WO2022261958A1 - 一种基于区块链与云端存储的黑匣子数据存取方法 - Google Patents

一种基于区块链与云端存储的黑匣子数据存取方法 Download PDF

Info

Publication number
WO2022261958A1
WO2022261958A1 PCT/CN2021/101006 CN2021101006W WO2022261958A1 WO 2022261958 A1 WO2022261958 A1 WO 2022261958A1 CN 2021101006 W CN2021101006 W CN 2021101006W WO 2022261958 A1 WO2022261958 A1 WO 2022261958A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
value
key
hash
black box
Prior art date
Application number
PCT/CN2021/101006
Other languages
English (en)
French (fr)
Inventor
曲强
张孟秋
Original Assignee
深圳先进技术研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳先进技术研究院 filed Critical 深圳先进技术研究院
Priority to PCT/CN2021/101006 priority Critical patent/WO2022261958A1/zh
Publication of WO2022261958A1 publication Critical patent/WO2022261958A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present invention relates to the field of computer technology, and more specifically, to a black box data access method based on blockchain and cloud storage.
  • Black box is one of equipment of record of plane appropriative electron, also known as aviation flight logger.
  • the black box is equipped with flight data recorder and cabin voice recorder, and each mechanical place and electronic instrumentation of aircraft are connected to it with sensor.
  • the black box can record the flight technical parameters and the sound in the cockpit for a period of time before the aircraft stops working or crashes. When necessary, the flight experiment and the cause of the accident can be analyzed according to the recorded parameters.
  • the black box technology on the plane is relatively mature. However, in special circumstances such as the plane losing contact or the plane crashing into the sea, it is very likely that the black box cannot be retrieved, so that the cause of the accident cannot be analyzed. In addition, there is no black box device on the car at present. In some scenarios such as brake failure and automatic driving out of control, the real-time data information of the car body can help restore the accident scene, and car manufacturers can obtain the real-time data of the car in the test environment. , to optimize and upgrade the product.
  • the black box data on the aircraft is mainly to find the black box to restore the data after the accident, while the real-time body data on the car has an existing solution to store the data on the blockchain to ensure the authenticity and validity of the data.
  • directly uploading a large amount of real-time data to the blockchain may not be able to achieve real-time updates due to low efficiency.
  • the characteristics of the blockchain make the data open and transparent, and anyone can view it, resulting in the leakage of private information such as car coordinates.
  • all stored data has no trust endorsement, it cannot be verified whether it is the real data of the car.
  • the purpose of the present invention is to overcome the defects of the above-mentioned prior art, provide a black box data access method based on block chain and cloud storage, improve data storage efficiency by combining block chain and cloud storage, and ensure that the obtained real and effective The data.
  • the technical solution of the present invention is to provide a black box data access method based on blockchain and cloud storage.
  • the method includes the following steps:
  • Step S1 Organize the black box data into a first key-value key-value pair structure, where the key value is the timestamp, and the value value is the real-time data to be saved;
  • Step S2 For the key-value key-value pair structure, perform attribute-based encryption on the value value to obtain encrypted data;
  • Step S3 using the private key of the black box to sign the encrypted data, and store the signed data corresponding to the encrypted data in the cloud database;
  • Step S4 Perform a hash operation on the encrypted data, and perform a Merkle hash tree operation on the hash values of the data blocks included in the set time period to obtain the second key-value key-value pair structure, and then store it in the block Blockchain network, where the key value is the timestamp and the value value is the root hash of the Merkle tree.
  • the advantage of the present invention is that, in order to solve the loss of black box data on the aircraft in special cases and the efficiency and privacy protection problems of automobile data based on blockchain storage, a black box data based on blockchain and cloud storage is proposed.
  • the access method stores the real-time vehicle body information in the cloud database after being encrypted based on attributes, and sets that only characters that match the attributes can decrypt the original text information, effectively ensuring the privacy of user data.
  • the data stored in the cloud database is accompanied by the signature of the black box, which ensures that each piece of data is real and reliable real-time data; in addition, in order to ensure the real-time performance of data updates, the hash value corresponding to each data is stored through the Merkle-Hash tree operation, and finally Obtain a root hash, and store the root hash and the corresponding timestamp on the chain, which ensures the real-time performance of data updates and helps to verify whether the data has been tampered with, thereby ensuring the authenticity and reliability of cloud data.
  • Fig. 1 is a flowchart of a black box data access method based on blockchain and cloud storage according to an embodiment of the present invention
  • Fig. 2 is a schematic diagram of the black box data cloud and block chain storage process according to an embodiment of the present invention
  • Fig. 3 is a schematic structural diagram of a Merkle hash tree according to an embodiment of the present invention.
  • the black box data access method based on the collaborative storage of blockchain and cloud database will be introduced by taking the real-time data information of automobiles or airplanes as an example.
  • the cloud database stores real-time data
  • the blockchain stores the calculated hash of cloud data. value to ensure the authenticity of the data.
  • the provided black box data access method based on blockchain and cloud storage includes the following steps.
  • step S110 the black box data is organized into a key value of a timestamp (Timestamp), and a value value of real-time data to be saved.
  • the black box data is organized into a key-value storage structure, in which the time stamp is used as the key value to indicate the time when the data is collected, and the real-time data at this time is used as the value value to reflect the status of the car or aircraft. Health.
  • the value that needs to be stored is the real-time information of the body, including but not limited to the body coordinates (Location), time, throttle status (Throttle status), braking force (Braking force) and body posture (Body posture) , and use the timestamp as the key value to form a key-value key-value pair for easy storage and search.
  • body coordinates Lication
  • Throttle status throttle status
  • braking force Braking force
  • Body posture Body posture
  • Step S120 ABE encryption is performed on the value.
  • ABE encryption is performed on the value value.
  • ABE is Attribute-Based Encryption (Attribute-Based Encryption), which can solve the problem of sharing private data by effectively configuring sharing policies.
  • the access structure of the system refers to the architecture of authorized sets.
  • the user attribute is included in the access structure of the system, the user can decrypt the ciphertext encrypted based on the attribute encryption algorithm.
  • attribute-based encryption methods can be used, for example, KP-ABE (key policy attribute based encryption, attribute encryption based on secret key policy) or CP-ABE (ciphertext policy attribute based encryption, attribute encryption based on secret text policy) .
  • KP-ABE key policy attribute based encryption, attribute encryption based on secret key policy
  • CP-ABE ciphertext policy attribute based encryption, attribute encryption based on secret text policy
  • the CP-ABE encryption method is adopted, which is ciphertext policy attribute-based encryption, which means that the attribute set is embedded in the key, the access structure is embedded in the ciphertext, and decrypted if and only when the attribute conforms to the access structure.
  • the data owner stipulates the access structure, so the data owner can control the authority of the visitor by specifying the policy.
  • the CP-ABE encryption strategy is used to encrypt real-time data, and only the attribute sets of users, airlines, or car companies can decrypt the ciphertext.
  • Step S130 the black box signs the encrypted data key-value pair and stores it in the cloud database.
  • the black box signs the encrypted data with its own private key, proving that the data stored in the cloud is the content sent by this certain black box, and the user verifies the signature by using the public key of the black box.
  • the data stored in the cloud database is accompanied by the signature of the black box, it can be guaranteed that each piece of data is real and reliable real-time data of the body or aircraft.
  • the data stored in the cloud database is accompanied by the signature of the black box, which can ensure that each piece of data is real and reliable real-time data of the car body.
  • Step S140 performing a hash operation on the encrypted value to obtain a hash value.
  • the black box performs Hash operation on the data encrypted in step S120 to obtain the hash value of the data.
  • Existing hash algorithms can be used to calculate the hash value corresponding to the data, such as MD5 algorithm or SHA-256.
  • Step S150 performing a Merkle-Hash tree operation on the hash value of the data included in the set time period.
  • the data hash value per millisecond is not uploaded to the chain, but Perform Merkle-Hash tree operation on 1000 hash values within 1 second, and finally obtain a root hash value.
  • the Merkle root hash (root hash) is not calculated by splicing all data block hashes, but through a Obtained by relational calculation, the hash value of any parent node is equal to the hash result after adding the data of its child nodes, so as to verify whether a certain data has changed.
  • the black box stores the root hash value and the 1s timestamp in the blockchain. In this way, the data density and update frequency stored in the blockchain are significantly reduced, and the storage efficiency is not affected while utilizing the characteristics of the blockchain.
  • the Merkle-Hash tree structure is shown in Figure 3. From bottom to top, the leaf nodes on the first layer store the hash values of corresponding data blocks, corresponding to 1000 data blocks within 1 second, and the hash values of each parent node and its children Nodes are associated with corresponding data (for example, it is equal to the hash result of adding the data of its child nodes). In this way, tampering of any data will cause its corresponding hash value to change, and affect the parent hash layer by layer. Eventually the root hashes are not the same.
  • Step S160 storing the computed Merkle root hash value in the blockchain as a value.
  • the root timestamp and hash value are composed of key-value key-value pairs and stored in the blockchain network, that is, the Merkle root hash obtained by the operation is stored as the value value in the blockchain.
  • Hyperledger Fabric is used as the blockchain platform, and Fabric has high access efficiency and good performance such as pluggable consensus mechanism.
  • the root hash and the timestamp of this second are stored on the chain to ensure the real-time performance of data updates, and the Merkle-Hash tree can also easily verify whether any data has been tampered with, thereby ensuring that cloud data true and reliable.
  • step S170 when data is read from the cloud database, the same calculation process is performed on the data after the signature is verified, and the result is compared with the result stored on the blockchain.
  • the specific information ciphertext at the required time point is retrieved from the cloud database with a timestamp, and the data is verified. Passing the verification means that the data is indeed the real-time body or machine condition information collected and uploaded by the black box of the car or aircraft.
  • the cloud database obtains all the information of the required time period, the hash operation of step S140 and step S150 is performed on the information, and the Merkle root hash value of every 1s is calculated, and compared with the root hash value stored on the blockchain The Greek value is compared, and the comparison results are consistent, indicating that the data has not been tampered with and is true and valid.
  • Step S180 if the comparison results are consistent, then it is authentic and credible data, and ABE decryption is performed to obtain the original data.
  • the user or car company needs to provide identity attributes to decrypt the data obtained from the cloud, restore the real-time data information of the car or plane at a specific time, and analyze the cause of the accident.
  • the present invention can meet the expected design index, and can be used for data access of black boxes in fields such as airplanes and automobiles.
  • the present invention guarantees real-time update of data by jointly storing data in the cloud and block chain, can cope with various emergencies, and ensures that real and credible real-time data information can be obtained when needed.
  • the black box data access method based on blockchain and cloud storage proposed by the present invention solves the storage efficiency and privacy protection problems of the prior art through collaborative storage of blockchain and cloud database, and has at least the following Advantage:
  • the present invention can obtain the required black box data from the cloud database in case of special circumstances such as black box loss through cloud storage, and the blockchain data is used to verify the authenticity of the data efficient;
  • the present invention does not directly store the data on the block chain, but through the joint storage of the cloud and the block chain, and the efficiency can reach milliseconds level update.
  • the data stored in the cloud is attribute-encrypted, and only characters with specific identity attributes can decrypt the original text, which greatly protects user privacy and security.
  • the cloud database stores real-time encrypted information
  • the blockchain stores hash verification information. The combination of cloud and blockchain makes full use of the real-time efficiency of the database, as well as the tamper-proof and security of the blockchain platform, ensuring the authenticity and effectiveness of the data Sexuality, realizing the closed loop of data trust.
  • the present invention can be a system, method and/or computer program product.
  • a computer program product may include a computer readable storage medium having computer readable program instructions thereon for causing a processor to implement various aspects of the present invention.
  • a computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device.
  • a computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • flash memory static random access memory
  • SRAM static random access memory
  • CD-ROM compact disc read only memory
  • DVD digital versatile disc
  • memory stick floppy disk
  • mechanically encoded device such as a printer with instructions stored thereon
  • a hole card or a raised structure in a groove and any suitable combination of the above.
  • computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.
  • Computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
  • the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
  • Computer program instructions for carrying out operations of the present invention may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or Source or object code written in any combination, including object-oriented programming languages—such as Smalltalk, C++, Python, etc., and conventional procedural programming languages—such as the “C” language or similar programming languages.
  • Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement.
  • the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as via the Internet using an Internet service provider). connect).
  • LAN local area network
  • WAN wide area network
  • an electronic circuit such as a programmable logic circuit, field programmable gate array (FPGA), or programmable logic array (PLA)
  • FPGA field programmable gate array
  • PDA programmable logic array
  • These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processor of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram.
  • These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
  • each block in a flowchart or block diagram may represent a module, a portion of a program segment, or an instruction that includes one or more Executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions. It is well known to those skilled in the art that implementation by means of hardware, implementation by means of software, and implementation by a combination of software and hardware are all equivalent.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种基于区块链与云端存储的黑匣子数据存取方法。该方法包括:将黑匣子数据组织成第一key-value键值对结构,其中key值是时间戳,value值是所需保存的实时数据;针对所述key-value键值对结构,将value值进行基于属性的加密,获得加密数据;利用黑匣子的私钥对所述加密数据进行签名,并将该加密数据对应的签名数据存储到云端数据库;对所述加密数据进行哈希运算,并针对设定时间段内所包含数据块的哈希值执行Merkle哈希树运算,获得第二key-value键值对结构,进而存储到区块链网络,其中key值是时间戳,value值是Merkle树根哈希。本发明通过云端和区块链联合存储数据,能够应对各种突发状况,确保获取到真实可信的数据信息。

Description

一种基于区块链与云端存储的黑匣子数据存取方法 技术领域
本发明涉及计算机技术领域,更具体地,涉及一种基于区块链与云端存储的黑匣子数据存取方法。
背景技术
黑匣子是飞机专用的电子记录设备之一,又称为航空飞行记录器。黑匣子装有飞行数据记录器和舱声录音器,飞机各机械部位和电子仪器仪表都装有传感器与之相连。黑匣子能将飞机停止工作或失事坠毁前一段时间的飞行技术参数和驾驶舱内的声音记录下来,需要时根据所记录的参数可以分析飞行实验、事故原因等。飞机上的黑匣子技术已经相对成熟,然而在飞机失联或者飞机坠海等特殊环境下,极大可能无法找回黑匣子,从而无法分析事故原因。此外,目前汽车上还没有设置黑匣子设备,在一些诸如刹车失灵,自动驾驶失控等场景下,车身的实时数据信息有助于还原事故现场,并且车企厂商可在测试环境下获取汽车的实时数据,对产品进行优化升级。
近年来,电动汽车市场繁荣的同时带来了如刹车失灵等品控问题。汽车保有量的陡增也导致了更多的交通安全问题。而如何最大程度还原事故现场情况以便于事故分析,一直是个难题。除去行车记录仪所能记录的路况信息外,刹车力度,油门状态,车速,车身姿态等行驶数据均不易获知,较难还原现场信息。另一方面,对于飞机而言,飞机实时信息数据一般记录于黑匣子中。相较于飞机坠毁在陆地上,当飞机坠落于海上时,寻找黑匣子将变得十分困难,甚至根本无法找到。此外,遇到飞机失联或黑匣子损坏等事件时,获取黑匣子数据将变得难上加难。
在现有技术中,飞机上的黑匣子数据主要是在事故之后寻找黑匣子来还原数据,而汽车上的实时车身数据已有方案是将数据存储在区块链之上, 以保证数据真实有效。然而直接将大量的实时数据上传至区块链,由于效率低下,可能无法达到实时更新,另外区块链的特性使得数据公开透明,任何人都可以查看,导致如汽车坐标等隐私信息的泄漏。并且,由于所有存储的数据没有信任背书,无法验证是否为本车真实数据。
发明内容
本发明的目的是克服上述现有技术的缺陷,提供一种基于区块链与云端存储的黑匣子数据存取方法,通过联合区块链和云端存储来提升数据存储效率,并保证获取到真实有效的数据。
本发明的技术方案是提供一种基于区块链与云端存储的黑匣子数据存取方法。该方法包括以下步骤:
步骤S1:将黑匣子数据组织成第一key-value键值对结构,其中key值是时间戳,value值是所需保存的实时数据;
步骤S2:针对所述key-value键值对结构,将value值进行基于属性的加密,获得加密数据;
步骤S3:利用黑匣子的私钥对所述加密数据进行签名,并将该加密数据对应的签名数据存储到云端数据库;
步骤S4:对所述加密数据进行哈希运算,并针对设定时间段内所包含数据块的哈希值执行Merkle哈希树运算,获得第二key-value键值对结构,进而存储到区块链网络,其中key值是时间戳,value值是Merkle树根哈希。
与现有技术相比,本发明的优点在于,为解决飞机上黑匣子数据特殊情况丢失以及汽车数据基于区块链存储存在的效率问题以及隐私保护问题,提出基于区块链与云端存储的黑匣子数据存取方法,通过将实时的车身信息通过基于属性加密后,存储在云端数据库,并设定只有符合属性的角色才可以解密出原文信息,有效保证了用户数据的隐私性。存储在云端数据库的数据都附带黑匣子的签名,保证了每条数据为真实可靠的实时数据;此外,为保证数据更新的实时性,通过Merkle-Hash树运算存储各数据对应的哈希值,最终得到一个根哈希,将此根哈希及对应的时间戳上链 存储,保证了数据更新的实时性,并有利于验证数据是否被篡改,从而保证了云端数据的真实可靠。
通过以下参照附图对本发明的示例性实施例的详细描述,本发明的其它特征及其优点将会变得清楚。
附图说明
被结合在说明书中并构成说明书的一部分的附图示出了本发明的实施例,并且连同其说明一起用于解释本发明的原理。
图1是根据本发明一个实施例的基于区块链与云端存储的黑匣子数据存取方法的流程图;
图2是根据本发明一个实施例的黑匣子数据云端与区块链存储过程示意图;
图3是根据本发明一个实施例的Merkle哈希树的结构示意图。
具体实施方式
现在将参照附图来详细描述本发明的各种示例性实施例。应注意到:除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对布置、数字表达式和数值不限制本发明的范围。
以下对至少一个示例性实施例的描述实际上仅仅是说明性的,决不作为对本发明及其应用或使用的任何限制。
对于相关领域普通技术人员已知的技术、方法和设备可能不作详细讨论,但在适当情况下,所述技术、方法和设备应当被视为说明书的一部分。
在这里示出和讨论的所有例子中,任何具体值应被解释为仅仅是示例性的,而不是作为限制。因此,示例性实施例的其它例子可以具有不同的值。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步讨论。
在下文中,将以汽车或飞机实时数据信息为例,介绍基于区块链与云 端数据库协同存储的黑匣子数据存取方法,其中云端数据库存储实时数据,区块链存储云端数据经过计算后的哈希值,以确保数据的真实有效性。
具体地,结合图1和图2所示,所提供的基于区块链与云端存储的黑匣子数据存取方法包括以下步骤。
步骤S110,将黑匣子数据组织为key值为时间戳(Timestamp),value值为所需保存实时数据。
在该步骤中,将黑匣子数据组织成key-value存储结构,其中以时间戳作为key值,用于表示采集数据的时刻,并以该时刻的实时数据作为value值,用于反映汽车或飞机的运行状况。
例如,针对汽车而言,所需存储的value值是车身实时信息,包括但不限于车身坐标(Location)、时间、油门状态(Throttle status)、刹车力度(Braking force)及车身姿态(Body posture),并以时间戳为key值,组合成key-value键值对,以方便存储与查找。
步骤S120,将value值进行ABE加密。
针对key-value存储结构,对value值进行ABE加密。ABE即基于属性加密(Attribute-Based Encryption),其通过有效的配置共享策略可以解决隐私数据的共享问题。在安全系统研究中,系统的访问结构是指被授权的集合的架构。当用户属性被包含在系统的访问结构中时,用户可以解密基于属性加密算法加密的密文。
可采用多种类型的基于属性的加密方法,例如,KP-ABE(key policy attribute based encryption,基于秘钥策略的属性加密)或CP-ABE(ciphertext policy attribute based encryption,基于秘文策略的属性加密)。
在一个实施例中,采用CP-ABE加密方式,其是密文策略属性基加密,指属性集合嵌入密钥,访问结构嵌入密文,当且仅当属性符合访问结构时解密。数据拥有者规定访问结构,所以数据拥有者可以通过规定策略来控制访问者的权限。例如,采用CP-ABE加密策略,将实时数据加密后,设定只有用户、航空公司或者车企的属性集合可以解密密文。
步骤S130,黑匣子对经加密后的数据键值对进行签名,存入云端数据库。
具体地,黑匣子用自己的私钥对加密数据进行签名,证明存储到云端的数据是这一确定的黑匣子所发送的内容,用户通过使用黑匣子的公钥对签名进行验签。通过这种方式,由于存储在云端数据库的数据都附带黑匣子的签名,能够保证每条数据为真实可靠的车身或飞机的实时数据。
对于存储在云端数据库的数据,只有符合属性的角色才可以解密出原文信息,设置例如仅车主或企业厂商可解密,从而有效保证了用户数据的隐私性。存储在云端数据库的数据都附带黑匣子的签名,能够保证每条数据为真实可靠的车身实时数据。
步骤S140,对加密后的value值进行哈希运算,获得哈希值。
黑匣子将步骤S120加密后的数据进行Hash运算,获得数据的哈希值。可采用现有的哈希算法计算数据对应的哈希值,例如MD5算法或SHA-256等。
步骤S150,对设定时间段内所包含数据的哈希值进行Merkle-Hash树运算。
以黑匣子数据毫秒级更新为例,每毫秒更新一次,为提升后续将哈希值存储到区块链上的效率,在一个实施例中,不将每毫秒的数据哈希值上链,而是将1s内的1000个哈希值做Merkle-Hash树运算,最终获得一个根哈希值,Merkle根哈希(root hash)不是用所有的数据块哈希拼接起来计算,而是通过一个层级的关系计算获得,其任一父节点的哈希值等于其子节点数据相加后哈希的结果,以方便验证某一数据是否改变。黑匣子将这一根哈希值和这1s的时间戳存储到区块链。通过这种方式,存储到区块链的数据密度以及更新频率显著降低,在利用区块链特性的同时不影响存储效率。
Merkle-Hash树结构如图3所示,从下至上,第一层的叶子节点存储对应数据块的哈希值,分别对应1秒内的1000个数据块,各父节点的哈希值与其子节点对应数据相关联(例如等于其子节点数据相加后哈希的结果),通过这种方式,任意一个数据的篡改将导致其对应的哈希值改变,并逐层向上影响父哈希,最终导致根哈希值不一样。
步骤S160,将运算的Merkle根哈希值作为value值存储到区块链。
运算得到Merkle根哈希值后,将根时间戳和哈希值组成key-value键值对存储到区块链网络,即将运算获得的Merkle根哈希作为value值存储到区块链。在一个实施例中,使用Hyperledger Fabric作为区块链平台,Fabric具有较高的存取效率,可插拔共识机制等良好性能。
在上述实施例中,将根哈希及这一秒的时间戳上链存储,保证了数据更新的实时性,而Merkle-Hash树也可以很方便的验证是否有数据被篡改,从而保证云端数据的真实可靠。
步骤S170,在云端数据库读取数据时,验证签名通过后对数据进行相同的运算过程,并与区块链上存储的结果进行对比。
当特殊情况发生时,用户或车企需要获取某一时刻车身运动过程中的实时信息时,在云端数据库以时间戳检索获取到所需时间点的具体信息密文,并对数据进行验签。验签通过表示该数据确实是由本汽车或飞机的黑匣子所收集并上传的实时车身或机况信息。在云端数据库获取到所需要的时间段的所有信息后,对这些信息进行步骤S140和步骤S150的hash运算,计算出每1s的Merkle根哈希值,并与区块链上所存储的根哈希值进行比对,对比结果一致表示数据未被篡改,真实有效。
步骤S180,如对比结果一致,则为真实可信数据,进行ABE解密获取原数据。
在对比通过后,需要用户或者车企提供身份属性对云端获取到的数据进行解密,还原特定时间汽车或者飞机的实时数据信息,以此来分析事故原因。
为进一步验证本发明的效果,进行了多次模拟测试。实验证明,本发明能够满足预期设计指标,可用于飞机、汽车等领域的黑匣子数据存取。本发明通过云端和区块链联合存储数据来保证数据实时更新,可应对各种突发状况,确保在需要时能够获取到真实可信的实时数据信息。
综上所述,本发明提出的基于区块链与云端存储的黑匣子数据存取方法,通过区块链与云端数据库协同存储,解决了现有技术的存储效率问题和隐私保护问题,至少具有以下优势:
1)、相对于现有飞机黑匣子方案,本发明通过进行云端存储,在遇 到黑匣子丢失等特殊情况时,可以从云端数据库获取到所需黑匣子数据,区块链的数据则用来证实数据真实有效;
2)、相对于现有汽车上的黑匣子数据区块链存储方法,本发明并不直接将数据存储在区块链之上,而是通过云端和区块链联合存储,在效率上可达到毫秒级更新。云端存储的是经过属性加密后的数据,只有特定身份属性的角色才能解密出原文,极大地保护了用户隐私安全。云端数据库存储实时加密信息,区块链存储哈希验证信息,云端与区块链的结合使用充分利用了数据库的实时效率,以及区块链平台的防篡改及安全性,保证了数据的真实有效性,实现了数据信任闭环。
本发明可以是系统、方法和/或计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于使处理器实现本发明的各个方面的计算机可读程序指令。
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是但不限于电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。
这里所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机 可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。
用于执行本发明操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言—诸如Smalltalk、C++、Python等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本发明的各个方面。
这里参照根据本发明实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本发明的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装 置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。
附图中的流程图和框图显示了根据本发明的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。对于本领域技术人员来说公知的是,通过硬件方式实现、通过软件方式实现以及通过软件和硬件结合的方式实现都是等价的。
以上已经描述了本发明的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。本发明的范围由所附权利要求来限定。

Claims (10)

  1. 一种基于区块链与云端存储的黑匣子数据存取方法,包括以下步骤:
    步骤S1:将黑匣子数据组织成第一key-value键值对结构,其中key值是时间戳,value值是所需保存的实时数据;
    步骤S2:针对所述key-value键值对结构,将value值进行基于属性的加密,获得加密数据;
    步骤S3:利用黑匣子的私钥对所述加密数据进行签名,并将该加密数据对应的签名数据存储到云端数据库;
    步骤S4:对所述加密数据进行哈希运算,并针对设定时间段内所包含数据块的哈希值执行Merkle哈希树运算,获得第二key-value键值对结构,进而存储到区块链网络,其中key值是时间戳,value值是Merkle树根哈希。
  2. 根据权利要求1所述的方法,其特征在于,在步骤S4中,对于以毫秒级采集的实时数据,设定对1秒内所包含的1000个数据块的哈希值进行Merkle哈希树运算。
  3. 根据权利要求1所述的方法,其特征在于,所述Merkle树包含多层级节点,其中叶子节点用于保存数据块对应的哈希值,每个父节点的哈希值等于其子节点数据相加后哈希的结果。
  4. 根据权利要求1所述的方法,其特征在于,在步骤S2中,所述将value值进行基于属性的加密包括:
    采用基于密文策略的属性加密,对属性集合嵌入密钥,对访问结构嵌入密文,其中黑匣子数据拥有者规定访问结构;
    黑匣子数据拥有者设定当且仅当属性符合访问结构时解密。
  5. 根据权利要求4所述的方法,其特征在于,黑匣子数据拥有者设定用户、航空公司或车企的属性集合能够解密密文。
  6. 根据权利要求1所述的方法,其特征在于,所述黑匣子数据反映飞机的运行状况或汽车的运行状况。
  7. 根据权利要求1所述的方法,其中,所需保存的实时数据是车辆的 运行状态信息,包括车身坐标、时间、油门状态、刹车力度和车身姿态。
  8. 根据权利要求1所述的方法,其中,还包括根据以下步骤获取云端数据库所存储的数据:
    在云端数据库以时间戳检索获取所需时间点的加密数据,并对加密数据进行签名验签;
    对于验签通过的加密数据,进行哈希运算,计算出每个设定时间段的Merkle根哈希值,并与区块链网络上所存储的对应Merkle根哈希值进行比对;
    在对比结果一致的情况下,对获取到的加密数据进行基于属性的解密。
  9. 一种计算机可读存储介质,其上存储有计算机程序,其中,该程序被处理器执行时实现根据权利要求1至8中任一项所述方法的步骤。
  10. 一种计算机设备,包括存储器和处理器,在所述存储器上存储有能够在处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现权利要求1至8中任一项所述的方法的步骤。
PCT/CN2021/101006 2021-06-18 2021-06-18 一种基于区块链与云端存储的黑匣子数据存取方法 WO2022261958A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/101006 WO2022261958A1 (zh) 2021-06-18 2021-06-18 一种基于区块链与云端存储的黑匣子数据存取方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/101006 WO2022261958A1 (zh) 2021-06-18 2021-06-18 一种基于区块链与云端存储的黑匣子数据存取方法

Publications (1)

Publication Number Publication Date
WO2022261958A1 true WO2022261958A1 (zh) 2022-12-22

Family

ID=84525913

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/101006 WO2022261958A1 (zh) 2021-06-18 2021-06-18 一种基于区块链与云端存储的黑匣子数据存取方法

Country Status (1)

Country Link
WO (1) WO2022261958A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614806A (zh) * 2018-12-03 2019-04-12 北京工业大学 基于区块链的日志管理系统
CN109670331A (zh) * 2019-02-21 2019-04-23 哈尔滨工程大学 一种基于区块链的对称可搜索加密方法
WO2021045604A1 (ko) * 2019-09-06 2021-03-11 주식회사 퀀텀게이트 블록체인 네트워크에 기반하여 차량의 운행기록을 관리하는 방법, 이를 수행하기 위한 장치 및 시스템
US20210136572A1 (en) * 2017-08-02 2021-05-06 Bae Systems Information And Electronic Systems Integration Inc. System and method for incident reconstruction utilizing v2x communications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210136572A1 (en) * 2017-08-02 2021-05-06 Bae Systems Information And Electronic Systems Integration Inc. System and method for incident reconstruction utilizing v2x communications
CN109614806A (zh) * 2018-12-03 2019-04-12 北京工业大学 基于区块链的日志管理系统
CN109670331A (zh) * 2019-02-21 2019-04-23 哈尔滨工程大学 一种基于区块链的对称可搜索加密方法
WO2021045604A1 (ko) * 2019-09-06 2021-03-11 주식회사 퀀텀게이트 블록체인 네트워크에 기반하여 차량의 운행기록을 관리하는 방법, 이를 수행하기 위한 장치 및 시스템

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LIU WENZHUO : "Blockchain-based cloud data integrity protection scheme", CHINA NEW TELECOMMUNICATIONS, vol. 9, no. 09, 1 January 2020 (2020-01-01), CN , pages 125 - 126, XP093015334, ISSN: 1673-4866 *

Similar Documents

Publication Publication Date Title
Gadekallu et al. Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications
US9930027B2 (en) Authenticated messages between unmanned vehicles
Kareem et al. SQL injection attacks prevention system technology
US20160285863A1 (en) Unmanned vehicle message exchange
JP2019511030A (ja) 人工知能によるコンピュータセキュリティ
US11082409B2 (en) Verifying message authenticity with decentralized tamper-evident logs
US9954900B2 (en) Automating the creation and maintenance of policy compliant environments
US11489660B2 (en) Re-encrypting data on a hash chain
CN113507369A (zh) 一种基于区块链与云端存储的黑匣子数据存取方法
US20210233673A1 (en) Method and device for blockchain nodes
AU2021210217B2 (en) Neural flow attestation
Grimm et al. Context-aware security for vehicles and fleets: A survey
Sun et al. Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
CN112837194A (zh) 一种智慧系统
Mehak et al. Security aspects of database-as-a-service (DBaaS) in cloud computing
WO2022261958A1 (zh) 一种基于区块链与云端存储的黑匣子数据存取方法
US11706192B2 (en) Integrated behavior-based infrastructure command validation
Ellison et al. Extending AADL for security design assurance of cyber-physical systems
Shahin et al. Big data platform privacy and security, a review
Kenyon Transportation cyber-physical systems security and privacy
Khan et al. Performance analysis of blockchain-enabled security and privacy algorithms in connected and autonomous vehicles: a comprehensive review
Kim et al. The Intelligent Blockchain for the Protection of Smart Automobile Hacking
Anthony Kendall et al. Blockchain Data Management Benefits by Increasing Confidence in Datasets Supporting Artificial Intelligence (AI) and Analytical Tools using Supply Chain Examples
Tall et al. Integrating Cybersecurity Into a Big Data Ecosystem
Lu et al. Research on Internet Technology Innovation and Information Security Challenges in New Vehicle Energy Sector

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21945541

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE