| With the wide application of the Internet of Things(IoT),the data volume of the IoT is rapidly increasing,and the data with significant value in the massive data needs to be reliably stored and shared.However,traditional IoT data management systems have shortcomings such as low scalability,low security,and poor traceability.Although cloud computing technology can alleviate such problems,there are still problems of high response delay and low security.Therefore,this paper intends to solve the above problems by studying a blockchain-based IoT data storage and access scheme.Through the investigation of the literature in related fields,it is found that the current research work is still insufficient,and the following points are summarized:1.The system architecture design is unreasonable,and the resource limitations of IoT devices are not fully considered.2.The idle storage resources of high-resource devices in the system cannot be effectively utilized.3.There are a lot of malicious behaviors in the system,and it does not have the ability to detect and suppress malicious behaviors.4.The system throughput is low and cannot meet the data processing requirements of the IoT.Therefore,this paper carries out research work based on the above problems,and the main contents are as follows:1.This paper proposes a blockchain-based IoT data storage and access management system.The system uses a two-tier architecture model to realize blockchain applications between IoT devices in resource-constrained scenarios.At the same time,the system uses a data storage location selection algorithm to store data distributedly in blockchain nodes and IoT devices with high storage resources,effectively utilizing the idle storage resources of devices in the system.2.This paper proposes a reputation mechanism to detect and suppress malicious behavior in the system.The system can detect malicious behavior of nodes obtaining tokens but not providing storage resources,and uses an efficient and reliable arbitration mechanism to determine whether the data sender has malicious behavior of not sending complete data.Malicious behavior will be recorded,which will affect the interests of nodes in the system.3.This paper proposes a hybrid consensus algorithm combining Proof of Stake(PoS)and Practical Byzantine Fault Tolerant Algorithms(PBFT).The PoS consensus algorithm effectively improves the enthusiasm of nodes to participate in the system,and the PBFT consensus algorithm significantly improves the throughput of the system.Finally,this paper analyzes the security and feasibility of the proposed scheme,and proves the security,reliability and performance advantages of the scheme.In addition,this paper simulates the system of the proposed scheme and compares it with the benchmark scheme from multiple dimensions.The experimental results show that the scheme proposed in this paper has a reasonable architecture design,can efficiently detect malicious behavior,and significantly improve the throughput of the system. |