Blockchain data privacy protection modeling based on CP-ABE algorithm

被引:0
作者
Dang, Qian [1 ]
Qiu, Yu [1 ]
Sun, Biying [1 ]
Yang, Zhengwei [1 ]
Liu, Xinrui [1 ]
机构
[1] State Grid Gansu Elect Power Co, Internet Div, Lanzhou 730050, Gansu, Peoples R China
关键词
blockchain; encryption algorithm; Internet of Things; power system; private data; security model; SMART; SCHEME; AUTHENTICATION; PRESERVATION; AGGREGATION; CHALLENGES; INTERNET; THINGS;
D O I
10.1515/ijeeps-2022-0094
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the proposal of the concept of ubiquitous power Internet of Things and the further promotion of blockchain strategy, modern information technologies such as the Internet of Things and cloud computing have been widely used in the power system. While the power grid is becoming more intelligent, it is also accompanied by the emergence of various security threats, and the power grid will face greater challenges and pressures. In this paper, aiming at the current situation of information security faced by the power grid blockchain under the cloud Internet of Things, a multi-authorization center ciphertext policy attribute encryption access control method is constructed for the power grid blockchain. It adds the function of visitor attribute update revocation, aggregates multi-dimensional data into ciphertext, and uses CP-ABE encryption to implement fine-grained access control at the dimension level. Through experimental analysis, in terms of security and functionality, this method can resist physical collision attacks and manage access rights flexibly. In terms of encryption and decryption efficiency, the encryption and decryption calculation speed of the proposed method is 6.2-15.6% higher than that of the traditional method, and the time consumption efficiency is more than 5% higher than that of other methods. It proves that this model has more advantages for open network environments such as power grid blockchain with high confidentiality requirements and large scale of users. It is of great significance to study the data security and privacy protection methods of the power grid blockchain.
引用
收藏
页码:681 / 691
页数:11
相关论文
共 22 条
  • [1] Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections
    Abdallah, Asmaa
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) : 2615 - 2629
  • [2] Al Khuffash K, 2018, APPLICATION OF SMART GRID TECHNOLOGIES: CASE STUDIES IN SAVING ELECTRICITY IN DIFFERENT PARTS OF THE WORLD, P1, DOI 10.1016/B978-0-12-803128-5.00001-5
  • [3] Development of an enterprise Geographic Information System (GIS) integrated with smart grid
    Ashkezari, Atefeh Dehghani
    Hosseinzadeh, Nasser
    Chebli, Ayoub
    Albadi, Mahammed
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2018, 14 : 25 - 34
  • [4] Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling
    Bos, Joppe W.
    Castryck, Wouter
    Iliashenko, Ilia
    Vercauteren, Frederik
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 184 - 201
  • [5] A survey of phishing attacks: Their types, vectors and technical approaches
    Chiew, Kang Leng
    Yong, Kelvin Sheng Chek
    Tan, Choon Lin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 106 : 1 - 20
  • [6] A systematic review of data protection and privacy preservation schemes for smart grid communications
    Ferrag, Mohamed Amine
    Maglaras, Leandros A.
    Janicke, Helge
    Jiang, Jianmin
    Shu, Lei
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2018, 38 : 806 - 835
  • [7] Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Ahmim, Ahmed
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04): : 3015 - 3045
  • [8] Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid
    Guan, Zhitao
    Li, Jing
    Wu, Longfei
    Zhang, Yue
    Wu, Jun
    Du, Xiaojiang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1934 - 1944
  • [9] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    [J]. COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [10] Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 720 - 729