马鑫堃, 李英娜, 李申章. 基于区块链技术的电网数据隐私保护与共享方法[J]. 电力科学与工程, 2023, 39(5): 1-9.
引用本文: 马鑫堃, 李英娜, 李申章. 基于区块链技术的电网数据隐私保护与共享方法[J]. 电力科学与工程, 2023, 39(5): 1-9.
MA Xinkun, LI Yingna, LI Shenzhang. Grid Data Privacy Protection and Sharing Method Based on Blockchain Technology[J]. Electric Power Science and Engineering, 2023, 39(5): 1-9.
Citation: MA Xinkun, LI Yingna, LI Shenzhang. Grid Data Privacy Protection and Sharing Method Based on Blockchain Technology[J]. Electric Power Science and Engineering, 2023, 39(5): 1-9.

基于区块链技术的电网数据隐私保护与共享方法

Grid Data Privacy Protection and Sharing Method Based on Blockchain Technology

  • 摘要: 针对传统电表数据在传输、存储和共享过程中存在的被篡改和隐私泄露等问题,研究了基于区块链的电网数据隐私保护方法。将区块链技术与Paillier同态加密方法相结合,进行数据的隐私保护与共享;在智能电表端直接对数据进行加密,以防数据被恶意窃听;由台区智能终端聚合台区内电力数据密文,然后上传至云端。在传输过程中,对数据密文进行哈希计算后上链存证,以防止数据被篡改。为提高加解密过程的计算效率,使用中国剩余定理分解了原算法中的模指数运算。经过测试,在满足安全性的前提下,不同的密钥长度加解密计算效率可提升50%~75%,可以满足在边端中直接使用密文数据进行动态定价、电费结算、异常分析等操作的要求。

     

    Abstract: In order to solve the problems of data tampering and privacy leakage in the transmission, storage and sharing of traditional electricity meter data, this paper studies the privacy protection method of power grid data based on blockchain. The blockchain technology is combined with Paillier homomorphic encryption method for data privacy protection and sharing the data, and data is directly encrypted at the smart meter side to prevent maliciously eavesdropping. The ciphertext of power data in the station area is gathered from the smart terminal in the area and then uploaded to the cloud. In the transmission process,the data ciphertext is hashed after the chain stores evidence to prevent data tampering. In order to improve the computational efficiency of the encryption and decryption process, the Chinese remainder theorem is used to decompose the modular exponent operation of the original algorithm. After testing, under the premise of meeting the security, the encryption and decryption calculation efficiency of different key lengths can be improved by 50%~75%, which can meet the requirements of dynamic pricing, electricity bill settlement,abnormal analysis and other operations requirementswith directly using ciphertext data in the edge.

     

/

返回文章
返回