[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112948868A - Electric power data storage method and electric power data sharing method based on block chain - Google Patents

Electric power data storage method and electric power data sharing method based on block chain Download PDF

Info

Publication number
CN112948868A
CN112948868A CN202110348024.6A CN202110348024A CN112948868A CN 112948868 A CN112948868 A CN 112948868A CN 202110348024 A CN202110348024 A CN 202110348024A CN 112948868 A CN112948868 A CN 112948868A
Authority
CN
China
Prior art keywords
data
storage
power data
address
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110348024.6A
Other languages
Chinese (zh)
Inventor
曾飞
杨雄
杨景刚
袁晓冬
史明明
孙健
肖小龙
苏伟
司鑫尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority to CN202110348024.6A priority Critical patent/CN112948868A/en
Publication of CN112948868A publication Critical patent/CN112948868A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Public Health (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提出了一种基于区块链的电力数据存储方法及电力数据共享方法,通过在CryptoNote协议中采用一次性使用的环签名和密钥图像作为标记和为用户提供隐身地址协议,完成电力数据的加密存储;通过采用可以信任的执行数据湖对加密后的数据信息进行存储,并实现存储数据高效安全共享;本发明基于区块链的电力数据分布式存储架构实现电力数据的加密存储可以克服集中式存储的安全隐患,通过区块链和各种加密技术提高了数据存储的安全性和高效性,同时在区块链的智能合约中执行数据湖,保证了存储数据的高效安全共享。

Figure 202110348024

The present invention proposes a method for storing power data and a method for sharing power data based on blockchain. By adopting a one-time-use ring signature and a key image as a mark in the CryptoNote protocol and providing users with a stealth address protocol, the power data is completed. The encrypted storage of the power data is stored; the encrypted data information is stored by adopting a trustworthy execution data lake, and the storage data is efficiently and safely shared; The security risks of centralized storage improve the security and efficiency of data storage through blockchain and various encryption technologies. At the same time, the data lake is executed in the smart contract of the blockchain to ensure the efficient and safe sharing of stored data.

Figure 202110348024

Description

Electric power data storage method and electric power data sharing method based on block chain
Technical Field
The invention belongs to the technical field of data storage, and particularly relates to a block chain-based power data storage method and a power data sharing method.
Background
With the continuous promotion of the construction of the power internet of things, a large number of sensing units and edge computing intelligent power equipment are connected to a power grid, the structure of a power grid monitoring system becomes more diversified, and data stored by the power grid intelligent equipment also shows a trend of increasing by times. Therefore, how to ensure the safety and high efficiency of the power data storage becomes one of the key points of the development of the power internet of things at present.
In a traditional electric power data storage mode, centralized storage is used as a main mode, but the centralized storage has data risk hazards in two aspects: firstly, data stored in a cloud data center may be subject to centralized and targeted tampering, and the privacy of the data is seriously threatened; secondly, the high dependence on the central storage can lead to the large loss of the power data when the central platform fails, and even irreversible damage is caused. In order to solve the defect of centralized storage, a block chain technology is proposed for data storage, and the most obvious characteristic of the block chain technology is that centralization and tampering prevention are realized, in a block chain system, all storage nodes adopt a unified public ledger, and any storage node cannot perform illegal tampering on the public ledger.
Therefore, it is necessary to implement distributed storage of power data by using the block chain technology, so as to greatly save the efficiency and safety of data storage, and simultaneously explore an effective data sharing method in the block chain.
Disclosure of Invention
The purpose of the invention is as follows: in order to realize effective data sharing in a block chain, the invention provides a block chain-based power data storage method and a block chain-based power data sharing method.
The technical scheme is as follows: a storage node responding to a power data storage request is called a data receiver, a requester sending the power data storage request is called a data sender, and the data receiver and the data sender are connected to a block chain together; the method specifically comprises the following steps:
through the ring signature, the data sender broadcasts the power data storage request to the regional chain in an anonymous mode; if a data receiver responding to the power data storage request exists, the data sender can receive the stealth address of the data receiver, at the moment, the data sender generates a random value r, the stealth address of the data receiver and the random value r are subjected to Hash calculation, and a disposable public key address P is obtaineds(rA) G + B, and calculating R ═ r.G, where HsFor the cryptographic hash function {0,1}, G is the base point, (a, B) is the public key address of the data receiver; broadcasting (P, R) information to a block chain, sending power data to be stored to a one-time public key address, and recording data record information of the one-time public key address into the block chain;
when the data receiver receives the (P, R) information, the hash calculation using the key (a, b) of the key image to which the data receiver belongs is performed to obtain P' ═ Hs(aR) G + B; judging whether P' is satisfied or not, if so, the storage interaction is passed, and the data receiver passes the one-time public key address P-HsPrivate key x ═ H corresponding to (rA) G + Bs(aR) + b signature is carried out on the power data to be stored and then the data is transmitted to a data lake; if not, the storage interaction is not matched, and data storage is not carried out.
Further, the step of generating the stealth address of the data receiver is as follows:
and the data receiver generates a parent key pair, the parent key pair and the temporary key form a one-time adding key together, the one-time adding key is issued, and the issued one-time adding key is called the stealth address of the data receiver.
The invention also discloses a block chain-based power data sharing method, which comprises the following steps:
establishing a trusted operating environment in a data lake, storing the encrypted power data information into the data lake, completing trusted calculation by using an Intel SGX framework, and storing a hash address of the power data into a block chain;
and sharing the power data stored in the data lake with each application program based on a data sharing algorithm of the intelligent contract.
Further, the shared record of the power data is stored in the block chain.
Further, the intelligent contract-based data sharing algorithm comprises the following steps:
step 1: when the storage node NqReceiving a message from a storage node NpWhen a data sharing request Req is issued, the storage node NqBeing a data storage party, a storage node NpIs a data sharing requester; storage node NqProviding corresponding access rights to a storage node N by means of an intelligent contractpSetting access constraint condition and then authorizing access, and obtaining the private key SK of the access constraint conditionPIDTo a neighbouring data aggregator BSj
Step 2: data aggregator BSjAfter information is verified, according to the storage node NqExecuting intelligent contract according to the access constraint condition, locking script according to the existing key, decrypting the shared data packet, and simultaneously utilizing public key
Figure BDA0003001387390000021
Encrypting the ring signature, and then outputting a decryption result of the shared data;
and step 3: judging storage node NqAnd storage node NpWhether or not to be in the same data aggregator BSjIf in the same data aggregator BSjClothes ofIn the service category, the storage node NpDirect acquisition data aggregator BSjThe data to be transmitted; if not in the same data aggregator BSjIn the service scope of (2), the data is transmitted to the distance storage node N from the storage node currently running the intelligent contract in an encrypted mannerpThe most recent data aggregator.
Further, the data sharing request Req includes an access address, a time stamp, and a frequency.
Has the advantages that: compared with the prior art, the invention has the following advantages:
1. the invention provides a distributed power data storage architecture, improves data storage efficiency and stability on a bottom architecture supported by a block chain, and solves the problems of great potential safety hazard, low storage efficiency and the like of a centralized data storage mode;
2. in the process of storing the electric power data, the disposable ring signature group and the key image provided by the CryptoNote protocol are used as the marks of the data storage, so that the problem that group signatures need to participate in a group manager is solved; the privacy address is used, so that the privacy in the data storage interaction process is ensured, and the storage safety of the power data in the block chain is improved;
3. according to the invention, a data lake data sharing method is designed in the intelligent contract, and the trusted execution data lake improved storage module is used, so that the problems that the internal access right limitation is difficult to control, data is difficult to share among nodes and the like are effectively solved, the efficient and safe sharing of private data is ensured, and the safety and the efficiency of electric power data storage and sharing are further improved.
Drawings
Fig. 1 is a storage interaction flow of a CryptoNote protocol;
FIG. 2 is a process for generating a stealth address;
FIG. 3 is a power data distributed storage framework;
FIG. 4 is a data sharing mechanism in a data lake.
Detailed Description
The technical solution of the present invention will be further explained with reference to the accompanying drawings and examples.
Example 1:
the embodiment is to implement power data storage in a distributed data storage system, where the distributed data storage system mentioned in this embodiment includes an intelligent power device, a power consumer, a local controller, a data aggregator, and a block chain; the block chain is composed of a plurality of blocks, and each block comprises a block head and a block body. The specific architecture is shown in fig. 3, and the main encryption storage process is as follows:
the requesting party (intelligent power equipment, power consumers and local controllers) sends a data storage demand, namely, one storage node is selected from the distributed data storage system for data storage. When a data storage request is issued, transmission of a request to another node is prohibited within one minute.
When the storage node receives the request, the corresponding storage service is required to be provided to the request sending party, the sequence of providing the storage service is according to the front-back relation of the request sending time, and when the confirmation message is received, the data transmission is carried out.
And uploading the record of the data storage completed by the storage node to the block chain, evaluating the storage process by the power equipment or the power user, and correspondingly evaluating the performance of the storage node by the local controller according to the evaluation result.
In short, the power consumer transmits a storage request to the local controller, the local controller transmits a demand to the storage node, the storage node responds according to the self condition, the whole storage process is recorded in the block chain, and only the hash address of the data is stored in the block chain.
In order to realize the encrypted storage of the power data of the above power data distributed storage architecture, the present embodiment proposes a power data storage method based on a block chain, in which a storage node responding to a power data storage request is referred to as a data receiver, a requester sending the power data storage request is referred to as a data sender, and the data receiver and the data sender are connected to one block chain together; the specific process is as follows:
through the ring signature, the data sender broadcasts the power data storage request to the regional chain in an anonymous mode;
after receiving the power data storage request, the data receiver generates a father key pair and a temporary key to form a one-time adding key together, and issues the one-time adding key, wherein the issued one-time adding key becomes a stealth address of the data receiver; the specific process can be seen in fig. 2;
the data sender receives the stealth address of the data receiver which responds, at the moment, the data sender generates a random value r, the stealth address of the data receiver and the random value r are subjected to Hash calculation, and a one-time public key address P is obtaineds(rA) G + B, and calculating R ═ r.G, where HsFor the cryptographic hash function {0,1}, G is the base point, (a, B) is the public key address of the data receiver; broadcasting (P, R) information to a block chain, sending power data to be stored to a one-time public key address, and recording data record information of the one-time public key address into the block chain; the one-time public key address is generated by threshold replacement, according to the above process, referring to fig. 1, each storage interaction generates a new address according to the stealth address of the data receiver, so that an attacker cannot determine the address of the receiver.
When the data receiver receives the (P, R) information, the hash calculation using the key (a, b) of the key image to which the data receiver belongs is performed to obtain P' ═ Hs(aR) G + B; judging whether P' is satisfied or not, if so, the storage interaction is passed, and the data receiver passes the one-time public key address P-HsPrivate key x ═ H corresponding to (rA) G + Bs(aR) + b signature is carried out on the power data to be stored and then the data is transmitted to a data lake; if not, the storage interaction is not matched, and data storage is not carried out. The key image referred to in this embodiment may provide information about having a particular signature phinStoring the interaction information.
The ring signature used in this embodiment is a digital signature scheme, and the final signature authentication requires that all members in the group agree to validate the message signing party, and the process is defined as follows: firstly, a signer calculates a symmetric key Sk, and takes the symmetric key Sk as a hash value of a message ms to be signed, namely Sk is h (ms); generating a symmetric key Sk as h by public key transformation(ms,Pk1,Pk2,…,Pr) (ii) a The signer then signs the signature in a random form {0,1}bUniformly selecting an initial random value RζAnd the signer selects the number x of signatures from the ring members 1 < i < r, i ≠ siWhere r is the ring member and s is the order of the members as the actual signers. Thus, the signature obtains a new value of yi=f(xi). Finally, the signature of the message to be signed ms is defined as (P)k1,Pk2,…,Pkn;Rζ;x1,x2,…,xr)。
In a distributed data storage system, there is a ring signature group consisting of intelligent power devices, power consumers and storage nodes. When a set of ring signatures can be cryptographically constructed based on the new member public key as long as the new member's public key is known:
Figure BDA0003001387390000041
in the formula, yn=fn(xn) Wherein f isnDefined by an extended threshold permutation function. f. ofn(xn) At {0,1}bIs extended upwards to
Figure BDA0003001387390000042
Storing data by b-bit number omega ═ lini+riAnd (4) forming. Thus, fiThe value of (ω) can be expressed as:
Figure BDA0003001387390000043
in the formula, riIs a random number generated by the sender,/iIs a random number, n, generated by the recipientiIs the number of signers.
Example 2:
the intelligent contract is used as an autonomous application program in a block chain, and the embodiment designs a data lake data sharing method by using the characteristic, so that the data lake can be trustingly executed to efficiently and safely share encrypted data information, and the mechanism is shown in fig. 4, and the implementation process is as follows:
step 1: a trusted operating environment needs to be constructed in the data lake to store original data information, and the original data is stored in the data lake after being encrypted. And an Intel SGX framework is utilized to complete trusted computing, wherein only the hash address of the data is stored in the block chain.
Step 2: the intelligent contract is used for providing corresponding access authority, namely, the identity of a data request sender needs to be checked, whether the identity is right to access data or not is determined, and the block link module can reserve data storage interaction and sharing records.
Step 2: providing corresponding access authority by using an intelligent contract, namely, verifying the identity of a data request sender to determine whether the data request sender has the right of data access, wherein a block link module can reserve data storage interaction and sharing records; the specific process is as follows:
when the storage node NqReceiving a message from a storage node NpWhen a data sharing request Req is issued, the data sharing request Req includes contents such as an access address, time, frequency, and the like, and at this time, the storage node NqBeing a data storage party, a storage node NpIs a data sharing requester; storage node NqFor storage node NpAccess constraint condition is established to authorize the access, and the private key SK of the information is usedPIDTo a neighbouring data aggregator BSj
Figure BDA0003001387390000051
Figure BDA0003001387390000052
Figure BDA0003001387390000053
Where t is the timestamp, Cert is the certificate, fPKTo encrypt information using the entity's public key, PK is the public key and SK is the private key.
Data aggregator BSjAfter the information is verified, the information can be stored according to the storage node NqExecuting intelligent contract according to the access constraint condition, locking script according to the existing key, decrypting the shared data packet, and simultaneously utilizing public key
Figure BDA0003001387390000054
And encrypting the ring signature, and then outputting a decryption result of the shared data.
When N is presentqAnd NpWithin the same service scope of the data aggregator, for NpMaking data access to obtain data aggregator BS directlyjThe data to be transmitted; if N is presentqAnd NpIf the data packets are not in the service scope of the same data aggregator, the data packets are transmitted to the distance N by the storage node running the intelligent contract at present in an encrypted mannerpThe most recent data aggregator. The specific process is as follows:
Figure BDA0003001387390000055
Figure BDA0003001387390000056
and step 3: n is a radical ofpAfter receiving the data, the private key decryption party can access the data.
And 4, step 4: various applications are implemented, such as data management systems, data acquisition systems, and the like.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (6)

1.一种基于区块链的电力数据存储方法,将对电力数据存储请求进行应答的存储节点称为数据接收者,将发送电力数据存储请求的请求方称为数据发送者,数据接收者与数据发送者共同连接于一个区块链;其特征在于:具体包括:1. A blockchain-based power data storage method, the storage node that responds to the power data storage request is called the data receiver, the requester that sends the power data storage request is called the data sender, and the data receiver and The data senders are jointly connected to a blockchain; it is characterized in that: it specifically includes: 通过环签名,数据发送者以匿名的方式向区域链广播电力数据存储请求;若存在应答该电力数据存储请求的数据接收者时,数据发送者会接收到该数据接收者的隐身地址,此时,数据发送者产生一个随机值r,将数据接收者的隐身地址与随机值r哈希计算,得出一次性公钥地址P=Hs(rA)G+B,以及计算R=r·G,其中,Hs为加密散列函数{0,1}*,G是基点,(A,B)为数据接收者的公钥地址;将(P,R)信息广播至区块链,并将待存储的电力数据发送至一次性公钥地址,并将该一次性公钥地址的数据记录信息录入区块链;Through the ring signature, the data sender broadcasts the power data storage request to the blockchain in an anonymous way; if there is a data receiver that responds to the power data storage request, the data sender will receive the data receiver's stealth address, at this time , the data sender generates a random value r, hashes the stealth address of the data receiver with the random value r, and obtains the one-time public key address P=H s (rA)G+B, and calculates R=r·G , where H s is the encrypted hash function {0,1} * , G is the base point, (A, B) is the public key address of the data receiver; broadcast (P, R) information to the blockchain, and The power data to be stored is sent to the one-time public key address, and the data record information of the one-time public key address is entered into the blockchain; 当数据接收者接收到(P,R)信息时,根据数据接收者所属的密钥图像,使用其密钥(a,b)哈希计算得到P′=Hs(aR)G+B;判断是否满足P′=P,若满足,则此次存储交互通过,数据接收者通过一次性公钥地址P=Hs(rA)G+B对应的私钥x=Hs(aR)+b对待存储的电力数据进行签名后传送到数据湖;若不满足,则此次存储交互不匹配,不进行数据存储。When the data receiver receives the (P, R) information, according to the key image to which the data receiver belongs, use its key (a, b) hash to calculate P′=H s (aR)G+B; judge Whether P′=P is satisfied, if it is satisfied, the storage interaction is passed, and the data receiver is treated by the private key x=H s (aR)+b corresponding to the one-time public key address P=H s (rA)G+B The stored power data is signed and sent to the data lake; if it is not satisfied, the storage interaction does not match, and no data storage will be performed. 2.根据权利要求1所述的一种基于区块链的电力数据存储方法,其特征在于:所述的数据接收者的隐身地址生成步骤为:2. A block chain-based power data storage method according to claim 1, characterized in that: the stealth address generation step of the data receiver is: 数据接收者生成一个父密钥对,该父密钥对与临时密钥共同组成一次性添加密钥,将该一次性添加密钥发布,发布的一次性添加密钥称为数据接收者的隐身地址。The data receiver generates a parent key pair, which together with the temporary key constitutes a one-time addition key, and publishes the one-time addition key. The published one-time addition key is called the stealth of the data receiver. address. 3.一种基于区块链的电力数据共享方法,其特征在于:包括以下步骤:3. A block chain-based power data sharing method, characterized in that: comprising the following steps: 在数据湖中构建可以信任的运行环境,电力数据信息在加密后存入数据湖,并且利用Intel SGX框架完成可信计算,将电力数据的哈希地址存入区块链内;Build a trustworthy operating environment in the data lake. The power data information is encrypted and stored in the data lake, and the Intel SGX framework is used to complete trusted computing, and the hash address of the power data is stored in the blockchain; 基于智能合约的数据共享算法,对存储在数据湖中的电力数据与各应用程序进行共享。The data sharing algorithm based on smart contracts shares the power data stored in the data lake with various applications. 4.根据权利要求3所述的一种基于区块链的电力数据共享方法,其特征在于:电力数据的共享记录存入区块链内。4. A blockchain-based power data sharing method according to claim 3, wherein the shared record of the power data is stored in the blockchain. 5.根据权利要求3所述的一种基于区块链的电力数据共享方法,其特征在于:所述的基于智能合约的数据共享算法,包括以下步骤:5. A block chain-based power data sharing method according to claim 3, characterized in that: the smart contract-based data sharing algorithm comprises the following steps: 步骤1:当存储节点Nq接收到来自存储节点Np发出的数据共享请求Req时,此时,存储节点Nq为数据存储方,存储节点Np为数据共享请求方;存储节点Nq利用智能合约提供相应的访问权限对存储节点Np制定访问约束条件再授权访问,将访问约束条件的私钥SKPID发送给邻近的数据聚合器BSjStep 1: When the storage node N q receives the data sharing request Req sent from the storage node N p , at this time, the storage node N q is the data storage party, and the storage node N p is the data sharing request party; The smart contract provides corresponding access rights to the storage node Np to formulate access constraints and then authorize access, and sends the private key SK PID of the access constraints to the adjacent data aggregator BS j ; 步骤2:数据聚合器BSj验证信息后根据存储节点Nq制定的访问约束条件执行智能合约,按照已有的密钥将脚本锁定,然后将共享数据包进行解密,同时利用公钥PKNp加密环签名,之后输出共享数据的解密结果;Step 2: After the data aggregator BS j verifies the information, it executes the smart contract according to the access constraints set by the storage node N q , locks the script according to the existing key, and then decrypts the shared data packet and encrypts it with the public key PK Np . Ring signature, and then output the decryption result of the shared data; 步骤3:判断存储节点Nq与存储节点Np是否处于同一数据聚合器BSj的服务范畴内,若处于同一数据聚合器BSj的服务范畴内,则存储节点Np直接获得数据聚合器BSj发送的数据;若不处于同一数据聚合器BSj的服务范畴内,则数据会由目前运行智能合约的存储节点用加密的方式传至距离存储节点Np最近的数据聚合器。Step 3: Determine whether the storage node N q and the storage node N p are within the service scope of the same data aggregator BS j . If they are within the service scope of the same data aggregator BS j , the storage node N p directly obtains the data aggregator BS. If the data sent by j is not within the service scope of the same data aggregator BS j , the data will be encrypted by the storage node currently running the smart contract to the data aggregator closest to the storage node N p . 6.根据权利要求3所述的一种基于区块链的电力数据共享方法,其特征在于:所述数据共享请求Req包括访问地址、时间戳与频次。6 . The method for sharing power data based on blockchain according to claim 3 , wherein the data sharing request Req includes an access address, a timestamp and a frequency. 7 .
CN202110348024.6A 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain Withdrawn CN112948868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110348024.6A CN112948868A (en) 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110348024.6A CN112948868A (en) 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain

Publications (1)

Publication Number Publication Date
CN112948868A true CN112948868A (en) 2021-06-11

Family

ID=76231427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110348024.6A Withdrawn CN112948868A (en) 2021-03-31 2021-03-31 Electric power data storage method and electric power data sharing method based on block chain

Country Status (1)

Country Link
CN (1) CN112948868A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615006A (en) * 2021-12-01 2022-06-10 江苏省电力试验研究院有限公司 Edge layer data security protection method and system for power distribution Internet of things and storage medium
CN116578544A (en) * 2023-07-06 2023-08-11 华北电力大学 Power data sharing method based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615006A (en) * 2021-12-01 2022-06-10 江苏省电力试验研究院有限公司 Edge layer data security protection method and system for power distribution Internet of things and storage medium
CN116578544A (en) * 2023-07-06 2023-08-11 华北电力大学 Power data sharing method based on block chain
CN116578544B (en) * 2023-07-06 2023-10-17 华北电力大学 Power data sharing method based on block chain

Similar Documents

Publication Publication Date Title
Ullah et al. Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment
Maria et al. BBAAS: blockchain‐based anonymous authentication scheme for providing secure communication in VANETs
Chattaraj et al. Block-CLAP: Blockchain-assisted certificateless key agreement protocol for internet of vehicles in smart transportation
CN111147460B (en) A blockchain-based collaborative fine-grained access control method
CN113761582B (en) Group signature-based supervision blockchain transaction privacy protection method and system
TW201933255A (en) Blockchain system and data processing method for blockchain system
CN105873031B (en) Distributed unmanned plane cryptographic key negotiation method based on credible platform
CN114710275B (en) Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment
CN114362993B (en) Block chain assisted Internet of vehicles security authentication method
CN113079132B (en) Mass IoT device authentication method, storage medium, information data processing terminal
CN106941404B (en) Key protection method and device
CN103427998A (en) Internet data distribution oriented identity authentication and data encryption method
WO2021154157A1 (en) Blockchain-based data exchange
Guo et al. Accountable attribute-based data-sharing scheme based on blockchain for vehicular ad hoc network
WO2023040527A1 (en) Blockchain-based network node control method and system and consensus node
CN112118106A (en) A lightweight end-to-end secure communication authentication method based on identification password
CN112948868A (en) Electric power data storage method and electric power data sharing method based on block chain
Zhang et al. Cerberus: Privacy-preserving computation in edge computing
Long et al. Blockchain-based anonymous authentication and key management for internet of things with Chebyshev chaotic maps
CN108933659B (en) An identity verification system and verification method for a smart grid
CN110719167B (en) A time-sensitive signcryption method based on blockchain
Noh et al. Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks
Jiang et al. A distributed internet of vehicles data privacy protection method based on zero-knowledge proof and blockchain
CN114615006A (en) Edge layer data security protection method and system for power distribution Internet of things and storage medium
CN102624748B (en) Peer-to-peer (P2P) network access control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210611

WW01 Invention patent application withdrawn after publication