CN118158660A - Multi-source hydrologic data transmission abnormality detection and protection method - Google Patents

Multi-source hydrologic data transmission abnormality detection and protection method Download PDF

Info

Publication number
CN118158660A
CN118158660A CN202410578639.1A CN202410578639A CN118158660A CN 118158660 A CN118158660 A CN 118158660A CN 202410578639 A CN202410578639 A CN 202410578639A CN 118158660 A CN118158660 A CN 118158660A
Authority
CN
China
Prior art keywords
key
terminal sensor
generation center
data
key generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410578639.1A
Other languages
Chinese (zh)
Other versions
CN118158660B (en
Inventor
王宏毅
徐旭东
李颖汉
张珽
谢丹
梁齐
谌超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chen Yue Construction Project Management Group Ltd By Share Ltd
Original Assignee
Chen Yue Construction Project Management Group Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chen Yue Construction Project Management Group Ltd By Share Ltd filed Critical Chen Yue Construction Project Management Group Ltd By Share Ltd
Priority to CN202410578639.1A priority Critical patent/CN118158660B/en
Publication of CN118158660A publication Critical patent/CN118158660A/en
Application granted granted Critical
Publication of CN118158660B publication Critical patent/CN118158660B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention relates to the field of data security processing of intelligent hydrologic systems, and discloses a method for detecting and protecting abnormal data transmission based on multi-source hydrologic data. Eliminating complex public key certificate management also avoids key escrow by the key generation center. Meanwhile, the method designs the certificate-free homomorphic digital signature by adopting the homomorphic hash function, and reduces the system safety management and maintenance cost.

Description

Multi-source hydrologic data transmission abnormality detection and protection method
Technical Field
The invention relates to the field of data security processing of intelligent hydrologic systems, in particular to a multisource hydrologic data transmission abnormality detection and protection method.
Background
With the rapid development of new generation information technologies such as cloud computing, big data, internet of things, artificial intelligence and the like, an intelligent hydrologic system enables important decisions of hydrologic information to become more intelligent. The intelligent hydrologic system is mainly used for monitoring hydrologic information such as water level, flow, rainfall condition and the like in real time through an intelligent sensor and data acquisition equipment under a wireless sensor network environment and uploading the data to an intelligent hydrologic system platform.
The intelligent hydrologic system platform can realize real-time monitoring, analysis and processing of historical hydrologic data, predicts future hydrologic conditions through machine learning and artificial intelligence technology, provides decision support for flood control and disaster reduction, realizes real-time monitoring and response to flood disasters, and improves the efficiency and accuracy of flood control and disaster reduction. Therefore, the intelligent hydrologic system provides powerful support for water resource management and protection, and makes important contributions to the aspects of building intelligent cities, optimizing water resource utilization and the like.
Although the intelligent hydrologic system improves the processing and analysis capacity of the system big data and achieves the effect of system management refinement, potential information security threat is generated. Because the distributed terminal sensor devices are deployed in the intelligent hydrologic system, the intelligent hydrologic key sensitive data are collected regularly, and even the intelligent hydrologic system platform makes important analysis decisions based on the key data. If key data indexes are leaked in the process of transmitting key data from terminal sensor equipment to an intelligent hydrologic system platform in a wireless sensor network environment, the key data indexes are tampered or lost, so that data abnormality is caused, the inaccuracy of intelligent hydrologic system data analysis can be influenced, a serious misjudgment event is generated, and serious economic loss is caused.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a multisource hydrological data transmission abnormality detection and protection method.
The aim of the invention is realized by the following technical scheme:
the invention provides a multisource-based hydrological data transmission abnormality detection and protection method, which comprises the following steps:
s1, initializing a system, wherein a key generation center generates public parameters for an intelligent hydrologic system, the public parameters comprise a multiplication cyclic group, a generation element, a public group element, a bilinear pair mapping, an anti-collision hash function, a homomorphic hash function and a system main public key, and the system main private key is generated by the key generation center and is safely stored;
S2, generating a public and private key of a certificateless cryptographic system, wherein terminal sensor equipment of the intelligent hydrologic system interacts with a key generation center to generate anonymized identity marks of the terminal sensor equipment and a corresponding partial signature private key;
s3, transmitting the multi-source hydrological data for anomaly detection, wherein the terminal sensor equipment generates corresponding encrypted data for the collected multi-dimensional intelligent hydrological data file and generates homomorphic digital signature based on a certificate-free cryptosystem;
s4, carrying out abnormal verification on multi-source hydrological data transmission, and converging an encrypted data file and a signature set thereof of key multi-dimensional hydrological parameter data generated by the terminal sensor equipment to an intelligent hydrological system platform through a wireless sensor network by the intelligent hydrological system, and carrying out integrity detection.
Further, the step S1 includes the steps of:
S11, key Generation center setting Order multiplication cycle group/>,/>For big prime number, choose/>Is generated by the generation element/>And fromRandomly selects one public group element/>
S12, setting a bilinear pair mapping in the key generation centerWherein/>Also/>A cyclic group of order multiplications;
S13, key generation center slave Order finite field/>Randomly selecting a non-zero element/>As a system master private key, a corresponding system master public key/>, is calculated
S13, setting two safe anti-collision hash functions by the key generation center: Here/> Representing a hash function/>Output length of (1)/>, hereRepresentation/>A cyclic group of order multiplications; in addition, the key generation center sets a homomorphic hash function/>
S14, the key generation center publishes system disclosure parametersAnd secretly store the system master private key/>
Further, the step S2 includes the steps of:
S21, terminal sensor equipment slave Order finite field/>In secret selecting a non-zero element/>Calculate registration credentials/>Registration information/>, is then sent to the key generation center over the secure channelWherein/>Is the identity of the terminal sensor device;
s22, the key generation center receives the registration information of the terminal sensor equipment Then, calculating the corresponding anonymized identity mark/>Wherein/>The method is the validity period of anonymized identity identification use of the terminal sensor equipment;
S23, key generation center slave Order finite field/>In secret selecting a non-zero element/>Calculating and generating a first component/>, of a signature private key of a terminal sensor deviceAnd a first component of the public keyAnd; the key generation center transmits the four-tuple information/>, through the secure channelGiving the terminal sensor device;
s24, when receiving the transmission from the key generation center The end sensor device will then go through the equation/>Validating the four-tuple information/>Is the integrity of (1); if the above equation is verified, the terminal sensor device accepts the four-tuple information/>Otherwise, requesting the key generation center to re-execute the step;
S25, the terminal sensor device is further from Order finite field/>In secret selecting a non-zero element/>As a second component of the signature private key, and calculates/>A second component that is a public key;
s26, the terminal sensor equipment obtains a complete signature private key based on a certificateless cryptographic system And the corresponding full public key/>
Further, the step S3 includes the steps of:
S31, the terminal sensor device represents the n-dimensional intelligent hydrologic data file M as WhereinFor each dimension of data parameters, lightweight symmetric encryption algorithm/>, is utilizedGenerating a multidimensional intelligent hydrological data file/>Corresponding ciphertext data File/>Wherein the data parameters for each dimension and corresponding ciphertext data block/>Where i represents the subscript of the data dimension;
S32, for each ciphertext data block Terminal sensor device utilizes a complete signature private key/>, based on a certificateless cryptographic systemGenerating corresponding homomorphic signature blocksHere/>Is the corresponding ciphertext data block/>Is a label of (2); the terminal sensor device will generate ciphertext data file/>The corresponding homomorphic signature sets are expressed as
S33, the terminal sensor device sends the encrypted data file and the signature set thereofAnd performing anomaly detection and safe storage on the intelligent hydrologic system platform.
Further, the step S4 includes the steps of:
S41, integrity detection: ; if the above equation test passes, it is indicated that the transmission process of the encrypted data file of all the key hydrological parameter data is not subject to abnormal conditions such as tampering;
s42, if the equation test is not passed, the intelligent hydrologic system platform performs the test on each ciphertext data block And its corresponding digital signature/>Abnormality detection is performed one by one according to the following equation:
the beneficial effects of the invention are as follows:
1) The invention collects multidimensional sensitive data through the wireless sensor network, designs homomorphic signature algorithm based on a certificate-free cryptosystem, generates ciphertext corresponding to multidimensional key hydrologic data and corresponding homomorphic signature, realizes confidentiality protection of data transmission, and simultaneously realizes abnormal detection of system data batch transmission and malicious tampering protection of data;
2) By designing the certificateless cryptosystem, complex public key certificate management is canceled, and key escrow of a key generation center is avoided.
3) The invention designs the certificate-free homomorphic digital signature by adopting the homomorphic hash function, reduces the system safety management and maintenance cost, designs the identity anonymization of the terminal sensor equipment, and realizes the protection of sensitive identities.
Drawings
Fig. 1 is a specific flowchart of a method for detecting and protecting abnormal transmission of multi-source hydrological data according to an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be within the scope of the present invention, based on the embodiments of the present invention.
Illustratively, the specific flow of the present invention is shown in FIG. 1, which includes the following four stages: the system initialization step, public and private key generation of the certificateless cryptographic system, multisource hydrological data transmission supporting anomaly detection and multisource hydrological data transmission anomaly verification.
System initialization phase: the key generation center generates public parameters for the intelligent hydrologic system, including the set multiplication loop group and its generating element, public group element, bilinear pair mapping, anti-collision hash function, homomorphic hash function and system main public key. Further, key generation center settingsOrder multiplication cycle group/> ,/>For big prime number, choose/>Is generated by the generation element/>And from/>Randomly selects one public group element/>The key generation center sets a bilinear pair mappingWherein/>Also/>Order multiplication loop group, key generation center slave/>Order finite field/>Randomly selecting a non-zero element/>As a system master private key, a corresponding system master public key/>, is calculatedThe key generation center sets two secure collision-resistant hash functions: /(I)Here/>Representing a hash function/>Is used for the output length of the (c) a,Here/>Representation/>And (3) a cyclic group of order multiplication. In addition, the key generation center sets a homomorphic hash function/>. Finally, the key generation center publishes system public parameters/>And secretly store the system master private key/>
Public and private key generation of a certificate-free cryptosystem: the terminal sensor device of the intelligent hydrologic system generates registration credentials and sends the registration information to the key generation center through a secure channel. After receiving the registration information of the terminal sensor device, the key generation center calculates the anonymized identity of the terminal sensor device, further generates a first component of a signature private key and a first component of a public key of the terminal sensor device by using a system main private key, and sends the first component and the first component of the public key to the terminal sensor device through a secure channel. The terminal sensor device first verifies the validity of the first component of the signature private key and further generates a second component of the signature private key and a second component of the public key. Finally, the terminal sensor device obtains the complete private and public signature keys. The specific process is as follows:
Terminal sensor device slave Order finite field/>In secret selecting a non-zero element/>Calculating registration credentialsRegistration information/>, is then sent to the key generation center over the secure channelWherein/>Is the identity of the terminal sensor equipment, and the key generation center receives the registration information/>, of the terminal sensor equipmentThen, calculating the corresponding anonymized identity mark/>(Wherein/>Is the validity period of the anonymized identity usage of the terminal sensor device) and then the key generation center is from/>Order finite field/>In secretly selecting a non-zero elementCalculating and generating a first component/>, of a signature private key of a terminal sensor deviceAnd a first component/>, of the public keyAnd, a method for producing the same. The key generation center transmits the four-tuple information/>, through the secure channelTo the terminal sensor device, upon receipt of the/>, transmitted from the key generation centerThe end sensor device will then go through the equation/>Validating the four-tuple information/>Is described herein). If the above equation is verified, the terminal sensor device accepts the four-tuple information/>Otherwise, the key generation center is requested to re-execute the step, and the terminal sensor device further receives from/>Order finite field/>In secret selecting a non-zero element/>As a second component of the signature private key, and calculates/>As a second component of the public key, finally, the terminal sensor device obtains the complete signature private key/>, based on a certificateless cryptographic systemAnd the corresponding full public key/>
Multisource hydrological data transmission supporting anomaly detection: the terminal sensor device utilizes a lightweight symmetric encryption algorithm to generate a corresponding ciphertext data file from the multidimensional intelligent hydrologic data file. The terminal sensor device generates homomorphic signature blocks of corresponding ciphertext data blocks using a complete signature private key based on a certificateless cryptographic system. The terminal sensor equipment sends the encrypted data file and the signature set thereof to the intelligent hydrologic system platform for abnormality detection and safe storage. The method comprises the following specific steps: the terminal sensor device represents the n-dimensional intelligent hydrologic data file M asWherein/>For each dimension of data parameters, a lightweight symmetric encryption algorithm is utilized to generate a multidimensional intelligent hydrological data fileCorresponding ciphertext data File/>Wherein the data parameters for each dimension and corresponding ciphertext data block/>Where i represents the subscript of the data dimension, for each ciphertext data block/>Terminal sensor device utilizes a complete signature private key based on a certificateless cryptographic systemGenerating corresponding homomorphic signature block/>Here, whereIs a tag corresponding to the ciphertext data block. Ciphertext data file to be generated by the terminal sensor deviceThe corresponding homomorphic signature set is denoted/>The terminal sensor device sends the encrypted data file and its signature set/>And performing anomaly detection and safe storage on the intelligent hydrologic system platform.
Multisource hydrologic data transmission anomaly verification: the intelligent hydrologic system gathers the encrypted data file of key multidimensional hydrologic parameter data and signature set thereof generated by the terminal sensor equipment to an intelligent hydrologic system platform through a wireless sensor network, and carries out integrity detection through a batch anomaly detection equation. If the batch anomaly detection equation test is passed, the encrypted data file transmission process of all the key hydrological parameter data is indicated to be free from anomalies such as tampering. If the equation test fails, the intelligent hydrologic system platform performs integrity detection on each ciphertext data block and the corresponding digital signature according to the anomaly detection equation one by one and performs integrity detection by the following batch anomaly detection equations: ; if the above equation test passes, it is indicated that the transmission process of the encrypted data file of all the key hydrological parameter data is not subject to abnormal conditions such as tampering. If the above equation test fails, the intelligent hydrologic system platform/>, for each ciphertext data block And its corresponding digital signature/>Abnormality detection is performed one by one according to the following equation:
the correctness analysis process based on the multisource hydrological data transmission anomaly detection and protection method is as follows:
Upon receipt of a transmission from a key generation center The end sensor device will then go through the equation/>Validating the four-tuple information/>Is described herein). The following is the equation derivation process:
; batch anomaly detection equation This equation is correctly derived as follows:
the intelligent hydrologic system platform is used for each ciphertext data block And its corresponding digital signature/>Abnormality detection is performed one by one according to the following equation:
The correctness of this equation is deduced as follows:
The foregoing is merely a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein but is not to be construed as excluding other embodiments, but is capable of numerous other combinations, modifications and environments and is capable of modifications within the scope of the inventive concept, either as taught or as a matter of routine skill or knowledge in the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.

Claims (5)

1. The method for detecting and protecting the transmission abnormality of the hydrologic data based on the multiple sources is characterized by comprising the following steps:
s1, initializing a system, wherein a key generation center generates public parameters for an intelligent hydrologic system, the public parameters comprise a multiplication cyclic group, a generation element, a public group element, a bilinear pair mapping, an anti-collision hash function, a homomorphic hash function and a system main public key, and the system main private key is generated by the key generation center and is safely stored;
S2, generating a public and private key of a certificateless cryptographic system, wherein terminal sensor equipment of the intelligent hydrologic system interacts with a key generation center to generate anonymized identity marks of the terminal sensor equipment and a corresponding partial signature private key;
s3, transmitting the multi-source hydrological data for anomaly detection, wherein the terminal sensor equipment generates corresponding encrypted data for the collected multi-dimensional intelligent hydrological data file and generates homomorphic digital signature based on a certificate-free cryptosystem;
s4, carrying out abnormal verification on multi-source hydrological data transmission, and converging an encrypted data file and a signature set thereof of key multi-dimensional hydrological parameter data generated by the terminal sensor equipment to an intelligent hydrological system platform through a wireless sensor network by the intelligent hydrological system, and carrying out integrity detection.
2. The method for detecting and protecting abnormal transmission of multi-source-based hydrological data according to claim 1, wherein the step S1 comprises the steps of:
S11, key Generation center setting Order multiplication cycle group/>,/>For big prime number, choose/>Is generated by the generation element/>And from/>Randomly selects one public group element/>
S12, setting a bilinear pair mapping in the key generation centerWherein/>Also/>A cyclic group of order multiplications;
S13, key generation center slave Order finite field/>Randomly selecting a non-zero element/>As a system master private key, a corresponding system master public key/>, is calculated
S13, setting two safe anti-collision hash functions by the key generation center: Here/> Representing a hash function/>Output length of (1)/>, hereRepresentation/>A cyclic group of order multiplications; in addition, the key generation center sets a homomorphic hash function/>
S14, the key generation center publishes system disclosure parametersAnd secretly store the system master private key/>
3. The method for detecting and protecting abnormal transmission of multi-source-based hydrological data according to claim 2, wherein the step S2 comprises the steps of:
S21, terminal sensor equipment slave Order finite field/>In secret selecting a non-zero element/>Calculating registration credentialsRegistration information/>, is then sent to the key generation center over the secure channelWherein/>Is the identity of the terminal sensor device;
s22, the key generation center receives the registration information of the terminal sensor equipment Then, calculating the corresponding anonymized identity mark/>Wherein/>The method is the validity period of anonymized identity identification use of the terminal sensor equipment;
S23, key generation center slave Order finite field/>In secret selecting a non-zero element/>Calculating and generating a first component/>, of a signature private key of a terminal sensor deviceAnd a first component/>, of the public keyAnd; the key generation center transmits the four-tuple information/>, through the secure channelGiving the terminal sensor device;
s24, when receiving the transmission from the key generation center The end sensor device will then go through the equation/>Validating the four-tuple information/>Is the integrity of (1); if the above equation is verified, the terminal sensor device accepts the four-tuple information/>Otherwise, requesting the key generation center to re-execute the step;
S25, the terminal sensor device is further from Order finite field/>In secret selecting a non-zero element/>As a second component of the signature private key, and calculates/>A second component that is a public key;
s26, the terminal sensor equipment obtains a complete signature private key based on a certificateless cryptographic system And the corresponding full public key/>
4. The method for detecting and protecting abnormal transmission of multi-source-based hydrological data according to claim 3, wherein the step S3 comprises the steps of:
S31, the terminal sensor device represents the n-dimensional intelligent hydrologic data file M as WhereinFor each dimension of data parameters, lightweight symmetric encryption algorithm/>, is utilizedGenerating a multidimensional intelligent hydrological data file/>Corresponding ciphertext data File/>Wherein the data parameters for each dimension and corresponding ciphertext data block/>Where i represents the subscript of the data dimension;
S32, for each ciphertext data block Terminal sensor device utilizes a complete signature private key/>, based on a certificateless cryptographic systemGenerating corresponding homomorphic signature block/>Here/>Is the corresponding ciphertext data block/>Is a label of (2); the terminal sensor device will generate ciphertext data file/>The corresponding homomorphic signature set is denoted/>
S33, the terminal sensor device sends the encrypted data file and the signature set thereofAnd performing anomaly detection and safe storage on the intelligent hydrologic system platform.
5. The method for detecting and protecting abnormal data transmission based on multi-source hydrologic data according to claim 4, wherein said step S4 comprises the steps of:
S41, integrity detection: ; if the above equation test passes, it is indicated that the transmission process of the encrypted data file of all the key hydrological parameter data is not subject to abnormal conditions such as tampering;
s42, if the equation test is not passed, the intelligent hydrologic system platform performs the test on each ciphertext data block And its corresponding digital signature/>Abnormality detection is performed one by one according to the following equation:
CN202410578639.1A 2024-05-11 2024-05-11 Multi-source hydrologic data transmission abnormality detection and protection method Active CN118158660B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410578639.1A CN118158660B (en) 2024-05-11 2024-05-11 Multi-source hydrologic data transmission abnormality detection and protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410578639.1A CN118158660B (en) 2024-05-11 2024-05-11 Multi-source hydrologic data transmission abnormality detection and protection method

Publications (2)

Publication Number Publication Date
CN118158660A true CN118158660A (en) 2024-06-07
CN118158660B CN118158660B (en) 2024-07-19

Family

ID=91297143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410578639.1A Active CN118158660B (en) 2024-05-11 2024-05-11 Multi-source hydrologic data transmission abnormality detection and protection method

Country Status (1)

Country Link
CN (1) CN118158660B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474610A (en) * 2018-12-07 2019-03-15 西南石油大学 The identifiable key exchange method of anonymity based on smart grid
CN112822009A (en) * 2021-01-26 2021-05-18 西安邮电大学 Attribute ciphertext efficient sharing system supporting ciphertext deduplication
CN113364600A (en) * 2021-08-11 2021-09-07 西南石油大学 Certificateless public auditing method for integrity of cloud storage data
CN115296809A (en) * 2022-10-08 2022-11-04 晨越建设项目管理集团股份有限公司 Data transmission method of intelligent engineering construction information system supporting asynchronous decryption at two ends
CN115333857A (en) * 2022-10-11 2022-11-11 晨越建设项目管理集团股份有限公司 Detection method for preventing data from being tampered based on smart city system cloud platform
CN116032495A (en) * 2023-03-28 2023-04-28 四川高速公路建设开发集团有限公司 Vehicle-cloud cooperative safety transmission data anomaly detection method based on intelligent traffic system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474610A (en) * 2018-12-07 2019-03-15 西南石油大学 The identifiable key exchange method of anonymity based on smart grid
CN112822009A (en) * 2021-01-26 2021-05-18 西安邮电大学 Attribute ciphertext efficient sharing system supporting ciphertext deduplication
CN113364600A (en) * 2021-08-11 2021-09-07 西南石油大学 Certificateless public auditing method for integrity of cloud storage data
CN115296809A (en) * 2022-10-08 2022-11-04 晨越建设项目管理集团股份有限公司 Data transmission method of intelligent engineering construction information system supporting asynchronous decryption at two ends
CN115333857A (en) * 2022-10-11 2022-11-11 晨越建设项目管理集团股份有限公司 Detection method for preventing data from being tampered based on smart city system cloud platform
CN116032495A (en) * 2023-03-28 2023-04-28 四川高速公路建设开发集团有限公司 Vehicle-cloud cooperative safety transmission data anomaly detection method based on intelligent traffic system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李珏;余雷;邢方亮;: "论区块链在水文数据传输中的应用研究", 黑龙江水利科技, no. 07, 31 July 2020 (2020-07-31) *

Also Published As

Publication number Publication date
CN118158660B (en) 2024-07-19

Similar Documents

Publication Publication Date Title
Li et al. DeepFed: Federated deep learning for intrusion detection in industrial cyber–physical systems
CN112543187B (en) Industrial Internet of things safety data sharing method based on edge block chain
Li et al. Detection of false data injection attacks on smart grids: A resilience-enhanced scheme
CN113691380A (en) Multidimensional private data aggregation method in smart power grid
Liu et al. SEDEA: State estimation-based dynamic encryption and authentication in smart grid
Yang et al. On lightweight security enforcement in cyber-physical systems
CN112600675B (en) Electronic voting method and device based on group signature, electronic equipment and storage medium
CN111935168A (en) Industrial information physical system-oriented intrusion detection model establishing method
Jeong et al. Secure cloud storage service using bloom filters for the internet of things
CN113747426A (en) Data auditing method and system, electronic equipment and storage medium
CN114885325A (en) Credible auditing method and system for regulating and controlling service network security suitable for 5G network
US8954728B1 (en) Generation of exfiltration-resilient cryptographic keys
Hwang et al. A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation.
CN107592295A (en) A kind of encryption method of big data
CN113254987B (en) Fault-tolerant time sequence data aggregation method capable of protecting privacy
Tian et al. DIVRS: Data integrity verification based on ring signature in cloud storage
Zhang et al. Antiquantum privacy protection scheme in advanced metering infrastructure of smart grid based on consortium blockchain and rlwe
CN118158660B (en) Multi-source hydrologic data transmission abnormality detection and protection method
Asad et al. Towards privacy-aware federated learning for user-sensitive data
CN114826607B (en) Edge computing node compression method based on block chain and lightweight storage system
CN116506154A (en) Safe verifiable federal learning scheme
Oh et al. A secure data processing system in edge computing-powered AIoT
CN115242534B (en) Node state security query method, system and device
Zhu et al. Robust and secure federated learning with low-cost zero-knowledge proof
KR102466596B1 (en) Toc analyzer for backup and security with data duplication configuration and the method using it

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant