Privacy protection efficient aggregation and access control method for power grid data

An access control and privacy protection technology, applied in digital data protection, data processing applications, instruments, etc., can solve problems such as the ineffective utilization of computing resources of edge devices and the difficulty of cloud computing bandwidth resources to meet low-latency transmission, etc. High speed, low value density, and the effect of reducing dependencies

Pending Publication Date: 2021-04-16
STATE GRID INFO TELECOM GREAT POWER SCI & TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most cloud computing models adopt centralized data processing methods, which makes the computing resources of edge devices not be effectively utilized.
And as the scale of data continues to grow, the bandwidth resources of cloud computing will be difficult to meet the needs of low-latency transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection efficient aggregation and access control method for power grid data
  • Privacy protection efficient aggregation and access control method for power grid data
  • Privacy protection efficient aggregation and access control method for power grid data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] The present invention improves the existing cloud-based privacy protection data aggregation scheme, and proposes a power grid data privacy protection aggregation method based on edge computing to protect power grid data, and at the same time realizes power grid data security through a fine-grained access control method shared. When a data user requests to access data, the invention can support low-latency data processing and improve the throughput of system data processing.

[0035] The present invention comprises the following steps:

[0036] Step 1: The smart terminal uses the pseudo-random number generator and the master key to generate all n key sequences k required within a fixed period of time (for example, one hour) 1 ,...,k n+1 .

[0037] Step 2: The intelligent terminal divides the data generated during the time period into n independent data blocks according to the time segment, and calculates the data aggregation summary (such as summation and average valu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection efficient aggregation and access control method for power grid data, which comprises the following steps of: generating all n key sequences required in a fixed time period, dividing data generated in the time period into n independent data blocks according to time slices, and calculating a data aggregation abstract of each database; encrypting all the data blocks in the time period by a secret key to generate an encrypted file, sending the encrypted file to a cloud server to be stored, and then obtaining a ciphertext according to the request of a data user and the access permission; and performing aggregation and decryption operation on the ciphertext by using the key set issued by the intelligent terminal to obtain a plaintext aggregation result of the power grid data. According to the method, low-delay query can be supported for power grid data which is huge in volume, high in generation speed and low in value density. The computing power of the edge intelligent terminal is fully utilized, dependence on the cloud server is reduced, and safe sharing of power grid data is achieved through fine-grained data access control.

Description

technical field [0001] The invention relates to a method for accessing grid data, in particular to a privacy-protected, efficient aggregation and access control method for grid data. Background technique [0002] With the development of modern science and technology and the acceleration of urbanization, smart grid applications have emerged and will soon replace traditional power grids. Smart grid aims to combine traditional power grid, Internet of Things and information technology, prompt grid users to actively manage daily power usage, and provide reference information needed for power grid planning and regulation in the power sector. At present, due to the continuous development of the smart grid and the Internet of Things system, the number of power users continues to grow rapidly, and the data types and data volumes of various grids are also increasing. The explosive growth of grid data makes the efficient aggregation and access of grid data a Research hotspots in acade...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06Q50/06
Inventor 苟晓军罗顺辉杨欣肖良王立伟黄鑫烨沈燕平冯笑李显光邓丽萍董腾飞蒋演廖应霞翁文娟
Owner STATE GRID INFO TELECOM GREAT POWER SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products