Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data aggregation method for smart grid security and privacy protection based on fog computing

A smart grid and privacy protection technology, applied in the field of information security, can solve problems such as inability to obtain user privacy information, key escrow, and complex certificate management

Active Publication Date: 2022-06-21
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing identity authentication schemes often fail to take into account computational overhead and privacy protection effects; certificate-based identity authentication has the problems of overly complex certificate management and key escrow
[0005] The second way of thinking - to protect the real-time data of smart meters, generally adopt data aggregation technology, that is, use homomorphic encryption technology to calculate the total power consumption of multiple users in an encrypted state without revealing the power consumption data of a single user. In this case, even if the attacker has learned the identity of the smart meter, he cannot know the user's private information and carry out the attack
In this type of traditional model, the data is aggregated only in the cloud layer, causing the cloud to bear huge computing pressure, and a large amount of communication overhead is generated on the communication link between the device layer and the cloud layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data aggregation method for smart grid security and privacy protection based on fog computing
  • Data aggregation method for smart grid security and privacy protection based on fog computing
  • Data aggregation method for smart grid security and privacy protection based on fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.

[0049] like figure 1 and figure 2 As shown, the present invention designs a data aggregation method for smart grid security and privacy protection based on fog computing. In the actual application process, the fog computing network consists of the device layer (smart meter), the fog layer, the cloud layer, the power service organization and the key generation center KGC. Consists of five parts. User smart meters collect, encrypt, and periodically upload user power consumption data reports. The fog layer nodes are responsible for fine-grained aggregation and relaying, and the cloud layer nodes are responsible for coarse-grained aggregation and re-relaying. Finally, the power service agency collects the coarse-grained aggregated data and transmits it. Process analysis. The smart grid security and privacy protection data aggregation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a smart grid security and privacy protection data aggregation method based on fog computing. The method collects, encrypts, and uploads user electricity consumption data reports through smart meters; uses fog nodes that can mine local computing capabilities to perform fine-grained aggregation And upload it to the cloud node; through the cloud node, the coarse-grained aggregation data is completed and uploaded to the power service organization; finally, the reliable power service organization collects, processes and analyzes the coarse-grained aggregation data, and then generates a power dispatching plan based on these analysis results. The specific steps include: (1) system initialization; (2) packaging smart meter data report; (3) packaging fog node fine-grained aggregation report; (4) packaging cloud node coarse-grained aggregation report; (5) power service agency reading aggregation Report. The advantages of the invention are as follows: while protecting the security and integrity of user privacy data, it performs multi-resolution aggregation, reduces transmission consumption, and realizes flexible power scheduling.

Description

technical field [0001] The invention is actually a data aggregation method for smart grid security and privacy protection based on fog computing, and belongs to the technical field of information security. Background technique [0002] In recent years, with the steady development of the world economy and the Internet, the electricity demand of the people is also increasing day by day. As a new power grid system that takes over the traditional power grid, the smart grid can interact with users, realize the rational allocation of resources, and improve energy utilization. In order to cope with the challenges brought about by the explosive growth of power grid operation data, the smart grid applies emerging technologies such as big data, fog computing, and the Internet of Things, but at the same time, these technologies inevitably bring about infrastructure, controllers and monitors, data Attack threats such as illegal packet cracking, denial of service, man-in-the-middle and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/30H04L9/40H04L67/10
CPCH04L9/008H04L9/0838H04L9/0861H04L9/0869H04L9/3066H04L63/0442H04L67/10H04L63/083Y02D30/50
Inventor 杨熠黄黎明韩林秀陈思光孙雁飞
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products