The New Method of Sensor Data Privacy Protection for IoT

被引:2
|
作者
Wu, Yue [1 ,2 ,3 ]
Song, Liangtu [1 ,2 ,3 ]
Liu, Lei [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Intelligent Machines, Hefei 230031, Anhui, Peoples R China
[2] Chinese Acad Sci, Hefei Inst Phys Sci, Hefei 230031, Anhui, Peoples R China
[3] Univ Sci & Technol China, Hefei 230026, Anhui, Peoples R China
关键词
BLOCKCHAIN; SECURITY; INTERNET; THINGS; SYSTEM;
D O I
10.1155/2021/3920579
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a block, and submits the block chain transaction. In order to avoid tracking the source of the data, a ring signature is used to anonymize the gateway transaction. The proxy re-encryption method realizes the sharing of encrypted data. On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. Through experiments, the effects of sensor/gateway verification, transaction signatures, and sensor data encryption on performance are discussed. The results show that transaction delays are all controlled within a reasonable range. The system performance achieved by this method is also relatively stable.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN
    Alabdulwahab, Saleh
    Kim, Young-Tak
    Son, Yunsik
    SENSORS, 2024, 24 (22)
  • [32] Differential Privacy Data Protection Method Based on Clustering
    Li Li-xin
    Ding Yong-shan
    Wang Jia-yan
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 11 - 16
  • [33] PPM: Privacy Protection Method for Outsourcing Data Entry
    Li, Fengqi
    Shang, Chunli
    Liu, Kemeng
    Pang, Aidi
    Huang, Sikai
    IEEE ACCESS, 2019, 7 : 29745 - 29753
  • [34] Privacy Protection Oriented Video Data Hiding Method
    Liu, Si
    Liu, Yunxia
    Wang, Zipei
    Feng, Cong
    Zhao, Hongguo
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 90 - 95
  • [35] Privacy-protection method for purchasing multimedia data
    Soma, H
    Tanaka, H
    DIGITAL CONVERGENCE FOR CREATIVE DIVERGENCE, VOL 2: TECHNICAL INTERACTIVE SESSIONS, 1999, : 516 - 521
  • [36] Cloud workflow scheduling method with data privacy protection
    Wang, Jing
    Han, Yan-Bo
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2013, 19 (08): : 1859 - 1867
  • [37] A new sensor concept for a privacy protection by switching the detection capabilities
    Yoshiizumi, H
    Shida, K
    SICE 2004 ANNUAL CONFERENCE, VOLS 1-3, 2004, : 756 - 761
  • [38] Data Protection and Privacy: Data Protection and Democracy
    Bougiakiotis, Emmanouil
    MODERN LAW REVIEW, 2022, 85 (02): : 566 - 570
  • [39] Data Protection and Privacy: Data Protection and Democracy
    Bougiakiotis, Emmanouil
    MODERN LAW REVIEW, 2021,
  • [40] Cybersecurity of Medical Data Based on Big Data and Privacy Protection Method
    Li, Jianhong
    Pan, An
    Zheng, Tongxing
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (05)