Research on Privacy Data Protection Based on Trusted Computing and Blockchain
【Author】 Zhu, Linkai; Peng, Sheng; Cai, Zhiming; Liu, Wenjian; He, Chunjiang; Tang, Weikang
【Source】SECURITY AND COMMUNICATION NETWORKS
【影响因子】1.968
【Abstract】Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.
【Keywords】
【发表时间】2021 17-Dec
【收录时间】2022-06-22
【文献类型】理论性文章
【主题类别】
区块链技术-协同技术-隐私计算
【DOI】 10.1155/2021/6274860
评论