CN116827686B - Cloud-edge collaboration-based intelligent community system data anomaly detection method - Google Patents
Cloud-edge collaboration-based intelligent community system data anomaly detection method Download PDFInfo
- Publication number
- CN116827686B CN116827686B CN202311085147.0A CN202311085147A CN116827686B CN 116827686 B CN116827686 B CN 116827686B CN 202311085147 A CN202311085147 A CN 202311085147A CN 116827686 B CN116827686 B CN 116827686B
- Authority
- CN
- China
- Prior art keywords
- community system
- intelligent community
- intelligent
- edge computing
- computing server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 43
- 238000004891 communication Methods 0.000 claims abstract description 25
- 238000004364 calculation method Methods 0.000 claims abstract description 19
- 238000007619 statistical method Methods 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 5
- 230000002159 abnormal effect Effects 0.000 abstract description 11
- 238000007726 management method Methods 0.000 abstract description 10
- 238000013523 data management Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
Abstract
The invention discloses a cloud-edge collaboration-based intelligent community system data anomaly detection method, which relates to the field of intelligent community system data privacy protection and comprises a system initialization stage, an intelligent community system communication entity registration stage, an intelligent community system terminal user information reporting stage, an intelligent community system edge calculation server information reporting stage and an intelligent community system cloud server decision data anomaly detection stage. When abnormal data is detected, the data is reported in layers in a mode of cooperative work of cloud computing and edge computing, a layered data management mode is realized, key data and decision-making data are verified step by an intelligent community system edge computing server and an intelligent community system cloud server, the abnormal data condition of each intelligent community system terminal user can be detected in a fine granularity mode, and the distributed architecture can improve the intelligent community system management efficiency.
Description
Technical Field
The invention relates to the field of data privacy protection of intelligent community systems, in particular to a cloud-edge cooperation-based intelligent community system data anomaly detection method.
Background
Smart communities, also known as future communities, are a new model of innovation in new situations. The intelligent community is an integrated application of new generation information technologies such as Internet of things, cloud computing and mobile Internet, and provides a safe, comfortable and convenient modern and intelligent living environment for community residents. The intelligent community realizes the fine dynamic management of the community by constructing a system management platform and integrating new technologies such as big data, artificial intelligence, information safety and the like, and comprehensively opens a new mode of intelligent community safety service, so that more residents enjoy the convenience brought by intellectualization.
With the rapid development of the Internet of things and big data technology, the intelligent community generates mass data of all dimensions. The cloud server of the intelligent community system is deployed in the intelligent community, the storage and management of data are realized by providing a cloud storage service mode, and the resource access service which is reasonable in price, rapid and elastic and ubiquitous on demand is provided.
And an intelligent community system edge computing server is deployed in the intelligent community system, so that the big data processing capacity of the system can be effectively improved. However, in order to achieve a fine and efficient community management, the edge computing servers of the intelligent community system deployed in each area periodically collect key data of the end users of the intelligent community system, and even make important decisions based on the key data. If the data is tampered in the process of transmitting the data from the intelligent community system end user to the intelligent community system edge computing server or from the intelligent community system edge computing server to the intelligent community system cloud server, the data is abnormal, so that the intelligent community management transaction can be influenced, even the sensitive privacy of important users of the intelligent community can be exposed, the security decision is made in error, and the important economic loss is caused. Therefore, in order to realize the integrity and tamper resistance of the multi-source data transmission of the intelligent community system, the data anomaly detection method based on cloud-edge cooperation is researched and designed, and the method has important application prospect in the intelligent community system.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a cloud-edge collaboration-based intelligent community system data anomaly detection method for hierarchically detecting the data anomalies of terminal users of each intelligent community system.
The aim of the invention is realized by the following technical scheme:
a cloud-edge collaboration-based intelligent community system data anomaly detection method comprises the following steps:
system initialization phase: the intelligent community system management center issues a password security parameter set, selects a circular group based on an elliptic curve and a generating element thereof, sets a main public key and a main private key of the intelligent community system management center, sets bilinear pair mapping and sets a collision-resistant hash function;
the intelligent community system communication entity registration stage: the intelligent community system communication entity registers to an intelligent community system management center by providing real identity information, and the intelligent community system management center distributes private keys for the intelligent community system communication entity after verifying the real identity information of the intelligent community system communication entity; the communication entity of the intelligent community system mainly comprises: the intelligent community system terminal user, the intelligent community system edge computing server and the intelligent community system cloud server;
and a terminal user information reporting stage of the intelligent community system: each intelligent community system terminal user of each area managed by the intelligent community system edge computing server generates a corresponding authentication code of key data by using a private key, and reports the data to the intelligent community system edge computing server responsible for the area where the terminal user is located in real time;
and the information reporting stage of the intelligent community system edge computing server: each intelligent community system edge computing server receives key data and authentication codes reported by each intelligent community system terminal user in the area, and verifies and positions whether the key information reported by the specific intelligent community system terminal user is tampered or not through a batch detection equation of the intelligent community system edge computing server side; when key information reported by all intelligent community system terminal users in all intelligent community system-based border computing servers in jurisdictions is not tampered in a fixed time period, the intelligent community system border computing servers carry out statistical analysis according to the key information of the untampered intelligent community system terminal users to obtain decision information, and further generate authentication codes corresponding to decision data by using private keys and report the authentication codes to the intelligent community system cloud server;
and the cloud server decision data anomaly detection stage of the intelligent community system: and the intelligent community system cloud server receives the decision data and the authentication code reported by each intelligent community system edge computing server, and verifies and positions whether the decision data reported by the specific intelligent community system edge computing server is tampered or not through the intelligent community system cloud server end batch detection equation.
Further, the system initialization stage specifically includes the steps of:
(1) Intelligent community system management center based on finite fieldZ q Setting a bilinear pair mappingWhereinG 1 Is based on elliptic curvepThe addition of the steps circulates the population,G 2 is thatpThe group of the order multiplication loops,qandpare all safe big prime numbers;
(2) The intelligent community system management center is based on elliptic curvepCyclic group of step additionG 1 One of which is randomly selectedpOrder generatorS;
(3) Smart communityThe system management center is in a finite fieldZ p Random selection of non-zero random numbersAs a master private key, and calculates a master public key of the smart community system management center +.>;
(4) The intelligent community system management center sets two anti-collision hash functions,Here->A bit string representing an arbitrary length;
(5) The intelligent community system management center issues a password security parameter set:。
further, the specific steps of the intelligent community system communication entity registration stage include:
(1) Smart community system management center utilizing hash functionAnd a master private key->Identity of cloud server of intelligent community system for successful registrationID CS Calculate the corresponding private key +.>Wherein the private key first component of the smart community system cloud server +.>Private key second branch of cloud server of intelligent community systemMeasuring amountHere->Is a concatenated symbol;
(2) For successful registrationjIdentity of edge computing server of personal intelligent community systemHere, whereQThe number of all intelligent community system edge computing servers deployed in the intelligent community system, and the intelligent community system management center uses a hash function +.>And a master private key->Edge computing server for intelligent community systemID j Calculate the corresponding private key +.>Wherein the firstjEdge computing server of personal intelligent community systemID j Is>First, thejEdge computing server of personal intelligent community systemID j Private key second component of->;
(3) Identity of edge computing server for each intelligent community systemIdentity mark of each intelligent community system terminal user with successful registration of the area under the control of the intelligent community system terminal user>Here->Is thatID j The quantity of all the terminal users of the intelligent community system in the managed area, and the intelligent community system management center uses a hash functionAnd a master private key->Is->Calculate the corresponding private key +.>WhereinThe private key first component of (2) is +.>,/>The second component of the private key of (2) is。
Further, the specific steps of the smart community system terminal user information reporting stage include:
(1) Edge computing server of each intelligent community systemEach of the smart community system end users of the jurisdiction>Randomly selecting a non-zero random number +.>;
(2) Each intelligent agentZone system end userUsing the corresponding private key->Calculate key data +.>Authentication code +.>Wherein the authentication code first component of the terminal user of the intelligent community systemAuthentication code second component of terminal user of intelligent community systemHere, whereT 1 The time period is that the terminal user of the intelligent community system reports data to the edge computing server of the intelligent community system;
(3) End user of each intelligent community systemEdge computing server for corresponding intelligent community systemID j Reporting key data->And its authentication code->。
Further, the specific steps of the intelligent community system edge computing server information reporting stage include:
(1) Each intelligent community system terminal user of the area received by the intelligent community system edge computing serverIs->Authentication code->Verifying whether the following batch detection equation holds:
;
(2) If the above intelligent community system edge calculation server side batch detection equation is not established, the intelligent community system edge calculation serverID j For each intelligent community system end user one by oneIs->And its authentication code->The following equation verification is performed:until the condition that a certain equation is not established is detected, the fact that key information reported by a specific intelligent community system terminal user is tampered can be positioned;
(3) If the edge calculation server side batch detection equation of the intelligent community system is established, the edge calculation server of the intelligent community system based on the intelligent community systemID j All intelligent community system end users in jurisdiction are in time periodT 1 Internal reported key information is not tampered, and intelligent community system edge computing serverID j Further based on the key information of the terminal users of the intelligent community system which is not tampered withStatistical analysis is carried out to obtain decision information;
(4) Edge computing server of intelligent community systemID j In the finite fieldZ p Random selection of non-zero random numbers;
(5) Edge computing server of intelligent community systemID j Using corresponding private keysCalculating decision information->Authentication code +.>Wherein the edge of the intelligent community system calculates the first component of the authentication code of the server sideAuthentication code second component->Here, whereT 2 The time period is that the intelligent community system edge computing server reports data to the intelligent community system cloud server;
(6) Edge computing server of each intelligent community systemCloud server for intelligent community systemID CS Reporting the corresponding decision data +.>And its authentication code->。
Further, the specific steps of the smart community system cloud server decision data anomaly detection stage include:
(1) Cloud server of intelligent community systemID CS During a time periodT 2 Receiving edge computing server of each intelligent community systemDecision data reported->And its authentication code->Cloud server of intelligent community systemID CS Verifying whether the following cloud batch detection equation is established:
;
(2) If the cloud batch detection equation is satisfied, all intelligent community system edge calculation servers based on the intelligent community system are in a time periodT 2 The decision information reported in the internal is not tampered;
(3) If the cloud batch detection equation is not satisfied, the intelligent community system cloud serverID CS Edge computing server for each intelligent community system one by oneIs->Authentication code thereofThe following verification was performed:
,
until the condition that a certain equation is not established is detected, namely the fact that decision information reported by a specific intelligent community system edge computing server is tampered is positioned.
The beneficial effects of the invention are as follows:
1) The cloud-side cooperative layered data reporting mechanism realizes a layered data management mode, can detect the abnormal data condition of each intelligent community system terminal user in a fine granularity manner, and the distributed architecture can improve the management efficiency of the intelligent community system.
2) The authentication code based on the identity digital signature algorithm is designed for the elliptic curve system, so that the complex public key certificate management cost is avoided, the calculation cost and the communication storage cost are relatively small, and the data security processing efficiency of the intelligent community system is improved.
Drawings
FIG. 1 is a block diagram of a system according to the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be within the scope of the present invention, based on the embodiments of the present invention.
Referring to fig. 1, the present invention provides a technical solution:
a cloud-edge cooperation-based intelligent community system data anomaly detection method comprises the following steps of S1-S5:
s1: in the system initialization stage, a smart community system management center issues a password security parameter set, a circular group based on an elliptic curve and a generating element thereof are selected, a main public key and a main private key of the smart community system management center are set, bilinear pair mapping is set, and a collision-resistant hash function is set;
s2: in the registration stage of the communication entity of the intelligent community system, the communication entity of the intelligent community system registers with the management center of the intelligent community system by providing real identity information, and after the management center of the intelligent community system confirms the real identity information of the communication entity of the intelligent community system, private keys are respectively distributed to the communication entity of the intelligent community system; the communication entity of the intelligent community system mainly comprises: the intelligent community system terminal user, the intelligent community system edge computing server and the intelligent community system cloud server;
s3: in the information reporting stage of the intelligent community system terminal users, each intelligent community system terminal user of the area managed by each intelligent community system edge computing server generates a corresponding authentication code of key data by using a private key, and reports the data to the intelligent community system edge computing server responsible for the area where the terminal user is located in real time;
s4: in the information reporting stage of the intelligent community system edge computing servers, each intelligent community system edge computing server receives key data and authentication codes reported by each intelligent community system terminal user in the area, and verifies and positions whether the key information reported by the specific intelligent community system terminal user is tampered or not through a batch detection equation of the intelligent community system edge computing server side; when key information reported by all intelligent community system terminal users in all intelligent community system-based border computing servers in jurisdictions is not tampered in a fixed time period, the intelligent community system border computing servers carry out statistical analysis according to the key information of the untampered intelligent community system terminal users to obtain decision information, and further generate authentication codes corresponding to decision data by using private keys and report the authentication codes to the intelligent community system cloud server;
s5: and in the abnormal detection stage of the decision data of the intelligent community system cloud server, the intelligent community system cloud server receives the decision data and the authentication code reported by each intelligent community system edge computing server, and verifies and positions whether the decision data reported by the specific intelligent community system edge computing server is tampered or not through the intelligent community system cloud server side batch detection equation.
In this embodiment, the specific steps in the S1 system initialization stage include:
s11: intelligent community system management center based on finite fieldZ q Is provided with a bilinear mappingRadiationWhereinG 1 Is based on elliptic curvepThe addition of the steps circulates the population,G 2 is thatpThe group of the order multiplication loops,qandpare all safe big prime numbers;
s12: the intelligent community system management center is based on elliptic curvepCyclic group of step additionG 1 One of which is randomly selectedpOrder generatorS;
S13: the intelligent community system management center is in a finite fieldZ p Random selection of non-zero random numbersAs a master private key, and calculates a master public key of the smart community system management center +.>;
S14: the intelligent community system management center sets two anti-collision hash functions,Here->A bit string representing an arbitrary length;
s15: the intelligent community system management center issues a password security parameter set:。
in this embodiment, the smart community system includes a smart community system management center and smart community system communication entities, and the smart community system management center issues security parameters to all the smart community system communication entities.
S2: the intelligent community system communication entity registration stage specifically comprises the following steps:
s21: smart community system management center utilizing hash functionAnd a master private key->Identity of cloud server of intelligent community system for successful registrationID CS Calculate the corresponding private key +.>Wherein the private key first component of the smart community system cloud server +.>Private key second component of cloud server of intelligent community systemHere->Is a concatenated symbol;
s22: for successful registrationjIdentity of edge computing server of personal intelligent community systemHere, whereQThe number of all intelligent community system edge computing servers deployed in the intelligent community system, and the intelligent community system management center uses a hash function +.>And a master private key->Edge computing server for intelligent community systemID j Calculate the corresponding private key +.>Wherein the firstjEdge computing server of personal intelligent community systemID j Is>First, thejEdge computing server of personal intelligent community systemID j Private key second component of->;
S23: identity of edge computing server for each intelligent community systemIdentity mark of each intelligent community system terminal user with successful registration of the area under the control of the intelligent community system terminal user>Here->Is thatID j The quantity of all the terminal users of the intelligent community system in the managed area, and the intelligent community system management center uses a hash functionAnd a master private key->Is->Calculate the corresponding private key +.>WhereinThe private key first component of (2) is +.>,/>The second component of the private key of (2) is。
The intelligent community system management center performs private key calculation for each communication body which is registered successfully and obtains corresponding identity in the system, and mainly utilizes a hash function in a distributed password security parameter setAnd a master private key->Thus, each communication entity in the intelligent community system has a private key containing identity information.
S3: the specific steps of the intelligent community system terminal user information reporting stage include:
s31: edge computing server of each intelligent community systemEach of the smart community system end users of the jurisdiction>Randomly selecting a non-zero random number +.>;
S32: end user of each intelligent community systemUsing the corresponding private key->Calculate key data +.>Authentication code +.>Wherein the authentication code first component of the terminal user of the intelligent community systemAuthentication code second component of terminal user of intelligent community systemHere, whereT 1 The time period is that the terminal user of the intelligent community system reports data to the edge computing server of the intelligent community system;
s33: end user of each intelligent community systemEdge computing server for corresponding intelligent community systemID j Reporting key data->And its authentication code->。
When abnormal data is detected, key data of each terminal user is firstly extracted, and then an authentication code is designed according to the key data, wherein the authentication code is designed based on an identity digital signature algorithm aiming at an elliptic curve system, so that the complex public key certificate management cost is avoided, and the cost in the aspects of system calculation and communication storage is greatly reduced.
S4: the intelligent community system edge computing server information reporting stage specifically comprises the following steps:
s41: each intelligent community system terminal user of the area received by the intelligent community system edge computing serverIs->Authentication code->Verifying whether the following batch detection equation holds:
;
s42: if the above intelligent community system edge calculation server side batch detection equation is not established, the intelligent community system edge calculation serverID j For each intelligent community system end user one by oneIs->And its authentication code->The following equation verification is performed:until the condition that a certain equation is not established is detected, the fact that key information reported by a specific intelligent community system terminal user is tampered can be positioned;
s43: if the edge calculation server side batch detection equation of the intelligent community system is established, the edge calculation server of the intelligent community system based on the intelligent community systemID j All intelligent community system end users in jurisdiction are in time periodT 1 Internal reported key information is not tampered, and intelligent community system edge computing serverID j Further based on the key information of the terminal users of the intelligent community system which is not tampered withStatistical analysis is carried out to obtain decision information;
S44: edge computing server of intelligent community systemID j In the finite fieldZ p Random selection of non-zero random numbers;
S45: edge computing server of intelligent community systemID j Using corresponding private keysCalculating decision information->Authentication code +.>Wherein the edge of the intelligent community system calculates the first component of the authentication code of the server side +.>Authentication code second component->Here, whereT 2 The time period is that the intelligent community system edge computing server reports data to the intelligent community system cloud server;
s46: edge computing server of each intelligent community systemCloud server for intelligent community systemID CS Reporting the corresponding decision data +.>And its authentication code->。
In step S41, the correctness of the batch detection equation at the edge computing server side of the intelligent community system is deduced as follows:
。
s5: the cloud server decision data anomaly detection stage of the intelligent community system specifically comprises the following steps:
s51: cloud server of intelligent community systemID CS During a time periodT 2 Receiving edge computing server of each intelligent community systemDecision data reported->And its authentication code->Cloud server of intelligent community systemID CS Verifying whether the following cloud batch detection equation is established:
;
s52: if the cloud batch detection equation is satisfied, all intelligent community system edge calculation servers based on the intelligent community system are in a time periodT 2 The decision information reported in the internal is not tampered;
s53: if the cloud batch detection equation is not satisfied, the intelligent community system cloud serverID CS Edge computing server for each intelligent community system one by oneIs->Authentication code thereofThe following verification was performed:
,
until the condition that a certain equation is not established is detected, namely the fact that decision information reported by a specific intelligent community system edge computing server is tampered is positioned.
In step S51, the correctness of the batch detection equation of the cloud server side of the intelligent community system is deduced as follows:
。
when abnormality detection is carried out, the intelligent community system terminal user does not report to the intelligent community system cloud server directly, but reports to the intelligent community system edge computing server firstly, if abnormality exists, the abnormal terminal user can be positioned directly, otherwise, the abnormal terminal user can report to the intelligent community system cloud server further, and the intelligent community system cloud server further verifies the intelligent community system edge computing server which locates abnormal data. Because the intelligent community system edge computing server is closer to the intelligent community system end user, the intelligent community system edge computing server is more suitable for real-time data analysis and intelligent processing, and is more efficient and safer. When abnormal data is detected, the data is reported in layers in a mode of cooperative work of cloud computing and edge computing, a layered data management mode is realized, key data and decision-making data are verified step by an intelligent community system edge computing server and an intelligent community system cloud server, the abnormal data condition of each intelligent community system terminal user can be detected in a fine granularity mode, and the distributed architecture can improve the intelligent community system management efficiency.
The foregoing is merely a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein but is not to be construed as excluding other embodiments, but is capable of numerous other combinations, modifications and environments and is capable of modifications within the scope of the inventive concept, either as taught or as a matter of routine skill or knowledge in the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.
Claims (1)
1. A cloud-edge cooperation-based intelligent community system data anomaly detection method is characterized by comprising the following steps of: comprising the following steps:
s1: system initialization phase: the intelligent community system management center issues a password security parameter set, selects a circular group based on an elliptic curve and a generating element thereof, sets a main public key and a main private key of the intelligent community system management center, sets bilinear pair mapping and sets a collision-resistant hash function;
s2: the intelligent community system communication entity registration stage: the intelligent community system communication entity registers to an intelligent community system management center by providing real identity information, and the intelligent community system management center distributes private keys for the intelligent community system communication entity after verifying the real identity information of the intelligent community system communication entity; the communication entity of the intelligent community system mainly comprises: the intelligent community system terminal user, the intelligent community system edge computing server and the intelligent community system cloud server;
s3: and a terminal user information reporting stage of the intelligent community system: each intelligent community system terminal user of each area managed by the intelligent community system edge computing server generates a corresponding authentication code of key data by using a private key, and reports the data to the intelligent community system edge computing server responsible for the area where the terminal user is located in real time;
s4: and the information reporting stage of the intelligent community system edge computing server: each intelligent community system edge computing server receives key data and authentication codes reported by each intelligent community system terminal user in the area, and verifies and positions whether the key information reported by the specific intelligent community system terminal user is tampered or not through a batch detection equation of the intelligent community system edge computing server side; when key information reported by all intelligent community system terminal users in all intelligent community system-based border computing servers in jurisdictions is not tampered in a fixed time period, the intelligent community system border computing servers carry out statistical analysis according to the key information of the untampered intelligent community system terminal users to obtain decision information, and further generate authentication codes corresponding to decision data by using private keys and report the authentication codes to the intelligent community system cloud server;
s5: and the cloud server decision data anomaly detection stage of the intelligent community system: the intelligent community system cloud server receives the decision data and the authentication code reported by each intelligent community system edge computing server, and verifies and positions whether the decision data reported by the specific intelligent community system edge computing server is tampered or not through a batch detection equation of the intelligent community system cloud server side;
the S1: the system initialization stage comprises the following specific steps:
s11: intelligent community system management center based on finite fieldZ q Setting a bilinear pair mappingWhereinG 1 Is based on elliptic curvepThe addition of the steps circulates the population,G 2 is thatpThe group of the order multiplication loops,qandpare all safe big prime numbers;
s12: the intelligent community system management center is based on elliptic curvepCyclic group of step additionG 1 One of which is randomly selectedpOrder generatorS;
S13: the intelligent community system management center is in a finite fieldZ p Random selection of non-zero random numbersAs a master private key, and calculates a master public key of the smart community system management center +.>;
S14: the intelligent community system management center sets two anti-collision hash functions,Here->A bit string representing an arbitrary length;
s15: the intelligent community system management center issues a password security parameter set:;
s2: the intelligent community system communication entity registration stage specifically comprises the following steps:
s21: smart community system management center utilizing hash functionAnd a master private key->Identity of cloud server of intelligent community system for successful registrationID CS Calculate the corresponding private key +.>Wherein the private key first component of the smart community system cloud server +.>Private key second component of cloud server of intelligent community systemHere->Is a concatenated symbol;
s22: for successful registrationjIdentity of edge computing server of personal intelligent community systemHere, whereQThe intelligent community system management center uses a hash function to calculate the number of servers at the edge of all intelligent community systems deployed in the intelligent community system/>And a master private key->Edge computing server for intelligent community systemID j Calculate the corresponding private key +.>Wherein the firstjEdge computing server of personal intelligent community systemID j Is>First, thejEdge computing server of personal intelligent community systemID j Private key second component of->;
S23: identity of edge computing server for each intelligent community systemIdentity mark of each intelligent community system terminal user with successful registration of the area under the control of the intelligent community system terminal user>Here->Is thatID j The quantity of all the terminal users of the intelligent community system in the managed area, and the intelligent community system management center uses a hash functionAnd a master private key->Is->Calculate the corresponding private key +.>WhereinThe private key first component of (2) is +.>,/>The second component of the private key of (2) is;
S3: the specific steps of the intelligent community system terminal user information reporting stage include:
s31: edge computing server of each intelligent community systemEach of the smart community system end users of the jurisdiction>In the finite fieldZ p Random selection of non-zero random number +.>;
S32: end user of each intelligent community systemUsing the corresponding private key->Calculating key dataAuthentication code +.>Wherein the authentication code first component of the terminal user of the intelligent community system +.>Authentication code second component of terminal user of intelligent community system +.>Here, whereT 1 The time period is that the terminal user of the intelligent community system reports data to the edge computing server of the intelligent community system;
s33: end user of each intelligent community systemEdge computing server for corresponding intelligent community systemID j Reporting key data->And its authentication code->;
The S4: the intelligent community system edge computing server information reporting stage specifically comprises the following steps:
s41: each intelligent community system terminal user of the area received by the intelligent community system edge computing serverIs->Authentication code->Verifying whether the following batch detection equation holds:
;
s42: if the above intelligent community system edge calculation server side batch detection equation is not established, the intelligent community system edge calculation serverID j For each intelligent community system end user one by oneIs related to the reporting of key dataAnd its authentication code->The following equation verification is performed:until the condition that a certain equation is not established is detected, the fact that key information reported by a specific intelligent community system terminal user is tampered can be positioned;
s43: if the edge calculation server side batch detection equation of the intelligent community system is established, the edge calculation server of the intelligent community system based on the intelligent community systemID j All intelligent community system end users in jurisdiction are in time periodT 1 Internal reported key information is not tampered, and intelligent community system edge computing serverID j Further based on the key information of the terminal users of the intelligent community system which is not tampered withStatistical analysis is carried out to obtain decision information +.>;
S44: edge computing server of intelligent community systemID j In the finite fieldZ p Random selection of non-zero random numbers;
S45: edge computing server of intelligent community systemID j Using corresponding private keysCalculating decision informationAuthentication code +.>Wherein the edge of the intelligent community system calculates the first component of the authentication code of the server sideAuthentication code second component->Here, whereT 2 The time period is that the intelligent community system edge computing server reports data to the intelligent community system cloud server;
s46: edge computing server of each intelligent community systemCloud server for intelligent community systemID CS Reporting the corresponding decision data +.>And its authentication code->;
S5: the cloud server decision data anomaly detection stage of the intelligent community system specifically comprises the following steps:
s51: cloud server of intelligent community systemID CS During a time periodT 2 Receiving edge computing server of each intelligent community systemDecision data reported->And its authentication code->Cloud server of intelligent community systemID CS Verifying whether the following cloud batch detection equation is established:;
s52: if the cloud batch detection equation is satisfied, all intelligent community system edge calculation servers based on the intelligent community system are in a time periodT 2 The decision information reported in the internal is not tampered;
s53: if the cloud batch detection equation is not satisfied, the intelligent community system cloud serverID CS Edge computing server for each intelligent community system one by oneIs->Authentication code thereofThe following verification was performed:
,
until the condition that a certain equation is not established is detected, namely the fact that decision information reported by a specific intelligent community system edge computing server is tampered is positioned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311085147.0A CN116827686B (en) | 2023-08-28 | 2023-08-28 | Cloud-edge collaboration-based intelligent community system data anomaly detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311085147.0A CN116827686B (en) | 2023-08-28 | 2023-08-28 | Cloud-edge collaboration-based intelligent community system data anomaly detection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116827686A CN116827686A (en) | 2023-09-29 |
CN116827686B true CN116827686B (en) | 2023-11-17 |
Family
ID=88118795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311085147.0A Active CN116827686B (en) | 2023-08-28 | 2023-08-28 | Cloud-edge collaboration-based intelligent community system data anomaly detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116827686B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117544657B (en) * | 2024-01-09 | 2024-03-15 | 河北万巷互联科技有限公司 | Intelligent community intelligent security method and system based on Internet of things |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111915453A (en) * | 2020-07-15 | 2020-11-10 | 刘其奎 | Intelligent community electronic commerce service platform |
CN112235113A (en) * | 2020-07-15 | 2021-01-15 | 秦绪祥 | Wisdom community endowment service platform |
CN112532746A (en) * | 2020-12-21 | 2021-03-19 | 北京邮电大学 | Cloud edge cooperative sensing method and system |
CN112565241A (en) * | 2020-12-01 | 2021-03-26 | 杭州思源信息技术股份有限公司 | Community Internet of things perception system based on smart skynet and construction method |
CN113037783A (en) * | 2021-05-24 | 2021-06-25 | 中南大学 | Abnormal behavior detection method and system |
WO2021227241A1 (en) * | 2020-05-13 | 2021-11-18 | 西南石油大学 | Statistical analysis method for key leakage prevention of encrypted data aggregation in smart power grid |
CN113704051A (en) * | 2021-07-20 | 2021-11-26 | 深圳市昊源诺信科技有限公司 | Server fault detection system and implementation method |
CN114422273A (en) * | 2022-03-29 | 2022-04-29 | 四川高速公路建设开发集团有限公司 | Sensitive decision data safety sharing method in intelligent construction engineering information system |
CN114465824A (en) * | 2022-04-11 | 2022-05-10 | 四川高速公路建设开发集团有限公司 | Authorized access control method for intelligent construction engineering information system platform |
CN114553463A (en) * | 2021-12-30 | 2022-05-27 | 中国电子科技集团公司电子科学研究院 | Internet of things perception data management system and management method based on block chain |
CN115148379A (en) * | 2022-06-06 | 2022-10-04 | 电子科技大学 | System and method for realizing intelligent health monitoring of solitary old people by utilizing edge calculation |
CN115333857A (en) * | 2022-10-11 | 2022-11-11 | 晨越建设项目管理集团股份有限公司 | Detection method for preventing data from being tampered based on smart city system cloud platform |
WO2022240906A1 (en) * | 2021-05-11 | 2022-11-17 | Strong Force Vcn Portfolio 2019, Llc | Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks |
CN115967528A (en) * | 2022-11-08 | 2023-04-14 | 中电智元数据科技有限公司 | Distributed data sharing switching network anomaly monitoring and early warning method and system |
CN116032495A (en) * | 2023-03-28 | 2023-04-28 | 四川高速公路建设开发集团有限公司 | Vehicle-cloud cooperative safety transmission data anomaly detection method based on intelligent traffic system |
CN116204925A (en) * | 2023-03-13 | 2023-06-02 | 无锡学院 | Strong-robustness smart city edge calculation data security system and method |
CN116527665A (en) * | 2023-04-18 | 2023-08-01 | 四川边缘算力科技有限公司 | Yun Bianduan heterogeneous edge computing network distributed computing architecture and method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887323B2 (en) * | 2017-06-19 | 2021-01-05 | International Business Machines Corporation | Detecting malicious beaconing communities using lockstep detection and co-occurrence graph |
US10326766B2 (en) * | 2017-07-13 | 2019-06-18 | Dell Products, Lp | Method and apparatus for optimizing mobile edge computing for nomadic computing capabilities as a service |
US11315024B2 (en) * | 2018-06-25 | 2022-04-26 | Kyndryl, Inc. | Cognitive computing systems and services utilizing internet of things environment |
-
2023
- 2023-08-28 CN CN202311085147.0A patent/CN116827686B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021227241A1 (en) * | 2020-05-13 | 2021-11-18 | 西南石油大学 | Statistical analysis method for key leakage prevention of encrypted data aggregation in smart power grid |
CN112235113A (en) * | 2020-07-15 | 2021-01-15 | 秦绪祥 | Wisdom community endowment service platform |
CN111915453A (en) * | 2020-07-15 | 2020-11-10 | 刘其奎 | Intelligent community electronic commerce service platform |
CN112565241A (en) * | 2020-12-01 | 2021-03-26 | 杭州思源信息技术股份有限公司 | Community Internet of things perception system based on smart skynet and construction method |
CN112532746A (en) * | 2020-12-21 | 2021-03-19 | 北京邮电大学 | Cloud edge cooperative sensing method and system |
WO2022240906A1 (en) * | 2021-05-11 | 2022-11-17 | Strong Force Vcn Portfolio 2019, Llc | Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks |
CN113037783A (en) * | 2021-05-24 | 2021-06-25 | 中南大学 | Abnormal behavior detection method and system |
CN113704051A (en) * | 2021-07-20 | 2021-11-26 | 深圳市昊源诺信科技有限公司 | Server fault detection system and implementation method |
CN114553463A (en) * | 2021-12-30 | 2022-05-27 | 中国电子科技集团公司电子科学研究院 | Internet of things perception data management system and management method based on block chain |
CN114422273A (en) * | 2022-03-29 | 2022-04-29 | 四川高速公路建设开发集团有限公司 | Sensitive decision data safety sharing method in intelligent construction engineering information system |
CN114465824A (en) * | 2022-04-11 | 2022-05-10 | 四川高速公路建设开发集团有限公司 | Authorized access control method for intelligent construction engineering information system platform |
CN115148379A (en) * | 2022-06-06 | 2022-10-04 | 电子科技大学 | System and method for realizing intelligent health monitoring of solitary old people by utilizing edge calculation |
CN115333857A (en) * | 2022-10-11 | 2022-11-11 | 晨越建设项目管理集团股份有限公司 | Detection method for preventing data from being tampered based on smart city system cloud platform |
CN115967528A (en) * | 2022-11-08 | 2023-04-14 | 中电智元数据科技有限公司 | Distributed data sharing switching network anomaly monitoring and early warning method and system |
CN116204925A (en) * | 2023-03-13 | 2023-06-02 | 无锡学院 | Strong-robustness smart city edge calculation data security system and method |
CN116032495A (en) * | 2023-03-28 | 2023-04-28 | 四川高速公路建设开发集团有限公司 | Vehicle-cloud cooperative safety transmission data anomaly detection method based on intelligent traffic system |
CN116527665A (en) * | 2023-04-18 | 2023-08-01 | 四川边缘算力科技有限公司 | Yun Bianduan heterogeneous edge computing network distributed computing architecture and method |
Non-Patent Citations (3)
Title |
---|
Optimize cloud computations using edge computing;Sachchidanand Singh;《2017 International Conference on Big Data, IoT and Data Science (BID)》;全文 * |
基于云―边协同的智能工厂工业物联网架构与自治生产管控技术;丁凯;陈东燊;王岩;朱学凯;张富强;张超;;计算机集成制造系统(12);全文 * |
基于边云协同的空压机状态数据监测与异常预测系统研究;贾凯旋;《中国优秀硕士学位论文全文数据库(信息科技辑)》;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN116827686A (en) | 2023-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110601853B (en) | Block chain private key generation method and equipment | |
Awan et al. | Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things | |
CN109474610B (en) | Anonymous certifiable key exchange method based on smart grid | |
CN110958110B (en) | Block chain private data management method and system based on zero knowledge proof | |
Qin et al. | A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing | |
CN106936566B (en) | Outsourcing document signing method based on block chain technology | |
CN108964919A (en) | The lightweight anonymous authentication method with secret protection based on car networking | |
CN102946603B (en) | Based on the unified identity authentication method of social characteristic in power cloud system | |
CN116827686B (en) | Cloud-edge collaboration-based intelligent community system data anomaly detection method | |
CN109889497A (en) | A kind of data integrity verification method for going to trust | |
CN107124272A (en) | The lattice cloud storage data safety auditing method for supporting agent data to upload | |
CN104660605A (en) | Multi-factor identity authentication method and system | |
CN110930153B (en) | Block chain privacy data management method and system based on hidden third party account | |
CN104639311A (en) | Combining method and system for protecting power utilization privacy and integrity in smart power grid | |
CN105227317A (en) | A kind of cloud data integrity detection method and system supporting authenticator privacy | |
CN110097370B (en) | Offline payment method, device, server and medium | |
CN114095162A (en) | Connection verification method and device for certificateless power consumption information acquisition system | |
CN112398861A (en) | Encryption system and method for sensitive data in web configuration system | |
Salami et al. | SMAK-IOV: secure mutual authentication scheme and key exchange protocol in fog based IoV | |
CN116015751A (en) | Intelligent power grid bidirectional authentication system and method | |
Zhang et al. | RRV-BC: Random Reputation Voting Mechanism and Blockchain Assisted Access Authentication for Industrial Internet of Things | |
CN114172742A (en) | Layered authentication method for power internet of things terminal equipment based on node map and edge authentication | |
CN109510830B (en) | Authentication method, device, medium and equipment for intelligent electric meter | |
CN113992389A (en) | SGX data integrity auditing method based on dynamic frequency table | |
CN113852628A (en) | Decentralized single sign-on method, decentralized single sign-on device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |