Data processing method and system based on power transaction

A data processing system and power transaction technology, applied in the field of information technology security, can solve problems such as leakage of trader account information privacy, and achieve the effect of improving security and efficiency

Inactive Publication Date: 2020-05-29
广州电力交易中心有限责任公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the power transaction data information under the blockchain is public in the nodes, and attackers can maliciously mine and utilize the transaction relationship between the accounts of different power users by analyzing an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and system based on power transaction
  • Data processing method and system based on power transaction
  • Data processing method and system based on power transaction

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] Example 1

[0044] A data processing method based on electricity trading includes the cloud, and the cloud processing method for data includes:

[0045] S10. Perform real-time fixed-point sampling of the power transaction data in the area to obtain real-time data values ​​and real-time change increments, and store the data in blocks, encryption and numbering randomly in several servers; the way to store the data to the server is :

[0046] S11. Add the BLOCK logo at the end of each encrypted data;

[0047] S12. Create metadata for indexing encrypted data, and store the metadata in the main storage medium of the server;

[0048] S13. Store metadata and encrypted data in n Cache storage media of the server, n≥1; the server includes m Cache storage media, m≥n; n Cache storage media where a batch of encrypted data is stored At most one of them is not full;

[0049] S14. Combine the data in the full Cache storage medium into one file and store it in the secondary storage medium of th...

Example Embodiment

[0057] Example 2

[0058] A data processing method based on electricity trading includes the cloud, and the cloud processing method for data includes:

[0059] S10. Perform real-time fixed-point sampling of the power transaction data in the area to obtain real-time data values ​​and real-time change increments, and store the data in blocks, encryption and numbering randomly in several servers; the way to store the data to the server is :

[0060] S11. Add the BLOCK logo at the end of each encrypted data;

[0061] S12. Create metadata for indexing encrypted data, and store the metadata in the main storage medium of the server;

[0062] S13. Store metadata and encrypted data in n Cache storage media of the server, n≥1; the server includes m Cache storage media, m≥n; n Cache storage media where a batch of encrypted data is stored At most one of them is not full;

[0063] S14. Combine the data in the full Cache storage medium into one file and store it in the secondary storage medium of th...

Example Embodiment

[0075] Example 3

[0076] A data processing system based on electricity trading, including a cloud, the cloud including a sampling module, a data processing module, and an index generation module;

[0077] The sampling module performs real-time fixed-point sampling of power transaction data in the area to obtain real-time data values ​​and real-time change increments, and the data processing module randomly stores data in several servers after block, encryption and numbering;

[0078] The index generation module stores the number of the encrypted data in the blockchain instead of the data itself; the storage method is:

[0079] Generate a character string similar to the form of the identification data in the original data, calculate the difference between the original data and the generated character string, the character string generated at each sampling moment is the same character string; the original data includes identification data and other data ;

[0080] The difference is sort...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information technology security, provides a data processing method and system based on power transaction, and is used for solving the problem of power transactiondata leakage. In the data processing method based on power transaction, a cloud is provided, and the method comprises the steps: S10, carrying out the real-time fixed-point sampling of power transaction data in a region, obtaining an instant data value and a real-time change increment, partitioning, encrypting and numbering the data, and randomly storing the data in a plurality of servers; and S20, storing the serial number of the encrypted data instead of the data in the blockchain. And the security of data storage is improved.

Description

technical field [0001] The invention relates to the field of information technology security, in particular to a data processing method and system based on power trading. Background technique [0002] With the development of smart grid and big data technology, the data sharing mode of data mining and analysis of the state of the power industry by using the released power system big data has become the development trend of the electric power information age. However, while data sharing brings convenience, it is also accompanied by the risk of personal privacy data leakage, so the release of privacy-protected data has attracted widespread attention. [0003] Traditional privacy-preserving data release models, such as k-anonymity, l-diversity, t-approximation and other models, they generalize all data records into several groups of records according to the characteristics of the original data, not only making each group in each group Records cannot be distinguished from each o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F16/27G06F16/22G06F16/2455
CPCG06F21/602G06F21/6227G06F21/6245G06F16/2282G06F16/24552G06F16/27
Inventor 陈玮钟声丁军策黄维芳罗文海张廷营许喆严旭
Owner 广州电力交易中心有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products