Abstract

Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.

Highlights

  • Literature [4] proposes a method for protecting personal privacy data based on honeypot encryption algorithm and applies the honeypot encryption algorithm to personal electronic wallets to solve the problem of weak passwords for protecting users’ bank card account numbers and passwords

  • Introduce the basic idea of the honeypot encryption algorithm, and design a fine-grained message space for the application to provide credible lure messages. e machine learning method is introduced for the first time to discuss the security of the honeypot encryption algorithm

  • In order to improve the inheritance and protection ability of ethnic sports, an association data mining model of ethnic sports inheritance and protection based on association rule feature extraction was proposed

Read more

Summary

Internet Node Secure Transmission Protocol Based on Trusted Computing

(1) Starting from the root of trustworthiness measurement, calculate the integrity measurement value of the system platform, establish the trust chain of the computer system platform, ensure the trustworthiness of the system platform, and resist malicious code attacks such as viruses [10]. (2) When the trusted identity of the sensor node is authenticated, the subenergy router generates and sends a random value nonce to the sensor node [14]. (4) At the same time, the sensor node uses the identity private key to encrypt the data, the random value nonce, PCR is calculated to obtain the signature Quote, and Quote, Updata is sent to the upper-level node. When node 101 gets s(n101) verification, add its own n101 to compare the hash value generated by the Merkle tree with the received h(n) If they are consistent, it indicates the validity of the source of the instruction. Discard the data packet [17]

Blockchain-Based Privacy Data Protection
Simulation Experiment Analysis
E1 interfaces Voice card main program Network card
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call