[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112948868A - Electric power data storage method and electric power data sharing method based on block chain - Google Patents

Electric power data storage method and electric power data sharing method based on block chain Download PDF

Info

Publication number
CN112948868A
CN112948868A CN202110348024.6A CN202110348024A CN112948868A CN 112948868 A CN112948868 A CN 112948868A CN 202110348024 A CN202110348024 A CN 202110348024A CN 112948868 A CN112948868 A CN 112948868A
Authority
CN
China
Prior art keywords
data
storage
block chain
storage node
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110348024.6A
Other languages
Chinese (zh)
Inventor
曾飞
杨雄
杨景刚
袁晓冬
史明明
孙健
肖小龙
苏伟
司鑫尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority to CN202110348024.6A priority Critical patent/CN112948868A/en
Publication of CN112948868A publication Critical patent/CN112948868A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Public Health (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain-based power data storage method and a power data sharing method.A ring signature and a key image which are used for one time are adopted as marks in a CryptoNote protocol and a stealth address protocol is provided for a user to finish the encryption storage of power data; the encrypted data information is stored by adopting a trusted execution data lake, and the high-efficiency safe sharing of the stored data is realized; the electric power data distributed storage architecture based on the block chain can realize the encrypted storage of the electric power data, can overcome the potential safety hazard of centralized storage, improves the safety and the high efficiency of data storage through the block chain and various encryption technologies, and simultaneously executes a data lake in an intelligent contract of the block chain, thereby ensuring the high-efficiency safe sharing of the stored data.

Description

Electric power data storage method and electric power data sharing method based on block chain
Technical Field
The invention belongs to the technical field of data storage, and particularly relates to a block chain-based power data storage method and a power data sharing method.
Background
With the continuous promotion of the construction of the power internet of things, a large number of sensing units and edge computing intelligent power equipment are connected to a power grid, the structure of a power grid monitoring system becomes more diversified, and data stored by the power grid intelligent equipment also shows a trend of increasing by times. Therefore, how to ensure the safety and high efficiency of the power data storage becomes one of the key points of the development of the power internet of things at present.
In a traditional electric power data storage mode, centralized storage is used as a main mode, but the centralized storage has data risk hazards in two aspects: firstly, data stored in a cloud data center may be subject to centralized and targeted tampering, and the privacy of the data is seriously threatened; secondly, the high dependence on the central storage can lead to the large loss of the power data when the central platform fails, and even irreversible damage is caused. In order to solve the defect of centralized storage, a block chain technology is proposed for data storage, and the most obvious characteristic of the block chain technology is that centralization and tampering prevention are realized, in a block chain system, all storage nodes adopt a unified public ledger, and any storage node cannot perform illegal tampering on the public ledger.
Therefore, it is necessary to implement distributed storage of power data by using the block chain technology, so as to greatly save the efficiency and safety of data storage, and simultaneously explore an effective data sharing method in the block chain.
Disclosure of Invention
The purpose of the invention is as follows: in order to realize effective data sharing in a block chain, the invention provides a block chain-based power data storage method and a block chain-based power data sharing method.
The technical scheme is as follows: a storage node responding to a power data storage request is called a data receiver, a requester sending the power data storage request is called a data sender, and the data receiver and the data sender are connected to a block chain together; the method specifically comprises the following steps:
through the ring signature, the data sender broadcasts the power data storage request to the regional chain in an anonymous mode; if a data receiver responding to the power data storage request exists, the data sender can receive the stealth address of the data receiver, at the moment, the data sender generates a random value r, the stealth address of the data receiver and the random value r are subjected to Hash calculation, and a disposable public key address P is obtaineds(rA) G + B, and calculating R ═ r.G, where HsFor the cryptographic hash function {0,1}, G is the base point, (a, B) is the public key address of the data receiver; broadcasting (P, R) information to a block chain, sending power data to be stored to a one-time public key address, and recording data record information of the one-time public key address into the block chain;
when the data receiver receives the (P, R) information, the hash calculation using the key (a, b) of the key image to which the data receiver belongs is performed to obtain P' ═ Hs(aR) G + B; judging whether P' is satisfied or not, if so, the storage interaction is passed, and the data receiver passes the one-time public key address P-HsPrivate key x ═ H corresponding to (rA) G + Bs(aR) + b signature is carried out on the power data to be stored and then the data is transmitted to a data lake; if not, the storage interaction is not matched, and data storage is not carried out.
Further, the step of generating the stealth address of the data receiver is as follows:
and the data receiver generates a parent key pair, the parent key pair and the temporary key form a one-time adding key together, the one-time adding key is issued, and the issued one-time adding key is called the stealth address of the data receiver.
The invention also discloses a block chain-based power data sharing method, which comprises the following steps:
establishing a trusted operating environment in a data lake, storing the encrypted power data information into the data lake, completing trusted calculation by using an Intel SGX framework, and storing a hash address of the power data into a block chain;
and sharing the power data stored in the data lake with each application program based on a data sharing algorithm of the intelligent contract.
Further, the shared record of the power data is stored in the block chain.
Further, the intelligent contract-based data sharing algorithm comprises the following steps:
step 1: when the storage node NqReceiving a message from a storage node NpWhen a data sharing request Req is issued, the storage node NqBeing a data storage party, a storage node NpIs a data sharing requester; storage node NqProviding corresponding access rights to a storage node N by means of an intelligent contractpSetting access constraint condition and then authorizing access, and obtaining the private key SK of the access constraint conditionPIDTo a neighbouring data aggregator BSj
Step 2: data aggregator BSjAfter information is verified, according to the storage node NqExecuting intelligent contract according to the access constraint condition, locking script according to the existing key, decrypting the shared data packet, and simultaneously utilizing public key
Figure BDA0003001387390000021
Encrypting the ring signature, and then outputting a decryption result of the shared data;
and step 3: judging storage node NqAnd storage node NpWhether or not to be in the same data aggregator BSjIf in the same data aggregator BSjClothes ofIn the service category, the storage node NpDirect acquisition data aggregator BSjThe data to be transmitted; if not in the same data aggregator BSjIn the service scope of (2), the data is transmitted to the distance storage node N from the storage node currently running the intelligent contract in an encrypted mannerpThe most recent data aggregator.
Further, the data sharing request Req includes an access address, a time stamp, and a frequency.
Has the advantages that: compared with the prior art, the invention has the following advantages:
1. the invention provides a distributed power data storage architecture, improves data storage efficiency and stability on a bottom architecture supported by a block chain, and solves the problems of great potential safety hazard, low storage efficiency and the like of a centralized data storage mode;
2. in the process of storing the electric power data, the disposable ring signature group and the key image provided by the CryptoNote protocol are used as the marks of the data storage, so that the problem that group signatures need to participate in a group manager is solved; the privacy address is used, so that the privacy in the data storage interaction process is ensured, and the storage safety of the power data in the block chain is improved;
3. according to the invention, a data lake data sharing method is designed in the intelligent contract, and the trusted execution data lake improved storage module is used, so that the problems that the internal access right limitation is difficult to control, data is difficult to share among nodes and the like are effectively solved, the efficient and safe sharing of private data is ensured, and the safety and the efficiency of electric power data storage and sharing are further improved.
Drawings
Fig. 1 is a storage interaction flow of a CryptoNote protocol;
FIG. 2 is a process for generating a stealth address;
FIG. 3 is a power data distributed storage framework;
FIG. 4 is a data sharing mechanism in a data lake.
Detailed Description
The technical solution of the present invention will be further explained with reference to the accompanying drawings and examples.
Example 1:
the embodiment is to implement power data storage in a distributed data storage system, where the distributed data storage system mentioned in this embodiment includes an intelligent power device, a power consumer, a local controller, a data aggregator, and a block chain; the block chain is composed of a plurality of blocks, and each block comprises a block head and a block body. The specific architecture is shown in fig. 3, and the main encryption storage process is as follows:
the requesting party (intelligent power equipment, power consumers and local controllers) sends a data storage demand, namely, one storage node is selected from the distributed data storage system for data storage. When a data storage request is issued, transmission of a request to another node is prohibited within one minute.
When the storage node receives the request, the corresponding storage service is required to be provided to the request sending party, the sequence of providing the storage service is according to the front-back relation of the request sending time, and when the confirmation message is received, the data transmission is carried out.
And uploading the record of the data storage completed by the storage node to the block chain, evaluating the storage process by the power equipment or the power user, and correspondingly evaluating the performance of the storage node by the local controller according to the evaluation result.
In short, the power consumer transmits a storage request to the local controller, the local controller transmits a demand to the storage node, the storage node responds according to the self condition, the whole storage process is recorded in the block chain, and only the hash address of the data is stored in the block chain.
In order to realize the encrypted storage of the power data of the above power data distributed storage architecture, the present embodiment proposes a power data storage method based on a block chain, in which a storage node responding to a power data storage request is referred to as a data receiver, a requester sending the power data storage request is referred to as a data sender, and the data receiver and the data sender are connected to one block chain together; the specific process is as follows:
through the ring signature, the data sender broadcasts the power data storage request to the regional chain in an anonymous mode;
after receiving the power data storage request, the data receiver generates a father key pair and a temporary key to form a one-time adding key together, and issues the one-time adding key, wherein the issued one-time adding key becomes a stealth address of the data receiver; the specific process can be seen in fig. 2;
the data sender receives the stealth address of the data receiver which responds, at the moment, the data sender generates a random value r, the stealth address of the data receiver and the random value r are subjected to Hash calculation, and a one-time public key address P is obtaineds(rA) G + B, and calculating R ═ r.G, where HsFor the cryptographic hash function {0,1}, G is the base point, (a, B) is the public key address of the data receiver; broadcasting (P, R) information to a block chain, sending power data to be stored to a one-time public key address, and recording data record information of the one-time public key address into the block chain; the one-time public key address is generated by threshold replacement, according to the above process, referring to fig. 1, each storage interaction generates a new address according to the stealth address of the data receiver, so that an attacker cannot determine the address of the receiver.
When the data receiver receives the (P, R) information, the hash calculation using the key (a, b) of the key image to which the data receiver belongs is performed to obtain P' ═ Hs(aR) G + B; judging whether P' is satisfied or not, if so, the storage interaction is passed, and the data receiver passes the one-time public key address P-HsPrivate key x ═ H corresponding to (rA) G + Bs(aR) + b signature is carried out on the power data to be stored and then the data is transmitted to a data lake; if not, the storage interaction is not matched, and data storage is not carried out. The key image referred to in this embodiment may provide information about having a particular signature phinStoring the interaction information.
The ring signature used in this embodiment is a digital signature scheme, and the final signature authentication requires that all members in the group agree to validate the message signing party, and the process is defined as follows: firstly, a signer calculates a symmetric key Sk, and takes the symmetric key Sk as a hash value of a message ms to be signed, namely Sk is h (ms); generating a symmetric key Sk as h by public key transformation(ms,Pk1,Pk2,…,Pr) (ii) a The signer then signs the signature in a random form {0,1}bUniformly selecting an initial random value RζAnd the signer selects the number x of signatures from the ring members 1 < i < r, i ≠ siWhere r is the ring member and s is the order of the members as the actual signers. Thus, the signature obtains a new value of yi=f(xi). Finally, the signature of the message to be signed ms is defined as (P)k1,Pk2,…,Pkn;Rζ;x1,x2,…,xr)。
In a distributed data storage system, there is a ring signature group consisting of intelligent power devices, power consumers and storage nodes. When a set of ring signatures can be cryptographically constructed based on the new member public key as long as the new member's public key is known:
Figure BDA0003001387390000041
in the formula, yn=fn(xn) Wherein f isnDefined by an extended threshold permutation function. f. ofn(xn) At {0,1}bIs extended upwards to
Figure BDA0003001387390000042
Storing data by b-bit number omega ═ lini+riAnd (4) forming. Thus, fiThe value of (ω) can be expressed as:
Figure BDA0003001387390000043
in the formula, riIs a random number generated by the sender,/iIs a random number, n, generated by the recipientiIs the number of signers.
Example 2:
the intelligent contract is used as an autonomous application program in a block chain, and the embodiment designs a data lake data sharing method by using the characteristic, so that the data lake can be trustingly executed to efficiently and safely share encrypted data information, and the mechanism is shown in fig. 4, and the implementation process is as follows:
step 1: a trusted operating environment needs to be constructed in the data lake to store original data information, and the original data is stored in the data lake after being encrypted. And an Intel SGX framework is utilized to complete trusted computing, wherein only the hash address of the data is stored in the block chain.
Step 2: the intelligent contract is used for providing corresponding access authority, namely, the identity of a data request sender needs to be checked, whether the identity is right to access data or not is determined, and the block link module can reserve data storage interaction and sharing records.
Step 2: providing corresponding access authority by using an intelligent contract, namely, verifying the identity of a data request sender to determine whether the data request sender has the right of data access, wherein a block link module can reserve data storage interaction and sharing records; the specific process is as follows:
when the storage node NqReceiving a message from a storage node NpWhen a data sharing request Req is issued, the data sharing request Req includes contents such as an access address, time, frequency, and the like, and at this time, the storage node NqBeing a data storage party, a storage node NpIs a data sharing requester; storage node NqFor storage node NpAccess constraint condition is established to authorize the access, and the private key SK of the information is usedPIDTo a neighbouring data aggregator BSj
Figure BDA0003001387390000051
Figure BDA0003001387390000052
Figure BDA0003001387390000053
Where t is the timestamp, Cert is the certificate, fPKTo encrypt information using the entity's public key, PK is the public key and SK is the private key.
Data aggregator BSjAfter the information is verified, the information can be stored according to the storage node NqExecuting intelligent contract according to the access constraint condition, locking script according to the existing key, decrypting the shared data packet, and simultaneously utilizing public key
Figure BDA0003001387390000054
And encrypting the ring signature, and then outputting a decryption result of the shared data.
When N is presentqAnd NpWithin the same service scope of the data aggregator, for NpMaking data access to obtain data aggregator BS directlyjThe data to be transmitted; if N is presentqAnd NpIf the data packets are not in the service scope of the same data aggregator, the data packets are transmitted to the distance N by the storage node running the intelligent contract at present in an encrypted mannerpThe most recent data aggregator. The specific process is as follows:
Figure BDA0003001387390000055
Figure BDA0003001387390000056
and step 3: n is a radical ofpAfter receiving the data, the private key decryption party can access the data.
And 4, step 4: various applications are implemented, such as data management systems, data acquisition systems, and the like.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (6)

1. A storage node responding to a power data storage request is called a data receiver, a requester sending the power data storage request is called a data sender, and the data receiver and the data sender are connected to a block chain together; the method is characterized in that: the method specifically comprises the following steps:
through the ring signature, the data sender broadcasts the power data storage request to the regional chain in an anonymous mode; if a data receiver responding to the power data storage request exists, the data sender can receive the stealth address of the data receiver, at the moment, the data sender generates a random value r, the stealth address of the data receiver and the random value r are subjected to Hash calculation, and a disposable public key address P is obtaineds(rA) G + B, and calculating R ═ r.G, where HsFor encrypting hash functions {0,1}*G is a base point, and (A, B) is a public key address of a data receiver; broadcasting (P, R) information to a block chain, sending power data to be stored to a one-time public key address, and recording data record information of the one-time public key address into the block chain;
when the data receiver receives the (P, R) information, the hash calculation using the key (a, b) of the key image to which the data receiver belongs is performed to obtain P' ═ Hs(aR) G + B; judging whether P' is satisfied or not, if so, the storage interaction is passed, and the data receiver passes the one-time public key address P-HsPrivate key x ═ H corresponding to (rA) G + Bs(aR) + b signature is carried out on the power data to be stored and then the data is transmitted to a data lake; if not, the storage interaction is not matched, and data storage is not carried out.
2. The block chain-based power data storage method according to claim 1, wherein: the step of generating the stealth address of the data receiver comprises the following steps:
and the data receiver generates a parent key pair, the parent key pair and the temporary key form a one-time adding key together, the one-time adding key is issued, and the issued one-time adding key is called the stealth address of the data receiver.
3. A power data sharing method based on a block chain is characterized in that: the method comprises the following steps:
establishing a trusted operating environment in a data lake, storing the encrypted power data information into the data lake, completing trusted calculation by using an Intel SGX framework, and storing a hash address of the power data into a block chain;
and sharing the power data stored in the data lake with each application program based on a data sharing algorithm of the intelligent contract.
4. The method according to claim 3, wherein the method comprises: shared records of power data are stored in the block chain.
5. The method according to claim 3, wherein the method comprises: the data sharing algorithm based on the intelligent contract comprises the following steps:
step 1: when the storage node NqReceiving a message from a storage node NpWhen a data sharing request Req is issued, the storage node NqBeing a data storage party, a storage node NpIs a data sharing requester; storage node NqProviding corresponding access rights to a storage node N by means of an intelligent contractpSetting access constraint condition and then authorizing access, and obtaining the private key SK of the access constraint conditionPIDTo a neighbouring data aggregator BSj
Step 2: data aggregator BSjAfter information is verified, according to the storage node NqExecuting intelligent contract according to the established access constraint condition, locking the script according to the existing secret key, then decrypting the shared data packet, and simultaneously utilizing the public key PKNpEncrypting the ring signature, and then outputting a decryption result of the shared data;
and step 3: judging storage node NqAnd storage node NpWhether or not to be in the same data aggregator BSjClothes ofIn the service domain, if in the same data aggregator BSjIs in the service category of (2), then the storage node NpDirect acquisition data aggregator BSjThe data to be transmitted; if not in the same data aggregator BSjIn the service scope of (2), the data is transmitted to the distance storage node N from the storage node currently running the intelligent contract in an encrypted mannerpThe most recent data aggregator.
6. The method according to claim 3, wherein the method comprises: the data sharing request Req includes an access address, a time stamp, and a frequency.
CN202110348024.6A 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain Withdrawn CN112948868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110348024.6A CN112948868A (en) 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110348024.6A CN112948868A (en) 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain

Publications (1)

Publication Number Publication Date
CN112948868A true CN112948868A (en) 2021-06-11

Family

ID=76231427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110348024.6A Withdrawn CN112948868A (en) 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain

Country Status (1)

Country Link
CN (1) CN112948868A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615006A (en) * 2021-12-01 2022-06-10 江苏省电力试验研究院有限公司 Edge layer data security protection method and system for power distribution Internet of things and storage medium
CN116578544A (en) * 2023-07-06 2023-08-11 华北电力大学 Power data sharing method based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615006A (en) * 2021-12-01 2022-06-10 江苏省电力试验研究院有限公司 Edge layer data security protection method and system for power distribution Internet of things and storage medium
CN116578544A (en) * 2023-07-06 2023-08-11 华北电力大学 Power data sharing method based on block chain
CN116578544B (en) * 2023-07-06 2023-10-17 华北电力大学 Power data sharing method based on block chain

Similar Documents

Publication Publication Date Title
CN112491846B (en) Cross-chain block chain communication method and device
Liu et al. Blockchain empowered cooperative authentication with data traceability in vehicular edge computing
Garg et al. An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment
CN105873031B (en) Distributed unmanned plane cryptographic key negotiation method based on credible platform
CN114362993B (en) Block chain assisted Internet of vehicles security authentication method
CN114710275B (en) Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment
CN112383391B (en) Data security protection method based on data attribute authorization, storage medium and terminal
CN103427998A (en) Internet data distribution oriented identity authentication and data encryption method
CN111147460A (en) Block chain-based cooperative fine-grained access control method
CN112187450B (en) Method, device, equipment and storage medium for key management communication
CN113360925A (en) Method and system for storing and accessing trusted data in electric power information physical system
CN112651037A (en) Off-chain data access method and system of block chain system
CN114139203B (en) Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
Guo et al. Accountable attribute-based data-sharing scheme based on blockchain for vehicular ad hoc network
CN112487465A (en) Cross-network dynamic service flow verification method, system, storage medium and computing device
Li et al. Smart Contract‐Based Cross‐Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks
CN112948868A (en) Electric power data storage method and electric power data sharing method based on block chain
CN110719167B (en) Block chain-based signcryption method with timeliness
WO2022135391A1 (en) Identity authentication method and apparatus, and storage medium, program and program product
US20240064011A1 (en) Identity authentication method and apparatus, device, chip, storage medium, and program
CN114615006A (en) Edge layer data security protection method and system for power distribution Internet of things and storage medium
Zhang et al. High-speed railway environmental monitoring data identity authentication scheme based on consortium blockchain
Yang et al. Design of Key Management Protocols for Internet of Things.
CN113691376B (en) Key management method and device
Lin Secure cloud Internet of vehicles based on blockchain and data transmission scheme of map/reduce

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210611