CN111046411A - Power grid data safe storage method and system - Google Patents
Power grid data safe storage method and system Download PDFInfo
- Publication number
- CN111046411A CN111046411A CN201911379999.4A CN201911379999A CN111046411A CN 111046411 A CN111046411 A CN 111046411A CN 201911379999 A CN201911379999 A CN 201911379999A CN 111046411 A CN111046411 A CN 111046411A
- Authority
- CN
- China
- Prior art keywords
- power grid
- grid data
- block chain
- data
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method and a system for safely storing power grid data, wherein the method comprises the following steps: the power grid terminal generates power grid data, constructs encrypted power grid data and sends the encrypted power grid data to the slave block link points; the encrypted power grid data are received from the slave block chain nodes, decryption operation is carried out on the encrypted power grid data, if decryption of the slave block chain nodes is successful, distributed aggregation signature operation is carried out on the power grid data, and if distributed aggregation signature is successful, the power grid data are sent to the master block chain nodes; and the master block chain node stores the power grid data. The invention provides a safe storage scheme for power grid data. In addition, the block chain technology is adopted to store the power grid data, and the block chain technology has higher safety, so that the power grid data is prevented from being tampered, and the safety of the power grid data can be ensured.
Description
Technical Field
The application relates to the technical field of communication, in particular to a power grid data safe storage method and system.
Background
With the rapid development of technologies such as artificial intelligence and the internet of things, the types and the number of the power grid terminals are more and more, for example, offline transaction terminals. In order to ensure the data security in the transaction process of the power grid terminal, the safe storage of the power grid data of the power grid terminal has become a research hotspot.
Disclosure of Invention
In view of this, the present application provides a method and a system for safely storing grid data, which can ensure safe storage of the grid data after the grid terminal generates the grid data.
In order to achieve the above object, the present invention provides the following technical features:
a power grid data safe storage method comprises the following steps:
the power grid terminal generates power grid data, constructs encrypted power grid data and sends the encrypted power grid data to the slave block link points;
the encrypted power grid data are received from the slave block chain nodes, decryption operation is carried out on the encrypted power grid data, if decryption of the slave block chain nodes is successful, distributed aggregation signature operation is carried out on the power grid data, and if distributed aggregation signature is successful, the power grid data are sent to the master block chain nodes;
and the master block chain node stores the power grid data.
Optionally, the generating of the power grid data and the constructing of the encrypted power grid data by the power grid terminal include:
the power grid terminal generates and stores a public key and a private key, and generates power grid data in the transaction process;
the power grid terminal calculates the power grid data by adopting a secure hash algorithm to obtain a power grid data fingerprint;
the power grid terminal adopts an elliptic encryption algorithm and the private key to perform signature operation on the power grid data fingerprint to obtain a signature;
and determining the power grid data, the signature and the public key as the encrypted power grid data.
Optionally, the performing a decryption operation on the encrypted power grid data includes:
calculating the power grid data by adopting a secure hash algorithm from the block link points to obtain a first power grid data fingerprint;
performing reverse signature operation on the signature by adopting an elliptic encryption algorithm and the public key from the block link point to obtain a second power grid data fingerprint;
and if the first power grid data fingerprint is consistent with the second power grid data fingerprint, determining that the analysis is successful, otherwise, determining that the decryption is failed.
Optionally, the performing, if the decryption from the block link point is successful, a distributed aggregation signature operation on the power grid data includes:
respectively carrying out signature operation on each slave block chain child node in the slave block chain link points to obtain a signature;
performing aggregation operation on the signatures of the sub nodes of the slave block chain from the link points of the slave block chain to obtain an aggregated signature;
verifying whether the aggregated signature is correct;
and after verifying that the aggregated signature is correct, determining that the distributed aggregated signature is successful.
Optionally, the master block chain node stores the power grid data, including:
the main block chain node stores the power grid data by adopting an intelligent contract; wherein the intelligent contract comprises: a data identity control contract, a data identity management contract, and a data management contract.
Optionally, the power grid terminal is provided with a slave blockchain client.
A grid data secure storage system, comprising:
a plurality of grid terminals and a grid server; the power grid terminal is provided with a slave block chain client;
each power grid terminal is used for generating power grid data, constructing encrypted power grid data from the block chain client, and sending the encrypted power grid data to the power grid server;
the slave block chain node in the power grid server is used for receiving the encrypted power grid data, executing decryption operation on the encrypted power grid data, performing distributed aggregation signature operation on the power grid data if decryption of the slave block chain node is successful, and sending the power grid data to the master block chain node if the distributed aggregation signature is successful;
and the slave block link points in the power grid server are used for storing the power grid data.
A power grid data safe storage method comprises the following steps:
generating power grid data and constructing encrypted power grid data;
and sending the encrypted power grid data to a power grid server, and storing the power grid data by the power grid server by adopting a block chain technology.
A power grid data safe storage method comprises the following steps:
receiving encrypted power grid data sent by the power grid data;
and storing the power grid data by adopting a block chain technology.
Optionally, the storing the power grid data by using the blockchain technique includes:
the encrypted power grid data are received from the slave block chain nodes, decryption operation is carried out on the encrypted power grid data, if decryption of the slave block chain nodes is successful, distributed aggregation signature operation is carried out on the power grid data, and if distributed aggregation signature is successful, the power grid data are sent to the master block chain nodes;
and the master block chain node stores the power grid data.
Through the technical means, the following beneficial effects can be realized:
the invention provides a safe storage scheme of power grid data, which can be used for encrypting the power grid data to generate encrypted power grid data before sending the power grid data after a power grid terminal generates the power grid data, and transmitting the encrypted power grid data outwards to ensure that the power grid data is safe in the transmission process.
In addition, the block chain technology is adopted to store the power grid data, and the block chain technology has higher safety, so that the power grid data is prevented from being tampered, and the safety of the power grid data can be ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a first embodiment of a power grid data security storage system disclosed in an embodiment of the present application;
fig. 2 is a flowchart of a first embodiment of a method for securely storing grid data disclosed in an embodiment of the present application;
fig. 3 is a flowchart of an encryption operation in a method for securely storing power grid data disclosed in an embodiment of the present application;
fig. 4 is a flowchart of a decryption operation in a method for securely storing grid data disclosed in an embodiment of the present application;
fig. 5 is a flowchart of a signature operation in a method for securely storing power grid data disclosed in an embodiment of the present application;
fig. 6 is a flowchart of a second embodiment of a method for safely storing grid data disclosed in the embodiment of the present application;
fig. 7 is a schematic structural diagram of a second embodiment of a power grid data security storage system disclosed in the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The invention provides an embodiment one of a power grid data security storage system, referring to fig. 1, including:
the system comprises a plurality of power grid terminals, slave block chain nodes and master block chain nodes; it will be appreciated that a slave blockchain node may include a plurality of interconnected slave blockchain sub-nodes and a master blockchain node may include a plurality of interconnected master blockchain sub-nodes.
Each grid terminal may be installed with a slave blockchain client interacting with the slave blockchain link points.
Corresponding to the power grid data secure storage system shown in fig. 1, the invention provides a first embodiment of a power grid data secure storage method. Referring to fig. 2, the method comprises the following steps:
ensuring that S201: and the power grid terminal generates a public key and a private key.
And the public key QA and the private key DA are distributed to the power grid terminal by the power grid server. The slave blockchain client of the power grid terminal generates a temporary public key p and a temporary private key k suitable for the power grid terminal in advance so as to be used in subsequent encryption operation.
Step S202: and the power grid terminal generates power grid data, constructs encrypted power grid data and sends the encrypted power grid data to the slave block link points.
The power grid terminal generates power grid data in a normal transaction process, and in order to guarantee the safety of the power grid data, the slave blockchain client of the power grid terminal executes encryption operation on the power grid data to generate the encrypted power grid data.
Referring to fig. 3, the encryption operation may be implemented in the following manner:
step S301: and the power grid terminal calculates the power grid data by adopting a secure hash algorithm to obtain the power grid data fingerprint.
In order to ensure the authenticity of the DATA, the SHA algorithm in the secure hash algorithm may be used to calculate the DATA content fingerprint of the grid DATA, and the calculation formula of the grid DATA fingerprint m corresponding to the grid DATA is detailed in formula (1).
m=HashSHA(DATA)……(1)
Step S302: and the power grid terminal adopts an elliptic encryption algorithm and the private key to perform signature operation on the power grid data fingerprint to obtain a signature.
In order to ensure the security of the data content fingerprint m, an elliptic cryptography algorithm (ECC algorithm) in the signature algorithm is adopted to perform signature operation on the power grid data fingerprint m.
The parameters involved in the signature operation of the ECC algorithm include: the system comprises a large prime number P, coordinates of a base point G, a temporary private key k, a temporary public key P and a private key DA of a power grid terminal.
The temporary private key k is a random number generated by the power grid terminal, the temporary public key P is obtained by multiplying the temporary private key k and an x coordinate of a base point G, R represents the x coordinate of the temporary public key P, and w represents an inverse element of a large prime number P.
The formula for calculating the signature S is shown in formula (2)
S=w(HashSHA(DATA)+DA*R)modp……(2)
Step S303: and determining the power grid data, the signature and the public key as the encrypted power grid data.
And determining the power grid DATA DATA, the signature S and the public key QA as the encrypted power grid DATA.
Then, the process proceeds to step S203 in fig. 2: and receiving the encrypted power grid data from the slave block chain nodes, performing decryption operation on the encrypted power grid data, performing distributed aggregation signature operation on the power grid data if decryption of the slave block chain nodes is successful, and transmitting the power grid data to the master block chain nodes if the distributed aggregation signature is successful.
Each slave blockchain sub-node in the slave blockchain nodes can receive the encrypted power grid data, each slave blockchain sub-node performs decryption operation on the encrypted power grid data, the decryption operation processes are all consistent, and the decryption process is described in detail by taking one slave blockchain sub-node as an example.
Referring to fig. 4, the parsing operation can be implemented as follows:
step S401: and calculating the power grid data by adopting a secure hash algorithm from the block link points to obtain a first power grid data fingerprint.
The encrypted grid DATA received from the blockchain sub-node includes the grid DATA, the signature S and the public key QA, and the first grid DATA fingerprint m1 is obtained by using the grid DATA in the encrypted grid DATA and using the secure hash algorithm same as the formula (1).
Step S402: and performing reverse signature operation on the signature by adopting an elliptic encryption algorithm and the public key from the block link point to obtain a second power grid data fingerprint.
And receiving the encrypted power grid DATA including the power grid DATA DATA, the signature S and the public key QA from the block chain sub-node, and performing reverse signature operation on the signature S by using an ECC algorithm and the public key QA, wherein the second power grid DATA fingerprint m2 is obtained.
The reverse signature operation is detailed in formula (3):
m2=S-1*HashSHA(m)*G+S-1*R*Qa……(3)
step S403: and if the first power grid data fingerprint is consistent with the second power grid data fingerprint, determining that the analysis is successful, otherwise, determining that the decryption is failed.
If the first grid data fingerprint m1 is consistent with the second grid data fingerprint m2, the analysis is determined to be successful, and if not, the decryption is determined to be failed.
It is understood that the decryption success of the slave block chain sub-nodes exceeding the set number from among the slave block chain sub-nodes indicates that the decryption of the grid data from the slave block chain sub-nodes succeeds, otherwise, the decryption of the grid data from the slave block chain sub-nodes fails.
The set number can be determined according to actual conditions, and the application does not limit the set number.
And if the decryption of the slave block chain node is successful, performing distributed aggregation signature operation on the power grid data, and if the decryption of the slave block chain node is successful, transmitting the power grid data to the master block chain node.
It will be appreciated that the slave blockchain node may upload the power grid data to the master blockchain node, and since the slave blockchain node has several slave blockchain sub-nodes, in order to ensure consistency of the power grid data of the respective slave blockchain sub-nodes, a distributed signature operation is performed before uploading to the master blockchain node.
Referring to fig. 5, the distributed signature operation may be implemented in the following manner:
step S501: and respectively carrying out signature operation on each slave block chain child node in the slave block chain link points to obtain a signature.
Setting the time for receiving the power grid data to be T by each block chain sub-nodeiAnd setting n block chain child nodes to be more than or equal to 1 and less than or equal to n. Calculating the HASH value of the power grid data by using a secure HASH function HASH by each block chain sub-nodeThe calculation formula is as formula (4).
Each block chain child node calculates each signature DS by using two hash functions H1 and H2 with higher collision resistance and higher safety leveli。
Where x represents the aggregation public key, r represents the aggregation private key, riPrivate key, x, representing the current blockchain node iiRepresenting the public key of the current blockchain node i.
Step S502: and aggregating the signatures of the sub nodes of the slave block chain by the slave block chain link point to obtain an aggregated signature.
The signatures of the respective slave blockchain child nodes are collectively signed using the following formula (6).
Step S503: verifying whether the aggregated signature is correct.
And (5) verifying whether the aggregation signature is correct or not by adopting a formula (7).
The relationship between the public key and the private key is as follows: x is rP, xi=riP, function e is a bilinear pair function.
If the left side and the right side of equation (7) are equal, it indicates that the aggregated signature is correct, i.e. the distributed aggregated signature is successful.
Step S504: and after verifying that the aggregated signature is correct, determining that the distributed aggregated signature is successful.
Step S203 then proceeds to step S204: and the master block chain node stores the power grid data.
The main block chain node stores the power grid data by adopting an intelligent contract; wherein the intelligent contract comprises: a data identity control contract, a data identity management contract, and a data management contract.
The data identity control contract comprises the distribution function of information such as data identity identification, data number, public key and the like; the data identity management contract comprises functions of data identity creation, data identity reset and the like; the data management contract comprises functions of data storage, data sharing, data access authority control and the like.
Through the technical means, the following beneficial effects can be realized:
the invention provides a safe storage scheme of power grid data, which can be used for encrypting the power grid data to generate encrypted power grid data before sending the power grid data after a power grid terminal generates the power grid data, and transmitting the encrypted power grid data outwards to ensure that the power grid data is safe in the transmission process.
In addition, the block chain technology is adopted to store the power grid data, and the block chain technology has higher safety, so that the power grid data is prevented from being tampered, and the safety of the power grid data can be ensured.
Referring to fig. 6, in a second embodiment of the method for securely storing power grid data provided by the present invention, the application scenario is a process of completing identity registration.
Step S601: the power grid terminal generates a temporary public key p and a temporary private key k from the blockchain client, and acquires a public key QA and a private key DA sent by the power grid server.
Step S602: and the power grid terminal generates power grid data, the encrypted power grid data is constructed from the block chain client, and the encrypted power grid data is sent to the slave block chain link points.
The grid data may include the public key QA and the identity information, and then the grid data is encrypted by the blockchain client in the manner of step S202 to obtain encrypted data.
Step S603: and receiving the encrypted power grid data from the slave block chain nodes, performing decryption operation on the encrypted power grid data, performing distributed aggregation signature operation on the power grid data if decryption of the slave block chain nodes is successful, and transmitting the power grid data to the master block chain nodes if the distributed aggregation signature is successful.
And the slave block chain link point executes decryption operation according to the mode of the step S203, verifies the identity information in the power grid data after the decryption operation, and can send the power grid data to the master block chain node after the verification is passed.
Step S604: and the master block chain node stores the power grid data and creates an identity according to the identity information in the power grid data.
The identity information can be intelligently stored in an intelligent contract mode, and an identity mark is created for the power grid terminal by using an intelligent contract identity management mechanism.
Step S605: and the master block chain node feeds back the identity to the power grid terminal through the slave block chain.
Through the technical means, the following beneficial effects can be realized:
the invention provides a safe storage scheme of power grid data, which can be used for encrypting the power grid data to generate encrypted power grid data before sending the power grid data after a power grid terminal generates the power grid data, and transmitting the encrypted power grid data outwards to ensure that the power grid data is safe in the transmission process.
In addition, the block chain technology is adopted to store the power grid data, and the block chain technology has higher safety, so that the power grid data is prevented from being tampered, and the safety of the power grid data can be ensured.
Referring to fig. 7, the present invention provides a second embodiment of a grid data secure storage system, including:
a plurality of grid terminals and a grid server; the power grid terminal is provided with a slave block chain client;
each power grid terminal is used for generating power grid data, constructing encrypted power grid data from the block chain client, and sending the encrypted power grid data to the power grid server;
the slave block chain node in the power grid server is used for receiving the encrypted power grid data, executing decryption operation on the encrypted power grid data, performing distributed aggregation signature operation on the power grid data if decryption of the slave block chain node is successful, and sending the power grid data to the master block chain node if the distributed aggregation signature is successful;
and the slave block link points in the power grid server are used for storing the power grid data.
The invention also provides a power grid data safe storage method, which is applied to a power grid terminal and comprises the following steps:
generating power grid data and constructing encrypted power grid data;
and sending the encrypted power grid data to a power grid server, and storing the power grid data by the power grid server by adopting a block chain technology.
The invention also provides a power grid data safe storage method, which is applied to a power grid server and comprises the following steps:
receiving encrypted power grid data sent by the power grid data;
and storing the power grid data by adopting a block chain technology.
Wherein the storing the grid data using blockchain techniques comprises:
the encrypted power grid data are received from the slave block chain nodes, decryption operation is carried out on the encrypted power grid data, if decryption of the slave block chain nodes is successful, distributed aggregation signature operation is carried out on the power grid data, and if distributed aggregation signature is successful, the power grid data are sent to the master block chain nodes;
and the master block chain node stores the power grid data.
Through the technical means, the following beneficial effects can be realized:
the invention provides a safe storage scheme of power grid data, which can be used for encrypting the power grid data to generate encrypted power grid data before sending the power grid data after a power grid terminal generates the power grid data, and transmitting the encrypted power grid data outwards to ensure that the power grid data is safe in the transmission process.
In addition, the block chain technology is adopted to store the power grid data, and the block chain technology has higher safety, so that the power grid data is prevented from being tampered, and the safety of the power grid data can be ensured.
The functions described in the method of the present embodiment, if implemented in the form of software functional units and sold or used as independent products, may be stored in a storage medium readable by a computing device. Based on such understanding, part of the contribution to the prior art of the embodiments of the present application or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. A power grid data safe storage method is characterized by comprising the following steps:
the power grid terminal generates power grid data, constructs encrypted power grid data and sends the encrypted power grid data to the slave block link points;
the encrypted power grid data are received from the slave block chain nodes, decryption operation is carried out on the encrypted power grid data, if decryption of the slave block chain nodes is successful, distributed aggregation signature operation is carried out on the power grid data, and if distributed aggregation signature is successful, the power grid data are sent to the master block chain nodes;
and the master block chain node stores the power grid data.
2. The method of claim 1, wherein the grid termination generating grid data and constructing encrypted grid data comprises:
the power grid terminal generates and stores a public key and a private key, and generates power grid data in the transaction process;
the power grid terminal calculates the power grid data by adopting a secure hash algorithm to obtain a power grid data fingerprint;
the power grid terminal adopts an elliptic encryption algorithm and the private key to perform signature operation on the power grid data fingerprint to obtain a signature;
and determining the power grid data, the signature and the public key as the encrypted power grid data.
3. The method of claim 2, wherein the performing a decryption operation on the encrypted grid data comprises:
calculating the power grid data by adopting a secure hash algorithm from the block link points to obtain a first power grid data fingerprint;
performing reverse signature operation on the signature by adopting an elliptic encryption algorithm and the public key from the block link point to obtain a second power grid data fingerprint;
and if the first power grid data fingerprint is consistent with the second power grid data fingerprint, determining that the analysis is successful, otherwise, determining that the decryption is failed.
4. The method of claim 3, wherein performing a distributed aggregate signature operation on the grid data if decryption from a block chain node is successful comprises:
respectively carrying out signature operation on each slave block chain child node in the slave block chain link points to obtain a signature;
performing aggregation operation on the signatures of the sub nodes of the slave block chain from the link points of the slave block chain to obtain an aggregated signature;
verifying whether the aggregated signature is correct;
and after verifying that the aggregated signature is correct, determining that the distributed aggregated signature is successful.
5. The method of claim 1, wherein the master blockchain node stores the power grid data, comprising:
the main block chain node stores the power grid data by adopting an intelligent contract; wherein the intelligent contract comprises: a data identity control contract, a data identity management contract, and a data management contract.
6. The method of claim 1, wherein the grid terminal is installed with a slave blockchain client.
7. A grid data secure storage system, comprising:
a plurality of grid terminals and a grid server; the power grid terminal is provided with a slave block chain client;
each power grid terminal is used for generating power grid data, constructing encrypted power grid data from the block chain client, and sending the encrypted power grid data to the power grid server;
the slave block chain node in the power grid server is used for receiving the encrypted power grid data, executing decryption operation on the encrypted power grid data, performing distributed aggregation signature operation on the power grid data if decryption of the slave block chain node is successful, and sending the power grid data to the master block chain node if the distributed aggregation signature is successful;
and the slave block link points in the power grid server are used for storing the power grid data.
8. A power grid data safe storage method is characterized by comprising the following steps:
generating power grid data and constructing encrypted power grid data;
and sending the encrypted power grid data to a power grid server, and storing the power grid data by the power grid server by adopting a block chain technology.
9. A power grid data safe storage method is characterized by comprising the following steps:
receiving encrypted power grid data sent by the power grid data;
and storing the power grid data by adopting a block chain technology.
10. The method of claim 9, wherein the storing the grid data using blockchain techniques comprises:
the encrypted power grid data are received from the slave block chain nodes, decryption operation is carried out on the encrypted power grid data, if decryption of the slave block chain nodes is successful, distributed aggregation signature operation is carried out on the power grid data, and if distributed aggregation signature is successful, the power grid data are sent to the master block chain nodes;
and the master block chain node stores the power grid data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911379999.4A CN111046411B (en) | 2019-12-27 | 2019-12-27 | Power grid data safe storage method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911379999.4A CN111046411B (en) | 2019-12-27 | 2019-12-27 | Power grid data safe storage method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111046411A true CN111046411A (en) | 2020-04-21 |
CN111046411B CN111046411B (en) | 2022-11-15 |
Family
ID=70239575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911379999.4A Active CN111046411B (en) | 2019-12-27 | 2019-12-27 | Power grid data safe storage method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111046411B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111629000A (en) * | 2020-05-27 | 2020-09-04 | 北京东方通科技股份有限公司 | Block chain-based data secure transmission method |
CN112116309A (en) * | 2020-08-10 | 2020-12-22 | 国网河北省电力有限公司沧州供电分公司 | User electricity consumption data acquisition method based on block chain |
CN112114175A (en) * | 2020-08-10 | 2020-12-22 | 国网河北省电力有限公司沧州供电分公司 | Block chain-based user electricity stealing behavior detection method |
CN112231770A (en) * | 2020-11-03 | 2021-01-15 | 上海第二工业大学 | Smart power grid data transmission method |
CN112948886A (en) * | 2021-03-26 | 2021-06-11 | 重庆倍来电新能源有限公司 | Method for improving data transmission security based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107094155A (en) * | 2017-06-14 | 2017-08-25 | 广东工业大学 | A kind of secure storage method of data and device based on alliance's block chain |
US20190089155A1 (en) * | 2017-09-20 | 2019-03-21 | Hepu Technology Development (Beijing) Co., Ltd. | Energy Internet Router |
CN110223062A (en) * | 2019-04-24 | 2019-09-10 | 中国南方电网有限责任公司 | Distributed power transaction system and method based on block chain |
CN110457926A (en) * | 2019-08-13 | 2019-11-15 | 重庆邮电大学 | It is a kind of industry Internet of Things in based on data encryption storage data sharing method |
-
2019
- 2019-12-27 CN CN201911379999.4A patent/CN111046411B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107094155A (en) * | 2017-06-14 | 2017-08-25 | 广东工业大学 | A kind of secure storage method of data and device based on alliance's block chain |
US20190089155A1 (en) * | 2017-09-20 | 2019-03-21 | Hepu Technology Development (Beijing) Co., Ltd. | Energy Internet Router |
CN110223062A (en) * | 2019-04-24 | 2019-09-10 | 中国南方电网有限责任公司 | Distributed power transaction system and method based on block chain |
CN110457926A (en) * | 2019-08-13 | 2019-11-15 | 重庆邮电大学 | It is a kind of industry Internet of Things in based on data encryption storage data sharing method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111629000A (en) * | 2020-05-27 | 2020-09-04 | 北京东方通科技股份有限公司 | Block chain-based data secure transmission method |
CN112116309A (en) * | 2020-08-10 | 2020-12-22 | 国网河北省电力有限公司沧州供电分公司 | User electricity consumption data acquisition method based on block chain |
CN112114175A (en) * | 2020-08-10 | 2020-12-22 | 国网河北省电力有限公司沧州供电分公司 | Block chain-based user electricity stealing behavior detection method |
CN112231770A (en) * | 2020-11-03 | 2021-01-15 | 上海第二工业大学 | Smart power grid data transmission method |
CN112948886A (en) * | 2021-03-26 | 2021-06-11 | 重庆倍来电新能源有限公司 | Method for improving data transmission security based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN111046411B (en) | 2022-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111046411B (en) | Power grid data safe storage method and system | |
CN111066285B (en) | SM2 signature based public key recovery method | |
CN110059494B (en) | Privacy protection method for block chain transaction data and block chain system | |
CN109756485B (en) | Electronic contract signing method, electronic contract signing device, computer equipment and storage medium | |
CN110612700B (en) | Authentication based on recovered public key | |
US9641340B2 (en) | Certificateless multi-proxy signature method and apparatus | |
US11641286B2 (en) | Sybil-resistant identity generation | |
CN109861828B (en) | Node access and node authentication method based on edge calculation | |
CN111682938A (en) | Three-party authenticatable key agreement method facing centralized mobile positioning system | |
CN112219371A (en) | Bidirectional block chain | |
CN106487786B (en) | Cloud data integrity verification method and system based on biological characteristics | |
Li et al. | A Provably Secure and Lightweight Identity‐Based Two‐Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks | |
CN112436938B (en) | Digital signature generation method and device and server | |
CN104468120B (en) | Method and system for realizing electronic signature | |
Kim et al. | Device authentication protocol for smart grid systems using homomorphic hash | |
WO2022116176A1 (en) | Method and device for generating digital signature, and server | |
CN112686672B (en) | Endorsement signature compression method on blockchain, electronic equipment and storage medium | |
Zhao et al. | Fuzzy identity-based dynamic auditing of big data on cloud storage | |
CN112417489A (en) | Digital signature generation method and device and server | |
US20150023498A1 (en) | Byzantine fault tolerance and threshold coin tossing | |
CN115643098A (en) | Cloud data sharing system and auditing system based on certificateless encryption | |
CN111769945A (en) | Auction processing method based on block chain and block chain link point | |
WO2022116175A1 (en) | Method and apparatus for generating digital signature and server | |
KR102070061B1 (en) | Batch verification method and apparatus thereof | |
CN110784318B (en) | Group key updating method, device, electronic equipment, storage medium and communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |