CN113783685A - System for protecting Internet of vehicles data by using block chain - Google Patents

System for protecting Internet of vehicles data by using block chain Download PDF

Info

Publication number
CN113783685A
CN113783685A CN202111005336.3A CN202111005336A CN113783685A CN 113783685 A CN113783685 A CN 113783685A CN 202111005336 A CN202111005336 A CN 202111005336A CN 113783685 A CN113783685 A CN 113783685A
Authority
CN
China
Prior art keywords
data
module
key
user
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111005336.3A
Other languages
Chinese (zh)
Inventor
贺昌茂
范双萍
聂小玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Haichang Information Technology Co ltd
Original Assignee
Wuhan Haichang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Haichang Information Technology Co ltd filed Critical Wuhan Haichang Information Technology Co ltd
Priority to CN202111005336.3A priority Critical patent/CN113783685A/en
Publication of CN113783685A publication Critical patent/CN113783685A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a system for protecting data of an internet of vehicles by using a block chain, which comprises a key generation center module, a data owner module, an edge node module, a block chain network module, a distributed storage hash table module and a data consumer module. Compared with the prior art, the system can solve the storage of mass data and the problems of a large amount of user privacy and data security, and can effectively solve the problems of access control, trust and key escrow.

Description

System for protecting Internet of vehicles data by using block chain
Technical Field
The invention relates to a block chain data protection technology, in particular to a system for protecting internet of vehicles data by using a block chain.
Background
With the rapid development and maturity of the internet of things, applications in the field of the automobile industry are undergoing a rapid transition from early vehicle Ad-Hoc networks to the internet of vehicles, and currently, the vehicle Ad-Hoc networks are a hot direction of attention of many researchers. The vehicle is formed into an Ad-Hoc network through a wireless network, and the driving safety is improved by using the data sensed by the embedded equipment. With the development of electronic information technology, in the future 10-20 years, 20 hundred million vehicles registered on the record will be reached, and even if only a part of vehicles are combined with intelligent network equipment to form an internet of vehicles, mass data cannot be generated inevitably. To address the challenges created by the mass of data, the vehicle cloud is created accordingly. Iot (internet of things) -based Vehicle clouds combine the features of intelligent transportation systems, wireless sensor networks, and mobile cloud computing to enable autonomous driving and advanced assistance applications that rely on V2X (Vehicle-to-Vehicle) communication technology by introducing edge-computing or fog-computing technologies. The car networking brings convenience, the mass data generated by the car networking greatly consume cloud storage space, and sensitive information is easily leaked from centralized clouds. Tens of thousands of vehicles and various onboard devices thereof share and interact vehicle or driving data through the internet of vehicles, and the storage of such massive data and the numerous user privacy and data security problems therein pose great challenges, especially access control, trust and key escrow problems.
Disclosure of Invention
In response to these challenging problems, the present invention provides a system for protecting Internet of vehicles data using blockchains, the system comprising a key generation center module, a data owner module, an edge node module, a blockchain network module, a DHT module, and a data consumer module,
the key generation center module is used for initializing the whole system, generating system public parameters and a master key, and generating and distributing keys for each LOT user device;
the data owner module is used for generating data of user equipment and vehicle-mounted sensor equipment, and applying for storage to the block chain network module to the distributed storage hash table module through the edge node module;
the edge node module is used for acquiring data of user equipment and vehicle-mounted sensor equipment, aggregating the data, and applying and storing the data into the distributed storage hash table module through the block chain network;
the block chain network module is used for receiving data storage and data access of a user and a user revocation request and determining whether to receive the request or not through a standard protocol;
the distributed storage hash table module is used for providing a distributed storage space for the data sharing service and performing data access through a storage address;
and the data consumer module is used for requesting to share data of the user equipment and the vehicle-mounted sensor equipment, obtaining a decryption result returned by the edge node module, and locally recovering the shared data after verifying the correctness of the result.
As an improvement of the present invention, the key generation center module is used for initializing the whole system, generating a system master key and a public parameter;
the method comprises the following steps: the system initialization uses a bilinear group algorithm to generate a bilinear circular multiplication group, and a system master key and system public parameters are randomly generated and set.
As an improvement in the present invention, a key is generated and distributed for each LOT user device;
further comprising: and forming each LOT user equipment key by using the system master key, the system public parameters and the set of user parameters.
As an improvement of the present invention, the distributed storage hash table module is configured to provide a distributed storage space for a data sharing service, and can perform data access through a specific storage address;
the method comprises the following steps: the distributed storage hash table module is also provided with a public storage area, and the public storage area maintains a key pool for storing public conversion keys of all LOT users.
As an improvement of the present invention, the public conversion key of the user is executed in the key generation center module, and is composed of the LOT user device key and the public parameter set, and the public conversion key is transmitted to the LOT user and the public storage area LOT user key pool of the distributed storage hash table module through the internal channel of the key generation center module.
As an improvement of the present invention, the blockchain network module is configured to accept data storage and data access of a user and a user revocation request, and determine whether to accept the request through a standard protocol;
the method comprises the following steps: the blockchain network also records the access strategy of the user encrypted data and ensures that the access strategy is not tampered.
As an improvement of the present invention, the user device includes a user collection, a notebook computer, and the vehicle-mounted sensor device includes: vehicle-mounted computer sensors, tire sensors and vehicle-mounted intelligent instrument sensors.
The system for protecting the data of the Internet of vehicles by using the block chain stores the big data of the Internet of vehicles by using the distributed hash table module, completes the trusted access of the data by using the block chain technology, and forwards the calculated data of the equipment of the Internet of vehicles to the distributed hash table for storage by using the edge calculation mode.
By block chain edge calculation and distributed hash table storage, the problem that the centralized mass data consumes cloud storage space is effectively solved.
Meanwhile, the certificateless key method is introduced through the key generation center, so that huge challenges brought by a large number of user privacy and data security problems are effectively solved, and particularly the problems of access control, trust and key escrow are solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a system diagram for protecting Internet of vehicles data using a blockchain in accordance with the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
With reference to fig. 1, the present invention provides an embodiment of a system for protecting internet of vehicles data using a blockchain, the system comprising a key generation center module, a data owner module, an edge node module, a blockchain network module, a distributed storage hash table module, and a data consumer module,
the key generation center module is used for initializing the whole system, generating system public parameters and a master key, and generating and distributing keys for each LOT user device;
the data owner module is used for generating data of user equipment and vehicle-mounted sensor equipment, and applying for storage to the block chain network module to the distributed storage hash table module through the edge node module;
the edge node module is used for acquiring data of user equipment and vehicle-mounted sensor equipment, aggregating the data, and applying and storing the data into the distributed storage hash table module through the block chain network;
the block chain network module is used for receiving data storage and data access of a user and a user revocation request and determining whether to receive the request or not through a standard protocol;
the distributed storage hash table module is used for providing a distributed storage space for the data sharing service and performing data access through a storage address;
and the data consumer module is used for requesting to share data of the user equipment and the vehicle-mounted sensor equipment, obtaining a decryption result returned by the edge node module, and locally recovering the shared data after verifying the correctness of the result.
With reference to fig. 1, the present invention provides another embodiment of a system for protecting data of an internet of vehicles using a blockchain, and the present invention provides another embodiment of a system for protecting data of an internet of vehicles using a blockchain, where the system includes a key generation center module, a data owner module, an edge node module, a blockchain network module, a distributed storage hash table module, and a data consumer module.
Wherein, the system is initialized, the key generation center module generation system generates a bilinear circular multiplication group public parameter alpha and a main key K by using a bilinear group algorithm,
when each LOT needs to be registered, user parameters { beta 1, beta 2, beta 3 … … beta n } are generated, and each LOT user device key K is generated through a set of public parameters alpha, a master key K and user parameters { beta 1, beta 2, beta 3 … … beta n }LAnd the key pool is transmitted to a public storage area 0 of the distributed storage hash table module through the block chain module, so that system initialization is completed.
Each user input user device KLThe system can relay with the block chain module, the block chain module judges whether the LOT user key pools in the public storage area of the distributed storage hash table module are matched or not, and if the matching is successful, the system starts data access.
And in the data acquisition stage, a data owner module, namely the vehicle networking terminal user equipment, acquires user equipment data and vehicle-mounted sensor data, wherein the user equipment, such as a user mobile phone, a notebook computer and the like and various vehicle-mounted sensor equipment, vehicle-mounted computer sensors, such as a tire sensor, a vehicle-mounted intelligent instrument sensor and the like generate Modbus protocol or MQTT protocol data according to the data acquired by the vehicle networking terminal user equipment. The generated standard protocol passes through the edge node modules, where each vehicle in the internet of vehicles is considered a moving edge node module. And the edge node module collects standard user equipment data and vehicle-mounted sensor data through calculation and collects the data together through fine-grained rules such as data date and data value lamps.
And the blockchain network module sequentially sends the collected standard user equipment data and the vehicle-mounted sensor data to the distributed storage hash table for storage according to the addresses {1, 2 and 3 … … 15} in the distributed storage hash table module.
In the data access stage, a data consumer module, namely LOT user equipment of the vehicle networking terminal inputs a user equipment key K under the conditions of periodic detection or abnormity and the like of the LOT user equipmentLAnd (6) matching. KLThe key verification sends a request to the blockchain through the edge node, and the blockchain module also records an access policy of the LOT user encrypted data and ensures that the access policy is not tampered.
Matching with a LOT user key pool stored in a public storage area of the distributed storage hash table module, if the matching is successful; the method comprises the steps that an edge node module requests a block chain module network for sharing data sharing of LOT user equipment, the block chain module network determines whether to accept a request or not through request transaction and a consistency consensus protocol, if the block chain passes the request, the block chain module network obtains corresponding shared data from a distributed storage hash table module, the shared data are sent to the edge node module, the edge node module carries out outsourcing decryption on the shared data, after the outsourcing decryption, partial decryption results are returned to corresponding terminal equipment for local decryption, and a data consumer module finally obtains the shared data.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. A system for protecting internet of vehicles data using a blockchain, the system comprising a key generation center module, a data owner module, an edge node module, a blockchain network module, a distributed storage hash table module, and a data consumer module, the system characterized by:
the key generation center module is used for initializing the whole system, generating system public parameters and a master key, and generating and distributing keys for each LOT user device;
the data owner module is used for generating data of user equipment and vehicle-mounted sensor equipment, and applying for storage to the block chain network module to the distributed storage hash table module through the edge node module;
the edge node module is used for acquiring data of user equipment and vehicle-mounted sensor equipment, aggregating the data, and applying and storing the data into the distributed storage hash table module through the block chain network;
the block chain network module is used for receiving data storage and data access of a user and a user revocation request and determining whether to receive the request or not through a standard protocol;
the distributed storage hash table module is used for providing a distributed storage space for the data sharing service and performing data access through a storage address;
and the data consumer module is used for requesting to share data of the user equipment and the vehicle-mounted sensor equipment, obtaining a decryption result returned by the edge node module, and locally recovering the shared data after verifying the correctness of the result.
2. The system for protecting internet of vehicles data using blockchains according to claim 1, wherein: the key generation center module is used for initializing the whole system and generating a system master key and public parameters;
the method comprises the following steps: the system initialization uses a bilinear group algorithm to generate a bilinear circular multiplication group, and a system master key and system public parameters are randomly generated and set.
3. The system for protecting internet of vehicles data using blockchains according to claim 2, wherein: generating and distributing a key for each LOT user device;
further comprising: and forming each LOT user equipment key by using the system master key, the system public parameters and the set of user parameters.
4. The system for protecting internet of vehicles data using blockchains according to claim 1, wherein: the distributed storage hash table module is used for providing a distributed storage space for the data sharing service and performing data access through a specific storage address;
the method comprises the following steps: the distributed storage hash table module is also provided with a public storage area, and the public storage area maintains a key pool for storing public conversion keys of all LOT users.
5. System for protecting Internet of vehicles data using blockchains according to claims 3 and 4, characterized in that: the public conversion key of the user is executed in the key generation center module, the public conversion key consists of the LOT user equipment key and a public parameter set, and the public conversion key is transmitted to the LOT user in the key generation center module through an internal channel and is transmitted to a public storage area LOT user key pool of the distributed storage hash table module through the block chain module.
6. The system for protecting internet of vehicles data using blockchains according to claim 1, wherein: the block chain network module is used for receiving data storage and data access of a user and a user revocation request and determining whether to receive the request or not through a standard protocol;
the method comprises the following steps: the blockchain network also records the access strategy of the user encrypted data and ensures that the access strategy is not tampered.
7. The system for protecting internet of vehicles data using blockchains according to claim 1, wherein: the user equipment comprises a user collection and a notebook computer, and the vehicle-mounted sensor equipment comprises: vehicle-mounted computer sensors, tire sensors and vehicle-mounted intelligent instrument sensors.
CN202111005336.3A 2021-08-30 2021-08-30 System for protecting Internet of vehicles data by using block chain Pending CN113783685A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111005336.3A CN113783685A (en) 2021-08-30 2021-08-30 System for protecting Internet of vehicles data by using block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111005336.3A CN113783685A (en) 2021-08-30 2021-08-30 System for protecting Internet of vehicles data by using block chain

Publications (1)

Publication Number Publication Date
CN113783685A true CN113783685A (en) 2021-12-10

Family

ID=78839980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111005336.3A Pending CN113783685A (en) 2021-08-30 2021-08-30 System for protecting Internet of vehicles data by using block chain

Country Status (1)

Country Link
CN (1) CN113783685A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022368A (en) * 2022-06-02 2022-09-06 北京邮电大学 Distributed intelligent resource credible sharing method and system for Internet of vehicles
CN115567247A (en) * 2022-08-31 2023-01-03 西安电子科技大学 Decentralized multi-authority privacy protection data access control method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190375373A1 (en) * 2017-10-11 2019-12-12 Uniquid Inc. Systems and methods for networked device security
WO2020138525A1 (en) * 2018-12-26 2020-07-02 서강대학교 산학협력단 Method for distributed authentication of device in internet-of-things blockchain environment, and system for distributed authentication of device using same
CN112019591A (en) * 2020-07-09 2020-12-01 南京邮电大学 Cloud data sharing method based on block chain
CN112039880A (en) * 2020-08-30 2020-12-04 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN112804064A (en) * 2021-01-26 2021-05-14 西安邮电大学 Attribute encryption access control system and method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190375373A1 (en) * 2017-10-11 2019-12-12 Uniquid Inc. Systems and methods for networked device security
WO2020138525A1 (en) * 2018-12-26 2020-07-02 서강대학교 산학협력단 Method for distributed authentication of device in internet-of-things blockchain environment, and system for distributed authentication of device using same
CN112019591A (en) * 2020-07-09 2020-12-01 南京邮电大学 Cloud data sharing method based on block chain
CN112039880A (en) * 2020-08-30 2020-12-04 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN112804064A (en) * 2021-01-26 2021-05-14 西安邮电大学 Attribute encryption access control system and method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨颜博等: "一种使用区块链保护车联网数据隐私的方法", 西安电子科技大学学报, pages 1 - 10 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022368A (en) * 2022-06-02 2022-09-06 北京邮电大学 Distributed intelligent resource credible sharing method and system for Internet of vehicles
CN115022368B (en) * 2022-06-02 2023-10-31 北京邮电大学 Internet of vehicles-oriented distributed intelligent resource trusted sharing method and system
CN115567247A (en) * 2022-08-31 2023-01-03 西安电子科技大学 Decentralized multi-authority privacy protection data access control method and system
CN115567247B (en) * 2022-08-31 2024-03-19 西安电子科技大学 Decentralized multi-authority privacy protection data access control method and system

Similar Documents

Publication Publication Date Title
Singh et al. Branch based blockchain technology in intelligent vehicle
EP3714618B1 (en) Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices
US10068084B2 (en) Method and system of location-aware certificate based authentication
Zhang et al. Recent advances in blockchain and artificial intelligence integration: Feasibility analysis, research issues, applications, challenges, and future work
CN112104665B (en) Block chain-based identity authentication method and device, computer and storage medium
CN113783685A (en) System for protecting Internet of vehicles data by using block chain
Saia et al. Internet of entities (IoE): A blockchain-based distributed paradigm for data exchange between wireless-based devices
Xu et al. Blockchain-oriented privacy protection of sensitive data in the internet of vehicles
KR102172287B1 (en) Vehicle communication network system and operating method of the same
CN113094334A (en) Digital service method, device, equipment and storage medium based on distributed storage
Khare et al. Design of a trustless smart city system: The# SmartME experiment
Meijers et al. Blockchain for V2X: A taxonomy of design use cases and system requirements
Chen et al. ToAM: a task-oriented authentication model for UAVs based on blockchain
CN117408646B (en) Electronic signature signing method, electronic signature signing device, electronic equipment and computer readable medium
CN111724502B (en) Vehicle driving data processing method, device, equipment and storage medium
EP4040720A1 (en) Secure identity card using unclonable functions
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
Jiang et al. Distributed ledger technologies in vehicular mobile edge computing: a survey
Liu et al. Privacy-preserving cloud-aided broad learning system
CN115603982A (en) Vehicle-mounted terminal security authentication method and device, electronic equipment and storage medium
US10404697B1 (en) Systems and methods for using vehicles as information sources for knowledge-based authentication
CN116070191A (en) Information processing method and device, storage medium, and program product
CN114117523A (en) Charging pile intelligent electric meter metering method and system based on block chain technology
He et al. Fine-grained access control policy in blockchain-enabled edge computing
CN114722429A (en) Identity sharing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination