CN110581757B - 一种隐私保护的低压台区边缘侧用电量数据汇聚方法 - Google Patents

一种隐私保护的低压台区边缘侧用电量数据汇聚方法 Download PDF

Info

Publication number
CN110581757B
CN110581757B CN201910740503.5A CN201910740503A CN110581757B CN 110581757 B CN110581757 B CN 110581757B CN 201910740503 A CN201910740503 A CN 201910740503A CN 110581757 B CN110581757 B CN 110581757B
Authority
CN
China
Prior art keywords
data
edge computing
computing node
master station
power consumption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910740503.5A
Other languages
English (en)
Other versions
CN110581757A (zh
Inventor
汪自翔
洪周真言
刘周斌
韩嘉佳
郭少勇
张江丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Beijing University of Posts and Telecommunications
Electric Power Research Institute of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Beijing University of Posts and Telecommunications
Electric Power Research Institute of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd, Beijing University of Posts and Telecommunications, Electric Power Research Institute of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN201910740503.5A priority Critical patent/CN110581757B/zh
Publication of CN110581757A publication Critical patent/CN110581757A/zh
Application granted granted Critical
Publication of CN110581757B publication Critical patent/CN110581757B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

本发明公开了一种隐私保护的低压台区边缘侧用电量数据汇聚方法。现有的边缘数据汇集方式要求边缘计算节点获取各用户的用电量,一旦边缘计算节点遭到攻击,会造成用户用电量数据的泄露。本发明采用的技术方案为:电表中的用户用电量数据密文发送给边缘计算节点,边缘计算节点通过同态加密机制,对密文进行代数运算后实现用户用电量数据的汇集,并将汇聚后的数据上传至主站;所述的主站利用私钥对汇聚后的数据进行解密,得到边缘计算节点所连接的所有电表的用电量总和。本发明可以有效降低电表与集中器之间的通信量,并且用户用电数据在通信过程中始终以密文的方式传输,保障了数据的安全。

Description

一种隐私保护的低压台区边缘侧用电量数据汇聚方法
技术领域
本发明属于电力电表数据处理领域,具体地说是一种隐私保护的低压台区边缘侧用电量数据汇聚方法。
背景技术
目前低压台区用户总用电量计算主要在主站侧实现。电表数据通过集中器上传至主站,主站通过累加台区下所有用户用电量,计算总用电量。由于通信带宽的限制,目前数据上送周期最短为15分钟。
为了进一步提升负荷响应的实时性,通常希望能进一步缩短低压台区用户总用电量计算的周期,可以在低压台区部署边缘计算节点,由边缘计算节点通过本地通信网络获取到电表中的用户用电量数据报文的密文。边缘计算节点对密文进行解密得到用户用电量数据,经过求和运算可以得到对应用户的总用电量,并将总用电量通过加密通道上传至主站,从而减少数据传输量。
现有的边缘数据汇集方式要求边缘计算节点获取各用户的用电量,一旦边缘计算节点遭到攻击,会造成用户用电量数据的泄露。
发明内容
本发明所要解决的技术问题是克服上述现有技术存在的缺陷,提供一种隐私保护的低压台区边缘侧用电量数据汇聚方法,以有效降低电表与集中器之间的通信量,并且用户用电数据在通信过程中始终以密文的方式传输,以保障数据的安全。
为此,本发明采用如下的技术方案:一种隐私保护的低压台区边缘侧用电量数据汇聚方法,电表中的用户用电量数据密文发送给边缘计算节点,边缘计算节点通过同态加密机制,对密文进行代数运算后实现用户用电量数据的汇聚,并将汇聚后的数据上传至主站;所述的主站利用私钥对汇聚后的数据进行解密,得到边缘计算节点所连接的所有电表的用电量总和。
本发明可以有效降低电表与集中器之间的通信量,并且用户用电数据在通信过程中始终以密文的方式传输,保障了数据的安全。
进一步的,所述的主站根据边缘计算节点提供的汇聚数据计算台区总用电量。
进一步的,由信任中心生成边缘计算节点、电表、主站的密钥、公钥以及一些公共参数,并通过安全通道将公共参数和公钥发送给主站,将公共参数和私钥发送给各个边缘计算节点和电表。
更进一步的,信任中心生成公共参数、公钥和私钥的步骤包括:
1)用Ts表示电表上传用电量数据的时间间隔,用Pmax表示台区N个电表中的最大用电量,Pmax由主站根据历史数据计算得到并通过安全通道发送给信任中心;
2)选择两个安全素数p=2p'+1,q=2q'+1,满足如下条件:
a)p',q'也为素数,
b)n=pq,并且n>NPmax
3)计算p-1,q-1的最小公倍数:
λ=lcm(p-1,q-1)=2p'q';
4)生成N+1个随机数
Figure GDA0003023474510000021
并且满足:
Figure GDA0003023474510000022
5)选择哈希散列函数
Figure GDA0003023474510000023
表示不大于n的正整数;
6)构造公共参数{H,Ts}、电表Dij的私钥{n,rij}、边缘计算节点私钥{n,rN+1}和主站公钥{n,r0,λ},将公共参数{H,Ts}和电表Dij的私钥{n,rij}通过安全通道下发给电表,将公共参数{H,Ts}和边缘计算节点私钥{n,rN+1}通过安全通道下发给边缘计算节点,将公共参数{H,Ts}和公钥{n,r0,λ}通过安全通道发送给主站。
更进一步的,台区用电量数据汇集的步骤如下:
1)用xij表示电表Dij在[kTs,(k+1)Ts]时间段内的用电量数据,采用如下方式对xij进行加密:
Figure GDA0003023474510000024
其中,cijk为[kTs,(k+1)Ts]时间段内对xij加密后的密文;k表示第k个时间段;
2)将密文cijk发送给边缘计算节点;
3)在[kTs,(k+1)Ts]时间段内,边缘计算节点Ei收集其连接得到Ni个电表的用电量数据密文
Figure GDA0003023474510000031
并做如下聚合变换:
Figure GDA0003023474510000032
4)边缘计算节点将Cik通过电力通信网发送给主站。
更进一步的,主站数据解密及总用电量计算的步骤如下:
1)主站利用公钥{n,r0,λ}对Cik做如下计算:
Figure GDA0003023474510000033
2)由于
Figure GDA0003023474510000034
表示不大于n2的正整数,
Figure GDA0003023474510000035
前式进一步表示为:
Figure GDA0003023474510000036
3)由于
Figure GDA0003023474510000037
因此前式进一步表示为:
Figure GDA0003023474510000038
4)得到在时间段[kTs,(k+1)Ts]内,边缘计算节点Ei连接的电表所对应的用电量总和为:
Figure GDA0003023474510000039
Ei中的i=1,2,...,M,M表示低压台区部署的边缘计算节点数量;
5)在时间段[kTs,(k+1)Ts]内,台区下用户用电量的总和为:
Figure GDA0003023474510000041
本发明具有以下优点:
1.边缘计算节点对用电量数据进行了汇聚,并将汇聚后的结果发送给主站,有效降低了通信量;
2.边缘计算节点直接对用户用电量数据密文进行汇聚,不做解密,保障了数据的安全;
3.加密过程中用到了时间戳,可以使***抵御重放攻击。
附图说明
图1为本发明低压配电台区的拓扑结构;
图2为本发明低压配电台区电表用电数据汇聚过程图。
具体实施方式
为使本发明的目的、技术方案和优点表达的更加清晰、明白,下面结合附图及具体实方式对本发明再做进一步详细的说明。
为减少电表与主站的数据通信量,可以在低压台区部署一些边缘计算节点,边缘计算节点将汇聚后的数据上传至主站。低压配电台区***(简称***)的总体架构如图1所示。用M表示低压台区部署的边缘计算节点数量,用N表示低压台区用户电表的总量,用Ei(i=1,2,...,M)表示第i个边缘计算节点。边缘计算节点Ei下连接着Ni个电表,用Dij表示连接到Ei的第j个电表,
Figure GDA0003023474510000042
Ei(i=1,2,...,M)汇聚其连接的电表的用电量数据密文,在未对密文进行解密的前提下,对密文进行一些变换形成汇聚数据,并将汇聚数据发送给主站。由信任中心生成边缘计算节点、电表、主站的密钥以及一些***公共参数,并通过安全通道将公共参数、公钥发送给主站,将公共参数、私钥发送给各个边缘计算节点和电表。
低压配电台区电表用电数据汇聚过程如图2所示,II型集中器将表箱内的数据发送给边缘计算节点,边缘计算节点对II型集中器下所连接的电表用电量数据进行汇聚后发送给主站。用M表示低压台区部署的边缘计算节点数量,用N表示低压台区用户电表的总量,用Ei(i=1,2,...,M)表示第i个边缘计算节点。边缘计算节点Ei下连接着Ni个电表,用Dij表示连接到Ei的第j个电表,
Figure GDA0003023474510000051
对于低压台区,用户用电量数据汇聚的步骤如下:
1.信任中心生成***公共参数、公钥、私钥
(1)用Ts表示电表上传用电量数据的时间间隔,用N表示台区下电表的总量,用Pmax表示台区N个电表中的最大用电量,Pmax由主站根据历史数据计算得到并通过安全通道发送给信任中心。
(2)选择两个安全素数p=2p'+1,q=2q'+1满足如下条件:
(a)p',q'也为素数;
(b)n=pq,并且n>NPmax
(3)计算p-1,q-1的最小公倍数:
λ=lcm(p-1,q-1)=2p'q' (1)
(4)生成N+1个随机数
Figure GDA0003023474510000052
并且
Figure GDA0003023474510000053
满足
Figure GDA0003023474510000054
(5)选择哈希散列函数
Figure GDA0003023474510000055
(6)构造***公共参数{H,Ts}、电表Dij的私钥{n,rij}、边缘计算节点私钥{n,rN+1}和主站公钥{n,r0,λ},将公共参数{H,Ts}和电表Dij的私钥{n,rij}通过安全通道下发给电表,将公共参数{H,Ts}和边缘计算节点私钥{n,rN+1}通过安全通道下发给边缘计算节点,将公共参数{H,Ts}和公钥{n,r0,λ}通过安全通道发送给主站。
2.台区用电量数据汇集
(1)用xij表示电表Dij在[kTs,(k+1)Ts]时间段内的用电量数据,采用如下方式对xij进行加密:
Figure GDA0003023474510000061
其中,cijk为[kTs,(k+1)Ts]时间段内对xij加密后的密文。
(2)将密文cijk发送给边缘计算节点。
(3)在[kTs,(k+1)Ts]时间段内,边缘计算节点Ei收集其连接得到Ni个电表的用电量数据密文
Figure GDA0003023474510000062
并做如下聚合变换
Figure GDA0003023474510000063
(4)边缘计算节点将Cik通过电力通信网发送给主站。
3.主站数据解密及总用电量计算
(1)主站利用公钥{n,r0,λ}对Cik做如下计算
Figure GDA0003023474510000064
Figure GDA0003023474510000065
Figure GDA0003023474510000066
Figure GDA0003023474510000067
(2)由于
Figure GDA0003023474510000068
式(8)可进一步表示为
Figure GDA0003023474510000069
(3)由于
Figure GDA00030234745100000610
因此前式进一步表示为:
Figure GDA00030234745100000611
(4)可以得到在时间段[kTs,(k+1)Ts]内,边缘计算节点Ei连接的电表所对应的用电量总和为
Figure GDA0003023474510000071
(5)在时间段[kTs,(k+1)Ts]内,台区下用户用电量的总和为
Figure GDA0003023474510000072
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。

Claims (1)

1.一种隐私保护的低压台区边缘侧用电量数据汇聚方法,其特征在于,电表中的用户用电量数据密文发送给边缘计算节点,边缘计算节点通过同态加密机制,对密文进行代数运算后实现用户用电量数据的汇聚,并将汇聚后的数据上传至主站;所述的主站利用私钥对汇聚后的数据进行解密,得到边缘计算节点所连接的所有电表的用电量总和;
由信任中心生成边缘计算节点、电表、主站的私钥、公钥以及一些公共参数,并通过安全通道将公共参数和公钥发送给主站,将公共参数和私钥发送给各个边缘计算节点和电表;
信任中心生成公共参数、公钥和私钥的步骤包括:
1)用Ts表示电表上传用电量数据的时间间隔,用N表示台区下用户电表的总量,用Pmax表示台区N个电表中的最大用电量,Pmax由主站根据历史数据计算得到并通过安全通道发送给信任中心;
2)选择两个安全素数p=2p'+1,q=2q'+1,满足如下条件:
a)p',q'也为素数,
b)n=pq,并且n>NPmax
3)计算p-1,q-1的最小公倍数:
λ=lcm(p-1,q-1)=2p'q';
4)生成N+1个随机数
Figure FDA0003023474500000014
并且满足:
Figure FDA0003023474500000011
5)选择哈希散列函数
Figure FDA0003023474500000012
Figure FDA0003023474500000013
表示不大于n的正整数;
6)构造公共参数{H,Ts}、电表Dij的私钥{n,rij}、边缘计算节点私钥{n,rN+1}和主站公钥{n,r0,λ},将公共参数{H,Ts}和电表Dij的私钥{n,rij}通过安全通道下发给电表i,将公共参数{H,Ts}和边缘计算节点私钥{n,rN+1}通过安全通道下发给边缘计算节点,将公共参数{H,Ts}和公钥{n,r0,λ}通过安全通道发送给主站;
台区用电量数据汇集的步骤如下:
1)用xij表示电表Dij在[kTs,(k+1)Ts]时间段内的用电量数据,采用如下方式对xij进行加密:
Figure FDA0003023474500000028
其中,cijk为[kTs,(k+1)Ts]时间段内对xij加密后的密文;k表示第k个时间段;
2)将密文cijk发送给边缘计算节点;
3)在[kTs,(k+1)Ts]时间段内,边缘计算节点Ei收集其连接得到Ni个电表的用电量数据密文
Figure FDA0003023474500000029
并做如下聚合变换:
Figure FDA0003023474500000021
4)边缘计算节点将Cik通过电力通信网发送给主站;
主站数据解密及总用电量计算的步骤如下:
1)主站利用公钥{n,r0,λ}对Cik做如下计算:
Figure FDA0003023474500000022
2)由于
Figure FDA0003023474500000023
Figure FDA0003023474500000024
表示不大于n2的正整数,
Figure FDA0003023474500000025
前式进一步表示为:
Figure FDA0003023474500000026
3)由于
Figure FDA0003023474500000027
因此前式进一步表示为:
Figure FDA0003023474500000031
4)得到在时间段[kTs,(k+1)Ts]内,边缘计算节点Ei连接的电表所对应的用电量总和为:
Figure FDA0003023474500000032
Ei中的i=1,2,...,M,M表示低压台区部署的边缘计算节点数量;
5)在时间段[kTs,(k+1)Ts]内,台区下用户用电量的总和为:
Figure FDA0003023474500000033
CN201910740503.5A 2019-08-12 2019-08-12 一种隐私保护的低压台区边缘侧用电量数据汇聚方法 Active CN110581757B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910740503.5A CN110581757B (zh) 2019-08-12 2019-08-12 一种隐私保护的低压台区边缘侧用电量数据汇聚方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910740503.5A CN110581757B (zh) 2019-08-12 2019-08-12 一种隐私保护的低压台区边缘侧用电量数据汇聚方法

Publications (2)

Publication Number Publication Date
CN110581757A CN110581757A (zh) 2019-12-17
CN110581757B true CN110581757B (zh) 2021-07-06

Family

ID=68810564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910740503.5A Active CN110581757B (zh) 2019-08-12 2019-08-12 一种隐私保护的低压台区边缘侧用电量数据汇聚方法

Country Status (1)

Country Link
CN (1) CN110581757B (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800787B (zh) * 2020-06-03 2021-07-06 国网浙江省电力有限公司电力科学研究院 隐私保护的传感器网络分散式参数估计方法

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577356A (zh) * 2015-12-17 2016-05-11 西安电子科技大学 基于对用户隐私保护的智能电网中数据收集方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6017336B2 (ja) * 2013-02-12 2016-10-26 株式会社東芝 データ管理装置および電力使用量計算システム
CN105959153B (zh) * 2016-06-23 2019-06-18 华北电力大学 保护用电隐私且带有容错机制的用电数据采集方法及***

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577356A (zh) * 2015-12-17 2016-05-11 西安电子科技大学 基于对用户隐私保护的智能电网中数据收集方法

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
周华.智能电网中用户多维数据聚合研究.《CNKI中国硕士学位论文全文数据库信息科技辑》.2018, *
基于同态加密算法的欧氏距离外包计算协议;柳玉东,王绪安,高忠石;《万方》;20190510;第3章 *
智能电网中用户多维数据聚合研究;周华;《CNKI中国硕士学位论文全文数据库信息科技辑》;20180415;第2.2节、第三章、第四章 *

Also Published As

Publication number Publication date
CN110581757A (zh) 2019-12-17

Similar Documents

Publication Publication Date Title
WO2021227241A1 (zh) 智能电网中抗密钥泄露的加密数据聚合的统计分析方法
CN110138538B (zh) 基于雾计算的智能电网安全与隐私保护数据聚合方法
Zhang et al. A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain
Li et al. Secure information aggregation for smart grids using homomorphic encryption
Ruj et al. A decentralized security framework for data aggregation and access control in smart grids
Erkin et al. Private computation of spatial and temporal power consumption with smart meters
Fouda et al. A lightweight message authentication scheme for smart grid communications
Mohammed et al. Efficient privacy-preserving data collection scheme for smart grid AMI networks
Mahmoud et al. Privacy-preserving power injection over a hybrid AMI/LTE smart grid network
CN110650116B (zh) 一种面向安全智能电网的多类型多维数据聚合方法
Kamto et al. Light-weight key distribution and management for advanced metering infrastructure
Saputro et al. Performance evaluation of smart grid data aggregation via homomorphic encryption
CN105812128B (zh) 一种智能电网抗恶意数据挖掘攻击的数据聚合方法
CN105577357A (zh) 基于全同态加密的智能家居数据隐私保护方法
Zhang et al. PARK: A privacy-preserving aggregation scheme with adaptive key management for smart grid
CN112468445A (zh) 一种面向电力物联网的ami轻量级数据隐私保护方法
CN110489982A (zh) 一种具有前向安全性的智能电网数据聚合和加密方法
CN104125074A (zh) 一种智能电网中具有隐私保护的计费方法
Cali et al. Digitalization of power markets and systems using energy informatics
CN110581757B (zh) 一种隐私保护的低压台区边缘侧用电量数据汇聚方法
CN117560143A (zh) 一种支持隐私保护的智能电网多维数据自适应高效聚合方法、***、设备及介质
CN112887095B (zh) 基于区块链的智能电网二级网络下数据隐私保护聚合方法
CN108964894B (zh) 一种基于状态估计且具备隐私保护的电网盗电检测方法
CN115913788A (zh) 一种用于智能电网的差分隐私保护方法和装置
Wei-jing et al. A homomorphic encryption-based privacy preserving data aggregation scheme for smart grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200909

Address after: The eight district of Hangzhou city in Zhejiang province 310014 Huadian Zhaohui under No. 1 Lane

Applicant after: ELECTRIC POWER SCIENTIFIC RESEARCH INSTITUTE OF STATE GRID ZHEJIANG ELECTRIC POWER Co.,Ltd.

Applicant after: Beijing University of Posts and Telecommunications

Applicant after: STATE GRID ZHEJIANG ELECTRIC POWER Co.,Ltd.

Address before: The eight district of Hangzhou city in Zhejiang province 310014 Huadian Zhaohui under No. 1 Lane

Applicant before: ELECTRIC POWER SCIENTIFIC RESEARCH INSTITUTE OF STATE GRID ZHEJIANG ELECTRIC POWER Co.,Ltd.

Applicant before: STATE GRID ZHEJIANG ELECTRIC POWER Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant