Data capitalization method based on blockchain smart contract for Internet of Things

被引:12
作者
Sheng N.-Z. [1 ,2 ]
Li F. [1 ]
Li X.-F. [1 ,2 ]
Zhao H. [1 ]
Zhou T. [1 ,2 ]
机构
[1] Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei
[2] University of Science and Technology of China, Hefei
来源
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science) | 2018年 / 52卷 / 11期
关键词
Blockchain; Data capitalization; Determination of data ownership; Internet of Things (IoT); Smart contract;
D O I
10.3785/j.issn.1008-973X.2018.11.014
中图分类号
学科分类号
摘要
The Internet of Things data capitalization method based on blockchain smart contract was used as a solution to the challenges when ascertaining data ownership, dealing with the inefficiency of quantification and value transfer of digital asset. The data's right was determined by transferring data ownership and control from the equipment manufacturers to the users, with the aid of digital fingerprints stored in the blockchain. The data reliability was ensured by storing the up-to-date device status and hash of the data into the blockchain, which was achieved by the full lifecycle management and digital signatures. A data trading platform without any third-party was established based on smart contract to guarantee the security of data sharing and accomplish the realization and migration of data's value. The quantitative analysis of attack probability and attack success rate shows that the technology of blockchain smart contract provides data tamper resistance and eliminates the trust crisis in data transaction processes. The proposed method realizes the capitalization of data in the Internet of Things initially and may help promote the data value migration and data sharing in the Internet of Things in future. © 2018, Zhejiang University Press. All right reserved.
引用
收藏
页码:2150 / 2158
页数:8
相关论文
共 23 条
[1]  
Qi A.-M., Pan J., Data right, the establishment of data sovereignty and the basic principle of big data protection, Journal of Soochow University: Philosophy and Social Science Edition, 1, pp. 64-70, (2015)
[2]  
Peng Y., Research on authenticating data rights in big data environment, Modern Science and Technology of Telecommunications, 46, 5, pp. 17-20, (2016)
[3]  
Zyskind G., Nathan O., Pentland A., Decentralizing privacy: using blockchain to protect personal data, IEEE Security and Privacy Workshops, pp. 180-184, (2015)
[4]  
Azaria A., Ekblaw A., Vieira T., Et al., MedRec: using blockchain for medical data access and permission management, International Conference on Open and Big Data, pp. 25-30, (2016)
[5]  
Zhang Y., Wen J., An IoT electric business model based on the protocol of bitcoin, International Conference on Intelligence in Next Generation Networks, pp. 184-191, (2015)
[6]  
Device democracy-saving the future of the Internet of Things
[7]  
Zhao H., Li X.-F., Zhan L.-K., Et al., Data integrity protection method for microorganism sampling robots based on blockchain technology, Journal of Huazhong University of Science and Technology: Natural Science Edition, 43, pp. 216-219, (2015)
[8]  
Lamport L., The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, 4, 3, pp. 382-401, (1982)
[9]  
Yuan Y., Wang F.-Y., Blockchain: the state of the art and future trends, Acta Automatica Sinica, 42, 4, pp. 481-494, (2016)
[10]  
Qian W.-N., Shao Q.-F., Zhu Y.-C., Et al., Research problems and methods in blockchain and trusted data management, Journal of Software, 29, 1, pp. 150-159, (2018)