Paper
6 June 2024 Research on key privacy protection technologies supporting flexible distributed resource layered aggregation transactions
Shuang Sun, Xiangbo Zhu, Weiyu Wang, Xuesen Zhang, Huan He
Author Affiliations +
Proceedings Volume 13175, International Conference on Computer Network Security and Software Engineering (CNSSE 2024); 131750W (2024) https://doi.org/10.1117/12.3031931
Event: 4th International Conference on Computer Network Security and Software Engineering (CNSSE 2024), 2024, Sanya, China
Abstract
In the "dual carbon" goal background, massive, dispersed, and ubiquitous distributed resources are becoming an important component of China's power system. However, distributed flexible resources faced with security issues, such as data loss, data tampering, and privacy breaches, during the process of participating in power trading by aggregation method. Therefore, this article proposes key privacy protection technologies to support flexible resource hierarchical aggregation transactions. Through fully analyzing the current situation of flexible resource hierarchical aggregation transaction and the existing privacy leakage problems, this paper designs a collaborative interaction process of flexible resource hierarchical aggregation transactions, and implements privacy protection for electricity enterprises participating in aggregation and benefit distribution in a trustworthy and autonomous manner.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Shuang Sun, Xiangbo Zhu, Weiyu Wang, Xuesen Zhang, and Huan He "Research on key privacy protection technologies supporting flexible distributed resource layered aggregation transactions", Proc. SPIE 13175, International Conference on Computer Network Security and Software Engineering (CNSSE 2024), 131750W (6 June 2024); https://doi.org/10.1117/12.3031931
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data privacy

Blockchain

Power grids

Computer security

Data transmission

Back to Top