节点peer,家居中的感知器对其周边环境进行探测,并将探测感知到的数据通过ZigBee/Lora/ Bluetooth/WIFI网络发送给智能网关,每个HIG根据P2A-PEBC算法对这些信息进行相应的处理,最后由记账节点将数据存入区块链。In the PEB-SHS model, each SHS is equivalent to a peer peer in the blockchain. The sensor in the home detects its surrounding environment and sends the detected data to the ZigBee/Lora/Bluetooth/WIFI network. Intelligent gateway, each HIG processes the information according to the P2A-PEBC algorithm, and finally the accounting node stores the data into the blockchain.
本发明还提供一种应用所述的方法的系统,该系统包括家庭智能网关的集合,感知器的集合,监控终端的集合。The present invention also provides a system applying the method, the system includes a collection of home intelligent gateways, a collection of sensors, and a collection of monitoring terminals.
家庭智能网关集合中的每个家庭智能网关为一个节点,多个家庭智能网关形成区块链;感知器集合中的每个感知器均能够获取信息并传输给对应的家庭智能网关;监控终端集合中的每个监控终端均能够连接家庭智能网关获取感知器传输的信息。Each home intelligent gateway in the home intelligent gateway set is a node, and multiple home intelligent gateways form a blockchain; each sensor in the perceptron set can obtain information and transmit it to the corresponding home intelligent gateway; the monitoring terminal set Each monitoring terminal in the device can connect to the home intelligent gateway to obtain the information transmitted by the sensor.
本发明的系统还包括处理器,该处理器能够实现本发明的软件方法:The system of the present invention also includes a processor capable of implementing the software method of the present invention:
(1)为区块链中每个家庭智能网关分配一对秘钥,所述一对秘钥包括公钥和私钥,同时设置全网秘钥,所述全网秘钥包括全网公钥和全网秘钥;(1) Allocate a pair of secret keys to each home intelligent gateway in the blockchain, the pair of secret keys includes a public key and a private key, and set up a network-wide secret key at the same time, and the network-wide secret key includes a network-wide public key and the whole network key;
(2)将区块链中的全网节点分为特殊节点和普通节点,所述特殊节点存放每个家庭智能网关的公钥;(2) Divide the entire network nodes in the blockchain into special nodes and ordinary nodes, and the special nodes store the public key of each home intelligent gateway;
(3)每个家庭智能网关接收并保存监控终端采集的信息,并将信息分为可见信息和不可见信息,通过全网公钥对不可见信息进行同态加密后,将可见信息和不可见信息打包为数据包后通过私钥进行签名,签名后的数据包通过家庭智能网关发送至网络;(3) Each home intelligent gateway receives and saves the information collected by the monitoring terminal, and divides the information into visible information and invisible information. After the invisible information is homomorphically encrypted by the public key of the whole network, the visible information and invisible information After the information is packaged into a data package, it is signed with a private key, and the signed data package is sent to the network through the home smart gateway;
(4)对数据包做全网验证;(4) Verify the entire network of data packets;
(5)记账节点对一段时间内所有验证后的数据写入一个新的区块,连接在主区块链的尾部。(5) The accounting node writes a new block to all the verified data for a period of time, which is connected to the tail of the main blockchain.
上述处理器为广义上的处理器,即该处理器为泛指,不仅仅指代一个处理器,可指代多个共同实现上述本发明的方法的处理器。The above-mentioned processor is a processor in a broad sense, that is, the processor is a general term, not only refers to one processor, but may refer to a plurality of processors that jointly implement the above method of the present invention.
作为本发明的一个实施例,对于有800户家庭的小区,在采集信息时将每个用户的心率(HR),血压(BP),呼吸频率(RR)上传至HIG。该次同态计算的输入值及结果被作为一个PE-BDS块保存下来,并被同步到所有HIG中。拥有HIG权限的用户可以随时通过授权的同态公钥查阅这些健康数据的统计值,也可对历史数据随链进行追溯和累积计算,但由于数据预处理时加入了私钥的签名,任何节点在未获得SP许可前均无法窥探其他节点的隐私数据。As an embodiment of the present invention, for a cell with 800 households, each user's heart rate (HR), blood pressure (BP), and respiratory rate (RR) are uploaded to the HIG when collecting information. The input values and results of this homomorphic calculation are saved as a PE-BDS block and synchronized to all HIGs. Users with HIG authority can view the statistical values of these health data through the authorized homomorphic public key at any time, and can also trace and accumulate historical data along the chain. However, since the signature of the private key is added during data preprocessing, any node It is impossible to spy on the private data of other nodes without obtaining the permission of the SP.
本发明中,HIG对采集到的本地源数据进行Paillier加密及私钥签名,以密文数据包形式在区块链网络中转发。若数据在经由路由器时,或在传输过程中被截取,外网攻击者由于通不过SP的验证,无法获取,也就难以获得HIG隐私信息。而对于内网攻击者,比如被恶意程序攻陷的HIG,则分为两种情况:1)如果是一般的NP节点,由于获取不到原HIG的,同样无法得到隐私信息;2)若为 SP节点,则必须完成SP集合的共识后才能获得,根据拜占庭共识机制,该共识需要获得超过2/3节点的支持,这意味着攻击者必须攻陷2/3的SP节点才有可能得到,从概率上来说这几乎不可能。因此,本发明的方法可以很大程度上保障数据的安全性。In the present invention, HIG performs Paillier encryption and private key signature on the collected local source data, and forwards it in the blockchain network in the form of ciphertext data packets. If the data is intercepted when passing through the router or during the transmission process, the external network attacker cannot obtain the HIG privacy information because it cannot pass the verification of the SP. For intranet attackers, such as HIGs captured by malicious programs, there are two cases: 1) If it is a general NP node, since the original HIG cannot be obtained, the private information cannot be obtained; 2) If it is an SP node, you must complete the consensus of the SP set before it can be obtained. According to the Byzantine consensus mechanism, the consensus needs to be supported by more than 2/3 of the nodes, which means that the attacker must capture 2/3 of the SP nodes to obtain it. From the probability This is almost impossible. Therefore, the method of the present invention can largely guarantee the security of data.
同时,本发明使用PE-BDS结构进行区块的组织,由于区块链技术自身具有防篡改、永久性、去中心化和开放性的特点,各HIG可以在形成区块后,通过同步链块的方式获得这一永久的数据库,其中PVD数据可直接从链块中获取并计算,对涉及隐私的CT数据可以进行统计、累加等同态计算,获得授权后可以获知相应结果而不破坏数据集的隐私性。At the same time, the present invention uses the PE-BDS structure to organize blocks. Since the block chain technology itself has the characteristics of anti-tampering, permanence, decentralization and openness, each HIG can synchronize the chain blocks after forming blocks. This permanent database can be obtained in the way of PVD data, in which PVD data can be directly obtained and calculated from the chain block, and the CT data involving privacy can be counted and accumulated isomorphically calculated. After obtaining authorization, the corresponding results can be obtained without destroying the data set. privacy.
并且,通过paillier算法处理过的各类隐私数据按照不同家庭、不同指标项进行了区分,加密后的结果集在数据的粒度上细化到了指标级,可供需要进行数据处理和计算的节点根据需要进行子集的选取,也可根据不同的目的进行统计计算。由于密文数据不涉及个人隐私,对数据进行共享、拷贝和分发不会影响隐私的泄露。In addition, the various types of private data processed by the paillier algorithm are distinguished according to different families and different index items, and the encrypted result set is refined to the index level in terms of data granularity, which can be used by nodes that need to process and calculate according to the data. Subsets need to be selected, and statistical calculations can also be performed according to different purposes. Since ciphertext data does not involve personal privacy, sharing, copying and distributing data will not affect the disclosure of privacy.
且由于采用了区块链技术作为支撑,通过把工作负载分散到网络,当一个节点发生故障时,其他节点不会受到影响,避免了单点失败。此外,区块链的去中心化存储、不可篡改性、强时序性以及公开验证等特点使得每个HIG都参与到整个系统的计算与验证过程中,在提高了系统算力的同时,也增强了系统的鲁棒性。And because of the use of blockchain technology as support, by distributing the workload to the network, when a node fails, other nodes will not be affected, avoiding a single point of failure. In addition, the decentralized storage, immutability, strong timing, and public verification of the blockchain allow each HIG to participate in the calculation and verification process of the entire system, which not only improves the computing power of the system, but also enhances the the robustness of the system.
在本说明书的描述中,具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。In the description of this specification, the particular features, structures, materials or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本领域的技术人员在本发明揭露的范围内,可轻易想到的变化或者替换,都应该涵盖在本发明的保护范围内。The above are only specific embodiments of the present invention, but the protection scope of the present invention is not limited thereto. Any changes or substitutions that can be easily thought of by those skilled in the art within the scope disclosed by the present invention should be Included in the protection scope of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910359650.8A CN110677234B (en) | 2019-04-30 | 2019-04-30 | Privacy protection method and system based on homomorphic encryption blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910359650.8A CN110677234B (en) | 2019-04-30 | 2019-04-30 | Privacy protection method and system based on homomorphic encryption blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110677234A true CN110677234A (en) | 2020-01-10 |
CN110677234B CN110677234B (en) | 2023-06-20 |
Family
ID=69068547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910359650.8A Active CN110677234B (en) | 2019-04-30 | 2019-04-30 | Privacy protection method and system based on homomorphic encryption blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110677234B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995449A (en) * | 2020-02-27 | 2020-04-10 | 台州市相闻信息技术有限公司 | Intelligent household privacy protection system and privacy protection method based on block chain |
CN111711627A (en) * | 2020-06-16 | 2020-09-25 | 湖南天河国云科技有限公司 | Industrial Internet data security monitoring method and system based on block chain |
CN112217797A (en) * | 2020-09-09 | 2021-01-12 | 苏州工业园区凌志软件股份有限公司 | Intelligent gateway Internet of things control system and method applying block chain technology |
CN113065146A (en) * | 2021-04-02 | 2021-07-02 | 浙江永旗区块链科技有限公司 | Homomorphic encryption method for block chain data protection |
CN114205068A (en) * | 2021-12-17 | 2022-03-18 | 佛山市鑫诺家具有限公司 | Intelligent home control method and cloud server |
CN116032937A (en) * | 2022-11-28 | 2023-04-28 | 中国联合网络通信集团有限公司 | Edge computing equipment calculation transaction method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549749A (en) * | 2016-12-06 | 2017-03-29 | 杭州趣链科技有限公司 | A kind of block chain method for secret protection encrypted based on additive homomorphism |
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
WO2018137316A1 (en) * | 2017-01-24 | 2018-08-02 | 上海亿账通区块链科技有限公司 | Secure transaction method based on block chain, electronic device, system, and storage medium |
-
2019
- 2019-04-30 CN CN201910359650.8A patent/CN110677234B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN106549749A (en) * | 2016-12-06 | 2017-03-29 | 杭州趣链科技有限公司 | A kind of block chain method for secret protection encrypted based on additive homomorphism |
WO2018137316A1 (en) * | 2017-01-24 | 2018-08-02 | 上海亿账通区块链科技有限公司 | Secure transaction method based on block chain, electronic device, system, and storage medium |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
Non-Patent Citations (1)
Title |
---|
田承东: "同态加密在物联网区块链数据安全中的应用", 《网络安全技术与应用》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995449A (en) * | 2020-02-27 | 2020-04-10 | 台州市相闻信息技术有限公司 | Intelligent household privacy protection system and privacy protection method based on block chain |
CN111711627A (en) * | 2020-06-16 | 2020-09-25 | 湖南天河国云科技有限公司 | Industrial Internet data security monitoring method and system based on block chain |
CN111711627B (en) * | 2020-06-16 | 2023-03-31 | 湖南天河国云科技有限公司 | Industrial Internet data security monitoring method and system based on block chain |
CN112217797A (en) * | 2020-09-09 | 2021-01-12 | 苏州工业园区凌志软件股份有限公司 | Intelligent gateway Internet of things control system and method applying block chain technology |
CN113065146A (en) * | 2021-04-02 | 2021-07-02 | 浙江永旗区块链科技有限公司 | Homomorphic encryption method for block chain data protection |
CN114205068A (en) * | 2021-12-17 | 2022-03-18 | 佛山市鑫诺家具有限公司 | Intelligent home control method and cloud server |
CN114205068B (en) * | 2021-12-17 | 2022-09-09 | 珠海市利得科技有限公司 | Intelligent household control method |
CN116032937A (en) * | 2022-11-28 | 2023-04-28 | 中国联合网络通信集团有限公司 | Edge computing equipment calculation transaction method and system |
CN116032937B (en) * | 2022-11-28 | 2024-08-16 | 中国联合网络通信集团有限公司 | Edge computing equipment calculation transaction method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110677234B (en) | 2023-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110677234B (en) | Privacy protection method and system based on homomorphic encryption blockchain | |
She et al. | Homomorphic consortium blockchain for smart home system sensitive data privacy preserving | |
Uddin et al. | Continuous patient monitoring with a patient centric agent: A block architecture | |
CN114499895B (en) | A data trusted processing method and system integrating trusted computing and blockchain | |
Xue et al. | Private blockchain-based secure access control for smart home systems | |
Wang et al. | Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches | |
CN103414690B (en) | One can openly be verified the high in the clouds data property held method of calibration | |
CN105530253B (en) | Wireless sensor network access authentication method under Restful framework based on CA certificate | |
CN112417494B (en) | Power blockchain system based on trusted computing | |
Srikanth et al. | An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems | |
CN108959873B (en) | Certification Methods for Telemedicine Systems | |
Xia et al. | Secure multi-dimensional and multi-angle electricity data aggregation scheme for fog computing-based smart metering system | |
CN113259135B (en) | Lightweight blockchain communication authentication device and method for detecting data tamper | |
Puthal et al. | A synchronized shared key generation method for maintaining end-to-end security of big data streams | |
CN110972136A (en) | Internet of things safety communication module, terminal, safety control system and authentication method | |
Liu et al. | A privacy-preserving medical data sharing scheme based on consortium blockchain | |
Chen et al. | Blockchain for Health IoT: A privacy‐preserving data sharing system | |
CN111200604A (en) | Privacy protection method and system based on data aggregation | |
Liu et al. | RPMDA: Robust and privacy-enhanced multidimensional data aggregation scheme for fog-assisted smart grids | |
Bhowmik et al. | EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network | |
Deebak et al. | Privacy preserving based on seamless authentication with provable key verification using miomt for b5g-enabled healthcare systems | |
Irshad et al. | A secure convergence of data transmission and intelligent authentication using a sensing approach for the internet of thing | |
Zheng et al. | Design and analysis of telemedicine authentication protocol | |
Al-Hamadi et al. | Lightweight security protocol for health monitoring in Ambient Assisted Living environment | |
CN111131550B (en) | IP address calculation method in local area network based on cryptographic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |