CN113572762A - Controllable sharing method and system based on Internet of things data - Google Patents

Controllable sharing method and system based on Internet of things data Download PDF

Info

Publication number
CN113572762A
CN113572762A CN202110832282.1A CN202110832282A CN113572762A CN 113572762 A CN113572762 A CN 113572762A CN 202110832282 A CN202110832282 A CN 202110832282A CN 113572762 A CN113572762 A CN 113572762A
Authority
CN
China
Prior art keywords
data
internet
things
original data
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110832282.1A
Other languages
Chinese (zh)
Inventor
周旭
段浩扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Longpu Intelligent Technology Co ltd
Original Assignee
Beijing Longpu Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Longpu Intelligent Technology Co ltd filed Critical Beijing Longpu Intelligent Technology Co ltd
Priority to CN202110832282.1A priority Critical patent/CN113572762A/en
Publication of CN113572762A publication Critical patent/CN113572762A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The application relates to the technical field of Internet of things, in particular to a controllable sharing method and system based on Internet of things data, wherein acquired original data are formed into an original data set, and the original data set is divided into subdata sets with different sensitivities according to data sensitivities; processing the original data in the corresponding sub data sets according to the sensitivity to generate deformed data sets with different safety levels; storing the original data set and the deformed data sets with different safety levels into a data sandbox of the next-stage Internet of things unit; and receiving an access request, if the access device sending the access request belongs to a next level of an IOT unit to which the device generating the data to be accessed belongs, acquiring the original data to be accessed from the original data set stored in the data sandbox of the next level of the IOT unit, and sending the acquired original data to the access device. The data sharing method and device can controllably share the data of the Internet of things, and waste of data resources of the data of the Internet of things is avoided.

Description

Controllable sharing method and system based on Internet of things data
Technical Field
The application relates to the technical field of Internet of things, in particular to a controllable sharing method and system based on Internet of things data.
Background
The Internet of things (Internet of things) is an important component of a new generation of information technology and is also an important development stage of the "informatization" era. As the name implies, the Internet of things is the Internet with connected objects.
With the continuous development of networking technologies, the number of internet of things terminals arranged in various environments is gradually increasing, and thus, the collected physical network data is also explosively increased. In order to ensure the security of the data of the internet of things, even if a huge amount of data of the internet of things exists, the data of the internet of things is difficult to share, so that the data resources of the data of the internet of things are wasted.
Therefore, how to controllably share the data of the internet of things so as to avoid wasting the data resources of the data of the internet of things is a technical problem which needs to be solved by technical personnel in the field at present.
Disclosure of Invention
The application provides a controllable sharing method and system based on internet of things data, so that the internet of things data can be shared controllably, and waste of data resources of the internet of things data is avoided.
In order to solve the technical problem, the application provides the following technical scheme:
a controllable sharing method based on Internet of things data comprises the following steps: step S110, forming an original data set by the acquired original data, and dividing the original data set into subdata sets with different sensitivities according to the sensitivities of the data; step S120, processing the original data in the corresponding sub data sets according to the sensitivity to generate deformed data sets with different safety levels; step S130, storing the original data set and the deformed data sets with different safety levels into a data sandbox of the next level of the Internet of things unit; step S140, receiving an access request, if the access device that sent the access request belongs to the next level of the unit of the internet of things to which the device that generates the data to be accessed belongs, obtaining the original data to be accessed from the original data set stored in the data sandbox of the next level of the unit of the internet of things, and sending the obtained original data to the access device.
The controllable sharing method based on the data of the internet of things preferably further comprises the following steps: step S150, if the access device sending the access request does not belong to the next level of the IOT unit to which the device generating the data to be accessed belongs, establishing a safety channel with a corresponding safety level according to the safety levels corresponding to all devices in the next level of the IOT unit to which the access device belongs and the safety probabilities of all the next level of the IOT units in the previous level of the IOT unit corresponding to the safety levels; and step 160, obtaining the deformation data to be accessed from the deformation data set with the corresponding security level stored in the data sandbox according to the security level of the access device, and sending the deformation data to the access device through the established security channel.
As described above, in the method for controllably sharing data based on the internet of things, preferably, the step S110 includes the following steps: performing data acquisition on each device in a next-stage Internet of things unit, and forming an original data set by using the acquired original data; identifying equipment identification contained in each original data in the original data set, and judging the sensitivity of each original data in the original data set according to the equipment identification; and according to the difference of the sensitivities, dividing the original data in the original data set into sub data sets with different sensitivities.
As described above, in the method for controllably sharing data based on the internet of things, preferably, the step S120 includes the following steps: and processing the original data in each subdata set according to the sensitivity of the original data in each subdata set to generate deformation data with different safety levels, and gathering the deformation data with the same safety level into a deformation data set.
As described above, in the method for controllably sharing data based on the internet of things, preferably, the step S150 includes the following steps: calculating the average security information entropy of the next level of the internet of things unit where the access equipment is located according to the security levels corresponding to all the equipment in the next level of the internet of things unit where the access equipment sending the access request is located and the security probabilities of all the next level of the internet of things unit in the previous level of the internet of things unit corresponding to the security levels; and establishing a corresponding security channel between the access equipment and the data sandbox of the next level of the Internet of things unit to be accessed by taking the calculated average security information entropy as a security level.
A controllable sharing system based on data of the Internet of things comprises: the device comprises a data set establishing module, a data processing module, a data storage module and a data acquisition module; the data set establishing module forms the acquired original data into an original data set, and divides the original data set into subdata sets with different sensitivities according to the sensitivities of the data; the data processing module processes the original data in the corresponding subdata set according to the sensitivity so as to generate deformed data sets with different safety levels; the data storage module stores the original data set and the deformed data sets with different safety levels into a data sandbox of the next level of the Internet of things unit; and receiving an access request, if the access device sending the access request belongs to a next level of an IOT unit to which the device generating the data to be accessed belongs, acquiring the original data to be accessed from the original data set stored in the data sandbox of the next level of the IOT unit by using the data acquisition module, and sending the acquired original data to the access device.
The controllable sharing system based on internet of things data as described above, preferably, further includes: a channel establishing module; if the access device sending the access request does not belong to the next level of the internet of things unit to which the device generating the data to be accessed belongs, the channel establishing module establishes a safety channel with a corresponding safety level according to the safety levels corresponding to all devices in the next level of the internet of things unit where the access device is located and the safety probabilities of all the next level of the internet of things unit in the previous level of the internet of things unit corresponding to the safety levels; and the data acquisition module acquires the deformation data to be accessed from the deformation data set with the corresponding security level stored in the data sandbox according to the security level of the access device, and transmits the deformation data to the access device through the established security channel.
The controllable sharing system based on the data of the internet of things as described above, preferably, the data set establishing module performs data acquisition on each device in a next-stage internet of things unit, and forms the acquired original data into an original data set; identifying equipment identification contained in each original data in the original data set, and judging the sensitivity of each original data in the original data set according to the equipment identification; and according to the difference of the sensitivities, dividing the original data in the original data set into sub data sets with different sensitivities.
The controllable sharing system based on the data of the internet of things as described above, preferably, the data processing module processes the original data in each sub data set according to the sensitivity of the original data in the sub data set, generates deformation data with different security levels, and assembles the deformation data with the same security level into the deformation data set.
The controllable sharing system based on the internet of things data as described above, wherein preferably, the channel establishing module calculates an average security information entropy of the next-level internet of things unit where the access device is located according to the security levels corresponding to all devices in the next-level internet of things unit where the access device sending the access request is located and the security probabilities of all the next-level internet of things units in the previous-level internet of things unit corresponding to the security levels; and establishing a corresponding security channel between the access equipment and the data sandbox of the next level of the Internet of things unit to be accessed by taking the calculated average security information entropy as a security level.
Compared with the background art, the controllable sharing method and system based on the internet of things data can store the data in the internet of things unit into the data sandbox, can also establish different levels of security channels according to the security level of the access device, and can provide different levels of deformation data through the security channels by the data sandbox according to the security level of the access device, so that the internet of things data can be shared controllably, and waste of data resources of the internet of things data is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart of a controllable sharing method based on internet of things data according to an embodiment of the present application;
fig. 2 is a schematic diagram of a controllable sharing system based on internet of things data according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative only and should not be construed as limiting the invention.
Example one
Referring to fig. 1, fig. 1 is a flowchart of a controllable sharing method based on internet of things data according to an embodiment of the present application.
The application provides a controllable sharing method based on data of the Internet of things, which comprises the following steps:
step S110, forming an original data set by the acquired original data, and dividing the original data set into subdata sets with different sensitivities according to the sensitivities of the data;
at present, the internet of things is entering the era of the internet of things from the era of the mobile internet, but the internet of things at present does not completely realize the interconnection of everything, and only realizes the connection of things in a certain small range. A certain range in which physical connection is achieved is referred to as a next-stage physical connection unit, and a range including a predetermined number of next-stage physical connection units is referred to as a previous-stage physical connection unit.
For example: all equipment (televisions, washing machines, refrigerators, computers, mobile phones, air conditioners, induction cookers and the like) in a family form a next-level internet-of-things unit, and all next-level internet-of-things units in a cell form a previous-level internet-of-things unit; all cameras in a mall form a next level of internet of things unit, all traffic cameras on a road form a next level of internet of things unit, and all next level of internet of things units in a city form an upper level of internet of things unit for image acquisition of a public security system of the city.
And carrying out data acquisition on each device in a next-stage Internet of things unit, and classifying the acquired original data according to data sensitivity to obtain sub data sets with different sensitivities.
Specifically, each device in the next level of the internet of things unit is subjected to data acquisition, and the acquired original data is formed into an original data set St={X1t、X2t、X3t、……、XntIn which X1t、X2t、X3t、……、XntThe original data generated at time t for the devices in the next level of the internet of things unit respectively, and each original data includes an identifier of the device generating the original data, for example: x1tFor the raw data, X, generated by the TV set in the next level of the IoT unit2tRaw data, X, generated for the washing machine in the next level of the IoT unit3tFor the raw data, X, generated by the cameras in the next level of the Internet of things unitntThe original data generated by the computer in the next level of the internet of things unit, and n is the number of the equipment in the next level of the internet of things unit.
Identifying an original data set StThe device identification contained in each raw data, for example: x1tIs 1, representing the original data generated for the television set, X2tIs identified as 2, representing the raw data generated for the washing machine, X3tIs 3, representing the raw data generated for the camera, XntThe device of (1) is labeled n and represents the raw data generated by the computer. Judging the original data set S according to the device identificationtThe sensitivity of each of the raw data, for example: the sensitivity of the original data generated by the television and the washing machine is low, the sensitivity of the original data generated by the camera is high, and the sensitivity of the original data generated by the computer is highest.
According to the difference of sensitivity, the original data set StThe original data in (1) is divided into sub data sets of different sensitivities, Y1t={X1t、X2t……},Y2t={X3t……},……,Ymt={……XntWhere m is the number of datasets of different sensitivities, and m ≦ n.
Step S120, processing the original data in the corresponding sub data sets according to the sensitivity to generate deformed data sets with different safety levels;
and processing the original data in each subdata set according to the sensitivity of the original data in each subdata set to generate deformation data with different safety levels, and gathering the deformation data with the same safety level into a deformation data set.
In particular according to the formula
Figure BDA0003175921960000061
And processing the original data in the sub data set to obtain deformed data W. Wherein X is the original data in the subdata set, v is the data quantity of the original data X,
Figure BDA0003175921960000062
is not more than
Figure BDA0003175921960000063
The largest integer part of (a) is,
Figure BDA0003175921960000064
to select from the leftmost of X's data
Figure BDA0003175921960000065
The number of the data is one,
Figure BDA0003175921960000066
selecting from the rightmost data of X data
Figure BDA0003175921960000067
Data, σ sensitivity, Z random number generated, k adjustable factor, 0<k<1, k is gradually changed from 1 to 0 to realize smooth splicing of the overlapped area, so that the random number Z is combined with
Figure BDA0003175921960000068
And random number Z and
Figure BDA0003175921960000069
let k be d1/(d1+ d2), where d1 represents the average left distance of the data in the overlap region to the leftmost data of the data of X, and d2 represents the average distance of the data in the overlap region to the rightmost data of the data of X. Will be provided withThe deformation datasets of the same security level are assembled into a deformation dataset.
Step S130, storing the original data set and the deformed data sets with different safety levels into a data sandbox of the next level of the Internet of things unit;
a data sandbox is a system for storing data, each of which is an independent operating environment that allows for the manipulation and computation of data within the data sandbox. And downloading a dedicated data sandbox for each next-level Internet of things unit. The original data set StAnd storing the deformed data sets with different safety levels after deformation according to the sensitivity into a data sandbox so as to ensure the safety of the data.
Step S140, receiving an access request, if the access device sending the access request belongs to a next level of an IOT unit to which the device generating the data to be accessed belongs, acquiring the original data to be accessed from the original data set stored in a data sandbox of the next level of the IOT unit, and sending the acquired original data to the access device;
if the access device sending the access request and the device generating the access request to-be-accessed data belong to the same next-level Internet of things unit, the device in the same next-level Internet of things unit is considered to be safe, so that the original data generated by the device in the same next-level Internet of things unit can be obtained from the original data stored in the data sandbox of the next-level Internet of things unit, and the obtained original data is provided for the access device which also belongs to the next-level Internet of things unit.
Step S150, if the access device sending the access request does not belong to the next level of the IOT unit to which the device generating the data to be accessed belongs, establishing a safety channel with a corresponding safety level according to the safety levels corresponding to all devices in the next level of the IOT unit to which the access device belongs and the safety probabilities of all the next level of the IOT units in the previous level of the IOT unit corresponding to the safety levels;
and calculating the average security information entropy of the next level of the Internet of things unit where the access equipment is located according to the security levels corresponding to all the equipment in the next level of the Internet of things unit where the access equipment sending the access request is located and the security probabilities of all the next level of the Internet of things unit corresponding to the security levels, taking the calculated average security information entropy as the security level, and establishing a corresponding security channel between the access equipment and the data sandbox of the next level of the Internet of things unit to be accessed.
Specifically, let a (α) ═ β1,β2,…,βd,…βVB (alpha) represents the set of all the next level of the IoT units contained in the previous level of the IoT units to which the next level of the IoT units alpha belong, and the average safety information entropy of the next level of the IoT units alpha to which the access equipment belongs is
Figure BDA0003175921960000071
Wherein p (μ) is the safety probability of all next level of the IOT units within the set B (α); v is the number of all next-stage Internet of things units in the set B (alpha); safety probabilities of all next and IoT units within set B (alpha)
Figure BDA0003175921960000081
Wherein, m (. beta.) isd) Is device beta in A (alpha)dCorresponding security level, d is an integer from 1 to V; delta [ m (beta) ]d)-μ]Is a Dikela function for determining the device beta in A (alpha)dIs equal to the average security level of the mu-th next-level unit in the set B (alpha), is equal to 1, and is not equal to 0, and the average security level is the average of the security levels of all the devices in one next-level unit.
And the access equipment sends an authentication and authorization request to the next level of Internet of things unit to be accessed, wherein the authentication and authorization request contains the security level which is the average security information entropy. The next-stage Internet of things unit to be accessed receives an authentication request sent by the access equipment, and determines the access credibility level of the access equipment according to the average security information entropy; and establishing a security channel under the security level between the access equipment and the data sandbox of the next level of the IoT unit to be accessed according to the credibility level.
Step 160, according to the security level of the access device, obtaining the deformation data to be accessed from the deformation data set with the corresponding security level stored in the data sandbox, and sending the deformation data to the access device through the established security channel;
specifically, the security level of the access device is m (β)d) And according to the security level of the access device, acquiring the deformed data to be accessed from the deformed data set with the corresponding security level stored in the data sandbox, sending the deformed data to the access device through the established security channel, disconnecting the established security channel after the access device acquires the data to be accessed, and deleting the data of the security channel.
Example two
Referring to fig. 2, fig. 2 is a schematic view of a controllable sharing system based on data of the internet of things according to an embodiment of the present application.
The application provides a controllable sharing system 200 based on thing networking data includes: a data set establishing module 210, a data processing module 220, a data storage module 230, a data acquisition module 240, and a channel establishing module 250.
The data set creating module 210 forms the collected original data into an original data set, and divides the original data set into sub data sets with different sensitivities according to the sensitivities of the data.
At present, the internet of things is entering the era of the internet of things from the era of the mobile internet, but the internet of things at present does not completely realize the interconnection of everything, and only realizes the connection of things in a certain small range. A certain range in which physical connection is achieved is referred to as a next-stage physical connection unit, and a range including a predetermined number of next-stage physical connection units is referred to as a previous-stage physical connection unit.
For example: all equipment (televisions, washing machines, refrigerators, computers, mobile phones, air conditioners, induction cookers and the like) in a family form a next-level internet-of-things unit, and all next-level internet-of-things units in a cell form a previous-level internet-of-things unit; all cameras in a mall form a next level of internet of things unit, all traffic cameras on a road form a next level of internet of things unit, and all next level of internet of things units in a city form an upper level of internet of things unit for image acquisition of a public security system of the city.
And carrying out data acquisition on each device in a next-stage Internet of things unit, and classifying the acquired original data according to data sensitivity to obtain sub data sets with different sensitivities.
Specifically, each device in the next level of the internet of things unit is subjected to data acquisition, and the acquired original data is formed into an original data set St={X1t、X2t、X3t、……、XntIn which X1t、X2t、X3t、……、XntThe original data generated at time t for the devices in the next level of the internet of things unit respectively, and each original data includes an identifier of the device generating the original data, for example: x1tFor the raw data, X, generated by the TV set in the next level of the IoT unit2tRaw data, X, generated for the washing machine in the next level of the IoT unit3tFor the raw data, X, generated by the cameras in the next level of the Internet of things unitntThe original data generated by the computer in the next level of the internet of things unit, and n is the number of the equipment in the next level of the internet of things unit.
Identifying an original data set StThe device identification contained in each raw data, for example: x1tIs 1, representing the original data generated for the television set, X2tIs identified as 2, representing the raw data generated for the washing machine, X3tIs 3, representing the raw data generated for the camera, XntThe device of (1) is labeled n and represents the raw data generated by the computer. Judging the original data set S according to the device identificationtThe sensitivity of each of the raw data, for example: the sensitivity of the original data generated by the television and the washing machine is low, the sensitivity of the original data generated by the camera is high, and the sensitivity of the original data generated by the computer is highest.
According to the difference of sensitivity, the original data set StThe original data in (1) is divided into sub data sets of different sensitivities, Y1t={X1t、X2t……},Y2t={X3t……},……,Ymt={……XntWhere m is the number of datasets of different sensitivities, and m ≦ n.
The data processing module 220 processes the original data in the corresponding sub-data sets according to the sensitivity to generate deformed data sets with different security levels.
And processing the original data in each subdata set according to the sensitivity of the original data in each subdata set to generate deformation data with different safety levels, and gathering the deformation data with the same safety level into a deformation data set.
In particular according to the formula
Figure BDA0003175921960000101
And processing the original data in the sub data set to obtain deformed data W. Wherein X is the original data in the subdata set, v is the data quantity of the original data X,
Figure BDA0003175921960000102
is not more than
Figure BDA0003175921960000103
The largest integer part of (a) is,
Figure BDA0003175921960000104
to select from the leftmost of X's data
Figure BDA0003175921960000105
The number of the data is one,
Figure BDA0003175921960000106
selecting from the rightmost data of X data
Figure BDA0003175921960000107
Data, σ sensitivity, Z random number generated, k adjustable factor, 0<k<1, k is gradually changed from 1 to 0 to realize smooth splicing of the overlapped area, so that the random number Z is combined with
Figure BDA0003175921960000108
And random number Z and
Figure BDA0003175921960000109
let k be d1/(d1+ d2), where d1 represents the average left distance of the data in the overlap region to the leftmost data of the data of X, and d2 represents the average distance of the data in the overlap region to the rightmost data of the data of X. The deformation data sets of the same security level are assembled into a deformation data set.
The data storage module 230 stores the original data set and the deformed data sets with different security levels into the data sandbox of the next level of the internet of things unit.
A data sandbox is a system for storing data, each of which is an independent operating environment that allows for the manipulation and computation of data within the data sandbox. And downloading a dedicated data sandbox for each next-level Internet of things unit. The original data set StAnd storing the deformed data sets with different safety levels after deformation according to the sensitivity into a data sandbox so as to ensure the safety of the data.
Receiving an access request, if the access device sending the access request belongs to the next level of the unit of the internet of things to which the device generating the data to be accessed belongs, the data obtaining module 240 obtains the original data to be accessed from the original data set stored in the data sandbox of the next level of the unit of the internet of things, and sends the obtained original data to the access device.
If the access device sending the access request and the device generating the access request to-be-accessed data belong to the same next-level Internet of things unit, the device in the same next-level Internet of things unit is considered to be safe, so that the original data generated by the device in the same next-level Internet of things unit can be obtained from the original data stored in the data sandbox of the next-level Internet of things unit, and the obtained original data is provided for the access device which also belongs to the next-level Internet of things unit.
If the access device sending the access request does not belong to the next level of the internet of things unit to which the device generating the data to be accessed belongs, the channel establishing module 250 establishes a security channel of a corresponding security level according to the security level corresponding to all devices in the next level of the internet of things unit where the access device is located and the security probability of all next level of the internet of things unit in the previous level of the internet of things unit corresponding to the security level;
and calculating the average security information entropy of the next level of the Internet of things unit where the access equipment is located according to the security levels corresponding to all the equipment in the next level of the Internet of things unit where the access equipment sending the access request is located and the security probabilities of all the next level of the Internet of things unit corresponding to the security levels, taking the calculated average security information entropy as the security level, and establishing a corresponding security channel between the access equipment and the data sandbox of the next level of the Internet of things unit to be accessed.
Specifically, let a (α) ═ β1,β2,…,βd,…βVB (alpha) represents the set of all the next level of the IoT units contained in the previous level of the IoT units to which the next level of the IoT units alpha belong, and the average safety information entropy of the next level of the IoT units alpha to which the access equipment belongs is
Figure BDA0003175921960000111
Wherein p (μ) is the safety probability of all next level of the IOT units within the set B (α); v is the number of all next-stage Internet of things units in the set B (alpha); safety probabilities of all next and IoT units within set B (alpha)
Figure BDA0003175921960000121
Wherein, m (. beta.) isd) Is device beta in A (alpha)dCorresponding security level, d is an integer from 1 to V; delta [ m (beta) ]d)-μ]Is a Dikela function for determining the device beta in A (alpha)dIs equal to the average security level of the mu-th next-level unit in the set B (alpha), is equal to 1, is not equal to 0, and has an average security level of all the units in the next-level unitAverage value of security level of the device.
And the access equipment sends an authentication and authorization request to the next level of Internet of things unit to be accessed, wherein the authentication and authorization request contains the security level which is the average security information entropy. The next-stage Internet of things unit to be accessed receives an authentication request sent by the access equipment, and determines the access credibility level of the access equipment according to the average security information entropy; and establishing a security channel under the security level between the access equipment and the data sandbox of the next level of the IoT unit to be accessed according to the credibility level.
The data obtaining module 240 obtains the deformed data to be accessed from the deformed data set with the corresponding security level stored in the data sandbox according to the security level of the access device, and sends the deformed data to be accessed to the access device through the established security channel.
Specifically, the security level of the access device is m (β)d) And according to the security level of the access device, acquiring the deformed data to be accessed from the deformed data set with the corresponding security level stored in the data sandbox, sending the deformed data to the access device through the established security channel, disconnecting the established security channel after the access device acquires the data to be accessed, and deleting the data of the security channel.
Because this application is with data storage in the thing allies oneself with the unit to its data sandbox to still can establish the security channel of different grades according to the security level of access equipment, and still provide the deformation data of different grades through the security channel by the data sandbox according to the security level of access equipment, therefore this application can share thing networking data in a controlled manner, with the data resource of avoiding extravagant thing networking data.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. A controllable sharing method based on data of the Internet of things is characterized by comprising the following steps:
step S110, forming an original data set by the acquired original data, and dividing the original data set into subdata sets with different sensitivities according to the sensitivities of the data;
step S120, processing the original data in the corresponding sub data sets according to the sensitivity to generate deformed data sets with different safety levels;
step S130, storing the original data set and the deformed data sets with different safety levels into a data sandbox of the next level of the Internet of things unit;
step S140, receiving an access request, if the access device that sent the access request belongs to the next level of the unit of the internet of things to which the device that generates the data to be accessed belongs, obtaining the original data to be accessed from the original data set stored in the data sandbox of the next level of the unit of the internet of things, and sending the obtained original data to the access device.
2. The internet of things data-based controllable sharing method according to claim 1, further comprising the steps of:
step S150, if the access device sending the access request does not belong to the next level of the IOT unit to which the device generating the data to be accessed belongs, establishing a safety channel with a corresponding safety level according to the safety levels corresponding to all devices in the next level of the IOT unit to which the access device belongs and the safety probabilities of all the next level of the IOT units in the previous level of the IOT unit corresponding to the safety levels;
and step 160, obtaining the deformation data to be accessed from the deformation data set with the corresponding security level stored in the data sandbox according to the security level of the access device, and sending the deformation data to the access device through the established security channel.
3. The internet of things data-based controllable sharing method according to claim 1 or 2, wherein the step S110 includes the following steps:
performing data acquisition on each device in a next-stage Internet of things unit, and forming an original data set by using the acquired original data;
identifying equipment identification contained in each original data in the original data set, and judging the sensitivity of each original data in the original data set according to the equipment identification;
and according to the difference of the sensitivities, dividing the original data in the original data set into sub data sets with different sensitivities.
4. The internet of things data-based controllable sharing method according to claim 1 or 2, wherein the step S120 includes the following steps:
and processing the original data in each subdata set according to the sensitivity of the original data in each subdata set to generate deformation data with different safety levels, and gathering the deformation data with the same safety level into a deformation data set.
5. The internet of things data-based controllable sharing method according to claim 2, wherein the step S150 includes the following steps:
calculating the average security information entropy of the next level of the internet of things unit where the access equipment is located according to the security levels corresponding to all the equipment in the next level of the internet of things unit where the access equipment sending the access request is located and the security probabilities of all the next level of the internet of things unit in the previous level of the internet of things unit corresponding to the security levels;
and establishing a corresponding security channel between the access equipment and the data sandbox of the next level of the Internet of things unit to be accessed by taking the calculated average security information entropy as a security level.
6. A controllable sharing system based on data of the Internet of things is characterized by comprising: the device comprises a data set establishing module, a data processing module, a data storage module and a data acquisition module;
the data set establishing module forms the acquired original data into an original data set, and divides the original data set into subdata sets with different sensitivities according to the sensitivities of the data;
the data processing module processes the original data in the corresponding subdata set according to the sensitivity so as to generate deformed data sets with different safety levels;
the data storage module stores the original data set and the deformed data sets with different safety levels into a data sandbox of the next level of the Internet of things unit;
and receiving an access request, if the access device sending the access request belongs to a next level of an IOT unit to which the device generating the data to be accessed belongs, acquiring the original data to be accessed from the original data set stored in the data sandbox of the next level of the IOT unit by using the data acquisition module, and sending the acquired original data to the access device.
7. The internet of things data-based controllable sharing system of claim 6, further comprising: a channel establishing module;
if the access device sending the access request does not belong to the next level of the internet of things unit to which the device generating the data to be accessed belongs, the channel establishing module establishes a safety channel with a corresponding safety level according to the safety levels corresponding to all devices in the next level of the internet of things unit where the access device is located and the safety probabilities of all the next level of the internet of things unit in the previous level of the internet of things unit corresponding to the safety levels;
and the data acquisition module acquires the deformation data to be accessed from the deformation data set with the corresponding security level stored in the data sandbox according to the security level of the access device, and transmits the deformation data to the access device through the established security channel.
8. The internet-of-things-data-based controllable sharing system according to claim 6 or 7, wherein the data set establishing module performs data acquisition on each device in a next-stage internet-of-things unit, and forms the acquired original data into an original data set; identifying equipment identification contained in each original data in the original data set, and judging the sensitivity of each original data in the original data set according to the equipment identification; and according to the difference of the sensitivities, dividing the original data in the original data set into sub data sets with different sensitivities.
9. The internet-of-things-data-based controllable sharing system according to claim 6 or 7, wherein the data processing module processes the original data in each sub data set according to the sensitivity of the original data in the sub data set to generate deformation data with different security levels, and assembles the deformation data with the same security level into a deformation data set.
10. The internet-of-things-data-based controllable sharing system according to claim 7, wherein the channel establishing module calculates an average security information entropy of a next-level internet-of-things unit where the access device sends the access request according to the security levels corresponding to all devices in the next-level internet-of-things unit where the access device is located and the security probabilities of all next-level internet-of-things units in a previous-level internet-of-things unit corresponding to the security levels; and establishing a corresponding security channel between the access equipment and the data sandbox of the next level of the Internet of things unit to be accessed by taking the calculated average security information entropy as a security level.
CN202110832282.1A 2021-07-22 2021-07-22 Controllable sharing method and system based on Internet of things data Withdrawn CN113572762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110832282.1A CN113572762A (en) 2021-07-22 2021-07-22 Controllable sharing method and system based on Internet of things data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110832282.1A CN113572762A (en) 2021-07-22 2021-07-22 Controllable sharing method and system based on Internet of things data

Publications (1)

Publication Number Publication Date
CN113572762A true CN113572762A (en) 2021-10-29

Family

ID=78166447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110832282.1A Withdrawn CN113572762A (en) 2021-07-22 2021-07-22 Controllable sharing method and system based on Internet of things data

Country Status (1)

Country Link
CN (1) CN113572762A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115983722A (en) * 2023-03-20 2023-04-18 睿至科技集团有限公司 Cloud and mist integrated Internet of things energy management method and system
CN116545927A (en) * 2023-05-04 2023-08-04 北京睿芯高通量科技有限公司 Flow control method for Internet of things equipment under narrow bandwidth network
WO2024027622A1 (en) * 2022-08-01 2024-02-08 International Business Machines Corporation Internet-of-things device security optimization

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024027622A1 (en) * 2022-08-01 2024-02-08 International Business Machines Corporation Internet-of-things device security optimization
CN115983722A (en) * 2023-03-20 2023-04-18 睿至科技集团有限公司 Cloud and mist integrated Internet of things energy management method and system
CN115983722B (en) * 2023-03-20 2023-06-06 睿至科技集团有限公司 Cloud and fog integrated energy management method and system for Internet of things
CN116545927A (en) * 2023-05-04 2023-08-04 北京睿芯高通量科技有限公司 Flow control method for Internet of things equipment under narrow bandwidth network
CN116545927B (en) * 2023-05-04 2024-02-06 北京中科通量科技有限公司 Flow control method for Internet of things equipment under narrow bandwidth network

Similar Documents

Publication Publication Date Title
CN113572762A (en) Controllable sharing method and system based on Internet of things data
US10969971B2 (en) Data storage method and apparatus
US10547618B2 (en) Method and apparatus for setting access privilege, server and storage medium
KR100990098B1 (en) Data processing system, data processing method, information processing device, and computer readable recording medium for recording the computer program
US11100249B2 (en) Apparatus and method for enhancing personal information data security
WO2022007434A1 (en) Visualization method and related device
CN110222775B (en) Image processing method, image processing device, electronic equipment and computer readable storage medium
CN107944461B (en) Data processing method, device and equipment
US20220138893A9 (en) Distributed image analysis method and system, and storage medium
CN114494298A (en) Object segmentation method, device, equipment and storage medium
CN112311656A (en) Message aggregation and display method and device, electronic equipment and computer readable medium
US8885952B1 (en) Method and system for presenting similar photos based on homographies
CN111950003A (en) Method and device for generating unique identification information of user equipment and electronic equipment
WO2023273564A1 (en) Virtual machine memory management method and apparatus, storage medium, and electronic device
CN114329127B (en) Feature binning method, device and storage medium
CN111915532B (en) Image tracking method and device, electronic equipment and computer readable medium
CN111737575B (en) Content distribution method, content distribution device, readable medium and electronic equipment
CN112242978B (en) Method and device for processing data
KR101764531B1 (en) Method and system for image processing and data transmission in network camera environments
Park et al. User experience and quality-of-service in Internet of Things: Practice and trends
CN116994125B (en) Highway data information processing method and system for cloud computing remote sensing
CN113542348B (en) Image data transmission method and device
WO2024031999A1 (en) Image layering method and apparatus, electronic device, and storage medium
CN113342837B (en) Data transmission method, device, electronic equipment and computer readable medium
CN113536296A (en) Controllable sharing method and system based on Internet of things data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211029