CN114679330B - 一种基于区块链的万物互联数据访问控制方法 - Google Patents
一种基于区块链的万物互联数据访问控制方法 Download PDFInfo
- Publication number
- CN114679330B CN114679330B CN202210368202.6A CN202210368202A CN114679330B CN 114679330 B CN114679330 B CN 114679330B CN 202210368202 A CN202210368202 A CN 202210368202A CN 114679330 B CN114679330 B CN 114679330B
- Authority
- CN
- China
- Prior art keywords
- access control
- registration
- data
- deployment
- ioe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000007405 data analysis Methods 0.000 claims abstract description 9
- 230000007246 mechanism Effects 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 10
- 238000012549 training Methods 0.000 abstract description 3
- 238000001514 detection method Methods 0.000 abstract description 2
- 238000013473 artificial intelligence Methods 0.000 description 6
- 238000010801 machine learning Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000012417 linear regression Methods 0.000 description 1
- 238000007477 logistic regression Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 231100000572 poisoning Toxicity 0.000 description 1
- 230000000607 poisoning effect Effects 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210368202.6A CN114679330B (zh) | 2022-03-31 | 2022-03-31 | 一种基于区块链的万物互联数据访问控制方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210368202.6A CN114679330B (zh) | 2022-03-31 | 2022-03-31 | 一种基于区块链的万物互联数据访问控制方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114679330A CN114679330A (zh) | 2022-06-28 |
CN114679330B true CN114679330B (zh) | 2024-05-17 |
Family
ID=82077747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210368202.6A Active CN114679330B (zh) | 2022-03-31 | 2022-03-31 | 一种基于区块链的万物互联数据访问控制方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114679330B (zh) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107103252A (zh) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | 基于区块链的数据访问控制方法 |
WO2018049601A1 (zh) * | 2016-09-14 | 2018-03-22 | 深圳大学 | 一种面向雾计算的外包访问控制方法及其*** |
KR20190056502A (ko) * | 2017-11-17 | 2019-05-27 | 숭실대학교산학협력단 | 모니터링, 분석 및 제어 플랫폼, 이를 탑재한 포그 서버 및 이를 포함하는 포그 컴퓨팅 시스템 |
KR20190081299A (ko) * | 2017-12-29 | 2019-07-09 | 부경대학교 산학협력단 | 블록체인 기반 데이터 접근 제어 시스템 및 방법 |
CN112804310A (zh) * | 2020-12-31 | 2021-05-14 | 河南中盾云安信息科技有限公司 | 一种面向物联网应用的多链智能安全网关及实现方法 |
CN113301022A (zh) * | 2021-04-27 | 2021-08-24 | 西安理工大学 | 基于区块链和雾计算的物联网设备身份安全认证方法 |
CN113381975A (zh) * | 2021-05-10 | 2021-09-10 | 西安理工大学 | 基于区块链与雾节点信誉的物联网安全访问控制方法 |
CN113672981A (zh) * | 2021-08-20 | 2021-11-19 | 国网河南省电力公司信息通信公司 | 基于区块链的电力物联网数据访问控制*** |
CN113949543A (zh) * | 2021-09-30 | 2022-01-18 | 西安理工大学 | 基于侧链的可扩展的物联网大数据和服务安全管理方法 |
CN114143062A (zh) * | 2021-11-25 | 2022-03-04 | 中南财经政法大学 | 基于区块链的雾计算环境的安全认证***、方法、终端及介质 |
CN114143343A (zh) * | 2021-11-25 | 2022-03-04 | 中南财经政法大学 | 雾计算环境中远程访问控制***、控制方法、终端及介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11132451B2 (en) * | 2017-08-31 | 2021-09-28 | Parity Technologies Ltd. | Secret data access control systems and methods |
KR101997673B1 (ko) * | 2018-12-06 | 2019-07-08 | 주식회사 푸시풀시스템 | 가상 블록체인을 갖는 듀얼 블록체인 기반의 디지털 전자기기 |
US11727120B2 (en) * | 2019-07-11 | 2023-08-15 | Battelle Memorial Institute | Blockchain cybersecurity solutions |
US11223487B2 (en) * | 2020-03-19 | 2022-01-11 | Jinan University | Method and system for secure blockchain-based vehicular digital forensics |
-
2022
- 2022-03-31 CN CN202210368202.6A patent/CN114679330B/zh active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049601A1 (zh) * | 2016-09-14 | 2018-03-22 | 深圳大学 | 一种面向雾计算的外包访问控制方法及其*** |
CN107103252A (zh) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | 基于区块链的数据访问控制方法 |
KR20190056502A (ko) * | 2017-11-17 | 2019-05-27 | 숭실대학교산학협력단 | 모니터링, 분석 및 제어 플랫폼, 이를 탑재한 포그 서버 및 이를 포함하는 포그 컴퓨팅 시스템 |
KR20190081299A (ko) * | 2017-12-29 | 2019-07-09 | 부경대학교 산학협력단 | 블록체인 기반 데이터 접근 제어 시스템 및 방법 |
CN112804310A (zh) * | 2020-12-31 | 2021-05-14 | 河南中盾云安信息科技有限公司 | 一种面向物联网应用的多链智能安全网关及实现方法 |
CN113301022A (zh) * | 2021-04-27 | 2021-08-24 | 西安理工大学 | 基于区块链和雾计算的物联网设备身份安全认证方法 |
CN113381975A (zh) * | 2021-05-10 | 2021-09-10 | 西安理工大学 | 基于区块链与雾节点信誉的物联网安全访问控制方法 |
CN113672981A (zh) * | 2021-08-20 | 2021-11-19 | 国网河南省电力公司信息通信公司 | 基于区块链的电力物联网数据访问控制*** |
CN113949543A (zh) * | 2021-09-30 | 2022-01-18 | 西安理工大学 | 基于侧链的可扩展的物联网大数据和服务安全管理方法 |
CN114143062A (zh) * | 2021-11-25 | 2022-03-04 | 中南财经政法大学 | 基于区块链的雾计算环境的安全认证***、方法、终端及介质 |
CN114143343A (zh) * | 2021-11-25 | 2022-03-04 | 中南财经政法大学 | 雾计算环境中远程访问控制***、控制方法、终端及介质 |
Non-Patent Citations (4)
Title |
---|
A Novel Access Control for Internet of Things Based on Blockchain Smart Contract;Lihua Song;《 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)》;20210405;全文 * |
Xiangwu Ding.an access control model and Its application in blockchain.《2019 international conference on communication,information system and computer engineering》》.2019,全文. * |
基于区块链的物联网访问控制简化模型构建;梅颖;;中国传媒大学学报(自然科学版)(第05期);全文 * |
基于区块链的跨境贸易数据安全共享与访问控制研究;肖浒;《中国优秀硕士学位论文全文库》;20210815;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114679330A (zh) | 2022-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111010382B (zh) | 在区块链网络中处理数据请求的方法和装置 | |
CN110537346B (zh) | 安全去中心化域名*** | |
Patwary et al. | FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain | |
CN111066286B (zh) | 使用高可用性的可信执行环境检索区块链网络的公共数据 | |
US20230208630A1 (en) | Credential generation and distribution method and system for a blockchain network | |
US20200259667A1 (en) | Distributed management system for remote devices and methods thereof | |
Bera et al. | AI-enabled blockchain-based access control for malicious attacks detection and mitigation in IoE | |
CN105516980B (zh) | 一种基于Restful架构的无线传感器网络令牌认证方法 | |
JP2020080530A (ja) | データ処理方法、装置、端末及びアクセスポイントコンピュータ | |
CN113328997B (zh) | 联盟链跨链***及方法 | |
Varshney et al. | A security framework for IOT devices against wireless threats | |
CN114982196A (zh) | 利用区块链事务的通信协议 | |
Babu et al. | A distributed identity‐based authentication scheme for internet of things devices using permissioned blockchain system | |
Oktian et al. | BorderChain: Blockchain-based access control framework for the Internet of Things endpoint | |
Bagga et al. | Bilinear pairing-based access control and key agreement scheme for smart transportation | |
Srikanth et al. | An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems | |
Giaretta et al. | UniquID: A quest to reconcile identity access management and the IoT | |
Benrebbouh et al. | Enhanced secure and efficient mutual authentication protocol in iot-based energy internet using blockchain | |
Vemulapalli et al. | Security frameworks in mobile cloud computing | |
KR102118556B1 (ko) | 프라이빗 블록체인 기반 개인정보 관리 서비스 제공 방법 | |
CN114679330B (zh) | 一种基于区块链的万物互联数据访问控制方法 | |
Ahmed et al. | Transparency of SIM profiles for the consumer remote SIM provisioning protocol | |
CN117176353A (zh) | 处理数据的方法及装置 | |
Wang et al. | IoT data security authentication and key negotiation scheme based on edge computing and blockchain | |
Ali et al. | Revolutionizing Digital Healthcare: Unlocking the Power of Blockchain with an Optimized Fuzzy Logic Approach to Authentication and Key Agreement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Country or region after: China Address after: 537000 Room 403, Yuchai Industrial Park Management Committee building, No. 1789, Second Ring South Road, Yulin City, Guangxi Zhuang Autonomous Region Applicant after: Guangxi Yulin Lianxiang Millennium big data Co.,Ltd. Applicant after: Chengdu Lianxiang Technology Co.,Ltd. Address before: 537000 Room 403, Yuchai Industrial Park Management Committee building, No. 1789, Second Ring South Road, Yulin City, Guangxi Zhuang Autonomous Region Applicant before: Guangxi Yulin Lianxiang Millennium big data Co.,Ltd. Country or region before: China Applicant before: Chengdu Lianxiang Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20240419 Address after: 4-8 / F, 233 jiaozi Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610000 Applicant after: Chengdu Lianxiang Technology Co.,Ltd. Country or region after: China Address before: 537000 Room 403, Yuchai Industrial Park Management Committee building, No. 1789, Second Ring South Road, Yulin City, Guangxi Zhuang Autonomous Region Applicant before: Guangxi Yulin Lianxiang Millennium big data Co.,Ltd. Country or region before: China Applicant before: Chengdu Lianxiang Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |