Application of edge computing technology in smart grid data security

被引:0
作者
Cheng, Zhuo [1 ]
Li, Jiangxin [1 ]
Zhang, Jianjun [1 ]
Wang, Chen [1 ]
Wang, Hui [1 ]
Wu, Juyin [1 ]
机构
[1] Aostar Information Technologies Co., Ltd., Sichuan, Chengdu
来源
Measurement: Sensors | 2025年 / 37卷
关键词
Batch verification; Edge computing; Forward safety; No certificate proxy blind signature encryption; Smart grid;
D O I
10.1016/j.measen.2024.101412
中图分类号
TM7 [输配电工程、电力网及电力系统];
学科分类号
080802 ;
摘要
In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. Combining with edge computing technology, the author proposes a proxy blind signcryption scheme based on certificateless without bilinear mapping. By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. The experimental results indicate that: The total running time required for executing proxy authorization and verification, proxy key generation, signature and decryption algorithms in this scheme is 5.617 ms, with a ciphertext length of 80 Bytes. Compared with other existing literature, the maximum reduction is 85.6 % and 86 %, respectively. Conclusion: This scheme is more suitable for protecting data security and privacy in the data transmission process of smart grids due to its lower running time and communication cost. © 2024
引用
收藏
相关论文
共 27 条
[1]  
Li X., Chen T., Cheng Q., Ma S., Ma J., Smart applications in edge computing: overview on authentication and data security, IEEE Internet Things J., 8, 6, pp. 4063-4080, (2020)
[2]  
Mehmood M.Y., Oad A., Abrar M., Munir H.M., Hasan S.F., Muqeet H.A.U., Golilarz N.A., Edge computing for IoT-enabled smart grid, Secur. Commun. Network., 2021, pp. 1-16, (2021)
[3]  
Chaudhry S.A., Alhakami H., Baz A., Al-Turjman F., Securing demand response management: a certificate-based access control in smart grid edge computing infrastructure, IEEE Access, 8, pp. 101235-101243, (2020)
[4]  
Hou W., Jiang Y., Lei W., Xu A., Wen H., Chen S., A P2P network based edge computing smart grid model for efficient resources coordination, Peer-to-Peer Networking and Applications, 13, pp. 1026-1037, (2020)
[5]  
Su Z., Wang Y., Luan T.H., Zhang N., Li F., Chen T., Cao H., Secure and efficient federated learning for smart grid with edge-cloud collaboration, IEEE Trans. Ind. Inf., 18, 2, pp. 1333-1344, (2021)
[6]  
Yang W., Guan Z., Wu L., Du X., Guizani M., Secure data access control with fair accountability in smart grid data sharing: an edge blockchain approach, IEEE Internet Things J., 8, 10, pp. 8632-8643, (2020)
[7]  
Lu W., Ren Z., Xu J., Chen S., Edge blockchain assisted lightweight privacy-preserving data aggregation for smart grid, IEEE Transactions on Network and Service Management, 18, 2, pp. 1246-1259, (2021)
[8]  
Merad-Boudia O.R., Senouci S.M., An efficient and secure multidimensional data aggregation for fog-computing-based smart grid, IEEE Internet Things J., 8, 8, pp. 6143-6153, (2020)
[9]  
Dileep G.J.R.E., A survey on smart grid technologies and applications, Renew. Energy, 146, pp. 2589-2625, (2020)
[10]  
Butt O.M., Zulqarnain M., Butt T.M., Recent advancement in smart grid technology: future prospects in the electrical power network, Ain Shams Eng. J., 12, 1, pp. 687-695, (2021)