CN106375344A - Intelligent grid load integrity attack detection method for cloud storage - Google Patents
Intelligent grid load integrity attack detection method for cloud storage Download PDFInfo
- Publication number
- CN106375344A CN106375344A CN201610943338.XA CN201610943338A CN106375344A CN 106375344 A CN106375344 A CN 106375344A CN 201610943338 A CN201610943338 A CN 201610943338A CN 106375344 A CN106375344 A CN 106375344A
- Authority
- CN
- China
- Prior art keywords
- data
- cloud storage
- person
- block
- analysiss
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides an intelligent grid load integrity attack detection method for cloud storage, thereby guaranteeing secure and stable operation of the power system. According to the technical scheme, a data collector encrypts grid load data collected by an intelligent instrument and then the encrypted data are stored into a cloud storage unit dynamically by a cloud; a data analyst initiates a verification attack; the cloud storage unit generates a verification evidence; and then the data analyst carries out attach verification and decides whether to carry out an analysis operation or a re collection operation on data in the cloud storage unit based on the verification result. According to the invention, the system measuring value is protected by using an encryption technology, thereby reducing the measuring value redundancy, shortening attach detection time, and preventing a false data injection attack. On the basis of the cloud storage technology, the collected massive system measuring values are stored into the cloud and thus the load integrity attack detection is suitable for large-scale data, thereby guaranteeing secure and stable operation of the power system.
Description
Technical field
The present invention relates to a kind of be based on cryptographic load integrity attack detection method, belong to detection technique field.
Background technology
Under the situation that intelligent grid deeply advances, the digitized of power system, information-based and intellectuality fast development.Intelligence
The application of energy transformer station, intelligent electric meter, real-time monitoring system, the mobile examination and repair system in scene, measurement and control integration system etc., makes data
Scale and species rapid growth.Cloud storage technology is by functions such as cluster application, network technology or distributed file systems,
Physical memory resources seamless integration in cluster is unified storage system, such that it is able to store the big number in intelligent grid
According to.Load data is mainly derived from the systems such as power information acquisition system, load control system, Power Quality Detection, is load
Prediction and the basis of Load Characteristic Analysis, are also basis Demand-side being carried out with load adjustment with controlling.In such as power system
The fluctuation of load changes, it will change operating frequency and the electric pressure of electrical network.The complete sexual assault of load is for system mode
The new attack method estimated.Attacker passes through to gather and analyze the data of intelligence instrument, injects after pre-establishing false data,
Thus effectively bypassing detection and the defence of system, the result of impact system state estimation, and then so that control centre is made mistake
System running state and do the decision-making making mistake, also can mislead system enter a unsafe mode of operation, lead in portion
Divide load on transmission line can exceed that ability to bear.Therefore, in the environment of intelligent grid, the data leakage that analysis system exists
Hole, the corresponding detection of research and prevention method, have important theory and realistic meaning.
The prevention method that many scholars attack to load data is studied, and achieves a series of achievement in research, such as
By protecting one group of measuring value come security from attacks;To protect by way of for each direction of energy measuring value add-on security index
Measuring value;To select a subset measuring using greedy algorithm, by increasing the quantity of the measuring value detecting, identification injection
False data is attacked;Method with support vector machine svm carries out abnormality detection etc..But these methods all exist such or such
Deficiency, such as cause measuring value redundancy to a certain extent;It is only applicable to traditional false data injection attacks it is difficult to adapt to big
Scale data etc. is it is impossible to ensure the safety and stablization operation of power system.
Content of the invention
Present invention aims to the drawback of prior art, provide a kind of intelligent grid load towards cloud storage complete
Whole sexual assault detection method, is run with the safety and stablization guaranteeing power system.
Problem of the present invention is to be solved with following technical proposals:
A kind of intelligent grid load integrity attack detection method towards cloud storage, methods described is first by data acquisition
After the network load data encryption that intelligence instrument is collected by person, by cloud dynamical save to cloud storage;Then divided by data
Analysis person initiates checking and attacks;And then experimental evidence is generated by cloud storage;Finally carry out attacking checking by data analysiss person, and according to
Determine the data in cloud storage is analyzed with operation or Resurvey operation according to the result.
The above-mentioned intelligent grid load integrity attack detection method towards cloud storage, methods described is entered according to the following steps
OK:
A. data acquisition person carries out pretreatment operation to the data that intelligence instrument gathers, and various data structures are processed into
Cim/xml form, and file is carried out with piecemeal operation:
Data acquisition person, by after the data acquisition in intelligence instrument, is processed into cim/xml the data of various structures first
Data file form f, and file f is divided into n sub-block, obtain sub-block mi(1≤i≤n), then each partition be
K basic block, obtains basic block mi,j(1≤i≤n.1≤j≤k), builds a state table s-table and records all of sub-block
mi;
B. data acquisition person carries out initialization operation, the label information of generation public key and private key and each basic block:
Data acquisition person calls key schedule to generate public key pk=(e, n) and private key sk=d, and public key is open, private key
Oneself preserves;And generate each basic block mi,jThe label information t of (1≤i≤n.1≤j≤k)i,j:
Two Big prime that wherein n=p × q, p and q are randomly generated, and p ≠ q, φ (n)=(p-1) (q-1), at random
Number e ∈ [0, φ (n) -1], and relatively prime with φ (n), d meets ed ≡ 1 (mod φ (n)), and h () is homomorphism hash function, f ()
It is pseudo-random function;
Data acquisition person is associated with the label information of sub-block and sub-block on s-table, file f and contingency table s-
Table uploads in cloud storage and preserves, and the s-table person that shares to data analysiss;
C. data analysiss person initiates to verify and attacks:
Data analysiss person randomly chooses a coefficient c (1≤c≤n) and is sent to cloud storage, after cloud storage receives c,
Find corresponding c-th sub-block, and the label information t of the basic block comprising according to sub-blocki,jIt is calculated the label letter of sub-block
Breath ti:
Data analysiss person generates random number r ∈ [1,2k- 1] and attack checking request chal={ r, c };
D. cloud storage generation experimental evidence r:
Cloud storage calculates:
er=ermodn
And calculate output experimental evidence:
Then by the label information t of sub-blockiWith the experimental evidence r person that is sent to data analysiss;
E. data analysiss person carries out attacking and verifies:
Data analysiss person is by experimental evidence r, the public key pk of file to be detected, sub-block miLabel information tiAnd checking please
Seek chal, calculate:
N is the parameter in public key pk, tiIt is the label of i-th data block, with ttIt is a meaning, representative is t-th number
Label according to block;
Wherein, t, 1≤t≤c is the data block number randomly drawed, tt rIt is that any one data block uses random number r to generate
Label information;
Data analysiss person is the correct checking information of file generated to be detected:
R'=trmodn
Wherein, trIt is total label information of the data genaration extracting, compare whether equation r'=r sets up;
Verify correct checking information r' that the experimental evidence r data analyst that generated by cloud storage generates whether phase
Deng, if r'=r illustrate cloud storage in measuring value correctly stored, data analysiss person can download safely the measurement of needs
Value, then carries out system mode analysis;Otherwise the measuring value in explanation cloud storage has been tampered or has deleted, data analysiss person
May require that data acquisition person's Resurvey data.
The above-mentioned intelligent grid load integrity attack detection method towards cloud storage, when there being data analysiss, person needs simultaneously
When carrying out m integrality verification request, then using the method for batch checking:
First, data analysiss person sends m checking request { chal } to cloud storage;Secondly, cloud storage receives to be tested
After card request, it is respectively each checking request and generates experimental evidence rm, andFinally, data analysiss person generates and tests
Card information r'm, andIntegrity further according to r' and r whether equal checking data.
The present invention passes through encryption technology protection system measuring value, reduces measuring value redundancy, reduces the time of attack detecting, prevents
Only false data injection attacks.The method passes through cloud storage technology, the magnanimity collecting system quantities measured value is stored to high in the clouds, makes
Load integrity attack detecting is applied to large-scale data, ensures that the safety and stablization of power system are run.
Brief description
Fig. 1 is the detection model Organization Chart of the present invention;
Fig. 2 is flow chart of the present invention;
Fig. 3 is sub-block size and required time relation;
Fig. 4 is that this paper algorithm was compared with the extreme learning machine proving time.
The each label of in figure is expressed as: miFor sub-block, mi,jFor basic block, pk is public key, and sk is private key, ti,jFor mi,j
Label information, two Big prime that p and q is randomly generated, h () be homomorphism hash function, f () is pseudo-random function, c
For the coefficient randomly choosing, tiFor the label information of sub-block, r is that cloud storage generates random number, and r is experimental evidence, and chal is
Checking request,It is any one data block using the correct verification letter that the label information r' that random number r generates is file to be detected
Breath, trIt is total label information of the data genaration extracting.
Specific embodiment
The invention will be further described below in conjunction with the accompanying drawings.
1. load integrity Attack Detection Model Based design
The entity of load complete sexual assault (loadintegrityattack, lia) detection model is broadly divided into three portions
Point: data acquisition person;Cloud storage;Data analysiss person.Collector, after the measuring value encryption collecting in intelligence instrument, is led to
Cross cloud dynamical save to cloud storage, power system can carry out integrity by data analysiss person to the data in cloud storage and test
Card.After being proved to be successful, state estimation is carried out to the data and information of correct storage, thus effectively stoping false data from being injected into
In intelligence instrument.Lia detection model framework is as shown in Figure 1.
Lia detects and is broadly divided into following three step:
(1) measuring value gathering in intelligence instrument is stored cloud storage by data acquisition person, and high in the clouds is processed and amount of storage
Measured value.
(2) data analysiss person can carry out load integrity verification to the measuring value in cloud storage.
(3), when being verified, data analysiss person with downloading data and can carry out system mode analysis;When checking is not passed through
When, then prove that the data in cloud storage is incorrect, can search wrong data or even Resurvey.
2.lia detection algorithm design philosophy
Load integrity attack detecting algorithm (load integrity attack attack detection, lia-ad)
Flow chart as shown in Figure 2.First pretreatment operation is carried out to the data of collection, various data structures are processed into cim/xml
Form, and piecemeal operation is carried out to file.Secondly data acquisition person carries out initialization operation, generate public key and private key and each
The label information of basic block.Then initiate checking by data analysiss person to attack, verify that the measuring value being stored in cloud storage is
No complete.And then cloud storage generates experimental evidence.Final data analyst carries out attacking checking, and determines according to the result
Data in cloud storage is analyzed with operation or Resurvey operation.
3.lia-ad arthmetic statement
(1) pretreatment
Data acquisition person after the data acquisition in intelligence instrument, will call key schedule to generate key parameter, public key
Open, private key oneself preserves.First the data of various structures is processed into cim/xml data file form f, and f is divided into n
Individual sub-block, obtains sub-block mi(1≤i≤n).Then each partition be k basic block, obtain basic block mi,j(1≤i≤
n.1≤j≤k).Build a state table s-table and record all of sub-block mi, as shown in table 1.
The structure of table 1 table s-table
Wherein, fb represents sub-block, and bn represents the physics sequence number of sub-block, and sn represents the insertion sequence of sub-block.Cloud storage is deposited
Storage key, label information set and s-table table.Algorithm mainly includes following process:
(2) initialize
The inputoutput data of initial phase is:
Input: { d, e, n };
Output: { pk, sk, ti,j, ti}.
Two Big prime that wherein n=p × q, p and q are randomly generated, and p ≠ q.φ (n)=(p-1) (q-1), at random
Number e ∈ [0, φ (n) -1], and relatively prime with φ (n).D meets ed ≡ 1 (mod φ (n)).Public key pk=(e, n), private key sk=d,
ti,jFor basic block mi,jThe label of (1≤i≤n.1≤j≤k), tiFor sub-block miThe label of (1≤i≤n).
Data acquisition person generates public key and private key in this stage, for data analysiss person to the number being stored in cloud storage
According to being verified and deciphered.And be each basic block mi,j(1≤i≤n.1≤j≤k) generates label information ti,j:
The label information of sub-block and sub-block is associated with s-table.Wherein h () is homomorphism hash function, and f () is
Pseudo-random function.
Finally, information gathering person uploads to file f and contingency table s-table in cloud storage and preserves, and s-table
The person that shares to data analysiss.
(3) initiate checking to attack
The inputoutput data initiating checking phase of the attack is:
Input: { c };
Output: { chal }.
Wherein, c (1≤c≤n) is random number, and chal is checking request.
The main purpose attacking checking is to carry out disclosure by data analysiss person to the data of storage in cloud storage to verify, from
And ensure that stored measuring value is not tampered with or deletes.The process of checking is that data acquisition person randomly chooses in memory block
C block is verified, proves safety and the high efficiency of this kind of method in next trifle.
One coefficient c of data analysiss person's stochastic inputs (1≤c≤n) are sent to cloud storage, after cloud storage receives c, look into
Find corresponding c-th sub-block, and the label information t of the basic block comprising according to sub-blocki,jIt is calculated the label information of sub-block
ti:
Data analysiss person generates random number r ∈ [1,2k- 1] and attack checking request chal.
(4) generate experimental evidence
The inputoutput data producing the experimental evidence stage is:
Input: { pk, chal };
Output: { r }.
Wherein, pk is public key, the attack checking request that chal sends for data analysiss person, and r is testing that cloud storage generates
Card evidence.
Data analysiss person, in order to verify whether the measuring value in cloud storage is correctly stored, initiates challenge to cloud storage
Require checking.After the challenge of cloud storage receives data analysiss person, generate challenge information, that is, attack experimental evidence, Ran Houfa
Person carries out integrity verification to give data analysiss.
Attack checking request and include public key pk and checking request chal.After cloud storage receives attack checking request, calculate:
er=ermodn, (3)
And calculate output experimental evidence:
(5) attack checking
The inputoutput data attacking Qualify Phase is:
Input: { r, pk, chal };
Output: { 0or1 }.
Wherein, the experimental evidence that r generates for cloud storage, pk is public key, and chal is checking request.Output result be 0 or
Person 1, represents the result success, and file is not attacked;Otherwise 1 represents authentication failed, file is attacked.
After data analysiss person receives experimental evidence, proceed by load integrity verification.Proof procedure is as follows.
By experimental evidence r, the public key pk of file to be detected, sub-block miLabel information tiAnd checking request chal, meter
Calculate:
Data analysiss person is the correct checking request of file generated to be detected:
R'=trmod n (6)
Verify correct checking information r' that the experimental evidence r data analyst that generated by cloud storage generates whether phase
Deng.If:
R'=r (7)
Then return 0, that is, the measuring value in cloud storage is correctly stored, the download that data analysiss person can be safe needs
Measuring value, then carry out system mode analysis.Otherwise return 1, represent the measuring value in cloud storage and be tampered or deleted
Remove, data analysiss person may require that data acquisition person carries out Resurvey.
(6) batch is verified
When the person that has data analysiss needs to carry out m integrality verification request simultaneously, we are using the method for batch checking.
First, send m checking request chal to cloud storage.Secondly, after cloud storage receives checking request, it is respectively each and tests
Card request generates experimental evidence rm, andFinally, data analysiss person generates checking information r'm, and
Verify the integrity of data again.
4. Correctness Analysis
This paper load complete sexual assault verification method is primarily directed to protection system measuring value and is verified.By system measurements
Value dynamic memory, to cloud storage, prevents from being obtained, alter or deleting by attacker, data analysiss person is in order to correctly to system
Measuring value carries out state analysiss, carries out integrity verification first, downloads related data again and carry out state analysiss after being verified.
Correctness for this method enters line justification it was demonstrated that result is as follows.
Peer-to-peer (7) is verified, calculation procedure is:
As it appears from the above, obtaining equation r'=r it was demonstrated that context of methods is correct.If there is inequality r' ≠ r, prove
The system quantities measured value being stored in cloud storage is altered or deleted by attacker, then need Resurvey data to carry out system
State analysiss.
5. safety analysiss
It is usually that metric data is passed to control centre that intelligent grid information exchanges, and the metric data of mistake can disturb
Control centre makes irrational state estimation.In meeting complete sexual assault, there are two major issues: 1) attacker alters
Or deleting the system quantities measured value being saved in cloud storage, affecting system state estimation, thus reaching attack purpose.2) attack
Person attempts by obtaining simultaneously analysis system measuring value, and then the data pre-establishing is injected into the data that intelligence instrument collects
In, safely store cloud storage, do not found, impact system mode is estimated by data acquisition personnel's data analysis personnel
Meter.In order to prove the safety of this paper scheme, line justification is entered in the safety with regard to above-mentioned two problems herein.
In order to prove that the system quantities measured value in cloud storage do not altered by attacker or delete, that is, prove that this paper's is complete
Integrity verification scheme is correct and safe.
Under the hypothesis of big integer factorization difficulty sex chromosome mosaicism, lia-ad algorithm is safe to theorem 1.
Prove: if attacker is attacked, then have following steps:
(1) key generates.Data acquisition person generates public key and private key, and public key is open.
(2) label generates.Attacker is sub-block mi(1≤i≤n) is sent to data acquisition person, and data acquisition person is to sub-block mi
In basic block signature, obtain label ti, and send information to attacker.
(3) generate experimental evidence.Data analysiss person generates checking request chal and is sent to attacker, and attacker is according to checking
Request chal and sub-block mi(1≤i≤n) and its corresponding label information tiGenerate detection information r, and be sent to data and divide
Analysis person.
(4) attack checking.Data integrity evidence { the m that data analysiss person returns according to attackeri', r', e'} calculate and test
Card information, obtains
Wherein, mi' for attacker generate sub-block, two randoms number that r' and e' generates for attacker.
If attacker wants success attack, m must be madei'=mi, r'=r, e'=e, then r'=r establishment.Work as attack
Person distorts or deletes a part of sub-block miWhen (1≤i≤n), if wanting, by integrity verification, attacker puppet must produce conjunction
Suitable mi'=mi, r'=r, e'=e make r'=r set up, that is, attacker have the ability puppet produce two big random prime numbers p and q, satisfaction
P ≠ q, and gp=gqModn, wherein g are set of integers zn *One generation unit.So,Set up, thus p-q can
To be used for carrying out decomposing large integer n.
So, under the hypothesis of big integer factorization difficulty sex chromosome mosaicism, if attacker wants by distorting or forging
Data passes through integrity verification, then attacker must correctly hold whole system quantities measured values and all of label information.I.e.
Prove that the system quantities measured value being stored in cloud storage cannot be attacked under the hypothesis of big integer factorization difficulty sex chromosome mosaicism
Person alters or deletes.
In problem 2, attacker attempts by injecting the data analyzed in advance in intelligence instrument, that is, to be securely stored in cloud
Memorizer, then attacker must possess the privilege of data acquisition person, such as private key and key.Proof procedure is as follows.
Theorem 2, under the hypothesis of big integer factorization difficulty sex chromosome mosaicism, the false data of injection is saved in cloud storage
Device is difficult.
Prove: lia is a kind of new false data injection attacks, and attacker is by the information in a large amount of intelligence instruments
Collect and analyze, inject the false data pre-establishing in intelligence instrument.If but attacker is thought of as work(, being necessary for falseness
Data is successfully saved in cloud storage.Initialize first.Attacker by key schedule generate public private key pair (pk',
Sk'), at random generate two Big prime p' and q', and p' ≠ q', calculate n'=p' × q' andGive birth at random
Become random number e'(e' ∈ zn), make gcd (e', φ (n'))=1.Then public key pk'=(n', e'), private key sk'=(p', q').
But, public key is disclosed, i.e. pk=pk', n=n', e=e', if attacker expects private key sk, must count
Calculate n'=n=p × q, and decompose.So under the hypothesis of big integer factorization difficulty sex chromosome mosaicism, attacker obtains private key is
Difficult, that is, the false data of injection is saved in cloud storage by attacker is difficult.
In order to verify designed lia-ad algorithm feasibility, effectiveness, carry out related experiment.Using matlab
2010b environment generation ieee118 node standard testing sample, hardware configuration is cpu intel core 2duo 3.4ghz,
1.5g ram.The part such as simulation physical node, sensor, controller and control centre in computer cluster.In physical node
Network bottom layer is provided with model and calculates center, and the metric data by matpower tool kit generation standard nodes, wherein raw
Become ieee118-bus node system metric data 900, false metric data 900.Real-time using optimal electrical power routing algorithm
Simulating grid state complies with electrical network rule, and the heart sets up state estimation mechanism in the controlling, really reflects electric power comprehensively
System mode.
6. experiment and interpretation of result
This paper experimental situation is the hadoop cloud platform building 4 nodes in laboratory, and the machine of each node is configured to
Intel (r) core (tm) i5-24004-core cpu@2.60ghz, 4gbram, the network bandwidth is 100mbit/s, hadoop version
This is 0.20.2.
First, we are processed as cim/xml file format to 900 metric data generating, and the document after parsing is added
It is saved in hbase after close, and load integrity verification is carried out to it.
(1) test 1 safety experiment
Store after three system quantities measured values (a, b, c) are carried out by piecemeal and sign, a is deleted with 10% data, b is changed
10% data, does not do any operation to c.Finally, integrity detection is carried out to three system quantities measured values.Testing result such as table 2
Shown.
Table 2 testing result
Obtained by experiment, after file is tampered or deletes, all cannot pass through the integrity detection of lia-ad algorithm, only
File either with or without modification can pass through integrity verification.Prove that this paper scheme is safe.
(2) experiment 2 time overhead experiment
For same system measuring value, select different file sub-block sizes, seek the time overhead in integrity detection.
Assume there are 900 metric data in a file, after it is carried out with cim/xml data file parsing, about 10mb, when there being falseness
During Data attack, seek expense average time of lia-ad algorithm.Sub-block size selects 2 successively, 4,8,16,32,64,128kb, often
Secondary choose 460 pieces, record each time and communication overhead.Experimental result is as shown in Figure 3.
Test result indicate that, in lia-ad algorithm, the size of file sub-block is not almost had with the expense of checking and detection-phase
Have an impact, the time that calculates is basicly stable, verify that the complete sexual stage averagely needs 1.61s, checking information generation phase averagely needs
0.64s, detection request stage averagely needs 0.14s, and the calculating time totally needs 2.39s.
(3) comparative experimentss of experiment 3 and additive method
Activation primitive detection institute by the proving time of lia-ad algorithm and neuron in several basic extreme learning machines
Take time and contrasted, comparing result is as shown in Figure 4.As can be seen from Figure 4 during average training needed for different activation primitives
Between, average detected time and total time be different.And the total time needed for lia-ad algorithm of this paper is minimum.
Extreme learning machine is by the basic skills of load complete sexual assault checking, by god in extreme learning machine grader
Through first activation primitive, data is dropped to after 5 dimensions, then carry out 100 tests, obtain the average detected time.Due to limit study
After machine needs first training sample data, then carry out load integrity attack detecting, and proposed lia-ad algorithm be
After data encryption, directly carry out load complete sexual assault checking, greatly save attack checking required time.
Claims (3)
1. a kind of intelligent grid load integrity attack detection method towards cloud storage, is characterized in that, methods described first by
After the network load data encryption that intelligence instrument is collected by data acquisition person, by cloud dynamical save to cloud storage;Then
Initiate checking by data analysiss person to attack;And then experimental evidence is generated by cloud storage;Finally attacked by data analysiss person
Checking, and determine the data in cloud storage is analyzed with operation or Resurvey operation according to the result.
2. a kind of intelligent grid load integrity attack detection method towards cloud storage according to claim 1, it is special
Levying is, methods described sequentially includes the following steps:
A. data acquisition person carries out pretreatment operation to the data that intelligence instrument gathers, and various data structures are processed into cim/
Xml form, and file is carried out with piecemeal operation:
Data acquisition person, by after the data acquisition in intelligence instrument, is processed into cim/xml data the data of various structures first
Document format f, and f is divided into n sub-block, obtain sub-block mi(1≤i≤n), then that each partition is basic for k
Block, obtains basic block mi,j(1≤i≤n.1≤j≤k), builds a state table s-table and records all of sub-block mi;
B. data acquisition person carries out initialization operation, the label information of generation public key and private key and each basic block:
Data acquisition person calls key schedule to generate public key pk=(e, n) and private key sk=d, and public key is open, private key oneself
Preserve;And generate each basic block mi,jThe label information t of (1≤i≤n.1≤j≤k)i,j:
Two Big prime that wherein n=p × q, p and q are randomly generated, and p ≠ q, φ (n)=(p-1) (q-1), random number e ∈
[0, φ (n) -1], and relatively prime with φ (n), d meets ed ≡ 1 (mod φ (n)), and h () is homomorphism hash function, and f () is pseudo-
Random function;
Data acquisition person is associated with the label information of sub-block and sub-block on s-table, in file f and contingency table s-table
Pass in cloud storage and preserve, and the s-table person that shares to data analysiss;
C. data analysiss person initiates to verify and attacks:
Data analysiss person randomly chooses a coefficient c (1≤c≤n) and is sent to cloud storage, after cloud storage receives c, searches
To corresponding c-th sub-block, and the label information t of the basic block being comprised according to sub-blocki,jIt is calculated the label information of sub-block
ti:
Data analysiss person generates random number r ∈ [1,2k- 1] and attack checking request chal={ r, c };
D. cloud storage generation experimental evidence r:
Cloud storage calculates:
er=ermod n
And calculate output experimental evidence:
Then by the label information t of sub-blockiWith the experimental evidence r person that is sent to data analysiss;
E. data analysiss person carries out attacking and verifies:
Data analysiss person is by experimental evidence r, the public key pk of file to be detected, sub-block miLabel information tiAnd checking request
Chal, calculates:
N is the parameter in public key pk, tiIt is the label of i-th data block, with ttIt is a meaning, representative is t-th data block
Label;
Wherein, t, 1≤t≤c is the data block number randomly drawed, tt rIt is that any one data block uses the mark that random number r generates
Label information;
Data analysiss person is the correct checking information of file generated to be detected:
R'=trmod n
Wherein, trIt is total label information of the data genaration extracting;Whether relatively equation r'=r sets up;
Verify whether correct checking information r' that the experimental evidence r data analyst being generated by cloud storage generates is equal,
If r'=r illustrates that the measuring value in cloud storage is correctly stored, data analysiss person can download safely the measuring value of needs, so
After carry out system mode analysis;Otherwise the measuring value in explanation cloud storage has been tampered or has deleted, and data analysiss person is permissible
Require data acquisition person's Resurvey data.
3. a kind of intelligent grid load integrity attack detection method towards cloud storage according to claim 2, it is special
Levying is, when the person that has data analysiss needs to carry out m integrality verification request simultaneously, then using the method for batch checking:
First, data analysiss person sends m checking request { chal } to cloud storage;Secondly, cloud storage receives checking and asks
After asking, it is respectively each checking request and generates experimental evidence rm, andFinally, data analysiss person generates checking letter
Breath r'm, andIntegrity further according to r' and r whether equal checking data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610943338.XA CN106375344B (en) | 2016-11-02 | 2016-11-02 | A kind of smart grid load integrality attack detection method towards cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610943338.XA CN106375344B (en) | 2016-11-02 | 2016-11-02 | A kind of smart grid load integrality attack detection method towards cloud storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106375344A true CN106375344A (en) | 2017-02-01 |
CN106375344B CN106375344B (en) | 2019-08-02 |
Family
ID=57894185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610943338.XA Expired - Fee Related CN106375344B (en) | 2016-11-02 | 2016-11-02 | A kind of smart grid load integrality attack detection method towards cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106375344B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107463487A (en) * | 2017-08-03 | 2017-12-12 | 国网江苏省电力公司信息通信分公司 | A kind of distributed host performance acquisition system and performance acquisition method |
CN109165504A (en) * | 2018-08-27 | 2019-01-08 | 广西大学 | A kind of electric system false data attack recognition method generating network based on confrontation |
CN109218254A (en) * | 2017-06-29 | 2019-01-15 | 广东高电科技有限公司 | A method of detection electric network data cloud storage integrality |
CN112260989A (en) * | 2020-09-16 | 2021-01-22 | 湖南大学 | Power system and network malicious data attack detection method, system and storage medium |
CN118018271B (en) * | 2024-01-31 | 2024-07-12 | 东华大学 | Anti-eavesdrop safety state estimation method and system of networked system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2557514A1 (en) * | 2011-08-12 | 2013-02-13 | Nexenta Systems, Inc. | Cloud Storage System with Distributed Metadata |
CN103700041A (en) * | 2014-01-16 | 2014-04-02 | 湖南大学 | Cloud computation-based smart grid load prediction management platform |
CN103905469A (en) * | 2014-04-30 | 2014-07-02 | 电子科技大学 | Safety control system and method applied to smart power grid wireless sensor network and cloud computing |
CN104394155A (en) * | 2014-11-27 | 2015-03-04 | 暨南大学 | Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness |
-
2016
- 2016-11-02 CN CN201610943338.XA patent/CN106375344B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2557514A1 (en) * | 2011-08-12 | 2013-02-13 | Nexenta Systems, Inc. | Cloud Storage System with Distributed Metadata |
CN103700041A (en) * | 2014-01-16 | 2014-04-02 | 湖南大学 | Cloud computation-based smart grid load prediction management platform |
CN103905469A (en) * | 2014-04-30 | 2014-07-02 | 电子科技大学 | Safety control system and method applied to smart power grid wireless sensor network and cloud computing |
CN104394155A (en) * | 2014-11-27 | 2015-03-04 | 暨南大学 | Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness |
Non-Patent Citations (1)
Title |
---|
黄石,刘文卓,曹天杰: "改进的基于同态哈希的云存储数据完整性验证方案", 《河海大学学报( 自然科学版)》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218254A (en) * | 2017-06-29 | 2019-01-15 | 广东高电科技有限公司 | A method of detection electric network data cloud storage integrality |
CN107463487A (en) * | 2017-08-03 | 2017-12-12 | 国网江苏省电力公司信息通信分公司 | A kind of distributed host performance acquisition system and performance acquisition method |
CN109165504A (en) * | 2018-08-27 | 2019-01-08 | 广西大学 | A kind of electric system false data attack recognition method generating network based on confrontation |
CN109165504B (en) * | 2018-08-27 | 2021-05-07 | 广西大学 | Power system false data attack identification method based on anti-generation network |
CN112260989A (en) * | 2020-09-16 | 2021-01-22 | 湖南大学 | Power system and network malicious data attack detection method, system and storage medium |
CN112260989B (en) * | 2020-09-16 | 2021-07-30 | 湖南大学 | Power system and network malicious data attack detection method, system and storage medium |
CN118018271B (en) * | 2024-01-31 | 2024-07-12 | 东华大学 | Anti-eavesdrop safety state estimation method and system of networked system |
Also Published As
Publication number | Publication date |
---|---|
CN106375344B (en) | 2019-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | DeepFed: Federated deep learning for intrusion detection in industrial cyber–physical systems | |
CN108683669B (en) | Data verification method and secure multi-party computing system | |
CN103986732B (en) | Cloud storage data auditing method for preventing secret key from being revealed | |
CN106375344B (en) | A kind of smart grid load integrality attack detection method towards cloud storage | |
Lin et al. | Understanding IEC-60870-5-104 traffic patterns in SCADA networks | |
CN106603561B (en) | Block level encryption method and more granularity deduplication methods in a kind of cloud storage | |
CN107483585A (en) | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment | |
CN103778387B (en) | Big data dynamic memory integrity verification method based on lattice | |
CN113708935B (en) | Internet of things equipment unified authentication method and system based on block chain and PUF | |
CN113015167A (en) | Encrypted flow data detection method, system, electronic device and storage medium | |
Wazid et al. | SCS-WoT: Secure communication scheme for web of things deployment | |
CN103220146A (en) | Zero knowledge digital signature method based on multivariate public key cryptosystem | |
Mohammed et al. | Blockchain-enabled bioacoustics signal authentication for cloud-based electronic medical records | |
CN104009847A (en) | Big data storage integrity verification method based on lattices | |
Saputri et al. | E-voting security system for the election of EEPIS BEM president | |
CN107359982B (en) | The homomorphism endorsement method of anti-generation intra/inter- attack | |
CN106708470A (en) | Quantum random number generator and quantum random number generation method | |
CN104618111A (en) | Random dynamic-based cloud application data integrity detection method | |
Pugliese et al. | Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra | |
CN112100278B (en) | Intelligent system data supervision method based on private chain | |
Mishra et al. | Fibonacci tree structure based privacy preserving public auditing for IoT enabled data in cloud environment | |
Masi et al. | Simulating network cyber attacks using splitting techniques | |
CN110505052B (en) | Cloud data public verification method for protecting data privacy | |
Li et al. | Unified authentication scheme for IoT blockchain based on puf | |
Kang et al. | On the additional chi-square tests for the IID assumption of NIST SP 800-90B |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190802 Termination date: 20201102 |