计算机工程与应用 ›› 2019, Vol. 55 ›› Issue (12): 83-89.DOI: 10.3778/j.issn.1002-8331.1804-0290

• 网络、通信与安全 • 上一篇    下一篇

智能电网中的数据聚合方案分类研究

张思佳1,顾春华2,温  蜜1   

  1. 1.上海电力学院 计算机科学与技术学院,上海 200090
    2.上海理工大学,上海 200093
  • 出版日期:2019-06-15 发布日期:2019-06-13

Analysis and Research on Data Aggregation Scheme in Smart Grid

ZHANG Sijia1, GU Chunhua2, WEN Mi1   

  1. 1.College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 200090, China
    2.University of Shanghai for Science and Technology, Shanghai 200093, China
  • Online:2019-06-15 Published:2019-06-13

摘要: 智能电网中其安全的通信架构是保证电网安全、稳定运行的基础,隐私保护的数据聚合是保证机密性、提高效率的有效途径。对最近面向智能电网通信系统的数据聚合的五种功能类型的方案进行了总结和分析。在聚合阶段,大部分的方案在系统架构上基本相差不大,不过在聚合方法的选取上,则各自有不同的考虑。诸如Paillier加密体制和ElGamal加密体制,是两种较为常规的加密体制,差分隐私、双线性对技术和数据签名技术也在一些文章中得到应用。通过安全性分析证明,这些方案不仅具有隐私保护、消息的认证性和完整性验证等功能;而且通过对这些方案进行性能比较分析,所述的方案在计算开销和用户的访问控制方面及通信开销都各有优势,对于智能电网多维数据的收集和云端的访问控制提供了更多的参考依据。

关键词: 智能电网数据聚合, 同态加密, 差分隐私, 隐私保护, 安全

Abstract: The secure communication architecture in the smart grid is the basis for ensuring the security and stable operation of the power grid. Privacy protection data aggregation is an effective way to ensure confidentiality and to improve efficiency. This paper summarizes and analyzes the five functional types of data aggregation schemes that have recently been geared toward smart grid communication systems. In the aggregation phase, most of the solutions are basically the same in terms of system architecture, but they have different considerations in the selection of aggregation methods. For example, Paillier encryption system and ElGamal encryption system are two kinds of more conventional encryption systems. Differential privacy, bilinear pairing technology and data signature technology are also applied in some articles. The security analysis proves that these solutions not only have the functions of privacy protection, message authentication, and integrity verification; but also through the comparative analysis of the performance of these solutions, the above-mentioned solutions are in terms of computational overhead and user access control and communication overhead. Each has its own advantages and provides more reference for the collection of multi-dimensional data in the smart grid and cloud access control.

Key words: smart grid data aggregation, homomorphic encryption, differential privacy, privacy protection, security