CN113204741A - Method and system suitable for intelligent power consumption data aggregation - Google Patents
Method and system suitable for intelligent power consumption data aggregation Download PDFInfo
- Publication number
- CN113204741A CN113204741A CN202110389155.9A CN202110389155A CN113204741A CN 113204741 A CN113204741 A CN 113204741A CN 202110389155 A CN202110389155 A CN 202110389155A CN 113204741 A CN113204741 A CN 113204741A
- Authority
- CN
- China
- Prior art keywords
- intelligent electric
- terminal
- trusted
- control center
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004220 aggregation Methods 0.000 title claims abstract description 99
- 230000002776 aggregation Effects 0.000 title claims abstract description 93
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012545 processing Methods 0.000 claims description 61
- 230000005611 electricity Effects 0.000 claims description 40
- 238000004364 calculation method Methods 0.000 claims description 31
- 238000007405 data analysis Methods 0.000 claims description 31
- 230000008569 process Effects 0.000 claims description 25
- 238000001134 F-test Methods 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 claims description 10
- 238000003860 storage Methods 0.000 claims description 9
- 238000004422 calculation algorithm Methods 0.000 claims description 7
- 201000004569 Blindness Diseases 0.000 claims description 6
- 108010014172 Factor V Proteins 0.000 claims description 6
- 241000269319 Squalius cephalus Species 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 6
- 125000004122 cyclic group Chemical group 0.000 claims description 6
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 230000007246 mechanism Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000004931 aggregating effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 230000002457 bidirectional effect Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24553—Query execution of query operations
- G06F16/24554—Unary operations; Data partitioning operations
- G06F16/24556—Aggregation; Duplicate elimination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/06—Electricity, gas or water supply
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention discloses a method and a system suitable for intelligent power consumption data aggregation, and belongs to the technical field of information safety. The method comprises the following steps: generating initialization parameters of the intelligent electric energy meter and the convergence terminal by a trusted third party, and controlling the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization; after the initialization of the intelligent electric energy meter and the convergence terminal is completed, registering the intelligent electric energy meter to the convergence terminal and a trusted third party, registering the convergence terminal to the control center and the trusted third party, and registering the control center to the trusted third party; after the registration is completed, the intelligent electric energy meter sends user data to the convergence terminal, the convergence terminal acquires a user ID according to the user data and sends the user ID to the control center and the trusted third party, the trusted third party generates a blinding factor according to the user ID and transmits the blinding factor to the convergence terminal through the control center, and the convergence terminal aggregates the user data according to the blinding factor. The invention has a fault-tolerant mechanism and can protect data privacy.
Description
Technical Field
The present invention relates to the field of information security technologies, and more particularly, to a method and system suitable for intelligent power consumption data aggregation.
Background
The intelligent power grid is an automatic and intelligent novel power grid formed by combining a computer network and an information infrastructure, on one hand, the intelligent power grid has the characteristics of containing, interacting and opening, power consumers can participate in the operation of the power grid more widely through intelligent electric meters, the bidirectional interaction between the power grid and the power consumers is more frequent, and the power consumption experience of the power consumers is greatly improved. On the other hand, the smart grid has the characteristics of large number of users, strong bidirectional interactivity, complex network boundary and the like, and the openness and the inclusion of the smart grid also provide challenges for safe and reliable operation of the smart grid and privacy protection of power users. In the smart grid, an electric power company periodically acquires the power utilization information of a user through smart devices such as a smart meter and a collection terminal, analyzes the current power utilization condition of the power grid in real time, and regulates and controls the power.
However, the detailed electricity utilization information reveals important privacy such as living habits of users, whether people are at home and the use condition of electrical equipment at home, and the safety and social stability of the users are seriously threatened. Therefore, the research on the advanced smart grid privacy protection technology has important practical significance for ensuring the safe and reliable operation of the smart grid, maintaining the safety of power consumers and maintaining the social stability. Most of the existing privacy protection and data security aggregation technologies are realized based on a homomorphic encryption algorithm, so that large calculation overhead is brought, relatively few consideration is given in the aspect of data aggregation fault tolerance, and the existing privacy protection and data security aggregation technologies are not suitable for privacy protection and aggregation analysis processing of massive power consumption data by an intelligent power consumption information system, so that research on an intelligent power consumption data security high-efficiency aggregation method supporting fault tolerance and privacy protection is urgently needed, and the overall security of the intelligent power consumption information system is improved.
Disclosure of Invention
In order to solve the above problems, the present invention provides a method suitable for intelligent power consumption data aggregation, including:
generating initialization parameters of the intelligent electric energy meter and the convergence terminal by a trusted third party, and controlling the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization;
after the initialization of the intelligent electric energy meter and the convergence terminal is completed, registering the intelligent electric energy meter to the convergence terminal and a trusted third party, registering the convergence terminal to the control center and the trusted third party, and registering the control center to the trusted third party;
after the registration is completed, the intelligent electric energy meter sends user data to the convergence terminal, the convergence terminal acquires a user ID according to the user data and sends the user ID to the control center and the trusted third party, the trusted third party generates a blinding factor according to the user ID and transmits the blinding factor to the convergence terminal through the control center, and the convergence terminal aggregates the user data according to the blinding factor.
Optionally, the generating, by the trusted third party, the initialization parameter of the intelligent electric energy meter and the aggregation terminal includes:
the TTP gives a security parameter k, two large prime numbers p and q are selected, the p and the q meet | p | ═ k and q | (p-1), G is a cyclic group with the order of p, G is a generator of G, and the order of the generator is PFor secure one-way hash functions, initialization parameters are determined as { p, q, g, H0,H1,H2G }, wherein,is a cryptographic operation cycle group.
Optionally, the initialization parameters are { p, q, g, H0,H1,H2G } is disclosed.
Optionally, registering the intelligent electric energy meter to a trusted third party and a convergence terminal, registering the convergence terminal to a control center and the trusted third party, and registering the control center to the trusted third party specifically include:
registering the intelligent electric energy meter to a trusted third party and a convergence terminal comprises the following steps:
intelligent electric energy meter SMijSending a registration request and an intelligent electric energy meter user ID _ SM to a trusted third party TTPij;
TTP random selection r of trusted third partyij,According to xijDeterminingWherein r isijIs a random number xijAnd YijFor intelligent electric energy meter SMijA public and private key pair;
calculating a blinding factor pi from the ID of the intelligent userijWhere i denotes the ith smart meter, j 1,2i1,πi2,.......πin,Wherein n is the number of intelligent electric energy meters actually participating in aggregation;
trusted third party TTP sends parameter ID _ TTP, xij,Yij,rij,πijTo intelligent electric energy meter SMijIntelligent electric energy meter SMijTo rij,πiSecret storage;
to intelligent electric energy meter SMijTo a convergence terminal AggiAnd registering, including:
intelligent electric energy meter SMijSending registration request and ID _ SMijFor gathering terminal AggiRegistering;
the sink terminal will sink the terminal ID _ AggiSend to intelligent electric energy meter SMij。
The pair of convergence terminals AggiRegistering with a control center CC and a trusted third party TTP, comprising:
aggregation terminal AggiSending registration request and ID _ Agg to trusted third party TTPi;
TTP random selection r of trusted third partyi,Computingxi,YiFor a convergence terminal AggiPublic and private key pair of send (ID _ TTP, r)i,xi,Yi,Yij) For gathering terminal Aggi;
Aggregation terminal AggiSending registration request and ID _ AggiFeeding the control center CC;
the control center CC sends the ID _ CC to the aggregation terminal Aggi;
Registering the control center with a trusted third party, comprising:
the control center CC sends the ID _ CC to the TTP;
trusted third party TTP Transmission (ID _ TTP, Y)i) The registration is completed for the control center CC.
Optionally, the aggregating terminal aggregates the user data according to the blinding factor, which specifically includes:
intelligent electric energy meter SMijAcquiring power consumption data m of power consumerijSelecting a random numberUsing secret stored random numbers rijCalculating the electricity consumption data ciphertext and the signature information, wherein the calculation process is as follows:
si=ki-φi·xij modp
after the calculation is finished, the intelligent electric energy meter SMijDelivery ID _ SMij,ci,di,siT to the aggregation terminal Aggi;
Wherein d isiFor the user in the clear of electricity data, ciA data cipher text for the user, t is the current time stamp, p1 ijIs the average value data component p of the intelligent ammeter after the blinding processing2 ijCalculating variance data component p for the intelligent electric meter after the blind processing3 ijAnd p4 ijThe blind processing is carried out on the single-factor variance data component of the intelligent electric meter;
aggregation terminal AggiCalculating received ID _ SMij,ci,di,siThe hash value of t, and calculatingVerifying smart meter signature siThe verification process is as follows:
where j ∈ {1, 2.. n }.
If the verification is passed, calculating the aggregated data as follows:
the above-mentionedGathering the terminal Agg after the blind processingiThe aggregated data component of the mean value of the smart meters,gathering the terminal Agg after the blind processingiThe converged smart meter counts variance data components,andgathering the terminal Agg after the blind processingiThe converged single-factor variance data components of the intelligent electric meter;
aggregation terminal AggiRandom selectionComputingqi=θi-ψiximodp,qiIs AggiSignature value of wiAnd psiiIs AggiIs the current timestamp, and sendsFeeding the control center CC;
aggregation terminal AggiTransmission (ID _ SM)ij,ci,di) For a trusted third party TTP, the TTP calculates a blinding factor and a blinding-removing factor according to the ID of the intelligent electric energy meter actually participating in the convergence, and if the TTP actually participates in the intelligent electric energy meter SM with data aggregationijThe corresponding blinding factor is pii1,πi2,.......πin,Then TTP calculatesWhere j is 1,2,.. n, let pii0=-πimodp, trusted third party TTP sending pii0To a control center CC wherei0Is a blindness-removing factor;
control center CC calculationAuthenticationRandomly selecting a set of fractions delta1,δ2,......δn,δn∈[1,2S]DetectingWhere s is a small integer with less computational cost, where w is verifiediThe process is as follows:
control center CC calculates C1,C2,C3,C4Obtaining the consumption data of the whole power consumer by solving the discrete logarithm of c and n by adopting Pollard's lambda algorithm, and outputting the result as
Wherein, C1The average value data component C of the intelligent electric meter gathered by the control center CC after the blinding processing2Calculating variance data component C for intelligent electric meter converged by control center CC after blind processing3And C4For the intelligent electric meter single-factor variance data component gathered by the control center CC after the blinding processing, the calculation process is as follows:
if the arbitration is needed, the trusted third party TTP may decrypt the ciphertext data aggregated by the control center CC, which is specifically as follows:
optionally, the control center CC analyzes the power consumer data, where the data analysis includes data analysis of different power rate policies and data analysis under the same power rate policy, and specifically includes:
make SBExpressing the sum of squares of different electricity price strategies, using SwThe square sum under the same electricity price strategy is represented, and the specific calculation is as follows:
the control center can then calculate the F-value of the F-test:
the F value of the F-test is mainly used for judging whether the electricity price strategy has a remarkable influence on the electricity consumption of the user.
The invention also provides a system suitable for intelligent power utilization data aggregation, which comprises the following components:
the initialization module controls a trusted third party to generate initialization parameters of the intelligent electric energy meter and the convergence terminal and controls the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization;
the registration module registers the intelligent electric energy meter to the convergence terminal and a trusted third party, registers the convergence terminal to the control center and the trusted third party and registers the control center to the trusted third party after the intelligent electric energy meter and the convergence terminal are initialized;
and the aggregation module is used for sending user data to the aggregation terminal by the intelligent electric energy meter after the registration is finished, the aggregation terminal acquires a user ID according to the user data and sends the user ID to the control center and the credible third party, the credible third party generates a blinding factor according to the user ID and transmits the blinding factor to the aggregation terminal through the control center, and the aggregation terminal aggregates the user data according to the blinding factor.
Optionally, the generating, by the trusted third party, the initialization parameter of the intelligent electric energy meter and the aggregation terminal includes:
the TTP gives a security parameter k, two large prime numbers p and q are selected, the p and the q meet | p | ═ k and q | (p-1), G is a cyclic group with the order of p, G is a generator of G, and the order of the generator is PFor secure one-way hash functions, initialization parameters are determined as { p, q, g, H0,H1,H2G }, wherein,is a cryptographic operation cycle group.
Optionally, the initialization parameters are { p, q, g, H0,H1,H2G } is disclosed.
Optionally, registering the intelligent electric energy meter to a trusted third party and a convergence terminal, registering the convergence terminal to a control center and the trusted third party, and registering the control center to the trusted third party specifically include:
registering the intelligent electric energy meter to a trusted third party and a convergence terminal comprises the following steps:
intelligent electric energy meter SMijSending a registration request and an IDID _ SM of the intelligent electric energy meter user to a trusted third party TTPij;
TTP random selection r of trusted third partyij,According to xijDeterminingWherein r isijIs a random number xijAnd YijFor intelligent electric energy meter SMijA public and private key pair;
calculating a blinding factor pi from the ID of the intelligent userijWhere i denotes the ith smart meter, j 1,2i1,πi2,.......πin,Wherein n is the number of intelligent electric energy meters actually participating in aggregation;
trusted third party TTP sends parameter ID _ TTP, xij,Yij,rij,πijTo intelligent electric energy meter SMijIntelligent electric energy meter SMijTo rij,πiSecret storage;
to intelligent electric energy meter SMijTo a convergence terminal AggiAnd registering, including:
intelligent electric energy meter SMijSending registration request and ID _ SMijFor gathering terminal AggiRegistering;
the sink terminal will sink the terminal ID _ AggiSend to intelligent electric energy meter SMij。
The pair of convergence terminals AggiRegistering with a control center CC and a trusted third party TTP, comprising:
aggregation terminal AggiSending registration request and ID _ Agg to trusted third party TTPi;
TTP random selection r of trusted third partyi,Computingxi,YiFor a convergence terminal AggiPublic and private key pair of send (ID _ TTP, r)i,xi,Yi,Yij) For gathering terminal Aggi;
Aggregation terminal AggiSending registration request and ID _ AggiFeeding the control center CC;
the control center CC sends the ID _ CC to the aggregation terminal Aggi;
Registering the control center with a trusted third party, comprising:
the control center CC sends the ID _ CC to the TTP;
trusted third party TTP Transmission (ID _ TTP, Y)i) The registration is completed for the control center CC.
Optionally, the aggregating terminal aggregates the user data according to the blinding factor, which specifically includes:
intelligent electric energy meter SMijAcquiring power consumption data m of power consumerijSelecting a random numberUsing secret stored random numbers rijCalculating the electricity consumption data ciphertext and the signature information, wherein the calculation process is as follows:
si=ki-φi·xij modp
after the calculation is finished, the intelligent electric energy meter SMijDelivery ID _ SMij,ci,di,siT to the aggregation terminal Aggi;
Wherein d isiFor the user in the clear of electricity data, ciA data cipher text for the user, t is the current time stamp, p1 ijIs the average value data component p of the intelligent ammeter after the blinding processing2 ijCalculating variance data component p for the intelligent electric meter after the blind processing3 ijAnd p4 ijThe blind processing is carried out on the single-factor variance data component of the intelligent electric meter;
aggregation terminal AggiCalculating received ID _ SMij,ci,di,siThe hash value of t, and calculatingVerifying smart meter signature siThe verification process is as follows:
where j ∈ {1, 2.. n }.
If the verification is passed, calculating the aggregated data as follows:
the above-mentionedGathering the terminal Agg after the blind processingiThe aggregated data component of the mean value of the smart meters,gathering the terminal Agg after the blind processingiThe converged smart meter counts variance data components,andgathering the terminal Agg after the blind processingiThe converged single-factor variance data components of the intelligent electric meter;
aggregation terminal AggiRandom selectionComputingqi=θi-ψiximodp,qiIs AggiSignature value of wiAnd psiiIs AggiIs the current timestamp, and sendsFeeding the control center CC;
aggregation terminal AggiTransmission (ID _ SM)ij,ci,di) For a trusted third party TTP, the TTP calculates a blinding factor and a blinding-removing factor according to the ID of the intelligent electric energy meter actually participating in the convergence, and if the TTP actually participates in the intelligent electric energy meter SM with data aggregationijThe corresponding blinding factor is pii1,πi2,.......πin,Then TTP calculatesWhere j is 1,2,.. n, let pii0=-πimodp, trusted third party TTP sending pii0To a control center CC wherei0Is a blindness-removing factor;
control center CC calculationAuthenticationRandomly selecting a set of fractions delta1,δ2,......δn,δn∈[1,2S]DetectingWhere s is a small integer with less computational cost, where w is verifiediThe process is as follows:
control center CC calculates C1,C2,C3,C4Obtaining the consumption data of the whole power consumer by solving the discrete logarithm of c and n by adopting Pollard's lambda algorithm, and outputting the result as
Wherein, C1The average value data component C of the intelligent electric meter gathered by the control center CC after the blinding processing2Calculating variance data component C for intelligent electric meter converged by control center CC after blind processing3And C4For the intelligent electric meter single-factor variance data component gathered by the control center CC after the blinding processing, the calculation process is as follows:
if the arbitration is needed, the trusted third party TTP may decrypt the ciphertext data aggregated by the control center CC, which is specifically as follows:
optionally, the system further includes a data analysis module, where the data analysis module analyzes the power consumer data by using the control center CC, and the data analysis includes data analysis of different power rate policies and data analysis under the same power rate policy, and specifically includes:
make SBExpressing the sum of squares of different electricity price strategies, using SwThe square sum under the same electricity price strategy is represented, and the specific calculation is as follows:
the control center can then calculate the F-value of the F-test:
the F value of the F-test is mainly used for judging whether the electricity price strategy has a remarkable influence on the electricity consumption of the user.
On the premise of realizing privacy protection of the power consumers, the control center can realize analysis of the average value, the variance and the single-factor variance of the power consumption data of the power consumers, and effective arbitration is carried out when data disputes occur between the power consumers and a power company.
The intelligent electric energy meter control system has a fault-tolerant mechanism, and when individual intelligent electric energy meters have faults and data cannot be transmitted to the control center, data aggregation and processing can still be normally executed.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a block diagram of the system of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
The invention provides a method suitable for intelligent electricity consumption data aggregation, which comprises the following steps of:
generating initialization parameters of the intelligent electric energy meter and the convergence terminal by a trusted third party, and controlling the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization;
after the initialization of the intelligent electric energy meter and the convergence terminal is completed, registering the intelligent electric energy meter to the convergence terminal and a trusted third party, registering the convergence terminal to the control center and the trusted third party, and registering the control center to the trusted third party;
after the registration is finished, sending user data to a convergence terminal by the intelligent electric energy meter, acquiring a user ID by the convergence terminal according to the user data, sending the user ID to a control center and a trusted third party, generating a blinding factor by the trusted third party according to the user ID, transmitting the blinding factor to the convergence terminal through the control center, and aggregating the user data by the convergence terminal according to the blinding factor;
and analyzing the power user data by using the control center CC, wherein the data analysis comprises data analysis of different power price strategies and data analysis under the same power price strategy.
The method for generating the intelligent electric energy meter and the initialization parameters of the convergence terminal by the trusted third party comprises the following steps:
the TTP gives a security parameter k, two large prime numbers p and q are selected, the p and the q meet | p | ═ k and q | (p-1), G is a cyclic group with the order of p, G is a generator of G, and the order of the generator is PFor secure one-way hash functions, initialization parameters are determined as { p, q, g, H0,H1,H2G }, wherein,is a cryptographic operation cycle group.
Wherein the initialization parameters are { p, q, g, H0,H1,H2G } is disclosed.
The intelligent electric energy meter is registered to a trusted third party and a convergence terminal, the convergence terminal is registered to a control center and the trusted third party, and the control center is registered to the trusted third party, and the method specifically comprises the following steps:
registering the intelligent electric energy meter to a trusted third party and a convergence terminal comprises the following steps:
intelligent electric energy meter SMijSending a registration request and an intelligent electric energy meter user ID _ SM to a trusted third party TTPij;
TTP random selection r of trusted third partyij,According to xijDeterminingWherein r isijIs a random number xijAnd YijFor intelligent electric energy meter SMijA public and private key pair;
calculating a blinding factor pi from the ID of the intelligent userijWhere i denotes the ith smart meter, j 1,2i1,πi2,.......πin,Wherein n is the number of intelligent electric energy meters actually participating in aggregation;
trusted third party TTP sends parameter ID _ TTP, xij,Yij,rij,πijTo intelligent electric energy meter SMijIntelligent electric energy meter SMijTo rij,πiSecret storage;
to intelligent electric energy meter SMijTo a convergence terminal AggiAnd registering, including:
intelligent electric energy meter SMijSending registration request and ID _ SMijFor gathering terminal AggiRegistering;
final collectionEnd-to-end aggregation terminal ID _ AggiSend to intelligent electric energy meter SMij。
The pair of convergence terminals AggiRegistering with a control center CC and a trusted third party TTP, comprising:
aggregation terminal AggiSending registration request and ID _ Agg to trusted third party TTPi;
TTP random selection r of trusted third partyi,Computingxi,YiFor a convergence terminal AggiPublic and private key pair of send (ID _ TTP, r)i,xi,Yi,Yij) For gathering terminal Aggi;
Aggregation terminal AggiSending registration request and ID _ AggiFeeding the control center CC;
the control center CC sends the ID _ CC to the aggregation terminal Aggi;
Registering the control center with a trusted third party, comprising:
the control center CC sends the ID _ CC to the TTP;
trusted third party TTP Transmission (ID _ TTP, Y)i) The registration is completed for the control center CC.
The aggregation terminal aggregates the user data according to the blinding factor, and specifically includes:
intelligent electric energy meter SMijAcquiring power consumption data m of power consumerijSelecting a random numberUsing secret stored random numbers rijCalculating the electricity consumption data ciphertext and the signature information, wherein the calculation process is as follows:
si=ki-φi·xij modp
after the calculation is finished, the intelligent electric energy meter SMijDelivery ID _ SMij,ci,diSi, t to the aggregation terminal Aggi;
Wherein d isiFor the user in the clear of electricity data, ciA data cipher text for the user, t is the current time stamp, p1 ijIs the average value data component p of the intelligent ammeter after the blinding processing2 ijCalculating variance data component p for the intelligent electric meter after the blind processing3 ijAnd p4 ijThe blind processing is carried out on the single-factor variance data component of the intelligent electric meter;
aggregation terminal AggiCalculating received ID _ SMij,ci,di,siThe hash value of t, and calculatingVerifying smart meter signature siThe verification process is as follows:
where j ∈ {1, 2.. n }.
If the verification is passed, calculating the aggregated data as follows:
the above-mentionedGathering the terminal Agg after the blind processingiThe aggregated data component of the mean value of the smart meters,gathering the terminal Agg after the blind processingiThe converged smart meter counts variance data components,andgathering the terminal Agg after the blind processingiThe converged single-factor variance data components of the intelligent electric meter;
aggregation terminal AggiRandom selectionComputingqi=θi-ψiximodp,qiIs AggiSignature value of wiAnd psiiIs AggiIs the current timestamp, and sendsFeeding the control center CC;
aggregation terminal AggiTransmission (ID _ SM)ij,ci,di) For a trusted third party TTP, the TTP calculates a blinding factor and a blinding-removing factor according to the ID of the intelligent electric energy meter actually participating in the convergence, and if the TTP actually participates in the intelligent electric energy meter SM with data aggregationijThe corresponding blinding factor is pii1,πi2,.......πin,Then TTP calculatesWhere j is 1,2,.. n, let pii0=-πimodp, trusted third party TTP sending pii0To a control center CC wherei0Is a blindness-removing factor;
control center CC calculationAuthenticationRandomly selecting a set of fractions delta1,δ2,......δn,δn∈[1,2S]DetectingWhere s is a small integer with less computational cost, where w is verifiediThe process is as follows:
control center CC calculates C1,C2,C3,C4Obtaining the consumption data of the whole power consumer by solving the discrete logarithm of c and n by adopting Pollard's lambda algorithm, and outputting the result as
Wherein, C1The average value data component C of the intelligent electric meter gathered by the control center CC after the blinding processing2Calculating variance data component C for intelligent electric meter converged by control center CC after blind processing3And C4For the intelligent electric meter single-factor variance data component gathered by the control center CC after the blinding processing, the calculation process is as follows:
if the arbitration is needed, the trusted third party TTP may decrypt the ciphertext data aggregated by the control center CC, which is specifically as follows:
the control center CC analyzes the power consumer data, and the data analysis includes data analysis of different power rate strategies and data analysis under the same power rate strategy, and specifically includes:
make SBExpressing the sum of squares of different electricity price strategies, using SwThe square sum under the same electricity price strategy is represented, and the specific calculation is as follows:
the control center can then calculate the F-value of the F-test:
the F value of the F-test is mainly used for judging whether the electricity price strategy has a remarkable influence on the electricity consumption of the user.
The present invention further provides a system 200 for intelligent power consumption data aggregation, as shown in fig. 2, including:
the initialization module 201 is used for controlling a trusted third party to generate initialization parameters of the intelligent electric energy meter and the convergence terminal, and controlling the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization;
the registration module 202 is used for registering the intelligent electric energy meter to the convergence terminal and a trusted third party, registering the convergence terminal to the control center and the trusted third party and registering the control center to the trusted third party after the intelligent electric energy meter and the convergence terminal are initialized;
the aggregation module 203 is used for sending user data to the aggregation terminal by the intelligent electric energy meter after the registration is finished, the aggregation terminal acquires a user ID according to the user data and sends the user ID to the control center and the trusted third party, the trusted third party generates a blinding factor according to the user ID and transmits the blinding factor to the aggregation terminal through the control center, and the aggregation terminal aggregates the user data according to the blinding factor;
a data analysis module 204, which analyzes the power consumer data using the control center CC, and the data analysis includes data analysis of different power rate policies and data analysis under the same power rate policy.
The method for generating the intelligent electric energy meter and the initialization parameters of the convergence terminal by the trusted third party comprises the following steps:
the TTP gives a security parameter k, two large prime numbers p and q are selected, the p and the q meet | p | ═ k and q | (p-1), G is a cyclic group with the order of p, G is a generator of G, and the order of the generator is PFor secure one-way hash functions, initialization parameters are determined as { p, q, g, H0,H1,H2G }, wherein,is a cryptographic operation cycle group.
Wherein the initialization parameters are { p, q, g, H0,H1,H2G } is disclosed.
The intelligent electric energy meter is registered to a trusted third party and a convergence terminal, the convergence terminal is registered to a control center and the trusted third party, and the control center is registered to the trusted third party, and the method specifically comprises the following steps:
registering the intelligent electric energy meter to a trusted third party and a convergence terminal comprises the following steps:
intelligent electric energy meter SMijSending a registration request and an intelligent electric energy meter user ID _ SM to a trusted third party TTPij;
TTP random selection r of trusted third partyij,According to xijDeterminingWherein r isijIs a random number xijAnd YijFor intelligent electric energy meter SMijA public and private key pair;
calculating a blinding factor pi from the ID of the intelligent userijWhere i denotes the ith smart meter, j 1,2i1,πi2,.......πin,Wherein n is the number of intelligent electric energy meters actually participating in aggregation;
trusted third party TTP sends parameter ID _ TTP, xij,Yij,rij,πijTo intelligent electric energy meter SMijIntelligent electric energy meter SMijTo rij,πiSecret storage;
to intelligent electric energy meter SMijTo a convergence terminal AggiAnd registering, including:
intelligent electric energy meter SMijSending registration request and ID _ SMijFor gathering terminal AggiRegistering;
the sink terminal will sink the terminal ID _ AggiSend to intelligent electric energy meter SMij。
The pair of convergence terminals AggiRegistering with a control center CC and a trusted third party TTP, comprising:
aggregation terminal AggiSending registration request and ID _ Ag to trusted third party TTPgi;
TTP random selection r of trusted third partyi,Computingxi,YiFor a convergence terminal AggiPublic and private key pair of send (ID _ TTP, r)i,xi,Yi,Yij) For gathering terminal Aggi;
Aggregation terminal AggiSending registration request and ID _ AggiFeeding the control center CC;
the control center CC sends the ID _ CC to the aggregation terminal Aggi;
Registering the control center with a trusted third party, comprising:
the control center CC sends the ID _ CC to the TTP;
trusted third party TTP Transmission (ID _ TTP, Y)i) The registration is completed for the control center CC.
The aggregation terminal aggregates the user data according to the blinding factor, and specifically includes:
intelligent electric energy meter SMijAcquiring power consumption data m of power consumerijSelecting a random numberUsing secret stored random numbers rijCalculating the electricity consumption data ciphertext and the signature information, wherein the calculation process is as follows:
si=ki-φi·xij modp
after the calculation is finished, the intelligent electric energy meter SMijDelivery ID _ SMij,ci,di,siT to the aggregation terminal Aggi;
Wherein d isiFor the user in the clear of electricity data, ciA data cipher text for the user, t is the current time stamp, p1 ijIs the average value data component p of the intelligent ammeter after the blinding processing2 ijCalculating variance data component p for the intelligent electric meter after the blind processing3 ijAnd p4 ijThe blind processing is carried out on the single-factor variance data component of the intelligent electric meter;
aggregation terminal AggiCalculating received ID _ SMij,ci,di,siThe hash value of t, and calculatingVerifying smart meter signature siThe verification process is as follows:
where j ∈ {1, 2.. n }.
If the verification is passed, calculating the aggregated data as follows:
the above-mentionedGathering the terminal Agg after the blind processingiThe aggregated data component of the mean value of the smart meters,gathering the terminal Agg after the blind processingiThe converged smart meter counts variance data components,andgathering the terminal Agg after the blind processingiThe converged single-factor variance data components of the intelligent electric meter;
aggregation terminal AggiRandom selectionComputingqi=θi-ψiximodp,qiIs AggiSignature value of wiAnd psiiIs AggiIs the current timestamp, and sendsFeeding the control center CC;
aggregation terminal AggiTransmission (ID _ SM)ij,ci,di) For a trusted third party TTP, the TTP calculates a blinding factor and a blinding-removing factor according to the ID of the intelligent electric energy meter actually participating in the convergence, and if the TTP actually participates in the intelligent electric energy meter SM with data aggregationijThe corresponding blinding factor is pii1,πi2,.......πin,Then TTP calculatesWhere j is 1,2,.. n, let pii0=-πimodp, trusted third party TTP sending pii0To a control center CC wherei0Is a blindness-removing factor;
control center CC calculationAuthenticationRandomly selecting a set of fractions delta1,δ2,......δn,δn∈[1,2S]DetectingWhere s is a small integer with less computational cost, where w is verifiediThe process is as follows:
control center CC calculates C1,C2,C3,C4Obtaining the consumption data of the whole power consumer by solving the discrete logarithm of c and n by adopting Pollard's lambda algorithm, and outputting the result as
Wherein, C1The average value data component C of the intelligent electric meter gathered by the control center CC after the blinding processing2Calculating variance data component C for intelligent electric meter converged by control center CC after blind processing3And C4For the intelligent electric meter single-factor variance data component gathered by the control center CC after the blinding processing, the calculation process is as follows:
if the arbitration is needed, the trusted third party TTP may decrypt the ciphertext data aggregated by the control center CC, which is specifically as follows:
the data analysis module analyzes the power user data by using the control center CC, the data analysis comprises data analysis of different power price strategies and data analysis under the same power price strategy, and the data analysis specifically comprises the following steps:
make SBExpressing the sum of squares of different electricity price strategies, using SwThe square sum under the same electricity price strategy is represented, and the specific calculation is as follows:
the control center can then calculate the F-value of the F-test:
the F value of the F-test is mainly used for judging whether the electricity price strategy has a remarkable influence on the electricity consumption of the user.
On the premise of realizing privacy protection of the power consumers, the control center can realize analysis of the average value, the variance and the single-factor variance of the power consumption data of the power consumers, and effective arbitration is carried out when data disputes occur between the power consumers and a power company.
The intelligent electric energy meter control system has a fault-tolerant mechanism, and when individual intelligent electric energy meters have faults and data cannot be transmitted to the control center, data aggregation and processing can still be normally executed.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the invention can be realized by adopting various computer languages, such as object-oriented programming language Java and transliterated scripting language JavaScript.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (12)
1. A method adapted for intelligent electricity consumption data aggregation, the method comprising:
generating initialization parameters of the intelligent electric energy meter and the convergence terminal by a trusted third party, and controlling the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization;
after the initialization of the intelligent electric energy meter and the convergence terminal is completed, registering the intelligent electric energy meter to the convergence terminal and a trusted third party, registering the convergence terminal to the control center and the trusted third party, and registering the control center to the trusted third party;
after the registration is completed, the intelligent electric energy meter sends user data to the convergence terminal, the convergence terminal acquires a user ID according to the user data and sends the user ID to the control center and the trusted third party, the trusted third party generates a blinding factor according to the user ID and transmits the blinding factor to the convergence terminal through the control center, and the convergence terminal aggregates the user data according to the blinding factor.
2. The method of claim 1, wherein the generating, by the trusted third party, the initialization parameters of the intelligent electric energy meter and the aggregation terminal comprises:
the TTP gives a security parameter k, two large prime numbers p and q are selected, the p and the q meet | p | ═ k and q | (p-1), G is a cyclic group with the order of p, G is a generator of G, and the order of the generator is PFor secure one-way hash functions, initialization parameters are determined as { p, q, g, H0,H1,H2G }, wherein,is a cryptographic operation cycle group.
3. The method of claim 2, the initialization parameter being { p, q, g, H0,H1,H2G } is disclosed.
4. The method according to claim 1, wherein the registering the intelligent electric energy meter with the trusted third party and the aggregation terminal, the registering the aggregation terminal with the control center and the trusted third party, and the registering the control center with the trusted third party specifically include:
registering the intelligent electric energy meter to a trusted third party and a convergence terminal comprises the following steps:
intelligent electric energy meter SMijSending a registration request and an intelligent electric energy meter user ID _ SM to a trusted third party TTPij;
Trusted third party TTP random selectionAccording to xijDeterminingWherein r isijIs a random number xijAnd YijFor intelligent electric energy meter SMijA public and private key pair;
calculating a blinding factor pi from the ID of the intelligent userijWhere i denotes the ith smart meter, j 1,2i1,πi2,.......πin,Wherein n is the number of intelligent electric energy meters actually participating in aggregation;
trusted third party TTP transmissionParameter ID _ TTP, xij,Yij,rij,πijTo intelligent electric energy meter SMijIntelligent electric energy meter SMijTo rij,πiSecret storage;
to intelligent electric energy meter SMijTo a convergence terminal AggiAnd registering, including:
intelligent electric energy meter SMijSending registration request and ID _ SMijFor gathering terminal AggiRegistering;
the sink terminal will sink the terminal ID _ AggiSend to intelligent electric energy meter SMij。
The pair of convergence terminals AggiRegistering with a control center CC and a trusted third party TTP, comprising:
aggregation terminal AggiSending registration request and ID _ Agg to trusted third party TTPi;
Trusted third party TTP random selectionComputingxi,YiFor a convergence terminal AggiPublic and private key pair of send (ID _ TTP, r)i,xi,Yi,Yij) For gathering terminal Aggi;
Aggregation terminal AggiSending registration request and ID _ AggiFeeding the control center CC;
the control center CC sends the ID _ CC to the aggregation terminal Aggi;
Registering the control center with a trusted third party, comprising:
the control center CC sends the ID _ CC to the TTP;
trusted third party TTP Transmission (ID _ TTP, Y)i) The registration is completed for the control center CC.
5. The method according to claim 1, wherein the aggregation terminal aggregates the user data according to the blinding factor, and specifically comprises:
intelligent electric energy meter SMijAcquiring power consumption data m of power consumerijSelecting a random numberUsing secret stored random numbers rijCalculating the electricity consumption data ciphertext and the signature information, wherein the calculation process is as follows:
si=ki-φi·xijmod p
after the calculation is finished, the intelligent electric energy meter SMijDelivery ID _ SMij,ci,di,siT to the aggregation terminal Aggi;
Wherein d isiFor the user in the clear of electricity data, ciA data cipher text for the user, t is the current time stamp, p1 ijIs the average value data component p of the intelligent ammeter after the blinding processing2 ijCalculating variance data component p for the intelligent electric meter after the blind processing3 ijAnd p4 ijThe blind processing is carried out on the single-factor variance data component of the intelligent electric meter;
aggregation terminal AggiCalculating received ID _ SMij,ci,di,siThe hash value of t, and calculatingVerifying smart meter signature siThe verification process is as follows:
where j ∈ {1, 2.. n }.
If the verification is passed, calculating the aggregated data as follows:
the above-mentionedGathering the terminal Agg after the blind processingiThe converged mean value data component of the intelligent electric meter;gathering the terminal Agg after the blind processingiThe converged intelligent electric meter counts variance data components;andgathering the terminal Agg after the blind processingiThe converged single-factor variance data components of the intelligent electric meter;
aggregation terminal AggiRandom selectionComputingqi=θi-ψiximod p,qiIs AggiSignature value of wiAnd psiiIs AggiIs the current timestamp, and sendsFeeding the control center CC;
aggregation terminal AggiTransmission (ID _ SM)ij,ci,di) To trusted third parties TTPThe TTP calculates a blinding factor and a blinding-free factor according to the ID of the intelligent electric energy meter actually participating in the convergence, and if the TTP actually participates in the intelligent electric energy meter SM with data aggregationijThe corresponding blinding factor is pii1,πi2,.......πin,Then TTP calculatesWhere j is 1,2,.. n, let pii0=-πimod p, trusted third party TTP sending pii0To a control center CC wherei0Is a blindness-removing factor;
control center CC calculationAuthenticationRandomly selecting a set of fractions delta1,δ2,......δn,δn∈[1,2S]DetectingWhere s is a small integer with less computational cost, where w is verifiediThe process is as follows:
control center CC calculates C1,C2,C3,C4Obtaining the consumption data of the whole power consumer by solving the discrete logarithm of c and n by adopting Pollard's lambda algorithm, and outputting the resultThe fruit is
Wherein, C1The average value data component C of the intelligent electric meter gathered by the control center CC after the blinding processing2Calculating variance data component C for intelligent electric meter converged by control center CC after blind processing3And C4For the intelligent electric meter single-factor variance data component gathered by the control center CC after the blinding processing, the calculation process is as follows:
if the arbitration is needed, the trusted third party TTP may decrypt the ciphertext data aggregated by the control center CC, which is specifically as follows:
6. the method according to claim 1, wherein the control center CC analyzes the power consumer data, and the data analysis includes data analysis of different power rate policies and data analysis under the same power rate policy, and specifically includes:
make SBExpressing the sum of squares of different electricity price strategies, using SwThe square sum under the same electricity price strategy is represented, and the specific calculation is as follows:
the control center can then calculate the F-value of the F-test:
the F value of the F-test is mainly used for judging whether the electricity price strategy has a remarkable influence on the electricity consumption of the user.
7. A system adapted for intelligent electricity consumption data aggregation, the system comprising:
the initialization module controls a trusted third party to generate initialization parameters of the intelligent electric energy meter and the convergence terminal and controls the intelligent electric energy meter and the convergence terminal to use the initialization parameters to complete initialization;
the registration module registers the intelligent electric energy meter to the convergence terminal and a trusted third party, registers the convergence terminal to the control center and the trusted third party and registers the control center to the trusted third party after the intelligent electric energy meter and the convergence terminal are initialized;
and the aggregation module is used for sending user data to the aggregation terminal by the intelligent electric energy meter after the registration is finished, the aggregation terminal acquires a user ID according to the user data and sends the user ID to the control center and the credible third party, the credible third party generates a blinding factor according to the user ID and transmits the blinding factor to the aggregation terminal through the control center, and the aggregation terminal aggregates the user data according to the blinding factor.
8. The system of claim 7, wherein the generating of the initialization parameters of the intelligent electric energy meter and the aggregation terminal by the trusted third party comprises:
the TTP gives a security parameter k, two large prime numbers p and q are selected, the p and the q meet | p | ═ k and q | (p-1), G is a cyclic group with the order of p, G is a generator of G, and the order of the generator is PFor secure one-way hash functions, initialization parameters are determined as { p, q, g, H0,H1,H2G }, wherein,is a cryptographic operation cycle group.
9. The system of claim 8, the initialization parameters being { p, q, g, H0,H1,H2G } is disclosed.
10. The system of claim 7, wherein the registering the smart electric energy meter with the trusted third party and the aggregation terminal, the registering the aggregation terminal with the control center and the trusted third party, and the registering the control center with the trusted third party specifically include:
registering the intelligent electric energy meter to a trusted third party and a convergence terminal comprises the following steps:
intelligent electric energy meter SMijSending a registration request and an intelligent electric energy meter user ID _ SM to a trusted third party TTPij;
Trusted third party TTP random selectionAccording to xijDeterminingWherein r isijIs a random number xijAnd YijFor intelligent electric energy meter SMijA public and private key pair;
calculating a blinding factor pi from the ID of the intelligent userijWhere i denotes the ith smart meter, j 1,2i1,πi2,.......πin,Wherein n is the number of intelligent electric energy meters actually participating in aggregation;
trusted third party TTP sends parameter ID _ TTP, xij,Yij,rij,πijTo intelligent electric energy meter SMijIntelligent electric energy meter SMijTo rij,πiSecret storage;
to intelligent electric energy meter SMijTo a convergence terminal AggiAnd registering, including:
intelligent electric energy meter SMijSending registration request and ID _ SMijFor gathering terminal AggiRegistering;
the sink terminal will sink the terminal ID _ AggiSend to intelligent electric energy meter SMij。
The pair of convergence terminals AggiRegistering with a control center CC and a trusted third party TTP, comprising:
aggregation terminal AggiSending registration request and ID _ Agg to trusted third party TTPi;
Trusted third party TTP random selectionComputingxi,YiFor a convergence terminal AggiPublic and private key pair of send (ID _ TTP, r)i,xi,Yi,Yij) For gathering terminal Aggi;
Aggregation terminal AggiSending registration request and ID _ AggiFeeding the control center CC;
the control center CC sends the ID _ CC to the aggregation terminal Aggi;
Registering the control center with a trusted third party, comprising:
the control center CC sends the ID _ CC to the TTP;
trusted third party TTP Transmission (ID _ TTP, Y)i) The registration is completed for the control center CC.
11. The system according to claim 7, wherein the aggregation terminal aggregates the user data according to the blinding factor, and specifically includes:
intelligent electric energy meter SMijAcquiring power consumption data m of power consumerijSelecting a random numberUsing secret stored random numbers rijCalculating the electricity consumption data ciphertext and the signature information, wherein the calculation process is as follows:
si=ki-φi·xijmod p
after the calculation is finished, the intelligent electric energy meter SMijDelivery ID _ SMij,ci,di,siT to the aggregation terminal Aggi;
Wherein d isiFor the user in the clear of electricity data, ciA data cipher text for the user, t is the current time stamp, p1 ijIs the average value data component p of the intelligent ammeter after the blinding processing2 ijCalculating variance data component p for the intelligent electric meter after the blind processing3 ijAnd p4 ijThe blind processing is carried out on the single-factor variance data component of the intelligent electric meter;
aggregation terminal AggiCalculating received ID _ SMij,ci,di,siThe hash value of t, and calculatingVerifying smart meter signature siThe verification process is as follows:
where j ∈ {1, 2.. n }.
If the verification is passed, calculating the aggregated data as follows:
the above-mentionedGathering the terminal Agg after the blind processingiThe aggregated data component of the mean value of the smart meters,gathering the terminal Agg after the blind processingiThe converged smart meter counts variance data components,andgathering the terminal Agg after the blind processingiThe converged single-factor variance data components of the intelligent electric meter;
aggregation terminal AggiRandom selectionComputingqi=θi-ψiximod p,qiIs AggiSignature value of wiAnd psiiIs AggiIs the current timestamp, and sendsFeeding the control center CC;
aggregation terminal AggiTransmission (ID _ SM)ij,ci,di) For a trusted third party TTP, the TTP calculates a blinding factor and a blinding-removing factor according to the ID of the intelligent electric energy meter actually participating in the convergence, and if the TTP actually participates in the intelligent electric energy meter SM with data aggregationijThe corresponding blinding factor is pii1,πi2,.......πin,Then TTP calculatesWhere j is 1,2,.. n, let pii0=-πimodp, trusted third party TTP sending pii0To a control center CC wherei0Is a blindness-removing factor;
control center CC calculationAuthenticationRandomly selecting a set of fractions delta1,δ2,......δn,δn∈[1,2S]DetectingWhere s is a small integer with less computational cost, where w is verifiediThe process is as follows:
control center CC calculates C1,C2,C3,C4Obtaining the consumption data of the whole power consumer by solving the discrete logarithm of c and n by adopting Pollard's lambda algorithm, and outputting the result as
Wherein, C1The average value data component C of the intelligent electric meter gathered by the control center CC after the blinding processing2Calculating variance data component C for intelligent electric meter converged by control center CC after blind processing3And C4For the intelligent electric meter single-factor variance data component gathered by the control center CC after the blinding processing, the calculation process is as follows:
if the arbitration is needed, the trusted third party TTP may decrypt the ciphertext data aggregated by the control center CC, which is specifically as follows:
12. the system according to claim 7, further comprising a data analysis module, wherein the data analysis module analyzes the power consumer data by using the control center CC, and the data analysis comprises data analysis of different power rate policies and data analysis under the same power rate policy, and specifically comprises:
make SBExpressing the sum of squares of different electricity price strategies, using SwThe square sum under the same electricity price strategy is represented, and the specific calculation is as follows:
the control center can then calculate the F-value of the F-test:
the F value of the F-test is mainly used for judging whether the electricity price strategy has a remarkable influence on the electricity consumption of the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110389155.9A CN113204741A (en) | 2021-04-12 | 2021-04-12 | Method and system suitable for intelligent power consumption data aggregation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110389155.9A CN113204741A (en) | 2021-04-12 | 2021-04-12 | Method and system suitable for intelligent power consumption data aggregation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113204741A true CN113204741A (en) | 2021-08-03 |
Family
ID=77026634
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110389155.9A Pending CN113204741A (en) | 2021-04-12 | 2021-04-12 | Method and system suitable for intelligent power consumption data aggregation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113204741A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115033908A (en) * | 2022-08-11 | 2022-09-09 | 西南石油大学 | Cloud storage-based oil and gas exploration fine-grained dense-state data retrieval method |
-
2021
- 2021-04-12 CN CN202110389155.9A patent/CN113204741A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115033908A (en) * | 2022-08-11 | 2022-09-09 | 西南石油大学 | Cloud storage-based oil and gas exploration fine-grained dense-state data retrieval method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109474610B (en) | Anonymous certifiable key exchange method based on smart grid | |
Wang | An identity-based data aggregation protocol for the smart grid | |
CN102983965B (en) | Transformer station's quantum communications model, quantum key distribution center and model implementation method | |
CN111209334B (en) | Power terminal data security management method based on block chain | |
CN113691380B (en) | Multidimensional private data aggregation method in smart power grid | |
CN109639677A (en) | A kind of cloud storage outsourcing decryption properties base encryption method limiting access times | |
CN104767763B (en) | The zone user electricity paradigmatic system and method for secret protection in a kind of intelligent grid | |
CN102946603B (en) | Based on the unified identity authentication method of social characteristic in power cloud system | |
CN108683493A (en) | The data aggregation method of secret protection is provided in a kind of intelligent grid | |
CN111131148A (en) | Aggregation method and system capable of protecting privacy data and facing smart power grid | |
CN110489982B (en) | Smart power grid data aggregation and encryption method with forward security | |
CN105763563A (en) | Identity authentication method during quantum secret key application process | |
CN110120868A (en) | A kind of smart grid security data aggregation method and system based on block chain technology | |
CN110430050A (en) | A kind of smart grid collecting method based on secret protection | |
Zhang et al. | Blockchain-based secure equipment diagnosis mechanism of smart grid | |
CN104639311A (en) | Combining method and system for protecting power utilization privacy and integrity in smart power grid | |
CN108718240A (en) | Authentication method, electronic equipment, storage medium based on full homomorphic cryptography and system | |
CN109245885A (en) | Cryptographic key negotiation method, equipment, storage medium and system | |
CN105897784A (en) | Internet of things terminal equipment encryption communication method and device | |
CN112989416A (en) | Anonymous multidimensional data aggregation privacy protection method facing smart power grid | |
CN107172043A (en) | A kind of smart power grid user sale of electricity method based on homomorphic cryptography | |
CN113901412A (en) | Power quality disturbance detection method and device, electronic equipment and storage medium | |
CN106453353A (en) | Method for authenticating cloud by user terminal | |
CN111865989A (en) | Data security protection method for intelligent electric meter | |
CN115001717A (en) | Terminal equipment authentication method and system based on identification public key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |