CN113708934A - Energy internet credible interaction data model based on block chain in heterogeneous environment - Google Patents

Energy internet credible interaction data model based on block chain in heterogeneous environment Download PDF

Info

Publication number
CN113708934A
CN113708934A CN202110832952.XA CN202110832952A CN113708934A CN 113708934 A CN113708934 A CN 113708934A CN 202110832952 A CN202110832952 A CN 202110832952A CN 113708934 A CN113708934 A CN 113708934A
Authority
CN
China
Prior art keywords
energy
user
data
identity
alliance chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110832952.XA
Other languages
Chinese (zh)
Inventor
周亮
夏琦
高建彬
刘彦松
朱朝阳
缪思薇
余文豪
张晓娟
戴晗薇
吴丽进
何金栋
吴丹
朱亚运
王海翔
应欢
韩丽芳
曹静怡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
University of Electronic Science and Technology of China
China Electric Power Research Institute Co Ltd CEPRI
Electric Power Research Institute of State Grid Fujian Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
University of Electronic Science and Technology of China
China Electric Power Research Institute Co Ltd CEPRI
Electric Power Research Institute of State Grid Fujian Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, University of Electronic Science and Technology of China, China Electric Power Research Institute Co Ltd CEPRI, Electric Power Research Institute of State Grid Fujian Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202110832952.XA priority Critical patent/CN113708934A/en
Publication of CN113708934A publication Critical patent/CN113708934A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1042Peer-to-peer [P2P] networks using topology management mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an energy internet credible interactive data model based on a block chain in a heterogeneous environment, wherein the heterogeneous environment comprises a management system and subsystem environments thereof in each production link of an energy consumption end, an energy transmission end and an energy production end; the multi-party credible interaction data circulation model comprises identity authentication, identity recognition, identity association, credible transmission and node credit evaluation of a heterogeneous system. The invention aims to solve the problems of unreliable data and easy data tampering caused by complicated cross-domain access flow and low data control strength related to data interaction of a heterogeneous system in an energy Internet environment, is beneficial to improving the trust transfer and data circulation efficiency in the energy Internet and has wide application prospect.

Description

Energy internet credible interaction data model based on block chain in heterogeneous environment
Technical Field
The invention relates to a block chain technology, an energy internet management technology and an identity authentication technology, in particular to an energy internet credible interaction data model based on a block chain in a heterogeneous environment.
Background
The energy internet is used as a comprehensive energy service environment integrating three service forms of an energy combination supply form, a new technology fusion form and an integrated form, and various identity management paradigms of all client service systems exist during information interaction and are not communicated with each other; the multi-dimensional identity authentication is poor in experience and difficult to manage; a lack of trusted evaluation of cross-domain identity management; identity privacy information is subject to misuse and misuse; identity information is easy to copy and forge; once credible authentication cannot be realized in the energy Internet, difficulties are brought to data circulation.
The appearance of the block chain technology compensates for the short boards in the existing energy internet to a certain extent. The block chain technology is essentially a decentralized distributed account book, and can accelerate the transaction processing process, reduce the cost, reduce the number of intermediaries, improve the market insight, increase the business transparency and the like. The method can provide non-tamper property for the data on the chain while ensuring the data security.
The alliance block chain is an information processing technology which uploads data information to distributed nodes after verification through a special algorithm to form a block and chain structure under the condition of not depending on a third party. The alliance chain has strong performance and high requirements on a consensus mechanism, node authentication and network configuration, the admission mechanism ensures that a limited storage space can be reconfigured and fully utilized, and part of nodes are usually selected for maintenance, so that the maintenance cost of data information is reduced while the authority is controlled. Compared with a public chain and a private chain, the alliance chain can set data read-write permission to provide better privacy protection, only part of nodes are authenticated, authentication time is shortened, and flexibility is improved.
The block chain technology can realize the mandatory trust among a plurality of roles and the transparence of transactions among the roles, provides strong technical support in the links of energy transmission, distribution, transaction and the like, the combination of distribution and concentration is a typical mode in the future energy supply field, and the physical characteristics of the decentralized block chain and the distributed power supply also have strong coupling.
Disclosure of Invention
The invention provides an energy internet credible interaction data model based on a block chain in a heterogeneous environment, aiming at the problems of complex identity management caused by a plurality of heterogeneous systems in an energy internet, unreliability of users, misuse of identity privacy information, difficulty in data circulation caused by misuse and the like. The proposed energy alliance chain keeps partial centralized control function, can set different authorities for different organizations and personnel, determines the openness degree according to different application scenes, and is suitable for storing, managing, authorizing and monitoring dynamic data in large-scale enterprise-level network ecology.
The energy internet credible interaction data model based on the block chain in the heterogeneous environment comprises four modules, namely an energy sensing layer, a network transmission layer, a data middle platform layer and an application service layer, wherein a user energy data analysis model is contained in the data middle platform layer;
furthermore, the energy sensing layer comprises an energy internet information system which is composed of an energy edge equipment terminal management system such as an electric power data acquisition terminal management system, a wide area monitoring system, a power failure management system, an electric power physical information system and the like, and is mainly responsible for energy material information acquisition, monitoring, convergence and other links of an energy internet edge end; the energy perception layer standardizes the acquired data before data transmission, standardizes and models the data according to the IEC61850 standard, converts various data files (SCD/CID/SSD) containing a power configuration description language (SCL) into Common Information Model (CIM) files with a uniform format, establishes a data standardization model based on the IEC61850 standard and then performs network transmission.
Further, the network transmission layer comprises a distributed networking mechanism and a data transmission and verification mechanism, a networking mode of a P2P network is adopted, all nodes are mutually communicated in a flat topological structure, and a consensus algorithm is selected for data transmission and verification based on a service consensus requirement; the consensus algorithm supports the parallelization and combination of various consensus algorithms such as a stranded Proof of station (DPOS), a Practical Byzantine Fault-tolerant consensus algorithm (PBFT), a Kafka consensus algorithm (Kafka) and a Raft consensus algorithm. And selecting and combining the consensus algorithm according to index parameters such as the number of nodes, the data volume circulation size and the like in different service scenes to realize efficient node consensus in the energy alliance chain, and then transmitting the node consensus to each data processing center through the power information private network.
Further, the data middle platform layer comprises a storage mode, a calling mode and an integration mode of various data in the energy Internet, and the data are stored by adopting distributed data; various script codes and algorithms of an intelligent contract engine encapsulation block chain platform are business logic and algorithms established on a block chain virtual machine, code execution image-based complete calculation of an intelligent contract can be automatically executed when the intelligent contract is called, essentially, upper-layer business logic is supported, and data is called based on the intelligent contract to effectively ensure the safety and the integrity of the data; the integration of data is embodied as the encapsulation of various libraries.
The credible identity base is accessed based on an authoritative general basic identity information base and is used for providing real information of the user identity, such as a public security population base, a government personnel information base and a national network information base.
The unified identity identification information base stores and maintains unified identification information distributed to new users by the energy alliance chain platform. The functions of cross-domain access, credit evaluation and the like need to call an interface provided by a unified identity library, and the unified identity library is maintained in a distributed manner by each node added in the energy alliance chain. The trusted identity library and the unified identity library can perform an identity verification function in the process that the application service layer user uses the system.
The model base is used for collecting and storing user energy data analysis models, performing energy use behavior analysis according to energy use historical conditions, and building models according to behavior characteristics to realize user behavior understanding. Model prediction can be carried out according to a historical model aiming at a series of behavior operations of a user at a client side in an application service layer, and abnormal behaviors of the user can be found in time.
The credit evaluation algorithm library is used for calculating the credit value of the user in the system. The user can perform credit evaluation while being a service provider or a service receiver to realize the priority of the user in the system.
Further, a function unit is set in a credit evaluation algorithm library to construct a credit evaluation system characteristic function; wherein C is a credit value, G is an arithmetic mean value of the reference index in the latest evaluation times, the number of the evaluation objects can be n, and w is a weight;
credit rating system feature function:
Figure BDA0003176184080000031
the weight value in the characteristic function is determined by an entropy method, and the variation degree of the information obtained by information entropy evaluation is used for reducing the interference of human factors on the evaluation process. In a problem given n evaluation objects and m evaluation indexes, the entropy of the jth index is defined as:
Figure BDA0003176184080000032
wherein E isjEntropy, called j-1, 2,.., m, of the j-th index; x is the number ofijA standard value of the j-th index representing the i-th evaluation object, and assuming that f is smaller than fijWhen equal to 0, Eij0. Then the weight of the jth index is defined as:
Figure BDA0003176184080000033
furthermore, in the application service layer, the customer service systems are various customer service systems including an energy transaction application scene, an electric power internet of things application scene and a state online application scene, namely the customer service systems aiming at the application scenes in each production link of an energy consumption end, an energy transmission end and an energy production end, and cross-domain interaction among the customer service systems realizes efficient operation of various energy material data information streams among departments; cross-domain access between heterogeneous client service systems is realized based on a public-private key mechanism; the method comprises the steps that users of different customer service systems upload system public keys of the users to an energy alliance chain, when cross-domain access to other customer service systems is needed, applications are made to the energy alliance chain, the public keys of the systems are requested to be accessed, and behavior records of the users, including energy use records, cross-domain access records, login logs and the like, are uploaded to the energy alliance chain and cannot be tampered. And the user behavior record is uplink in the energy alliance chain, namely, the behavior trace uplink on the user client system is realized, and the behavior tracing is favorably carried out on abnormal behaviors in the later period.
Further, the user energy data analysis model is constructed according to the behavior records in the energy alliance chain.
Furthermore, the user energy data analysis model is bound with the uniform identity mark, future energy use of the user is analyzed and predicted according to the historical model, user identity verification is conducted when the energy use behavior at the next time is seriously inconsistent with the prediction model, and authenticity of a user node executing the operation behavior in the energy alliance chain platform at this time is determined.
In summary, compared with the prior art, the present invention utilizes the decentralized feature of the block chain technology to realize the real-time information sharing between centralized and distributed types, and the malicious nodes can be effectively prevented from participating in the interaction between systems according to the admission mechanism of the alliance chain; compared with the scheme in the traditional energy Internet, the scheme can realize the forced trust among a plurality of roles and the transparence of the transaction among the roles through the alliance chain, and the trust cost in the energy transmission process is powerfully reduced; meanwhile, the user identity is strongly related to the operation behavior by establishing the user behavior model and the user credible identity model, and the method has outstanding characteristics in the field of identity authentication research of the energy Internet.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts. The above and other objects, features and advantages of the present invention will become more apparent from the accompanying drawings. Like reference numerals refer to like parts throughout the drawings.
FIG. 1 is a block chain-based energy Internet trusted interaction data model diagram in a heterogeneous environment;
FIG. 2 is a flow diagram of the energy federation chain business architecture of the present invention;
FIG. 3 is a diagram of an energy Internet multi-party interaction credible identification model of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention.
The present invention will be described in detail with reference to fig. 1,2 and 3.
Example one
The invention provides an energy internet credible interaction data model based on a block chain in a heterogeneous environment, which comprises the following specific implementation processes:
an energy internet credible interaction data model based on a block chain in a heterogeneous environment is shown in fig. 1 and comprises four modules, namely an energy sensing layer, a network transmission layer, a data middle platform layer and an application service layer, wherein a user energy data analysis model is contained in a data processing layer;
the energy sensing layer comprises an energy internet information system which is composed of an energy edge equipment terminal management system such as an electric power data acquisition terminal management system, a wide area monitoring system, a power failure management system, an electric power physical information system and the like and is mainly responsible for links such as energy material information acquisition, monitoring, convergence and the like of an energy internet edge end; the energy perception layer system standardizes the acquired data before data transmission, standardizes and models the data according to the IEC61850 standard, converts various data files (SCD/CID/SSD) containing a power configuration description language (SCL) into Common Information Model (CIM) files with uniform formats, establishes a data standardization model based on the IEC61850 standard and then performs network transmission.
The network transmission layer comprises a distributed networking mechanism and a data transmission and verification mechanism, a networking mode of a P2P network is adopted, all nodes are mutually communicated in a flat topological structure, and a consensus algorithm is selected for data transmission and verification based on a service consensus requirement; the consensus algorithm supports the parallelization and combination of various consensus algorithms such as a stranded Proof of station (DPOS), a Practical Byzantine Fault-tolerant consensus algorithm (PBFT), a Kafka consensus algorithm (Kafka) and a Raft consensus algorithm. And selecting and combining the consensus algorithm according to index parameters such as the number of nodes and the data flow size in different service scenes to realize efficient node consensus in the energy alliance chain. And then transmitted to each data processing center through a power information private network.
The data middle platform layer comprises a storage mode, a calling mode and an integration mode of various data in the energy Internet, and the data are stored by adopting distributed data; various script codes and algorithms of an intelligent contract engine encapsulation block chain platform are business logic and algorithms established on a block chain virtual machine, code execution image-based complete calculation of an intelligent contract can be automatically executed when the intelligent contract is called, essentially, upper-layer business logic is supported, and data is called based on the intelligent contract to effectively ensure the safety and the integrity of the data; the data integration mode comprises a credible identity library, a unified identity identification library, a model library and a credit evaluation algorithm library.
The credible identity library is accessed based on an authoritative general basic identity information library and is used for providing real information of user identity, such as a public security population library, a government personnel information library and a national network information library;
and the unified identity identification library stores and maintains the unified identification information distributed to the new user by the energy alliance chain platform. The functions of cross-domain access, credit evaluation and the like need to call an interface provided by the unified identity library externally, the unified identity library is maintained in a distributed manner by each node added in the energy alliance chain, and the trusted identity library and the unified identity library can play a role in identity verification in the process of using the system by an application service layer user.
The model base is used for summarizing and storing user energy data analysis models, performing energy use behavior analysis according to energy use historical conditions, establishing a model according to behavior characteristics, realizing user behavior understanding, performing model prediction according to a series of behavior operations of a user at a client side in an application service layer according to a historical model, and finding abnormal behaviors of the user in time;
the credit evaluation algorithm library is used for calculating the credit value of the user in the system. The user can perform credit evaluation as a service provider or a service receiver so as to realize the priority of the user in the system; establishing a function unit for constructing a credit evaluation system characteristic function; wherein C is a credit value, C is an arithmetic mean value of the reference index in the latest evaluation times, the number of the evaluation objects can be n, and w is a weight;
credit rating system feature function:
Figure BDA0003176184080000051
the weight value in the characteristic function is determined by an entropy method, and the variation degree of the information obtained by information entropy evaluation is used for reducing the interference of human factors on the evaluation process. In a problem given n evaluation objects and m evaluation indexes, the entropy of the jth index is defined as:
Figure BDA0003176184080000052
wherein E isjCalled j indexEntropy of 1,2, a, m; x is the number ofijA standard value of the j-th index representing the i-th evaluation object, and assuming that f is smaller than fijWhen equal to 0, Ej0. Then the weight of the jth index is defined as:
Figure BDA0003176184080000061
in the application service layer, the customer service systems are various customer service systems comprising an energy transaction application scene, an electric power Internet of things application scene and a state network online application scene; cross-domain access between heterogeneous customer service systems is achieved based on a public-private key mechanism.
And constructing the user energy data analysis model according to the behavior records in the energy alliance chain.
The user energy data analysis model is bound with the uniform identity, and the user energy data analysis model comprises user behavior understanding, energy use characteristic model construction and energy use behavior analysis; and analyzing and predicting future energy use of the user according to the historical model, verifying the identity of the user when the energy use behavior of the next time is seriously inconsistent with the prediction model, and determining the authenticity of the user node executing the operation behavior in the energy alliance chain platform.
Fig. 2 is a flow chart of an energy federation chain service architecture, and fig. 1 is a block chain-based energy internet multi-party trusted interaction data flow model diagram in a heterogeneous environment, which is a data model abstracted from a service scenario in fig. 2. The energy generation end mainly comprises an information system corresponding to an energy supplier and a management system used for energy collection; the energy supply needs the scheduling and configuration of an energy transmission end, and the accessible platform in the alliance chain comprises an energy transmission system, a configuration system and other business systems related to the energy transmission end; the energy consumption end corresponds to energy transaction and use related to the consumer and comprises various power utilization systems, energy order management systems and other business systems. One user in the energy alliance chain can correspond to the identities in a plurality of customer service systems; when users in different links of an energy consumption end, an energy supply end and an energy distribution end access a service system in other links in a cross-domain mode, uniform identity identification and identity authentication are required.
When a user newly joins in an energy alliance chain, the energy alliance chain platform firstly calls the general basic identity information base to verify the real identity of the user, and the platform distributes uniform identity identification information after the identity verification is passed. And the unified identity information base is used for maintaining and storing.
The energy alliance chain is an alliance block chain consisting of all client service system nodes which are added into an alliance, dynamic adding and quitting of all identity nodes can be achieved, index information of a unified identity information identification library and abstract information of user operation in the energy alliance chain are recorded, and trust endorsements are provided for data of the energy alliance chain. Meanwhile, the alliance chain can execute an intelligent contract, and the functions of part of energy alliance chains can be automatically executed through the intelligent contract.
The user nodes of different customer service systems need to upload system public keys of the user nodes to an energy alliance chain, when cross-domain access to other customer service systems is needed, an application is made to the energy alliance chain, the public keys of the systems are requested to be accessed, and behavior records of the user, including energy use records, cross-domain access records, login logs and the like, are uploaded to the energy alliance chain and cannot be tampered.
The energy internet multi-party interaction credible identity model is shown in fig. 3, and the energy internet multi-party interaction credible identity model in fig. 3 depends on the construction of the unified identity information base and the credible identity base in fig. 1. The global identity unified identification is an identity ID which is assigned to a user by the energy alliance chain and has uniqueness, and meanwhile, a public key of a basic platform system and a private key of the basic platform system are distributed, the private key is stored by the user, and the public key is stored by the energy alliance chain platform.
When a user joins in an energy alliance chain platform, the user must belong to one of the client service systems, so that the user needs to record an ID and a public key in the client service system in a multi-party interactive credible identity model, the private key is stored by the user, and the energy alliance chain platform needs to store the public key of the corresponding client service system.
The energy alliance chain records various behavior records of the user, and generates a user energy data analysis model, in a new transaction, the platform analyzes the behavior understanding of the user through the data analysis model, and if a large deviation from a prediction result occurs, the identity needs to be verified again. And determining the authenticity of the user node executing the operation behavior in the energy alliance chain platform.
Example two
With reference to fig. 2 and fig. 3, the present embodiment is different from the first embodiment in that a cross-domain access function is implemented based on the first embodiment. When two heterogeneous client service systems X and Y in different domains are added into an energy alliance chain, support for alliance unified identity authentication is provided, at the moment, if a user logging in the X system needs to access resources in the Y system in a cross-domain mode, the user can access the resources of the Y system through the energy alliance chain and the unified identity, the user sends a request for accessing the resources of the Y system to the alliance chain in the X system, the request carries a global identity unified identity ID of the user and an identity XID in the X system, and subsystem identities of the X system and the like are stored in a heterogeneous system identity module of a credible identity model. The user signs the request information by using the private key of the user in the X system.
After the alliance chain receives the request, an intelligent contract is triggered, corresponding credible identity identification information can be inquired according to the global identity unified identification ID of the user, public key information related to the X system is inquired according to the XID information to verify the signature of the user, if the verification is passed, a request record with a current timestamp is written into the alliance chain and the credible identity identification model of the user, and finally, the public key PK of the Y system corresponding to the global identity unified identification ID is usedYAnd the timestamp is sent to the X system.
The X system receives a Y system public key PK corresponding to the global identity unified identification IDYAnd sending the usage PK to the Y system after the timestampYEncrypted request information and private key SK of X systemXAnd generating a digital signature, wherein the request information comprises the global identity uniform identification ID of the user.
After the Y system receives the access request, the private key SK is usedYThe plaintext information of the request is obtained and,then sending a request with a global identity unified identification ID to the alliance chain, obtaining the previous X system access request record and the X system public key corresponding to the user, checking whether the access request record is consistent with the received request information, verifying whether the timestamp is overtime, and finally using PKXAnd verifying the signature and checking the integrity of the request information.
And if the request information passes the verification of the Y system, the Y system establishes a safe connection with the X system and sends the resource requested by the user to the X system.
The above detailed description of embodiments of the invention presented in the drawings is not intended to limit the scope of the invention as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

Claims (4)

1. The energy internet credible interaction data model based on the block chain in the heterogeneous environment is characterized by comprising four modules, namely an energy perception layer, a network transmission layer, a data middle platform layer and an application service layer, and a user energy data analysis model is contained in the data middle platform layer:
the energy sensing layer comprises an energy Internet information system which is composed of an electric power data acquisition terminal management system, a wide area monitoring system, a power failure management system and an energy edge equipment terminal management system of an electric power physical information system and is mainly responsible for energy material information acquisition, monitoring and converging links of an energy Internet edge end; the energy perception layer standardizes the acquired data before data transmission, standardizes and models the data according to the IEC61850 standard, converts various SCD/CID/SSD data files containing a power configuration description language (SCL) into Common Information Model (CIM) files with a uniform format, establishes a data standardization model based on the IEC61850 standard and then performs network transmission;
the network transmission layer comprises a distributed networking mechanism and a data transmission and verification mechanism, a networking mode of a P2P network is adopted, all nodes are mutually communicated in a flat topological structure, and a consensus algorithm is selected for data transmission and verification based on a service consensus requirement; the consensus algorithm supports the parallel and combination of a plurality of consensus algorithms, namely a stranded Proof of agreement (DPOS), a Practical Byzantine Fault-tolerant consensus algorithm (PBFT), a Kaffia consensus algorithm (Kafka) and a Raft consensus algorithm, and selects and combines the consensus algorithms according to the number of nodes in different service scenes and the index parameters of the data volume circulation size, so that the efficient node consensus in an energy alliance chain is realized, and then the efficient node consensus is transmitted to each data processing center through a power information private network;
the data middle platform layer comprises a storage mode, a calling mode and an integration mode of various data in the energy Internet, and the data are stored by adopting distributed data; various script codes and algorithms of an intelligent contract engine encapsulation block chain platform are business logic and algorithms established on a block chain virtual machine, code execution image-based complete calculation of an intelligent contract can be automatically executed when the intelligent contract is called, essentially, upper-layer business logic is supported, and data is called based on the intelligent contract to effectively ensure the safety and the integrity of the data; the integration mode of the data is embodied as the encapsulation of various libraries;
the credible identity base is accessed based on an authoritative general basic identity information base and is used for providing real information of the user identity;
the unified identity information base stores and maintains the unified identity information distributed to a new user by the energy alliance chain platform, interfaces provided by the unified identity base need to be called on the realization of cross-domain access and credit evaluation functions, the unified identity base is maintained in a distributed mode by each node added into the energy alliance chain, and the trusted identity base and the unified identity base play a role in identity verification in the process of using the system by an application service layer user;
the model base is used for summarizing and storing user energy data analysis models, performing energy use behavior analysis according to energy use historical conditions, establishing a model according to behavior characteristics, realizing user behavior understanding, performing model prediction according to a series of behavior operations of a user at a client side in an application service layer according to a historical model, and finding abnormal behaviors of the user in time;
the credit evaluation algorithm library is used for calculating the credit value of the user in the system, and the user can perform credit evaluation to realize the priority degree of the user in the system when serving as a service provider or a service receiver;
further, a function unit is set in a credit evaluation algorithm library to construct a credit evaluation system characteristic function; wherein C is a credit value, G is an arithmetic mean value of the reference index in the latest evaluation times, the number of the evaluation objects is n, and w is a weight;
credit rating system feature function:
Figure FDA0003176184070000021
the weight value in the characteristic function is determined by an entropy method, and the variation degree of the obtained information is evaluated by using the information entropy so as to reduce the interference of human factors on the evaluation process; in a problem given n evaluation objects and m evaluation indexes, the entropy of the jth index is defined as:
Figure FDA0003176184070000022
wherein E isjEntropy, called j-1, 2,.., m, of the j-th index; x is the number ofijA standard value of the j-th index representing the i-th evaluation object, and assuming that f is smaller than fijWhen equal to 0, EijWhen it is 0, the weight of the jth index is defined as:
Figure FDA0003176184070000023
in the application service layer, the customer service system is a plurality of customer service systems comprising an energy transaction application scene, an electric power Internet of things application scene and a state online application scene, namely the customer service system aiming at a plurality of application scenes in each production link of an energy consumption end, an energy transmission end and an energy production end, and cross-domain interaction among the customer service systems realizes efficient operation of various energy material data information streams among departments; cross-domain access between heterogeneous client service systems is realized based on a public-private key mechanism; the method comprises the steps that users of different client service systems upload system public keys of the users to an energy alliance chain, when cross-domain access to other client service systems is needed, an application is made to the energy alliance chain, the public keys of the systems are requested to be accessed, behavior records of the users, including energy usage records, cross-domain access records and login logs, are uploaded to the energy alliance chain and cannot be tampered, and the user behavior records are linked up in the energy alliance chain, so that behavior trace chaining on a client system of the users is realized, and behavior tracing is facilitated when abnormal behaviors appear in the later period;
further, the user energy data analysis model is constructed according to the behavior records in the energy alliance chain; and binding the user energy data analysis model with the uniform identity identifier, analyzing and predicting future energy use of the user according to the historical model, verifying the identity of the user when the energy use behavior of the next time is seriously inconsistent with the prediction model, and determining the authenticity of the user node executing the operation behavior in the energy alliance chain platform.
2. The energy internet trusted interaction data model based on the block chain in the heterogeneous environment according to claim 1, wherein the trusted identity library comprises a public security population library, a government personnel information library and a national network information library.
3. The energy internet credible interaction data model based on the block chain in the heterogeneous environment according to claim 2, wherein the energy alliance chain comprises an information system corresponding to an energy supplier and a management system used for energy collection at an energy generation end; the energy supply needs the scheduling and configuration of an energy transmission end, and an accessible platform in the alliance chain comprises an energy transmission system and a service system related to the configuration system at the energy transmission end; the energy consumption end corresponds to energy transaction and use related to the consumer and comprises various power utilization systems and a service system of an energy order management system; one user in the energy alliance chain can correspond to the identities in a plurality of customer service systems; when users in different links of an energy consumption end, an energy supply end and an energy distribution end access a service system in other links in a cross-domain manner, uniform identity identification and identity authentication are required; when a user newly joins in an energy alliance chain, the energy alliance chain platform firstly calls a general basic identity information base to verify the real identity of the user, the platform distributes uniform identity identification information after passing identity verification, and the uniform identity identification information base is used for maintaining and storing; the energy alliance chain is an alliance block chain consisting of all client service system nodes which are added into an alliance, dynamic adding and quitting of all identity nodes can be achieved, index information of a unified identity information identification library and abstract information of operation executed by a user in the energy alliance chain are recorded, trust endorsements are provided for data of the energy alliance chain, meanwhile, intelligent contracts can be executed on the alliance chain, and functions of part of the energy alliance chain can be automatically executed through the intelligent contracts; the user nodes of different customer service systems need to upload system public keys of the user nodes to an energy alliance chain, and when cross-domain access to other customer service systems is needed, an application is made to the energy alliance chain to request access to the public keys of the systems; and uploading the behavior records of the user, including the energy use record, the cross-domain access record and the login log, to an energy alliance chain, wherein the behavior records of the user cannot be tampered.
4. The energy internet trusted interaction data model based on the blockchain in the heterogeneous environment according to claim 3, wherein the energy internet multi-party interaction trusted identity model is constructed by relying on the unified identity information base and the trusted identity base, the global identity unified identity is a unique identity ID distributed to a user by an energy alliance chain, and meanwhile, a basic platform system public key and a basic platform system private key are distributed, the private key is stored by the user, and the public key is stored by an energy alliance chain platform; when a user joins in an energy alliance chain platform, the user must belong to one of the client service systems, so that the user needs to record an ID and a public key in the client service system in a multi-party interactive credible identity identification model, the private key is stored by the user, and the energy alliance chain platform needs to store the public key of the corresponding client service system; the energy alliance chain records various behavior records of the user, a user energy data analysis model is generated, the platform analyzes behavior understanding of the user through the data analysis model in new transaction, if large-amplitude deviation with a prediction result occurs, identity is required to be checked again, and authenticity of a user node executing operation behaviors in the energy alliance chain platform at this time is determined.
CN202110832952.XA 2021-07-22 2021-07-22 Energy internet credible interaction data model based on block chain in heterogeneous environment Pending CN113708934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110832952.XA CN113708934A (en) 2021-07-22 2021-07-22 Energy internet credible interaction data model based on block chain in heterogeneous environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110832952.XA CN113708934A (en) 2021-07-22 2021-07-22 Energy internet credible interaction data model based on block chain in heterogeneous environment

Publications (1)

Publication Number Publication Date
CN113708934A true CN113708934A (en) 2021-11-26

Family

ID=78650318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110832952.XA Pending CN113708934A (en) 2021-07-22 2021-07-22 Energy internet credible interaction data model based on block chain in heterogeneous environment

Country Status (1)

Country Link
CN (1) CN113708934A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499895A (en) * 2022-04-06 2022-05-13 国网浙江省电力有限公司电力科学研究院 Data trusted processing method and system fusing trusted computing and block chain
CN114528346A (en) * 2022-01-27 2022-05-24 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114611979A (en) * 2022-03-24 2022-06-10 北京大学 Block chain-based cross-platform urban service credit evaluation method
CN114760333A (en) * 2022-03-10 2022-07-15 中国电力科学研究院有限公司 Power internet of things data trusted exchange method and system based on alliance link identification service
CN114780968A (en) * 2022-06-23 2022-07-22 国网区块链科技(北京)有限公司 Intelligent contract upgrading method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932373A (en) * 2020-07-01 2020-11-13 国网电力科学研究院有限公司 Intelligent microgrid based on block chain
CN112417037A (en) * 2020-11-05 2021-02-26 杭州云象网络技术有限公司 Block chain construction method for distributed identity authentication in industrial field
CN112989381A (en) * 2021-03-24 2021-06-18 中国电子科技集团公司第三十研究所 Block chain anti-association-based uniform heterogeneous identity identification method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932373A (en) * 2020-07-01 2020-11-13 国网电力科学研究院有限公司 Intelligent microgrid based on block chain
CN112417037A (en) * 2020-11-05 2021-02-26 杭州云象网络技术有限公司 Block chain construction method for distributed identity authentication in industrial field
CN112989381A (en) * 2021-03-24 2021-06-18 中国电子科技集团公司第三十研究所 Block chain anti-association-based uniform heterogeneous identity identification method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘世成;张东霞;朱朝阳;李维东;卢文冰;张敏杰;: "能源互联网中大数据技术思考", 电力系统自动化, no. 08, 25 April 2016 (2016-04-25) *
宫飞翔;田世明;李德智;刘强;马闯;张露露;桂勋;: "基于区块链的需求响应系统设计", 电力信息与通信技术, no. 06, 25 June 2020 (2020-06-25) *
王继业;刘道伟;马世英;张东霞;朱朝阳;郑超;秦晓辉;: "信息驱动的全球能源互联网全景安全防御系统", 电力信息与通信技术, no. 03, 15 March 2016 (2016-03-15) *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114528346A (en) * 2022-01-27 2022-05-24 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114528346B (en) * 2022-01-27 2023-01-13 中科大数据研究院 Method for sharing transaction of multi-source heterogeneous data assets by depending on block chain
CN114760333A (en) * 2022-03-10 2022-07-15 中国电力科学研究院有限公司 Power internet of things data trusted exchange method and system based on alliance link identification service
CN114611979A (en) * 2022-03-24 2022-06-10 北京大学 Block chain-based cross-platform urban service credit evaluation method
CN114499895A (en) * 2022-04-06 2022-05-13 国网浙江省电力有限公司电力科学研究院 Data trusted processing method and system fusing trusted computing and block chain
CN114499895B (en) * 2022-04-06 2022-07-29 国网浙江省电力有限公司电力科学研究院 Data trusted processing method and system fusing trusted computing and block chain
CN114780968A (en) * 2022-06-23 2022-07-22 国网区块链科技(北京)有限公司 Intelligent contract upgrading method and device

Similar Documents

Publication Publication Date Title
CN114065283B (en) Lightweight circularly regenerated blockchain storage method and device
CN113708934A (en) Energy internet credible interaction data model based on block chain in heterogeneous environment
CN109922162B (en) Flat building equipment Internet of things monitoring system and method based on block chain
Ferrag et al. Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges
Shi et al. Blockchain‐based trusted data sharing among trusted stakeholders in IoT
CN111444277B (en) Anti-terrorism information cooperative sharing platform and method based on blockchain technology
CN110099055A (en) Internet of Things service architecture based on lightweight block chain node
CN112463843A (en) Power grid data sharing method and system based on block chain and data resource catalog
CN113438084B (en) Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN105247529A (en) Synchronizing credential hashes between directory services
CN110830251B (en) Method for safely transmitting electricity consumption information in ubiquitous power Internet of things environment
CN112214544A (en) Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN111459461A (en) Energy use right verification and transaction system and method based on Internet of things and block chain technology
Liu et al. A DQN-based consensus mechanism for blockchain in IoT networks
CN110620820A (en) Ubiquitous power Internet of things intelligent management system
CN116366673A (en) Data analysis and sharing method oriented to management of power grid information machine room
CN112307501A (en) Big data system based on block chain technology, storage method and using method
CN112532753A (en) Data synchronization method, device, medium and electronic equipment of block chain system
Qiang et al. Mine consortium blockchain: the application research of coal mine safety production based on blockchain
CN111352999A (en) National data circulation and data right confirming method and platform based on block chain
Gao et al. BFR-SE: a blockchain-based fair and reliable searchable encryption scheme for IoT with fine-grained access control in cloud environment
CN114580011A (en) Power facility security situation sensing method and system based on federal privacy training
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
Li et al. Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud–Edge Computing Environment
Zhang et al. A blockchain-based microgrid data disaster backup scheme in edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination