Application of edge computing technology in smart grid data security
Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-02-01
|
Series: | Measurement: Sensors |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S266591742400388X |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832586183018807296 |
---|---|
author | Zhuo Cheng Jiangxin Li Jianjun Zhang Chen Wang Hui Wang Juyin Wu |
author_facet | Zhuo Cheng Jiangxin Li Jianjun Zhang Chen Wang Hui Wang Juyin Wu |
author_sort | Zhuo Cheng |
collection | DOAJ |
description | Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. Combining with edge computing technology, the author proposes a proxy blind signcryption scheme based on certificateless without bilinear mapping. By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. The experimental results indicate that: The total running time required for executing proxy authorization and verification, proxy key generation, signature and decryption algorithms in this scheme is 5.617 ms, with a ciphertext length of 80 Bytes. Compared with other existing literature, the maximum reduction is 85.6 % and 86 %, respectively. Conclusion: This scheme is more suitable for protecting data security and privacy in the data transmission process of smart grids due to its lower running time and communication cost. |
format | Article |
id | doaj-art-2794eb6b48464e078fc7454352ec9685 |
institution | Kabale University |
issn | 2665-9174 |
language | English |
publishDate | 2025-02-01 |
publisher | Elsevier |
record_format | Article |
series | Measurement: Sensors |
spelling | doaj-art-2794eb6b48464e078fc7454352ec96852025-01-26T05:04:53ZengElsevierMeasurement: Sensors2665-91742025-02-0137101412Application of edge computing technology in smart grid data securityZhuo Cheng0Jiangxin Li1Jianjun Zhang2Chen Wang3Hui Wang4Juyin Wu5Corresponding author.; Aostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAostar Information Technologies Co., Ltd., Sichuan, Chengdu 610041, ChinaAbsrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. Combining with edge computing technology, the author proposes a proxy blind signcryption scheme based on certificateless without bilinear mapping. By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. The experimental results indicate that: The total running time required for executing proxy authorization and verification, proxy key generation, signature and decryption algorithms in this scheme is 5.617 ms, with a ciphertext length of 80 Bytes. Compared with other existing literature, the maximum reduction is 85.6 % and 86 %, respectively. Conclusion: This scheme is more suitable for protecting data security and privacy in the data transmission process of smart grids due to its lower running time and communication cost.http://www.sciencedirect.com/science/article/pii/S266591742400388XSmart gridEdge computingNo certificate proxy blind signature encryptionForward safetyBatch verification |
spellingShingle | Zhuo Cheng Jiangxin Li Jianjun Zhang Chen Wang Hui Wang Juyin Wu Application of edge computing technology in smart grid data security Measurement: Sensors Smart grid Edge computing No certificate proxy blind signature encryption Forward safety Batch verification |
title | Application of edge computing technology in smart grid data security |
title_full | Application of edge computing technology in smart grid data security |
title_fullStr | Application of edge computing technology in smart grid data security |
title_full_unstemmed | Application of edge computing technology in smart grid data security |
title_short | Application of edge computing technology in smart grid data security |
title_sort | application of edge computing technology in smart grid data security |
topic | Smart grid Edge computing No certificate proxy blind signature encryption Forward safety Batch verification |
url | http://www.sciencedirect.com/science/article/pii/S266591742400388X |
work_keys_str_mv | AT zhuocheng applicationofedgecomputingtechnologyinsmartgriddatasecurity AT jiangxinli applicationofedgecomputingtechnologyinsmartgriddatasecurity AT jianjunzhang applicationofedgecomputingtechnologyinsmartgriddatasecurity AT chenwang applicationofedgecomputingtechnologyinsmartgriddatasecurity AT huiwang applicationofedgecomputingtechnologyinsmartgriddatasecurity AT juyinwu applicationofedgecomputingtechnologyinsmartgriddatasecurity |