| As a highly integrated cyber-physical system of "man-machine-thing",the Power Internet of Things(PIo T)covers all aspects of power generation,transmission,transformation,distribution,and consumption,and the data sources are extensive and complex.To support the safe and stable operation of power grids,energy service providers need to analyze and process this data through big data,artificial intelligence,and other technologies,which involve frequent data storage and sharing operations.At present,the data storage and sharing mechanisms of power systems are generally based on cryptography and access control technology.That is,the data is encrypted and uploaded to clouds for storage,and access competence is set to control users’ access behaviors.At the same time,the key is distributed to a third-party client or server for storage and management.However,centralized cloud access control architectures have problems such as complex operation,illegal authorization,and privacy leakage in authenticating and managing cross-domain users.In addition,frequent data storage and sharing operations also exacerbate the risk of key leakage,loss,and tampering in the memory of clients or servers.This can lead to malicious theft,tampering,and deletion of core data assets in PIo T.In severe cases,it may also cause large-scale power outages.Therefore,from the perspective of tolerant intrusion and privacy protection,this paper considers designing a reliable data storage system for PIo T based on blockchain and secret sharing.The specific works are as follows:(1)Aiming at the problems of key leakage,loss,and tampering in the memory of PIo T clients or servers,this paper proposes a key management scheme based on Pedersen secret sharing.The scheme splits the symmetric key into n key fragments through(k,n)threshold encryption technology,and then distributes these fragments to different users for storage.At the same time,the Pedersen commitment value of each key fragment is calculated and disclosed as a verification mechanism for reconstructing the symmetric key.The symmetric key can be reconstructed through any verified k key fragments to realize key multi-point storage and improve key management robustness and security.(2)Aiming at the problems of complex operation,illegal authorization,and privacy leakage in the centralized cloud access control architectures,this paper proposes an attribute access control architecture based on edge blockchain.The architecture adopts an on-chain/off-chain dual-layer storage architecture,and stores PIo T ciphertext data and symmetric key fragments in the cloud server and the blockchain for management respectively.At the same time,the attribute access control technology restricts users’ access behaviors to the key on the chain,to realize the on-demand access of authorized users to PIo T data and improve the reliability and security of data sharing.(3)Based on the key management scheme and access control architecture proposed above,this paper designs and implements a reliable data storage system for the PIo T based on blockchain and secret sharing on the Hyperledger Fabric blockchain platform and the Interplanetary File System(IPFS).The test results show that the system has functions such as certificate registration,certificate revocation,key fragment reading,etc.,which preliminarily verifies that the proposed scheme has certain practical application value in industrial scenarios. |