Font Size: a A A

Research On Key Issues Of Data Storage And Access Control In IoT Consortium Chain

Posted on:2021-01-20Degree:DoctorType:Dissertation
Country:ChinaCandidate:R QiaoFull Text:PDF
GTID:1488306230972059Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
It is of great significance to establish consortium chains based distributed Io T(Internet of Things)network with efficient and secure quality.Such as that is conducive to improving the cooperation efficiency of the Io T systems,reducing the operating cost of Io T systems,as well as promoting the technological innovation and application of the Io T industries.In recent years,there have been some excellent results on the theoretical research of consortium block chain,however,the performance of Io T consortium chain is still limited,as well as the reliability of the data on the Io T consortium chain cannot be guaranteed.In addition,the synchronization of the state machine of cross-chain communication is still difficult.So Io T consortium chains still cannot satisfy the requirements of the practical applications.To overcome these difficulties,the researches of dynamic data storage and access control of Io T consortium chain needs to be developed and this motivates our research.The main works are as follows.1.Consortium chain based secure storage mechanism of Io T dynamic data.First,the consistency between local behavior of consensus terminals to maximize their own benefits and the overall goals to ensure the system security and effectiveness of Internet of Things dynamic data is analyzed.Followed by The consensus mechanism based on greedy rules is proposed so that nodes can reach a consensus on new block efficiently.Then,taking the institutions as the endorsement nodes,the digital asset ownership states and states transition functions are defined to ensure the value conservation.Finally,a hash message authentication code based multilevel access control data delivery method is proposed to realize the distributed accounting of dynamic data by consensus.The scheme can prevent unauthorized users from tampering and forgery of dynamic data effectively to ensure the security of the data on the chain.2.Consortium chain based traceability mechanism of Io T dynamic data.First,the authorization attribute characteristic value based multi-dimension authorization and operation tracing dynamic data model is established.Then,by analyzing the rational behavior of the nodes and the game process of the strategy,the boundary conditions for reaching consensus on each node in the dynamic data traceability system are proposed.After that,the node with low probability of betrayal is authorized by the institution to be the node in the Verification Nodes List(VNL),and the VNL-based consensus mechanism(Vnl CM)is provided.Finally,based on the Vnl CM consensus mechanism,the static multidimensional authorization relationship chain and the dynamic data storage chain are constructed to realize the secure management of dynamic data and its operations.The scheme can identify authorized users from tampering and forgery of dynamic data effectively to improve the reliability of data on the chain.3.Dynamic autonomous cross consortium chain mechanism of Io T.Based on the analysis of the cross-chain interaction of nodes under the specific application scenario of Io T consortium chain,the Io T consortium chain based universal model of cross-chain communication is abstracted.In addition,the group threshold digital signature based cross-chain consensus mechanism(GCCM)is proposed to define the cooperative relationship and to transmit cross-consortium chain consensus between different Io T institutions.The construction rules for path proof with trusted identity of the node are proposed by simplifying the heterogeneous node communication topology,thus,the behavior of the nodes is limited to the credibility scope of the mechanism license.What is more,the deployment and execution time sequence of the smart contract is analyzed from the perspective of the nodes cooperative game in Io T consortium chain,and the best way for value transfer of rational nodes is determined.Finally,the method to deploy the smart contract to realize decentralized,dynamic,and autonomous transfer of values between the nodes of different Io T consortium chains is proposed.4.Cross consortium chain communication mechanism under complex conditions of Io T.First,the cross-chain communication model of the Io T consortium chain under complex conditions is constructed,as well as the cross-chain communication topology between nodes of the Io T consortium chain is simplified.Then the types of authorization between consortium chains are fine-grained divided.On this basis the process of using authorization codes to construct identity certificates among entities and running smart contracts to realize free-active authorization between chains is presented.What is more,on the basis of modeling the VNL based consensus for the cross-chain transactions as a GCCM consensus with multiple privileged subgroups,the transactions are divided into different types so that the optional trust-verification threshold consensus mechanism is adopted to realize the real-time confirmation of low-value transactions,while ensuring the security of cross-chain transactions and high-value transactions.Finally,in order to solve the problem of inconsistent system state in the process of cross-chain communication proposed above,a transaction initialization,locking and unlocking three-stages based cross consortium chain atomic submission protocol is proposed,so as to achieve security,autonomy,dynamic authorization and value transfer among different Io T consortium chains under complex situations.The above solution to the security and scalability problems in the dynamic data storage and sharing of Io T consortium chains is proposed in this paper.This solution can realize the independent cross-chain interaction of the Io T consortium chain nodes under the premise of ensuring data security and reliability.Furthermore,it provides a set of effective theories and technical solutions to prevent the Io T dynamic data from being falsified and forged,whileimproving the consensus efficiency and scalability of the system effectively.Analysis and experimental results showed the effectiveness of the proposed scheme.
Keywords/Search Tags:Internet of Things, Consortium chain, Dynamic data, Access control, Cross-chain communication, Consensus mechanism
PDF Full Text Request
Related items