The New Method of Sensor Data Privacy Protection for IoT

被引:2
|
作者
Wu, Yue [1 ,2 ,3 ]
Song, Liangtu [1 ,2 ,3 ]
Liu, Lei [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Intelligent Machines, Hefei 230031, Anhui, Peoples R China
[2] Chinese Acad Sci, Hefei Inst Phys Sci, Hefei 230031, Anhui, Peoples R China
[3] Univ Sci & Technol China, Hefei 230026, Anhui, Peoples R China
关键词
BLOCKCHAIN; SECURITY; INTERNET; THINGS; SYSTEM;
D O I
10.1155/2021/3920579
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a block, and submits the block chain transaction. In order to avoid tracking the source of the data, a ring signature is used to anonymize the gateway transaction. The proxy re-encryption method realizes the sharing of encrypted data. On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. Through experiments, the effects of sensor/gateway verification, transaction signatures, and sensor data encryption on performance are discussed. The results show that transaction delays are all controlled within a reasonable range. The system performance achieved by this method is also relatively stable.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
    Zhong, Beixin
    Yang, Zilong
    Liu, Zhonghao
    Chen, Xiaoyong
    Cheng, Shi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [22] Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action
    Reshi, Iraq Ahmad
    Sholla, Sahil
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, : 3905 - 3933
  • [23] A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems
    Guo, Xuancheng
    Lin, Hui
    Wu, Yulei
    Peng, Min
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 407 - 417
  • [24] Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets
    Oh, Hyeontaek
    Park, Sangdon
    Lee, Gyu Myoung
    Choi, Jun Kyun
    Noh, Sungkee
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3623 - 3639
  • [25] A Double-Compensation-Based Federated Learning Scheme for Data Privacy Protection in a Social IoT Scenario
    Guo, Junqi
    Xiong, Qingyun
    Yang, Minghui
    Zhao, Ziyun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (01): : 827 - 848
  • [26] A blockchain and A-DCNN integrated framework for privacy protection and intrusion detection of industrial IoT
    Chen, Zhen
    Huang, Jia
    Liu, Shengzheng
    Long, Haixia
    COMPUTING, 2025, 107 (01)
  • [27] Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain
    Li, Wenmin
    Chen, Yang
    Gao, Fei
    Zhang, Shuo
    Zhang, Hua
    Wen, Qiaoyan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12090 - 12101
  • [28] Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain
    Liu, Qingzhi
    Huang, Yuchen
    Jin, Chenglu
    Zhou, Xiaohan
    Mao, Ying
    Catal, Cagatay
    Cheng, Long
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (06)
  • [29] Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center
    Lian, Bin
    Cui, Jialin
    Chen, Hongyuan
    Zhao, Xianghong
    Wang, Fuqun
    Chen, Kefei
    Ma, Maode
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12331 - 12345
  • [30] Security and Privacy Protection for eHealth Data
    Jahan, Sharmin
    Chowdhury, Mozammel
    Islam, Rafiqul
    Gao, Junbin
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 197 - 205