CN110677234B - Privacy protection method and system based on homomorphic encryption blockchain - Google Patents

Privacy protection method and system based on homomorphic encryption blockchain Download PDF

Info

Publication number
CN110677234B
CN110677234B CN201910359650.8A CN201910359650A CN110677234B CN 110677234 B CN110677234 B CN 110677234B CN 201910359650 A CN201910359650 A CN 201910359650A CN 110677234 B CN110677234 B CN 110677234B
Authority
CN
China
Prior art keywords
information
intelligent gateway
home intelligent
whole network
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910359650.8A
Other languages
Chinese (zh)
Other versions
CN110677234A (en
Inventor
佘维
刘炜
田钊
刘琦
杨晓宇
胡跃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University
Original Assignee
Zhengzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University filed Critical Zhengzhou University
Priority to CN201910359650.8A priority Critical patent/CN110677234B/en
Publication of CN110677234A publication Critical patent/CN110677234A/en
Application granted granted Critical
Publication of CN110677234B publication Critical patent/CN110677234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a privacy protection method and a privacy protection system based on homomorphic encryption blockchain, comprising the following steps: each home intelligent gateway is a node, and a plurality of home intelligent gateways form a block chain; distributing a pair of secret keys for each home intelligent gateway in the blockchain, and setting a whole network secret key at the same time; dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store public keys of each home intelligent gateway; each home intelligent gateway receives and stores the information collected by the monitoring terminal collected by the sensor, divides the information into visible information and invisible information, homomorphic encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway; performing full network verification on the data packet; the accounting node writes a new block to all verified data in a period of time, and is connected to the tail of the main blockchain.

Description

Privacy protection method and system based on homomorphic encryption blockchain
Technical Field
The invention relates to a privacy protection method, in particular to a privacy data protection method based on a blockchain.
Background
With the development of computer technology, internet technology and communication technology, intelligent home systems based on internet of things (Internet of things, IOT) have been developed. In such systems, the effective communication between devices (D2D) is largely dependent on the Computing power of the Edge devices, and the development of Edge Computing (EC) technology brings the Computing power closer to the user. By addressing the demand at the edge, a faster response is provided to the user.
In smart home systems, information of personal user health conditions and information transmitted and stored through mobile phones, tablet computers, wireless sensors and wearable personal health devices is increasing. Since the medical devices in the system record sensitive information of the user, such as Blood Pressure (BP), heart Rate (HR), respiratory Rate (RR), etc., if the personal sensitive information is attacked or leaked maliciously, irrecoverable loss will be caused. Therefore, information security and privacy protection problems in smart home edge devices are of interest to many researchers. Document Security and privacy issues for an IoT based smart home provides a smart home IoT architecture that allows users to interact through various devices that support smart home management and analyze different scenarios to determine possible security and privacy issues for the users. The literature Low-cost flow-based security solutions for smart-home IoT devices provides a solution for future smart home network level security, i.e., flow-based monitoring not only achieves most of the security advantages of packet-based monitoring, but also reduces processing costs. Document a Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow proposes an internet of things intrusion detection and mitigation framework (intrusion detection and mitigation, ioT-IDM) that provides network-level protection for intelligent devices deployed in a home environment. The method is mainly used for monitoring network activities of expected intelligent devices in a home environment and investigating whether any suspicious or malicious activities exist. Although the above method protects the privacy security of the user to some extent, some architectural problems still exist. For example, the above documents all use a central transaction data processing mechanism, and if a central node is trapped, the security and privacy of device data are difficult to guarantee.
Disclosure of Invention
The invention provides a novel intelligent home system data distribution and privacy protection method, which provides safer privacy guarantee for data exchange between intelligent devices facing edge computing by combining homomorphic encryption and blockchain technology.
In order to solve the technical problems, the invention adopts the following technical scheme:
a privacy protection method based on homomorphic encryption block chain comprises the following steps:
ST1: establishing an intelligent home system model, wherein the intelligent home system model is a five-tuple:
(MT,HIG,SC,CT,α,β)
wherein:
(1)MT={mt i |i∈N + is a finite set of monitor terminals, mt i Representing an ith monitoring terminal;
(2)HIG={hig i |i∈N + is a finite set of home intelligent gateways, hig therein i Representing an ith home intelligent gateway, wherein a plurality of home intelligent gateways form a block chain;
(3)SC={sc i |i∈N + is a finite set of perceptrons, where sc i Representing the i-th perceptron;
(4)
Figure GDA0002300756970000021
a communication network for MT to HIG;
(5)
Figure GDA0002300756970000022
a communication network being HIG to SC;
each home intelligent gateway is a node, and a plurality of home intelligent gateways form a block chain;
ST2: distributing a pair of secret keys for each home intelligent gateway in a blockchain, wherein the pair of secret keys comprises a public key and a private key, and simultaneously setting a whole network secret key, and the whole network secret key comprises a whole network public key and a whole network secret key;
ST3: dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store public keys of each home intelligent gateway;
ST4: each home intelligent gateway receives and stores the information of the monitoring terminal acquired by the perceptron, divides the information into visible information and invisible information, homomorphic encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
ST5: performing full network verification on the data packet;
ST6: the accounting node writes a new block to all verified data in a period of time, and is connected to the tail of the main blockchain.
The block data construction method of each block in the block chain comprises the following steps:
dividing information stored in each home intelligent gateway into visible information and invisible information;
homomorphic encryption is carried out on invisible information by using a full-network public key, and ciphertext is generated;
the ciphertext of a plurality of home intelligent gateways stored in the same block is stored in the block of the storage area for recording;
after the ciphertext hash operation of a plurality of home intelligent gateways stored in the same block, a unique root hash value is generated and stored in the block header, and the whole network public key for homomorphic encryption of the ciphertext is also stored in the same time block header.
In ST5, performing full network authentication on the data packet includes:
each data packet is provided with a private key signature of the home intelligent gateway, the common node determines to send the data packet to the home intelligent gateway of the network by inquiring the public key of each home intelligent gateway stored in the special node, then the node sends a homomorphic decryption request to a trusted third party service to verify the authenticity of information, and the third party service sends decryption data to a requester according to the whole network key after receiving the request.
In ST6, after the transaction information is successfully verified, each home intelligent gateway selects an accounting node of the whole network according to the POW consensus algorithm, and the accounting node writes all information in a new block within a period of time and links the new block to the tail end of the main block chain.
A pair of keys is randomly distributed to each home intelligent gateway through a third-party trust authority, and meanwhile, a whole network key is randomly distributed through the third-party trust authority.
A system for applying the method, comprising:
a family intelligent gateway set, wherein each family intelligent gateway in the family intelligent gateway set is a node, and a plurality of family intelligent gateways form a block chain;
the system comprises a sensor set, wherein each sensor in the sensor set can acquire monitoring information generated by a monitoring terminal and transmit the monitoring information to a corresponding home intelligent gateway;
the monitoring system comprises a monitoring terminal set, wherein each monitoring terminal in the monitoring terminal set can generate monitoring information;
a processor capable of implementing the method of:
(1) Distributing a pair of secret keys for each home intelligent gateway in a blockchain, wherein the pair of secret keys comprises a public key and a private key, and simultaneously setting a whole network secret key, and the whole network secret key comprises a whole network public key and a whole network secret key;
(2) Dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store public keys of each home intelligent gateway;
(3) Each home intelligent gateway receives and stores the information acquired by the monitoring terminal, divides the information into visible information and invisible information, packs the visible information and the invisible information into data packets after homomorphic encryption of the invisible information by a whole network public key, signs the data packets by a private key, and sends the signed data packets to a network by the home intelligent gateway;
(4) Performing full network verification on the data packet;
(5) The accounting node writes a new block to all verified data in a period of time, and is connected to the tail of the main blockchain.
The invention has the beneficial effects that: the invention can provide safer privacy guarantee for data exchange between intelligent devices by implementing homomorphic encryption and distribution protection mechanisms on the sensitive data of the users.
Drawings
FIG. 1 is a block chain encryption schematic.
Detailed Description
The present invention will be described in further detail with reference to the following embodiments.
The blockchain is a technical scheme for collectively maintaining a reliable database by any number of nodes through a cryptography method in a mode of decentralization and degranulation. The data structure of a blockchain is largely divided into two parts: 1) The block head mainly comprises a hash value of the last block and is used for connecting the previous block to ensure the integrity of a block chain; 2) The block body includes main information (e.g., transaction information) of the block, and the main information, the last hash value of the block, and the random number together form the hash value of the block. The data structure of the blockchain enables the information of each block on the chain to be traced back by the predecessor nodes and to influence the information composition of the successor nodes. The cryptography method ensures that malicious attacks cannot tamper with information, thereby ensuring the safety and the integrity of data. The construction of the blockchain follows a set of consensus and protocol mechanisms, each node of the whole network can verify or write records, but corresponding data is only allowed to be written into the block when most (even all) nodes of the whole network consistently confirm the correctness of a certain record.
The Paillier homomorphic encryption system is the first addition homomorphic encryption password constitution based on the decision-made number remaining class problem, and in 1999, the Paillier of scholars proposed the mechanism which supports any multiple addition homomorphic operation based on the decision-made number remaining problem. The addition homomorphism of the method not only can rapidly process ciphertext data, but also can meet higher security requirements. This means that the encryption of m1+m2 can be calculated given only the public key and the encryption of m1 and m 2.
The invention provides an intelligent home data privacy protection method based on blockchain and homomorphic encryption, so that an intelligent home system model is firstly established and is a five-tuple SHS:
(MT,HIG,SC,CT,α,β)
wherein:
(1)MT={mt i |i∈N + is a finite set of monitor terminals, mt i Representing the ith monitorA terminal;
(2)HIG={hig i |i∈N + is a finite set of home intelligent gateways, hig therein i Representing an ith home intelligent gateway, wherein a plurality of home intelligent gateways form a block chain;
(3)SC={sc i |i∈N + is a finite set of perceptrons, where sc i Representing the i-th perceptron;
(4)
Figure GDA0002300756970000051
a GSM/GPRS/Internet/WIFI communication network from MT to HIG;
(5)
Figure GDA0002300756970000052
and the wireless network is a ZigBee/Lora/Bluetooth/WIFI communication network from HIG to SC.
The intelligent home system model divides the whole framework into three layers: an application layer, a network layer, and a perception layer. The application layer mainly performs data access, analysis and processing, and finally issues a control command, namely, a user can access the terminal through a GSM/GPRS/Internet/WIFI network; the network layer mainly relates to network access and data transmission, namely alpha and beta; the perception layer is mainly used for collecting data generated by real world devices. The home gateway is a control core of the intelligent home system, is the only way for connecting an external network and a home internal network, and plays a role in supporting the rising and falling. Allowing access to any device with access to the GSM/GPRS/Internet/WIFI network upwards, and collecting communication data of various sensors downwards through the ZigBee/Lora/Bluetooth/WIFI network.
The monitoring terminal refers to various mobile devices in the real world, such as mobile phones, iPad, electric meters, air conditioners and the like. The sensor is some sensing devices, and mainly collects data generated by real world devices.
The sensor collects information generated by the monitoring terminal and transmits the information to the home intelligent gateway, the intelligent gateway can be used as a node in the blockchain to form the blockchain together, and the monitoring terminal cannot be connected with the intelligent gateway to perform data access, and is only equipment for generating data.
In the blockchain, each home intelligent gateway is a node of the blockchain, and a plurality of home intelligent gateways can form the blockchain, and at the moment, a blockchain framework is introduced on the basis of the SHS model to provide the Paillier-encrypted blockchain-based intelligent home system PEB-SHS.
The PEB-SHS model is an octave:
(MT,HIG,SC,K,pk b ,α,φ,β)
wherein the meanings of MT, HIG, SC, alpha, beta are consistent with the SHS model, K, pk b Phi is respectively:
(1)K={pk i |i∈N + -a finite set of HIG public keys;
(2)pk b a public key for encrypting the whole network data;
(3) And phi is information storage between the HIGs by adopting the following P2A_PEBC algorithm, so that the safety of the information is ensured.
In an embodiment of the present invention, a Paillier encryption-based block data structure PE-BDS is presented to describe the data format in the PEB-SHS model. Because the transaction data in the PE-BDS mainly records health information of the user, such as blood pressure BP, heart rate HR, oxygen content OC, respiratory rate RR, etc., and these data are the data that need to be privacy-protected, the data block does not directly hash the collected information, but divides the plaintext information (such as PT1-PT4 in the figure) into two types of visible information PVD and invisible information IPD, the former is some information that can be disclosed, and the latter is private, sensitive, information visible only to the user, such as BP, HR, RR, OC, etc. And then, paillier homomorphic encryption is carried out on the IPD by using a full network secret key Block-PK, ciphertext (such as CT1-CT4 in the figure) is generated, hash operation (such as Hash1-Hash4 in the figure) is carried out, finally, a unique root Hash value is generated and recorded in a Block head, and the ciphertext is recorded in the Block.
In addition, the block header portion of the data model is augmented with an information pk over the original blockchain b This information mainly records the public key used by the block in Paillier encryption of the IPD to facilitate later viewing of the real information. This encryption-before-hash approach increasesThe protection of the private data is enhanced, and the disclosure of the private data can be further prevented.
Based on the intelligent home model and the block data structure, the invention provides a privacy protection method P2A_PEBC based on homomorphic encryption block chains, which specifically comprises the following steps:
step 1: distribution key SHK and full network key BLOCK-PK: a third party trust authority randomly distributes a pair of SHKs for each home intelligent gateway in a blockchain, and each pair of keys comprises a pair of public keys pk i And private key sk i Simultaneously, a third party trust authority randomly generates a whole network secret key, and a whole network secret key BLOCK-PK comprises a whole network public key PK b And a full network key sk b The method comprises the steps of carrying out a first treatment on the surface of the In an embodiment of the invention, the third party trust authority described above may select VeriSign.
Step 2: dividing nodes: dividing the whole network nodes in the block chain into special nodes SP and common nodes NP, wherein the special nodes store public keys of each home intelligent gateway; the number of the special nodes is at least 4 according to the Bayesian-busy consensus requirement, and K is mainly stored; the common node is mainly responsible for publishing and verifying data information in the network.
Step 3: paillier encrypts IPD type data. Each home intelligent gateway receives and stores the information acquired by the sensor, divides the information into visible information and invisible information, and uses the public key pk of the whole network b After homomorphic encryption is carried out on invisible information, the visible information and the encrypted invisible information are packaged into a data packet DP and then pass through a private key sk i Signing, and sending the signed data packet to a network through a home intelligent gateway;
DP d ={Data ski |d∈N + ,i∈N + }
wherein d is the sequence number of the Data packet, data ski Indicating the use of private key sk i Signed data. Finally, HIG will DP d And distributed to the network through the router.
Step 4: and verifying the data packet obtained in the last step as a whole network node. First by SP node pair DP d And (3) carrying out identity authentication on the source of the account book and maintaining a public account book. From the following componentsAt each DP d Sk with HIG thereon i Signature, so NP can query K stored in SP to determine DP d Is transmitted by which HIG. Then NP node sends homomorphic decipher request to a trusted third party service to verify information authenticity, third party service receives request and then according to sk b The decrypted data is sent to the requester.
Step 5: and obtaining a blockchain public ledger and a local ledger. After the transaction information is successfully verified, each HIG selects the accounting nodes of the whole network according to the POW consensus algorithm, and the accounting nodes write all information in a period of time into a new block and link the new block at the tail end of the main chain. The data structure of each block is the PE-BDS, and each block comprises a plurality of node data.
The following table is the pseudo code of the above steps
Figure GDA0002300756970000071
Figure GDA0002300756970000081
In the PEB-SHS model, each SHS is equivalent to a node peer in the blockchain, a sensor in the home detects the surrounding environment of the node peer, detected and perceived data is sent to the intelligent gateway through a ZigBee/Lora/Bluetooth/WIFI network, each HIG carries out corresponding processing on the information according to a P2A-PEBC algorithm, and finally the accounting node stores the data in the blockchain.
The invention also provides a system applying the method, which comprises a set of home intelligent gateways, a set of perceptrons and a set of monitoring terminals.
Each home intelligent gateway in the home intelligent gateway set is a node, and a plurality of home intelligent gateways form a block chain; each sensor in the sensor set can acquire information and transmit the information to a corresponding home intelligent gateway; each monitoring terminal in the monitoring terminal set can be connected with the home intelligent gateway to acquire information transmitted by the sensor.
The system of the present invention further comprises a processor capable of implementing the software method of the present invention:
(1) Distributing a pair of secret keys for each home intelligent gateway in a blockchain, wherein the pair of secret keys comprises a public key and a private key, and simultaneously setting a whole network secret key, and the whole network secret key comprises a whole network public key and a whole network secret key;
(2) Dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store public keys of each home intelligent gateway;
(3) Each home intelligent gateway receives and stores the information acquired by the monitoring terminal, divides the information into visible information and invisible information, packs the visible information and the invisible information into data packets after homomorphic encryption of the invisible information by a whole network public key, signs the data packets by a private key, and sends the signed data packets to a network by the home intelligent gateway;
(4) Performing full network verification on the data packet;
(5) The accounting node writes a new block to all verified data in a period of time, and is connected to the tail of the main blockchain.
The processor is a processor in a broad sense, that is, the processor is a general reference, and not only a single processor, but also a plurality of processors that collectively implement the method of the present invention.
As an embodiment of the present invention, for a cell with 800 households, the Heart Rate (HR), blood Pressure (BP), and Respiratory Rate (RR) of each user are uploaded to the HIG when the information is acquired. The input values and results of this sub-homomorphism calculation are saved as a PE-BDS block and synchronized to all HIGs. Users with HIG authority can review the statistics values of the health data through authorized homomorphic public keys at any time, historical data can be traced and accumulated along with the chain, but any node cannot snoop the privacy data of other nodes before SP permission is not obtained due to the fact that the signature of the private key is added during data preprocessing.
In the invention, the HIG performs Paillier encryption and private key signature on the collected local source data, and forwards the local source data in a block chain network in the form of ciphertext data packets. If the data is intercepted during the process of passing through the router or during the transmission, the foreign network attacker cannot obtain the data because the data cannot pass the verification of the SP, and thus the HIG privacy information is difficult to obtain. For intranet attackers, such as HIGs that are trapped by malicious programs, two situations are classified: 1) If the node is a general NP node, the privacy information can not be obtained as the original HIG can not be obtained; 2) In the case of SP nodes, this is achieved by having to complete the consensus of the SP set, which, according to the bayer consensus mechanism, requires support for more than 2/3 nodes, which means that an attacker has to sink 2/3 SP nodes to be possible, which is almost impossible from a probability point of view. Therefore, the method of the invention can ensure the safety of the data to a great extent.
Meanwhile, the invention uses PE-BDS structure to organize the blocks, because the blockchain technology has the characteristics of tamper resistance, permanence, decentralization and openness, each HIG can obtain the permanent database by synchronizing the chain blocks after forming the blocks, wherein PVD data can be directly obtained and calculated from the chain blocks, statistics and accumulation equivalent calculation can be carried out on CT data related to privacy, and corresponding results can be obtained without damaging the privacy of the data set after obtaining authorization.
And various privacy data processed by the paillier algorithm are distinguished according to different families and different index items, the encrypted result set is refined to an index level in granularity of the data, nodes which need to process and calculate the data can be used for selecting subsets according to the needs, and statistical calculation can be performed according to different purposes. Since ciphertext data does not relate to personal privacy, sharing, copying, and distributing the data does not affect disclosure of privacy.
And because the blockchain technology is used as a support, by dispersing the workload to the network, when one node fails, other nodes are not affected, and single-point failure is avoided. In addition, the characteristics of the block chain such as decentralization storage, non-tamper-resistance, strong time sequence property, public verification and the like enable each HIG to participate in the calculation and verification process of the whole system, so that the system calculation power is improved, and meanwhile, the system robustness is enhanced.
In the description of the present specification, a particular feature, structure, material, or characteristic may be combined in any suitable manner in one or more embodiments or examples.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the scope of the present invention.

Claims (6)

1. The privacy protection method based on homomorphic encryption block chain is characterized by comprising the following steps:
ST1: establishing an intelligent home system model, wherein the intelligent home system model is a five-tuple:
(MT,HIG,SC,CT,α,β)
wherein:
(1)MT={mt i |i∈N + is a finite set of monitor terminals, mt i Representing an ith monitoring terminal;
(2)HIG={hig i |i∈N + is a finite set of home intelligent gateways, hig therein i Representing an ith home intelligent gateway, wherein a plurality of home intelligent gateways form a block chain;
(3)SC={sc i |i∈N + is a finite set of perceptrons, where sc i Representing the i-th perceptron;
(4)α:
Figure FDA0004070303190000011
a communication network for MT to HIG;
(5)β:
Figure FDA0004070303190000012
a communication network being HIG to SC;
based on the SHS model, introducing a blockchain framework to give a Paillier-encrypted blockchain-based intelligent household system PEB-SHS;
the PEB-SHS model is an octave:
(MT,HIG,SC,K,pk b ,α,φ,β)
wherein the meanings of MT, HIG, SC, alpha, beta are consistent with the SHS model, K, pk b Phi is respectively:
(1)K={pk i |i∈N + -a finite set of HIG public keys;
(2)pk b a public key for encrypting the whole network data;
(3) The phi is information storage between the HIGs by adopting the following P2A_PEBC algorithm, so that the safety of the information is ensured;
each home intelligent gateway is a node, and a plurality of home intelligent gateways form a block chain;
ST2: distributing a pair of secret keys for each home intelligent gateway in a blockchain, wherein the pair of secret keys comprises a public key and a private key, and simultaneously setting a whole network secret key, and the whole network secret key comprises a whole network public key and a whole network secret key;
ST3: dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store public keys of each home intelligent gateway;
ST4: each home intelligent gateway receives and stores the information of the monitoring terminal acquired by the perceptron, divides the information into visible information and invisible information, homomorphic encrypts the invisible information through a whole network public key, packages the visible information and the invisible information into a data packet, signs the data packet through a private key, and sends the signed data packet to a network through the home intelligent gateway;
ST5: performing full network verification on the data packet;
ST6: the accounting node writes a new block to all verified data in a period of time, and is connected to the tail of the main blockchain.
2. The privacy protection method based on homomorphic encryption blockchain of claim 1, wherein:
the block data construction method of each block in the block chain comprises the following steps:
dividing information stored in each home intelligent gateway into visible information and invisible information;
homomorphic encryption is carried out on invisible information by using a full-network public key, and ciphertext is generated;
the ciphertext of a plurality of home intelligent gateways stored in the same block is stored in the block of the storage area for recording;
after the ciphertext hash operation of a plurality of home intelligent gateways stored in the same block, a unique root hash value is generated and stored in the block header, and the whole network public key for homomorphic encryption of the ciphertext is also stored in the same time block header.
3. The privacy protection method based on homomorphic encryption blockchain of claim 1, wherein:
in ST5, performing full network authentication on the data packet includes:
each data packet is provided with a private key signature of the home intelligent gateway, the common node determines to send the data packet to the home intelligent gateway of the network by inquiring the public key of each home intelligent gateway stored in the special node, then the node sends a homomorphic decryption request to a trusted third party service to verify the authenticity of information, and the third party service sends decryption data to a requester according to the whole network key after receiving the request.
4. The privacy protection method based on homomorphic encryption blockchain of claim 1, wherein:
in ST6, after the transaction information is successfully verified, each home intelligent gateway selects an accounting node of the whole network according to the POW consensus algorithm, and the accounting node writes all information in a new block within a period of time and links the new block to the tail end of the main block chain.
5. The privacy protection method based on homomorphic encryption blockchain of claim 1, wherein:
a pair of keys is randomly distributed to each home intelligent gateway through a third-party trust authority, and meanwhile, a whole network key is randomly distributed through the third-party trust authority.
6. A system for applying the method of any one of claims 1 to 5, comprising:
a family intelligent gateway set, wherein each family intelligent gateway in the family intelligent gateway set is a node, and a plurality of family intelligent gateways form a block chain;
the system comprises a sensor set, wherein each sensor in the sensor set can acquire monitoring information generated by a monitoring terminal and transmit the monitoring information to a corresponding home intelligent gateway;
the monitoring system comprises a monitoring terminal set, wherein each monitoring terminal in the monitoring terminal set can generate monitoring information;
a processor capable of implementing the method of:
(1) Distributing a pair of secret keys for each home intelligent gateway in a blockchain, wherein the pair of secret keys comprises a public key and a private key, and simultaneously setting a whole network secret key, and the whole network secret key comprises a whole network public key and a whole network secret key;
(2) Dividing the whole network nodes in the block chain into special nodes and common nodes, wherein the special nodes store public keys of each home intelligent gateway;
(3) Each home intelligent gateway receives and stores the information acquired by the monitoring terminal, divides the information into visible information and invisible information, packs the visible information and the invisible information into data packets after homomorphic encryption of the invisible information by a whole network public key, signs the data packets by a private key, and sends the signed data packets to a network by the home intelligent gateway;
(4) Performing full network verification on the data packet;
(5) The accounting node writes a new block to all verified data in a period of time, and is connected to the tail of the main blockchain.
CN201910359650.8A 2019-04-30 2019-04-30 Privacy protection method and system based on homomorphic encryption blockchain Active CN110677234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910359650.8A CN110677234B (en) 2019-04-30 2019-04-30 Privacy protection method and system based on homomorphic encryption blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910359650.8A CN110677234B (en) 2019-04-30 2019-04-30 Privacy protection method and system based on homomorphic encryption blockchain

Publications (2)

Publication Number Publication Date
CN110677234A CN110677234A (en) 2020-01-10
CN110677234B true CN110677234B (en) 2023-06-20

Family

ID=69068547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910359650.8A Active CN110677234B (en) 2019-04-30 2019-04-30 Privacy protection method and system based on homomorphic encryption blockchain

Country Status (1)

Country Link
CN (1) CN110677234B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995449B (en) * 2020-02-27 2020-06-30 台州市相闻信息技术有限公司 Privacy protection method of intelligent household privacy protection system based on block chain
CN111711627B (en) * 2020-06-16 2023-03-31 湖南天河国云科技有限公司 Industrial Internet data security monitoring method and system based on block chain
CN112217797B (en) * 2020-09-09 2023-02-21 苏州工业园区凌志软件股份有限公司 Intelligent gateway Internet of things control system and method applying block chain technology
CN113065146A (en) * 2021-04-02 2021-07-02 浙江永旗区块链科技有限公司 Homomorphic encryption method for block chain data protection
CN114205068B (en) * 2021-12-17 2022-09-09 珠海市利得科技有限公司 Intelligent household control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549749A (en) * 2016-12-06 2017-03-29 杭州趣链科技有限公司 A kind of block chain method for secret protection encrypted based on additive homomorphism
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
WO2018137316A1 (en) * 2017-01-24 2018-08-02 上海亿账通区块链科技有限公司 Secure transaction method based on block chain, electronic device, system, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN106549749A (en) * 2016-12-06 2017-03-29 杭州趣链科技有限公司 A kind of block chain method for secret protection encrypted based on additive homomorphism
WO2018137316A1 (en) * 2017-01-24 2018-08-02 上海亿账通区块链科技有限公司 Secure transaction method based on block chain, electronic device, system, and storage medium
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
同态加密在物联网区块链数据安全中的应用;田承东;《网络安全技术与应用》;20180315(第03期);全文 *

Also Published As

Publication number Publication date
CN110677234A (en) 2020-01-10

Similar Documents

Publication Publication Date Title
Uddin et al. Continuous patient monitoring with a patient centric agent: A block architecture
CN110677234B (en) Privacy protection method and system based on homomorphic encryption blockchain
She et al. Homomorphic consortium blockchain for smart home system sensitive data privacy preserving
Attkan et al. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
Xue et al. Private blockchain-based secure access control for smart home systems
Puthal et al. SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
CN105530253B (en) Wireless sensor network access authentication method under Restful framework based on CA certificate
CN108432205A (en) Use the system and method for the multi-party communication of the safety of agency
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN105516980A (en) Token authentication method for wireless sensor network based on Restful architecture
CN111274594B (en) Block chain-based secure big data privacy protection sharing method
CN112417494A (en) Power block chain system based on trusted computing
US20180013832A1 (en) Health device, gateway device and method for securing protocol using the same
CN113872944A (en) Block chain-oriented zero-trust security architecture and cluster deployment framework thereof
CN108959873B (en) Authentication method for remote medical system
Srikanth et al. An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems
CN110972136A (en) Internet of things safety communication module, terminal, safety control system and authentication method
CN113111386A (en) Privacy protection method for block chain transaction data
Liu et al. A privacy-preserving medical data sharing scheme based on consortium blockchain
Puthal et al. A user-centric security solution for Internet of Things and edge convergence
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
CN111294793A (en) Data privacy protection method for identity authentication in wireless sensor network
Chaudhry et al. A physical capture resistant authentication scheme for the internet of drones
CN112311553B (en) Equipment authentication method based on challenge response
Irshad et al. A secure convergence of data transmission and intelligent authentication using a sensing approach for the internet of thing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant