Proceedings of the 2nd International Conference on Engineering Management and Information Science, EMIS 2023, February 24-26, 2023, Chengdu, China

Research Article

Research on Data Protection Scheme for Road Maintenance System Based on Hybrid Encryption

Download166 downloads
  • @INPROCEEDINGS{10.4108/eai.24-2-2023.2330677,
        author={Jiawang  Cui and Junwei  Xiao and Qingfang  Wang},
        title={Research on Data Protection Scheme for Road Maintenance System Based on Hybrid Encryption},
        proceedings={Proceedings of the 2nd International Conference on Engineering Management and Information Science, EMIS 2023, February 24-26, 2023, Chengdu, China},
        publisher={EAI},
        proceedings_a={EMIS},
        year={2023},
        month={6},
        keywords={block chain technology security privacy data sharing and encryption},
        doi={10.4108/eai.24-2-2023.2330677}
    }
    
  • Jiawang Cui
    Junwei Xiao
    Qingfang Wang
    Year: 2023
    Research on Data Protection Scheme for Road Maintenance System Based on Hybrid Encryption
    EMIS
    EAI
    DOI: 10.4108/eai.24-2-2023.2330677
Jiawang Cui1,*, Junwei Xiao1, Qingfang Wang1
  • 1: Wuhan Polytechnic University
*Contact email: 2995945180@qq.com

Abstract

Blockchain technology is now being used in a wide range of industries, the most recent of which being the financial sector. These industries include healthcare, city planning, and supply chain management. This article proposes a security and privacy solution that makes use of blockchain technology in order to reduce the likelihood that private data may be used in an unauthorized manner. The proposed design for the road maintenance system encrypts sensitive information using AES symmetric encryption and RSA digital signatures, and then utilizes blockchain technology to make the whole process more reliable and secure. When people share information with one another, the aim of this piece is to allay the concerns of data collectors and consumers with respect to the danger of data manipulation. In order for the adversary to see the data in its original form, they will need to decipher the ciphertext. The RSA method is effective in scenarios such as these, as well as for sending keys across insecure networks.