KEYWORDS: Computer security, Information security, Design and modelling, Power grids, Clouds, Network security, Data privacy, Telecommunications, Databases, Carbon
With the application of new technologies such as Internet of Things and big data in smart grid industry, new power systems based on new energy sources have emerged in response to the call of “Peak carbon, carbon neutrality.” The power grid enterprise concentrates the data assets and business access to the data external service, which needs to connect a large number of data sources. Ensuring the authenticity of the data without tampering becomes a big challenge. The power system adopts the identity authentication mechanism to resist the security attack and protect the sensitive data. However, in the process of user authentication, the sending of real identity information will lead to the reduction of system privacy, which is easy to cause the leakage of sensitive data. This paper proposes an anonymous authentication mechanism based on zero-knowledge proof for power system, which authenticates the server without revealing the identity. This mechanism uses zero-knowledge proof algorithm to design an anonymous authentication protocol framework, which consists of three stages: registration, mutual authentication and revocation. In this method, anonymous certificate and elliptic curve encryption technology are used to realize the anonymity and authenticity of users. The mechanism effectively protects the user's real identity information and maintains the sensitive data in the power system.
As the information technology develops rapidly, the large-scale personal data such as sensors or IoT (Internet of Things) equipment is kept in the cloud or data centers. Sometimes, the data owner in cloud center needs to publish the data. Therefore, in the face of the risk of personal information leakage, how to take full advantage of data has become a hot research topic. When data is published many times, personal privacy is also disclosed. Thus, this paper puts forward a new clustering algorithm based on singular value decomposition to finish the clustering process. The ideas of distance and information entropy are considered to flexibly adjust data availability and privacy protection in this way. Secondly, this paper also puts forward a dynamic update mechanism to ensure that personal data will not be leaked after multiple releases and minimize information loss. Finally, the effectiveness and superiority of this method are verified by experiments.
Hybrid encryption algorithms are flexible tools for modeling the correlation of random variables. They cover the scope from completely negative correlation to positive correlation, including independent cases and contain asymmetric correlation and broadly employed Gaussian correlation structure. The pair-encryption algorithm of the hybrid encryption algorithm takes advantage of the ease of use of the two-variable encryption algorithm, and it is recommended to decompose the hybrid encryption algorithm into a set of two-variable encryption algorithms. We have successfully applied this method to spatial data and established a powerful interpolation method on basis of spatial logarithm.
Because of the openness of the cloud storage architecture and the sharing of resources, data owners have lost control of the stored data, leading to frequent leakage of user privacy data, and security issues have been a significant element restricting the development of cloud storage. In this paper, three key algorithms for key distribution, hybrid encryption and dynamic key update are proposed for the key issues of data sharing security in cloud storage environment. Based on the above algorithms, a data security sharing model in cloud storage environment is proposed to solve cloud storage Trust dependence, user collusion attacks, and data dynamic security issues in the environment to protect private data during storage and sharing security. The analysis of the experimental results shows that the data security sharing technology can resist selective plaintext and collusion attacks. Therefore, the system of cloud storage encrypts shared data by using data security sharing technology, which can effectively protect the data confidentiality under context of the cloud storage.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.