CN107347071B - Power data security sharing method and tracking method - Google Patents

Power data security sharing method and tracking method Download PDF

Info

Publication number
CN107347071B
CN107347071B CN201710560653.9A CN201710560653A CN107347071B CN 107347071 B CN107347071 B CN 107347071B CN 201710560653 A CN201710560653 A CN 201710560653A CN 107347071 B CN107347071 B CN 107347071B
Authority
CN
China
Prior art keywords
power data
user identity
user
characteristic sequence
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710560653.9A
Other languages
Chinese (zh)
Other versions
CN107347071A (en
Inventor
陈海波
张皓
田英杰
郭乃网
苏运
柳劲松
肖其师
陈龙
屠盛春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Twenty First Energy Saving Technology Co ltd
State Grid Shanghai Electric Power Co Ltd
East China Power Test and Research Institute Co Ltd
Original Assignee
Shanghai Twenty First Energy Saving Technology Co ltd
State Grid Shanghai Electric Power Co Ltd
East China Power Test and Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Twenty First Energy Saving Technology Co ltd, State Grid Shanghai Electric Power Co Ltd, East China Power Test and Research Institute Co Ltd filed Critical Shanghai Twenty First Energy Saving Technology Co ltd
Priority to CN201710560653.9A priority Critical patent/CN107347071B/en
Publication of CN107347071A publication Critical patent/CN107347071A/en
Application granted granted Critical
Publication of CN107347071B publication Critical patent/CN107347071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention relates to a power data security sharing method and a tracking method, wherein the method comprises the following steps: (1) the power data sharing platform receives a user request and acquires user identity information; (2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform; (3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data; (4) sending the fused power data to a request user for sharing; when tracking is carried out, reverse calculation is carried out according to the fused power data and the original power data to obtain user identity information, and then tracking is achieved. Compared with the prior art, the method is simple and reliable, and ensures the safety and traceability in the data sharing process.

Description

Power data security sharing method and tracking method
Technical Field
The present invention relates to a data sharing and tracking method, and more particularly, to a power data security sharing method and a tracking method.
Background
With the development of informatization, standardized data monitoring platforms, particularly electric power data, are established in different industry fields, upper-level administrative departments and a plurality of enterprises. The continuous perfection of data acquisition has certain difficulty in exchanging a large amount of data between industries or governments and enterprise isomorphic or heterogeneous platforms, so that information sharing is difficult, and the problem of information isolated island is caused. However, a decision maker often needs to query a plurality of internal systems and external systems based on various heterogeneous data sources to make a decision after analyzing a large amount of data. Under the guidance of the internet and big data thinking, data exchange and sharing are advancing. Multidimensional data source fusion is one of the features of a big data platform.
At present, the transmission and interaction of the power data are based on a TCP/IP data network, and data transmission and interaction are carried out through a TCP protocol and a WebService protocol. And the two data sharing parties jointly formulate an XML data transmission protocol, and both the two parties generate and analyze data by referring to the XML data transmission protocol in the transmission process, so that the interaction and sharing of the data are realized. Meanwhile, the data encryption technology can ensure the safety of the shared data in the transmission and exchange processes, so that the sharing parties can accurately acquire data information.
However, some feature data are shared instead of disclosing data, and both data sharing parties agree on the use authority and use range of the data through a protocol, and although the secure encryption of the sharing technology can ensure the integrity and validity of the data in the transmission process, the interests of the owner of the source data are damaged when the user intentionally or unintentionally discloses the source data. Thus, data tracking (non-physical source tracing) techniques will help maintain the relevant interests of the owner of the data source.
At present, information (data) tracking technology is mostly applied to tracing physical information, such as common electronic tag technology, i.e., radio Frequency identification (rfid) technology and barcode technology. Radio Frequency Identification (RFID) is a wireless communication technology that can identify a specific object and read and write related data by radio signals without establishing mechanical or optical contact between the identification system and the specific object. The tag contains electronically stored information that can be identified within a few meters. Unlike barcode technology, the rf tag need not be in the line of sight of the identifier, but can also be embedded within the object being tracked. Obviously, the above-mentioned technique is not suitable for source tracking of power data in the internet.
Disclosure of Invention
The present invention is directed to a method for safely sharing and tracking power data, which overcomes the above-mentioned drawbacks of the prior art.
The purpose of the invention can be realized by the following technical scheme:
a method for secure sharing of power data, the method comprising the steps of:
(1) the power data sharing platform receives a user request and acquires user identity information;
(2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform;
(3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data;
(4) and sending the fused power data to a requesting user for sharing.
The step (2) of generating the user identity characteristic sequence specifically comprises the following steps:
(21) generating a user information array A with the length of m ═ a according to the user identity information1,a2,…,amIs counted to element a in the sequence AiIs 0 or a normal number, i ═ 1,2, … …, m;
(22) mapping the user information array A to an array B' ═ B according to a set mapping rule1,b2,…,bmAnd are caused to rotateObtaining element B in sequence BiIs less than 1, i is 1,2, … …, m;
(23) entry point b0And inserted into the head of the sequence B' to form a user identity characteristic sequence B, B0Is less than 1, in particular B ═ B0,b1,b2,…,bm}。
The step (3) is specifically as follows:
(31) acquiring original electric power data E ═ x1,x2,…,xnLength n of };
(32) expanding the user identity characteristic sequence B into n bits to form a fusion characteristic sequence X, wherein the specific expansion mode is as follows: from the sequence B ″ { B ″)0,b1,b2,…,bm,b0,b1,b2,…,bm,…,b0,b1,b2,…,bmSelecting the first n bits as fusion characteristic sequences;
(33) and adding the original electric power data E and the data of the corresponding bit in the fusion characteristic sequence X to obtain fusion electric power data E'.
Element a in array AiThe value is an integer of 0-9.
The mapping rule set in the step (22) is as follows: b' ═ w · a ═ wa ═1,wa2,…,wamW is a normal number, and the value of w is such that each element in B' is less than 1.
Head node b0Is a negative number with an absolute value less than 1.
A power data tracking method is used for tracking a request user of fused power data generated by adopting the security sharing method, and comprises the following steps:
(a) performing inverse operation on the fused power data and the original power data according to the fusion rule set in claim 1 to obtain a user identity characteristic sequence;
(b) the method comprises the steps of carrying out reverse operation on a user identity characteristic sequence according to a characteristic sequence generation rule set in claim 1 to obtain user identity information;
(c) and tracking and acquiring the corresponding requesting user according to the user identity information.
Compared with the prior art, the invention has the following advantages:
(1) the data security sharing method of the invention fuses the user identity information, and further extracts the user identity information from the data to be tracked when data tracking is carried out, thereby conveniently and rapidly realizing data tracking and ensuring the security of the shared data in the transmission and exchange processes;
(2) according to the method, the user identity characteristic sequence is generated through the user identity information, and the uniqueness and the subsequent traceability of the user identity characteristic sequence are ensured due to the uniqueness of the requested user identity;
(3) the user identity characteristic sequence generation algorithm is simple to implement and strong in practicability, so that the application range is wide, the user identity characteristic sequence calculation method can be applied to electric power data or other energy consumption data with various time granularities, and meanwhile, the algorithm only relates to simple arithmetic operation, and the high efficiency of characteristic sequence generation can be ensured when the algorithm is applied to massive large data;
(4) the absolute value of each element of the user identity characteristic sequence is less than 1, and reasonable decimal places are introduced, so that the influence on energy consumption data can be almost ignored, and the high fidelity of the data and the concealment of the characteristic sequence are realized;
(5) the reversibility of the algorithm is utilized during data tracking, the user identity information is acquired by fusing the reverse reduction of the electric power data, the data tracking is realized, and the result is reliable.
Drawings
FIG. 1 is a flow chart of a method for secure sharing of power data according to the present invention;
fig. 2 is a flowchart of a power data tracking method according to the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments.
Examples
As shown in fig. 1, a method for safely sharing power data includes the following steps:
(1) the power data sharing platform receives a user request and acquires user identity information;
(2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform;
(3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data;
(4) and sending the fused power data to a requesting user for sharing.
The step (2) of generating the user identity characteristic sequence specifically comprises the following steps:
(21) generating a user information array A with the length of m ═ a according to the user identity information1,a2,…,amIs counted to element a in the sequence AiIs 0 or a normal number, i ═ 1,2, … …, m;
(22) mapping the user information array A to an array B' ═ B according to a set mapping rule1,b2,…,bmAnd so that the element B in the series B' is numberediIs less than 1, i is 1,2, … …, m;
(23) entry point b0And inserted into the head of the sequence B' to form a user identity characteristic sequence B, B0Is less than 1, in particular B ═ B0,b1,b2,…,bm}。
The step (3) is specifically as follows:
(31) acquiring original electric power data E ═ x1,x2,…,xnLength n of };
(32) expanding the user identity characteristic sequence B into n bits to form a fusion characteristic sequence X, wherein the specific expansion mode is as follows: from the sequence B ″ { B ″)0,b1,b2,…,bm,b0,b1,b2,…,bm,…,b0,b1,b2,…,bmSelecting the first n bits as fusion characteristic sequences;
(33) and adding the original electric power data E and the data of the corresponding bit in the fusion characteristic sequence X to obtain fusion electric power data E'.
Element a in array AiThe value is an integer of 0-9.
The mapping rule set in the step (22) is as follows: b' ═ w · a ═ wa ═1,wa2,…,wamW is a normal number, and the value of w is such that each element in B' is less than 1, in this embodiment, w is 0.1.
Head node b0Is a negative number with an absolute value less than 1, b in the present embodiment0Is taken as-0.1
As shown in fig. 2, a power data tracking method for tracking a requesting user of fused power data generated by the above secure sharing method includes the following steps:
(a) performing inverse operation on the fused power data and the original power data according to the fusion rule set in claim 1 to obtain a user identity characteristic sequence;
(b) the method comprises the steps of carrying out reverse operation on a user identity characteristic sequence according to a characteristic sequence generation rule set in claim 1 to obtain user identity information;
(c) and tracking and acquiring the corresponding requesting user according to the user identity information.
Specifically, taking the example that a requesting user U1 requests the power data sharing platform to acquire hourly power consumption data of 8: 00-16: 00: the method comprises the steps that a user with a user serial number of 001 sends a request to a platform, the request is to download hourly power consumption data of a certain building 8: 00-16: 00, the platform obtains the hourly power consumption data of the building 8: 00-16: 00 and stores the hourly power consumption data as original power data E, and the original power data E is shown in a table 1 and specifically comprises the following steps: e ═ 121.2,165.6,213.2,221.0,201.1,195.4,178.5,189.3.
TABLE 1 hourly power consumption data of a certain building 8: 00-16: 00
Figure BDA0001346999880000051
The platform identifies the user identity, converts the user serial number into a user information sequence A which is {0,0,1}, and maps the sequence A according to a mapping rule B' which is 0.1. AFor the characteristic sequence B' ═ {0,0,0.1}, a header B is introduced0The first digit of the sequence B 'is-0.1, and the insertion into the sequence B' forms the user identity signature sequence B { -0.1, 0,0,0.1 }.
After the user identity characteristic sequence B is obtained, the user identity characteristic sequence and the original electric power data are fused:
firstly, determining the length n of original power data E to be 8;
then, expanding the user identity feature sequence to obtain a fusion feature sequence X, wherein the length of the fusion feature sequence X is also 8, and further obtaining a fusion feature sequence X { -0.1, 0,0,0.1, -0.1, 0,0,0.1 };
finally, the original power data E and the data of the corresponding bit in the fused signature sequence X are added to obtain fused power data E ', and the fused power data E ' is further sent to the requesting user, where the fused power data sent to the requesting user is shown in table 2, specifically, E ' ═ 121.1,165.6,213.2,221.1,201.0,195.4,178.5,189.4 }.
TABLE 2 hourly power consumption data for a certain building 8: 00-16: 00 sent to a user
Figure BDA0001346999880000052
When it is found that the users U2, U3, etc. also obtain the above-mentioned fused power data, and the power data sharing platform has not shared the above-mentioned power data to the users U2, U3, in order to track the source of the fused power data obtained by the users U2, U3, etc., the following method is used for data tracking.
Firstly, acquiring fused power data and original power data:
E′={121.1,165.6,213.2,221.1,201.0,195.4,178.5,189.4},
E={121.2,165.6,213.2,221.0,201.1,195.4,178.5,189.3},
then, carrying out reverse reduction to obtain a fusion characteristic sequence X, wherein X is E' -E { -0.1, 0,0,0.1, -0.1, 0,0,0.1 };
next, a header node b is inserted when generating the user identity feature sequence0-0.1 from the above XIf 2 head nodes-0.1 are found, the data between the two head nodes is a complete characteristic number sequence B '═ {0,0,0.1}, and further, since the mapping rule adopted for mapping the user information number sequence a to the characteristic number sequence is B' ═ 0.1 · a, reverse reduction is carried out to obtain a ═ {0,0,1 };
finally, since the user information sequence a is obtained, it can be known that the data is originated from the user with the user serial number 001, that is, the specific sources of the fused power data owned by the users U2 and U3 are: the requesting user U1 makes a power data request to the power data sharing platform and obtains corresponding fused power data from the power data user platform, and then shares the fused power data with U2 and U3.

Claims (2)

1. A power data security sharing method is characterized by comprising the following steps:
(1) the power data sharing platform receives a user request and acquires user identity information;
(2) generating a user identity characteristic sequence by adopting a set characteristic sequence generation rule for user identity information, and acquiring original power data requested by a user from a sharing platform;
(3) fusing the user identity characteristic sequence and the original electric power data by adopting a set fusion rule to obtain fused electric power data;
(4) sending the fused power data to a request user for sharing;
the step (2) of generating the user identity characteristic sequence specifically comprises the following steps:
(21) generating a user information array A with the length of m ═ a according to the user identity information1,a2,…,amIs counted to element a in the sequence AiIs 0 or a normal number, i ═ 1,2, … …, m;
(22) mapping the user information array A to an array B' ═ B according to a set mapping rule1,b2,…,bmAnd so that the element B in the series B' is numberediIs less than 1, i is 1,2, … …, m;
(23) entry point b0And inserted into the head of the sequence B' to form the user identity characteristicSequence B, B0Is less than 1, in particular B ═ B0,b1,b2,…,bm};
The step (3) is specifically as follows:
(31) acquiring original electric power data E ═ x1,x2,…,xnLength n of };
(32) expanding the user identity characteristic sequence B into n bits to form a fusion characteristic sequence X, wherein the specific expansion mode is as follows: from the sequence B ″ { B ″)0,b1,b2,…,bm,b0,b1,b2,…,bm,…,b0,b1,b2,…,bmSelecting the first n bits as fusion characteristic sequences;
(33) adding the original electric power data E and the data of the corresponding bit in the fusion characteristic sequence X to obtain fusion electric power data E';
element a in array AiAn integer of 0-9;
the mapping rule set in the step (22) is as follows: b' ═ w · a ═ wa ═1,wa2,…,wamW is a normal number, and the value of w is such that each element in B' is less than 1;
head node b0Is a negative number with an absolute value less than 1.
2. A power data tracking method for tracking a requesting user of the fused power data generated by the secure sharing method according to claim 1, the tracking method comprising the steps of:
(a) performing inverse operation on the fused power data and the original power data according to the fusion rule set in claim 1 to obtain a user identity characteristic sequence;
(b) the method comprises the steps of carrying out reverse operation on a user identity characteristic sequence according to a characteristic sequence generation rule set in claim 1 to obtain user identity information;
(c) and tracking and acquiring the corresponding requesting user according to the user identity information.
CN201710560653.9A 2017-07-11 2017-07-11 Power data security sharing method and tracking method Active CN107347071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710560653.9A CN107347071B (en) 2017-07-11 2017-07-11 Power data security sharing method and tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710560653.9A CN107347071B (en) 2017-07-11 2017-07-11 Power data security sharing method and tracking method

Publications (2)

Publication Number Publication Date
CN107347071A CN107347071A (en) 2017-11-14
CN107347071B true CN107347071B (en) 2021-02-23

Family

ID=60257653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710560653.9A Active CN107347071B (en) 2017-07-11 2017-07-11 Power data security sharing method and tracking method

Country Status (1)

Country Link
CN (1) CN107347071B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110275888A (en) * 2019-06-21 2019-09-24 国网河北省电力有限公司石家庄供电分公司 A kind of emergency power generation data interchange sharing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530751A (en) * 1994-06-30 1996-06-25 Hewlett-Packard Company Embedded hidden identification codes in digital objects
CN102750480A (en) * 2012-05-23 2012-10-24 常熟南师大发展研究院有限公司 Automatic watermark embedding method and device for geographic data network sharing platform
CN104009839A (en) * 2014-06-16 2014-08-27 华中师范大学 Generating method for secret keys with user information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530751A (en) * 1994-06-30 1996-06-25 Hewlett-Packard Company Embedded hidden identification codes in digital objects
CN102750480A (en) * 2012-05-23 2012-10-24 常熟南师大发展研究院有限公司 Automatic watermark embedding method and device for geographic data network sharing platform
CN104009839A (en) * 2014-06-16 2014-08-27 华中师范大学 Generating method for secret keys with user information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
National Utility Rate Database:Preprint;Ong S , Mckeel R;《Office of Scientific & Technical Information Technical Reports》;20120831;正文第1节INTRODUCTION、第2节OPENEI PLATFORM和第5节CONCLUSION *

Also Published As

Publication number Publication date
CN107347071A (en) 2017-11-14

Similar Documents

Publication Publication Date Title
EP2901359B1 (en) Secure private database querying with content hiding bloom filters
WO2016089710A1 (en) Secure computer evaluation of decision trees
Zou et al. Efficient and secure encrypted image search in mobile cloud computing
CN109344640B (en) Subgraph matching method based on homomorphic encryption and polynomial computation
CN109635573A (en) System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption
Jin et al. 3D textured model encryption via 3D Lu chaotic mapping
Yang et al. Privacy-preserving k nearest neighbor query with authentication on road networks
Li et al. An efficient blind filter: Location privacy protection and the access control in FinTech
CN109348230A (en) A kind of ciphertext domain high capacity image reversible data concealing method
CN115037556B (en) Authorized sharing method for encrypted data in smart city system
Palmieri et al. Spatial bloom filters: Enabling privacy in location-aware applications
Liu et al. Secure remote sensing image registration based on compressed sensing in cloud setting
Ramasubramanian et al. Exploiting spatio-temporal properties of I/Q signal data using 3D convolution for RF transmitter identification
Mishra et al. SFVCC: chaotic map‐based security framework for vehicular cloud computing
CN110555129B (en) Space image data interaction method and device based on alliance chain
CN107347071B (en) Power data security sharing method and tracking method
CN108197491B (en) Subgraph retrieval method based on ciphertext
Prantl et al. Evaluating the performance of a state-of-the-art group-oriented encryption scheme for dynamic groups in an iot scenario
CN113792317A (en) Image encryption method and device
CN105791283A (en) Circle range search method specific to encrypted spatial data
Zahan et al. Smart home IoT use case with elliptic curve based digital signature: an evaluation on security and performance analysis
US10033711B2 (en) Directory service device, client device, key cloud system, method thereof, and program
Zhang et al. Blockchain-assisted data sharing supports deduplication for cloud storage
US10362015B2 (en) Method of generating multiple identifications with multi-level security for network-connected devices
Adeli et al. Mdsbsp: a search protocol based on mds codes for rfid-based internet of vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant