CN107347071B - Power data security sharing method and tracking method - Google Patents
Power data security sharing method and tracking method Download PDFInfo
- Publication number
- CN107347071B CN107347071B CN201710560653.9A CN201710560653A CN107347071B CN 107347071 B CN107347071 B CN 107347071B CN 201710560653 A CN201710560653 A CN 201710560653A CN 107347071 B CN107347071 B CN 107347071B
- Authority
- CN
- China
- Prior art keywords
- power data
- user identity
- user
- characteristic sequence
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Abstract
The invention relates to a power data security sharing method and a tracking method, wherein the method comprises the following steps: (1) the power data sharing platform receives a user request and acquires user identity information; (2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform; (3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data; (4) sending the fused power data to a request user for sharing; when tracking is carried out, reverse calculation is carried out according to the fused power data and the original power data to obtain user identity information, and then tracking is achieved. Compared with the prior art, the method is simple and reliable, and ensures the safety and traceability in the data sharing process.
Description
Technical Field
The present invention relates to a data sharing and tracking method, and more particularly, to a power data security sharing method and a tracking method.
Background
With the development of informatization, standardized data monitoring platforms, particularly electric power data, are established in different industry fields, upper-level administrative departments and a plurality of enterprises. The continuous perfection of data acquisition has certain difficulty in exchanging a large amount of data between industries or governments and enterprise isomorphic or heterogeneous platforms, so that information sharing is difficult, and the problem of information isolated island is caused. However, a decision maker often needs to query a plurality of internal systems and external systems based on various heterogeneous data sources to make a decision after analyzing a large amount of data. Under the guidance of the internet and big data thinking, data exchange and sharing are advancing. Multidimensional data source fusion is one of the features of a big data platform.
At present, the transmission and interaction of the power data are based on a TCP/IP data network, and data transmission and interaction are carried out through a TCP protocol and a WebService protocol. And the two data sharing parties jointly formulate an XML data transmission protocol, and both the two parties generate and analyze data by referring to the XML data transmission protocol in the transmission process, so that the interaction and sharing of the data are realized. Meanwhile, the data encryption technology can ensure the safety of the shared data in the transmission and exchange processes, so that the sharing parties can accurately acquire data information.
However, some feature data are shared instead of disclosing data, and both data sharing parties agree on the use authority and use range of the data through a protocol, and although the secure encryption of the sharing technology can ensure the integrity and validity of the data in the transmission process, the interests of the owner of the source data are damaged when the user intentionally or unintentionally discloses the source data. Thus, data tracking (non-physical source tracing) techniques will help maintain the relevant interests of the owner of the data source.
At present, information (data) tracking technology is mostly applied to tracing physical information, such as common electronic tag technology, i.e., radio Frequency identification (rfid) technology and barcode technology. Radio Frequency Identification (RFID) is a wireless communication technology that can identify a specific object and read and write related data by radio signals without establishing mechanical or optical contact between the identification system and the specific object. The tag contains electronically stored information that can be identified within a few meters. Unlike barcode technology, the rf tag need not be in the line of sight of the identifier, but can also be embedded within the object being tracked. Obviously, the above-mentioned technique is not suitable for source tracking of power data in the internet.
Disclosure of Invention
The present invention is directed to a method for safely sharing and tracking power data, which overcomes the above-mentioned drawbacks of the prior art.
The purpose of the invention can be realized by the following technical scheme:
a method for secure sharing of power data, the method comprising the steps of:
(1) the power data sharing platform receives a user request and acquires user identity information;
(2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform;
(3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data;
(4) and sending the fused power data to a requesting user for sharing.
The step (2) of generating the user identity characteristic sequence specifically comprises the following steps:
(21) generating a user information array A with the length of m ═ a according to the user identity information1,a2,…,amIs counted to element a in the sequence AiIs 0 or a normal number, i ═ 1,2, … …, m;
(22) mapping the user information array A to an array B' ═ B according to a set mapping rule1,b2,…,bmAnd are caused to rotateObtaining element B in sequence BiIs less than 1, i is 1,2, … …, m;
(23) entry point b0And inserted into the head of the sequence B' to form a user identity characteristic sequence B, B0Is less than 1, in particular B ═ B0,b1,b2,…,bm}。
The step (3) is specifically as follows:
(31) acquiring original electric power data E ═ x1,x2,…,xnLength n of };
(32) expanding the user identity characteristic sequence B into n bits to form a fusion characteristic sequence X, wherein the specific expansion mode is as follows: from the sequence B ″ { B ″)0,b1,b2,…,bm,b0,b1,b2,…,bm,…,b0,b1,b2,…,bmSelecting the first n bits as fusion characteristic sequences;
(33) and adding the original electric power data E and the data of the corresponding bit in the fusion characteristic sequence X to obtain fusion electric power data E'.
Element a in array AiThe value is an integer of 0-9.
The mapping rule set in the step (22) is as follows: b' ═ w · a ═ wa ═1,wa2,…,wamW is a normal number, and the value of w is such that each element in B' is less than 1.
Head node b0Is a negative number with an absolute value less than 1.
A power data tracking method is used for tracking a request user of fused power data generated by adopting the security sharing method, and comprises the following steps:
(a) performing inverse operation on the fused power data and the original power data according to the fusion rule set in claim 1 to obtain a user identity characteristic sequence;
(b) the method comprises the steps of carrying out reverse operation on a user identity characteristic sequence according to a characteristic sequence generation rule set in claim 1 to obtain user identity information;
(c) and tracking and acquiring the corresponding requesting user according to the user identity information.
Compared with the prior art, the invention has the following advantages:
(1) the data security sharing method of the invention fuses the user identity information, and further extracts the user identity information from the data to be tracked when data tracking is carried out, thereby conveniently and rapidly realizing data tracking and ensuring the security of the shared data in the transmission and exchange processes;
(2) according to the method, the user identity characteristic sequence is generated through the user identity information, and the uniqueness and the subsequent traceability of the user identity characteristic sequence are ensured due to the uniqueness of the requested user identity;
(3) the user identity characteristic sequence generation algorithm is simple to implement and strong in practicability, so that the application range is wide, the user identity characteristic sequence calculation method can be applied to electric power data or other energy consumption data with various time granularities, and meanwhile, the algorithm only relates to simple arithmetic operation, and the high efficiency of characteristic sequence generation can be ensured when the algorithm is applied to massive large data;
(4) the absolute value of each element of the user identity characteristic sequence is less than 1, and reasonable decimal places are introduced, so that the influence on energy consumption data can be almost ignored, and the high fidelity of the data and the concealment of the characteristic sequence are realized;
(5) the reversibility of the algorithm is utilized during data tracking, the user identity information is acquired by fusing the reverse reduction of the electric power data, the data tracking is realized, and the result is reliable.
Drawings
FIG. 1 is a flow chart of a method for secure sharing of power data according to the present invention;
fig. 2 is a flowchart of a power data tracking method according to the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments.
Examples
As shown in fig. 1, a method for safely sharing power data includes the following steps:
(1) the power data sharing platform receives a user request and acquires user identity information;
(2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform;
(3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data;
(4) and sending the fused power data to a requesting user for sharing.
The step (2) of generating the user identity characteristic sequence specifically comprises the following steps:
(21) generating a user information array A with the length of m ═ a according to the user identity information1,a2,…,amIs counted to element a in the sequence AiIs 0 or a normal number, i ═ 1,2, … …, m;
(22) mapping the user information array A to an array B' ═ B according to a set mapping rule1,b2,…,bmAnd so that the element B in the series B' is numberediIs less than 1, i is 1,2, … …, m;
(23) entry point b0And inserted into the head of the sequence B' to form a user identity characteristic sequence B, B0Is less than 1, in particular B ═ B0,b1,b2,…,bm}。
The step (3) is specifically as follows:
(31) acquiring original electric power data E ═ x1,x2,…,xnLength n of };
(32) expanding the user identity characteristic sequence B into n bits to form a fusion characteristic sequence X, wherein the specific expansion mode is as follows: from the sequence B ″ { B ″)0,b1,b2,…,bm,b0,b1,b2,…,bm,…,b0,b1,b2,…,bmSelecting the first n bits as fusion characteristic sequences;
(33) and adding the original electric power data E and the data of the corresponding bit in the fusion characteristic sequence X to obtain fusion electric power data E'.
Element a in array AiThe value is an integer of 0-9.
The mapping rule set in the step (22) is as follows: b' ═ w · a ═ wa ═1,wa2,…,wamW is a normal number, and the value of w is such that each element in B' is less than 1, in this embodiment, w is 0.1.
Head node b0Is a negative number with an absolute value less than 1, b in the present embodiment0Is taken as-0.1
As shown in fig. 2, a power data tracking method for tracking a requesting user of fused power data generated by the above secure sharing method includes the following steps:
(a) performing inverse operation on the fused power data and the original power data according to the fusion rule set in claim 1 to obtain a user identity characteristic sequence;
(b) the method comprises the steps of carrying out reverse operation on a user identity characteristic sequence according to a characteristic sequence generation rule set in claim 1 to obtain user identity information;
(c) and tracking and acquiring the corresponding requesting user according to the user identity information.
Specifically, taking the example that a requesting user U1 requests the power data sharing platform to acquire hourly power consumption data of 8: 00-16: 00: the method comprises the steps that a user with a user serial number of 001 sends a request to a platform, the request is to download hourly power consumption data of a certain building 8: 00-16: 00, the platform obtains the hourly power consumption data of the building 8: 00-16: 00 and stores the hourly power consumption data as original power data E, and the original power data E is shown in a table 1 and specifically comprises the following steps: e ═ 121.2,165.6,213.2,221.0,201.1,195.4,178.5,189.3.
TABLE 1 hourly power consumption data of a certain building 8: 00-16: 00
The platform identifies the user identity, converts the user serial number into a user information sequence A which is {0,0,1}, and maps the sequence A according to a mapping rule B' which is 0.1. AFor the characteristic sequence B' ═ {0,0,0.1}, a header B is introduced0The first digit of the sequence B 'is-0.1, and the insertion into the sequence B' forms the user identity signature sequence B { -0.1, 0,0,0.1 }.
After the user identity characteristic sequence B is obtained, the user identity characteristic sequence and the original electric power data are fused:
firstly, determining the length n of original power data E to be 8;
then, expanding the user identity feature sequence to obtain a fusion feature sequence X, wherein the length of the fusion feature sequence X is also 8, and further obtaining a fusion feature sequence X { -0.1, 0,0,0.1, -0.1, 0,0,0.1 };
finally, the original power data E and the data of the corresponding bit in the fused signature sequence X are added to obtain fused power data E ', and the fused power data E ' is further sent to the requesting user, where the fused power data sent to the requesting user is shown in table 2, specifically, E ' ═ 121.1,165.6,213.2,221.1,201.0,195.4,178.5,189.4 }.
TABLE 2 hourly power consumption data for a certain building 8: 00-16: 00 sent to a user
When it is found that the users U2, U3, etc. also obtain the above-mentioned fused power data, and the power data sharing platform has not shared the above-mentioned power data to the users U2, U3, in order to track the source of the fused power data obtained by the users U2, U3, etc., the following method is used for data tracking.
Firstly, acquiring fused power data and original power data:
E′={121.1,165.6,213.2,221.1,201.0,195.4,178.5,189.4},
E={121.2,165.6,213.2,221.0,201.1,195.4,178.5,189.3},
then, carrying out reverse reduction to obtain a fusion characteristic sequence X, wherein X is E' -E { -0.1, 0,0,0.1, -0.1, 0,0,0.1 };
next, a header node b is inserted when generating the user identity feature sequence0-0.1 from the above XIf 2 head nodes-0.1 are found, the data between the two head nodes is a complete characteristic number sequence B '═ {0,0,0.1}, and further, since the mapping rule adopted for mapping the user information number sequence a to the characteristic number sequence is B' ═ 0.1 · a, reverse reduction is carried out to obtain a ═ {0,0,1 };
finally, since the user information sequence a is obtained, it can be known that the data is originated from the user with the user serial number 001, that is, the specific sources of the fused power data owned by the users U2 and U3 are: the requesting user U1 makes a power data request to the power data sharing platform and obtains corresponding fused power data from the power data user platform, and then shares the fused power data with U2 and U3.
Claims (2)
1. A power data security sharing method is characterized by comprising the following steps:
(1) the power data sharing platform receives a user request and acquires user identity information;
(2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform;
(3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data;
(4) sending the fused power data to a request user for sharing;
the step (2) of generating the user identity characteristic sequence specifically comprises the following steps:
(21) generating a user information array A with the length of m ═ a according to the user identity information1,a2,…,amIs counted to element a in the sequence AiIs 0 or a normal number, i ═ 1,2, … …, m;
(22) mapping the user information array A to an array B' ═ B according to a set mapping rule1,b2,…,bmAnd so that the element B in the series B' is numberediIs less than 1, i is 1,2, … …, m;
(23) entry point b0And inserted into the head of the sequence B' to form the user identity characteristicSequence B, B0Is less than 1, in particular B ═ B0,b1,b2,…,bm};
The step (3) is specifically as follows:
(31) acquiring original electric power data E ═ x1,x2,…,xnLength n of };
(32) expanding the user identity characteristic sequence B into n bits to form a fusion characteristic sequence X, wherein the specific expansion mode is as follows: from the sequence B ″ { B ″)0,b1,b2,…,bm,b0,b1,b2,…,bm,…,b0,b1,b2,…,bmSelecting the first n bits as fusion characteristic sequences;
(33) adding the original electric power data E and the data of the corresponding bit in the fusion characteristic sequence X to obtain fusion electric power data E';
element a in array AiAn integer of 0-9;
the mapping rule set in the step (22) is as follows: b' ═ w · a ═ wa ═1,wa2,…,wamW is a normal number, and the value of w is such that each element in B' is less than 1;
head node b0Is a negative number with an absolute value less than 1.
2. A power data tracking method for tracking a requesting user of the fused power data generated by the secure sharing method according to claim 1, the tracking method comprising the steps of:
(a) performing inverse operation on the fused power data and the original power data according to the fusion rule set in claim 1 to obtain a user identity characteristic sequence;
(b) the method comprises the steps of carrying out reverse operation on a user identity characteristic sequence according to a characteristic sequence generation rule set in claim 1 to obtain user identity information;
(c) and tracking and acquiring the corresponding requesting user according to the user identity information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710560653.9A CN107347071B (en) | 2017-07-11 | 2017-07-11 | Power data security sharing method and tracking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710560653.9A CN107347071B (en) | 2017-07-11 | 2017-07-11 | Power data security sharing method and tracking method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107347071A CN107347071A (en) | 2017-11-14 |
CN107347071B true CN107347071B (en) | 2021-02-23 |
Family
ID=60257653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710560653.9A Active CN107347071B (en) | 2017-07-11 | 2017-07-11 | Power data security sharing method and tracking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107347071B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110275888A (en) * | 2019-06-21 | 2019-09-24 | 国网河北省电力有限公司石家庄供电分公司 | A kind of emergency power generation data interchange sharing method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530751A (en) * | 1994-06-30 | 1996-06-25 | Hewlett-Packard Company | Embedded hidden identification codes in digital objects |
CN102750480A (en) * | 2012-05-23 | 2012-10-24 | 常熟南师大发展研究院有限公司 | Automatic watermark embedding method and device for geographic data network sharing platform |
CN104009839A (en) * | 2014-06-16 | 2014-08-27 | 华中师范大学 | Generating method for secret keys with user information |
-
2017
- 2017-07-11 CN CN201710560653.9A patent/CN107347071B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530751A (en) * | 1994-06-30 | 1996-06-25 | Hewlett-Packard Company | Embedded hidden identification codes in digital objects |
CN102750480A (en) * | 2012-05-23 | 2012-10-24 | 常熟南师大发展研究院有限公司 | Automatic watermark embedding method and device for geographic data network sharing platform |
CN104009839A (en) * | 2014-06-16 | 2014-08-27 | 华中师范大学 | Generating method for secret keys with user information |
Non-Patent Citations (1)
Title |
---|
National Utility Rate Database:Preprint;Ong S , Mckeel R;《Office of Scientific & Technical Information Technical Reports》;20120831;正文第1节INTRODUCTION、第2节OPENEI PLATFORM和第5节CONCLUSION * |
Also Published As
Publication number | Publication date |
---|---|
CN107347071A (en) | 2017-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2901359B1 (en) | Secure private database querying with content hiding bloom filters | |
WO2016089710A1 (en) | Secure computer evaluation of decision trees | |
Zou et al. | Efficient and secure encrypted image search in mobile cloud computing | |
CN109344640B (en) | Subgraph matching method based on homomorphic encryption and polynomial computation | |
CN109635573A (en) | System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption | |
Jin et al. | 3D textured model encryption via 3D Lu chaotic mapping | |
Yang et al. | Privacy-preserving k nearest neighbor query with authentication on road networks | |
Li et al. | An efficient blind filter: Location privacy protection and the access control in FinTech | |
CN109348230A (en) | A kind of ciphertext domain high capacity image reversible data concealing method | |
CN115037556B (en) | Authorized sharing method for encrypted data in smart city system | |
Palmieri et al. | Spatial bloom filters: Enabling privacy in location-aware applications | |
Liu et al. | Secure remote sensing image registration based on compressed sensing in cloud setting | |
Ramasubramanian et al. | Exploiting spatio-temporal properties of I/Q signal data using 3D convolution for RF transmitter identification | |
Mishra et al. | SFVCC: chaotic map‐based security framework for vehicular cloud computing | |
CN110555129B (en) | Space image data interaction method and device based on alliance chain | |
CN107347071B (en) | Power data security sharing method and tracking method | |
CN108197491B (en) | Subgraph retrieval method based on ciphertext | |
Prantl et al. | Evaluating the performance of a state-of-the-art group-oriented encryption scheme for dynamic groups in an iot scenario | |
CN113792317A (en) | Image encryption method and device | |
CN105791283A (en) | Circle range search method specific to encrypted spatial data | |
Zahan et al. | Smart home IoT use case with elliptic curve based digital signature: an evaluation on security and performance analysis | |
US10033711B2 (en) | Directory service device, client device, key cloud system, method thereof, and program | |
Zhang et al. | Blockchain-assisted data sharing supports deduplication for cloud storage | |
US10362015B2 (en) | Method of generating multiple identifications with multi-level security for network-connected devices | |
Adeli et al. | Mdsbsp: a search protocol based on mds codes for rfid-based internet of vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |