Disclosure of Invention
The technical problem to be solved by the invention is to overcome the defects in the prior art, and provide a privacy-protected low-voltage distribution room edge side electricity consumption data aggregation method to effectively reduce the communication traffic between an electricity meter and a concentrator, and the electricity consumption data of a user is transmitted in a ciphertext mode all the time in the communication process to ensure the safety of the data.
Therefore, the invention adopts the following technical scheme: a low-voltage station area edge side electricity consumption data gathering method with privacy protection is characterized in that a user electricity consumption data ciphertext in an electricity meter is sent to an edge computing node, the edge computing node performs algebraic operation on the ciphertext through a homomorphic encryption mechanism to achieve gathering of the user electricity consumption data, and the gathered data are uploaded to a master station; and the master station decrypts the gathered data by using a private key to obtain the sum of the power consumption of all the electric meters connected with the edge computing node.
The invention can effectively reduce the communication traffic between the electric meter and the concentrator, and the electricity data of the user is always transmitted in a ciphertext mode in the communication process, thereby ensuring the safety of the data.
Further, the main station calculates the total power consumption of the distribution area according to the aggregated data provided by the edge computing node.
Furthermore, the trust center generates the edge computing nodes, the electric meters, the key, the public key and some public parameters of the main station, sends the public parameters and the public key to the main station through the secure channel, and sends the public parameters and the private key to each edge computing node and each electric meter.
Further, the step of the trust center generating the public parameters, the public key and the private key comprises:
1) by TsRepresenting the time interval of the electricity data uploaded by the meter, by PmaxRepresenting the maximum power consumption, P, of N meters in a blockmaxThe master station calculates the historical data and sends the historical data to the trust center through the safety channel;
2) two safety prime numbers p ═ 2p '+1 and q ═ 2q' +1 are selected, satisfying the following conditions:
a) p ', q' are also prime numbers,
b) n is pq, and n>NPmax;
3) Calculating the least common multiple of p-1 and q-1:
λ=lcm(p-1,q-1)=2p'q';
4) generating N +1 randomMachine number
And satisfies:
5) selecting a hash function
Represents a positive integer not greater than n;
6) construct common parameters { H, Ts}, electric meter DijPrivate key of { n, rij}, edge computing node private key { n, rN+1And the master station public key n, r0λ, the common parameter { H, T }, andsand electric meter DijPrivate key of { n, rijSending the public parameters (H, T) to the ammeter through a safe channels} and edge compute node private key { n, rN+1Sending the public parameters (H, T) to the edge computing nodes through the safe channelsAnd the public key n, r0λ is sent to the master station over a secure channel.
Furthermore, the step of collecting the electricity consumption data of the platform area is as follows:
1) by x
ijIndicating electric meter D
ijIn [ kT ]
s,(k+1)T
s]The electricity consumption data in the time period is compared with the data x in the following way
ijAnd (3) encryption:
wherein, cijkIs [ kT ]s,(k+1)Ts]For x in the time periodijAn encrypted ciphertext; k represents the kth time period;
2) the ciphertext cijkSending the data to the edge computing node;
3) in [ kT ]
s,(k+1)T
s]Edge compute node E in time period
iCollecting the ligation thereof to obtain N
iElectricity consumption data cipher text of individual ammeter
And the following polymerization transformation is carried out:
4) edge compute node CikAnd transmitting the data to the master station through the power communication network.
Further, the steps of the master station data decryption and the total power consumption calculation are as follows:
1) the Master station uses the public key n, r0λ } pair CikThe following calculations were made:
2) due to the fact that
Denotes that n is not more than n
2Is a positive integer of (a) to (b),
the foregoing formula is further expressed as:
3) due to the fact that
The formula is thus further expressed as:
4) obtained over a time period [ kTs,(k+1)Ts]Inner and edge computing node EiThe sum of the electric quantity corresponding to the connected electric meters is as follows:
Eiwherein, M represents the number of edge computing nodes deployed in a low-voltage platform area;
5) in a time period of [ kTs,(k+1)Ts]And the sum of the power consumption of the users under the distribution area is as follows:
the invention has the following advantages:
1. the edge computing node gathers the electricity consumption data and sends the gathered result to the master station, thereby effectively reducing the communication traffic;
2. the edge computing node directly gathers the user electricity consumption data ciphertext without decryption, so that the data security is guaranteed;
3. the time stamp is used in the encryption process, so that the system can resist replay attack.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clear and obvious, the present invention will be further described in detail with reference to the accompanying drawings and detailed description.
In order to reduce the data communication traffic between the electric meter and the main station, some edge computing nodes can be deployed in the low-voltage distribution area, and the edge computing nodes upload the aggregated data to the main station. The general architecture of a low voltage distribution substation system (system for short) is shown in fig. 1. Using M to represent the number of edge computing nodes deployed in the low-voltage transformer area, using N to represent the total amount of user electric meters in the low-voltage transformer area, and using E
i(i ═ 1, 2.·, M) denotes the ith edge compute node. Edge computing node E
iLower is connected with N
iElectric meter, with D
ijRepresents connection to E
iThe (th) electric meter of (1),
E
iand (i-1, 2.., M) aggregating the power consumption data ciphertext of the connected electric meters, performing some transformations on the ciphertext to form aggregated data on the premise of not decrypting the ciphertext, and sending the aggregated data to the master station. And the trust center generates keys of the edge computing nodes, the electric meters and the main station and some system public parameters, sends the public parameters and the public keys to the main station through the safety channel, and sends the public parameters and the private keys to each edge computing node and each electric meter.
The process of gathering electricity consumption data of electric meters in a low-voltage distribution area is shown in fig. 2, a II-type concentrator sends data in a meter box to an edge computing node, and the edge computing node gathers electricity consumption data of electric meters connected under the II-type concentrator and sends the gathered data to a master station. Using M to represent the number of edge computing nodes deployed in the low-voltage transformer area, using N to represent the total amount of user electric meters in the low-voltage transformer area, and using E
i(i ═ 1, 2.·, M) denotes the ith edge compute node. Edge computing node E
iLower is connected with N
iElectric meter, with D
ijRepresents connection to E
iThe (th) electric meter of (1),
for a low-voltage distribution area, the step of collecting the electricity consumption data of the users is as follows:
1. trust center generates system public parameter, public key and private key
(1) By TsRepresenting the time interval of the electricity consumption data uploaded by the electricity meters, representing the total amount of the electricity meters under the district by N, and representing the total amount of the electricity meters under the district by PmaxRepresenting the maximum power consumption, P, of N meters in a blockmaxAnd the master station calculates the historical data and sends the historical data to the trust center through a secure channel.
(2) Two safety prime numbers p ═ 2p '+1 and q ═ 2q' +1 are selected to satisfy the following conditions:
(a) p ', q' are also prime numbers;
(b) n is pq, and n>NPmax。
(3) Calculating the least common multiple of p-1 and q-1:
λ=lcm(p-1,q-1)=2p'q' (1)
(4) generating N +1 random numbers
And is
Satisfy the requirement of
(5) Selecting a hash function
(6) Construction System common parameters { H, Ts}, electric meter DijPrivate key of { n, rij}, edge computing node private key { n, rN+1And the master station public key n, r0λ, the common parameter { H, T }, andsand electric meter DijPrivate key of { n, rijSending the public parameters (H, T) to the ammeter through a safe channels} and edge compute node private key { n, rN+1Sending the public parameters (H, T) to the edge computing nodes through the safe channelsAnd the public key n, r0λ is sent to the master station over a secure channel.
2. District power consumption data collection
(1) By xijIndicating electric meter DijIn [ kT ]s,(k+1)Ts]The electricity consumption data in the time period is compared with the data x in the following wayijAnd (3) encryption:
wherein, cijkIs [ kT ]s,(k+1)Ts]For x in the time periodijAnd (4) encrypted ciphertext.
(2) The ciphertext cijkAnd sending the data to the edge computing node.
(3) In [ kT ]
s,(k+1)T
s]Edge compute node E in time period
iCollecting the ligation thereof to obtain N
iElectricity consumption data cipher text of individual ammeter
And subjected to a polymerization conversion as follows
(4) Edge compute node CikAnd transmitting the data to the master station through the power communication network.
3. Master station data decryption and total power consumption calculation
(1) The Master station uses the public key n, r0λ } pair CikMake the following calculation
(2) Due to the fact that
Formula (8) can be further represented as
(3) Due to the fact that
The formula is thus further expressed as:
(4) can be obtained in the time period of [ kTs,(k+1)Ts]Inner and edge computing node EiThe sum of the electricity consumption corresponding to the connected electric meters is
(5) In a time period of [ kTs,(k+1)Ts]The sum of the electricity consumption of the users under the inner and the platform areas is
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.