Extensible Internet of Things big data and service security management method based on side chain

A security management and Internet of Things technology, applied in the field of Internet of Things big data and service security management, can solve problems such as poor security, large data and service security limitations, achieve security and fairness, reduce load, and improve payment efficiency Effect

Inactive Publication Date: 2022-01-18
XIAN UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a scalable Internet of Things big data and service security management method based on side chains, which solves the problems of large Internet of Things big data and service security limitations and poor security existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extensible Internet of Things big data and service security management method based on side chain
  • Extensible Internet of Things big data and service security management method based on side chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In the method of the present invention, a system administrator is designated to initialize the alliance block chain and side chain, and three types of smart contracts are designed, including alliance contract, side chain contract, and cloud side chain contract, and the entity authentication mechanism and access control The rules are embedded in the smart contract, and then the alliance contract is deployed in the alliance blockchain, the sidechain contract is deployed in the sidechain, and the cloud sidechain contract is deployed in the cloud sidechain.

[0076] The present invention is specifically as follows:

[0077] to combine Figure 1 ~ Figure 2 , Step 1. System initialization: System initialization includes two stages: initializing the blockchain and initializing the smart contract;

[0078] Step 1 is specifically implemented according to the following steps:

[0079] Step 1.1. Initialize the blockchain:

[0080] The system administrator sets the initial param...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an extensible Internet of Things big data and service security management method based on a side chain. The method is specifically implemented according to the following steps: step 1, system initialization: the system initialization comprising two stages: initializing a block chain and initializing a smart contract; step 2, registration of the Internet of Things devices: each Internet of Things device added into the side chain network needing to be verified by a side chain contract and then being recorded in the side chain contract, and after a side chain administrator monitors an Internet of Things device registration event, recording related attributes of the device and the side chain in an alliance chain, so that the alliance chain can allocate access authority to a user; step 3, accessing data of the Internet of Things; and step 4, distributing Internet of Things services. According to the invention, the problems of large limitation and poor security of big data and service security of the Internet of Things in the prior art are solved.

Description

technical field [0001] The invention belongs to the technical field of cryptography and information security, and in particular relates to a side chain-based scalable Internet of Things big data and service security management method. Background technique [0002] The rapid increase in the number of IoT devices has brought about the expansion of the scale of the Internet of Things. The data collected by large-scale devices and the demand for services have brought challenges to the security management of data and the efficient distribution of services. Traditional cloud-based IoT plays an important role in providing real-time and convenient services for IoT users. However, cloud computing has the risk of a single point of failure. The development of blockchain technology and fog computing provides a new solution to the problems of data security assurance and service distribution in the Internet of Things. Combined with efficient smart contract technology and flexible side c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/30H04L9/32H04L67/12
CPCH04L63/10H04L9/0869H04L9/3239H04L9/3066H04L63/045H04L67/12
Inventor 王尚平赵鑫张倩张亚玲
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products