A data privacy protection scheme for Internet of things based on blockchain

被引:11
作者
Gong, Jing [1 ,2 ,3 ]
Mei, Yurong [1 ,2 ,3 ]
Xiang, Feng [4 ]
Hong, Hanshu [1 ,2 ,3 ]
Sun, Yibo [5 ]
Sun, Zhixin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, 66 XinMofan Rd, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Modern Posts, Nanjing, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Inst Modern Posts, Nanjing, Peoples R China
[4] YTO Express Co Ltd, Natl Engn Lab Logist Informat Technol, Shanghai, Peoples R China
[5] Changzhou Inst Technol, Sch Comp Informat Engn, Changzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
RING SIGNATURE; SECURITY;
D O I
10.1002/ett.4010
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In recent years, the Internet of things (IoT) equipment has grown rapidly, and the scale of the IoT has also expanded. The IoT is deployed in the system in a centralized manner. At the same time that massive data has put a certain amount of pressure on the storage, the open network environment has not fully protected the privacy of the IoT data, which has become one of the important factors restricting the development of the IoT. Blockchain is a point-to-point distributed ledger technology based on cryptographic algorithms. The characteristics of decentralization, tamper resistance, anonymity, and public verifiability can alleviate data security issues in IoT. Ring signature and proxy reencryption are common encryption technologies in the field of privacy protection. Therefore, this article combines blockchain technology with ring signature and proxy reencryption to propose a privacy protection solution for the IoT. Through this solution, the data authorized for sharing in the IoT is transmitted in the system in the form of ciphertext, the identity information of the data sender is protected, and the distributed ledger eases the pressure of mass data storage on a centralized server. The correctness and safety of the proposed scheme are also analyzed.
引用
收藏
页数:11
相关论文
共 36 条
[1]   A Review of Aggregation Algorithms for the Internet of Things [J].
Al-Doghman, Firas ;
Chaczko, Zenon ;
Jiang, Jianming .
2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, :480-487
[2]   An overview of security and privacy in smart cities' IoT communications [J].
Al-Turjman, Fadi ;
Zahmatkesh, Hadi ;
Shahroze, Ramiz .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[3]  
[Anonymous], 2005, ITU INT REP 2005 INT
[4]  
[Anonymous], 2017, 2017 International Conference on Internet of Things for the Global Community (IoTGC), DOI DOI 10.1109/IOTGC.2017.8008970
[5]  
[Anonymous], [No title captured]
[6]  
Ashton K., 2009, RFID journal, V22, P97
[7]  
Axon L., 2015, Privacy-awareness in blockchain-based PKI
[8]   Preserving Privacy of Drone Videos using Proxy Re-encryption Technique [J].
Baboolal, Vashish ;
Akkaya, Kemal ;
Saputro, Nico ;
Rabieh, Khaled .
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, :336-337
[9]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[10]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257