Summary of the invention
The application is to be made based on inventor to the understanding of following problems and discovery:
Internet network application technology fast development is universal, and the development of Web2.0 leads to the network user and network number in additionIt grows at top speed according to amount, the characteristics of more stringent requirements are proposed for storage and processing ability of the user to data, cloud computing has catered to thisA little demands.The cloud computing service of centralization provides great convenience for user's storage, and user need not be concerned about complicated hardware againManagement.Although cloud computing has these attracting advantages, it also brings new security challenge and threat to data protection: firstFirst, since user physically has their data no longer, the encryption for being conventionally used to data protection cannot be directly used.ItsSecondary, although the equipment under cloud computing is more powerful than personal computing devices reliable, they still suffer from inside and outside numberIt is threatened according to integrality, the hackers for largely coveting cloud data ceaselessly excavate service provider Web using upper loophole, with expectationIt makes a breach, obtains valuable data.Finally, that have high priority data access right is not user oneself, but cloud computingService provider.Due to benefits program, cloud service supplier may have dishonest conduct to the data of user.Private clound has objectControllability, specificity and high security are managed, so being the choosing of current more and more people using private cloud storage individual privacy dataIt selects.
Data demand collected of the embodiment of the present invention copes with Internet of Things from the hardware physical equipment by certification, systemSensor device carries out authentication.Conventional authentication mode is normally based on Cryptography Principles, by key storage non-volatileIn memory, certification and protection secret information therein to physical entity are realized by modes such as digital signature, encryptions, howeverThis mode may suffer from the physical attacks such as Network Intrusion, half Network Intrusion, side-channel attack, be also easy to soft by virus etc.The attack of part;Application of traditional authentication mode in the case where resource is limited, computing capability is poor can also there is a problem of manyAnd obstacle.Different from conventional authentication mode, the present invention uses the hardware accreditation scheme energy based on physics unclonable functionEffectively solve the problems, such as above-mentioned key storage and authentication.(Physical Unclonable Function, physics is or not PUFFunction can be cloned) it is widely used in digital circuit, usually broadly it is divided into the PUF based on the storage and PUF based on delay.ItsPrinciple be using certain rule by physical entity in process for making caused by random sex differernce and physics inhomogeneitiesIt extracts, under the premise of entity inputs an excitation, a uncertain response is exported, using the response as the physicsThe unique identification of hardware entities.In the PUF scheme of digital circuit, (Challenge Response Pairs swashs corresponding CRPsEncourage response to) can excitation input after, pass through BIST (Built-in self-test, self testing circuit) generate.PUF technology withThe excellent properties such as uniqueness, unpredictability, nonclonability and anti-tamper property can solve authentication and management, knowledge producePower protection and generation of encryption keys.
The network safety preventions such as traditional firewall, intrusion detection and virus defense means all lay particular emphasis on protection serverInformation security, and relatively fragile terminal just increasingly becomes the Main Weak Links of information system security.For these systemsDemand for security and all kinds of attack means, trust computing are set about from Computer Architecture, establish a kind of letter from hardware securityAppoint transport system to guarantee the credible of terminal, people and program, people and machine and interpersonal trust are solved from sourceProblem." credible " that industrial circle is generally accepted refers to establishes believable calculating environment based on security chips, it is ensured that system is realBody it is anticipated that behavior execute, wherein the safety chip for being embedded in hardware platform is known as credible platform module (TrustedPlatform Module, TPM), platform is collectively referred to as credible calculating platform.Trusted Computing Group (TCG) also proposed credible meterCalculate the related specifications of platform.The function that credible calculating platform generally has has: establishing root of trust and determines trust anchor, constructs credibleChain makes to trust transmitting layer by layer, platform identity proves, completeness of platform proves the function of connecting with support trustable network.To prevent from dislikingMeaning user makes up a large amount of false datas and uploads transaction, and the present invention uses reliable computing technology to mention for the acquisition of data, storage, processingFor the credible of full link.
It 2008, is put forward for the first time by middle acute hearing (Satoshi Nakamoto) and the Standard Proof concept of bit coin, areaBlock chain (Blockchain) technology, as a kind of information technology most crucial in bit coin transaction system, because of its transaction systemWhat open, not depend on any trust authority decentralization, timestamp and digital signature was guaranteed can not tamper and conjunctionMethod transaction be stored in block chain it is permanent the features such as, solve the problems, such as dual consumption problem and Byzantium general, and realize oneCommon recognition network system of the kind without trust.Then more and more block chain projects are come into being, and ether mill (Ethereum) isWherein representative one, it is the complete information system of figure spirit and supports that customized intelligent contract, intelligent contract areOne section of executable code on block chain, when a triggering condition is met, open and clear intelligent contract can go central place to hold automaticallyRow.This favors ether mill by more and more developers.The present invention is based on the peaces that block chain technology completes critical dataEntirely, fair, the automatic payment with data reward is permanently stored.
Based on above-mentioned application demand and technical background, the embodiment of the present invention is that one kind is set for extensive personal Internet of thingsThe credible big data of standby network acquires transaction system.Private clound, PUF, trust computing, block chain are merged to the system innovationTechnology solves the problem of under the premise of guaranteeing data validity and justice of exchange while protecting data set provider privacy, rightFused data isolated island solves the problems, such as that data are in short supply and is of great significance.
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, it is an object of the invention to propose that a kind of acquired based on the big data of block chain and credible calculating platform is tradedSystem, the contradiction which has reconciled to a certain extent between personal privacy protection and big data acquisition, and ensure data sourceCredibility, and have the advantages that practical, simple easily to realize.
In order to achieve the above objectives, the embodiment of the present invention proposes a kind of big data based on block chain and credible calculating platformAcquire transaction system, comprising: address verifying module on user's chain is used for data Collection Co., Ltd DCC, trusted third party TTP and useCommunication interaction proves (Direct Anonymous Attestation, DAA) agreement to complete Direct Anonymous between family, and will be withDCC trade user white list is added in public key address on the block chain of credible privately owned cloud platform binding;Data acquisition module, for privateIntegrity measurement (the Integrity of capture program code page is executed while having cloud platform to be acquired operationMeasurement) to obtain the first platform status, and hardware fingerprint is obtained and uploaded by Internet of things node, and described in utilizationThe data deblocking of credible privately owned cloud platform safely generates data voucher (Data Credential) with encapsulation function, to obtainThe foundation of subsequent module verify data credibility;Data uploading module, for executing the integrity measurement of upload program code pageTo obtain the second platform status, and data block voucher (Data is generated after linking packing with the data voucher of any time periodBlock Credential), and shape of the public key address to trade on the block chain by being bound with the credible privately owned cloud platformFormula is uploaded to System Committee's chain;Data credibility authentication module, after announcing the data type for it is expected purchase in the DCC,The corresponding block number of user feedback and corresponding original data set are received, and the DCC is obtained under the assistance of the TTPBy legitimate device under trusted status the corresponding effective district block number of acquired data, and calculate the data block of the effective blockCredential verification value is uploaded to intelligent contract entrance;Data recompense payment module, for passing through the automatic traceability chain of the intelligent contractIt is compared the data block voucher of the effective block of upper record with the DCC validation value submitted, with according to compare atThe number of blocks of function is disclosed and is automatically recompensed to user's payment data.
The embodiment of the present invention is to acquire transaction system based on the big data of block chain and credible calculating platform, by dataAcquisition, storage, packing, upload operation implement comprehensive supervision and protection, and the full link for realizing data is credible, using directThe method of anonymous attestation makes DCC protect privacy of user in the validity of public key address on authenticating user's chain;Also, it is based onThe characteristics of intelligence contract decentralization of block chain and automation, guarantees the open and clear of data reward payment, thus in certain journeyThe contradiction reconciled on degree between personal privacy protection and big data acquisition, and ensure the credibility of data source, and have realIt is simple easily to realize with property.
In addition, according to the above embodiment of the present invention acquire transaction system based on the big data of block chain and credible calculating platformSystem can also have following additional technical characteristic:
Further, in one embodiment of the invention, address verifying module is further used on user's chain: rawAt anonymous credentials issuer TTP key;The anonymous credentials are issued to user terminal by TTP and zero-knowledge proof;By describedUser terminal calculates anonymity signature, to realize the DCC verifying user terminal anonymity signature correctness.
Further, in one embodiment of the invention, the data acquisition module is specifically used for: passing through what is embeddedTPM carries out integrity measurement to the capture program code page, generates PCR value and metrics logs, and integrity measurement guarantees dataAcquisition process operates in credible performing environment (Trusted Execution Environment, TEE), PCR value and measurement dayWill can be used for the credible operation of subsequent module verifying acquisition process;Any selection is concentrated from the challenge of registration by internet of things equipmentOne challenge, and responded by executing BIST, challenge-response is uploaded to data, to obtain the hardware fingerprint;Data deblocking and data encapsulation are executed by the TPM, so that data are mutually bound with credible platform module, while being tied up by PCRDue to a kind of platform status, it is subsequent that the application of the technology will lead to the operation for distorting, making up privately owned cloud platform storing data willThe failure of data credibility verifying;According to preset data Structure Calculation each period corresponding data voucher, include by inputSensor measurement data, timestamp, integrity measurement log, integrity measurement value, PUF challenge-response are to, previous time periodData voucher value exports the data voucher value for this period.
Further, in one embodiment of the invention, the data uploading module is specifically used for: by the TPMTo upload data to block chain private clound scripting program code page carry out integrity measurement, generate corresponding metrics logs andPCR value;Input the data voucher, timestamp, the measurement day that integrity measurement generation is carried out to upload program of any one periodWill and metric, and the data block voucher that the output valve obtained after link and hash operation is any time period is executed, andIn the TEE set up, script is uploaded by public key address on chain and sends the transaction comprising data block voucher, so that transaction is beatenIt is permanently recorded on alliance's chain of this system after wrapping chain.
Further, in one embodiment of the invention, the data credibility authentication module is specifically to be used for: passing throughThe type of internet of things equipment data needed for DCC is announced;The corresponding number of initial data is obtained according to the data requirements that the DCC is announcedIt is sent to DCC together according to the block number where block voucher, and by the block number and the initial data;The TTP'sThe number of effective block is obtained under assistance and calculates the data block credential verification value of effective block, and is uploaded to block platform chainCorresponding interface.
Further, in one embodiment of the invention, the data reward payment module is further used for the areaIntelligent contract on block chain obtains effective block according to the data block credential verification value of the DCC effective block inputted and compilesNumber, the data block evidence record value of effective block is simultaneously compared with validation value on the automatic traceability chain of contract, and according to verifyingSuccessful data block voucher number, the intelligence contract are not relied on by third party, automatically to the user payment numberAccording to reward.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following descriptionObviously, or practice through the invention is recognized.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to endSame or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attachedThe embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Before introducing based on the big data of block chain and credible calculating platform acquisition transaction system, first simply introduceThe Fundamentals of Mathematics of the embodiment of the present invention.
(1) bilinear mapIf p is a Big prime,WithIt is the cyclic group of two p ranks, gIt isA generation member,It is a bilinear map.If e meets with properties, we claimWithIt is Bilinear Groups:
1. bilinear characteristics: forThere is e (ua,ub)=e (u, v)ab=e (ub,va);
2. non-degeneracy:At least there is an element g in group, so that the e (g, g) after calculating isSome generation of groupMember, i.e. e (g, g) ≠ 1;
3. computability: there are effective algorithms, so that allThe value of e (u, v) can effectively be calculated.
(2) q-SDH assumes (q-Strong Diffie-HellmanAssumption, q-SDH):
It is the cyclic group that rank is prime number p.Q-SDH assumesMiddle establishment refers to more to all probabilityItem formula time algorithm A, probability:
It is insignificant.Whereinψ is from groupIt arrivesIsomorphism.ψ(g2)=g1。
(3) signatures of Knowledge: the embodiment of the present invention has used this work of signatures of Knowledge when constructing Direct Anonymous proof schemeTool.It allows a side to prove that he knows a secret value in the case where not revealing any useful information.This tool is substantiallyIt is that the zero-knowledge proof of knowledge or minimum leakage prove.Such as:
Indicate " about integer α, the zero-knowledge proof of β, δ, and y=gαhβ,It sets up, simultaneously (u≤α≤V) ", y, g, h therein,It is groupAnd groupIn element.Meanwhile it can useThe heuristic signatures of Knowledge converted zero-knowledge proof to message m of Fiat-Shamir, can such as be denoted as SPK { (α): y=gα}(m)。
(4) impact resistant hash algorithm:
Impact resistant hash function used in the embodiment of the present invention has two fundamental characteristics: one-way and anti-collision;One-way, which refers to input from hash function, derives output, and cannot export from hash function and calculate input;Impact resistantProperty refers to that cannot find two different inputs simultaneously keeps its hash result identical.Hash algorithm in the present invention inputsIn plain text, it exports to be mapped to domainIn element.
The big number based on block chain and credible calculating platform proposed according to embodiments of the present invention is described with reference to the accompanying drawingsAccording to acquisition transaction system.
Fig. 1 is one embodiment of the invention based on the big data of block chain and credible calculating platform acquisition transaction systemStructural schematic diagram.
As shown in Figure 1, should include: user's chain based on the big data of block chain and credible calculating platform acquisition transaction system 10Upper address verifying module 100, data acquisition module 200, data uploading module 300, data credibility authentication module 400 and dataRecompense payment module 500.
Wherein, on user's chain address verifying module 100 for data Collection Co., Ltd DCC, trusted third party TTP and user itBetween communication interaction to complete Direct Anonymous identification protocol, and will add with public key address on the block chain of credible privately owned cloud platform bindingEnter DCC trade user white list.Data acquisition module 200 executes acquisition journey while being acquired operation for privately owned cloud platformThe integrity measurement of sequence code page obtains by Internet of things node and uploads hardware fingerprint to obtain the first platform status, andData voucher is safely generated with encapsulation function using the data deblocking of the credible privately owned cloud platform, is tested with obtaining subsequent moduleDemonstrate,prove the foundation of data credibility.Data uploading module 300 is used to execute the integrity measurement of upload program code page to obtain theTwo platform status, and with the data voucher of any time period link packing after generate data block voucher, and by with credible privateThe block chain public key address for having cloud platform to bind is uploaded to System Committee's chain in the form traded.Data credibility authentication module400 for receiving the corresponding block number of user feedback and corresponding initial data after the data type that DCC announces expectation purchaseSet, and DCC obtains under the assistance of TTP by legitimate device the corresponding effective block of the acquired data under trusted statusNumber, and the data block credential verification value of effective district block number is calculated, it is uploaded to intelligent contract entrance.Data recompense payment moduleThe 500 data block voucher for the effective block by recording on the automatic traceability chain of intelligent contract tests it with what DCC was submittedCard value is compared, to be disclosed according to the successful number of blocks of comparison and automatically be recompensed to user's payment data.The present invention is realThe system 10 of example is applied by merging extensive personal data isolated island to solve the problems, such as that data source is in short supply, it can be achieved that fair transparentData trade guarantees the privacy that data set provider can also be protected while the credibility of transaction data.
It is understood that system 10 through the embodiment of the present invention, on the one hand, data Collection Co., Ltd can realize to being purchasedThe verifying of data reliability, integrality;On the other hand, data set provider is while keeping anonymity, deserved data rewardLabor can be disclosed pellucidly automated payment.System proposed by the present invention includes following 3 network entities:
(1) data Collection Co., Ltd (Data Collection Company, DCC): it is desirable that buying personal Internet of things equipment noteRecord data simultaneously provide the enterprise institution of credible calculating platform equipment and trade network platform;
(2) user (User): possessing smart machine and authenticates credible calculating platform and has a mind to carry out of data tradePeople;
(3) trusted third party (Trusted Third Party, TTP): user's smart machine CRPs registration office, DAA associationIn view the issuer (Issuer) of anonymous credential and the operating status that credible calculating platform is submitted can be carried out assessment and safetyThe mechanism of audit.
Specifically, the present embodiments relate to it is a kind of based on PUF, trust computing, block chain technology credible big dataAcquire address verifying module 100 in transaction system 10, including user's chain, data acquisition module 200, data uploading module 300, numberPayment module 500 is recompensed according to Trusting eBusiness module 400 and data, system flow is as follows: 1, address validation mould on user's chainDirect Anonymous identification protocol is completed in block 100:DCC, TTP, user's Three Party Communication interaction, by the area with credible privately owned cloud platform bindingDCC trade user white list is added in public key address on block chain, while not revealing any and subscriber identity information;2, data acquisition moduleBlock 200: the integrity measurement for executing capture program code page obtains the first platform status, and Internet of things node is obtained and uploaded laterHardware fingerprint, both of the above are the foundations of subsequent module verify data credibility, later privately owned cloud platform using data deblocking withEncapsulation function is safely completed the generation of data voucher;3, data uploading module 300: the integrality of upload program code page is executedMeasurement generates data block voucher after being packaged with the data links such as data voucher to obtain the second platform status, by with it is legalThe block chain public key address of credible privately owned cloud platform binding is uploaded to System Committee's chain in the form traded, and reaches and permanently recordsPurpose;4, after data credibility authentication module 400:DCC announces the data type that expectation is bought, the corresponding block number of user feedbackWith corresponding original data set, it is corresponding that DCC obtains under the assistance of TTP by legitimate device the acquired data under trusted statusEffective district block number, calculate effective district block number data block credential verification value, be uploaded to intelligent contract entrance;5, data are recompensedPayment module 500: the data block voucher of the effective block recorded on the intelligent automatic traceability chain of contract submits it with DCCValidation value is compared, and discloses, according to successful number of blocks is compared automatically to the reward of user's payment data.
Main thought: use PUF technology to obtain device hardware fingerprint as hardware on personal Internet of things device node and set" pass " of standby admission authentication.The privately owned cloud platform for being embedded in credible platform module passes through the integrality degree of acquisition data code pageAmount, data decapsulation operation guarantee from having authenticated credibility of the Internet of things node equipment to data link privately owned cloud platform.NumberIt is provided with public key on the block chain of certification TPM binding in such a way that Direct Anonymous proves to data Collection Co., Ltd according to supplierLocation, while the anonymity of itself can also be kept, achieve the purpose that secret protection.Finally, under the support of trusted third party, numberIt can verify that the credibility of data set provider data presented according to Collection Co., Ltd, data reward is obtained by the intelligent contract on block chainTo fair and just payment.
Transaction system 10 is acquired to the big data based on block chain and credible calculating platform below in conjunction with specific embodimentIt is further elaborated.
Further, in one embodiment of the invention, address verifying module 100 is further used on user's chain: rawAt anonymous credentials issuer TTP key;Anonymous credentials are issued to user terminal by TTP and zero-knowledge proof;Pass through user terminal meterAnonymity signature is calculated, to realize that DCC verifies user terminal anonymity signature correctness.
It is understood that user uploads data block voucher cre_blockiThe channel of (i=1,2 ..., N) is blockChain, by held with user embed legal TPM privately owned cloud platform binding block chain on public key addressInitiation transaction,Transaction is completed by the mode that miner is packaged cochain permanent storage.It is added that DCC can address white list will be according on trade user chainDAA agreement is completed by user, DCC and TTP Three Party Communication interaction to realize.Wherein TTP takes on issuer, and task is to interior chimericThe privately owned cloud platform of method TPM issues anonymous credentials;Certifier is served as at user terminal, i.e. credible private clound computing platform end, and task isDAA signature is provided to verifier, being signed message is public key address on user's chain;DCC serves as verifier, and task is that verifying provesThe white list that can trade is added to decide whether to be signed address in the correctness of the signature of DAA provided by person.
The implementation of the module 100 is specifically divided into 4 steps and executes in order, successively are as follows:
Step 1:KeyGen: anonymous credentials issuer TTP key is generated;
Step 2:DAA-Join:TTP issues anonymous credentials to user terminal by zero-knowledge proof;
Step 3:DAA-Sign: user terminal calculates anonymity signature;
Step 4:DAA-Verify:DCC verifies user terminal anonymity signature correctness.
Specifically, step 1:KeyGen:TTP is selectedGroup'sOrder is p, length k, and there are bilinear maps:ψ(g2)=g1, selectionIt calculatesThe key pair of TTP are as follows: (pk, sk)=((p, g1,g2,g3,Y,g,h),r)。
Step 2:DAA-Join:
(1) the embedded TPM of private clound selects secret informationRandom numberSignature identifiersSSID (Solely Signature Identifier) calculates η=H1(SSID), it calculates Pedersen and promises to undertake C=gfht, sendTo TTP, then private clound credible platform module proof possesses secret knowledge f, t': random selectionIt calculatesIt is sent to TTP;TTP random selectionIt is sent to privately owned cloud platform;TPM calculates sf=rf+cf,st'=rt'+ ct' sends sfAnd st'To TTP;TTP verifying
(2) TTP is selectedCalculate A=(g1Cht′)1/(y+x), A, x and t " are sent to privately ownedCloud.
(3) private clound host stores A and x, sends t " to TPM.
(4) TPM calculates t=t'+t ", stores f, t, whether true verifies following equation:
Step 3:DAA-Sign:
(1) private clound host randomly selectsCalculate T1=(Ahw),T2=gwh-x, T1And T2It is to A and xIt promises to undertake, it was demonstrated that following two equatioies are set up:
e(T1,Y)/e(g1,g2)=e (h, Y)we(h,g2)wx+te(g,g2)f/e(T1,g2)x,
T2=gwh-x,T2-xgwxh-xx=1, T3=ηf。
(2) it proves that privately owned cloud platform possesses knowledge f, x, w and t, meets above equation.Calculate instrumental value δ1=wx, δ2=-xx.TPM is randomly selectedIt calculatesIt willIt is sent to private clound host.
Private clound host is chosenIt calculates:
Private clound Framework computing:
ch=H (η | | g | | h | | g1||g2||g3||gT||Y||T1||T2||T3||R1||R2||R3||R4);
Send chTo TPM.
TPM selectionCalculate c=H (H (ch||nt) | | m), the message m being signed herein be with it is legal canBelieve the public key address on the user blocks chain of privately owned cloud platform binding.
Private clound Framework computing sx=rx+c(-x),sw=rw+cw,TPM calculates sf=rf+cf,st=rt+c(-t)。
Private clound host output signature
Step 4:DAA-Verify:
(1) signature of public key address m on user blocks chain is givenAnd public affairsKey (p, g1,g2,gT, Y, g, h), DCC is calculated:
(2) whether true DCC verifies following equalities:
Setting up then can trade user public key address white list by m addition.
Further, in one embodiment of the invention, data acquisition module 200 is specifically used for: passing through embedded TPMIntegrity measurement is carried out to capture program code page, generates PCR value and metrics logs;By internet of things equipment from the challenge of registrationOne challenge of any selection is concentrated, and is responded by executing BIST, challenge-response is uploaded to data, to obtainHardware fingerprint;Data deblocking and data encapsulation are executed by TPM, so that data voucher and credible platform that the previous period is storedModule is mutually bound, while being bound to a kind of platform status by PCR value;It is corresponding according to preset data Structure Calculation each periodData voucher is chosen by input comprising sensor measurement data, timestamp, integrity measurement log, integrity measurement value, PUFWar-response exports the data voucher value of this period to the data voucher value of, previous time period.
It is understood that particular content is such as shown in Fig. 2, data acquisition module 200 divides carries out for 4 sequence of stepsUnder.
Step 1: capture program code page integrity measurement: when privately owned cloud platform acquisition data, embedded TPM can be to acquisitionCode page where program carries out integrity measurement, and generation is stored in platform configuration register (Platform ConfigurationRegister, PCR) internal PCR value and metrics logs.Integrity measurement guarantees that data acquisition process operates in credible execution ringIn border, PCR value and metrics logs can be used for the subsequent module verifying whether credible operation of acquisition process.
Step 2: internet of things equipment hardware fingerprint obtains: the internet of things equipment of user just registers it at TTP before factoryCRPs, every time when privately owned cloud platform acquisition internet of things equipment data, internet of things equipment concentrates selection one to choose from the challenge of registrationWar is responded by executing BIST, and challenge-response is uploaded to private clound to data, shows to upload data with thisEquipment is that have the equipment of corresponding hardware identity.
Step 3: data deblocking and encapsulation: after internet of things equipment data are uploaded to privately owned cloud platform, TPM executes data deblockingSecurely generating for data voucher is ensured with data encapsulation operation, and data encapsulation not only mutually ties up data with a credible platform moduleIt is fixed, it is bound to a kind of platform status simultaneously also by PCR, ensure that the credible of system running environment and data.The technology is answeredWith making the operation for distorting, making up privately owned cloud platform storing data lead to the failure of follow-up data Trusting eBusiness, to preventThe forgeries of internet of things equipment data.
Step 4: data voucher generates: calculating corresponding data voucher cre_ of each period according to the data structure of attached drawing 3datai(i=1,2 ..., N).Input includes sensor measurement data, timestamp, integrity measurement log, integrity measurementTo the data voucher value of, previous time period, algorithm is the form of nested hash, is exported as this period for value, PUF challenge-responseData voucher value.
Specifically, step 1: capture program code page integrity measurement: this step can be obtained credible privately owned cloud platform and holdThe safe condition that key code is run when row data acquisition operations guarantees subsequently through the data of Trusting eBusiness to be all credibleIt is collected in performing environment.
Integrity measurement is one of function of TPM, actually calculates it to by measure object using cryptographic Hash algorithmThe process of Hash Value.The input of hash operation is the code page acquired where data program in the present invention, and the Hash Value of output isThe integrity measurement value of the code page, TPM charge to metric in specified PCR, and the method charged to is: new PCR value=hashCryptographic algorithm (former PCR value | | metric).When executing integrity measurement operation platform should be recorded in metrics process information by platformIn event log, content includes: measurement person's information, by measurement person's information, former PCR value, metric, new PCR value, deadline.Before each private clound executes data acquisition operations, embedded TPM will execute an aforesaid operations, generate key procedure code pagePCR value and metrics logs, one of the input as data packaging operation.
Step 2: internet of things equipment hardware fingerprint obtains: the present invention is realized using the PUF (such as SRAM PUF) based on storageThe certificate scheme of internet of things equipment hardware identity.By causing SRAM internal symmetry using the variation during the manufacturingThe mismatch of cell parameters, after power-up, the bistable unit of SRAM node enter a unstable state, and unstableConstantly concussion returns to 0 or 1 stable state in state, is responded accordingly.Before internet of things equipment transmits data to private clound every time,A pair is chosen from the CRPs registered from TTP, internally self testing circuit input stimulus C, obtains the response R of PUF.It is each hardPart equipment all relies on the embedded PUF of the equipment and generates unique Identity Code progress authentication, Identity Code (PUFChallenge-response to) with data be uploaded to private clound, be follow-up data Trusting eBusiness preparatory condition.
Step 3: data deblocking and encapsulation: private clound is in the authentication information and sensor for receiving internet of things equipment transmissionAfter recording data, it is carried out to compression packing processing with the data collected before.To guarantee the data compression value generated beforeSafety, the present invention using data encapsulate and solve encapsulation technique.Data encapsulation and unsealing operation are by critical data and specificPlatform status (PCR value) and credible platform module are bound together, so that data are not only bound to a credible platform module, togetherWhen a kind of platform status is bound to by PCR.
For example, i-th of sub-period within the 1st period, generates HiIt will be first to the H that (i-1) period generatesi-1It carries outDeblocking, the specific step of unsealing operation are as follows:
(1) H that (i-1) a sub-period encapsulation generates is read from specified PCRi-1:
Hi-1||PCR_valuei-1| | TPM_Proof=Decrypt (key, sealedDatai-1);
(2) whether identical as the PCR_value decrypted TPM compares PCR value at that time;
(3) whether identical as the numerical value of storage inside TPM compares the TPM_Proof decrypted;
(4) if comparison is identical, H is exportedi-1。
Wherein, TPM_Proof is TPM unique identification.With Hi-1With remaining related data as inputting, executes data and beatPackage operation generates the data voucher H of i-th of periodi, and to HiData encapsulation operation is executed, to guarantee i to (i+1) in the periodThe secure storage of data voucher, that is, perform the following operations:
sealedDatai=Encrypt (key, (Hi||PCR_valuei||TPM_Proof))。
Step 4: data voucher generates: calculating corresponding data voucher cre_ of each period according to the data structure of attached drawing 3datai(i=1,2 ..., N).Setting has n sub-period in each period.The H generated with i-th of sub-period of the 1st periodiFor:
Hi=h (mi||ti||PCR_logi||PCR_valuei||Ci||Ri||Hi-1) (i=1,2 ..., n),
I.e. by tiWhen moment is uploaded to the internet of things equipment data of privately owned cloud platform, real-time time stamp, capture program operationIntegrity measurement log and PCR value, the input stimulus of internet of things equipment PUF and output response and (i-1) a sub-period it is rawAt Hi-1Link, and carry out hash operation.Hi-1(wherein i=2,3 ..., n) must can just read after data unsealing operation, thisSample guarantees that the data voucher before i-th of sub-period is not tampered with.After n sub-period, the data voucher H of first period is generatedn(namely cre_data1)。
Further, in one embodiment of the invention, data uploading module 300 is specifically used for: by TPM to dataThe scripting program code page for being uploaded to block chain carries out integrity measurement, generates corresponding metrics logs and PCR value;Input is anyThe data voucher of one period timestamp, carries out the metrics logs and metric of integrity measurement generation to upload program, and holdsThe output valve obtained after row link and hash operation is the data block voucher of any one period, and in the TEE set up, onIt passes script and the transaction comprising data block voucher is sent by public key address on chain, so that transaction is for good and all remembered after being packaged cochainRecord is on alliance's chain of this system.
It is understood that as shown in Fig. 2, data uploading module 300, specifically includes:
Step 1: upload program code page integrity measurement: the TPM of private clound platform built-in is uploaded to block chain to dataScripting program code page carry out integrity measurement, generate corresponding metrics logs and PCR value, for it is subsequent can to upload procedureThe verifying of letter property.
Step 2: the generation and upload of data block voucher: data block voucher be finally be recorded on block chain withCard.Input the data voucher, timestamp, the metrics logs and degree that integrity measurement generation is carried out to upload program of certain time periodMagnitude executes the data block voucher that the output valve obtained after link and hash operation is this period.It is setting up laterIn TEE, uploads script and pass throughChain on public key address send include data block voucher transaction, transaction be packaged cochainIt is permanently recorded on alliance's chain of this system afterwards.
Specifically, step 1: upload program code page integrity measurement: assuming that user terminal upload altogether N number of data block withCard, the scripting program code page that the TPM of private clound platform built-in is uploaded to block chain to data carry out integrity measurement, generate and closeThe metrics logs PCR_log of script is uploaded in datajAnd PCR_valuej(j=1,2 ..., N), follow-up data credibility linkThe credibility of upload procedure can be determined according to both information.
Step 2: the generation and upload of data block voucher: data block voucher be finally be recorded on block chain withCard, data structure are as follows:
cre_blockj=h (tj||PCR_logj||PCR_valuej||cre_dataj) (j=1,2 ..., N),
cre_blockjFor by tjThe timestamp at moment, credible privately owned cloud platform have been executed to scripting program code page is uploadedThe cre_data that metrics logs, PCR value and j-th of the period generated after whole property metric operations generatesj(j=1,2 ..., N) chainIt connects and carries out the value generated after hash operation.Later in the TEE set up, uploads script and pass through public key address on chainSend comprising data block voucher transaction (as shown in figure 4) to trading pit wait miner be packaged.Miner completes proof of workThe block comprising the transaction is generated afterwards and is broadcasted, when there are enough blocks to link after this block, it is believed that dataTransaction certificate is permanently recorded on block chain.
It should be noted that (1) nonce represents block number in attached drawing 4;(2) publication trades, executes tune in ether millIt is required to consume certain expense with operations such as contract functions, with being counted as unit of gas.GasLimit is the permission of single situationMost gas total amounts, gasPrice be setting gas price, generally with GWei (1ETH=1000000000GWei) be unit;(3) Recipient is the collecting account of transaction, which belongs to the message call transaction in the transaction of ether millType, therefore the value is to initiate the user of recorded data zone block certificate transactions itself;(4) Value is transfer amounts, because of the invention instituteTransaction is only for progress data record, therefore being worth is 0;(5) v, r, s are that miner carries out parameter necessary to ECDSA signs;(6) data is data block voucher, and block, which is packaged after cochain, is just recorded permanently storage.
Further, in one embodiment of the invention, data credibility authentication module 400 is specifically to be used for: passing throughThe type of internet of things equipment data needed for DCC is announced;The corresponding data field of initial data is obtained according to the data requirements that DCC is announcedBlock number where block voucher, and block number and initial data are sent to DCC together;The block number retrospect obtained according to feedbackCorresponding transaction and data block voucher, and the number of effective block is obtained under the assistance of TTP, and then calculate effective blockData block credential verification value, and it is uploaded to the corresponding interface of system data reward payment module.
It is understood that as shown in Fig. 2, data credibility authentication module 400 specifically includes:
Step 1:DCC announces data requirements: the type of internet of things equipment data needed for DCC is announced, such as device type, dataMeaning type etc..
Step 2: user feedback block number simultaneously sends initial data: user finds out according to the data requirements that DCC is announced to be metIt is required that the corresponding data block voucher of initial data where block number, and block number and initial data are sent to togetherDCC。
Step 3: the data block credential verification value of effective block generates: the block number retrospect pair that DCC is obtained according to feedbackThe transaction answered and data block voucher, and the number of effective block is obtained under the assistance of TTP, wherein effective block refer to pairThe data block voucher answered is the internet of things equipment upload by there is certification hardware identity, and executes acquisition in TEE, storage, beatsObtained by packet, upload operation.DCC is numbered according to effective block, the uploaded initial data of user is calculated according to side of the present inventionMethod calculates the data block credential verification value of effective block, and in the data of block chain payment platform interface input effective blockBlock credential verification value.
Specifically, step 1:DCC announces data requirements: DCC is by establishing on block chain the provision content of intelligent contractTo announce the data type of expectation purchase.DCC issue intelligent contract public key address be it is disclosed, advertisement, official website can be passed throughThe mode of bulletin tells user, and the publisher public key address of the only intelligent contract of user's comparison is identical with the account address of announcementWhen, user can just execute subsequent such as feedback block number operation.
Step 2: user feedback block number simultaneously sends initial data: user finds out according to the data requirements that DCC is announced to be metIt is required that the corresponding data block voucher of initial data where block number (being assumed to be 1 ..., N), and by block number and originalData are sent to DCC together.Initial data includes:
(1) sensor measurement data: M={ m1,...,mn;...;m(N-1)n,...,mNn};
(2) timestamp: T1={ t1,...,tn;...;t(N-1)n,...,tNnAnd T2={ tA,...,tA+N};
(3) internet of things equipment PUF challenge-response collection:
C={ C1,...,Cn;...;C(N-1)n,...,CNnAnd R={ R1,...,Rn;...;R(N-1)n,...,RNn};
(4) capture program integrity measurement log:
LOG1={ PCR_log1,...,PCR_logn;...;PCR_log(N-1)n,...,PCR_logNn};
(5) capture program integrity measurement value:
PCR1={ PCR_value1,...,PCR_valuen;...;PCR_value(N-1)n,...,PCR_valueNn};
(6) voucher upload program integrity measurement log: LOG2={ PCR_logA,...,PCR_logA+N};
(7) voucher upload program integrity measurement value: PCR2={ PCR_valueA,...,PCR_valueA+N}。
Step 3: the data block credential verification value of effective block generates: DCC is traced according to the block number that user submits1 ..., data block voucher value recorded in block S.DCC is by the C in initial data, R, LOG1,PCR1,LOG2,PCR2HairGive TTP.TTP motivates C according to the PUF that receives, inquires registered corresponding response R value, if the response of registration and receivingThe Hamming distance of both responses is less than threshold epsilon, then the authentication of Internet of things node passes through.Capture program and voucher are uploadedThe integrity measurement value and metrics logs of program, TTP by analyze integrity measurement event log information judge PCR value whether comeFrom correct metrics process, the value of PCR is compared with the completeness of platform a reference value of registration later, if they are the same, is then shownThe privately owned cloud platform for sending data is in trusted status when executing relevant operation.If the above verifying passes through, TTP thinks thisThe corresponding data of block be it is believable, the number of these effective blocks is sent to DCC by TTP.DCC uploads data using user and pressesThe data block credential verification value of effective block is calculated according to the method for the invention, and is disclosed, permanently by intelligent contract-defined interfaceGround is recorded on block chain.
Further, in one embodiment of the invention, data reward payment module 500 is further used for according to blockChain intelligence contract obtains the data block credential verification value of effective block to the interface input value of DCC and effective block is numbered, and closesIt corresponding data block evidence record value and is compared on about automatic traceability chain, and according to the data block voucher being proved to be successfulNumber, intelligent contract are not relied on by third party, automatically to the reward of user's payment data.
It is understood that as shown in Fig. 2, intelligent contract on block chain is according to the data of the DCC effective block inputtedBlock credential verification value obtains effective block number, corresponding data block evidence record value and is compared on the automatic traceability chain of contractIt is right, it is identical, prove that the state of platform when user uploads data is believable and sensing data is not tampered, it is on the contrary then proveData invalid.According to the data block voucher number being proved to be successful, intelligent contract is not relied on, by third party automatically to user's branchPay data reward.
Specifically, the ether mill that data reward payment module 500 is located at credible big data acquisition transaction system is intelligently closedIt about holds, intelligent contract is issued by DCC, leaves user's interface different with the end DCC for respectively, and DCC and user call the operation of contractRealize that the call operation of all pairs of contracts finally can all enter transaction in the form of transaction by the web3 module that ether mill providesPond, the operation for being packaged cochain are disclosed, are permanently recorded on block chain.DCC, which is allowed to input in intelligent contract-defined interface, to be hadThe data block credential verification value of block and the public key address of corresponding user are imitated, contract traces the data of Correlation block record automaticallyBlock voucher pays corresponding data reward, contract payment from trend client public key address according to identical number of blocks is comparedOperation enters generation after trading pit waits packing, miner to complete proof of work with transaction form and goes forward side by side comprising the block of the transactionRow broadcast, when there is enough blocks to link after this block, it is believed that data trade voucher is permanently recorded in blockOn chain, so far payment is completed.
To sum up, the embodiment of the present invention provide a kind of combination PUF technology, reliable computing technology, block chain technology it is credible bigData acquire transaction system, can be used under the premise of guaranteeing data credibility and justice of exchange, extensive Internet of Things individual setsStandby data silo fusion and transaction, and personal identification privacy is protected not to be leaked, advantage and effect are:
1) embodiment of the present invention combines PUF technology, reliable computing technology, block chain technology, and PUF ensures acquired dataFrom the hardware device being certified;Credible platform module guarantees data acquisition, stores, the safety of upload operation;Block chain generatesAnti-tamper data block evidence record account book.This system assures that acquiring, storage, being packaged, the full link of upload is credible.
2) embodiment of the present invention proves to carry out secret protection to public key address on user's chain using Direct Anonymous, and DCC can onlyIt proves that carry out account on the chain of data trade with it embeds the privately owned cloud platform binding of legal TPM with one really, but cannot obtainTo about other any information outside privately owned cloud platform validity, to protect the privacy of user terminal.
3) centrality and automation feature are gone based on the intelligent contract function of block chain support, this system ensure that number rewardFair, transparent, automatic payment, solve the big worry of user.
What is proposed according to embodiments of the present invention acquires transaction system based on the big data of block chain and credible calculating platform, leads toCross the acquisition to data, storage, packing, upload operation implement comprehensive supervision and protection, the full link for realizing data canLetter, the method for using Direct Anonymous to prove make DCC protect user hidden in the validity of public key address on authenticating user's chainIt is private;Also, the characteristics of based on the intelligence contract decentralization of block chain and automating guarantees the open and clear of data reward payment,Thus the contradiction reconciled between personal privacy protection and big data acquisition to a certain extent, and ensure the credible of data sourceProperty, and there is practicability, simple easily realization.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importanceOr implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed orImplicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, threeIt is a etc., unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically showThe description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or examplePoint is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are notIt must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in officeIt can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this fieldArt personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examplesIt closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is exampleProperty, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentionedEmbodiment is changed, modifies, replacement and variant.