Open Access
ARTICLE
Blockchain-Based Data Storage Mechanism for Industrial Internet of Things
1 School of Information Science and Engineering, Fujian University of Technology, Fuzhou, 350118, China
2 School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, 410004, China
3 School of Civil Engineering, Changsha University of Science & Technology, Changsha, 410000, China
4 School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, 210044, China
5 Department of Biomedical Engineering, University of Reading, Earley, RG66AY, UK
* Corresponding Author: Yongjun Ren. Email:
Intelligent Automation & Soft Computing 2020, 26(5), 1157-1172. https://doi.org/10.32604/iasc.2020.012174
Abstract
With the development of the Industrial Internet of Things and the continuous expansion of application scenarios, many development bottlenecks have followed. Its data security issue has become an obstacle to its widespread application. It has attracted substantial attention from both academia and industry. Blockchain technology has the characteristics of decentralization, openness and transparency and non-tampering. It has natural advantages in solving the security of the Industrial Internet of Things. Accordingly, this paper first analyzes the security risks associated with data storage in the Industrial Internet of Things and proposes the use of blockchain technology to ensure the secure storage of data in the Industrial Internet of Things. In traditional blockchains, the data layer uses Merkle hash trees to store data; however, the Merkle hash tree not able to provide non-member proof, which makes it unable to resist attacks from malicious nodes in the network. To solve this problem, this paper replaces the Merkle hash tree with a password accumulator to provide member proof and non-member proof. Moreover, the existing accumulators have trapdoors and cannot be updated in batches, and unable to meet the blockchain’s expansion requirements. This paper presents an improved RSA accumulator and gives the definition of the accumulator. Finally, this paper uses RSA to construct a batch update accumulator scheme without trapdoor, and shows that the scheme is feasible through correctness and securityKeywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.