CN114285615A - Encryption method and system for new energy data - Google Patents

Encryption method and system for new energy data Download PDF

Info

Publication number
CN114285615A
CN114285615A CN202111541532.2A CN202111541532A CN114285615A CN 114285615 A CN114285615 A CN 114285615A CN 202111541532 A CN202111541532 A CN 202111541532A CN 114285615 A CN114285615 A CN 114285615A
Authority
CN
China
Prior art keywords
new energy
energy data
data
sensor
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111541532.2A
Other languages
Chinese (zh)
Inventor
罗健
陈尚卫
陈金浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Hanyuan Technology Co ltd
Original Assignee
Nanjing Hanyuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Hanyuan Technology Co ltd filed Critical Nanjing Hanyuan Technology Co ltd
Priority to CN202111541532.2A priority Critical patent/CN114285615A/en
Publication of CN114285615A publication Critical patent/CN114285615A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention discloses a new energy data encryption method and system, wherein the new energy data encryption method comprises the steps of collecting new energy data through a sensor; sending the new energy data to an encryption module through a secure tunnel; the encryption module is used for encrypting the new energy data, and the encrypted data are uploaded to the gateway module through the safety tunnel; the encrypted data is encrypted and stored through a gateway module; according to the invention, by designing the encryption module and combining the HDFS algorithm, the safety of new energy data is effectively improved.

Description

Encryption method and system for new energy data
Technical Field
The invention relates to the technical field of data encryption, in particular to a new energy data encryption method and system.
Background
At present, new energy development in the world gradually drives into a motorway, new energy resources such as wind power, photovoltaic and geothermal power generation are developed gradually on a scale, the collaborative development among the energy resources is more and more intense, and due to the full reflection of the collaborative development effect of different energy resources, a large amount of data needs to be counted and calculated to obtain more real resource sources and use distribution, so that the reliability of a large amount of data is more and more important, the appearance of the data can not be modified, the safety of the energy data is higher and higher, and therefore the data in various places need to be encrypted and protected, and the artificial tampering and misoperation of the data are avoided. The existing encryption method comprises a DES algorithm and an ECC algorithm, wherein the DES algorithm has high encryption speed but low security; the ECC algorithm has high safety, but has low operation speed, and is difficult to meet the real-time requirement.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above-mentioned conventional problems.
In order to solve the technical problems, the invention provides the following technical scheme: the method comprises the steps of collecting new energy data through a sensor; sending the new energy data to an encryption module through a secure tunnel; encrypting the new energy data by using an encryption module, and uploading the encrypted data to a gateway module through a secure tunnel; and encrypting and storing the encrypted data through the gateway module.
As a preferable aspect of the encryption method of new energy data according to the present invention, wherein: the sensor comprises a current sensor and a voltage sensor; and respectively deploying a current sensor and a voltage sensor in the new energy system to acquire new energy data.
As a preferable aspect of the encryption method of new energy data according to the present invention, wherein: the secure tunnel includes configuring virtual hosts carol and dave; and creating a virtual interface through the vti kernel function, setting a key value, and completing the creation of the security tunnel by combining the core function ip _ tunnel _ newlink.
As a preferable aspect of the encryption method of new energy data according to the present invention, wherein: the new energy data encryption method comprises the steps of randomly generating a secret key k and a public key r, and encrypting the secret key k by using an AES algorithm; decrypting the encrypted key to obtain a private key n; and based on an RSA algorithm, encrypting the new energy data Q and the current time stamp t by a private key n.
As a preferable aspect of the encryption method of new energy data according to the present invention, wherein: the encryption key k comprises a key that is,
k′=E(r,k)
wherein k' is the encrypted key.
As a preferable aspect of the encryption method of new energy data according to the present invention, wherein: encrypting new energy data and a current time stamp, and randomly selecting prime numbers p and q; calculating the common modulus u: u ═ pq; calculating the Euler function
Figure BDA0003414371050000021
Encrypting the new energy data Q and the current timestamp t according to the following formula:
m=Qtn mod u
wherein m is the encrypted data.
As a preferable aspect of the encryption method of new energy data according to the present invention, wherein: the gateway module encrypts and stores the encrypted data through an HDFS algorithm.
As a preferable aspect of the encryption system of new energy data according to the present invention, wherein: the system comprises a sensor, a data processing unit and a data processing unit, wherein the sensor is used for acquiring new energy data; the safety tunnel is connected with the sensor, the encryption module and the gateway module and is used for data transmission; the encryption module is connected with the safety tunnel and used for encrypting the new energy data; and the gateway module is connected with the secure tunnel and used for encrypting and storing the encrypted data.
As a preferable aspect of the encryption system of new energy data according to the present invention, wherein: the sensor comprises a current sensor and a voltage sensor; a current sensor and a voltage sensor are respectively deployed in the new energy system and used for acquiring new energy data.
The invention has the beneficial effects that: according to the invention, by designing the encryption module and combining the HDFS algorithm, the safety of new energy data is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise. Wherein:
fig. 1 is a schematic flowchart of a method for encrypting new energy data according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of an encryption system for new energy data according to a second embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, specific embodiments accompanied with figures are described in detail below, and it is apparent that the described embodiments are a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present invention, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Furthermore, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
The present invention will be described in detail with reference to the drawings, wherein the cross-sectional views illustrating the structure of the device are not enlarged partially in general scale for convenience of illustration, and the drawings are only exemplary and should not be construed as limiting the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
Meanwhile, in the description of the present invention, it should be noted that the terms "upper, lower, inner and outer" and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation and operate, and thus, cannot be construed as limiting the present invention. Furthermore, the terms first, second, or third are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The terms "mounted, connected and connected" in the present invention are to be understood broadly, unless otherwise explicitly specified or limited, for example: can be fixedly connected, detachably connected or integrally connected; they may be mechanically, electrically, or directly connected, or indirectly connected through intervening media, or may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1
Referring to fig. 1, a first embodiment of the present invention provides a method for encrypting new energy data, including:
s1: new energy data is collected by the sensor 100.
The sensor 100 includes a current sensor 101 and a voltage sensor 102; a current sensor 101 and a voltage sensor 102 are respectively deployed in the new energy system to acquire new energy data, namely, the real-time voltage and current values of the new energy system are acquired.
S2: the new energy data is transmitted to the encryption module 300 through the secure tunnel 200.
Establishing the secure tunnel 200:
(1) configuring virtual hosts carol and dave;
the carol profile is: and/etc/swanctl. conf, the field vips in the connection home is set to 0.0.0.0.
The dave configuration file is: ikev2/config-payload/hosts/dave/etc/ipsec. conf, field leftsourceip in the connection home is set to% config.
(2) Creating a virtual interface through a vti kernel function (vti _ newlink), setting a key value, and completing the creation of the secure tunnel 200 by combining with a core function ip _ channel _ newlink.
S3: the encryption module 300 is used to encrypt the new energy data, and the encrypted data is uploaded to the gateway module 400 through the secure tunnel 200.
(1) Randomly generating a key k and a public key r, and encrypting the key k by using an AES algorithm;
k′=E(r,k)
wherein k' is the encrypted key.
(2) Decrypting the encrypted key to obtain a private key n;
Figure BDA0003414371050000041
(3) and based on an RSA algorithm, encrypting the new energy data Q and the current time stamp t by a private key n.
Randomly selecting prime numbers p and q;
calculating the common modulus u: u ═ pq;
calculating the Euler function
Figure BDA0003414371050000042
Encrypting the new energy data Q and the current timestamp t according to the following formula:
m=Qtn mod u
wherein m is the encrypted data.
S4: the encrypted data is stored encrypted by the gateway module 400.
The gateway module 400 encrypts and stores the encrypted data through the HDFS algorithm, and in particular,
firstly, the gateway module 400 requests the NN to create a new file in an encryption area of the HDFS;
the NN requests the KMS for the EDEK of the file, and the KMS generates a new EDEK by using the corresponding EZ key and sends the new EDEK to the NN;
③ the EDEK is written into the metadata of the file by the NN;
NN sends EDEK to the gateway module 400;
the gateway module 400 sends the EDEK to the KMS to request decryption, and the KMS decrypts the EDEK into DEK by using the corresponding EZ key and sends the DEK to the gateway module 400;
sixthly, the gateway module 400 encrypts the file content by using the DEK and sends the file content to the dataode for storage.
In order to verify and explain the technical effects adopted in the method, the embodiment selects the traditional encryption method and adopts the method to perform comparison test, and compares the test results by means of scientific demonstration to verify the real effect of the method.
In order to verify that the method has higher security compared with the conventional encryption method, in this embodiment, the conventional encryption method and the method are respectively used to encrypt and compare 5 sets of new energy data collected, and the results are compiled through the VS development environment, as shown in the following table.
Table 1: and comparing encryption results.
Diffusion rate before encryption Conventional encryption method Method for producing a composite material
First set of data 0.12 0.28 0.71
Second set of data 0.20 0.36 0.84
Third set of data 0.17 0.29 0.80
Fourth group of data 0.32 0.57 0.96
Fifth set of data 0.25 0.48 0.87
As can be seen from the above table, the diffusivity of the new energy data encrypted by the two methods is obviously improved, and the method has higher safety.
Example 2
Referring to fig. 2, there is provided a second embodiment of the present invention, which is different from the first embodiment, providing an encryption system of new energy data, including,
the sensor 100 is used for acquiring new energy data; the sensor 100 includes a current sensor 101 and a voltage sensor 102; a current sensor 101 and a voltage sensor 102 are respectively deployed in a new energy system, and the current sensor 101 and the voltage sensor 102 are used for acquiring new energy data.
The secure tunnel 200 is connected with the sensor 100, the encryption module 300 and the gateway module 400 and used for data transmission; that is, the new energy data is transmitted to the encryption module 300, and the data encrypted by the encryption module 300 is transmitted to the gateway module 400.
And an encryption module 300 connected to the secure tunnel 200, for encrypting the new energy data.
And the gateway module 400 is connected to the secure tunnel 200 and configured to encrypt and store the encrypted data.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described herein includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein. A computer program can be applied to input data to perform the functions described herein to transform the input data to generate output data that is stored to non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
As used in this application, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being: a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of example, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
It should be noted that the above-mentioned embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.

Claims (9)

1. A new energy data encryption method is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
acquiring new energy data through a sensor (100);
sending the new energy data to the encryption module (300) through the secure tunnel (200);
encrypting the new energy data by using an encryption module (300), and uploading the encrypted data to a gateway module (400) through a secure tunnel (200);
and carrying out encrypted storage on the encrypted data through the gateway module (400).
2. The encryption method of new energy data according to claim 1, characterized in that: the sensor (100) comprises a current sensor (101) and a voltage sensor (102);
a current sensor (101) and a voltage sensor (102) are respectively deployed in a new energy system to acquire new energy data.
3. The encryption method of new energy data according to claim 2, characterized in that: the secure tunnel (200) includes a secure tunnel,
configuring virtual hosts carol and dave;
and creating a virtual interface through the vti kernel function, setting a key value, and completing the creation of the security tunnel by combining the core function ip _ tunnel _ newlink (200).
4. The encryption method of new energy data according to claim 2 or 3, characterized in that: the encrypting the new energy data includes encrypting the new energy data,
randomly generating a key k and a public key r, and encrypting the key k by using an AES algorithm;
decrypting the encrypted key to obtain a private key n;
and based on an RSA algorithm, encrypting the new energy data Q and the current time stamp t by a private key n.
5. The encryption method of new energy data according to claim 4, characterized in that: the encryption key k comprises a key that is,
k′=E(r,k)
wherein k' is the encrypted key.
6. The encryption method of new energy data according to claim 5, characterized in that: the encrypted new energy data and the current time stamp include,
randomly selecting prime numbers p and q;
calculating the common modulus u: u ═ pq;
calculating the Euler function
Figure FDA0003414371040000011
Encrypting the new energy data Q and the current timestamp t according to the following formula:
m=Qtn mod u
wherein m is the encrypted data.
7. The encryption method of new energy data according to claim 6, characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
and the gateway module (400) encrypts and stores the encrypted data through an HDFS algorithm.
8. An encryption system of new energy data is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
a sensor (100) for acquiring new energy data;
the security tunnel (200) is connected with the sensor (100), the encryption module (300) and the gateway module (400) and is used for data transmission;
the encryption module (300) is connected with the secure tunnel (200) and is used for encrypting the new energy data;
and the gateway module (400) is connected with the secure tunnel (200) and is used for encrypting and storing the encrypted data.
9. The system for encrypting new energy data according to claim 8, wherein: the sensor (100) comprises a current sensor (101) and a voltage sensor (102);
a current sensor (101) and a voltage sensor (102) are respectively deployed in a new energy system, and the current sensor (101) and the voltage sensor (102) are used for acquiring new energy data.
CN202111541532.2A 2021-12-16 2021-12-16 Encryption method and system for new energy data Pending CN114285615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111541532.2A CN114285615A (en) 2021-12-16 2021-12-16 Encryption method and system for new energy data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111541532.2A CN114285615A (en) 2021-12-16 2021-12-16 Encryption method and system for new energy data

Publications (1)

Publication Number Publication Date
CN114285615A true CN114285615A (en) 2022-04-05

Family

ID=80872755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111541532.2A Pending CN114285615A (en) 2021-12-16 2021-12-16 Encryption method and system for new energy data

Country Status (1)

Country Link
CN (1) CN114285615A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160301695A1 (en) * 2015-04-07 2016-10-13 Tyco Fire & Security Gmbh Machine-to-Machine and Machine to Cloud End-to-End Authentication and Security
CN106549963A (en) * 2016-11-05 2017-03-29 北京工业大学 Safe storage system based on HDFS
CN108063751A (en) * 2017-10-20 2018-05-22 国网宁夏电力有限公司 A kind of public network safety access method for new energy power plant
CN112565302A (en) * 2020-12-29 2021-03-26 北京中电飞华通信有限公司 Communication method, system and equipment based on security gateway
CN113542428A (en) * 2021-07-29 2021-10-22 中国第一汽车股份有限公司 Vehicle data uploading method and device, vehicle, system and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160301695A1 (en) * 2015-04-07 2016-10-13 Tyco Fire & Security Gmbh Machine-to-Machine and Machine to Cloud End-to-End Authentication and Security
CN106549963A (en) * 2016-11-05 2017-03-29 北京工业大学 Safe storage system based on HDFS
CN108063751A (en) * 2017-10-20 2018-05-22 国网宁夏电力有限公司 A kind of public network safety access method for new energy power plant
CN112565302A (en) * 2020-12-29 2021-03-26 北京中电飞华通信有限公司 Communication method, system and equipment based on security gateway
CN113542428A (en) * 2021-07-29 2021-10-22 中国第一汽车股份有限公司 Vehicle data uploading method and device, vehicle, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
申时凯等: "《物联网的安全技术研究》" *

Similar Documents

Publication Publication Date Title
Hao et al. Deleting secret data with public verifiability
JP2020513183A (en) Data tokenization
CN104584509A (en) An access control method, a device and a system for shared data
EP3779792A1 (en) Two-dimensional code generation method, data processing method, apparatus, and server
CN103618729A (en) Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
CN110750541B (en) Block chain-based data storage indexing system and method
CN112953930A (en) Cloud storage data processing method and device and computer system
CN105049430A (en) Ciphertext-policy attribute-based encryption method having efficient user revocation capability
CN106341236A (en) Access control method facing cloud storage service platform and system thereof
CN105071937A (en) Ciphertext poly attribute base encryption method having efficient attribute revocation capability
CN105071927A (en) Mobile device data local storage method
CN105718794A (en) Safety protection method and system for virtual machine based on VTPM
CN201518127U (en) Encrypted mobile memory based on password authentication
CN115765965A (en) Medical data safety sharing method based on federal learning and double union block chains
CN108540280A (en) A kind of the secure data sharing method and system of resource high-efficiency
DE112021006229T5 (en) HYBRID KEY DERIVATION FOR SECURING DATA
CN110912892A (en) Certificate management method and device, electronic equipment and storage medium
CN113744437A (en) Intelligent house renting management method and system
CN103078739B (en) Dynamic password authentication method, device and network system
Li et al. Secloc: Securing location-sensitive storage in the cloud
US11496287B2 (en) Privacy preserving fully homomorphic encryption with circuit verification
CN114285615A (en) Encryption method and system for new energy data
CN111597521A (en) Transformer substation mobile terminal data security processing method and system
CN103746798B (en) A kind of data access control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination