CN113282810A - Block chain hash-based encrypted electric power transaction data post-verification method and device - Google Patents

Block chain hash-based encrypted electric power transaction data post-verification method and device Download PDF

Info

Publication number
CN113282810A
CN113282810A CN202110499726.4A CN202110499726A CN113282810A CN 113282810 A CN113282810 A CN 113282810A CN 202110499726 A CN202110499726 A CN 202110499726A CN 113282810 A CN113282810 A CN 113282810A
Authority
CN
China
Prior art keywords
service data
data
hash
layer
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110499726.4A
Other languages
Chinese (zh)
Other versions
CN113282810B (en
Inventor
吉斌
昌力
丁恰
曹荣章
朱丽叶
朱珈仪
吴炳祥
朱敏健
曹斌
杨洋
江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nari Technology Co Ltd
Original Assignee
Nari Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nari Technology Co Ltd filed Critical Nari Technology Co Ltd
Priority to CN202110499726.4A priority Critical patent/CN113282810B/en
Publication of CN113282810A publication Critical patent/CN113282810A/en
Application granted granted Critical
Publication of CN113282810B publication Critical patent/CN113282810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain hash-based post-verification method for encrypted electric power transaction data. The method comprises the steps of decomposing electric power transaction service data layer by layer to obtain a corresponding hierarchical structure; respectively carrying out hash encryption operation on the service data of each layer to generate corresponding hash ciphertexts, and storing the hash ciphertexts on a block chain in a distributed manner; when the full-power transaction service data needs to be verified, the service data of each level are encrypted layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext and the hash ciphertext is compared with the corresponding hash ciphertext stored on the chain until all plaintexts are verified or a tampered service data source is located. The method and the device realize the positioning of the tampering of the plaintext data of the electric power transaction service, and improve the management level and the verification efficiency of the data of the electric power transaction service.

Description

Block chain hash-based encrypted electric power transaction data post-verification method and device
Technical Field
The invention belongs to the technical field of electric power system dispatching automation, and particularly relates to a block chain hash-based encrypted electric power transaction data post-verification method and a block chain hash-based encrypted electric power transaction data post-verification device.
Background
With the development of the electric power trading market, the post-inspection and maintenance of the data of the electric power trading become the key point and difficulty of the future electric power trading maintenance.
The electric power trading market comprises medium-long term, short term, day-ahead, day-in-the-day, real-time, peak-shaving frequency modulation and other types of electric power trading, and meanwhile, a plurality of market main bodies are involved, including a dispatching center, a trading center, a power generation side main body, a load side main body, a power grid and the like.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a block chain hash-based encrypted electric power transaction data post-verification method, which realizes the positioning of electric power transaction plaintext data tampering on the premise of ensuring the high-efficiency data service anti-tampering data verification, and improves the management level and the verification efficiency of electric power transaction service data.
In order to solve the technical problems, the invention provides the following technical scheme.
In a first aspect, the invention provides a block chain hash-based encrypted electric power transaction data post-verification method, which comprises the following steps:
acquiring electric power transaction service data;
decomposing the electric power transaction service data layer by layer to obtain a corresponding hierarchical structure;
respectively carrying out hash encryption operation on the service data of each layer to generate corresponding hash ciphertexts, and storing the hash ciphertexts on a block chain in a distributed manner;
when the full-scale electric power transaction service data needs to be verified, according to a service scene, the service data is encrypted layer by layer from top to bottom according to a hierarchical structure to generate a hash ciphertext, and the hash ciphertext is compared with a corresponding hash ciphertext stored on a chain, so that a tampered service data source is positioned.
Optionally, the power transaction service data includes demand release data of power transaction, declaration data of a power transaction participating subject, power system operation data, transaction clearing data, transaction execution data, transaction settlement data, and transaction assessment data.
Optionally, the number of layers of the hierarchical structure is determined by the accuracy requirement of tampering and positioning of the service data.
Optionally, the decomposing the power transaction service data layer by layer to obtain a corresponding hierarchical structure includes:
taking full service data as a first layer;
decomposing the full service data into a plurality of module service data according to different data sources to form a second layer;
decomposing each module data into a plurality of main body service data according to different market main bodies to form a third layer;
decomposing each main data into a plurality of service element data according to different service elements to form a fourth layer;
decomposing each element service data into a plurality of service data according to different service data contents to form a fifth layer;
and repeating the steps until the layer number meets the precision requirement of the service data tampering positioning.
Optionally, the performing hash encryption operation on the service data of each layer respectively to generate corresponding hash ciphertexts includes:
carrying out hash encryption on the full service data in the first layer to obtain a full service data hash ciphertext;
performing hash encryption on each module service data in the second layer to obtain a hash ciphertext of each module service data;
performing hash encryption on each main service data in the third layer to obtain a hash ciphertext of each main service data;
performing hash encryption on each service element data in the fourth layer to obtain a hash ciphertext of each service element data;
and carrying out hash encryption on the service data in the fifth layer to obtain a hash ciphertext of the service data.
Optionally, the encrypting, according to the service scene, the service data of each hierarchy layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext, comparing the hash ciphertext with a corresponding hash ciphertext stored in a chain, and locating the tampered service data source includes:
encrypting the full service data in the first layer by using a hash encryption algorithm encrypted by the uplink to generate a hash ciphertext, and comparing the hash ciphertext with the full service data hash ciphertext stored in the link for storage;
if the comparison and verification results are consistent, the fact that the service data is not tampered does not exist, and verification is finished;
if the comparison and verification results are inconsistent, performing hash encryption on the service data of each module in the second layer of the full service data decomposition, and respectively comparing the hash encryption with the hash ciphertext of the module service data stored on the chain to find out the module service data with inconsistent comparison;
performing hash encryption on each main service data in the third layer decomposed by the inconsistent module service data, comparing the main service data with a corresponding main service data hash ciphertext stored on a chain, and finding out the inconsistent main service data; and so on until finding the lowest tampered data source determined by the business scenario.
In a second aspect, the present invention provides a block chain hash-based device for verifying encrypted electric power transaction data after the fact, including:
the data acquisition module is used for acquiring power transaction service data;
the data decomposition module is used for decomposing the electric power transaction service data layer by layer to obtain a corresponding hierarchical structure;
the data certificate storage module is used for respectively carrying out hash encryption operation on the service data of each level to generate corresponding hash ciphertexts and storing the hash ciphertexts on the block chain in a distributed manner;
and the data verification module is used for encrypting the service data of each level layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext according to the service scene when the full-power transaction service data needs to be verified, comparing the hash ciphertext with the corresponding hash ciphertext stored in the chain, and positioning the tampered service data source.
Optionally, in the data decomposition module, the decomposing the power transaction service data layer by layer to obtain a corresponding hierarchical structure includes:
taking full service data as a first layer;
decomposing the full service data into a plurality of module service data according to different data sources to form a second layer;
decomposing each module data into a plurality of main body service data according to different market main bodies to form a third layer;
decomposing each main data into a plurality of service element data according to different service elements to form a fourth layer;
decomposing each element service data into a plurality of service data according to different service data contents to form a fifth layer;
and repeating the steps until the layer number meets the precision requirement of the service data tampering positioning.
Optionally, in the data storage module, the hash encryption operation is performed on the service data of each hierarchy respectively to generate corresponding hash ciphertexts, including:
carrying out hash encryption on the full service data in the first layer to obtain a full service data hash ciphertext;
performing hash encryption on each module service data in the second layer to obtain a hash ciphertext of each module service data;
performing hash encryption on each main service data in the third layer to obtain a hash ciphertext of each main service data;
performing hash encryption on each service element data in the fourth layer to obtain a hash ciphertext of each service element data;
and carrying out hash encryption on the service data in the fifth layer to obtain a hash ciphertext of the service data.
Optionally, in the data verification module, the encrypting, according to the service scene, the service data of each hierarchy from top to bottom layer by layer according to the hierarchy to generate a hash ciphertext and comparing the hash ciphertext with a corresponding hash ciphertext stored in a chain, and locating the tampered service data source includes:
encrypting the full service data in the first layer by using a hash encryption algorithm encrypted by the uplink to generate a hash ciphertext, and comparing the hash ciphertext with the full service data hash ciphertext stored in the link for storage;
if the comparison and verification results are consistent, the fact that the service data is not tampered does not exist, and verification is finished;
if the comparison and verification results are inconsistent, performing hash encryption on the service data of each module in the second layer of the full service data decomposition, and respectively comparing the hash encryption with the hash ciphertext of the module service data stored on the chain to find out the module service data with inconsistent comparison;
performing hash encryption on each main service data in the third layer decomposed by the inconsistent module service data, comparing the main service data with a corresponding main service data hash ciphertext stored on a chain, and finding out the inconsistent main service data; and so on until finding the lowest tampered data source determined by the business scenario.
Compared with the prior art, the invention has the following beneficial effects: according to the method, through a hash encryption algorithm of a block chain technology, according to the requirements of post-verification and verification of electric power transaction service data, the transaction data are subjected to hash encryption step by step, generated hash character strings are stored in a block chain, the transaction data needing to be verified are taken out from a database after the fact and subjected to hash encryption and compared with hash ciphertext character strings of historical service data stored on the chain, and the modified transaction service data plaintext is located. The method realizes the flexible encryption verification of the electric power transaction service data as required, reduces the data volume of the data verification, provides a plaintext data tampering positioning function, improves the efficiency and the adaptability of the data verification and encryption, and can meet the requirement of rapid data verification on the premise of explosive growth of the electric power transaction service data in the future.
Drawings
Fig. 1 is a flow of a post-verification method for encrypting power transaction data based on a blockchain hash;
fig. 2 is a schematic diagram of a data layering and encryption verification sequence method for block chain hash-based encrypted power transaction data.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Example 1
The invention discloses a block chain hash-based encrypted electric power transaction data post-verification method, which is shown in a figure 1 and comprises the following steps:
step S1, acquiring power transaction service data needing to be subjected to hash encryption and chain storage;
according to the development degree of the electric power trading market and the construction condition of the trading system, trading data of declaration, release, clearing, metering, settlement and examination of a user is obtained through an interface of the electric power trading system and is used as electric power trading business data for verifying electric power trading data after events. The method mainly comprises demand release data of power transaction, declaration data of a power transaction participating main body, power system operation data (including section data, node blocking data, safety check result data and the like), transaction clearing data, transaction execution data, transaction settlement data, transaction assessment data and the like.
The method comprises the steps of obtaining a hash encryption uplink certificate through reading a power system database (peripheral data of power transaction decision) such as regulation, safety check and the like, encrypting the service data of power transaction and storing the certificate in a distributed mode based on a distributed broadcast communication mechanism of a block chain, wherein the purpose of storing the certificate is to prevent ciphertext service data from being tampered by a single node certificate, and the anti-tampering and traceable effects of transaction service data can be achieved.
Step S2, decomposing the electric power transaction business data
Checking the granularity of the business data and the detail degree of the data (such as the precision requirement of data tampering and positioning) according to the needs of the power trading market, screening power trading business data of different levels, decomposing and refining the business data layer by layer from top to bottom, wherein the lower layer is related to the upper layer until the requirement that the specific data tampering is accurately positioned is met.
The hierarchical structure of the power transaction business data decomposition is shown in fig. 2, and comprises:
taking full service data as a first layer;
decomposing the full service data into a plurality of module service data according to different data sources to form a second layer;
decomposing each module data into a plurality of main body service data according to different market main bodies to form a third layer; the main body refers to each market main body participating in electric power market trading, and comprises a dispatching center, a trading center, an electricity selling company, a power grid company, market electric power users, a load aggregator and the like.
Decomposing each main data into a plurality of service element data according to different service elements to form a fourth layer;
decomposing each element service data into a plurality of service data according to different service data contents to form a fifth layer;
and repeating the steps until the requirement of tampering and positioning the service data is met. The deeper the hierarchy, the more accurate the positioning.
Taking the transaction declaration as an example: dividing the transaction into a plurality of module service data according to the main body of transaction declaration, the transaction declaration time and the transaction declaration content; when the tampered transaction declaration content needs to be determined, the declaration content needs to be decomposed into: reporting electric quantity, reporting price and reporting transaction remarks.
Step S3, the electric power transaction business data is encrypted by hash
And respectively carrying out hash encryption operation on the service data of different levels to generate corresponding hash ciphertext character strings, and executing ciphertext storage to a block chain and carrying out distributed broadcast storage.
Referring to fig. 2, a cipher text obtained by performing hash encryption operation on the service data of each layer is as follows:
carrying out hash encryption on the full service data to obtain a full service data hash ciphertext;
carrying out hash encryption on the service data of each module to obtain a hash ciphertext of the service data of each module;
carrying out hash encryption on each main service data to obtain a hash ciphertext of each main service data;
carrying out hash encryption on each service element data to obtain a hash ciphertext of each service element data;
carrying out hash encryption on each service data to obtain a hash ciphertext of each service data;
and step S4, when the full-scale electric power transaction service data needs to be verified, comparing the hash character string of the service data needing to be verified with the hash character string of the historical service data on the chain.
And storing the full service data into a set transaction database according to the requirement of the power transaction service data, encrypting the full service data by utilizing a hash version algorithm encrypted on the uplink to generate a hash ciphertext character string and comparing the hash ciphertext character string with the historical hash character string stored on the block chain when the full power transaction service data needs to be verified, and if the comparison and verification results are consistent (namely the two ciphertexts are the same), further internal refined data comparison of the full service data is not needed. If the comparison and verification results are inconsistent, the data of each module needs to be subjected to hash encryption according to the full service data decomposition rule and is respectively subjected to comparison and verification with the hash ciphertext of the module data stored on the chain, and the hash ciphertext character strings of the module data with inconsistent comparison are found out. And carrying out hash encryption on each main data contained in the hash character string of the inconsistent module data and comparing the main data contained in the hash character string of the module with the hash ciphertext character string of the main data contained in the chain-stored certificate, and repeating the steps until finding out the tampered data source at the bottommost layer. Therefore, the functions of tampering verification of the electric power transaction service data and plain data positioning of the tampered data are realized by using the hash encryption algorithm of the block chain technology.
The invention has the following beneficial effects:
(1) transaction data multi-level encryption
According to the specific market type requirement of the electric power transaction, gradually refining the data types of all data related to the electric power transaction in the time period, all data related to each market main body, declaration data of each main body, release data of each main body, clearing data of each main body, metering data of each main body and the like according to the verification requirement of the electric power transaction data, respectively encrypting the data by using a hash algorithm of a block chain technology to generate a ciphertext character string with a fixed length, and forming an 'inverted tree' electric power transaction service data character string.
(2) Data efficient validation
The electric power transaction service data consistency verification method comprises the steps of carrying out hash encryption on refined data from full data step by step and then comparing the refined data with a hash character string of corresponding historical service data on a chain, verifying the hash character string of the service data of a sub-module of the full service data and the corresponding hash character string on the chain when the hash character string of the full service data is inconsistent with the hash character string on the chain, screening out the inconsistent link service data, refining the inconsistent service data of the corresponding link and comparing the inconsistent service data with the hash character string of the corresponding historical service data on the chain until the next layer of the inconsistent service data hash character string is inconsistent with the hash character string of the corresponding service data on the chain (or until the last layer). The verification amount of the transaction service data can be reduced through the data verification mode, the service data hash character strings needing to be verified and the historical hash character strings stored on the chain are removed from the database at each stage, and the data verification amount is reduced.
(3) Rapid positioning of tampered data
The method comprises the steps of adopting a process of gradually thinning total data to business data of each link and each link to each main body, comparing the business data with historical hash character strings of corresponding business data on a chain after hash encryption, sequentially screening out inconsistent full business data, business data of each link and hash ciphertext character strings of each main body business data under each link, and eliminating the thinned business data hash ciphertext character strings of the hash ciphertext character strings and the historical hash ciphertext character strings on the chain in the process, so that the data comparison quantity is reduced, the tampered plaintext business data can be quickly positioned, and the positioning efficiency of the tampered business data is improved.
(4) Ciphertext sensitive to plaintext modification
The hash encryption algorithm based on the block chain technology is used for converting data or files with any length into fixed-length character strings with binary values. The ciphertext string is the only numerical representation of the plaintext data or file. If the plaintext data or the file is changed a little, the hash encryption algorithm with the same version is used again to perform hash encryption calculation on the changed plaintext data or file to obtain a ciphertext character string which is obviously different from the binary value of the corresponding data hash ciphertext character string stored in the chain and not changed. When the ciphertext character strings of the historical service data on the chain are compared with the character strings obtained from the database for manual verification, the difference is very obvious, and post verification is facilitated.
(5) Encrypted service data flexibility
The hash encryption power transaction service data based on the block chain technology has no specific requirements on encrypted data objects, service data of power transaction scenes needing encryption are encrypted according to power transaction requirements, the service data mainly comprises medium and long term, short term, day-ahead, day-in, real-time and other transaction scenes, the encryption data of various power transaction scenes comprises full service data, screened marking data, data service data taking files as carriers and the like, and meanwhile, various types of data can be encrypted, including shaping, long integer type, Boolean type and the like. Aiming at the electric power transaction service data, the data content of the data encryption by adopting the hash encryption algorithm is very flexible, and the data encryption requirements under the conditions of different market subjects, market types, market environments and the like can be met.
(6) Encryption verification flow fixing
The encryption step of the hash encryption algorithm based on the block chain technology is fixed, and electric power transaction service data needing to be encrypted is obtained from a system data interface, a service database and the like; secondly, analyzing the power transaction service data to be encrypted, converting various types of source data of power transaction into byte arrays, and then generating a hash character string; and finally, storing the generated hash character string on a block chain or carrying out comparison verification on the hash ciphertext character string.
(7) Sensitive business data diffusion prevention
The block chain based Hash encryption electric power transaction data post-verification method is characterized in that a Hash encryption algorithm is used for encrypting electric power transaction sensitive service data, and encrypted ciphertext character strings are subjected to distributed evidence storage with a broadcast network according to a consensus mechanism of a block chain, so that the post-verification of electric power transaction tamper resistance is realized. Therefore, the storage certificate of the sensitive business data of the power transaction is not involved, and other block chain system nodes do not obtain the sensitive business data of the power transaction.
Example 2
Based on the same inventive concept as embodiment 1, the block chain hash-based encrypted electric power transaction data post-verification device of the present invention includes:
the data acquisition module is used for acquiring power transaction service data;
the data decomposition module is used for decomposing the electric power transaction service data layer by layer to obtain a corresponding hierarchical structure;
the data certificate storing module is used for respectively carrying out hash encryption operation on the service data of each level to generate corresponding hash ciphertexts and storing the hash ciphertexts to the block chain for distributed storage;
and the data verification module is used for encrypting the service data of each level layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext and comparing the hash ciphertext with the corresponding hash ciphertext stored on the chain when the service data of the full electric power transaction needs to be verified, and positioning the tampered service data source at the bottommost layer.
Optionally, in the data decomposition module, the decomposing the power transaction service data layer by layer to obtain a corresponding hierarchical structure includes:
taking full service data as a first layer;
decomposing the full service data into a plurality of module service data according to different data sources to form a second layer;
decomposing each module data into a plurality of main body service data according to different market main bodies to form a third layer;
decomposing each main data into a plurality of service element data according to different service elements to form a fourth layer;
decomposing each element service data into a plurality of service data according to different service data contents to form a fifth layer;
and repeating the steps until the layer number meets the precision requirement of the service data tampering positioning.
Optionally, in the data storage module, the hash encryption operation is performed on the service data of each hierarchy respectively to generate corresponding hash ciphertexts, including:
carrying out hash encryption on the full service data in the first layer to obtain a full service data hash ciphertext;
performing hash encryption on each module service data in the second layer to obtain a hash ciphertext of each module service data;
performing hash encryption on each main service data in the third layer to obtain a hash ciphertext of each main service data;
performing hash encryption on each service element data in the fourth layer to obtain a hash ciphertext of each service element data;
and carrying out hash encryption on the service data in the fifth layer to obtain a hash ciphertext of the service data.
Optionally, in the data verification module, the step of encrypting the service data of each hierarchy layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext and comparing the hash ciphertext with a corresponding hash ciphertext stored in a chain, and locating the tampered service data source at the bottommost layer includes:
encrypting the full service data in the first layer by using a hash encryption algorithm encrypted by the uplink to generate a hash ciphertext, and comparing the hash ciphertext with the full service data hash ciphertext stored in the link for storage;
if the comparison and verification results are consistent, the fact that the service data is not tampered does not exist, and verification is finished;
if the comparison and verification results are inconsistent, performing hash encryption on the service data of each module in the second layer of the full service data decomposition, and respectively comparing the hash encryption with the hash ciphertext of the module service data stored on the chain to find out the module service data with inconsistent comparison;
performing hash encryption on each main service data in the third layer decomposed by the inconsistent module service data, comparing the main service data with a corresponding main service data hash ciphertext stored on a chain, and finding out the inconsistent main service data; and so on until the lowest tampered data source is found.
The specific implementation scheme of each module in the device is shown in the steps and the processes of the method in the embodiment 1.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A block chain hash-based after-the-fact verification method for encrypted electric power transaction data is characterized by comprising the following processes:
acquiring electric power transaction service data;
decomposing the electric power transaction service data layer by layer to obtain a corresponding hierarchical structure;
respectively carrying out hash encryption operation on the service data of each layer to generate corresponding hash ciphertexts, and storing the hash ciphertexts on a block chain in a distributed manner;
when the electric power transaction service data needs to be verified, the service data of each level are encrypted layer by layer from top to bottom according to the hierarchy according to the service scene to generate a hash ciphertext, and the hash ciphertext is compared with the corresponding hash ciphertext stored on the chain, so that a tampered service data source is located.
2. The method for verifying the block chain hash-based encrypted power transaction data after events as claimed in claim 1, wherein the power transaction service data comprises power transaction demand release data, power transaction participation subject declaration data, power system operation data, transaction clearing data, transaction execution data, transaction settlement data and transaction assessment data.
3. The method for verifying the block chain hash-based encrypted electric power transaction data after fact as claimed in claim 1, wherein the number of layers of the hierarchical structure is determined by the accuracy requirement of service data tampering location.
4. The method for verifying the block chain hash-based encrypted electric power transaction data afterwards according to claim 1, wherein decomposing the electric power transaction service data layer by layer to obtain a corresponding hierarchical structure comprises:
taking full service data as a first layer;
decomposing the full service data into a plurality of module service data according to different data sources to form a second layer;
decomposing each module data into a plurality of main body service data according to different market main bodies to form a third layer;
decomposing each main data into a plurality of service element data according to different service elements to form a fourth layer;
decomposing each element service data into a plurality of service data according to different service data contents to form a fifth layer;
and repeating the steps until the layer number meets the precision requirement of the service data tampering positioning.
5. The method for verifying the block chain hash-based encrypted electric power transaction data after fact as claimed in claim 4, wherein the performing the hash encryption operation on the service data of each layer to generate the corresponding hash ciphertext respectively comprises:
carrying out hash encryption on the full service data in the first layer to obtain a full service data hash ciphertext;
performing hash encryption on each module service data in the second layer to obtain a hash ciphertext of each module service data;
performing hash encryption on each main service data in the third layer to obtain a hash ciphertext of each main service data;
performing hash encryption on each service element data in the fourth layer to obtain a hash ciphertext of each service element data;
and carrying out hash encryption on the service data in the fifth layer to obtain a hash ciphertext of the service data.
6. The method for verifying the block chain hash-based encrypted electric power transaction data afterwards according to claim 4, wherein according to the service scenario, the service data of each hierarchy is encrypted layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext, and the hash ciphertext is compared with a corresponding hash ciphertext stored in a chain to locate the tampered service data source, the method comprises:
encrypting the full service data in the first layer by using a hash encryption algorithm encrypted by the uplink to generate a hash ciphertext, and comparing the hash ciphertext with the full service data hash ciphertext stored in the link for storage;
if the comparison and verification results are consistent, the fact that the service data is not tampered does not exist, and verification is finished;
if the comparison and verification results are inconsistent, performing hash encryption on the service data of each module in the second layer of the full service data decomposition, and respectively comparing the hash encryption with the hash ciphertext of the module service data stored on the chain to find out the module service data with inconsistent comparison;
performing hash encryption on each main service data in the third layer decomposed by the inconsistent module service data, comparing the main service data with a corresponding main service data hash ciphertext stored on a chain, and finding out the inconsistent main service data; and so on until finding the lowest tampered data source determined by the business scenario.
7. The utility model provides a verify the device after the fact based on block chain hash encryption electric power transaction data, characterized by includes:
the data acquisition module is used for acquiring power transaction service data;
the data decomposition module is used for decomposing the electric power transaction service data layer by layer to obtain a corresponding hierarchical structure;
the data certificate storage module is used for respectively carrying out hash encryption operation on the service data of each level to generate corresponding hash ciphertexts and storing the hash ciphertexts on the block chain in a distributed manner;
and the data verification module is used for encrypting the service data of each level layer by layer from top to bottom according to the hierarchical structure to generate a hash ciphertext and comparing the hash ciphertext with the corresponding hash ciphertext stored in the chain according to the service scene when the full-power transaction service data needs to be verified, so as to locate the tampered service data source.
8. The device for verifying the block chain hash-based encrypted electric power transaction data after fact as claimed in claim 7, wherein in the data decomposition module, the decomposing the electric power transaction data layer by layer to obtain the corresponding hierarchical structure comprises:
taking full service data as a first layer;
decomposing the full service data into a plurality of module service data according to different data sources to form a second layer;
decomposing each module data into a plurality of main body service data according to different market main bodies to form a third layer;
decomposing each main data into a plurality of service element data according to different service elements to form a fourth layer;
decomposing each element service data into a plurality of service data according to different service data contents to form a fifth layer;
and repeating the steps until the layer number meets the precision requirement of the service data tampering positioning.
9. The device for verifying the block chain hash-based encrypted electric power transaction data after events as claimed in claim 8, wherein in the data certification module, the hash encryption operation is performed on the service data of each level to generate the corresponding hash ciphertext, and the device comprises:
carrying out hash encryption on the full service data in the first layer to obtain a full service data hash ciphertext;
performing hash encryption on each module service data in the second layer to obtain a hash ciphertext of each module service data;
performing hash encryption on each main service data in the third layer to obtain a hash ciphertext of each main service data;
performing hash encryption on each service element data in the fourth layer to obtain a hash ciphertext of each service element data;
and carrying out hash encryption on the service data in the fifth layer to obtain a hash ciphertext of the service data.
10. The device for verifying the block chain hash-based encrypted electric power transaction data after events as claimed in claim 8, wherein in the data verification module, according to the service scenario, the service data of each hierarchy is encrypted layer by layer from top to bottom according to the hierarchy structure to generate a hash ciphertext, and the hash ciphertext is compared with a corresponding hash ciphertext of a certificate stored in a chain, so as to locate a tampered service data source, comprising:
encrypting the full service data in the first layer by using a hash encryption algorithm encrypted by the uplink to generate a hash ciphertext, and comparing the hash ciphertext with the full service data hash ciphertext stored in the link for storage;
if the comparison and verification results are consistent, the fact that the service data is not tampered does not exist, and verification is finished;
if the comparison and verification results are inconsistent, performing hash encryption on the service data of each module in the second layer of the full service data decomposition, and respectively comparing the hash encryption with the hash ciphertext of the module service data stored on the chain to find out the module service data with inconsistent comparison;
performing hash encryption on each main service data in the third layer decomposed by the inconsistent module service data, comparing the main service data with a corresponding main service data hash ciphertext stored on a chain, and finding out the inconsistent main service data; and so on until finding the lowest tampered data source determined by the business scenario.
CN202110499726.4A 2021-05-08 2021-05-08 Block chain hash-based encrypted electric power transaction data post-verification method and device Active CN113282810B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110499726.4A CN113282810B (en) 2021-05-08 2021-05-08 Block chain hash-based encrypted electric power transaction data post-verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110499726.4A CN113282810B (en) 2021-05-08 2021-05-08 Block chain hash-based encrypted electric power transaction data post-verification method and device

Publications (2)

Publication Number Publication Date
CN113282810A true CN113282810A (en) 2021-08-20
CN113282810B CN113282810B (en) 2022-11-15

Family

ID=77278185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110499726.4A Active CN113282810B (en) 2021-05-08 2021-05-08 Block chain hash-based encrypted electric power transaction data post-verification method and device

Country Status (1)

Country Link
CN (1) CN113282810B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191144A (en) * 2018-08-03 2019-01-11 食品安全与营养(贵州)信息科技有限公司 A kind of laboratory information business management system and working method based on block chain
CN109359477A (en) * 2018-11-01 2019-02-19 山东众阳健康科技集团有限公司 A kind of data encryption, data verification method and its system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191144A (en) * 2018-08-03 2019-01-11 食品安全与营养(贵州)信息科技有限公司 A kind of laboratory information business management system and working method based on block chain
CN109359477A (en) * 2018-11-01 2019-02-19 山东众阳健康科技集团有限公司 A kind of data encryption, data verification method and its system

Also Published As

Publication number Publication date
CN113282810B (en) 2022-11-15

Similar Documents

Publication Publication Date Title
US11720526B2 (en) Sustainable energy tracking system utilizing blockchain technology and Merkle tree hashing structure
Luh et al. Grid integration of intermittent wind generation: A Markovian approach
CN104486075B (en) A kind of verification method of intelligent substation ICD model file digital signature
CN112270550A (en) New energy electric power source tracing method and system based on block chain
Song et al. Publicly verifiable computation of polynomials over outsourced data with multiple sources
CN112347495A (en) Trusted privacy intelligent service computing system and method based on block chain
Yang et al. Fast grid security assessment with N− k contingencies
CN110958109B (en) Light dynamic data integrity auditing method based on hierarchical merck hash tree
CN113205415B (en) Financial process automation method and system based on RPA and block chain technology
CN110225012B (en) Method for checking and updating ownership of outsourced data based on alliance chain
CN112733211A (en) Intelligent power grid data storage scheme based on block chain
CN109658126A (en) Data processing method, device, equipment and storage medium based on product promotion
CN110909381A (en) Block chain-based user comment tamper-proof system and method
CN111324517B (en) Application service supervision method, supervision server and storage medium
CN113010605A (en) Green power source tracing method and device based on block chain
CN114971421A (en) Hydropower station operation risk management and control system based on block chain technology
CN116346503B (en) Encryption method and device for water carbon emission data based on full life cycle
CN113282810B (en) Block chain hash-based encrypted electric power transaction data post-verification method and device
CN113722767A (en) Data integrity verification method, system, storage medium and computing equipment
CN116682543A (en) Sharing method and system of regional rehabilitation information
CN115580484A (en) Safe joint calculation method and system applicable to energy consumption data and storage medium
Zhao et al. Privacy-preserving electricity theft detection based on blockchain
CN115760422A (en) Electric power market transaction system and method based on block chain technology
CN111917861A (en) Knowledge storage method and system based on block chain and knowledge graph and application thereof
CN112241404B (en) Power quality data management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant