1. 通过认证保护边缘设备
1. Protect the edges by authentication
随着IT技术焦点转移到所谓的具有数据和连接性的“智能”边缘设备,安全性也随之提高。毕竟,网络的扩展可能对于IT效率、生产力和功耗(即对云计算和数据中心资源有利)而言是有利的,但这对CISO、CIO和更广泛的业务来说是一个安全挑战。随后许多公司正在寻求利用区块链来保护物联网和工业物联网(IoT)设备的方法,因为该技术能够加强认证,改善数据归属和流量,并有助于记录管理。
After all, the expansion of the network may be beneficial for IT efficiency, productivity, and power (i.e. for cloud computing and data centre resources), but it is a security challenge for ISO, CIO, and more broadly for business. Many companies are then seeking ways to use block chains to protect IOT equipment, as the technology enhances authentication, improves data attribution and flow, and contributes to records management.
例如,创业公司Xage安全公司在2017年下半年推出,声称其“防篡改”区块链技术平台通过设备网络大规模分发私人数据和身份验证。此外,该公司表示支持任何沟通,可以在不规则连接的边缘工作,并确保各种不同的工业系统。
For example, Xage Security, an start-up company, was launched in the second half of 2017, claiming that its block chain technology platform for “safeguarding” the distribution of private data and identification on a large scale through the network of equipment. In addition, the company expressed support for any communication that could work on the edges of irregular connectivity and ensure a variety of industrial systems.
该公司表示,已经与ABB无线公司合作开展需要分布式安全的电力和自动化项目,以及与戴尔合作为戴尔IoT网关及其EdgeX平台上的能源行业提供安全服务。
The company stated that it had worked with ABB Wireless on electricity and automation projects requiring distributed security and with Dale to provide security services for the energy industry at the Del IoT gateway and its EdgeX platform.
同时,作为另一个现实世界的例子,英国马恩岛政府采取了不同的路线。它正在测试区块链技术,看它是否可以防止物联网设备的妥协(将唯一身份签名到物理项目以确认真实性)。
At the same time, as another example of the real world, the Isle of Man government has taken a different route. It is testing block chain technology to see whether it can prevent the compromise of material networking devices (signing the only identity to a physical project to confirm authenticity).
这些改进也正在嵌入芯片组层面。Startup Filament最近宣布推出一款旨在使工业物联网设备能够使用多种区块链技术的新型芯片。Blocklet芯片背后的理念是让物联网传感器数据直接编码到区块链中,目标是“ 为分散交互和交换提供安全的基础 ”。
Startup Firement recently announced the introduction of a new chip designed to enable industrial network equipment to use multiple block chain technologies. The idea behind the Blocklet chip is that the data from the Internet sensor should be coded directly into the block chain, with the objective of “a secure basis for decentralized interaction and exchange”.
2. 改进机密性和数据完整性
2. Improving confidentiality and data integrity
虽然区块链最初是在没有特定访问控制(由于其公开发行)的情况下创建的,但现在一些区块链实现解决了数据机密性和访问控制难题。在数据容易被操纵或欺骗的时代,这显然是一个严峻的挑战,但区块链数据的完全加密可以确保这些数据在运输过程中不会被未授权的用户访问(很少或根本没有机会成功的人工进入中间[MiTM]攻击)。
Although the block chain was originally created without specific access control (due to its public release), some block chains now address data confidentiality and access control challenges. This is clearly a serious challenge in times when data are susceptible to manipulation or deception, but full encryption of block chain data ensures that they are not accessed by unauthorized users during transport (with little or no chance of successful manual [MiTM] attacks).
这种数据完整性可扩展到IoT和IIoT设备。例如,IBM为Watson IoT平台提供了一个选项,用于管理整合到蓝色巨人云服务中的私有区块链分类账中的物联网数据。爱立信的区块链数据完整性服务为在GE的Predix PaaS平台中工作的应用程序开发人员提供完全可审计,合规和值得信赖的数据。
This data integrity can be extended to IOT and IIOT devices. For example, IBM provides the Watson IOT platform with an option to manage the network data in the private block chain ledger integrated into the Blue Giant Cloud service.
3. 保护私人消息
3. Protecting private news
像Obsidian这样的创业公司正在使用区块链来保护在聊天,短信应用和社交媒体中交换的私人信息。与WhatsApp和iMessage采用的端到端加密不同,Obsidian的Messenger使用区块链来保护用户的元数据。用户不必使用电子邮件或任何其他身份验证方法来使用信使。元数据随机分布在整个分类账中,因此不能用于收集在一个单一的点,从而可能会受到损害。
Entrepreneur companies like Obsidian are using block chains to protect private information exchanged in chatting, text message applications and social media. Unlike end-to-end encryption used by WhatsApp and iMessage, the Webside Messenge uses block chains to protect users'metadata. Users do not need to use couriers by e-mail or any other authentication method.
另外据报道,美国国防部高级研究计划局(DARPA)的工程师正在尝试使用区块链来创建一个安全且无法通过外部攻击的消息服务。随着区块链植逐步应用于安全认证的通信,预计这个领域在不久的将来成熟。
It has also been reported that engineers from the United States Department of Defense's Advanced Research and Planning Agency (DRPA) are attempting to use block chains to create information services that are safe and incapable of external attack. This area is expected to mature in the near future as block chains are gradually applied to securely authenticated communications.
注册有任何问题请添加 微信:MVIP619 拉你进入群
打开微信扫一扫
添加客服
进入交流群
发表评论