IoT Privacy Protection Scheme Based on Hyperledger Fabric
Abstract
The increasing use of Internet of Things devices has exacerbated the contradiction between data sharing and privacy protection, while existing blockchain based solutions still have significant limitations in scalability, computational efficiency, and access control. Therefore, this study proposes a Hyperledger Fabric privacy protection framework for the Internet of Things, and constructs a smart contract system that includes device management, policy management, and access control. By combining advanced encryption standard algorithms, interstellar file system storage, and Shamir secret sharing mechanism, secure storage and flexible sharing of data have been achieved. The experiment showed that the throughput of the research scheme was stable between 370 TPS and 420 TPS on both the training and testing sets, with an average delay controlled between 50 ms-72 ms, which was significantly better than other comparative schemes. The utilization rate of the central processing unit in terms of resource overhead was maintained at around 50%, with a minimum memory consumption of 505 MB. In addition, in terms of decryption performance, the decryption success rate of this scheme under various attacks was between 98% and 99%, with an average decryption cost of the lowest 45 ms. The research scheme balances performance and efficiency while ensuring privacy and security, demonstrating its application advantages in Internet of Things privacy protection scenarios.DOI:
https://doi.org/10.31449/inf.v50i12.13423Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







