A trusted IoT data sharing method based on secure multi-party computation
【Author】 Ma, Li; Duan, Binbin; Zhang, Bo; Li, Yang; Fu, Yingxun; Ma, Dongchao
【Source】JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS
【影响因子】3.418
【Abstract】Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security concerns, this paper proposes a trusted IoT data sharing method based on secure multi-party computation (SMC). By running a reliable third-party blockchain service at edge computing nodes, the data computation relationships between IoT devices in the perception layer are registered in blockchain smart contracts. This constructs a publicly verifiable IoT data sharing method combining on-chain audit verification and off-chain SMC. Furthermore, a Bloom filter is maintained at the on-chain smart contract layer to track the trust status of IoT devices in the perception layer, filtering out non-trustworthy device requests and enabling secure data sharing among trusted devices. Comparative analysis and performance tests demonstrate the proposed method's high computational efficiency for IoT device nodes.
【Keywords】IOT; Blockchain; Edge computing; Secure multi-party computing; Bloom filter
【发表时间】2024 SEP 13
【收录时间】2024-09-19
【文献类型】实验仿真
【主题类别】
区块链技术-协同技术-物联网
评论