A Blockchain-based Privacy-Preserving Matching Scheme for Power Data

被引:0
作者
Hou, Zufeng [1 ]
Qiu, Guanxin [1 ]
Zhao, Ruifeng [2 ]
Lin, Guihui [1 ]
Wang, Chao [1 ]
Zhang, Yong [1 ]
Pan, Kaiyan [3 ]
机构
[1] Guangdong Power Co Ltd, Zhuhai Power Supply Bur, Zhuhai, Peoples R China
[2] Guangdong Power Co Ltd, Elect Dispatch & Control Ctr, Guangzhou, Peoples R China
[3] Dongfang Elect Cooperat, Yantai, Peoples R China
来源
2024 7TH ASIA CONFERENCE ON ENERGY AND ELECTRICAL ENGINEERING, ACEEE 2024 | 2024年
关键词
trading; security; privacy-preserving; blockchain; CP-ABE; INTERNET;
D O I
10.1109/ACEEE62329.2024.10651704
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The current mode of power data trading heavily relies on web pages as the conventional mediation method. However, dishonest parties in trading may intentionally resell the dataset of the power grid company, or the grid company may be unable to determine what the buyer has done with the power data, thereby compromising the privacy of power users. Therefore, enhancing efficiency and privacy while ensuring trading security and data reliability is a challenging task in the field of power data trading. To address the issue of whether the power data provided by sellers aligns with the requirements of buyers in power data trading, a blockchain-based supply-demand consistency privacy-preserving matching scheme (BPMS) is proposed. The scheme leverages attribute-based searchable encryption (ABSE) and linear secret sharing scheme-based matching strategy to create a matching environment that adheres to privacy protection requirements, enabling consistent alignment of supply and demand while safeguarding the privacy of power users. Subsequently, by equipping the blockchain-based power data trading platform (BDTP) with public and private keys, it ensures that matching services can only occur within the specified platform. The construction of the blockchain enables the storage of matching information on-chain for future queries and traceability. Furthermore, the BPMS also implements access control on the buyer's data processing tasks. By utilizing LSSS-based ciphertext policy attribute-based encryption (CP-ABE), it allows the seller to decrypt and obtain insights into the processing task taken by the buyer with the power data after successful matching and meeting specific attribute criteria. Finally, the scheme undergoes analysis and performance evaluation, demonstrating its feasibility and superiority.
引用
收藏
页码:399 / 408
页数:10
相关论文
共 30 条
[1]  
Acharya R. M., 2020, 2020 IEEE 7 UTT PRAD, P1
[2]   Review of Internet of Things (IoT) in Electric Power and Energy Systems [J].
Bedi, Guneet ;
Venayagamoorthy, Ganesh Kumar ;
Singh, Rajendra ;
Brooks, Richard R. ;
Wang, Kuang-Ching .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02) :847-870
[3]   Towards Privacy-Preserving Data Trading for Web Browsing History [J].
Cai, Hui ;
Ye, Fan ;
Yang, Yuanyuan ;
Zhu, Yanmin ;
Li, Jie .
PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS 2019), 2019,
[4]   Towards Energy-Efficient Wireless Networking in the Big Data Era: A Survey [J].
Cao, Xianghui ;
Liu, Lu ;
Cheng, Yu ;
Shen, Xuemin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :303-332
[5]   Financing Product Development Projects in the Blockchain Era: Initial Coin Offerings Versus Traditional Bank Loans [J].
Choi, Tsan-Ming .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) :3184-3196
[6]   Synchronized phasor data based energy function analysis of dominant power transfer paths in large power systems [J].
Chow, Joe H. ;
Chakrabortty, Aranya ;
Arcak, Murat ;
Bhargava, Bharat ;
Salazar, Armando .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (02) :727-734
[7]   Efficient and Expressive Keyword Search Over Encrypted Data in Cloud [J].
Cui, Hui ;
Wan, Zhiguo ;
Deng, Robert H. ;
Wang, Guilin ;
Li, Yingjiu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) :409-422
[8]  
[高诗尧 Gao Shiyao], 2022, [计算机科学, Computer Science], V49, P313
[9]  
Goyal V., 2006, Proceedings of the 13th ACM conference on Computer and communications security, P89, DOI [10.1145/1180405.1180418, DOI 10.1145/1180405.1180418]
[10]  
He Y., 2019, IEEE INFOCOM 2019, P1