Application of edge computing technology in smart grid data security

Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu
Format: Article
Language:English
Published: Elsevier 2025-02-01
Series:Measurement: Sensors
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S266591742400388X
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832586183018807296
author Zhuo Cheng
Jiangxin Li
Jianjun Zhang
Chen Wang
Hui Wang
Juyin Wu
author_facet Zhuo Cheng
Jiangxin Li
Jianjun Zhang
Chen Wang
Hui Wang
Juyin Wu
author_sort Zhuo Cheng
collection DOAJ
description Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. Combining with edge computing technology, the author proposes a proxy blind signcryption scheme based on certificateless without bilinear mapping. By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. The experimental results indicate that: The total running time required for executing proxy authorization and verification, proxy key generation, signature and decryption algorithms in this scheme is 5.617 ms, with a ciphertext length of 80 Bytes. Compared with other existing literature, the maximum reduction is 85.6 % and 86 %, respectively. Conclusion: This scheme is more suitable for protecting data security and privacy in the data transmission process of smart grids due to its lower running time and communication cost.
format Article
id doaj-art-2794eb6b48464e078fc7454352ec9685
institution Kabale University
issn 2665-9174
language English
publishDate 2025-02-01
publisher Elsevier
record_format Article
series Measurement: Sensors
spelling doaj-art-2794eb6b48464e078fc7454352ec96852025-01-26T05:04:53ZengElsevierMeasurement: Sensors2665-91742025-02-0137101412Application of edge computing technology in smart grid data securityZhuo Cheng0Jiangxin Li1Jianjun Zhang2Chen Wang3Hui Wang4Juyin Wu5Corresponding author.; Aostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAbsrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. Combining with edge computing technology, the author proposes a proxy blind signcryption scheme based on certificateless without bilinear mapping. By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. The experimental results indicate that: The total running time required for executing proxy authorization and verification, proxy key generation, signature and decryption algorithms in this scheme is 5.617 ms, with a ciphertext length of 80 Bytes. Compared with other existing literature, the maximum reduction is 85.6 % and 86 %, respectively. Conclusion: This scheme is more suitable for protecting data security and privacy in the data transmission process of smart grids due to its lower running time and communication cost.http://www.sciencedirect.com/science/article/pii/S266591742400388XSmart gridEdge computingNo certificate proxy blind signature encryptionForward safetyBatch verification
spellingShingle Zhuo Cheng
Jiangxin Li
Jianjun Zhang
Chen Wang
Hui Wang
Juyin Wu
Application of edge computing technology in smart grid data security
Measurement: Sensors
Smart grid
Edge computing
No certificate proxy blind signature encryption
Forward safety
Batch verification
title Application of edge computing technology in smart grid data security
title_full Application of edge computing technology in smart grid data security
title_fullStr Application of edge computing technology in smart grid data security
title_full_unstemmed Application of edge computing technology in smart grid data security
title_short Application of edge computing technology in smart grid data security
title_sort application of edge computing technology in smart grid data security
topic Smart grid
Edge computing
No certificate proxy blind signature encryption
Forward safety
Batch verification
url http://www.sciencedirect.com/science/article/pii/S266591742400388X
work_keys_str_mv AT zhuocheng applicationofedgecomputingtechnologyinsmartgriddatasecurity
AT jiangxinli applicationofedgecomputingtechnologyinsmartgriddatasecurity
AT jianjunzhang applicationofedgecomputingtechnologyinsmartgriddatasecurity
AT chenwang applicationofedgecomputingtechnologyinsmartgriddatasecurity
AT huiwang applicationofedgecomputingtechnologyinsmartgriddatasecurity
AT juyinwu applicationofedgecomputingtechnologyinsmartgriddatasecurity