Application of edge computing technology in smart grid data security

被引:0
作者
Cheng, Zhuo [1 ]
Li, Jiangxin [1 ]
Zhang, Jianjun [1 ]
Wang, Chen [1 ]
Wang, Hui [1 ]
Wu, Juyin [1 ]
机构
[1] Aostar Information Technologies Co., Ltd., Sichuan, Chengdu
来源
Measurement: Sensors | 2025年 / 37卷
关键词
Batch verification; Edge computing; Forward safety; No certificate proxy blind signature encryption; Smart grid;
D O I
10.1016/j.measen.2024.101412
中图分类号
TM7 [输配电工程、电力网及电力系统];
学科分类号
080802 ;
摘要
In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. Combining with edge computing technology, the author proposes a proxy blind signcryption scheme based on certificateless without bilinear mapping. By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. The experimental results indicate that: The total running time required for executing proxy authorization and verification, proxy key generation, signature and decryption algorithms in this scheme is 5.617 ms, with a ciphertext length of 80 Bytes. Compared with other existing literature, the maximum reduction is 85.6 % and 86 %, respectively. Conclusion: This scheme is more suitable for protecting data security and privacy in the data transmission process of smart grids due to its lower running time and communication cost. © 2024
引用
收藏
相关论文
共 27 条
[11]  
Omitaomu O.A., Niu H., Artificial intelligence techniques in smart grid: a survey, Smart Cities, 4, 2, pp. 548-568, (2021)
[12]  
Syed D., Zainab A., Ghrayeb A., Refaat S.S., Abu-Rub H., Bouhali O., Smart grid big data analytics: survey of technologies, techniques, and applications, IEEE Access, 9, pp. 59564-59585, (2020)
[13]  
Rathor S.K., Saxena D., Energy management system for smart grid: an overview and key issues, Int. J. Energy Res., 44, 6, pp. 4067-4109, (2020)
[14]  
Massaoudi M., Abu-Rub H., Refaat S.S., Chihi I., Oueslati F.S., Deep learning in smart grid technology: a review of recent advancements and future prospects, IEEE Access, 9, pp. 54558-54578, (2021)
[15]  
Hussain S., Ullah I., Khattak H., Adnan M., Kumari S., Ullah S.S., Khattak S.J., A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for Internet of Things enabled smart grid, IEEE Access, 8, pp. 93230-93248, (2020)
[16]  
Ullah I., Amin N.U., Almogren A., Khan M.A., Uddin M.I., Hua Q., A lightweight and secured certificate-based proxy signcryption (CB-PS) scheme for E-prescription systems, IEEE Access, 8, pp. 199197-199212, (2020)
[17]  
Qiao Z., Zhou Y., Yang B., Zhang M., Wang T., a Z., Secure and efficient certificate-based proxy signature schemes for industrial internet of things, IEEE Syst. J., 16, 3, pp. 4719-4730, (2021)
[18]  
Waheed A., Umar A.I., Zareei M., Din N., Amin N.U., Iqbal J., Mohamed E.M., Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model, IEEE Access, 8, pp. 131188-131201, (2020)
[19]  
Hundera N.W., Mei Q., ong H., Geressu D.M., A secure and efficient identity-based proxy signcryption in cloud data sharing, KSII Transactions on Internet and Information Systems (TIIS), 14, 1, pp. 455-472, (2020)
[20]  
Ullah I., Alomari A., Abdullah A.M., Kumar N., Alsirhani A., Noor F., Khan M.A., Certificate-based signcryption scheme for securing wireless communication in industrial Internet of things, IEEE Access, 10, pp. 105182-105194, (2022)