| As an important part of the Internet of Things,sensors are usually deployed in complex and harsh environments such as rivers and coastal areas.In addition,sensors have great limitations in computing,storage,communication,viability and other aspects,so the sensor data is usually at risk of leakage and tampering.Blockchain technology has the characteristics of data tamper-proof and anti-forgery,which can provide a possible solution for the safe storage and transmission of sensor data in the Internet of Things.However,in the complex Internet of Things scenario,how to combine blockchain technology to securely and efficiently transmit large amounts of sensor data to the cloud for analysis and processing is still a challenge,especially when multiple blockchains work together in this scenario,the transmission of crosschain data will bring new security risks such as privacy leakage.In order to solve the above problems,this paper mainly studies the security transmission and privacy protection technology of sensor data under the block chain.The main research contents are as follows:1.Aiming at the problem of safe transmission of sensor data,this paper designs a safe transmission model of sensor data based on the end-to-end cloud chain architecture.This model will form a summary of the data in the cloud storage and save it to the blockchain to ensure the safety of the data storage.The credibility level of terminal sensor is regarded as an important factor for the reliability verification of equipment,and combined with the integrity verification of data,the dual guarantee for the security of data transmission is realized.The theoretical analysis shows that the proposed model can ensure the safe transmission and storage of sensor data,and the simulation results show that the proposed model has less computational cost than the existing work.2.Aiming at the problem of privacy leakage in the cross-chain transmission of sensor data in the multi-chain collaboration scenario,this paper proposes a cross-chain privacy protection model based on the improved notary mechanism.Based on the notary mechanism,this model combines hash locking technology to reduce the risk of notary doing evil.Hashing algorithm and identification password are used to realize the separation of user information chain up and down.The homomorphic encryption algorithm is used to make the transaction data available and invisible in the cross-chain transaction process on the premise that the transaction is legitimate.The theoretical analysis shows that the model can protect the privacy security of cross-chain data transmission,and the simulation results show that compared with the existing work,the calculation cost of the model is smaller. |