Abstract
With the proposal of the concept of ubiquitous power Internet of Things and the further promotion of blockchain strategy, modern information technologies such as the Internet of Things and cloud computing have been widely used in the power system. While the power grid is becoming more intelligent, it is also accompanied by the emergence of various security threats, and the power grid will face greater challenges and pressures. In this paper, aiming at the current situation of information security faced by the power grid blockchain under the cloud Internet of Things, a multi-authorization center ciphertext policy attribute encryption access control method is constructed for the power grid blockchain. It adds the function of visitor attribute update revocation, aggregates multi-dimensional data into ciphertext, and uses CP-ABE encryption to implement fine-grained access control at the dimension level. Through experimental analysis, in terms of security and functionality, this method can resist physical collision attacks and manage access rights flexibly. In terms of encryption and decryption efficiency, the encryption and decryption calculation speed of the proposed method is 6.2–15.6% higher than that of the traditional method, and the time consumption efficiency is more than 5% higher than that of other methods. It proves that this model has more advantages for open network environments such as power grid blockchain with high confidentiality requirements and large scale of users. It is of great significance to study the data security and privacy protection methods of the power grid blockchain.
-
Author contributions: All the authors have accepted responsibility for the entire content of this submitted manuscript and approved submission.
-
Research funding: None declared.
-
Conflict of interest statement: The authors declare that there are no conflicts of interest regarding the publication of this paper.
-
Data availability: All datasets generated for this study are included within the article.
References
1. Sun, X, Zhou, X, Chen, Z, Yang, Y. Environmental efficiency of electric power industry, market segmentation and technological innovation: empirical evidence from China [J]. Sci Total Environ 2020;706:135–749. https://doi.org/10.1016/j.scitotenv.2019.135749.Suche in Google Scholar PubMed
2. Zhang, Y, Chen, W, Gao, W. A survey on the development status and challenges of smart grids in main driver countries [J]. Renew Sustain Energy Rev 2017;79:137–47. https://doi.org/10.1016/j.rser.2017.05.032.Suche in Google Scholar
3. Al Khuffash, K. Smart grids—overview and background information [M]. In: Lamont, LA, Sayigh, A, editors. Application of smart grid technologies: Academic Press; 2018:1–10 pp.10.1016/B978-0-12-803128-5.00001-5Suche in Google Scholar
4. Nord, JH, Koohang, A, Paliszkiewicz, J. The Internet of Things: review and theoretical framework [J]. Expert Syst Appl 2019;133:97–108. https://doi.org/10.1016/j.eswa.2019.05.014.Suche in Google Scholar
5. Sakhnini, J, Karimipour, H, Dehghantanha, A, Parizi, RM, Srivastava, G. Security aspects of Internet of Things aided smart grids: a bibliometric survey [J]. Internet Things 2019;25:100–11.Suche in Google Scholar
6. Kimani, K, Oduol, V, Langat, K. Cyber security challenges for IoT-based smart grid networks [J]. Int J Crit Infrastruct Prot 2019;25:36–49. https://doi.org/10.1016/j.ijcip.2019.01.001.Suche in Google Scholar
7. Chiew, KL, Yong, KSC, Tan, CL. A survey of phishing attacks: their types, vectors and technical approaches [J]. Expert Syst Appl 2018;106:1–20. https://doi.org/10.1016/j.eswa.2018.03.050.Suche in Google Scholar
8. Ferrag, MA, Maglaras, LA, Janicke, H, Jiang, J, Shu, L. A systematic review of data protection and privacy preservation schemes for smart grid communications [J]. Sustain Cities Soc 2018;38:806–35. https://doi.org/10.1016/j.scs.2017.12.041.Suche in Google Scholar
9. Hao, J, Huang, C, Ni, J, Rong, H, Xian, M, Shen, X. Fine-grained data access control with attribute-hiding policy for cloud-based IoT [J]. Comput Network 2019;153:1–10. https://doi.org/10.1016/j.comnet.2019.02.008.Suche in Google Scholar
10. Xue, K, Chen, W, Li, W, Hong, J, Hong, P. Combining data owner-side and cloud-side access control for encrypted cloud storage [J]. IEEE Trans Inf Forensics Secur 2018;13:2062–74. https://doi.org/10.1109/tifs.2018.2809679.Suche in Google Scholar
11. Bos, JW, Castryck, W, Iliashenko, I, Vercauteren, F. Privacy-Friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling [C]. AFRICACRYPT 2017;12:184–201.10.1007/978-3-319-57339-7_11Suche in Google Scholar
12. Wang, H, He, D, Zhang, S. Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid [J]. IET Inf Secur 2017;11:131–8. https://doi.org/10.1049/iet-ifs.2016.0150.Suche in Google Scholar
13. Ferrag, MA, Maglaras, L, Ahmim, A. Privacy-preserving schemes for ad hoc social networks: a survey [J]. IEEE Commun Surv Tutorials 2017;19:3015–45. https://doi.org/10.1109/comst.2017.2718178.Suche in Google Scholar
14. Abdallah, A, Shen, XS. Lightweight authentication and privacy-preserving scheme for V2G connections [J]. IEEE Trans Veh Technol 2017;66:2615–29. https://doi.org/10.1109/tvt.2016.2577018.Suche in Google Scholar
15. Saxena, N, Choi, BJ. Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks [J]. IEEE Trans Inf Forensics Secur 2017;11:1438–52.10.1109/TIFS.2016.2532840Suche in Google Scholar
16. Rahman, MS, Basu, A, Kiyomoto, S, Bhuiyan, MZA. Privacy-friendly secure bidding for smart grid demand-response [J]. Inf Sci 2017;379:229–40. https://doi.org/10.1016/j.ins.2016.10.034.Suche in Google Scholar
17. Xue, K, Xue, Y, Hong, J, Li, W, Yue, H, Wei, DSL, et al.. Robust and auditable access control with multiple attribute authorities for public cloud storage [J]. IEEE Trans Inf Forensics Secur 2017;12:953–67. https://doi.org/10.1109/tifs.2016.2647222.Suche in Google Scholar
18. Jiang, Y, Susilo, W, Mu, Y, Guo, F. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing [J]. Future Generat Comput Syst 2018;78:720–9. https://doi.org/10.1016/j.future.2017.01.026.Suche in Google Scholar
19. Xia, Y, Chen, W, Liu, X, Zhang, L, Li, X, Xiang, Y. Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks [J]. IEEE Trans Intell Transport Syst 2017;18:2629–41. https://doi.org/10.1109/tits.2017.2653103.Suche in Google Scholar
20. Guan, Z, Li, J, Wu, L, Zhang, Y, Wu, J, Du, X. Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid [J]. IEEE Internet Things J 2017;4:1934–44. https://doi.org/10.1109/jiot.2017.2690522.Suche in Google Scholar
21. Ashkezari, AD, Hosseinzadeh, N, Chebli, A, Albadi, M. Development of an enterprise Geographic Information System (GIS) integrated with smart grid [J]. SEGAN 2018;14:25–34. https://doi.org/10.1016/j.segan.2018.02.001.Suche in Google Scholar
22. Vahedi, E, Bayat, M, Pakravan, MR, Aref, MR. A secure ECC-based privacy preserving data aggregation scheme for smart grids [J]. Comput Network 2017;129:28–36. https://doi.org/10.1016/j.comnet.2017.08.025.Suche in Google Scholar
© 2022 Walter de Gruyter GmbH, Berlin/Boston
Artikel in diesem Heft
- Frontmatter
- Research Articles
- Accounting for current limitation and input saturation in adaptive nonlinear control of fuel cell power system
- Day-ahead and real-time congestion scheduling method for distribution network with multiple access to electric vehicle charging piles
- A real-time hybrid battery state of charge and state of health estimation technique in renewable energy integrated microgrid applications
- Adaptive Single Carrier Modulation scheme based MLI supported TDVC for Voltage Quality enhancement
- Efficiency analysis of dual motor powertrain with planetary gear set
- Information model of low-voltage distribution IoT monitoring terminal based on IEC 61850
- Most Valuable Player based selective harmonic elimination in a cascaded H-bridge inverter for wide operating range
- A new reduced switch double boost five-level inverter with Self-Balancing of Capacitor Voltage
- Voltage control of standalone photovoltaic – electrolyzer- fuel cell-battery energy system
- Bad data identification and fault diagnosis of smart substation based on secondary system information redundancy
- Fault detection method of digital three-dimensional substation based on singular value decomposition
- Blockchain data privacy protection modeling based on CP-ABE algorithm
Artikel in diesem Heft
- Frontmatter
- Research Articles
- Accounting for current limitation and input saturation in adaptive nonlinear control of fuel cell power system
- Day-ahead and real-time congestion scheduling method for distribution network with multiple access to electric vehicle charging piles
- A real-time hybrid battery state of charge and state of health estimation technique in renewable energy integrated microgrid applications
- Adaptive Single Carrier Modulation scheme based MLI supported TDVC for Voltage Quality enhancement
- Efficiency analysis of dual motor powertrain with planetary gear set
- Information model of low-voltage distribution IoT monitoring terminal based on IEC 61850
- Most Valuable Player based selective harmonic elimination in a cascaded H-bridge inverter for wide operating range
- A new reduced switch double boost five-level inverter with Self-Balancing of Capacitor Voltage
- Voltage control of standalone photovoltaic – electrolyzer- fuel cell-battery energy system
- Bad data identification and fault diagnosis of smart substation based on secondary system information redundancy
- Fault detection method of digital three-dimensional substation based on singular value decomposition
- Blockchain data privacy protection modeling based on CP-ABE algorithm