针对目前电力系统存在数据处理延迟高和计算开销大等问题,提出了一种基于区块链的电厂核心大数据匿名化网络模型。首先,通过融合雾计算和区块链设计了一个数据聚合框架,从而实现高效、安全的数据聚合过程。其次,基于加密、批量聚合签名和匿名身份验证算法提出了一种安全、匿名的数据聚合机制,从而大大减少计算开销。实验结果表明,所提方案在提高系统安全性能方面呈现出显著优势,当攻击者需要操纵的总数超过500时,所提方案的成功攻击概率接近0。此外,随着智能电表数量的增加,与差分隐私和压缩感知数据聚合方法相比,所提方法计算成本较低。仿真结果进一步验证了所提方案能够提高系统的安全性和鲁棒性。
Abstract
Aiming at the problems of high data processing delay and high computing overhead in the current power system,a block chain based on anonymous network model of power plant core big data is proposed.Firstly,a data aggregation framework is designed by integrating fog computing and blockchain,so as to realize an efficient and secure data aggregation process.Secondly,based on encryption,batch aggregation signature and anonymous authentication algorithm,a secure and anonymous data aggregation mechanism is proposed,which greatly reduces the computational overhead.The experiment results show that the proposed scheme has significant advantages in improving the security performance of the system.When the total number of attackers to manipulate exceeds 500,the probability of successful attack of the proposed scheme is close to 0.In addition,with the increase of the number of smart meters,the computational cost of the proposed method is lower than that of compressed sensing data aggregation method.The simulation results further verify that the proposed scheme can improve the security and robustness of the system.
关键词
电力系统 /
数据聚合 /
雾计算 /
区块链 /
加密算法
Key words
power system /
data aggregation /
fog calculation /
block chain /
encryption algorithm
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
参考文献
[1] 陈贤哲.智能技术在电力系统自动化中的应用研究[J].现代制造技术与装备,2022,58(1):194-196.
[2] 王玲玲,刘恋,张锞,等.电力系统灵活调节服务与市场机制研究综述[J].电网技术,2022,46(2):442-452.
[3] 毛龙灿,杨南.基于大数据背景的皮革人才培养优化研究[J].中国皮革,2021,50(9):38-41.
[4] 杨涛.互联网时代下皮革行业电商物流体系研究分析[J].中国皮革,2021,50(8):82-85.
[5] 方嘉祥.智能电网信息安全及新技术研究综述[J].科技与创新,2022(4):21-25.
[6] 矫真,王兆军,郭红霞,等.基于同态加密的智能电表数据聚合方案[J].信息技术,2020,44(5):32-36.
[7] 李雅斌,杨鹏飞.智能电网容错数据聚合方案[J].计算机系统应用,2022,31(4):137-142.
[8] 李坤昌,石润华,李恩.智能电网中数据聚合与用户查询隐私保护研究[J].信息网络安全,2021,21(11):65-74.
[9] 乐艺.一种基于进化博弈理论的虚拟机部署算法[J].计算机应用与软件,2021,38(7):106-112.