KEYWORDS: Blockchain, Internet of things, Data storage, Information security, Network security, Computer security, Information technology, Data privacy, Data transmission, Security technologies
In recent years, the Internet of Things industry has developed rapidly, and various intelligent devices have been connected to the Internet of Things, gradually improving people's daily lives. With the continuous increase in the number of Internet of Things devices, the resulting user privacy data is also exploding, ensuring information security is very important. Decentralized blockchain technology involves disciplines such as computer programming and cryptography, and is a distributed database. Compared to traditional information technology, blockchain has significant technical advantages in information disclosure and transparency. This article builds a blockchain based IoT management platform based on the Hyperledger Fabric framework. The platform uses blockchain as the underlying technology, cooperates with storing source data to the IPFS network, uploads the returned hash value to the blockchain network, and applies blockchain technology to the field of information security. Combining the application characteristics of the technology, it provides a new solution for solving the information security issues of the Internet of Things.
KEYWORDS: Data privacy, Data modeling, Data acquisition, Detection and tracking algorithms, Reconstruction algorithms, Network security, Computer security, Phase modulation, Frequency modulation, Education and training
This paper discusses the research of privacy protection based on network traffic data. Firstly, the concept and collection method of network traffic data are introduced, and the method of collecting network traffic data by intelligent identification algorithm is proposed, so as to improve the accuracy and efficiency of data collection. Then, aiming at the privacy protection of network traffic data, a privacy protection scheme based on desensitization algorithm is proposed. The scheme uses chaotic cryptography, homomorphic encryption and differential privacy to ensure the privacy and security of data. Finally, the effectiveness and practicability of the scheme are illustrated by the conclusion, which provides a new solution for the privacy protection of network traffic data.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.