Font Size: a A A

Research On Power Data Security Access Control Method For Smart Grid Cloud Environment

Posted on:2019-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2382330545469548Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In recent years,the rapid development of China's economy has driven the transformation of an aging,traditional power grid into a smart grid.Smart grid is an advanced digital infrastructure with two-way information communication,equipment control and power distribution capabilities.The smart grid started late in China,and its research focus at the current stage focuses on the three aspects of power transformation,transmission and distribution.Compared to traditional grids,smart grids will dramatically increase the amount of data that can be detected,collected,aggregated,and analyzed.These new massive data are more diverse and more widely sourced and distributed than traditional power grids.The smart data added to the smart grid is more fine-grained.However,few scholars have studied how to ensure the security and privacy of these data.The transformation from traditional grids to smart grids needs to be carried out step-by-step.Among them,the first task is to develop related technologies to protect the privacy of data related to the smart grid and ensure the core computing performance of the smart grid and the security of the communications network.Integrating information technology into the power grid is fundamental to building a smart grid and realizing its advantages.However,these networking technologies also increase complexity and bring new security challenges.Due to the development of virtualization technology,software and hardware decoupling has made cloud computing possible.Cloud computing has elastic scalability,high-performance,high-reliability core competence,which just fills the gaps in the storage and control of massive user data in the smart grid.The introduction of cloud computing in the smart grid can realize the decoupling of hardware and software on the basis of the original power hardware and facilities,and minimize changes to hardware resources.Integrate and configure various resources on the software to meet the real-time and reliability requirements of the smart grid for power data processing.Firstly,this paper introduces the model and security requirements for smart grid and cloud computing.Based on this,a demand model is established based on a specific case of the power sales company for access control of the smart grid.This paper combines attribute encryption and hierarchical identity encryption to improve the existing hierarchical encryption system.Including the combination of multi-authorization center encryption,introduction of third-party trusted entities,and optimization of encryption algorithms,a hierarchical access control algorithm for identity and attribute encryption in the smart grid is proposed to solve the problem of data access control permissions in smart grid cloud environment.Secondly,this paper analyzes the security of the proposed improved algorithm,and proves theoretically that the proposed improved algorithm can resist self-adaptive selection of plaintext attacks.Finally,the paper analyzes the efficiency of the improved algorithm through charts,and clarifies the relationship between the time required for each step and the access structure in a visual way.Based on the proposed improved algorithm,this paper presents the data format and encryption/decryption model in the smart grid cloud environment and describes the specific workflow.Finally,the proposed algorithm is implemented,the steps and methods of the experiment are described,and the flow chart of the algorithm is given.At the same time,combined with the smart grid and the improved algorithm,a power data management system was designed and developed using Java Web and JNI technology.By simulating the encryption and decryption process of power data in this system,which verifies the feasibility and security of the improved access control method based on hierarchical attribute encryption proposed in this paper.
Keywords/Search Tags:Smart Grid, Attribute-based Encryption, Access Control, Hierarchical Cryptography, Power Data Management System
PDF Full Text Request
Related items