Privacy Protection Management Model for Internet of Things Data

Yundan Yang,Fenghui Duan,Maosheng Zhang,JunJie Liu,Jin Li,Yueming Lu
DOI: https://doi.org/10.1109/dsc55868.2022.00036
2022-01-01
Abstract:With the rapid development of the Internet of Things, personal information is collected, stored and analyzed through IoT terminal devices, which is benefit for people’s daily life. However, the problems of personal private information leakage are also emerging. In terms of ciphertext data access control of the Internet of Things, it is required to implement fine-grained access control policies for the authorizer. However, the traditional security channel cannot meet the requirements of application security and privacy protection based on resisting key sharing attacks in a “many to many” environment. To solve this problem, this paper proposes a privacy protection management model based on lightweight blockchain, which includes three modules: data storage, sharing and auditing. Data storage module is used to encrypt and store the private data generated by individual users in various IoT devices. The data sharing module proposes a hybrid encryption mechanism, which allows data owners to create data access policies, and uses attribute encryption algorithm to achieve fine-grained access control of private data. The data auditing module proposes a lightweight blockchain architecture to store root of trust and life-cycle behaviors of private data, so as to realize the integrity verification and traceability of circulation trajectory. Finally, the security analysis of the proposed model can resist wireless communication eavesdropping and tampering attacks, attribute inference attack and identity impersonation attack. Simulation experiments are carried out on Fabric and lightweight blockchain systems to compare and analyze the performance consumption of calculating the root of trust, blockchain storage and query. The experimental results show that the performance of the proposed lightweight blockchain is 1666 TPS, which can meet the batch certificate storage requirements in the Internet of Things scenario.
What problem does this paper attempt to address?