Research on Privacy Data Protection Based on Trusted Computing and Blockchain
Author(s) -
Linkai Zhu,
Sheng Peng,
Zhiming Cai,
Wenjian Liu,
Chunjiang He,
Weikang Tang
Publication year - 2021
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0114
pISSN - 1939-0122
DOI - 10.1155/2021/6274860
Subject(s) - computer science , encryption , node (physics) , blockchain , protocol (science) , computer network , data transmission , privacy protection , direct anonymous attestation , computer security , transmission (telecommunications) , data protection act 1998 , trusted computing , medicine , telecommunications , alternative medicine , structural engineering , pathology , engineering
Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom