Yiru Niu, Hong Jiang, Xiaobing Huang, Qi Zhao, H. Xiang, Xiaofeng Xia, Yue Zhao
{"title":"智能园区用户移动日志的防篡改存储","authors":"Yiru Niu, Hong Jiang, Xiaobing Huang, Qi Zhao, H. Xiang, Xiaofeng Xia, Yue Zhao","doi":"10.1109/CCISP55629.2022.9974528","DOIUrl":null,"url":null,"abstract":"With the introduction of the smart city concept and the rapid development of various emerging technologies such as cloud computing, Internet of Things, big data and artificial intelligence, traditional parks have also ushered in new opportunities and are developing in a smarter direction. Since the park is an open area with frequent movement of people and equipment, it is prone to security problems. At this point, logs will be a good aid for incident accountability. In this paper, we mainly use Merkle hash tree and distributed storage for secure storage of logs. Meanwhile, to ensure the non-repudiation of logs, the signatures of users and log-generating devices are required when generating logs. After analysis, the scheme proposed in this paper can achieve tamper-proof and traceability of logs.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tamper-Proof Storage of User Movement Logs in Smart Parks\",\"authors\":\"Yiru Niu, Hong Jiang, Xiaobing Huang, Qi Zhao, H. Xiang, Xiaofeng Xia, Yue Zhao\",\"doi\":\"10.1109/CCISP55629.2022.9974528\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the introduction of the smart city concept and the rapid development of various emerging technologies such as cloud computing, Internet of Things, big data and artificial intelligence, traditional parks have also ushered in new opportunities and are developing in a smarter direction. Since the park is an open area with frequent movement of people and equipment, it is prone to security problems. At this point, logs will be a good aid for incident accountability. In this paper, we mainly use Merkle hash tree and distributed storage for secure storage of logs. Meanwhile, to ensure the non-repudiation of logs, the signatures of users and log-generating devices are required when generating logs. After analysis, the scheme proposed in this paper can achieve tamper-proof and traceability of logs.\",\"PeriodicalId\":431851,\"journal\":{\"name\":\"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCISP55629.2022.9974528\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCISP55629.2022.9974528","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tamper-Proof Storage of User Movement Logs in Smart Parks
With the introduction of the smart city concept and the rapid development of various emerging technologies such as cloud computing, Internet of Things, big data and artificial intelligence, traditional parks have also ushered in new opportunities and are developing in a smarter direction. Since the park is an open area with frequent movement of people and equipment, it is prone to security problems. At this point, logs will be a good aid for incident accountability. In this paper, we mainly use Merkle hash tree and distributed storage for secure storage of logs. Meanwhile, to ensure the non-repudiation of logs, the signatures of users and log-generating devices are required when generating logs. After analysis, the scheme proposed in this paper can achieve tamper-proof and traceability of logs.