CN116827686B - Cloud-edge collaboration-based intelligent community system data anomaly detection method - Google Patents

Cloud-edge collaboration-based intelligent community system data anomaly detection method Download PDF

Info

Publication number
CN116827686B
CN116827686B CN202311085147.0A CN202311085147A CN116827686B CN 116827686 B CN116827686 B CN 116827686B CN 202311085147 A CN202311085147 A CN 202311085147A CN 116827686 B CN116827686 B CN 116827686B
Authority
CN
China
Prior art keywords
community system
intelligent community
intelligent
edge computing
computing server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311085147.0A
Other languages
Chinese (zh)
Other versions
CN116827686A (en
Inventor
王固越
张念国
肖然
周超
刘�英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chen Yue Construction Project Management Group Ltd By Share Ltd
Original Assignee
Chen Yue Construction Project Management Group Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chen Yue Construction Project Management Group Ltd By Share Ltd filed Critical Chen Yue Construction Project Management Group Ltd By Share Ltd
Priority to CN202311085147.0A priority Critical patent/CN116827686B/en
Publication of CN116827686A publication Critical patent/CN116827686A/en
Application granted granted Critical
Publication of CN116827686B publication Critical patent/CN116827686B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a cloud-edge collaboration-based intelligent community system data anomaly detection method, which relates to the field of intelligent community system data privacy protection and comprises a system initialization stage, an intelligent community system communication entity registration stage, an intelligent community system terminal user information reporting stage, an intelligent community system edge calculation server information reporting stage and an intelligent community system cloud server decision data anomaly detection stage. When abnormal data is detected, the data is reported in layers in a mode of cooperative work of cloud computing and edge computing, a layered data management mode is realized, key data and decision-making data are verified step by an intelligent community system edge computing server and an intelligent community system cloud server, the abnormal data condition of each intelligent community system terminal user can be detected in a fine granularity mode, and the distributed architecture can improve the intelligent community system management efficiency.

Description

Cloud-edge collaboration-based intelligent community system data anomaly detection method
Technical Field
The invention relates to the field of data privacy protection of intelligent community systems, in particular to a cloud-edge cooperation-based intelligent community system data anomaly detection method.
Background
Smart communities, also known as future communities, are a new model of innovation in new situations. The intelligent community is an integrated application of new generation information technologies such as Internet of things, cloud computing and mobile Internet, and provides a safe, comfortable and convenient modern and intelligent living environment for community residents. The intelligent community realizes the fine dynamic management of the community by constructing a system management platform and integrating new technologies such as big data, artificial intelligence, information safety and the like, and comprehensively opens a new mode of intelligent community safety service, so that more residents enjoy the convenience brought by intellectualization.
With the rapid development of the Internet of things and big data technology, the intelligent community generates mass data of all dimensions. The cloud server of the intelligent community system is deployed in the intelligent community, the storage and management of data are realized by providing a cloud storage service mode, and the resource access service which is reasonable in price, rapid and elastic and ubiquitous on demand is provided.
And an intelligent community system edge computing server is deployed in the intelligent community system, so that the big data processing capacity of the system can be effectively improved. However, in order to achieve a fine and efficient community management, the edge computing servers of the intelligent community system deployed in each area periodically collect key data of the end users of the intelligent community system, and even make important decisions based on the key data. If the data is tampered in the process of transmitting the data from the intelligent community system end user to the intelligent community system edge computing server or from the intelligent community system edge computing server to the intelligent community system cloud server, the data is abnormal, so that the intelligent community management transaction can be influenced, even the sensitive privacy of important users of the intelligent community can be exposed, the security decision is made in error, and the important economic loss is caused. Therefore, in order to realize the integrity and tamper resistance of the multi-source data transmission of the intelligent community system, the data anomaly detection method based on cloud-edge cooperation is researched and designed, and the method has important application prospect in the intelligent community system.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a cloud-edge collaboration-based intelligent community system data anomaly detection method for hierarchically detecting the data anomalies of terminal users of each intelligent community system.
The aim of the invention is realized by the following technical scheme:
a cloud-edge collaboration-based intelligent community system data anomaly detection method comprises the following steps:
system initialization phase: the intelligent community system management center issues a password security parameter set, selects a circular group based on an elliptic curve and a generating element thereof, sets a main public key and a main private key of the intelligent community system management center, sets bilinear pair mapping and sets a collision-resistant hash function;
the intelligent community system communication entity registration stage: the intelligent community system communication entity registers to an intelligent community system management center by providing real identity information, and the intelligent community system management center distributes private keys for the intelligent community system communication entity after verifying the real identity information of the intelligent community system communication entity; the communication entity of the intelligent community system mainly comprises: the intelligent community system terminal user, the intelligent community system edge computing server and the intelligent community system cloud server;
and a terminal user information reporting stage of the intelligent community system: each intelligent community system terminal user of each area managed by the intelligent community system edge computing server generates a corresponding authentication code of key data by using a private key, and reports the data to the intelligent community system edge computing server responsible for the area where the terminal user is located in real time;
and the information reporting stage of the intelligent community system edge computing server: each intelligent community system edge computing server receives key data and authentication codes reported by each intelligent community system terminal user in the area, and verifies and positions whether the key information reported by the specific intelligent community system terminal user is tampered or not through a batch detection equation of the intelligent community system edge computing server side; when key information reported by all intelligent community system terminal users in all intelligent community system-based border computing servers in jurisdictions is not tampered in a fixed time period, the intelligent community system border computing servers carry out statistical analysis according to the key information of the untampered intelligent community system terminal users to obtain decision information, and further generate authentication codes corresponding to decision data by using private keys and report the authentication codes to the intelligent community system cloud server;
and the cloud server decision data anomaly detection stage of the intelligent community system: and the intelligent community system cloud server receives the decision data and the authentication code reported by each intelligent community system edge computing server, and verifies and positions whether the decision data reported by the specific intelligent community system edge computing server is tampered or not through the intelligent community system cloud server end batch detection equation.
Further, the system initialization stage specifically includes the steps of:
(1) Intelligent community system management center based on finite fieldZ q Setting a bilinear pair mappingWhereinG 1 Is based on elliptic curvepThe addition of the steps circulates the population,G 2 is thatpThe group of the order multiplication loops,qandpare all safe big prime numbers;
(2) The intelligent community system management center is based on elliptic curvepCyclic group of step additionG 1 One of which is randomly selectedpOrder generatorS
(3) Smart communityThe system management center is in a finite fieldZ p Random selection of non-zero random numbersAs a master private key, and calculates a master public key of the smart community system management center +.>
(4) The intelligent community system management center sets two anti-collision hash functionsHere->A bit string representing an arbitrary length;
(5) The intelligent community system management center issues a password security parameter set:
further, the specific steps of the intelligent community system communication entity registration stage include:
(1) Smart community system management center utilizing hash functionAnd a master private key->Identity of cloud server of intelligent community system for successful registrationID CS Calculate the corresponding private key +.>Wherein the private key first component of the smart community system cloud server +.>Private key second branch of cloud server of intelligent community systemMeasuring amountHere->Is a concatenated symbol;
(2) For successful registrationjIdentity of edge computing server of personal intelligent community systemHere, whereQThe number of all intelligent community system edge computing servers deployed in the intelligent community system, and the intelligent community system management center uses a hash function +.>And a master private key->Edge computing server for intelligent community systemID j Calculate the corresponding private key +.>Wherein the firstjEdge computing server of personal intelligent community systemID j Is>First, thejEdge computing server of personal intelligent community systemID j Private key second component of->
(3) Identity of edge computing server for each intelligent community systemIdentity mark of each intelligent community system terminal user with successful registration of the area under the control of the intelligent community system terminal user>Here->Is thatID j The quantity of all the terminal users of the intelligent community system in the managed area, and the intelligent community system management center uses a hash functionAnd a master private key->Is->Calculate the corresponding private key +.>WhereinThe private key first component of (2) is +.>,/>The second component of the private key of (2) is
Further, the specific steps of the smart community system terminal user information reporting stage include:
(1) Edge computing server of each intelligent community systemEach of the smart community system end users of the jurisdiction>Randomly selecting a non-zero random number +.>
(2) Each intelligent agentZone system end userUsing the corresponding private key->Calculate key data +.>Authentication code +.>Wherein the authentication code first component of the terminal user of the intelligent community systemAuthentication code second component of terminal user of intelligent community systemHere, whereT 1 The time period is that the terminal user of the intelligent community system reports data to the edge computing server of the intelligent community system;
(3) End user of each intelligent community systemEdge computing server for corresponding intelligent community systemID j Reporting key data->And its authentication code->
Further, the specific steps of the intelligent community system edge computing server information reporting stage include:
(1) Each intelligent community system terminal user of the area received by the intelligent community system edge computing serverIs->Authentication code->Verifying whether the following batch detection equation holds:
(2) If the above intelligent community system edge calculation server side batch detection equation is not established, the intelligent community system edge calculation serverID j For each intelligent community system end user one by oneIs->And its authentication code->The following equation verification is performed:until the condition that a certain equation is not established is detected, the fact that key information reported by a specific intelligent community system terminal user is tampered can be positioned;
(3) If the edge calculation server side batch detection equation of the intelligent community system is established, the edge calculation server of the intelligent community system based on the intelligent community systemID j All intelligent community system end users in jurisdiction are in time periodT 1 Internal reported key information is not tampered, and intelligent community system edge computing serverID j Further based on the key information of the terminal users of the intelligent community system which is not tampered withStatistical analysis is carried out to obtain decision information
(4) Edge computing server of intelligent community systemID j In the finite fieldZ p Random selection of non-zero random numbers
(5) Edge computing server of intelligent community systemID j Using corresponding private keysCalculating decision information->Authentication code +.>Wherein the edge of the intelligent community system calculates the first component of the authentication code of the server sideAuthentication code second component->Here, whereT 2 The time period is that the intelligent community system edge computing server reports data to the intelligent community system cloud server;
(6) Edge computing server of each intelligent community systemCloud server for intelligent community systemID CS Reporting the corresponding decision data +.>And its authentication code->
Further, the specific steps of the smart community system cloud server decision data anomaly detection stage include:
(1) Cloud server of intelligent community systemID CS During a time periodT 2 Receiving edge computing server of each intelligent community systemDecision data reported->And its authentication code->Cloud server of intelligent community systemID CS Verifying whether the following cloud batch detection equation is established:
(2) If the cloud batch detection equation is satisfied, all intelligent community system edge calculation servers based on the intelligent community system are in a time periodT 2 The decision information reported in the internal is not tampered;
(3) If the cloud batch detection equation is not satisfied, the intelligent community system cloud serverID CS Edge computing server for each intelligent community system one by oneIs->Authentication code thereofThe following verification was performed:
until the condition that a certain equation is not established is detected, namely the fact that decision information reported by a specific intelligent community system edge computing server is tampered is positioned.
The beneficial effects of the invention are as follows:
1) The cloud-side cooperative layered data reporting mechanism realizes a layered data management mode, can detect the abnormal data condition of each intelligent community system terminal user in a fine granularity manner, and the distributed architecture can improve the management efficiency of the intelligent community system.
2) The authentication code based on the identity digital signature algorithm is designed for the elliptic curve system, so that the complex public key certificate management cost is avoided, the calculation cost and the communication storage cost are relatively small, and the data security processing efficiency of the intelligent community system is improved.
Drawings
FIG. 1 is a block diagram of a system according to the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be within the scope of the present invention, based on the embodiments of the present invention.
Referring to fig. 1, the present invention provides a technical solution:
a cloud-edge cooperation-based intelligent community system data anomaly detection method comprises the following steps of S1-S5:
s1: in the system initialization stage, a smart community system management center issues a password security parameter set, a circular group based on an elliptic curve and a generating element thereof are selected, a main public key and a main private key of the smart community system management center are set, bilinear pair mapping is set, and a collision-resistant hash function is set;
s2: in the registration stage of the communication entity of the intelligent community system, the communication entity of the intelligent community system registers with the management center of the intelligent community system by providing real identity information, and after the management center of the intelligent community system confirms the real identity information of the communication entity of the intelligent community system, private keys are respectively distributed to the communication entity of the intelligent community system; the communication entity of the intelligent community system mainly comprises: the intelligent community system terminal user, the intelligent community system edge computing server and the intelligent community system cloud server;
s3: in the information reporting stage of the intelligent community system terminal users, each intelligent community system terminal user of the area managed by each intelligent community system edge computing server generates a corresponding authentication code of key data by using a private key, and reports the data to the intelligent community system edge computing server responsible for the area where the terminal user is located in real time;
s4: in the information reporting stage of the intelligent community system edge computing servers, each intelligent community system edge computing server receives key data and authentication codes reported by each intelligent community system terminal user in the area, and verifies and positions whether the key information reported by the specific intelligent community system terminal user is tampered or not through a batch detection equation of the intelligent community system edge computing server side; when key information reported by all intelligent community system terminal users in all intelligent community system-based border computing servers in jurisdictions is not tampered in a fixed time period, the intelligent community system border computing servers carry out statistical analysis according to the key information of the untampered intelligent community system terminal users to obtain decision information, and further generate authentication codes corresponding to decision data by using private keys and report the authentication codes to the intelligent community system cloud server;
s5: and in the abnormal detection stage of the decision data of the intelligent community system cloud server, the intelligent community system cloud server receives the decision data and the authentication code reported by each intelligent community system edge computing server, and verifies and positions whether the decision data reported by the specific intelligent community system edge computing server is tampered or not through the intelligent community system cloud server side batch detection equation.
In this embodiment, the specific steps in the S1 system initialization stage include:
s11: intelligent community system management center based on finite fieldZ q Is provided with a bilinear mappingRadiationWhereinG 1 Is based on elliptic curvepThe addition of the steps circulates the population,G 2 is thatpThe group of the order multiplication loops,qandpare all safe big prime numbers;
s12: the intelligent community system management center is based on elliptic curvepCyclic group of step additionG 1 One of which is randomly selectedpOrder generatorS
S13: the intelligent community system management center is in a finite fieldZ p Random selection of non-zero random numbersAs a master private key, and calculates a master public key of the smart community system management center +.>
S14: the intelligent community system management center sets two anti-collision hash functionsHere->A bit string representing an arbitrary length;
s15: the intelligent community system management center issues a password security parameter set:
in this embodiment, the smart community system includes a smart community system management center and smart community system communication entities, and the smart community system management center issues security parameters to all the smart community system communication entities.
S2: the intelligent community system communication entity registration stage specifically comprises the following steps:
s21: smart community system management center utilizing hash functionAnd a master private key->Identity of cloud server of intelligent community system for successful registrationID CS Calculate the corresponding private key +.>Wherein the private key first component of the smart community system cloud server +.>Private key second component of cloud server of intelligent community systemHere->Is a concatenated symbol;
s22: for successful registrationjIdentity of edge computing server of personal intelligent community systemHere, whereQThe number of all intelligent community system edge computing servers deployed in the intelligent community system, and the intelligent community system management center uses a hash function +.>And a master private key->Edge computing server for intelligent community systemID j Calculate the corresponding private key +.>Wherein the firstjEdge computing server of personal intelligent community systemID j Is>First, thejEdge computing server of personal intelligent community systemID j Private key second component of->
S23: identity of edge computing server for each intelligent community systemIdentity mark of each intelligent community system terminal user with successful registration of the area under the control of the intelligent community system terminal user>Here->Is thatID j The quantity of all the terminal users of the intelligent community system in the managed area, and the intelligent community system management center uses a hash functionAnd a master private key->Is->Calculate the corresponding private key +.>WhereinThe private key first component of (2) is +.>,/>The second component of the private key of (2) is
The intelligent community system management center performs private key calculation for each communication body which is registered successfully and obtains corresponding identity in the system, and mainly utilizes a hash function in a distributed password security parameter setAnd a master private key->Thus, each communication entity in the intelligent community system has a private key containing identity information.
S3: the specific steps of the intelligent community system terminal user information reporting stage include:
s31: edge computing server of each intelligent community systemEach of the smart community system end users of the jurisdiction>Randomly selecting a non-zero random number +.>
S32: end user of each intelligent community systemUsing the corresponding private key->Calculate key data +.>Authentication code +.>Wherein the authentication code first component of the terminal user of the intelligent community systemAuthentication code second component of terminal user of intelligent community systemHere, whereT 1 The time period is that the terminal user of the intelligent community system reports data to the edge computing server of the intelligent community system;
s33: end user of each intelligent community systemEdge computing server for corresponding intelligent community systemID j Reporting key data->And its authentication code->
When abnormal data is detected, key data of each terminal user is firstly extracted, and then an authentication code is designed according to the key data, wherein the authentication code is designed based on an identity digital signature algorithm aiming at an elliptic curve system, so that the complex public key certificate management cost is avoided, and the cost in the aspects of system calculation and communication storage is greatly reduced.
S4: the intelligent community system edge computing server information reporting stage specifically comprises the following steps:
s41: each intelligent community system terminal user of the area received by the intelligent community system edge computing serverIs->Authentication code->Verifying whether the following batch detection equation holds:
s42: if the above intelligent community system edge calculation server side batch detection equation is not established, the intelligent community system edge calculation serverID j For each intelligent community system end user one by oneIs->And its authentication code->The following equation verification is performed:until the condition that a certain equation is not established is detected, the fact that key information reported by a specific intelligent community system terminal user is tampered can be positioned;
s43: if the edge calculation server side batch detection equation of the intelligent community system is established, the edge calculation server of the intelligent community system based on the intelligent community systemID j All intelligent community system end users in jurisdiction are in time periodT 1 Internal reported key information is not tampered, and intelligent community system edge computing serverID j Further based on the key information of the terminal users of the intelligent community system which is not tampered withStatistical analysis is carried out to obtain decision information
S44: edge computing server of intelligent community systemID j In the finite fieldZ p Random selection of non-zero random numbers
S45: edge computing server of intelligent community systemID j Using corresponding private keysCalculating decision information->Authentication code +.>Wherein the edge of the intelligent community system calculates the first component of the authentication code of the server side +.>Authentication code second component->Here, whereT 2 The time period is that the intelligent community system edge computing server reports data to the intelligent community system cloud server;
s46: edge computing server of each intelligent community systemCloud server for intelligent community systemID CS Reporting the corresponding decision data +.>And its authentication code->
In step S41, the correctness of the batch detection equation at the edge computing server side of the intelligent community system is deduced as follows:
s5: the cloud server decision data anomaly detection stage of the intelligent community system specifically comprises the following steps:
s51: cloud server of intelligent community systemID CS During a time periodT 2 Receiving edge computing server of each intelligent community systemDecision data reported->And its authentication code->Cloud server of intelligent community systemID CS Verifying whether the following cloud batch detection equation is established:
s52: if the cloud batch detection equation is satisfied, all intelligent community system edge calculation servers based on the intelligent community system are in a time periodT 2 The decision information reported in the internal is not tampered;
s53: if the cloud batch detection equation is not satisfied, the intelligent community system cloud serverID CS Edge computing server for each intelligent community system one by oneIs->Authentication code thereofThe following verification was performed:
until the condition that a certain equation is not established is detected, namely the fact that decision information reported by a specific intelligent community system edge computing server is tampered is positioned.
In step S51, the correctness of the batch detection equation of the cloud server side of the intelligent community system is deduced as follows:
when abnormality detection is carried out, the intelligent community system terminal user does not report to the intelligent community system cloud server directly, but reports to the intelligent community system edge computing server firstly, if abnormality exists, the abnormal terminal user can be positioned directly, otherwise, the abnormal terminal user can report to the intelligent community system cloud server further, and the intelligent community system cloud server further verifies the intelligent community system edge computing server which locates abnormal data. Because the intelligent community system edge computing server is closer to the intelligent community system end user, the intelligent community system edge computing server is more suitable for real-time data analysis and intelligent processing, and is more efficient and safer. When abnormal data is detected, the data is reported in layers in a mode of cooperative work of cloud computing and edge computing, a layered data management mode is realized, key data and decision-making data are verified step by an intelligent community system edge computing server and an intelligent community system cloud server, the abnormal data condition of each intelligent community system terminal user can be detected in a fine granularity mode, and the distributed architecture can improve the intelligent community system management efficiency.
The foregoing is merely a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein but is not to be construed as excluding other embodiments, but is capable of numerous other combinations, modifications and environments and is capable of modifications within the scope of the inventive concept, either as taught or as a matter of routine skill or knowledge in the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.

Claims (1)

1. A cloud-edge cooperation-based intelligent community system data anomaly detection method is characterized by comprising the following steps of: comprising the following steps:
s1: system initialization phase: the intelligent community system management center issues a password security parameter set, selects a circular group based on an elliptic curve and a generating element thereof, sets a main public key and a main private key of the intelligent community system management center, sets bilinear pair mapping and sets a collision-resistant hash function;
s2: the intelligent community system communication entity registration stage: the intelligent community system communication entity registers to an intelligent community system management center by providing real identity information, and the intelligent community system management center distributes private keys for the intelligent community system communication entity after verifying the real identity information of the intelligent community system communication entity; the communication entity of the intelligent community system mainly comprises: the intelligent community system terminal user, the intelligent community system edge computing server and the intelligent community system cloud server;
s3: and a terminal user information reporting stage of the intelligent community system: each intelligent community system terminal user of each area managed by the intelligent community system edge computing server generates a corresponding authentication code of key data by using a private key, and reports the data to the intelligent community system edge computing server responsible for the area where the terminal user is located in real time;
s4: and the information reporting stage of the intelligent community system edge computing server: each intelligent community system edge computing server receives key data and authentication codes reported by each intelligent community system terminal user in the area, and verifies and positions whether the key information reported by the specific intelligent community system terminal user is tampered or not through a batch detection equation of the intelligent community system edge computing server side; when key information reported by all intelligent community system terminal users in all intelligent community system-based border computing servers in jurisdictions is not tampered in a fixed time period, the intelligent community system border computing servers carry out statistical analysis according to the key information of the untampered intelligent community system terminal users to obtain decision information, and further generate authentication codes corresponding to decision data by using private keys and report the authentication codes to the intelligent community system cloud server;
s5: and the cloud server decision data anomaly detection stage of the intelligent community system: the intelligent community system cloud server receives the decision data and the authentication code reported by each intelligent community system edge computing server, and verifies and positions whether the decision data reported by the specific intelligent community system edge computing server is tampered or not through a batch detection equation of the intelligent community system cloud server side;
the S1: the system initialization stage comprises the following specific steps:
s11: intelligent community system management center based on finite fieldZ q Setting a bilinear pair mappingWhereinG 1 Is based on elliptic curvepThe addition of the steps circulates the population,G 2 is thatpThe group of the order multiplication loops,qandpare all safe big prime numbers;
s12: the intelligent community system management center is based on elliptic curvepCyclic group of step additionG 1 One of which is randomly selectedpOrder generatorS
S13: the intelligent community system management center is in a finite fieldZ p Random selection of non-zero random numbersAs a master private key, and calculates a master public key of the smart community system management center +.>
S14: the intelligent community system management center sets two anti-collision hash functionsHere->A bit string representing an arbitrary length;
s15: the intelligent community system management center issues a password security parameter set:
s2: the intelligent community system communication entity registration stage specifically comprises the following steps:
s21: smart community system management center utilizing hash functionAnd a master private key->Identity of cloud server of intelligent community system for successful registrationID CS Calculate the corresponding private key +.>Wherein the private key first component of the smart community system cloud server +.>Private key second component of cloud server of intelligent community systemHere->Is a concatenated symbol;
s22: for successful registrationjIdentity of edge computing server of personal intelligent community systemHere, whereQThe intelligent community system management center uses a hash function to calculate the number of servers at the edge of all intelligent community systems deployed in the intelligent community system/>And a master private key->Edge computing server for intelligent community systemID j Calculate the corresponding private key +.>Wherein the firstjEdge computing server of personal intelligent community systemID j Is>First, thejEdge computing server of personal intelligent community systemID j Private key second component of->
S23: identity of edge computing server for each intelligent community systemIdentity mark of each intelligent community system terminal user with successful registration of the area under the control of the intelligent community system terminal user>Here->Is thatID j The quantity of all the terminal users of the intelligent community system in the managed area, and the intelligent community system management center uses a hash functionAnd a master private key->Is->Calculate the corresponding private key +.>WhereinThe private key first component of (2) is +.>,/>The second component of the private key of (2) is
S3: the specific steps of the intelligent community system terminal user information reporting stage include:
s31: edge computing server of each intelligent community systemEach of the smart community system end users of the jurisdiction>In the finite fieldZ p Random selection of non-zero random number +.>
S32: end user of each intelligent community systemUsing the corresponding private key->Calculating key dataAuthentication code +.>Wherein the authentication code first component of the terminal user of the intelligent community system +.>Authentication code second component of terminal user of intelligent community system +.>Here, whereT 1 The time period is that the terminal user of the intelligent community system reports data to the edge computing server of the intelligent community system;
s33: end user of each intelligent community systemEdge computing server for corresponding intelligent community systemID j Reporting key data->And its authentication code->
The S4: the intelligent community system edge computing server information reporting stage specifically comprises the following steps:
s41: each intelligent community system terminal user of the area received by the intelligent community system edge computing serverIs->Authentication code->Verifying whether the following batch detection equation holds:
s42: if the above intelligent community system edge calculation server side batch detection equation is not established, the intelligent community system edge calculation serverID j For each intelligent community system end user one by oneIs related to the reporting of key dataAnd its authentication code->The following equation verification is performed:until the condition that a certain equation is not established is detected, the fact that key information reported by a specific intelligent community system terminal user is tampered can be positioned;
s43: if the edge calculation server side batch detection equation of the intelligent community system is established, the edge calculation server of the intelligent community system based on the intelligent community systemID j All intelligent community system end users in jurisdiction are in time periodT 1 Internal reported key information is not tampered, and intelligent community system edge computing serverID j Further based on the key information of the terminal users of the intelligent community system which is not tampered withStatistical analysis is carried out to obtain decision information +.>
S44: edge computing server of intelligent community systemID j In the finite fieldZ p Random selection of non-zero random numbers
S45: edge computing server of intelligent community systemID j Using corresponding private keysCalculating decision informationAuthentication code +.>Wherein the edge of the intelligent community system calculates the first component of the authentication code of the server sideAuthentication code second component->Here, whereT 2 The time period is that the intelligent community system edge computing server reports data to the intelligent community system cloud server;
s46: edge computing server of each intelligent community systemCloud server for intelligent community systemID CS Reporting the corresponding decision data +.>And its authentication code->
S5: the cloud server decision data anomaly detection stage of the intelligent community system specifically comprises the following steps:
s51: cloud server of intelligent community systemID CS During a time periodT 2 Receiving edge computing server of each intelligent community systemDecision data reported->And its authentication code->Cloud server of intelligent community systemID CS Verifying whether the following cloud batch detection equation is established:
s52: if the cloud batch detection equation is satisfied, all intelligent community system edge calculation servers based on the intelligent community system are in a time periodT 2 The decision information reported in the internal is not tampered;
s53: if the cloud batch detection equation is not satisfied, the intelligent community system cloud serverID CS Edge computing server for each intelligent community system one by oneIs->Authentication code thereofThe following verification was performed:
until the condition that a certain equation is not established is detected, namely the fact that decision information reported by a specific intelligent community system edge computing server is tampered is positioned.
CN202311085147.0A 2023-08-28 2023-08-28 Cloud-edge collaboration-based intelligent community system data anomaly detection method Active CN116827686B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311085147.0A CN116827686B (en) 2023-08-28 2023-08-28 Cloud-edge collaboration-based intelligent community system data anomaly detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311085147.0A CN116827686B (en) 2023-08-28 2023-08-28 Cloud-edge collaboration-based intelligent community system data anomaly detection method

Publications (2)

Publication Number Publication Date
CN116827686A CN116827686A (en) 2023-09-29
CN116827686B true CN116827686B (en) 2023-11-17

Family

ID=88118795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311085147.0A Active CN116827686B (en) 2023-08-28 2023-08-28 Cloud-edge collaboration-based intelligent community system data anomaly detection method

Country Status (1)

Country Link
CN (1) CN116827686B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117544657B (en) * 2024-01-09 2024-03-15 河北万巷互联科技有限公司 Intelligent community intelligent security method and system based on Internet of things

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111915453A (en) * 2020-07-15 2020-11-10 刘其奎 Intelligent community electronic commerce service platform
CN112235113A (en) * 2020-07-15 2021-01-15 秦绪祥 Wisdom community endowment service platform
CN112532746A (en) * 2020-12-21 2021-03-19 北京邮电大学 Cloud edge cooperative sensing method and system
CN112565241A (en) * 2020-12-01 2021-03-26 杭州思源信息技术股份有限公司 Community Internet of things perception system based on smart skynet and construction method
CN113037783A (en) * 2021-05-24 2021-06-25 中南大学 Abnormal behavior detection method and system
WO2021227241A1 (en) * 2020-05-13 2021-11-18 西南石油大学 Statistical analysis method for key leakage prevention of encrypted data aggregation in smart power grid
CN113704051A (en) * 2021-07-20 2021-11-26 深圳市昊源诺信科技有限公司 Server fault detection system and implementation method
CN114422273A (en) * 2022-03-29 2022-04-29 四川高速公路建设开发集团有限公司 Sensitive decision data safety sharing method in intelligent construction engineering information system
CN114465824A (en) * 2022-04-11 2022-05-10 四川高速公路建设开发集团有限公司 Authorized access control method for intelligent construction engineering information system platform
CN114553463A (en) * 2021-12-30 2022-05-27 中国电子科技集团公司电子科学研究院 Internet of things perception data management system and management method based on block chain
CN115148379A (en) * 2022-06-06 2022-10-04 电子科技大学 System and method for realizing intelligent health monitoring of solitary old people by utilizing edge calculation
CN115333857A (en) * 2022-10-11 2022-11-11 晨越建设项目管理集团股份有限公司 Detection method for preventing data from being tampered based on smart city system cloud platform
WO2022240906A1 (en) * 2021-05-11 2022-11-17 Strong Force Vcn Portfolio 2019, Llc Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks
CN115967528A (en) * 2022-11-08 2023-04-14 中电智元数据科技有限公司 Distributed data sharing switching network anomaly monitoring and early warning method and system
CN116032495A (en) * 2023-03-28 2023-04-28 四川高速公路建设开发集团有限公司 Vehicle-cloud cooperative safety transmission data anomaly detection method based on intelligent traffic system
CN116204925A (en) * 2023-03-13 2023-06-02 无锡学院 Strong-robustness smart city edge calculation data security system and method
CN116527665A (en) * 2023-04-18 2023-08-01 四川边缘算力科技有限公司 Yun Bianduan heterogeneous edge computing network distributed computing architecture and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10887323B2 (en) * 2017-06-19 2021-01-05 International Business Machines Corporation Detecting malicious beaconing communities using lockstep detection and co-occurrence graph
US10326766B2 (en) * 2017-07-13 2019-06-18 Dell Products, Lp Method and apparatus for optimizing mobile edge computing for nomadic computing capabilities as a service
US11315024B2 (en) * 2018-06-25 2022-04-26 Kyndryl, Inc. Cognitive computing systems and services utilizing internet of things environment

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021227241A1 (en) * 2020-05-13 2021-11-18 西南石油大学 Statistical analysis method for key leakage prevention of encrypted data aggregation in smart power grid
CN112235113A (en) * 2020-07-15 2021-01-15 秦绪祥 Wisdom community endowment service platform
CN111915453A (en) * 2020-07-15 2020-11-10 刘其奎 Intelligent community electronic commerce service platform
CN112565241A (en) * 2020-12-01 2021-03-26 杭州思源信息技术股份有限公司 Community Internet of things perception system based on smart skynet and construction method
CN112532746A (en) * 2020-12-21 2021-03-19 北京邮电大学 Cloud edge cooperative sensing method and system
WO2022240906A1 (en) * 2021-05-11 2022-11-17 Strong Force Vcn Portfolio 2019, Llc Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks
CN113037783A (en) * 2021-05-24 2021-06-25 中南大学 Abnormal behavior detection method and system
CN113704051A (en) * 2021-07-20 2021-11-26 深圳市昊源诺信科技有限公司 Server fault detection system and implementation method
CN114553463A (en) * 2021-12-30 2022-05-27 中国电子科技集团公司电子科学研究院 Internet of things perception data management system and management method based on block chain
CN114422273A (en) * 2022-03-29 2022-04-29 四川高速公路建设开发集团有限公司 Sensitive decision data safety sharing method in intelligent construction engineering information system
CN114465824A (en) * 2022-04-11 2022-05-10 四川高速公路建设开发集团有限公司 Authorized access control method for intelligent construction engineering information system platform
CN115148379A (en) * 2022-06-06 2022-10-04 电子科技大学 System and method for realizing intelligent health monitoring of solitary old people by utilizing edge calculation
CN115333857A (en) * 2022-10-11 2022-11-11 晨越建设项目管理集团股份有限公司 Detection method for preventing data from being tampered based on smart city system cloud platform
CN115967528A (en) * 2022-11-08 2023-04-14 中电智元数据科技有限公司 Distributed data sharing switching network anomaly monitoring and early warning method and system
CN116204925A (en) * 2023-03-13 2023-06-02 无锡学院 Strong-robustness smart city edge calculation data security system and method
CN116032495A (en) * 2023-03-28 2023-04-28 四川高速公路建设开发集团有限公司 Vehicle-cloud cooperative safety transmission data anomaly detection method based on intelligent traffic system
CN116527665A (en) * 2023-04-18 2023-08-01 四川边缘算力科技有限公司 Yun Bianduan heterogeneous edge computing network distributed computing architecture and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Optimize cloud computations using edge computing;Sachchidanand Singh;《2017 International Conference on Big Data, IoT and Data Science (BID)》;全文 *
基于云―边协同的智能工厂工业物联网架构与自治生产管控技术;丁凯;陈东燊;王岩;朱学凯;张富强;张超;;计算机集成制造系统(12);全文 *
基于边云协同的空压机状态数据监测与异常预测系统研究;贾凯旋;《中国优秀硕士学位论文全文数据库(信息科技辑)》;全文 *

Also Published As

Publication number Publication date
CN116827686A (en) 2023-09-29

Similar Documents

Publication Publication Date Title
CN110601853B (en) Block chain private key generation method and equipment
Awan et al. Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things
CN109474610B (en) Anonymous certifiable key exchange method based on smart grid
CN110958110B (en) Block chain private data management method and system based on zero knowledge proof
Qin et al. A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
CN106936566B (en) Outsourcing document signing method based on block chain technology
CN108964919A (en) The lightweight anonymous authentication method with secret protection based on car networking
CN102946603B (en) Based on the unified identity authentication method of social characteristic in power cloud system
CN116827686B (en) Cloud-edge collaboration-based intelligent community system data anomaly detection method
CN109889497A (en) A kind of data integrity verification method for going to trust
CN107124272A (en) The lattice cloud storage data safety auditing method for supporting agent data to upload
CN104660605A (en) Multi-factor identity authentication method and system
CN110930153B (en) Block chain privacy data management method and system based on hidden third party account
CN104639311A (en) Combining method and system for protecting power utilization privacy and integrity in smart power grid
CN105227317A (en) A kind of cloud data integrity detection method and system supporting authenticator privacy
CN110097370B (en) Offline payment method, device, server and medium
CN114095162A (en) Connection verification method and device for certificateless power consumption information acquisition system
CN112398861A (en) Encryption system and method for sensitive data in web configuration system
Salami et al. SMAK-IOV: secure mutual authentication scheme and key exchange protocol in fog based IoV
CN116015751A (en) Intelligent power grid bidirectional authentication system and method
Zhang et al. RRV-BC: Random Reputation Voting Mechanism and Blockchain Assisted Access Authentication for Industrial Internet of Things
CN114172742A (en) Layered authentication method for power internet of things terminal equipment based on node map and edge authentication
CN109510830B (en) Authentication method, device, medium and equipment for intelligent electric meter
CN113992389A (en) SGX data integrity auditing method based on dynamic frequency table
CN113852628A (en) Decentralized single sign-on method, decentralized single sign-on device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant