Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent power grid safety and privacy protection data aggregation method based on fog computing

A smart grid and privacy protection technology, applied in the field of information security, can solve the problems of key escrow, huge cloud computing pressure, and complex certificate management, and achieve the effects of preventing abuse of authority, protecting security, and flexible power dispatching

Active Publication Date: 2019-08-16
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing identity authentication schemes often fail to take into account computational overhead and privacy protection effects; certificate-based identity authentication has the problems of overly complex certificate management and key escrow
[0005] The second way of thinking - to protect the real-time data of smart meters, generally adopt data aggregation technology, that is, use homomorphic encryption technology to calculate the total power consumption of multiple users in an encrypted state without revealing the power consumption data of a single user. In this case, even if the attacker has learned the identity of the smart meter, he cannot know the user's private information and carry out the attack
In this type of traditional model, the data is aggregated only in the cloud layer, causing the cloud to bear huge computing pressure, and a large amount of communication overhead is generated on the communication link between the device layer and the cloud layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent power grid safety and privacy protection data aggregation method based on fog computing
  • Intelligent power grid safety and privacy protection data aggregation method based on fog computing
  • Intelligent power grid safety and privacy protection data aggregation method based on fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings of the specification.

[0049] Such as figure 1 with figure 2 As shown, the present invention designs a smart grid security and privacy protection data aggregation method based on fog computing. In the actual application process, the fog computing network consists of the device layer (smart meter), the fog layer, the cloud layer, the power service agency and the key generation center KGC It consists of five parts. The user smart meter collects, encrypts and periodically uploads user power consumption data reports. The fog layer node is responsible for fine-grained aggregation and relaying, and the cloud layer node is responsible for coarse-grained aggregation and re-relaying. Finally, the power service agency collects coarse-grained aggregated data and Perform processing analysis. The smart grid security and privacy protection data ag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent power grid security and privacy protection data aggregation method based on fog computing. The method comprises the following steps: acquiring, encrypting and uploading a user electricity consumption data report through an intelligent electric meter; performing fine-grained aggregation by using the fog nodes capable of mining local computing power and uploading the fine-grained aggregation to the cloud nodes; completing coarse-grained aggregated data through the cloud node and uploading the coarse-grained aggregated data to the electric power service mechanism; and finally collecting, processing and analyzing the coarse-grained aggregation data by a reliable power service mechanism, and generating a power dispatching scheme according to the analysis results. The method comprises the following specific steps: (1) initializing a system; (2) packaging an intelligent electric meter data report; (3) packaging a fog node fine-grained aggregation report;(4) packaging the coarse-grained aggregation report of the cloud node; and (5) reading the aggregation report by the power service mechanism. The method has the advantages that the security and integrity of user privacy data are protected, multi-resolution aggregation is carried out on the user privacy data, the transmission consumption is reduced, and flexible power dispatching is realized.

Description

Technical field [0001] The smart grid security and privacy protection data aggregation method actually based on fog computing of the present invention belongs to the technical field of information security. Background technique [0002] In recent years, with the steady development of the world economy and the Internet, the electricity demand of the people has also become huge. As a new grid system connecting traditional grids, smart grids can interact with users, realize rational allocation of resources, and improve energy utilization. In order to cope with the challenges brought by the explosive growth of grid operation data, smart grids have applied emerging technologies such as big data, fog computing, and the Internet of Things, but at the same time these technologies inevitably bring infrastructure, controllers and monitors, and data Attack threats such as illegal packet cracking, denial of service, man-in-the-middle and instrument identity spoofing have made information se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/30H04L29/06H04L29/08
CPCH04L9/008H04L9/0838H04L9/0861H04L9/0869H04L9/3066H04L63/0442H04L67/10H04L63/083Y02D30/50
Inventor 杨熠黄黎明韩林秀陈思光孙雁飞
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products