首页 | 本学科首页   官方微博 | 高级检索  
     

基于雾计算的智能电表用户虚拟环隐私保护方案
引用本文:夏卓群,张一超,谷科,周楷鑫,李雄.基于雾计算的智能电表用户虚拟环隐私保护方案[J].电子与信息学报,2023,45(3):819-827.
作者姓名:夏卓群  张一超  谷科  周楷鑫  李雄
作者单位:1.长沙理工大学计算机与通信工程学院 长沙 4100142.电子科技大学计算机科学与工程学院 成都 611731
基金项目:国家自然科学基金(52177067, U1966207, 61532013)
摘    要:作为智能电网的基础组件,智能电表(SMS)可以定期向电力公司报告用户的详细用电量数据。但是智能电表也带来了一些安全问题,比如用户隐私泄露。该文提出了一种基于虚拟环的隐私保护方案,可以提供用电数据和用户身份的隐私,使攻击者无法知道匹配电力数据与用户身份的关系。在所提方案中,智能电表可以利用其虚拟环成员身份对其真实身份进行匿名化,并利用非对称加密和Paillier同态系统对其获得的用电量数据生成密文数据;然后智能电表将密文数据发送给其连接的雾节点,雾节点定期采集其管理的智能电表的密文数据。同时,雾节点对这些智能电表的虚拟环身份进行验证,然后将收集到的密文数据聚合并发送给控制中心;最后控制中心对聚合后的密文进行解密,得到用电量数据。实验结果表明所提方案在计算和通信成本上具有一定的优势。

关 键 词:隐私保护    雾计算    智能电表    虚拟环
收稿时间:2022-05-17

Virtual Ring Privacy Preserving Scheme Based on Fog Computing for Smart Meter System
XIA Zhuoqun,ZHANG Yichao,GU Ke,ZHOU Kaixin,LI Xiong.Virtual Ring Privacy Preserving Scheme Based on Fog Computing for Smart Meter System[J].Journal of Electronics & Information Technology,2023,45(3):819-827.
Authors:XIA Zhuoqun  ZHANG Yichao  GU Ke  ZHOU Kaixin  LI Xiong
Affiliation:1.Changsha University of Science & Technology, Changsha 410014, China2.School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
Abstract:As the basic component of smart grid, Smart Meter System (SMS) can regularly report the detailed electricity consumption data of users to power companies. However, SMS also bring some security problems, such as user privacy disclosure. This paper proposes a privacy protection scheme based on virtual ring for SMS based on fog computing. This scheme can provide the privacy of power consumption data and user identity, so that the attacker can not know the relationship between matching power data and user identity. In the proposed scheme, the SMS can use its virtual ring membership to anonymize its real identity, and it can also use asymmetric encryption and Paillier homomorphic system to generate ciphertext data from its power consumption data; Then the SMS sends the ciphertext data to the connected fog node, and the fog node collects regularly the ciphertext data of the SMS it manages. At the same time, the fog node verifies the virtual ring identity of these SMS, and then aggregates the collected ciphertext data and sends it to the control center; Finally, the control center decrypts the aggregated ciphertext to obtain the power consumption data. The experimental results show that the proposed scheme has some advantages in computing and communication costs.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号