CN118095442B - Power data tracing method, power system, power equipment and storage medium - Google Patents

Power data tracing method, power system, power equipment and storage medium Download PDF

Info

Publication number
CN118095442B
CN118095442B CN202410462178.1A CN202410462178A CN118095442B CN 118095442 B CN118095442 B CN 118095442B CN 202410462178 A CN202410462178 A CN 202410462178A CN 118095442 B CN118095442 B CN 118095442B
Authority
CN
China
Prior art keywords
data
user
model
tracing
power data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410462178.1A
Other languages
Chinese (zh)
Other versions
CN118095442A (en
Inventor
张丽敏
李海峰
魏晋蒙
张豪
张中兴
张艳菲
王大豪
崔高智
王丹丹
郭锫骐
赫连培育
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd
Original Assignee
Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd filed Critical Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd
Priority to CN202410462178.1A priority Critical patent/CN118095442B/en
Publication of CN118095442A publication Critical patent/CN118095442A/en
Application granted granted Critical
Publication of CN118095442B publication Critical patent/CN118095442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a power data tracing method and a power system, wherein the method comprises the following steps: the operation terminal sends the tracing request to the cloud server; the cloud server sends the first power data middle station interaction address to the operation terminal according to the tracing request; the PROV-HE model determines a secondary power data middle station interaction address according to the traceability request and sends the secondary power data middle station interaction address to the operation terminal; the operation terminal accesses the middle station of the electric power data according to the interaction address of the middle station of the first electric power data; the power data center station determines the position of the tracing data in the cloud storage according to the interaction address of the second power data center station and then requests the cloud storage to acquire the tracing data; after the cloud storage searches the traceability data according to the storage position, the traceability data is sent to the PROV-HE model; the PROV-HE model processes the traceability data and outputs a corresponding traceability map to the operation terminal; the application has good tracing effect and higher safety and privacy, and is suitable for the technical field of power systems.

Description

Power data tracing method, power system, power equipment and storage medium
Technical Field
The application relates to the technical field of power systems, in particular to a power data tracing method and a power system with the data tracing function.
Background
The data tracing technology is a technology for tracing the source, the change and the quality of data and improving the credibility and the reliability of the data. In the power system of China, the huge volume and redundancy degree of the power data are guaranteed to have the important effect and influence on the whole power system in the reliability and the reliability of the power data, and the power data are required to be tracked and traced frequently in each link of the operation of the power system. In the present stage, the data tracing technology of China is still in an exploration stage, and researches and applications aiming at special objects such as power data are very few, and at present, few perfect and effective schemes exist.
At present, the research on the data tracing technology in China is mainly focused on two aspects of digital watermarking and data blood-margin tracing. The digital watermarking technology is to embed the data watermark into the data content through information processing on the premise of not affecting the reading and application of the data, so as to realize the marking and tracking of the data; the data blood margin tracking technology is to record the data circulation process in real time by establishing a data blood margin map, track and analyze the reasons of data security events, and reduce the security risk. Although some enterprises in China start to try to trace data by utilizing technologies such as digital watermarking and data blood-edge tracking (for example, the alicloud provides DataWorks data protection umbrella services, user access behaviors are recorded by embedding watermark information in a database, and responsible persons most likely to leak data are positioned according to the probability of possibility), the technologies have problems such as watermark is easy to identify, modify or crack, blood-edge map is difficult to construct and maintain, and the like.
The main problems of the data tracing technology research of the power data center oriented to the power system in China are as follows: 1) Trace information of how to effectively represent and store data, including sources, types, modalities, processes, dependencies, etc. of the data; 2) How to efficiently query and analyze the traceability information of the data, including supporting multiple query languages, providing quick response, implementing complex reasoning, etc.; 3) How to ensure the security and privacy of the traceability information of the multi-source data includes preventing the traceability information from being tampered, revealed or abused, etc.
Therefore, how to make the power system have the power data tracing function with better tracing effect and higher security and privacy is a technical problem to be solved urgently.
Disclosure of Invention
In order to solve one of the technical defects, the application provides a power data tracing method, a power system, power equipment and a storage medium.
According to a first aspect of the present application, there is provided a power data tracing method, comprising:
The operation terminal carries out homomorphic encryption processing on a tracing request aiming at certain power data, which is proposed by a user, and then sends the encrypted tracing request of the user to the cloud server; the PROV-HE model sends user verification information to a cloud server; the basic model of the PROV-HE model is a PROV model, and the training data set of the PROV-HE model mainly comprises electric power data; the cloud server verifies the identity and authority of the user according to the user verification information, and then sends the first power data center interaction address to the operation terminal according to the user tracing request; the PROV-HE model determines a second power data middle station interaction address according to the user tracing request and then sends the second power data middle station interaction address to the operation terminal; the operation terminal accesses the middle station of the power data according to the interaction address of the middle station of the first power data; the electric power data center station determines the storage position of the traceability data in the cloud storage according to the second electric power data center station interaction address, and then obtains the traceability data of the storage position from a cloud storage request through a cloud server; after the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model; and the PROV-HE model processes the traceability data to form a corresponding traceability map, and finally the traceability map is output to an operation terminal to be provided for a user.
Preferably, after verifying the identity and authority of the user according to the user verification information, the cloud server sends the interaction address of the first power data center to the operation terminal according to the user tracing request, and specifically includes: after verifying the identity and authority of the user according to the user verification information, the cloud server determines the data tracing purpose of the user according to the user tracing request, then carries out homomorphic encryption processing on the user tracing request again to obtain a new encrypted user tracing request, and finally sends the new encrypted user tracing request and the first power data middle interaction address to the operation terminal;
After the PROV-HE model determines the interaction address of the middle station of the second power data according to the user tracing request, the PROV-HE model sends the interaction address of the middle station of the second power data to the operation terminal, and the PROV-HE model specifically comprises the following steps: the cloud server sends a new encrypted user tracing request and a first power data middle interaction address to the operation terminal, and simultaneously sends the new encrypted user tracing request to the PROV-HE model, and the PROV-HE model determines a second power data middle interaction address according to the new encrypted user tracing request and then sends the new encrypted user tracing request and the second power data middle interaction address to the operation terminal;
The operation terminal accesses the middle power data platform according to the interaction address of the middle power data platform, and specifically comprises the following steps: the operation terminal sends an access request to the electric power data center station according to the first electric power data center station interaction address, the electric power data center station verifies the identity and authority of the user, access is allowed after verification is passed, and otherwise, access is refused;
After the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model, and the method specifically comprises the following steps: after receiving a traceability data acquisition request forwarded by a cloud server, the cloud storage firstly verifies the identity of a platform in the power data, and after the verification is passed, the cloud storage searches corresponding traceability data according to the storage position of the traceability data and then sends the traceability data to a PROV-HE model.
Preferably, the operation terminal performs homomorphic encryption processing on a tracing request for a certain power data, and then sends the encrypted tracing request of the user to a cloud server, which specifically includes: the method comprises the steps that an operation terminal obtains a keyword W i searched by a user, and a search operation of the keyword W i is used for providing a tracing request aiming at certain electric power data; the operation terminal homomorphic encrypts the keyword W i by using a search private key to generate an encrypted keyword ciphertext T w, and sends the keyword ciphertext T w, a user public key PK s and user signature information Sign (PK s) to the cloud server together;
the PROV-HE model sends user verification information to a cloud server, and specifically comprises the following steps: the PROV-HE model sends a data interaction request Query (w) and model signature information Sign (PK pro) to a cloud server.
Preferably, after verifying the identity and authority of the user according to the user verification information, the cloud server sends the interaction address of the first power data center to the operation terminal according to the user tracing request, and specifically includes: the cloud server compares the user signature information Sign (PK s) with the model signature information Sign (PK pro) to verify whether the user has use permission on the PROV-HE model; after verification is passed, the cloud server compares the verification keyword C wi with the keyword ciphertext T w searched by the user to determine what type of interaction request is of the user; after determining that the interaction request of the user is a data tracing request, the cloud server generates a retrieval vector EV m and a data storage abstract Abs inf according to a keyword ciphertext T w, and then homomorphic encryption calculation is carried out on the keyword ciphertext T w and the retrieval vector EV m to obtain a new keyword ciphertext C m; and finally, the cloud server sends first ciphertext information containing the new keyword ciphertext C m and the data storage abstract Abs inf and the first power data center interaction address to the operation terminal.
Preferably, after the pro-HE model determines the interaction address of the second power data center according to the user tracing request, the pro-HE model sends the interaction address of the second power data center to the operation terminal, which specifically includes: the cloud server adopts homomorphic encryption means to carry out key conversion on a user public key PK s and model signature information Sign (PK pro) of a PROV-HE model to form new key information; the cloud server sends a new keyword ciphertext C m, a data storage abstract Abs inf and a first power data center interaction address to the operation terminal, and returns a new keyword ciphertext C m, a data storage abstract Abs inf and new key information to the PROV-HE model; and after determining the interaction address of the second power data center according to the new keyword ciphertext C m, the PROV-HE model sends second ciphertext information comprising the new keyword ciphertext C m and the data storage abstract Abs inf and the interaction address of the second power data center to the operation terminal.
Preferably, the operation terminal accesses the power data center according to the first power data center interaction address, the power data center determines a storage position of the tracing data in the cloud storage according to the second power data center interaction address, and then obtains the tracing data of the storage position from the cloud storage request through the cloud server, and the method specifically includes: matching and matching the first ciphertext information sent by the cloud server with the second ciphertext information sent by the PROV-HE model by a user to judge the authenticity and the relativity of the interaction address of the first power data center and the interaction address of the second power data center; after the matching is successful, the operation terminal sends an interaction request to the power data center according to the first power data center interaction address, wherein the access request comprises user signature information Sign (PK s) and the second power data center interaction address; the power data center station verifies the identity and authority of the user according to the user signature information Sign (PK s); after verification is passed, the electric power data center determines a storage position Loc m of the traceability data in the cloud storage according to the second electric power data center interaction address, sends the storage position Loc m and the data center signature information Sign (PK o) to the cloud server, and requests the cloud storage to acquire the traceability data of the storage position Loc m through the cloud server.
Preferably, after the cloud storage searches the corresponding tracing data according to the storage location, the tracing data is sent to a pro-HE model, which specifically includes: after the cloud storage receives a traceable data acquisition request of the power data center forwarded by the cloud server, verifying the identity of the power data center according to the center signature information Sign (PK o); after verification is passed, the cloud storage searches corresponding traceability data m according to a storage position Loc m, and then sends the traceability data m to a PROV-HE model;
The PROV-HE model processes the traceability data to form a corresponding traceability map, and finally outputs the traceability map to an operation terminal to be provided for a user, and the method specifically comprises the following steps: after receiving the tracing data m, the PROV-HE model firstly encrypts the tracing data m by using a public key, and then outputs encrypted ciphertext data En SM2 (m) and model signature information Sign (PK pro) to an operation terminal; and the operation terminal decrypts the ciphertext data En SM2 (m) after receiving the ciphertext data to form a tracing map corresponding to the tracing data m, and provides the tracing map for the user.
According to a second aspect of the present application, there is provided an electric power system comprising:
And (3) an operation terminal: the method comprises the steps of carrying out homomorphic encryption processing on a tracing request aiming at certain power data, which is proposed by a user, then sending the encrypted tracing request of the user to a cloud server, sending an access request to a power data center according to a first power data center interaction address, and displaying a tracing map output by a PROV-HE model to the user;
PROV-HE model: the cloud server is used for sending user verification information to the cloud server so that the cloud server can verify the identity and authority of the user, determining a second power data middle interaction address according to the new encrypted user tracing request, sending the new encrypted user tracing request and the second power data middle interaction address to the operation terminal, processing tracing data sent by cloud storage to form a corresponding tracing map, and finally outputting the tracing map to the operation terminal; the basic model of the PROV-HE model is a PROV model, and the training data set of the PROV-HE model mainly comprises electric power data;
Cloud server: the method comprises the steps of receiving a user tracing request sent by an operation terminal and user verification information sent by a PROV-HE model, verifying the identity and authority of a user according to the user verification information, determining the data tracing purpose of the user according to the user tracing request, then conducting homomorphic encryption processing on the user tracing request again to obtain a new encrypted user tracing request, finally sending the new encrypted user tracing request and a first power data middle-stage interaction address to the operation terminal, and simultaneously sending the new encrypted user tracing request to the PROV-HE model;
Power data center: the cloud server is used for verifying the identity and the authority of the user after receiving the access request of the operation terminal, determining the storage position of the traceability data in the cloud storage according to the platform interaction address in the second power data after the authentication is passed, and then requesting the cloud storage to acquire the traceability data of the storage position;
Cloud storage: and the power data center platform is used for verifying the identity of the power data center platform after receiving the traceability data acquisition request forwarded by the cloud server, and sending the traceability data to the PROV-HE model after searching the corresponding traceability data according to the storage position of the traceability data after the verification is passed.
According to a third aspect of the present application, there is provided an electrical device comprising:
a memory;
A processor; and
A computer program;
Wherein the computer program is stored in the memory and configured to be executed by the processor to implement the power data trace-out method as described previously.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium having a computer program stored thereon; the computer program is executed by a processor to implement the power data tracing method as described above.
According to the power data tracing method provided by the application, a PROV model is adopted as a basic tracing body of power data, a large amount of power business data is used as a training example for training, and a PROV-HE tracing model for targeted processing of business data with large volume, diversity and high complexity in a power system is finally formed, and in the whole tracing process, an operation terminal, a cloud server, the PROV-HE model, a power data center and cloud storage complement each other, and mutually cooperate to operate, so that a tracing flow is efficiently, safely and accurately completed; the data tracing method comprehensively considers the concrete details of the two fields of the database and the workflow, forms a complete system from the aspects of model, storage, application and the like, realizes accurate and efficient tracing of the electric power data center in the electric power system, analyzes the characteristics of electric power service data, determines the semantics, functions and quality attributes of data service, effectively solves the problem of difficult tracing caused by the isomerism, the dynamics and the uncertainty of the electric power data center, and solves the problem that the reliability and the reliability of the data are reduced and the decision value of the data are influenced because the electric power service data is difficult to trace the source, the change and the quality of the data in the data transferring and using processes; compared with the traditional power system comprising a power supply system and a power distribution system, the power system has the data tracing function with good effect and high safety and privacy; in addition, in the whole tracing process, homomorphic encryption, cloud storage encryption, SM2 encryption, blockchain encryption and other means are adopted at different stages, so that the privacy of data and the safety in the transmission process are effectively and highly protected.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
Fig. 1 is a schematic structural diagram of a pro model according to an embodiment of the present application;
Fig. 2 is a schematic structural diagram of an electric power system according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of exemplary embodiments of the present application is provided in conjunction with the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present application and not exhaustive of all embodiments. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
Aiming at some problems existing in the prior art, the embodiment of the application provides a power data tracing method, which can comprise the following steps:
The operation terminal carries out homomorphic encryption processing on a tracing request aiming at certain power data, which is proposed by a user, and then sends the encrypted tracing request of the user to the cloud server;
The PROV-HE model sends user verification information to a cloud server; the basic model of the PROV-HE model is a PROV model, and the training data set of the PROV-HE model mainly comprises electric power data;
The cloud server verifies the identity and authority of the user according to the user verification information, and then sends the first power data center interaction address to the operation terminal according to the user tracing request;
The PROV-HE model determines a second power data middle station interaction address according to the user tracing request and then sends the second power data middle station interaction address to the operation terminal;
The operation terminal accesses the middle station of the power data according to the interaction address of the middle station of the first power data;
the electric power data center station determines the storage position of the traceability data in the cloud storage according to the second electric power data center station interaction address, and then obtains the traceability data of the storage position from a cloud storage request through a cloud server;
after the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model;
And the PROV-HE model processes the traceability data to form a corresponding traceability map, and finally the traceability map is output to an operation terminal to be provided for a user.
The PROV model is a data traceability model, provides classes, attributes and constraints from the viewpoint of data modeling, and models traceability information by using semantic web technologies (such as OWL2 ontology, XML, dublin Core and the like). As shown in fig. 1, the pro model generally comprises a plurality of components, wherein: PROV-DM is the core concept of the model, defines general vocabulary and concept for describing the tracing, and is applied to a set of constraints defined by PROV-CONSTRAINTS; the PROV-O component is used to define a mapping of the model to RDF; the PROV-XML component is used for defining an XML framework facing the model; the PROV-DC component is used to define a mapping between PROV-O and Dublin Core; the PROV-SEM component is used for providing a famous specification of the first-order logic aspect of the model; the PROV-AQ component can utilize a Web-based mechanism to locate and retrieve traceability information; the PROV-Dictionary component is used for expressing the structure of Dictionary data; the PROV-Links component can extend PROV through a group of traceability description so that the traceability information has a link relation; the PROV-N component is used to provide human-readable trace-source model annotations.
In particular implementations, the formation of the PROV-HE model may include the steps of:
first, a metadata model of power business knowledge is defined, including elements such as data entities, data attributes, data operations, data relationships, and corresponding semantic annotations and constraints.
And secondly, constructing a PROV data tracing body, namely a formal language describing data tracing concepts and relations, according to a metadata model of the power business knowledge, wherein the formal language is used for representing and reasoning data tracing information.
And then, according to the source and the use scene of the power business knowledge, acquiring multi-source heterogeneous data, including real-time monitoring data, numerical weather forecast, satellite image data and the like of a power system, and converting the multi-source heterogeneous data into metadata examples conforming to PROV data traceability ontology.
And then, constructing a multi-source tracing map of power business knowledge, namely a graphical data tracing representation mode, by utilizing the PROV data tracing ontology and the metadata instance, wherein the graphical data tracing representation mode is used for displaying the source, the change and the use process of the data, so as to form the PROV-HE model in the embodiment of the application.
In actual use, according to the multi-source tracing map of the power business knowledge, multi-source tracing inquiry and analysis are executed, namely, according to the requirements and targets of users, relevant data tracing information is retrieved and inferred from the multi-source tracing map so as to answer the problems of the users or support the decisions of the users.
Further, after verifying the identity and authority of the user according to the user verification information, the cloud server sends the first power data center interaction address to the operation terminal according to the user tracing request, which specifically includes:
And after verifying the identity and authority of the user according to the user verification information, the cloud server determines the data tracing purpose of the user according to the user tracing request, then carries out homomorphic encryption processing on the user tracing request again to obtain a new encrypted user tracing request, and finally sends the new encrypted user tracing request and the first power data middle interaction address to the operation terminal.
After the PROV-HE model determines the interaction address of the middle station of the second electric power data according to the user tracing request, the PROV-HE model sends the interaction address of the middle station of the second electric power data to the operation terminal, and the PROV-HE model specifically comprises the following steps:
The cloud server sends the new encrypted user tracing request and the first power data middle interaction address to the operation terminal, and simultaneously sends the new encrypted user tracing request to the PROV-HE model, and the PROV-HE model determines the second power data middle interaction address according to the new encrypted user tracing request and then sends the new encrypted user tracing request and the second power data middle interaction address to the operation terminal.
The operation terminal accesses the middle station of the power data according to the interaction address of the middle station of the first power data, and the operation terminal specifically comprises:
And the operation terminal sends an access request to the electric power data center station according to the first electric power data center station interaction address, the electric power data center station verifies the identity and the authority of the user, and access is allowed after the verification is passed, or else the access is refused.
After the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model, and the method specifically comprises the following steps:
After receiving a traceability data acquisition request forwarded by a cloud server, the cloud storage firstly verifies the identity of a platform in the power data, and after the verification is passed, the cloud storage searches corresponding traceability data according to the storage position of the traceability data and then sends the traceability data to a PROV-HE model.
Furthermore, the operation terminal performs homomorphic encryption processing on a tracing request for a certain electric power data, and then sends the encrypted tracing request to a cloud server, which specifically includes:
The method comprises the steps that an operation terminal obtains a keyword W i searched by a user, and a search operation of the keyword W i is used for providing a tracing request aiming at certain electric power data;
The operation terminal homomorphic encrypts the keyword W i by using the search private key, generates an encrypted keyword ciphertext T w, and sends the keyword ciphertext T w, the user public key PK s and the user signature information Sign (PK s) to the cloud server.
The PROV-HE model sends user verification information to a cloud server, and specifically includes:
The PROV-HE model sends a data interaction request Query (w) and model signature information Sign (PK pro) to a cloud server.
After verifying the identity and authority of the user according to the user verification information, the cloud server sends the first power data center interaction address to the operation terminal according to the user tracing request, and the method specifically comprises the following steps:
The cloud server compares the user signature information Sign (PK s) with the model signature information Sign (PK pro) to verify whether the user has use permission on the PROV-HE model;
After verification is passed, the cloud server compares the verification keyword C wi with the keyword ciphertext T w searched by the user to determine what type of interaction request is of the user;
After determining that the interaction request of the user is a data tracing request, the cloud server generates a retrieval vector EV m and a data storage abstract Abs inf according to a keyword ciphertext T w, and then homomorphic encryption calculation is carried out on the keyword ciphertext T w and the retrieval vector EV m to obtain a new keyword ciphertext C m;
And finally, the cloud server sends first ciphertext information containing the new keyword ciphertext C m and the data storage abstract Abs inf and the first power data center interaction address to the operation terminal.
After the PROV-HE model determines the interaction address of the middle station of the second electric power data according to the user tracing request, the PROV-HE model sends the interaction address of the middle station of the second electric power data to the operation terminal, and the PROV-HE model specifically comprises the following steps:
the cloud server adopts homomorphic encryption means to carry out key conversion on a user public key PK s and model signature information Sign (PK pro) of a PROV-HE model to form new key information;
The cloud server sends a new keyword ciphertext C m, a data storage abstract Abs inf and a first power data center interaction address to the operation terminal, and returns a new keyword ciphertext C m, a data storage abstract Abs inf and new key information to the PROV-HE model;
And after determining the interaction address of the second power data center according to the new keyword ciphertext C m, the PROV-HE model sends second ciphertext information comprising the new keyword ciphertext C m and the data storage abstract Abs inf and the interaction address of the second power data center to the operation terminal.
The operation terminal accesses the electric power data center according to the first electric power data center interaction address, the electric power data center determines the storage position of the traceable data in the cloud storage according to the second electric power data center interaction address, and then obtains the traceable data of the storage position from the cloud storage request through the cloud server, and the method specifically comprises the following steps:
Matching and matching the first ciphertext information sent by the cloud server with the second ciphertext information sent by the PROV-HE model by a user to judge the authenticity and the relativity of the interaction address of the first power data center and the interaction address of the second power data center;
After the matching is successful, the operation terminal sends an interaction request to the power data center according to the first power data center interaction address, wherein the access request comprises user signature information Sign (PK s) and the second power data center interaction address;
The power data center station verifies the identity and authority of the user according to the user signature information Sign (PK s);
After verification is passed, the electric power data center determines a storage position Loc m of the traceability data in the cloud storage according to the second electric power data center interaction address, sends the storage position Loc m and the data center signature information Sign (PK o) to the cloud server, and requests the cloud storage to acquire the traceability data of the storage position Loc m through the cloud server.
After the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model, and the method specifically comprises the following steps:
After the cloud storage receives a traceable data acquisition request of the power data center forwarded by the cloud server, verifying the identity of the power data center according to the center signature information Sign (PK o);
after verification is passed, the cloud storage searches corresponding traceability data m according to a storage position Loc m, and then sends the traceability data m to a PROV-HE model;
The PROV-HE model processes the traceability data to form a corresponding traceability map, and finally outputs the traceability map to an operation terminal to be provided for a user, and the method specifically comprises the following steps:
After receiving the tracing data m, the PROV-HE model firstly encrypts the tracing data m by using a public key, and then outputs encrypted ciphertext data En SM2 (m) and model signature information Sign (PK pro) to an operation terminal;
And the operation terminal decrypts the ciphertext data En SM2 (m) after receiving the ciphertext data to form a tracing map corresponding to the tracing data m, and provides the tracing map for the user.
Further, after receiving the tracing spectrum through the operation terminal, the user firstly extracts the artificial abstract of the tracing spectrum, compares the artificial abstract with the data storage abstract Abs inf displayed by the operation terminal, confirms the identity of the sender of the tracing spectrum according to the model signature information Sign (PK pro) displayed by the operation terminal, and finally confirms whether the tracing spectrum is tampered according to the comparison result and the confirmation result, so that the tracing process is ended.
According to the power data tracing method provided by the embodiment of the application, a PROV model is adopted as a basic tracing body of power data, a large amount of power business data is used as a training example for training, and finally a PROV-HE tracing model for targeted processing of business data with large volume, diversity and high complexity in a power system is formed, and in the whole tracing process, an operation terminal, a cloud server, the PROV-HE model, a power data middle stage and cloud storage complement each other to operate in a mutually matched manner, so that a tracing flow is efficiently, safely and accurately completed; the data tracing method comprehensively considers the concrete details of the two fields of the database and the workflow, forms a complete system from the aspects of model, storage, application and the like, realizes accurate and efficient tracing of the electric power data center in the electric power system, analyzes the characteristics of electric power service data, determines the semantics, functions and quality attributes of data service, effectively solves the problem of difficult tracing caused by the isomerism, the dynamics and the uncertainty of the electric power data center, and solves the problem that the reliability and the reliability of the data are reduced and the decision value of the data are influenced because the electric power service data is difficult to trace the source, the change and the quality of the data in the data transferring and using processes; by adopting the tracing method in the embodiment of the application, compared with the traditional power system comprising a power supply system and a power distribution system, the power system in the embodiment of the application has the data tracing function with better effect and higher safety and privacy; in addition, in the whole tracing process, homomorphic encryption, cloud storage encryption, SM2 encryption, blockchain encryption and other means are adopted at different stages, so that the privacy of data and the safety in the transmission process are effectively and highly protected.
Correspondingly, the embodiment of the application also provides a power system, as shown in fig. 2, the power system may include:
And (3) an operation terminal: the method comprises the steps of carrying out homomorphic encryption processing on a tracing request aiming at certain power data, which is proposed by a user, then sending the encrypted tracing request of the user to a cloud server, sending an access request to a power data center according to a first power data center interaction address, and displaying a tracing map output by a PROV-HE model to the user;
PROV-HE model: the cloud server is used for sending user verification information to the cloud server so that the cloud server can verify the identity and authority of the user, determining a second power data middle interaction address according to the new encrypted user tracing request, sending the new encrypted user tracing request and the second power data middle interaction address to the operation terminal, processing tracing data sent by cloud storage to form a corresponding tracing map, and finally outputting the tracing map to the operation terminal; the basic model of the PROV-HE model is a PROV model, and the training data set of the PROV-HE model mainly comprises electric power data;
Cloud server: the method comprises the steps of receiving a user tracing request sent by an operation terminal and user verification information sent by a PROV-HE model, verifying the identity and authority of a user according to the user verification information, determining the data tracing purpose of the user according to the user tracing request, then conducting homomorphic encryption processing on the user tracing request again to obtain a new encrypted user tracing request, finally sending the new encrypted user tracing request and a first power data middle-stage interaction address to the operation terminal, and simultaneously sending the new encrypted user tracing request to the PROV-HE model;
Power data center: the cloud server is used for verifying the identity and the authority of the user after receiving the access request of the operation terminal, determining the storage position of the traceability data in the cloud storage according to the platform interaction address in the second power data after the authentication is passed, and then requesting the cloud storage to acquire the traceability data of the storage position;
Cloud storage: and the power data center platform is used for verifying the identity of the power data center platform after receiving the traceability data acquisition request forwarded by the cloud server, and sending the traceability data to the PROV-HE model after searching the corresponding traceability data according to the storage position of the traceability data after the verification is passed.
Correspondingly, the embodiment of the application also provides power equipment, which can comprise:
a memory;
A processor; and
A computer program;
Wherein the computer program is stored in the memory and configured to be executed by the processor to implement the power data trace-out method as described previously.
Correspondingly, the embodiment of the application also provides a computer readable storage medium, on which the computer program is stored; the computer program is executed by a processor to implement the power data tracing method as described above.
According to the application, the tracing and tracking of the power business data is realized by constructing the data tracing model and the framework taking the power business data requirement as the core, so that compared with a traditional power system comprising a power supply system and a power distribution system, the power system has the data tracing function with good effect and high safety and privacy, has important significance in application in a power data center, can improve the data quality and the reliability, and provides effective support for construction and application of the power data center.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the application can be realized by adopting various computer languages, such as C language, VHDL language, verilog language, object-oriented programming language Java, an transliteration script language JavaScript and the like.
Computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In the description of the present application, it should be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (4)

1. The power data tracing method is characterized by comprising the following steps of: comprising the following steps:
The operation terminal carries out homomorphic encryption processing on a tracing request aiming at certain power data, which is proposed by a user, and then sends the encrypted tracing request of the user to the cloud server;
The PROV-HE model sends user verification information to a cloud server; the basic model of the PROV-HE model is a PROV model, and the training data set of the PROV-HE model mainly comprises electric power data;
The cloud server verifies the identity and authority of the user according to the user verification information, and then sends the first power data center interaction address to the operation terminal according to the user tracing request;
The PROV-HE model determines a second power data middle station interaction address according to the user tracing request and then sends the second power data middle station interaction address to the operation terminal;
The operation terminal accesses the middle station of the power data according to the interaction address of the middle station of the first power data;
the electric power data center station determines the storage position of the traceability data in the cloud storage according to the second electric power data center station interaction address, and then obtains the traceability data of the storage position from a cloud storage request through a cloud server;
after the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model;
the PROV-HE model processes the traceability data to form a corresponding traceability map, and finally the traceability map is output to an operation terminal to be provided for a user;
The operation terminal performs homomorphic encryption processing on a tracing request for certain power data, which is provided by a user, and then sends the encrypted tracing request of the user to a cloud server, and the method specifically comprises the following steps:
The method comprises the steps that an operation terminal obtains a keyword W i searched by a user, and a search operation of the keyword W i is used for providing a tracing request aiming at certain electric power data;
The operation terminal homomorphic encrypts the keyword W i by using a search private key to generate an encrypted keyword ciphertext T w, and sends the keyword ciphertext T w, a user public key PK s and user signature information Sign (PK s) to the cloud server together;
the PROV-HE model sends user verification information to a cloud server, and specifically comprises the following steps:
The PROV-HE model sends a data interaction request Query (w) and model signature information Sign (PK pro) to a cloud server;
after verifying the identity and authority of the user according to the user verification information, the cloud server sends the first power data center interaction address to the operation terminal according to the user tracing request, and the cloud server specifically comprises the following steps:
The cloud server compares the user signature information Sign (PK s) with the model signature information Sign (PK pro) to verify whether the user has use permission on the PROV-HE model;
After verification is passed, the cloud server compares the verification keyword C wi with the keyword ciphertext T w searched by the user to determine what type of interaction request is of the user;
After determining that the interaction request of the user is a data tracing request, the cloud server generates a retrieval vector EV m and a data storage abstract Abs inf according to a keyword ciphertext T w, and then homomorphic encryption calculation is carried out on the keyword ciphertext T w and the retrieval vector EV m to obtain a new keyword ciphertext C m;
Finally, the cloud server sends first ciphertext information containing a new keyword ciphertext C m and a data storage abstract Abs inf and a first power data center interaction address to the operation terminal;
after the PROV-HE model determines the interaction address of the middle station of the second power data according to the user tracing request, the PROV-HE model sends the interaction address of the middle station of the second power data to the operation terminal, and the PROV-HE model specifically comprises the following steps:
the cloud server adopts homomorphic encryption means to carry out key conversion on a user public key PK s and model signature information Sign (PK pro) of a PROV-HE model to form new key information;
The cloud server sends a new keyword ciphertext C m, a data storage abstract Abs inf and a first power data center interaction address to the operation terminal, and returns a new keyword ciphertext C m, a data storage abstract Abs inf and new key information to the PROV-HE model;
After determining the interaction address of the second power data center station according to the new keyword ciphertext C m, the PROV-HE model sends second ciphertext information containing the new keyword ciphertext C m and the data storage abstract Abs inf to the operation terminal;
The operation terminal accesses the electric power data center according to the first electric power data center interaction address, the electric power data center determines the storage position of the traceable data in cloud storage according to the second electric power data center interaction address, and then obtains the traceable data of the storage position from a cloud storage request through a cloud server, and the operation terminal specifically comprises:
Matching and matching the first ciphertext information sent by the cloud server with the second ciphertext information sent by the PROV-HE model by a user to judge the authenticity and the relativity of the interaction address of the first power data center and the interaction address of the second power data center;
After the matching is successful, the operation terminal sends an interaction request to the power data center according to the first power data center interaction address, wherein the access request comprises user signature information Sign (PK s) and the second power data center interaction address;
The power data center station verifies the identity and authority of the user according to the user signature information Sign (PK s);
After verification is passed, determining a storage position Loc m of the traceability data in cloud storage according to the interaction address of the second electric power data center, sending the storage position Loc m and the data center signature information Sign (PK o) to a cloud server, and requesting the cloud storage to acquire the traceability data of the storage position Loc m through the cloud server;
after the cloud storage searches the corresponding traceability data according to the storage position, the traceability data is sent to a PROV-HE model, and the method specifically comprises the following steps:
After the cloud storage receives a traceable data acquisition request of the power data center forwarded by the cloud server, verifying the identity of the power data center according to the center signature information Sign (PK o);
after verification is passed, the cloud storage searches corresponding traceability data m according to a storage position Loc m, and then sends the traceability data m to a PROV-HE model;
The PROV-HE model processes the traceability data to form a corresponding traceability map, and finally outputs the traceability map to an operation terminal to be provided for a user, and the method specifically comprises the following steps:
After receiving the tracing data m, the PROV-HE model firstly encrypts the tracing data m by using a public key, and then outputs encrypted ciphertext data En SM2 (m) and model signature information Sign (PK pro) to an operation terminal;
And the operation terminal decrypts the ciphertext data En SM2 (m) after receiving the ciphertext data to form a tracing map corresponding to the tracing data m, and provides the tracing map for the user.
2. An electrical power system, characterized by: comprising the following steps:
And (3) an operation terminal: the method comprises the steps of carrying out homomorphic encryption processing on a tracing request aiming at certain power data, which is proposed by a user, then sending the encrypted tracing request of the user to a cloud server, sending an access request to a power data center according to a first power data center interaction address, and displaying a tracing map output by a PROV-HE model to the user; specifically, the operation terminal is used for: acquiring a keyword W i searched by a user, homomorphic encrypting the keyword W i by using a search private key, generating an encrypted keyword ciphertext T w, transmitting the keyword ciphertext T w, a user public key PK s and user signature information Sign (PK s) to a cloud server, successfully matching first ciphertext information transmitted by the cloud server with second ciphertext information transmitted by a PROV-HE model by the user, transmitting an interaction request to a power data center according to the first power data center interaction address, wherein the access request comprises the user signature information Sign (PK s) and the second power data center interaction address, decrypting after receiving ciphertext data En SM2 (m), forming a tracing map corresponding to tracing data m, and providing the tracing map to the user;
PROV-HE model: the cloud server is used for sending user verification information to the cloud server so that the cloud server can verify the identity and authority of the user, determining a second power data middle interaction address according to the new encrypted user tracing request, sending the new encrypted user tracing request and the second power data middle interaction address to the operation terminal, processing tracing data sent by cloud storage to form a corresponding tracing map, and finally outputting the tracing map to the operation terminal; the basic model of the PROV-HE model is a PROV model, and the training data set of the PROV-HE model mainly comprises electric power data; specifically, the PROV-HE model is used to: after a data interaction request Query (w) and model signature information Sign (PK pro) are sent to a cloud server, a second electric power data middle-stage interaction address is determined according to a new keyword ciphertext C m, second ciphertext information comprising the new keyword ciphertext C m, a data storage abstract Abs inf and the second electric power data middle-stage interaction address are sent to an operation terminal, after tracing data m is received, SM2 encryption is carried out on the tracing data m by using a public key, and encrypted ciphertext data En SM2 (m) and model signature information Sign (PK pro) are output to the operation terminal;
Cloud server: the method comprises the steps of receiving a user tracing request sent by an operation terminal and user verification information sent by a PROV-HE model, verifying the identity and authority of a user according to the user verification information, determining the data tracing purpose of the user according to the user tracing request, then conducting homomorphic encryption processing on the user tracing request again to obtain a new encrypted user tracing request, finally sending the new encrypted user tracing request and a first power data middle-stage interaction address to the operation terminal, and simultaneously sending the new encrypted user tracing request to the PROV-HE model; Specifically, the cloud server is used for: the user signature information Sign (PK s) is compared with the model signature information Sign (PK pro), whether the user has use authority to the PROV-HE model is verified, after the user passes the verification, the self verification keyword C wi is compared with the keyword ciphertext T w searched by the user, Determining what type of interaction request is the interaction request of the user, generating a search vector EV m and a data storage abstract Abs inf according to a keyword ciphertext T w after determining that the interaction request of the user is a data tracing request, then carrying out homomorphic encryption calculation on the keyword ciphertext T w and the search vector EV m, Obtaining a new keyword ciphertext C m, finally, sending first ciphertext information containing the new keyword ciphertext C m and a data storage abstract Abs inf and a first electric power data center interaction address to an operation terminal, adopting homomorphic encryption means, The user public key PK s and the model signature information Sign (PK pro) of the PROV-HE model are subjected to key conversion to form new key information, and the new keyword ciphertext C m, the data storage digest Abs inf and the first power data center interaction address are transmitted to the operation terminal, The new keyword ciphertext C m, the data storage abstract Abs inf and the new key information are returned to the PROV-HE model;
Power data center: the cloud server is used for verifying the identity and the authority of the user after receiving the access request of the operation terminal, determining the storage position of the traceability data in the cloud storage according to the platform interaction address in the second power data after the authentication is passed, and then requesting the cloud storage to acquire the traceability data of the storage position; specifically, the cloud server is used for: verifying the identity and authority of a user according to user signature information Sign (PK s), determining a storage position Loc m of the traceable data in cloud storage according to a platform interaction address in the second power data after verification is passed, sending the storage position Loc m and the platform signature information Sign (PK o) in the data to a cloud server, and requesting the traceable data of the storage position Loc m from the cloud storage through the cloud server;
Cloud storage: the method comprises the steps that after a traceability data acquisition request forwarded by a cloud server is received, the identity of a power data center is verified, after the verification is passed, corresponding traceability data are searched according to the storage position of the traceability data, and the traceability data are sent to a PROV-HE model; specifically, cloud storage is used to: after receiving a request for acquiring traceable data of a power data center forwarded by a cloud server, verifying the identity of the power data center according to center signature information Sign (PK o), after verification, searching corresponding traceable data m according to a storage position Loc m, and then sending the traceable data m to a PROV-HE model.
3. An electrical device, characterized by: comprising the following steps:
a memory;
A processor; and
A computer program;
Wherein the computer program is stored in the memory and configured to be executed by the processor to implement the power data tracing method as claimed in claim 1.
4. A computer-readable storage medium, characterized by: a computer program stored thereon; the computer program is executed by a processor to implement the power data tracing method as claimed in claim 1.
CN202410462178.1A 2024-04-17 2024-04-17 Power data tracing method, power system, power equipment and storage medium Active CN118095442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410462178.1A CN118095442B (en) 2024-04-17 2024-04-17 Power data tracing method, power system, power equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410462178.1A CN118095442B (en) 2024-04-17 2024-04-17 Power data tracing method, power system, power equipment and storage medium

Publications (2)

Publication Number Publication Date
CN118095442A CN118095442A (en) 2024-05-28
CN118095442B true CN118095442B (en) 2024-06-25

Family

ID=91153479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410462178.1A Active CN118095442B (en) 2024-04-17 2024-04-17 Power data tracing method, power system, power equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118095442B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115878826A (en) * 2022-12-02 2023-03-31 湖北大学 Multi-source remote sensing image metadata traceability information organization method and management system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116894047A (en) * 2023-07-27 2023-10-17 中国人民大学 Verifiable tracing method and device based on blockchain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115878826A (en) * 2022-12-02 2023-03-31 湖北大学 Multi-source remote sensing image metadata traceability information organization method and management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《结合区块链与可搜索加密的PROV溯源数据共享研究》;刘嘉平;《中国优秀硕士学位论文全文数据库信息科技辑》;20240415(第04期);I138-152 *

Also Published As

Publication number Publication date
CN118095442A (en) 2024-05-28

Similar Documents

Publication Publication Date Title
CN111506722B (en) Knowledge graph question-answering method, device and equipment based on deep learning technology
CN106503574B (en) Block chain safe storage method
CN116157790A (en) Document processing and response generation system
US20190347660A1 (en) System and method for protection of confidential information
CN105893456B (en) The isolated method and system of the computing basic facility of geography fence perception
CN113111369B (en) Data protection method and system in data annotation
CN111488995A (en) Method and apparatus for evaluating a joint training model
CN110324416A (en) Download path tracking, device, server, terminal and medium
CN107094075A (en) A kind of data block dynamic operation method based on convergent encryption
US20230109369A1 (en) First copyright holder authentication system using blockchain, and method therefor
CN115766071A (en) Data processing method and system based on artificial intelligence
Anand et al. Multimodal language modelling on knowledge graphs for deep video understanding
CN107171808A (en) A kind of verification method and device of electronic record authenticity
CN112202919B (en) Picture ciphertext storage and retrieval method and system under cloud storage environment
CN109918451A (en) Data base management method and system based on block chain
CN113612766A (en) Data management device, method, computer equipment and storage medium
CN113609866A (en) Text marking method, device, equipment and storage medium
CN118095442B (en) Power data tracing method, power system, power equipment and storage medium
CN111461191B (en) Method and device for determining image sample set for model training and electronic equipment
CN106713297B (en) Electronic data fixed platform based on cloud service
US20190347243A1 (en) System and method for collaborative sharing of information
CN112732789A (en) Searchable encryption method based on block chain and electronic equipment
JP2021140299A (en) Data matching system, information processing apparatus, and data matching method
CN117951745B (en) Database construction method, device, equipment, storage medium and program product
Sun et al. 5G message log credit management and verification system based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant