Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies

A technology for secure data and security parameters, applied in transmission systems, digital data protection, data processing applications, etc., can solve problems such as not supporting flexibility, autonomy, theoretical methods not suitable for practical application environments, complex computing and communication overhead, etc.

Active Publication Date: 2015-05-20
ZHEJIANG GONGSHANG UNIVERSITY
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So the MAC/HMAC method still has very complex computation and communication overhead
Therefore, in the smart grid with sensitive delay and limited communication resources at the user end, it is urgent to design and implement a secure (privacy protection, authentication, data integrity) and efficient communication protocol and application system, and fully consider the smart meter and other equipment Th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies
  • Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies
  • Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] The present invention will be further described below in conjunction with accompanying drawing.

[0094] Such as figure 2 As shown, the security data reporting method and the overall system architecture based on hash tree and anonymous technology of the present invention include the following four participants:

[0095] (1) Trusted Authority (TA for short):

[0096] TA is a credible authority center with strong computing power and is responsible for managing the entire system.

[0097] (2) Control Center (Control Center, referred to as CC):

[0098] CC has high reliability and is responsible for collecting, processing and analyzing real-time power consumption data of each user, and providing reliable services for the smart grid.

[0099] (3) Gateway (Gateway, referred to as GW):

[0100] The GW has a strong computing capability and is used to connect the TA and the RA. The main functions of GW include two aspects:

[0101] First, the data collection function is r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security data reporting system on the basis of Hash trees and anonymity technologies. The security data reporting system comprises four parties and seven modules. The four parties include a trusted authority (TA), a control center (CC), a gateway (GW) and a residential area (RA), and the gateway (GW) is connected with the trusted authority (TA) and the residential area (RA); the seven modules include a system initialization module, a session key agreement module, an autonomous aggregation forming module, an offline pre-computation module, an online power consumption data reporting module, a security data collecting module and a security data reading module. The security data reporting system has the advantages that the light-weight security data reporting system can be applied to intelligent power grids, accordingly, the privacy can be protected, and the integrity of communication data can be guaranteed.

Description

technical field [0001] The invention is applied to the field of smart grids, and specifically relates to a security data reporting method and system based on a hash tree and anonymous technology. Background technique [0002] The smart grid is regarded as the next generation grid system, because the smart grid is based on the information-physical architecture and integrates the new generation of information and communication technologies, such as figure 1 As shown, the electric energy supplier can monitor, control and predict the generation and consumption of electric energy efficiently and in real time. At the same time, users can obtain power prices and power management information from the smart grid in real time, so as to make reasonable decisions and greatly reduce household power consumption. However, in the smart grid, the user's power consumption data contains sensitive information such as the user's daily habits, and high-frequency collection of user's power consum...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/64H04L9/32
CPCH04L63/123G06F21/606G06F21/64G06Q50/06G06F21/1066
Inventor 鲍海勇陆荣幸
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products