文章摘要
刘雪艳,张强,李战明,等.面向智能电网通信系统的数据聚合和访问控制方法[J].电力系统自动化,2016,40(14):135-144. DOI: 10.7500/AEPS20151012002.
LIU Xueyan,ZHANG Qiang,LI Zhanming, et al.Data Aggregation and Access Control Method for Communication System of Smart Grid[J].Automation of Electric Power Systems,2016,40(14):135-144. DOI: 10.7500/AEPS20151012002.
面向智能电网通信系统的数据聚合和访问控制方法
Data Aggregation and Access Control Method for Communication System of Smart Grid
DOI:10.7500/AEPS20151012002
关键词: 智能电网  隐私  聚合  访问控制  基于属性的加密
KeyWords: smart grid  privacy  aggregation  access control  attribute-based encryption(ABE)
上网日期:2016-04-06
基金项目:国家自然科学基金资助项目(71263045)
作者单位E-mail
刘雪艳 兰州理工大学电气工程与信息工程学院, 甘肃省兰州市 730050
西北师范大学数学与统计学院, 甘肃省兰州市 730070 
 
张强 西北师范大学计算机科学与工程学院, 甘肃省兰州市 730070
国网甘肃省电力公司电力科学研究院, 甘肃省兰州市 730050 
qiangzh@126.com 
李战明 兰州理工大学电气工程与信息工程学院, 甘肃省兰州市 730050  
曹素珍 西北师范大学计算机科学与工程学院, 甘肃省兰州市 730070  
摘要:
      安全的通信架构是保证智能电网安全、稳定运行的基础,隐私保护的数据聚合是保证机密性、提高效率的有效途径。提出了一种面向智能电网通信系统的数据聚合和访问控制方法。在聚合阶段,采用隐私同态聚合多维数据,尤其提供签名批验证,使得对计算的个数与聚合的签名数无关,保持为常量3;在反馈阶段,采用基于属性的加密方法,实现了一对多的通信,同时也实现了对用户区分的访问控制,只有满足相应属性要求的用户才能获得操作命令。安全性分析证明,该方案具有隐私保护、资源认证和完整性验证的功能;通过与相关方案比较,所述方案在计算开销和用户的访问控制方面更有优势,更适合智能电网多维数据收集和访问控制。
Abstract:
      Secure communication architecture is an important basis for ensuring security and stability of the smart grid, while the data aggregation with privacy-preserving is an effective way to protect confidentiality and improve efficiency. A data aggregation and access control framework for a smart grid communication system is proposed. In the aggregation phase, privacy homomorphism is used to aggregate the multidimensional data. In particular, the signatures batch verification is provided, so that the number of pairing computations is independent of the number of aggregated signatures, which is maintained at constant 3. In the feedback phase, the attribute-based encryption(ABE)method is used to achieve one-to-many communication and user distinguished access control. Only users who meet the attributes set requirements can obtain the operation command. Security analysis shows that the proposed scheme has functions such as privacy-preserving, resources authentication and data integrity verification. A detailed comparison with the existing schemes shows that the proposed scheme has significant advantages of convenient computation and user access control. This work is supported by National Natural Science Foundation of China(No. 71263045).
查看全文(Free!)   查看/发表评论  下载PDF阅读器