Data protection method for charging pile based on blockchain technology

Author(s):  
Guangcun Wei ◽  
Lan Gao ◽  
Qing Li
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Linkai Zhu ◽  
Sheng Peng ◽  
Zhiming Cai ◽  
Wenjian Liu ◽  
Chunjiang He ◽  
...  

Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.


2019 ◽  
pp. 1-24 ◽  
Author(s):  
Philipp Hacker ◽  
Ioannis Lianos ◽  
Georgios Dimitropoulos ◽  
Stefan Eich

This introductory chapter provides an overview of the main legal and policy implications of blockchain technology. It proceeds in four steps. First, the chapter traces the technical and legal evolution of blockchain applications since the early days of Bitcoin, highlighting in particular the political ambitions and tensions that have marked many of these projects from the start. Second, it shows how blockchain applications have created new calculative spaces of financial markets that seek to challenge existing forms of money. Third, it discusses the core points of friction with incumbent legal systems, with a particular focus on the regulability of decentralized systems in general and data protection concerns in particular. Fourth, the chapter provides an outline to the contributions to the volume, which span a wide array of topics at the intersection of blockchain, law, and politics.


Author(s):  
Han Qiu ◽  
Gerard Memmi

The authors are interested in image protection within resource environments offered by commodity computers such as desktops, laptops, tablets, or even smartphones. Additionally, the authors have in mind use cases where a large amount images are to be protected. Traditional encryption is not fast enough for such environments and such use cases. The authors derived a new solution by parallelizing selective encryption and using available GPU (Graphic Process Unit) acceleration. Progress obtained in terms of performance allows considering selective encryption as a general purpose solution for the use cases considered. After presenting related works, a ‘first level' of protection is described and a new ‘strong level' of protection method is introduced. Different architecture designs and implementation choices are extensively discussed, considering various criteria: performance indeed, but also image reconstruction quality and quality of data protection.


Author(s):  
D E Gorokhov ◽  
V V Ryabokon ◽  
A A Kuzkin ◽  
V S Sherbakov ◽  
M A Kutsakin

Author(s):  
B. Jothikumar ◽  
Nirmala Baby

Any business can use blockchain technology to facilitate, authorize and record the exchange of value such as a service, merchandise, currency or information. The features of blockchain portrays that Governments, corporations, banks and pretty much any business can use (and are using) blockchain for financial transactions and record keeping. Blockchain can affect digital marketing in numerous methods. The key benefits of blockchain for businesses are Data Protection, Al Data Verification and Immutability, Elimination of the Need for Middlemen in Marketing, Promoting Ad Specificity, Improving the Quality of Digital Influencers and Acting as a Good PR Strategy for Your Brand. The impact of blockchain technology in digital marketing is making new revolution to the relationship between consumers and businesses.


Sign in / Sign up

Export Citation Format

Share Document