CN112116352A - Distributed energy transaction method for protecting user account privacy - Google Patents

Distributed energy transaction method for protecting user account privacy Download PDF

Info

Publication number
CN112116352A
CN112116352A CN202011037627.6A CN202011037627A CN112116352A CN 112116352 A CN112116352 A CN 112116352A CN 202011037627 A CN202011037627 A CN 202011037627A CN 112116352 A CN112116352 A CN 112116352A
Authority
CN
China
Prior art keywords
transaction
energy
account
user
seller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011037627.6A
Other languages
Chinese (zh)
Inventor
龙洋洋
陈玉玲
豆慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou University
Original Assignee
Guizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou University filed Critical Guizhou University
Priority to CN202011037627.6A priority Critical patent/CN112116352A/en
Publication of CN112116352A publication Critical patent/CN112116352A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention discloses a distributed energy transaction method for protecting user account privacy, which comprises the following implementation steps: utilizing a hyper leader platform to carry out platform construction of energy transaction business; the invention realizes the business process of energy transaction on the blockchain by matching with a supervision center and an intelligent contract, comprehensively applies blockchain technology to the energy transaction business, constructs the transaction based on the alliance chain among all parties involved in the transaction, and combines the characteristics of one-to-many privacy protection strategies and the block chain non-falsification, thereby protecting the identity privacy of a transaction entity and obviously improving the privacy protection performance in the energy transaction while realizing the energy transaction among all parties involved.

Description

Distributed energy transaction method for protecting user account privacy
Technical Field
The invention belongs to the technical field of energy Internet, and particularly relates to a distributed energy transaction method for protecting user account privacy.
Background
Energy is a power for promoting social development, energy problems are always the focus of attention, and energy trading is futures option trading which takes energy as a target investment. The traditional energy trading is mainly based on a resource allocation mode of centralized optimization decision, and a control center for processing and managing the energy trading is established. The method has the advantages of easy arrangement, easy adoption and the like, but has a series of safety problems, mainly comprising the following points:
1) lack of privacy protection and anonymity: the three-party intermediary can directly or indirectly view the private data of the user and can analyze and predict the next action of the user according to the acquired data.
2) Single point of failure: as a transaction information storage center, failure of a central third party authority can interfere with payment and authentication activities, preventing availability and reliability security goals from being provided.
Aiming at the defects of high cost and low safety of the traditional energy transaction centralized management mode, a learner adopts a decentralized transaction framework in sequence, and a distributed energy transaction scheme is provided, so that the efficiency of energy transaction is improved, and a credible transaction environment is provided for a transaction entity. Although the application of the blockchain technology in the distributed energy trading system brings obvious benefits, with the construction of large-scale distributed energy, the existing energy dispatching and trading schemes in the distributed energy market are not enough to support the diversified demands of users.
Distributed global accounts for recording transaction data in the block chain are all open in the network, and any attacker can indirectly or directly acquire information such as wallet accounts and transaction behaviors, so that privacy is revealed, and particularly transaction information occurring between transaction entities in adjacent areas in a microgrid and a park.
In a distributed energy transaction system, some privacy protection mechanisms have appeared at present, and the main idea is to hide part of information in public data without affecting transaction and storage efficiency, so as to increase the difficulty of data analysis, but two problems to be solved still exist:
1) because the distributed account book is failed due to the noise records stored in the blocks, most of the existing privacy protection mechanisms can not protect the privacy under the condition that the operation efficiency of the distributed energy transaction system is not influenced.
2) An attacker can acquire the privacy of the user without accurate data, analyze and sort the account book data, acquire the transaction information of any account through a data mining algorithm, and analyze a transaction relationship map and the like between accounts held by the same user.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a safe and reliable distributed energy transaction method capable of protecting the privacy of a user account.
The invention focuses on privacy protection of adjacent distributed energy transaction, introduces a weak centralized supervision mode, combines the demand side response of an intelligent contract, and provides a distributed energy transaction model for protecting the privacy of a user account.
The technical scheme of the invention is as follows:
a distributed energy transaction method for protecting user account privacy comprises the steps of constructing a safe energy transaction model based on an alliance block chain, and adopting the transaction model to carry out a transaction process, wherein the process comprises the following steps: user registration, transaction and verification; and comprises the following steps: during the transaction process of the user, when the energy selling party sends an energy selling request to a local aggregator in the form of an intelligent contract, after the TS verifies that no errors exist, the TS selects a transaction account for the seller user by adopting a one-to-many account matching mechanism, and allocates a wallet for storing transaction tokens to the account.
The safety transaction model Component of the distributed energy transaction comprises a Supervision Center (SC), a local aggregator (LBC) and a transaction entity, wherein the Supervision Center (SC), the local aggregator (LBC) and the transaction entity comprise three core objects:
1) the transaction entity: entities involved in the transaction include energy buyers and energy sellers. The trading entity can choose to sell or purchase energy according to the energy demand and the state of the trading entity.
2) The local aggregator: and as a trusted energy intermediary, the method saves complete block chain data and provides power access points and wireless communication services for the energy nodes. Each time the utility selling node sends a request for selling the utility to the nearest local aggregator, the transaction request for the utility node is verified by the local aggregator, and the request is broadcast to all the local aggregators, so as to match the power transaction pair for the utility node.
3) The supervision center: as a supervision department of energy transaction, the system authorizes local aggregators and transaction entities and effectively supervises transaction data.
The specific transaction process is as follows:
(1) user registration: to enhance the supervision and identify malicious users, users need to register with a supervision centre before participating in a transaction. The invention adopts a semi-centralized alliance block chain system, and arranges a local aggregator consisting of a token bank and a transaction server, so that the local aggregator manages the information of transactions and user accounts, and only authorized users can enter the transaction system.
(2) User transaction: and the transaction entity participating in the transaction selects to sell or purchase energy according to the energy state of the transaction entity, and the local aggregator performs matching on the transaction object and participates in the consensus process of the energy block chain system.
(3) Transaction verification: since the federation blockchain may perform the consensus process through selected nodes, the performance of each transaction need only be propagated to preselected nodes for verification. In the model, the nodes participating in the verification are local aggregators.
In the transaction process of the user, when the selling party sends a selling request to the local aggregator in the form of an intelligent contract, and after the TS verifies that the selling request is correct, the TS selects a transaction account for the seller user by adopting a one-to-many account matching mechanism, and allocates a wallet for storing transaction tokens to the account.
Compared with the prior art, the invention has the beneficial effects that:
1) safety: the distributed energy transaction model for protecting the privacy of the user account introduces a supervision center, is based on an alliance chain, combines a one-to-many account matching mechanism, is safer than the traditional centralized and decentralized transaction models, and can better protect the privacy of the user.
2) And (3) calculating the overhead: different from the verification of the block chain by the public chain whole network node, the consensus process is carried out by the local aggregator by adopting the alliance chain, so that the complicated consensus verification process is greatly simplified.
3) According to the distributed energy resource transaction system and the distributed energy resource transaction method, the one-to-many account matching mechanism is combined, the block chain of the alliance is applied to the distributed energy resource transaction, the privacy protection performance and the transaction efficiency of the distributed energy resource transaction are improved, and meanwhile the data security in the transaction process is ensured.
Drawings
FIG. 1 is a network diagram of an energy blockchain of the present invention;
FIG. 2 is a flow chart of an energy blockchain network transaction of the present invention;
FIG. 3 is a one-to-many account matching mechanism of the present invention;
FIG. 4 is a graph of group A energy collection in an exemplary analysis of the present invention;
FIG. 5 is a graph of group A energy consumption in an exemplary analysis of the present invention;
FIG. 6 is a graph of group B energy collection in an exemplary analysis of the present invention;
FIG. 7 is a graph of group B energy consumption in an exemplary analysis of the present invention;
FIG. 8 is a graph of group A raw energy sales distribution in an exemplary analysis of the present invention;
FIG. 9 is a graph of the distribution of the group B raw sales energy in an exemplary analysis of the present invention;
FIG. 10 is a graph of the distribution of sales energy after using the group A models in an exemplary analysis of the present invention;
FIG. 11 is a graph of the distribution of sales energy after using group B models in an exemplary analysis of the present invention;
FIG. 12 is a graph of transaction rates in an exemplary analysis of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it is to be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
According to the distributed energy transaction method for protecting the privacy of the user account, an energy source block chain network diagram is shown in fig. 1.
The process of using the transaction model to perform a transaction can be divided into three steps of user registration, transaction and verification, and a flow chart is shown in fig. 2 and explained in detail as follows:
1) user registration
Step 1: the user submits his own information (name, age, identification number, etc.) to the supervision center.
Step 2: the supervision center generates a set of public keys PK for the users by using an asymmetric encryption algorithmiAnd a private key SKiAnd use its private key SKscPublic key PK to useriAnd (5) encrypting to form a digital signature sign.
And step 3: the supervision center finally sends the public key PKiPrivate key SKiAnd returning the digital signature sign to the user.
After the user is registered by the supervision center, the node is a legal node. Other users may use the public key PK of the supervision centerscTo verify the validity of the digital signature sign.
2) User transactions
Step 1: the energy seller sends an energy seller request to the local aggregator in the form of an intelligent contract.
Step 2: after the TS verifies the error, the TS selects a transaction account for the energy seller user and assigns a wallet to the account for storing transaction tokens.
And step 3: after the account is selected, the TS packages the request information and broadcasts the request information to all local aggregators for matching of the buyers.
3) Transaction verification
Step 1: after the matching between the two parties is successful, the energy buyer receives the power selling contract Script submitted by the energy seller from the local aggregator, and generates a new contract newScript to negotiate the price with the energy seller.
Step 2: after the agreement is made with the energy selling party, the buyer pays the token to the energy selling party through the wallet, generates a transaction record and sends the transaction record to the energy selling party.
And step 3: and the energy selling party verifies the transaction record, digitally signs the transaction record and uploads the transaction record to a local aggregator for verification.
And 4, step 4: the consensus process is completed, the block data is written into the block chain in order by the accounting node, and the accounting node receives the rewarded transaction token. If the local aggregator disagrees with the data of the block, the accounting node further analyzes the verification result and sends the block data to the local aggregator with the disagreement. In the process of the consensus, all verification results hold respective digital signatures, and statistics and searching are easy.
In the safe energy transaction method based on the alliance blockchain, in the transaction process, the TS selects a transaction account for an energy seller user, a wallet is distributed to the account, and the process of storing transaction tokens is completed by a one-to-many account matching mechanism, as shown in figure 3.
The one-to-many account matching mechanism can provide at least two ways for the seller, and the correlation is defined as follows:
(1) create a new account and store tokens, defined as M, into the account's walletf
(2) Store token, defined as M, to wallet of original accountt
(3) The definition determines which mode to choose from by the function f. f(s)i,vi,Mt) Represented by the seller siThe ith energy transaction selection mode Mt. Wherein v isiThe ith energy transaction amount of the seller.
The specific implementation process of the one-to-many account matching mechanism is as follows:
firstly, the TS generates a dynamic random number B through a distributed prediction function T (..) for deciding whether to create a new account, and a mathematical expression for generating the random number B is shown as formula (1):
Figure BDA0002705549820000051
wherein v isiIndicating the ith energy transaction amount, V, of the selleri-1Representing a seller siSum of the first i-1 energy transactions of (e)1And e2Representing the current energy trade volume viThe occupied weight value and the occupied weight value of the previous i-1 average energy trading volume are within the range of (0, 1). The total energy transaction amount of the seller is a calculable value using ViRepresenting a seller SiThe sum of the first i energy trading volumes is represented by formula (2):
Figure BDA0002705549820000061
secondly, when the number of the energy coins required to be stored by the energy selling party is larger than B, M is selectedfMode, TS creates a new account and stores the energy currency in the new account, i.e., f(s)i,vi,Mf)。
Finally, when the number of the energy coins required to be stored by the energy selling party is less than B, M is selectedtMode, store energy coins to an existing account wallet, i.e. f(s)i,vi,Mt). At MtWhen the original account is selected in the mode, the model selects the account which is created earliest from the inactive accounts as the account of the current transaction according to the creation time sequence of the accounts.
Because many users rarely or never sell energy in the microgrid park transaction process of the safe energy transaction model, the accounts of the users are more obvious due to the creation of new accounts, and the inactive accounts need to be hidden while the new accounts are created. To address this issue, a one-to-many account matching mechanism hides these inactive accounts through the creation of virtual accounts.
The one-to-many account matching mechanism marks the account with the smaller energy transaction amount as the inactive account, uses the limiting parameter m to estimate the state of the inactive account, and any account with less than m accumulated transaction amount belongs to the inactive account.
Meanwhile, the proportion of the number of the inactive accounts is maintained in a fixed stage, is represented by n, and ranges from (0, 1).
Defining a seller siThe account held is the set R ═ Ria∪RaWherein R isiaIs a set of inactive accounts, RaIs an active account set.
Definition N denotes a seller siThe total number of accounts held.
Definition K represents the number of inactive accounts.
When equation (3) is satisfied, the model will create a virtual account.
Figure BDA0002705549820000071
The account matching algorithm may be represented by the following pseudo code:
Figure BDA0002705549820000072
in the invention, because the local aggregator needs to be accessed before the legal node participates in the transaction, the account of the local aggregator is uploaded to the local aggregator, the latest transaction data is downloaded from the local aggregator, the transaction data information is synchronized, the transaction information has traceability, and all transaction information can be traced through a traversal mode. In addition, the local aggregator already stores complete blockchain data, no matter how large the transaction data is, the user does not need to store and verify the transaction data on the whole blockchain, and only needs to synchronize the blockhead data, the size of each blockhead only keeps 80 bytes, and the burden of the user on storage is greatly reduced.
Example 1:
in order to analyze the relevant characteristics of the model, in an Ubuntu 16.04 environment, a simulation experiment is performed based on a hyper book (hyper Fabric 1.0) technology in this embodiment, and hardware parameters are as follows: 16GB memory, i5-6500 CPU and GeForce GT 730 graphics card. The experiment is based on the comparative analysis of privacy protection performance by a group of adjacent users, and the comparative analysis is carried out on the transaction verification time required by the model and the bitcoin transaction model. In addition, the security of the model is also evaluated.
1. Privacy protection performance analysis
500 energy nodes are selected for deploying the intelligent electric meter and the photovoltaic generator in the experiment, and the distribution and the trend of transaction are tested when the model is used or not used. The system comprises 200 buyer nodes, 200 seller nodes and 100 local aggregator nodes.
Respectively randomly selecting 50 adjacent users and 100 adjacent users from a buyer node and a seller node, collecting the power generation and power consumption conditions of the photovoltaic generators of the users in the same month, and respectively defining the power generation and power consumption conditions as an A group and a B group.
In group a, as shown in fig. 4 and 5, there are 50 neighbor users whose average collected power is 90.79 in the range of [62,124], whose average power consumption is 80.31 in the range of [52,115 ]. In group B, as shown in fig. 5 and 6, there are 100 neighbor users with average collected power of 89.58 in the range of 25,149, average power consumption of 79.54 in the range of 40,111.
Fig. 8 shows the energy sales distribution of 50 neighboring users retrieved from the original transaction record at the same time period as group a. In fig. 8, these distinctly different sales energy data are labeled, and it is easily seen that the sales power of at least 4 sellers exceeds the normal life power or is much lower than the average sales power.
Fig. 9 shows the energy sales distribution of 100 neighboring users retrieved from the original transaction record at the same time period as group B. In fig. 9, these distinctly different energy data are also labeled, and it is readily apparent that many sellers have distinctly different energy transactions than others.
From fig. 8 and 9, it is easy to conclude that these users have more photovoltaic generators in their homes, or rarely stay at home, and have a large amount of electricity left in addition to their daily power consumption. Meanwhile, more power equipment can be configured in the home of the user with lower electricity selling quantity.
Fig. 10 and 11 show the use of the random number B to limit the energy sales of an active seller. In FIG. 10, the model creates 14 accounts for the seller, with 10 new accounts and 4 virtual accounts. In FIG. 11, the model creates 45 accounts for the seller, 38 new accounts and 7 virtual accounts.
As is apparent from comparative analysis, the distributed energy transaction model for protecting the privacy of the user accounts not only creates new accounts for active sellers, but also can shield the distribution of adjacent accounts, so that the privacy of the sellers is protected to a great extent. In addition, the model also creates a virtual account for an inactive seller, where the virtual account is an account with a sales energy of 0. The experiment result shows that the model can hide the selling energy distribution condition of the seller as a whole, and the privacy protection performance of the user is improved.
2. Transaction verification time comparison analysis
In the bitcoin transaction model, the transaction verification time takes 60 minutes, and when the number of energy transactions increases, the transaction verification time that needs to be spent is higher than that of the secure energy transaction model based on the alliance chain block chain.
Aiming at the transaction performance of the model, the time required by completing transaction verification of one local aggregator is set to be 10 minutes in an experiment, the energy transaction frequency per hour is {1, 2, 3, 4 and 5}, 40 nodes are randomly selected from 100 local aggregators, and the transaction verification time change under a bitcoin transaction model and a safety energy transaction model based on a block chain of an alliance chain in 4 hours is observed. The transaction verification time refers to the time when the local aggregator completes the energy transaction consensus.
As shown in fig. 12, the federation chain block chain based secure energy transaction model has a lower transaction verification time when applied to energy transactions compared to bitcoin transaction models, since the consensus process for the transaction is performed by the local aggregator, which is less time to reach consensus. Therefore, under the same time, the energy nodes of the model take less time to continuously perform energy trading on the block chain. Experimental results show that the safe energy trading model based on the block chain of the alliance chain supports rapid energy trading.
3. Model security assessment
Unlike traditional communication security and privacy protection, the alliance chain blockchain-based secure energy transaction model uses alliance blockchain technology to ensure the security of energy transactions, and the security analysis related to blockchain mainly includes three aspects:
1) removal of trusted intermediary: different from the traditional centralized transaction relying on a trusted intermediary, the energy nodes registered by the supervision center trade energy in a point-to-point mode, all the energy nodes are accessed to an authorized local aggregator to conduct energy transaction, and all the energy nodes have equal trading rights. Without the involvement of a trusted intermediary, the model is secure and trusted.
2) And (4) account security: because each user holds a plurality of transaction accounts, an attacker cannot use a data mining related algorithm to analyze the relation between the shared data and the user in the block chain, and the safety of the accounts can be effectively guaranteed.
3) And (4) transaction verification security: all transaction data is publicly verified by other local aggregators. Due to the huge cost overhead, the transaction data is difficult to tamper with by the malicious node. Even if a malicious node tampers with the transaction data, the tampered transaction data is looked up and corrected before the block is constructed.
In summary, the model can be considered safe.
The invention mainly researches the privacy protection of the adjacent energy Internet transaction: an energy internet transaction model capable of protecting user privacy is provided by means of an alliance block chain technology, and advantages and disadvantages of the model in the aspects of privacy protection performance, safety, transaction efficiency and the like are discussed. The experimental result shows that the alliance block link and energy internet can effectively prevent an attacker from directly acquiring and analyzing transaction information under the condition of not influencing the transaction performance. Meanwhile, the model can be well applied to energy internet scenes. Although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that various changes in the embodiments and/or modifications of the invention can be made, and equivalents and modifications of some features of the invention can be made without departing from the spirit and scope of the invention.

Claims (9)

1. A distributed energy transaction method for protecting user account privacy is characterized in that: the method comprises the steps of constructing a safe energy transaction model based on an alliance block chain, wherein the process of performing one transaction by adopting the transaction model comprises the following steps: user registration, transaction and verification; and comprises the following steps: during the transaction process of the user, when the energy selling party sends an energy selling request to a local aggregator in the form of an intelligent contract, after the TS verifies that no errors exist, the TS selects a transaction account for the seller user by adopting a one-to-many account matching mechanism, and allocates a wallet for storing transaction tokens to the account.
2. The distributed energy transaction method for protecting privacy of a user account of claim 1, wherein: the user registration adopts a semi-centralized alliance block chain system, a local aggregator consisting of a token bank and a transaction server is arranged, the local aggregator manages information of transactions and user accounts, and only authorized users can enter the transaction system; when the user is in transaction, the transaction entity participating in the transaction selects to sell or purchase energy according to the energy state of the transaction entity, and the local aggregator performs matching on transaction objects and participates in the consensus process of the energy block chain system; when the transaction is verified, the alliance block executes a consensus process through the selected nodes, and the execution of each transaction is transmitted to the preselected nodes for verification; in the model, the nodes participating in the verification are local aggregators.
3. The distributed energy transaction method for protecting privacy of a user account according to claim 1 or 2, wherein: the model constituent elements comprise three core objects of a supervision center, a local aggregator and a transaction entity; wherein the transaction entity comprises an energy buyer and an energy seller; the trading entity selects to sell or buy energy according to the energy demand and the state of the trading entity; the local aggregator is used as a trusted energy intermediary, stores complete block chain data and provides power access points and wireless communication services for energy nodes; each energy selling node sends an energy selling request to the nearest local aggregator, the transaction request of the local aggregator for the energy node is verified, the requirement is broadcasted to all the local aggregators, and the energy node is matched with the electricity transaction pair; the supervision center is used as a supervision department of energy transaction, and can effectively supervise transaction data while authorizing local aggregators and transaction entities.
4. The distributed energy transaction method for protecting privacy of a user account according to claim 1, wherein the user registration comprises the steps of:
step 1: the user submits own information to the supervision center;
step 2: the supervision center generates a set of public keys PK for the users by using an asymmetric encryption algorithmiAnd a private key SKiAnd use its private key SKscPublic key PK to useriEncrypting to form a digital signature sign;
and step 3: the supervision center finally sends the public key PKiPrivate key SKiAnd returning the digital signature sign to the user;
the user is a legal node after being registered by the supervision center; other users may use the public key PK of the supervision centerscTo verify the validity of the digital signature sign.
5. The distributed energy transaction method for protecting privacy of a user account according to claim 1, wherein the user transaction comprises the steps of:
step 1: the energy selling party sends an energy selling request to the local aggregator in the form of an intelligent contract;
step 2: after the TS verifies that the transaction token is correct, the TS selects a transaction account for the energy seller user, and allocates a wallet for storing the transaction token to the account;
and step 3: after the account is selected, the TS packages the request information and broadcasts the request information to all local aggregators for matching of the buyers.
6. The distributed energy transaction method for protecting privacy of a user account according to claim 1, wherein the transaction verification comprises the steps of:
step 1: after the two parties are successfully matched, the energy buyer receives the power selling contract Script submitted by the energy selling party from the local aggregator and generates a new contract newScript to negotiate the price with the energy selling party;
step 2: after the agreement with the energy selling party is achieved, the buyer pays tokens to the energy selling party through a wallet of the buyer, generates a transaction record and sends the transaction record to the energy selling party;
and step 3: the energy selling party verifies the transaction record, digitally signs the transaction record and uploads the transaction record to a local aggregator for verification;
and 4, step 4: the consensus process is completed, the block data are written into the block chain in order by the accounting node, and the accounting node receives the rewarded transaction token; if the local aggregator disagrees the data of the block, the accounting node further analyzes the verification result and sends the block data to the local aggregator with the disagreement again; in this consensus process, all verification results hold their own digital signature.
7. The distributed energy transaction method for protecting privacy of a user account of claim 1, wherein: the secure energy transaction model based on the alliance blockchain selects a transaction account for an energy seller user during a transaction process TS, and allocates a wallet to the account, wherein the process for storing transaction tokens is completed by a one-to-many account matching mechanism, and the one-to-many account matching mechanism can at least provide two modes for a seller.
8. The distributed energy transaction method for protecting privacy of a user account of claim 6, wherein: the specific implementation process of the one-to-many account matching mechanism is as follows:
firstly, the TS generates a dynamic random number B through a distributed prediction function T (..) for deciding whether to create a new account, and a mathematical expression for generating the random number B is shown as formula (1):
Figure FDA0002705549810000031
wherein v isiIndicating the ith energy transaction amount, V, of the selleri-1Representing a seller siSum of the first i-1 energy transactions of (e)1And e2Representing the current energy trade volume viThe occupied weight value and the occupied weight value of the previous i-1 average energy trading volume are within the range of (0, 1); the total energy transaction amount of the seller is a calculable value using ViRepresenting a seller SiThe sum of the first i energy trading volumes is represented by formula (2):
Figure FDA0002705549810000032
secondly, when the number of the energy coins required to be stored by the energy selling party is larger than B, M is selectedfMode, TS creates a new account and stores the energy currency in the new account, i.e., f(s)i,vi,Mf);
Finally, when the number of the energy coins required to be stored by the energy selling party is less than B, M is selectedtMode, store energy coins to an existing account wallet, i.e. f(s)i,vi,Mt) (ii) a At MtWhen the original account is selected in the mode, the model selects the account which is created earliest from the inactive accounts as the current account according to the creation time sequence of the accountsAn account of the transaction.
9. The distributed energy transaction method for protecting privacy of a user account of claim 7, wherein: the mechanism hides from an inactive account through the creation of a virtual account, comprising the steps of: the mechanism marks the account with the smaller energy transaction amount as an inactive account, estimates the state of the inactive account by using a limiting parameter m, and accounts with the accumulated transaction amount less than m of any account belong to the inactive account; meanwhile, the proportion of the number of the inactive accounts is maintained in a fixed stage, and is represented by n, and the range is (0, 1);
when equation (3) is satisfied, the model will create a virtual account:
Figure FDA0002705549810000041
CN202011037627.6A 2020-09-28 2020-09-28 Distributed energy transaction method for protecting user account privacy Pending CN112116352A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011037627.6A CN112116352A (en) 2020-09-28 2020-09-28 Distributed energy transaction method for protecting user account privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011037627.6A CN112116352A (en) 2020-09-28 2020-09-28 Distributed energy transaction method for protecting user account privacy

Publications (1)

Publication Number Publication Date
CN112116352A true CN112116352A (en) 2020-12-22

Family

ID=73798659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011037627.6A Pending CN112116352A (en) 2020-09-28 2020-09-28 Distributed energy transaction method for protecting user account privacy

Country Status (1)

Country Link
CN (1) CN112116352A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113359464A (en) * 2021-06-30 2021-09-07 贵州大学 Multi-energy system for energy management based on decision tree and control method
CN113469684A (en) * 2021-07-16 2021-10-01 贵州大学 Fair energy transaction mode based on alliance chain
CN116720839A (en) * 2023-08-07 2023-09-08 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof
WO2023173253A1 (en) * 2022-03-14 2023-09-21 深圳技术大学 Data sharing method and device in energy transaction process, and storage medium
CN116911851A (en) * 2023-06-26 2023-10-20 石河子大学 Cotton transaction privacy protection method and system based on alliance chain

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
龙洋洋等人: "基于联盟区块链的安全能源交易方案", 《计算机应用》, 10 June 2020 (2020-06-10), pages 1668 - 1673 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113359464A (en) * 2021-06-30 2021-09-07 贵州大学 Multi-energy system for energy management based on decision tree and control method
CN113469684A (en) * 2021-07-16 2021-10-01 贵州大学 Fair energy transaction mode based on alliance chain
WO2023173253A1 (en) * 2022-03-14 2023-09-21 深圳技术大学 Data sharing method and device in energy transaction process, and storage medium
CN116911851A (en) * 2023-06-26 2023-10-20 石河子大学 Cotton transaction privacy protection method and system based on alliance chain
CN116720839A (en) * 2023-08-07 2023-09-08 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof
CN116720839B (en) * 2023-08-07 2023-10-17 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof

Similar Documents

Publication Publication Date Title
Aggarwal et al. Blockchain for smart communities: Applications, challenges and opportunities
Gao et al. A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks
Wu et al. A comprehensive survey of blockchain: From theory to IoT applications and beyond
Joshi et al. A survey on security and privacy issues of blockchain technology.
Wang et al. A blockchain based privacy-preserving incentive mechanism in crowdsensing applications
CN112116352A (en) Distributed energy transaction method for protecting user account privacy
Bada et al. Towards a green blockchain: A review of consensus mechanisms and their energy consumption
CN109450638A (en) Electronic component data management system and method based on block chain
Christidis et al. A framework for designing and evaluating realistic blockchain-based local energy markets
Zhang et al. Recent advances in blockchain and artificial intelligence integration: Feasibility analysis, research issues, applications, challenges, and future work
CN109947848A (en) Card method and apparatus are deposited based on block chain
CN110008720A (en) Internet of Things dynamic data source tracing method and device based on alliance's chain
CN107085807A (en) A kind of data assets method of commerce based on block chain
US20200410491A1 (en) Resource management system and method of operation thereof
Tkachuk et al. A survey on blockchain-based telecommunication services marketplaces
CN112801778A (en) Federated bad asset blockchain
Cong et al. Blockchain applications, challenges and evaluation: a survey
Gao et al. BFR-SE: a blockchain-based fair and reliable searchable encryption scheme for IoT with fine-grained access control in cloud environment
Mansoor et al. A Review of Blockchain Approaches for KYC
Bilal et al. Blockchain technology: Opportunities & challenges
Aldabbagh et al. Blockchain for securing smart grids
CN115052007A (en) Traceable public verification method, system and terminal for cloud storage data integrity
Li et al. Blockchain Technology-Based Electronic Payment Strategy for City Mobile Pass Cards
Sharma et al. Introduction to blockchain and distributed systems—fundamental theories and concepts
Xu et al. Exploring blockchain technology through a modular lens: A survey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination