CN114615094B - Storage method and device based on Internet of things and security chip - Google Patents
Storage method and device based on Internet of things and security chip Download PDFInfo
- Publication number
- CN114615094B CN114615094B CN202210508715.2A CN202210508715A CN114615094B CN 114615094 B CN114615094 B CN 114615094B CN 202210508715 A CN202210508715 A CN 202210508715A CN 114615094 B CN114615094 B CN 114615094B
- Authority
- CN
- China
- Prior art keywords
- data
- internet
- node
- things
- security chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
- G16Y30/10—Security thereof
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
Abstract
The invention relates to the technical field of Internet of things and security chips, and discloses a storage method and a storage device based on the Internet of things and the security chip, wherein the storage method and the storage device comprise the following steps: constructing a self-organizing network model of the networking equipment, and calculating to obtain an optimal data transmission path between the equipment node and the cloud server; data uploading personnel utilize the Internet of things equipment to execute data uploading operation, and the security chip generates an encryption key of the uploaded data; after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key; storing the ciphertext data into a Merkle tree cloud data storage model; and extracting ciphertext data required by the user from the Merkle tree cloud data storage model for decryption. The method of the invention guarantees the absolute control right of the user to the data based on the encryption and decryption mode of the security chip, realizes the determination of the optimal data transmission path with low delay in the Internet of things, and improves the transmission efficiency of the data in the Internet of things.
Description
Technical Field
The invention relates to the technical field of Internet of things and security chips, in particular to a storage method and device based on the Internet of things and the security chip.
Background
The internet of things is that various information sensors are used for acquiring any object or process needing monitoring, connection and interaction in real time, acquiring various required information such as sound, light, heat, chemistry, biology, position and the like, and the ubiquitous connection of objects and people is realized through various possible network accesses, so that the intelligent perception of the objects and the process is realized. The internet of things is an information bearer based on the internet, a traditional telecommunication network and the like, and all common physical objects which can be independently addressed can form an interconnected network. With the popularization and development of the internet of things and cloud computing, on one hand, more and more files are stored in a cloud server, so that a user loses the absolute control right of data, and the data security is difficult to guarantee. On the other hand, due to the limitation of the transmission bandwidth of the internet of things, the efficiency of data transmission and storage is low.
Disclosure of Invention
In view of the above, the invention provides a storage method based on the internet of things and a security chip, and aims to (1) realize the determination of a low-delay optimal data transmission path between any internet of things equipment node and a cloud server based on the internet of things, improve the transmission efficiency of data in the internet of things, and further improve the storage capacity of data at the cloud server within a limited time; (2) the storage structure encryption and the uploading data encryption of the Internet of things equipment are realized by using a graph encryption algorithm, and ciphertext data are stored to a cloud server side in a Merkle tree form, so that the cloud server side is prevented from checking and processing original data, and the absolute control right of a user on the data is ensured based on an encryption and decryption mode of a security chip.
The storage method based on the Internet of things and the security chip provided by the invention comprises the following steps:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
s2: the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel execute data uploading operation by using the Internet of things equipment, and the security chip generates an encryption key of the uploaded data;
s3: the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
s5: storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
s6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user. As a further improvement of the method of the invention:
optionally, the constructing a self-organizing network model of networked devices in the step S1 includes:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram,,N is a node set in the self-organizing network model,being the cloud server side in the ad hoc network model,is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,if, ifRepresenting nodesCannot be transmitted to the node,Node pointCan be transmitted to the node;
In the embodiment of the invention, the Internet of things equipment comprises intelligent wearing equipment such as an intelligent old man wearing device, an intelligent pet wearing device, an intelligent adult watch and an intelligent child watch, intelligent household equipment such as an intelligent air purifier platform, a floor sweeping robot, an intelligent extension socket and an intelligent kitchen and toilet, wherein communication links exist among the intelligent wearing equipment, the intelligent household equipment and a cloud server end, and mutual communication can be realized under the condition that the network communication quality is normal.
Optionally, the step S1 of calculating the low-delay optimal data transmission path between any device node in the ad hoc network model of the internet of things device and the cloud server, includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network modelTo cloud serverIs optimized by the transmission pathThe optimization result of the transmission path optimization objective function isWhereinIs a nodeThe next-hop path node of (2),is a nodeThe mth hop path node of (1),the path node is not a cloud server end, and the transmission path optimizes an objective functionThe format of (A) is:
wherein:
transmitting the maximum retransmission times of the data from the (m-1) th hop path node to the (m) th hop path node;
c is the set maximum retransmission times of the data of all path nodes;
is a nodeThe size of data received by the mth hop path node,the efficiency of forwarding data for it;
wherein:
by connecting with a nodeTraversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function valueAs a low-delay optimal data transmission path between any device node and the cloud server side, whereinFor nodes in the optimal data transmission pathTo (1) aAnd (4) jumping path nodes.
Optionally, in the step S2, after the identity authentication of the data uploading personnel is passed, the data uploading personnel executes an operation of uploading data by using the internet of things device, and the security chip generates an encryption key of the uploaded data, including:
the data uploading personnel utilizes the Internet of things equipment to perform identity authentication, after a user name and a password are input into the Internet of things equipment, input information is transmitted into the security chip to perform identity authentication, and after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment and randomly generates a unique encryption keyThe data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the data format uploaded by the data uploading personnel is as follows:
wherein:
the method comprises the steps of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
the data collection of the internet of things uploaded by the data uploading personnel,is the ID of the equipment of the Internet of things,uploading data corresponding to the Internet of things equipment;
in the embodiment of the invention, the security chip is built in the cloud server, and the transmission path of the input information is a low-delay optimal data transmission path between the Internet of things equipment worn by data uploading personnel and the cloud server.
Optionally, in the step S3, transmitting the data uploaded by the data uploading staff according to a low-latency optimal data transmission path between the internet of things device node and the cloud server, where the transmitting includes:
the data uploaded by the data uploading personnel are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and a cloud server side, the cloud server side receives the data uploaded by the data uploading personnel, and each hop node in the low-delay optimal data transmission path is used for transmitting the received dataVerification is carried out byAnd subtracting the binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, the verification is successful.
Optionally, the form of the upload data includes:
the data form received by the cloud server side is as follows:
wherein:
optionally, in the step S4, the secure chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, including:
encryption key generated from a secure chipThe security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded dataConversion into an adjacency matrix QLine ofThe column values are additionally assignedIf additional value is assignedIf the result is odd, then the first in the matrix is adjacentLine ofThe row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
wherein:
for values in the adjacency matrix, r is the result of the additional assignments,is composed ofThe value of the left-hand neighbor is,is composed ofThe value of the right-hand neighbor is,is composed ofThe value of the upper neighbor is determined,is composed ofThe value of the lower neighbor;
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
wherein:
2) for received data setsAny data in (1)Carrying out encryption processing, wherein the encryption formula is as follows:
wherein:
The encryption set of the data received by the cloud server is as follows:
3) and taking the encryption set of the data received by the cloud server side and the encryption result of the Internet of things equipment as ciphertext data.
Optionally, in the step S5, the storing the ciphertext data in the improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, includes:
the data sets uploaded by one-bit data uploading personnel at the same timeThe corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) integrating the encryption result of the Internet of things equipment with the encryption result of the corresponding data:
wherein:
c is the ciphertext data after integration;
3) for any non-leaf node in the Merkle treeIts value is a non-leaf nodeSplicing the sub-nodes, wherein the leaf node value is the hash value of the encryption result of the single internet of things device and the corresponding upload data ciphertext; when adding the Internet of things equipmentWhen the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
Optionally, in the step S6, the step S includes that the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, including:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
In order to solve the above problem, the present invention further provides a storage device based on the internet of things and a security chip, wherein the storage device includes:
the Internet of things equipment self-organization module is used for constructing an Internet of things equipment self-organization network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server end in the self-organization network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the Internet of things equipment node and the cloud server end;
the data encryption module is used for generating an encryption key of the uploaded data by the security chip, and encrypting the uploaded data by the security chip by utilizing an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
and the data storage module is used for storing the ciphertext data into the improved Merkle tree cloud data storage model and storing corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key and can return encrypted storage parameters of data required by a user, and the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameters and decrypts the ciphertext data to obtain the decrypted data required by the user.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the storage method based on the Internet of things and the security chip.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, which stores at least one instruction, where the at least one instruction is executed by a processor in an electronic device to implement the storage method based on the internet of things and a security chip.
Compared with the prior art, the invention provides a storage method based on the Internet of things and a security chip, and the technology has the following advantages:
firstly, the scheme provides the determination of the low-delay optimal data transmission path between any Internet of things equipment node and a cloud server side, and is based on an Internet of things equipment construction and networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram,,N is a node set in the self-organizing network model,being the cloud server side in the ad hoc network model,is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,if, ifRepresenting nodesCannot be transmitted to the node,Node pointCan be transmitted to the node(ii) a Determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network modelTo cloud serverIs optimized by the transmission pathThe optimization result of the transmission path optimization objective function isWhereinIs a nodeNext hop path of (2)The node is a node of the network,is a nodeThe mth hop path node of (1),the path node is not a cloud server end, and the transmission path optimizes an objective functionThe format of (A) is:
wherein:is a nodeNode delay of the mth jump path node, wherein the 0 th jump path node is the node;Is a nodeJump of mthDelay of a path link between the path node and the m-1 th hop path node;transmitting the maximum retransmission times of the data from the (m-1) th hop path node to the (m) th hop path node; c is the set maximum retransmission times of the data of all path nodes;is a nodeThe size of data received by the mth hop path node,the efficiency of forwarding data for it; the transmission path optimization objective functionThe constraint conditions of (2) are:
wherein:representing nodesThe m-1 hop path node and the m hop path node can normally communicate;representing nodesThe Mth hop path node and the cloud server can normally communicate; by connecting with a nodeTraversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function valueAs a low-delay optimal data transmission path between any device node and the cloud server side, whereinFor nodes in the optimal data transmission pathTo (1) aAnd (4) jumping path nodes. Compared with the traditional Internet of things communication scheme, the scheme adopts the multi-hop data transmission method, the adjacent Internet of things equipment with the minimum time delay is selected as the next hop node, and the data is transmitted from the initial Internet of things equipment to the cloud server end in the multi-hop transmission mode, so that the problems that the distance between the Internet of things equipment and the cloud server end is long and the transmission efficiency is low due to poor network are solved, the data storage capacity in limited time is improved, and the data storage efficiency is improved.
Meanwhile, the scheme provides a data encryption and decryption method based on a security chip, and the data encryption and decryption method is based on an encryption key generated by the security chipThe security chip utilizes an improved graph encryption algorithm to the cloud server sideThe received data is encrypted, and the improved graph encryption algorithm flow is as follows: 1) converting the Internet of things equipment set corresponding to the uploaded data into an adjacency matrix Q, and comparing the first in the adjacency matrix Q with the second in the adjacency matrix QLine ofAdditional assignment of column valuesIf additional value is assignedThe result is odd, then the first in the adjacent matrixLine ofThe row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
wherein:for values in the adjacency matrix, r is the result of the additional assignments,is composed ofThe value of the left-hand neighbor is,is composed ofThe value of the right-hand neighbor is,is composed ofThe value of the upper neighbor is,is composed ofThe value of the lower neighbor;is composed ofThe encryption result of (1); then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
wherein:is composed ofThe encryption result in the adjacency matrix; 2) for received data setsAny data in (1)Carrying out encryption processing, wherein the encryption formula is as follows:
wherein:as dataThe number of z-th bits in (b),bit corresponding encryption results;is the z-th digit of the encryption key; if z is 1, then pairTo perform boundary-crossing processing, i.e.WhereinAs dataIf z isThen, then;
The encryption set of the data received by the cloud server is as follows:
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data. Storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, a user inputs a user name and a password at a terminal, the input information is transmitted into the security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain the storage position of the data required by the user and the encryption key, and generates a decryption key corresponding to the encryption key; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal. Compared with the traditional scheme, the scheme is based on the security chip to encrypt and decrypt the data of the Internet of things device, ciphertext data are stored to the cloud server in a Merkle tree form, the cloud server is prevented from viewing and processing original data, meanwhile, the height and the width of the Merkle tree can be adjusted automatically, the data storage of various scenes can be adapted, and the absolute control right of a user on the data is guaranteed through the encryption and decryption mode based on the security chip.
Drawings
Fig. 1 is a schematic flow chart of a storage method based on the internet of things and a security chip according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of one step of the embodiment of FIG. 1;
FIG. 3 is a schematic flow chart of another step of the embodiment of FIG. 1;
fig. 4 is a functional block diagram of a storage device based on the internet of things and a security chip according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device implementing a storage method based on the internet of things and a security chip according to an embodiment of the present invention.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The embodiment of the application provides a storage method based on the Internet of things and a security chip. The execution subject of the storage method based on the internet of things and the security chip includes, but is not limited to, at least one of electronic devices, such as a server and a terminal, which can be configured to execute the method provided by the embodiments of the present application. In other words, the storage method based on the internet of things and the security chip may be executed by software or hardware installed in the terminal device or the server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Example 1:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server.
The constructing of the self-organizing network model of the networked device in the step S1 includes:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram,,N is a node set in the self-organizing network model,being the cloud server side in the ad hoc network model,is self-organizedThe node of the equipment of the internet of things in the network model, E represents the connection condition of communication links of different nodes in the self-organizing network model of the equipment of the internet of things,if, ifRepresenting nodesCannot be transmitted to the node,Node pointCan be transmitted to the node;
It should be explained that, under the condition that the network is normal, any two nodes in the ad hoc network model of the internet of things device can communicate with each other, but under the condition that the network environment is poor, the nodes may not communicate with each other.
In the embodiment of the invention, the Internet of things equipment comprises intelligent wearing equipment such as an intelligent old man wearing device, an intelligent pet wearing device, an intelligent adult watch and an intelligent child watch, intelligent household equipment such as an intelligent air purifier platform, a floor sweeping robot, an intelligent extension socket and an intelligent kitchen and toilet, wherein communication links exist among the intelligent wearing equipment, the intelligent household equipment and a cloud server end, and mutual communication can be realized under the condition that the network communication quality is normal.
The step S1 of calculating the low-delay optimal data transmission path between any device node in the self-organizing network model of the device of the internet of things and the cloud server, includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network modelTo cloud serverIs optimized by the transmission pathThe optimization result of the transmission path optimization objective function isWhereinIs a nodeThe next-hop path node of (2),is a nodeThe mth hop path node of (1),the path node is not a cloud server end, and the transmission path optimizes an objective functionThe format of (A) is:
wherein:
the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
wherein:
by connecting with a nodeTraversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function valueAs a low-delay optimal data transmission path between any device node and the cloud server side, whereinFor nodes in the optimal data transmission pathTo (1) aAnd (4) jumping path nodes.
S2: the data uploading personnel input the user name and the password to the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data.
In the step S2, after the identity authentication of the data uploading person passes, the data uploading person uses the internet of things device to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data, including:
the data uploading personnel use the internet of things equipment to perform identity authentication, and in detail, referring to fig. 2, the identity authentication process of the data uploading personnel is as follows:
s21, after a data uploading person inputs a user name and a password in the Internet of things equipment, the input information is transmitted to the security chip for identity authentication;
s22, after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment, and a unique encryption key is randomly generated;
s23, the data uploading personnel use the Internet of things equipment to execute data uploading operation;
the data format uploaded by the data uploading personnel is as follows:
wherein:
the method comprises the steps of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
for the data collection of the internet of things uploaded by the data uploading personnel,is the ID of the equipment of the Internet of things,uploading data corresponding to the Internet of things equipment;
in the embodiment of the invention, the security chip is built in the cloud server, and the transmission path of the input information is a low-delay optimal data transmission path between the Internet of things equipment worn by data uploading personnel and the cloud server;
it should be explained that, the data uploading personnel use the intelligent wearable device in the internet of things device to perform identity authentication and select the uploaded data, and the uploaded data is the user use data from the internet of things device.
S3: and transmitting the uploaded data according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server.
In detail, referring to fig. 3, transmitting data uploaded by a data uploading person according to a low-latency optimal data transmission path between an internet of things device node and a cloud server includes:
s31, transmitting the data uploaded by the data uploading personnel according to a low-delay optimal data transmission path between the node of the Internet of things equipment and the cloud server;
s32 method for receiving data by each hop node in low-delay optimal data transmission pathVerification is carried out bySubtracting a binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, successfully verifying;
and S33, the cloud server receives the data uploaded by the data uploading personnel.
S4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data.
In the step S4, the secure chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, including:
encryption key generated from a secure chipThe security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded dataConversion into an adjacency matrix QLine ofThe column values are additionally assignedIf additional value is assignedIf the result is odd, then the first in the matrix is adjacentLine ofThe row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
wherein:
for values in the adjacency matrix, r is the result of the additional assignments,is composed ofThe value of the left-hand neighbor is,is composed ofThe value of the right-hand neighbor is,is composed ofThe value of the upper neighbor is,is composed ofThe value of the lower neighbor;
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
wherein:
2) for received data setsAny data in (1)Carrying out encryption processing, wherein the encryption formula is as follows:
wherein:
The encryption set of the data received by the cloud server is as follows:
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data.
S5: and storing the ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key.
In the step S5, the method includes storing ciphertext data in the improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and includes:
the data sets uploaded by one-bit data uploading personnel at the same timeThe corresponding ciphertext data form a Merkle tree at the cloud service end to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) integrating the encryption result of the Internet of things equipment with the encryption result of the corresponding data:
wherein:
c is the ciphertext data after integration;
3) for any non-leaf node in the Merkle treeIts value is a non-leaf nodeSplicing the sub-nodes, wherein the leaf node value is the hash value of the encryption result of the single internet of things device and the corresponding upload data ciphertext; when adding the Internet of things equipmentWhen the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
It should be explained that the values of the non-leaf nodes in the Merkle tree are all hash values of the encryption results of the multiple internet of things devices, and each leaf node corresponds to one internet of things device and ciphertext data of uploaded data.
S6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
In the step S6, the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, including:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends a decryption result to the user terminal.
Example 2:
fig. 4 is a functional block diagram of a storage device based on the internet of things and a security chip according to an embodiment of the present invention, which can implement the storage method in embodiment 1.
The storage device 100 based on the internet of things and the security chip can be installed in electronic equipment. According to the realized functions, the storage device based on the internet of things and the security chip may include an internet of things device self-organizing module 101, a data encryption module 102 and a data storage module 103. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
The internet of things equipment self-organizing module 101 is used for constructing an internet of things equipment self-organizing network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server side in the self-organizing network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the internet of things equipment node and the cloud server side;
the data encryption module 102, wherein the security chip generates an encryption key of the uploaded data, and according to the generated encryption key, the security chip encrypts the uploaded data by using an improved graph encryption algorithm to obtain encrypted ciphertext data;
the data storage module 103 is configured to store ciphertext data in the improved Merkle tree cloud data storage model, and store corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and may return an encrypted storage parameter of data required by the user, and the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data to obtain the decrypted data required by the user.
In detail, when the modules in the storage device 100 based on the internet of things and the security chip in the embodiment of the present invention are used, the same technical means as the storage method based on the internet of things and the security chip described in fig. 1 above are adopted, and the same technical effects can be produced, which is not described herein again.
Example 3:
fig. 5 is a schematic structural diagram of an electronic device for implementing a storage method based on an internet of things and a security chip according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11 and a bus 12, and may further comprise a computer program, such as a data storage program, stored in the memory 11 and executable on the processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as codes of a data storage program, but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by operating or executing programs or modules (data storage programs and the like) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
Fig. 5 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 5 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the embodiments described are illustrative only and are not to be construed as limiting the scope of the claims.
The data storage program stored in the memory 11 of the electronic device 1 is a combination of instructions, which when executed in the processor 10, can implement:
constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data;
the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
Specifically, the specific implementation method of the processor 10 for the instruction may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 5, which is not repeated herein.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes performed by the present invention or directly or indirectly applied to other related technical fields are also included in the scope of the present invention.
Claims (9)
1. A storage method based on the Internet of things and a security chip is characterized by comprising the following steps:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
s2: the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel execute data uploading operation by using the Internet of things equipment, and the security chip generates an encryption key of the uploaded data;
s3: the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s4: after the cloud server receives the uploaded data, according to the generated encryption key, the security chip encrypts the uploaded data by using an improved graph encryption algorithm to obtain encrypted ciphertext data, and according to the generated encryption key, the security chip encrypts the uploaded data by using the improved graph encryption algorithm, and the method comprises the following steps:
according to an encryption key pk generated by the security chip, the security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following steps:
1) internet of things equipment set corresponding to uploaded dataConverting into an adjacency matrix Q for the m-th element in the adjacency matrix 1 Line m 2 The column values are assigned an additional value max m 1 ,m 2 Is given value max m 1 ,m 2 If the result is odd, the m-th matrix is adjoined 1 Line m 2 The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
wherein:
Q r for values in the adjacency matrix, r is the result of the additional assignment, Q r (x) Is Q r Value of left neighbor, Q r (y) is Q r Value of the right neighbor, Q r (s) is Q r Value of the upper neighbor, Q r (h) Is Q r The value of the lower neighbor;
c r is Q r The encryption result of (1);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
(c 1 ,c 2 ,...,c K )
wherein:
2) for received data setArbitrary data in (1)Carrying out encryption processing, wherein the encryption formula is as follows:
wherein:
pk z is the z-th digit of the encryption key;
if z is 1, thenTo perform boundary-crossing processing, i.e.Wherein Z i As dataIf Z is Z i Then, then
The encryption set of the data received by the cloud server is as follows:
{(c i (1),c i (2),...,c i (Z i ))|i∈[1,K]};
3) taking an encryption set of data received by a cloud server side and an encryption result of the Internet of things equipment as ciphertext data;
s5: storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encryption storage parameter information into a security chip, wherein the encryption storage parameter information comprises a data source, a storage position and an encryption key;
s6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
2. The internet of things and security chip based storage method of claim 1, wherein the constructing of the ad hoc network model of networking devices in the step S1 comprises:
constructing a networking device self-organizing network model based on an Internet of things device, wherein the structure of the Internet of things device self-organizing network model is a undirected connection graph G (N, E), N (N) 0 ,n 1 ,n 2 ,...,n L },E={e ij |i∈[0,L],j∈[0,L]I ≠ j }, N is a node set in the self-organizing network model, and N is 0 For the cloud server side in the ad hoc network model, { n } 1 ,n 2 ,...,n L E represents the connection condition of communication links of different nodes in the self-organizing network model of the equipment in the Internet of things, E ij If e, {0, 1}, is present ij 0 denotes a node n i Cannot be transmitted to the node n j ,e ij 1 node n i Can be transmitted to node n j 。
3. The internet of things and security chip-based storage method according to claim 2, wherein the step S1 of obtaining the low-latency optimal data transmission path between any device node and the cloud server in the internet of things device ad hoc network model by calculation includes:
determining any Internet of things equipment node n in the model according to the constructed Internet of things equipment self-organizing network model i To cloud server n 0 Is optimized by the transmission path optimization objective function dis (n) i ,n 0 ) The optimization result of the transmission path optimization objective function is { n i ,n i (1),n i (2),...,n i (M),n 0 In which n is i (1) Is a node n i Of the next-hop path node n i (M) is a node n i Of the Mth hop path node, n i (1),n i (2),...,n i (M) belongs to N, the path node is not a cloud server end, and the transmission path optimization objective function dis (N) i ,n 0 ) The format of (A) is:
wherein:
is a node n i Node delay of the mth jump path node, wherein the 0 th jump path node is the node n i ;
c m-1,m the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
Bit m is a node n i Data size, Pro, received by mth hop path node m The efficiency of forwarding data for it;
the transmission path optimization objective function dis (n) i ,n 0 ) The constraint conditions of (1) are:
e (m-1)(m) =1
e MO =1
wherein:
e (m-1)(m) 1 denotes a node n i The m-1 hop path node and the m hop path node can normally communicate;
e M0 1 denotes a node n i The Mth hop path node and the cloud server can normally communicate;
by connecting with node n i Traversing surrounding communicable nodes as next hop nodes as a starting point, and repeating the steps until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function valueAs a low-delay optimal data transmission path between any device node and the cloud server side, whereinFor node n in the optimal data transmission path i The mth' hop path node of (1).
4. The internet of things and security chip based storage method of claim 1, wherein in the step S2, after the identity authentication of the data uploading person is passed, the data uploading person performs data uploading operation by using an internet of things device, and the security chip generates an encryption key of the uploaded data, including:
data upload personnel and utilize thing networking equipment to carry out authentication, through after inputing user name and password in thing networking equipment, input information is transmitted and is carried out authentication in the security chip, and after authentication passed, the security chip generated the random number and is sent thing networking equipment to unique encryption key pk is generated at random, and data upload personnel utilize thing networking equipment to carry out the operation of uploading data, and the data format that data upload personnel uploaded is:
{Inst,{Equ ID :data ID }}
wherein:
inst is the sum of a binary result of the random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
{Equ ID :data ID equ is the Internet of things data set uploaded by the data uploading personnel, Equ ID Is the equipment ID, data of the Internet of things ID The data is uploaded to the corresponding internet of things equipment.
5. The internet of things and security chip-based storage method according to claim 4, wherein in the step S3, the transmitting the data uploaded by the data uploading personnel according to a low-delay optimal data transmission path between the internet of things device node and the cloud server end includes:
the data uploaded by the data uploading personnel are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and a cloud server side, the cloud server side receives the data uploaded by the data uploading personnel, each hop node in the low-delay optimal data transmission path verifies the Inst of the received data, the binary result of the random number generated by the safety chip is subtracted from the Inst, and if the result is an accurate data uploading personnel instruction, the verification is successful.
6. The internet of things and security chip based storage method of claim 1, wherein the form of the uploaded data comprises:
the data form received by the cloud server side is as follows:
wherein:
7. the internet-of-things and security chip based storage method of claim 1, wherein the step S5 is to store ciphertext data into the modified Merkle tree cloud data storage model, and store corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and includes:
the data sets uploaded by one-bit data uploading personnel at the same timeThe corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) the encryption result of the Internet of things equipment and the encryption result of the corresponding data are integrated:
C=[(c 1 ,(c 1 (1),c 1 (2),...,c 1 (Z 1 )),...,(c K ,(c K (1),c K (2),...,c K (Z K ))]
wherein:
c K is composed ofThe encryption result of (c) K (1),c K (2),...,c K (Z K ) Is prepared fromUploading data;
c is the ciphertext data after integration;
2) calculating (c) 1 ,c 2 ,...,c K ) Will hash [ (c) 1 ,c 2 ,...,c K )]As root node of Merkle tree;
3) for any non-leaf node g in the Merkle tree, the value of the non-leaf node g is the splicing of the sub-nodes of the non-leaf node g, and the value of the leaf node is the hash value of the encryption result of the single Internet of things device and the corresponding uploaded data ciphertext; when adding the Internet of things equipmentWhen the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
8. The internet of things and security chip based storage method of claim 1, wherein in the step S6, the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, and the method includes:
a user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encrypted key of the data required by the user, and a decryption key corresponding to the encrypted key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
9. A storage device based on the Internet of things and a security chip is characterized in that the device comprises:
the Internet of things equipment self-organization module is used for constructing an Internet of things equipment self-organization network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server end in the self-organization network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the Internet of things equipment node and the cloud server end;
the data encryption module is used for generating an encryption key of the uploaded data by the security chip, and encrypting the uploaded data by the security chip by utilizing an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
the data storage module is used for storing ciphertext data into the improved Merkle tree cloud data storage model and storing corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key and can return encrypted storage parameters of data required by a user, the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameters and decrypts the ciphertext data to obtain decrypted data required by the user, and therefore the storage method based on the Internet of things and the security chip is achieved according to claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210508715.2A CN114615094B (en) | 2022-05-11 | 2022-05-11 | Storage method and device based on Internet of things and security chip |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210508715.2A CN114615094B (en) | 2022-05-11 | 2022-05-11 | Storage method and device based on Internet of things and security chip |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114615094A CN114615094A (en) | 2022-06-10 |
CN114615094B true CN114615094B (en) | 2022-09-30 |
Family
ID=81870344
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210508715.2A Active CN114615094B (en) | 2022-05-11 | 2022-05-11 | Storage method and device based on Internet of things and security chip |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114615094B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115378591B (en) * | 2022-07-18 | 2023-04-07 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
CN116112483B (en) * | 2023-02-17 | 2024-02-20 | 重庆大学 | Multidimensional optimized ROS2 intelligent communication method |
CN116739389A (en) * | 2023-08-14 | 2023-09-12 | 广东创能科技股份有限公司 | Smart city management method and system based on cloud computing |
CN116915501B (en) * | 2023-09-06 | 2023-12-19 | 深圳市潼芯传感科技有限公司 | Internet of things information security management method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545285A (en) * | 2019-09-17 | 2019-12-06 | 北京方研矩行科技有限公司 | Internet of things terminal security authentication method based on security chip |
WO2021203797A1 (en) * | 2020-04-07 | 2021-10-14 | 南京邮电大学 | Alliance chain-based method for storing vehicle maintenance and servicing data |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100076A (en) * | 2015-07-03 | 2015-11-25 | 浪潮电子信息产业股份有限公司 | Cloud data security system based on USB Key |
CN105721308B (en) * | 2016-02-24 | 2016-12-28 | 陕西师范大学 | The multi-hop cognition radio network routing method estimated based on average delay and system |
CN107330337B (en) * | 2017-07-19 | 2022-05-24 | 腾讯科技(深圳)有限公司 | Data storage method and device of hybrid cloud, related equipment and cloud system |
CN112565205B (en) * | 2020-11-19 | 2022-04-08 | 湖南大学 | Credible authentication and measurement method, server, terminal and readable storage medium |
-
2022
- 2022-05-11 CN CN202210508715.2A patent/CN114615094B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545285A (en) * | 2019-09-17 | 2019-12-06 | 北京方研矩行科技有限公司 | Internet of things terminal security authentication method based on security chip |
WO2021203797A1 (en) * | 2020-04-07 | 2021-10-14 | 南京邮电大学 | Alliance chain-based method for storing vehicle maintenance and servicing data |
Also Published As
Publication number | Publication date |
---|---|
CN114615094A (en) | 2022-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114615094B (en) | Storage method and device based on Internet of things and security chip | |
Avudaiappan et al. | Medical image security using dual encryption with oppositional based optimization algorithm | |
CN105653315B (en) | A kind of node operating system method for down loading based on block chain technology | |
Hsiao et al. | Employing blockchain technology to strengthen security of wireless sensor networks | |
CN109698822A (en) | Combination learning method and system based on publicly-owned block chain and encryption neural network | |
CN104715187A (en) | Method and apparatus used for authenticating nodes of electronic communication system | |
Ataei Nezhad et al. | An authentication-based secure data aggregation method in internet of things | |
CN107004068A (en) | The safe transmission of genomic data | |
CN106464490A (en) | Device for determining a shared key | |
CN109542883A (en) | A kind of information duplicate checking method based on block chain | |
CN114679319B (en) | Distributed data synchronous encryption method based on block chain | |
CN108092766A (en) | A kind of cipher text searching method for verifying authority and its system | |
CN109146677A (en) | Method, computer system and the readable storage medium storing program for executing of parallel building block chain view | |
CN115941206A (en) | Carbon emission data uplink method based on block chain technology | |
CN104580246B (en) | Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment | |
CN112394974A (en) | Code change comment generation method and device, electronic equipment and storage medium | |
WO2018070932A1 (en) | System and method for querying an encrypted database for documents satisfying an expressive keyword access structure | |
CN107196919A (en) | A kind of method and apparatus of matched data | |
CN105359455A (en) | Electronic signature system | |
CN115378658B (en) | Park communication data transmission method based on Internet of things cloud edge collaboration | |
CN112948083A (en) | Data processing method and device and electronic equipment | |
Pham et al. | Enhanced security of IoT data sharing management by smart contracts and blockchain | |
CN114465712A (en) | Data encryption method and device | |
CN109754322A (en) | A kind of data service system | |
Zafar et al. | Sustaining security in MANET: biometric stationed authentication protocol (BSAP) inculcating meta-heuristic genetic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221009 Address after: 528463 Yagang Industrial Zone, Sanxiang Township, Zhongshan City, Guangdong Province Patentee after: ZHONGSHAN SANXUN ELECTRONICS Co.,Ltd. Address before: 518000 no.14-5, espresso software building, Haitian 2nd Road, high tech park, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Patentee before: FENGLIAN INTELLIGENT (SHENZHEN) CO.,LTD. |