CN113489692B - Block chain access control model method based on main side chain cooperation - Google Patents
Block chain access control model method based on main side chain cooperation Download PDFInfo
- Publication number
- CN113489692B CN113489692B CN202110695733.1A CN202110695733A CN113489692B CN 113489692 B CN113489692 B CN 113489692B CN 202110695733 A CN202110695733 A CN 202110695733A CN 113489692 B CN113489692 B CN 113489692B
- Authority
- CN
- China
- Prior art keywords
- access control
- contract
- access
- strategy
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a block chain access control model method based on main side chain cooperation, which comprises the following steps: s1, establishing a model strategy architecture part and configuring gateways connected with the parts; s2, configuring an Ethernet workshop main chain on the block chain network for identity authentication; s3, building a side chain, and establishing a connection with an Etherhouse main chain through a Plasma contract; s4, designing related intelligent contracts to be deployed on side chains according to the access control model; s5, uploading resource contents and access rules by a user to obtain a complete access control model strategy; the invention provides an industrial Internet of things access control model strategy based on main and side chain cooperation, aiming at solving the problems that single-point failure and efficient transmission need to be simultaneously solved in access control under the environment of the industrial Internet of things, and aiming at the platform, the access control model is optimized. The data transmission speed and the block chain platform throughput are remarkably improved, and the related cost of access control in the industrial Internet of things can be effectively reduced.
Description
Technical Field
The invention relates to the field of access control, in particular to a block chain access control model method based on main and side chain cooperation.
Background
In the process of the rapid development of industrial internet of things, the internet of things also bears massive data from industry. However, for the traditional industrial internet of things system which highly depends on the centralized server, the development of the industrial internet of things is seriously influenced by fatal defects of data privacy protection, reliable transmission and the like. Access control is a data protection technology which can ensure that data can only be accessed by approved users, but the current access control mostly adopts a centralized server to complete authorization decision, and the design is easy to have single point failure problem and has lower reliability. Meanwhile, the traditional access control is easy to be intercepted and tampered by a third party in the data transmission process. Therefore, how to solve the problems of reliable data transmission and single point of failure of access control in the industrial internet of things becomes a hotspot problem of the development of the industrial internet of things.
The blockchain is an emerging decentralized distributed storage technology, and can establish a trust relationship in a centerless network environment. The block chain solves the safety problem caused by a centralized authorization entity from the technical aspect, and the single-point fault problem can be effectively avoided by combining the block chain with access control, so that the reliability and the safety of the access control are improved. At present, the block chain technology is applied to the internet of things by scholars and is combined with access control to solve the problems of single-point failure and reliable data transmission, and good effects are achieved. An article [ Zhangjiang Hui, chi wave, liru, shijinshan ] Internet of things access control system [ J ] based on an intelligent contract, computer engineering 1-13] aims at the problems of single-point faults and data tampering easily occurring in the Internet of things environment, and an Internet of things access control system based on the intelligent contract is designed and realized; an article [ Sun Guangdong Cheng, lihong Hai, lisaifei, zhang Wei ] is an Internet of things access control system [ J ] based on a block chain, a computer and modernization, 2020 (11): 100-108] provides a new access control model combining the block chain aiming at the problem that the conventional access control model is relatively complex, has the characteristics of flexibility, fine granularity and the like, and can be effectively deployed in an Internet of things system.
The above documents solve the problem of single point failure of access control in the internet of things environment to a certain extent, but in practical applications, especially in the industrial internet of things, massive industrial data transmission exists, and a blockchain system in the industrial internet of things is required to have a higher throughput rate and a shorter transaction confirmation time. Aiming at the problems, an article [ Wenxinglin ] license block chain efficient consensus and cross-chain mechanism research [ D ]. Shandong university, 2019] provides a credible transaction framework in a license environment, and the transaction processing capacity in unit time is increased to improve the data transmission speed; an article [ Xuxuxuedan, gold swimming, ever wisdom, yangjie, chen Rong Yuan ] is applied to a layered lightweight high-flux block chain method [ J ] of industrial internet data security, a computer integrated manufacturing system, 2019,25 (12) ] designs a layered extension type block chain to meet the requirements of high efficiency and security in an industrial environment. According to the scheme, the problem of data transmission throughput rate of the block chain is solved to a certain extent, however, the block chain is required to be verified every time an access request is made by access control in the environment of the industrial Internet of things, and although the structure of the block chain is optimized, the transmission speed of data is reduced due to the large number of nodes by a high-efficiency verification mechanism in the environment of massive nodes.
Disclosure of Invention
The invention provides a block chain access control model strategy with cooperation of main chains and side chains, aiming at solving the problems that single-point failure and efficient transmission need to be simultaneously solved in access control in an industrial Internet of things environment. Firstly, a strategy architecture composed of a client, a block chain network and a device end is established, and identity authentication of the client and the device is established on the block chain network. Secondly, building a main side chain block chain network with an Ether house as a data verification main chain and a side chain as an access control carrier on the block chain network; and the designed access control model is converted into an intelligent contract loaded on the side chain. And finally, the user uploads the resource content and the access rule to complete a final access control strategy, so that the single-point fault is solved, and the data transmission speed is greatly improved.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a block chain access control model method based on main side chain cooperation comprises the following steps:
s1, establishing a policy framework client, a block chain network and an equipment terminal. An application SDK is set at the client side, and an edge device gateway is set at the device side, so that the three parts of networks are connected and communicated;
s2, an Ethernet workshop main chain is built on the block chain network, and the identities of the client and the equipment end are confirmed in the block chain network by applying the SDK and the edge equipment gateway, so that identity verification is performed;
s3, building a plurality of side chains according to network requirements, packaging data of each side chain and then sending the data to a corresponding side chain miner Operator, and submitting block data to an Ethernet main chain by the miner through a Plasma contract;
s4, compiling an intelligent contract which can be deployed on a side chain according to the access control model, sequentially deploying a pre-contract and a supervision contract in a side chain head block, and then sequentially deploying the access control contract;
s5: uploading related resources and access rules on a client, and establishing an interconnected strategy architecture to obtain a complete access control model strategy;
further, in step S4, the access control model adopted is:
the model comprises six components of a resource visitor (subject), a subject information point, a subject and object information processing point, an access control strategy, an object information point and a resource owner (object). The two information points separate resources, users and visitors, and the information processing point internally connects the three; therefore, when a resource access request and resource uploading occur each time, the external part can only contact two information points, and cannot directly contact the internal resource, so that the data leakage is fundamentally cut off.
Further, in step S4, the deployment mode of the intelligent contract is as follows:
the head of the side chain deploys a pre-contract which maintains an information table for recording relevant information of supervision contracts and access control contracts. And then, a supervision contract is deployed on the next block, and the time tolerance function is included in the contract and used for monitoring the access frequency of the visitor and performing batch access allowance on the access in the specified range. Meanwhile, the supervision contract maintains a violation access table for recording violation visitors and performing certain punishment. And when an access request occurs, the access control contract responds to the access request according to the formulated access strategy and the detection result of the supervision contract. And when a new access control contract is added, only the new access control contract is needed to be continuously added on the chain.
Adopt the produced beneficial effect of above-mentioned technical scheme to lie in:
the invention provides a block chain access control model strategy for master-side chain cooperation, which aims at solving the problems of single-point failure and efficient transmission of access control in an industrial Internet of things environment. The invention combines the improved block chain network and the access control model into the access control model based on the cooperation of the main chain and the side chain, and under the model method, the single-point fault problem and the efficient data transmission problem are solved. The method not only optimizes the generation speed of the access control strategy, but also greatly improves the operation stability of the block chain. Can meet the large-scale use requirement under the environment of the industrial Internet of things.
Compared with the traditional blockchain access control model, the method comprises the following steps:
(1) The cooperation of the block chain main chain and the side chain is realized by taking an Ethengfang as a data verification main chain and carrying access control on a Plasma side chain, the pressure of block chain data storage verification is effectively shared, and the data bearing capacity of a block chain network is greatly improved; (2) Adding information points to the two parts of the subject and the object in the model respectively to separate resources, users and visitors; meanwhile, an information processing point is designed inside, and the request is separated from the access control strategy. The method prevents the external entity from directly contacting the internal resource, prevents the access control strategy from being illegally tampered, and greatly improves the security of access control. (3) Decision authorization and decision information management of access control authority are completed by setting a pre-contract, a supervision contract and an access control contract, access is standardized in modes of batch access permission, violation punishment and the like, and access efficiency is greatly improved.
The main side chain combined access control model strategy provided by the invention is substituted into the main chain parameters of the block chain of the Ethernet workshop, and the effectiveness of the provided model strategy on high-efficiency data transmission is verified through experimental analysis, so that the data delay is reduced by 28% compared with the traditional single-chain access control strategy of the Ethernet workshop, and the throughput is up to 220 TPS. The data transmission delay and the storage space occupation can be obviously reduced while the throughput rate is improved.
Drawings
FIG. 1 is a block chain access control model policy framework diagram of master-side chain cooperation;
FIG. 2 is an access control model architecture diagram;
FIG. 3 is a diagram of intelligent contract interactions;
FIG. 4 Access control strategy Generation time-contrast plot
FIG. 5 access control strategy data delay comparison graph;
FIG. 6 access control strategy throughput write request test patterns;
FIG. 7 Access control policy throughput Access resources test graph
FIG. 8 access control strategy memory growth comparison graph;
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The architecture of the invention mainly comprises a client, a block chain network and an equipment end, and the architecture diagram is shown in figure 1, and comprises the following steps:
s1, establishing a policy framework client, a block chain network and an equipment terminal. An application SDK is set at the client side, and an edge device gateway is set at the device side, so that the three parts of networks are connected and communicated;
s2, an Ethernet workshop main chain is built on the block chain network, and the identities of the client and the equipment end are confirmed in the block chain network by applying the SDK and the edge equipment gateway, so that identity verification is performed;
s3, building a plurality of side chains according to network requirements, packaging data of each side chain and then sending the data to a corresponding side chain miner Operator, and submitting block data to an Ethernet main chain by the miner through a Plasma contract;
and S4, after the block chain network is constructed, compiling into an intelligent contract which can be deployed on a side chain according to a designed access control model. In the access control of the industrial Internet of things, not only the permission is simply and clearly divided, but also the risks of excessive authorization, privacy data leakage and the like are prevented. Therefore, the access control authority needs to be divided in a targeted manner according to the characteristics of the use scene.
FIG. 2 shows an access control model designed by the present invention, in which two information points are increased to separate resources, users and visitors, and an information processing point connects the three internally; therefore, when a resource access request and resource uploading occur each time, the external part can only contact two information points, and cannot directly contact the internal resource, so that the data leakage is fundamentally cut off.
Fig. 3 shows a deployment scenario in which the intelligent contract is implemented in the head of the side chain, which deploys a pre-contract, and maintains an information table for recording relevant information of the supervision contract and the access control contract. And then, deploying a supervision contract on the next block, wherein the contract comprises a time tolerance function and is used for monitoring the access frequency of the visitor and performing batch permission access on the access of the specified range. Meanwhile, the supervision contract maintains a violation access table for recording violation visitors and performing certain punishment. And when an access request occurs, the access control contract responds to the access request according to the formulated access strategy and the detection result of the supervision contract. And when a new access control contract is added, only the new access control contract is needed to be continuously added on the chain.
S5: uploading relevant resources and access rules on the client, establishing an interconnected strategy framework, and obtaining a complete access control model strategy
The invention discloses a block chain access control model strategy test verification based on main and side chain cooperation, which comprises the following steps:
experiment-access control model performance testing
The generation time of the access control strategy is an important index for measuring the quality of an access control model. In order to verify the effect of the model in the aspect of strategy generation, a traditional block chain Internet of things access control model is designed for experimental reference to carry out comparison experiments. This experiment prepared a set of concurrent experiments with 50, 100, 200, 500, 800 trials, and both models were tested and recorded.
Experimental results as shown in fig. 4, compared with the model in this document, the policy generation time of the conventional access control model increases with the increase of the number of concurrencies. And the master-side chain cooperation access control model can generate the access strategy more quickly, and the delay of generating the strategy tends to be stable during high-frequency access. The model is effective in solving the problems of slow strategy generation speed and high access delay at high frequency.
Experimental two-main side chain network performance test
The access control under the industrial internet of things requires that a block chain not only ensures stable transmission of data, but also reduces delay of data transmission to ensure timeliness of data requests. In order to test the stability of the main and side chain network, pre-contracts are respectively deployed on the Ethern test chain and the main and side chain network in an experimental selection mode, and relevant information of access control contracts is simulated and written into the contracts. The number of writing times in the experiment was 50 times, 100 times, 200 times, 500 times, and 800 times, respectively. Fig. 5 shows the experimental results, and as shown, the experimental data of the main-side chain network is significantly better than the results obtained by the ether house test chain in terms of both delay time and stability. The effectiveness of the main side chain network in guaranteeing the stability of data and effectively reducing the data delay is proved.
The block chain network applied to the industrial internet of things not only needs to have high data transmission efficiency, but also needs to have high throughput rate to face mass data transmission. In order to test the throughput of the blockchain network when different data volumes are met, the experiment records the strategy-abbreviated writing request and the resource access request respectively by simulating that 10 client nodes send concurrent requests to the side chain for 50 times, 100 times, 200 times, 400 times, 700 times, 1100 times and 1600 times. Fig. 6 and 7 illustrate the throughput of blockchain networks in write requests and accessing resources. As is apparent from the figure, the blockchain of the present invention is not only high throughput, but also excellent stability in the face of high concurrent requests. The effectiveness of the blockchain network of the invention in optimizing throughput and improving blockchain stability under high concurrency is proved.
Experiment result of three-strategy storage space occupation experiment
The code quantity deployed by the access control strategy can be used for measuring the storage pressure of the block chain in actual deployment, and the smaller the code quantity increases with the increase rate of the equipment, the lower the actual deployment cost of the strategy is, and the greater the benefit is. In order to analyze the storage pressure of the access control strategy on the block chain, two common access control strategies are designed for experimental reference and are compared with the access control strategy in the text, and the condition that the contract size increases along with the number of the devices is analyzed. The relevant information of the contract is shown in table 1.
TABLE 1 Intelligent contract related information
When the access control contract storage space growth is plotted against the contract information, as shown in fig. 8, the code amount of the RBAC policy rapidly increases as the number of devices increases, and more than 4 devices are higher than the policy designed herein. Although the ABAC strategy code growth rate is smaller than that of the RBAC strategy, the speed is still increased rapidly compared with the strategy provided by the invention. This demonstrates the obvious effectiveness of the proposed strategy in solving the problem of blockchain storage stress.
Conclusion
Aiming at the problem that single-point faults and efficient transmission need to be solved simultaneously in access control in the environment of the industrial Internet of things, an industrial Internet of things access control model strategy based on main and side chain cooperation is provided. A block chain network used for the industrial Internet of things is designed, and the performance of the block chain is improved; and an access control model suitable for a master side chain block chain network is designed to adapt to high-speed data transmission in the environment of the industrial Internet of things. Through experimental analysis and certification, the method optimizes multiple indexes of block chain access control, such as data transmission speed, stability, throughput rate and the like. Compared with the traditional Ether house single-chain access control strategy, the data delay is reduced by 28 percent, and the throughput is as high as 220 TPS. In the context of proven feasibility of blockchain landing internet of things, it is shown that current blockchain technologies can be optimized at the design level using strategies.
Claims (2)
1. A method for a blockchain access control model based on master-side chain cooperation is characterized by comprising the following steps:
s1, establishing a policy framework client, a block chain network and an equipment end, setting an application SDK (software development kit) at the client, and setting an edge equipment gateway at the equipment end to connect and intercommunicate the three parts of networks;
s2, an Ethernet house main chain is built on the block chain network, and the identities of the client and the equipment terminal are confirmed in the block chain network by applying the SDK and the edge equipment gateway, so that identity verification is carried out;
s3, building a plurality of side chains according to network requirements, packaging data of each side chain and then sending the data to a corresponding side chain miner Operator, and submitting block data to an Ethernet main chain by the miner through a Plasma contract;
s4, compiling an intelligent contract which can be deployed on a side chain according to the access control model, sequentially deploying a pre-contract and a supervision contract in a side chain head block, and then sequentially deploying the access control contract;
the step S4: the method comprises the steps that a front contract is arranged at the head of a side chain, an information table is maintained and used for recording relevant information of a supervision contract and an access control contract, then the supervision contract is arranged on the next block, a time tolerance function is contained in the contract and used for monitoring the access frequency of an accessor and performing batch access allowance on access in a specified range, meanwhile, the supervision contract maintains an illegal access table and performs certain punishment on the illegal accessor, the access control contract is placed in the following block, each block chain is connected to different Internet of things devices, the access control contract maintains an access strategy table and an access record table, when an access request occurs, the access control contract responds to the access request according to a formulated access strategy and a detection result of the supervision contract, and when a new access control strategy is added, only the new access control contract needs to be continuously added on the chain;
s5: and uploading related resources and access rules on the client, and establishing an interconnected strategy architecture to obtain a complete access control model strategy.
2. The method of claim 1, wherein the method comprises: the step S4: the access control model comprises six components, namely a resource accessor, a subject information point, a subject and object information processing point, an access control strategy, an object information point and a resource owner, wherein the two information points separate a resource, a user and an accessor, and the information processing point internally connects the resource accessor, the user and the accessor; therefore, when a resource access request and resource uploading occur each time, the external part can only contact two information points and cannot directly contact the internal resource, and data leakage is fundamentally cut off.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110695733.1A CN113489692B (en) | 2021-06-22 | 2021-06-22 | Block chain access control model method based on main side chain cooperation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110695733.1A CN113489692B (en) | 2021-06-22 | 2021-06-22 | Block chain access control model method based on main side chain cooperation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113489692A CN113489692A (en) | 2021-10-08 |
CN113489692B true CN113489692B (en) | 2023-04-07 |
Family
ID=77935570
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110695733.1A Active CN113489692B (en) | 2021-06-22 | 2021-06-22 | Block chain access control model method based on main side chain cooperation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113489692B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111951108A (en) * | 2020-08-10 | 2020-11-17 | 神话科技传媒(深圳)有限公司上海分公司 | Chain structure design method with intelligent contract block chain with complete picture |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11165862B2 (en) * | 2017-10-24 | 2021-11-02 | 0Chain, LLC | Systems and methods of blockchain platform for distributed applications |
CN110213304B (en) * | 2018-02-28 | 2021-11-30 | 成都高新信息技术研究院 | Block chain network interconnection method and system |
CN109165190A (en) * | 2018-07-11 | 2019-01-08 | 南京邮电大学 | A kind of electronic data based on block chain intelligence contract deposits card method |
US11418510B2 (en) * | 2019-04-29 | 2022-08-16 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing a role based access control and authorization validator via blockchain smart contract execution using distributed ledger technology (DLT) |
CN110097467B (en) * | 2019-05-05 | 2021-04-13 | 华中科技大学 | Side chain test system and method for safety and stability of intelligent contract |
CN110233802B (en) * | 2019-05-14 | 2021-11-02 | 天津大学 | Method for constructing block chain structure with one main chain and multiple side chains |
CN110809006A (en) * | 2019-11-14 | 2020-02-18 | 内蒙古大学 | Block chain-based Internet of things access control architecture and method |
-
2021
- 2021-06-22 CN CN202110695733.1A patent/CN113489692B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111951108A (en) * | 2020-08-10 | 2020-11-17 | 神话科技传媒(深圳)有限公司上海分公司 | Chain structure design method with intelligent contract block chain with complete picture |
Also Published As
Publication number | Publication date |
---|---|
CN113489692A (en) | 2021-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110543464B (en) | Big data platform applied to intelligent park and operation method | |
CN113114498B (en) | Architecture system of trusted block chain service platform and construction method thereof | |
CN112583887B (en) | Data credible sharing method based on block chain | |
Li et al. | Multi-chain and data-chains partitioning algorithm in intelligent manufacturing CPS | |
Han et al. | Research on electronic document management system based on cloud computing | |
Qiang et al. | Mine consortium blockchain: the application research of coal mine safety production based on blockchain | |
CN113489692B (en) | Block chain access control model method based on main side chain cooperation | |
Liu et al. | Using blockchain technology in IoT manufacture environment for intelligence prediction | |
CN113886890A (en) | Digital resource co-construction sharing method and device | |
Hu et al. | Cyber security for smart grid communications: Part I | |
CN111682934B (en) | Method and system for storing, accessing and sharing comprehensive energy metering data | |
CN114168268A (en) | Container technology-based intelligent distribution data acquisition and fusion method and system | |
CN113364592A (en) | Engineering system file management system and method based on credit value union chain | |
Gao et al. | A novel cp-abe based sidechain protocol for distributed power system data storage management with the blockchain | |
Wang et al. | Security research of power system based on Blockchain and 5G Technology | |
Qiu et al. | Blockchain-based cable supply chain traceability system | |
Lan et al. | Brief Analysis for Network Security Issues in Computing Power Network | |
Xia et al. | Research on hidden danger risk perception technology based on big data | |
Guo | Application of blockchain based on deep learning algorithm in enterprise Internet of Things system | |
CN112184225B (en) | Cloud rendering resource exchange method based on blockchain | |
Sun et al. | A Trusted Solution to Hyperledger Fabric Reordering Problem | |
Gong et al. | Qualitative Analysis of Commercial Services in MEC as Phased‐Mission Systems | |
Liu et al. | Anonymous storage and verification model of IIoT based on blockchain: Anonymous storage and verification model of IIoT production status based on blockchain | |
Qiu et al. | A Method for Smart Grid Data Analysis Based on MapReduce Cloud Computing | |
WO2022073225A1 (en) | Dna storage-based incremental information management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |