信息安全研究 ›› 2023, Vol. 9 ›› Issue (3): 208-.
余晗1梁音2宋继勐1李何筱2奚溪2原洁璇2
出版日期:
2023-03-04
发布日期:
2023-03-03
通讯作者:
余晗
硕士,工程师.主要研究方向为区块链、能源互联网、大数据.
han-yu1@sgcc.com.cn
作者简介:
余晗
硕士,工程师.主要研究方向为区块链、能源互联网、大数据.
hanyu1@sgcc.com.cn
梁音
硕士研究生.主要研究方向为区块链、数据安全.
18801326002@163.com
宋继勐
硕士,高级工程师.主要研究方向为大数据、区块链、电碳核算方法学体系.
jimengsong@sgcc.com.cn
李何筱
硕士研究生.主要研究方向为深度强化学习、网络安全.
15554506998@163.com
奚溪
硕士研究生.主要研究方向为网络安全.
xixi1018225@126.com
原洁璇
硕士研究生.主要研究方向为区块链、电力信息安全.
jxyuan0621@163.com
Online:
2023-03-04
Published:
2023-03-03
摘要: 数据要素的流通共享与协同应用是数字时代中数据要素市场培育的核心内容,数据安全共享技术能够有效实现数据的安全共享,避免“数据孤岛”现象、隐私泄露事件等.对国内外数据安全共享技术研究成果及进展进行了全面综述.首先,概述了数据安全共享技术的发展与演进历程,然后从技术特点、解决问题、优缺点等方面对比分析了现有数据安全共享解决方案,并总结了其依赖的关键技术及面临的风险挑战;其次,讨论了数据安全共享技术在电力能源交易、电力物联网、电动汽车等能源电力领域典型场景的应用,为能源电力领域数据合规与治理提供新的思路与启示;最后,展望了数据安全共享技术在能源电力领域应用的未来研究方向及发展前景.
中图分类号:
余晗, 梁音, 宋继勐, 李何筱, 奚溪, 原洁璇, . 数据安全共享技术发展综述及在能源电力领域应用研究[J]. 信息安全研究, 2023, 9(3): 208-.
参考文献 [1]孟丹. 区块链背景下的数据安全共享机制研究[J]. 企业科技与发展, 2021 (10): 5254[2]潘兰芬.大数据时代统计数据共享的分析[J]. 财经界,2019(14):157158[3]McMahan B, Moore E, Ramage D, et al. Communicationefficient learning of deep networks from decentralized data[C] Proc of Artificial Intelligence and Statistics. Brazil: Federal University of Pernambuco, 2017: 12731282[4]Xu L, Wu X, Zhang X. CLPRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud[C] Proc of the 7th ACM Symp on Information, Computer and Communications Security. New York: ACM, 2012: 8788[5]Elhoseny M, Abdelaziz A, Salama A S, et al. A hybrid model of Internet of things and cloud computing to manage big data in health services applications[J]. Future Generation Computer Systems, 2018, 86: 13831394[6]王岽. 基于云服务的远程医疗数据共享系统设计与实现[D]. 石家庄: 河北科技大学, 2020[7]王战红, 姚瑶, 张文, 等. Oracle Database 11g实用教程: 计算机基础与实训教材系列[M]. 北京: 清华大学出版社, 2014[8]Ng W S, Ooi B C, Tan K L, et al. Peerdb: A P2Pbased system for distributed data sharing[C] Proc of the 19th Int Conf on Data Engineering. Piscataway, NJ: IEEE, 2003: 633644[9]Jonathan M, Anna Q, Daniel G, et al. Dataclay: A distributed data store for effective interplayer data sharing[J]. Journal of Systems and Software, 2017, 131: 129145[10]Nakamoto S. Bitcoin: A peertopeer electronic cash system[JOL]. 2008 [20230205]. http:www.bitcoin.orgbitcoin.pdf[11]Swan M. Blockchain: Blueprint for a New Economy[M]. Sebastopol: O’Reilly Media, Inc, 2015[12]Sun J, Yan J, Zhang K Z K. Blockchainbased sharing services: What blockchain technology can contribute to smart cities[J]. Financial Innovation, 2016, 2(1): 19[13]McConaghy T, Marques R, Muller A, et al. Bigchaindb: A scalable blockchain database[JOL]. 2016 [20230205]. https:www.bigchaindb.comwhitepaperbigchaindbwhitepaper.pdf[14]Zikratov I, Kuzmin A, Akimenko V, et al. Ensuring data integrity using blockchain technology[C] Poc of the 20th Conf of Open Innovations Association(FRUCT). StPetersburg, Russia: TRIK Studio, 2017: 534539[15]Shafagh H, Burkhalter L, Hithnawi A, et al. Towards blockchainbased auditable storage and sharing of IoT data[C] Proc of the 2017 Conf on Cloud Computing Security Workshop. New York: ACM, 2017: 4550[16]Muzammal M, Qu Q, Nasrulin B. A blockchain database application platform[J]. ArXiv preprint, arXiv:1808.05199, 2018[17]张超, 李强, 陈子豪, 等. Medical chain: 联盟式医疗区块链系统[J]. 自动化学报, 2019, 45(8): 14951510[18]AlZahrani F A. Subscriptionbased datasharing model using blockchain and data as a service[J]. IEEE Access, 2020, 8: 115966115981[19]Elayan H, Aloqaily M, Guizani M. Deep federated learning for IoTbased decentralized healthcare systems[C] Proc of 2021 Int Wireless Communications and Mobile Computing (IWCMC). Piscataway, NJ: IEEE, 2021: 105109[20]Yang H, Bai Y, Zou Z, et al. Research on the security sharing model of power grid data based on federated learning[C] Proc of the 5th IEEE Information Technology, Networking, Electronic and Automation Control Conf(ITNEC). Piscataway, NJ: IEEE, 2021: 15661569[21]Qu Y, Gao L, Luan T H, et al. Decentralized privacy using blockchainenabled federated learning in fog computing[J]. IEEE Internet of Things Journal, 2020, 7(6): 51715183[22]Chai H, Leng S, Chen Y, et al. A hierarchical blockchainenabled federated learning algorithm for knowledge sharing in Internet of vehicles[J]. IEEE Trans on Intelligent Transportation Systems, 2020, 22(7): 39753986[23]Bonawitz K, Eichner H, Grieskamp W, et al. Towards federated learning at scale: System design[J]. arXiv preprint, arXiv:1902.01046, 2019[24]Yuan Xiaoming, Chen Jiahui, Zhang Ning, et al. A federated bidirectional connection broad learning scheme for secure data sharing in Internet of vehicles[J]. China Communications, 2021, 18(7): 117133[25]Yang Q, Liu Y, Chen T, et al. Federated machine learning: Concept and applications[JOL]. 2019 [20230205]. https:arxiv.orgpdf1902.04885v1[26]Ghimire B, Rawat D B. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for Internet of things[J]. IEEE Internet of Things Journal, 2022, 9(11): 82298249[27]Murshed M G S, Murphy C, Hou D, et al. Machine learning at the network edge: A survey[J]. ACM Computer Survey, 2022, 54(8): 137[28]周传鑫. 面向联邦学习的数据安全共享关键技术研究[D]. 郑州: 战略支援部队信息工程大学, 2022[29]Arcolezi H H, Couchot J F, Al Bouna B, et al. Random sampling plus fake data: Multidimensional frequency estimates with local differential privacy[C] Proc of the 30th ACM Int Conf on Information & Knowledge Management. New York: ACM, 2021: 4757[30]Wang N, Xiao X K, Yang Y, et al. Collecting and analyzing multidimensional data with local differential privacy[C] Proc of the 35th IEEE Int Conf on Data Engineering (ICDE). Piscataway, NJ: IEEE, 2019: 638649[31]Xi P, Zhang X, Wang L, et al. A review of blockchainbased secure sharing of healthcare data[J]. Applied Sciences, 2022, 12(15): 7912[32]刘明达, 陈左宁, 拾以娟, 等. 区块链在数据安全领域的研究进展[J]. 计算机学报, 2021, 44(1): 127[33]Cheng X, Chen F, Xie, D, et al. Design of a secure medical data sharing scheme based on blockchain[JOL]. Journal of Med System, 2020 [20230205]. https:doi.org10.1007s1091601914681[34]Xu Hongbiao, Qian He, Xuecong Li, et al. BDSSFA: A blockchainbased data security sharing platform with finegrained access control[J]. IEEE Access, 2020, 8: 8755287561[35]Zhong C, Liu K, Liang Z, et al. Research on data security sharing in blockchain: Challenges and prospects[C] Proc of 2022 IEEE Int Conf on Electrical Engineering, Big Data and Algorithms (EEBDA). Piscataway, NJ: IEEE, 2022: 13221327[36]Kamara S, Lauter K. Cryptographic cloud storage[C] Proc of the 14th Int Conf on Financial Cryptograpy and Data Security (FC’10). Berlin: Springer, 2010: 136149[37]Oualha N, Roudier Y. Reputation and audits for selforganizing storage[C] Proc of the Workshop on Security in Opportunistic and Social Networks. New York: ACM, 2008: 110[38]Emil S, Marten V D, Ari J, Alina O. Iris: A scalable cloud file system with efficient integrity checks[C] Proc of ACSAC. New York: ACM, 2012: 229238[39]Wang Q, Wang C, Ren K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Trans on Parallel and Distributed Systems, 2011, 22(5): 847859[40]张戈, 华蓓. 云存储环境下基于时释性加密的CPABE方案[J]. 计算机系统应用, 2021, 30(1): 4553[41]Bonatti P,Samarati P. A uniform framework for regulating service access and information release on the web [J]. Journal of Computer Security, 2002, 10 (3): 241271[42]Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures[C] Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2015: 13221333[43]Tramèr F, Zhang F, Juels A, et al. Stealing machine learning models via prediction apis[C] Proc of the 25th USENIX Security Symp. Berkeley, CA: USENIX Association, 2016: 601618[44]Shokri R,Stronati M, Song C, et al. Membership inference attacks against machine learning models[C] Proc of 2017 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2017: 318[45] Liu X, Li H, Xu G, et al. Adaptive privacypreserving federated learning[J]. PeertoPeer Networking and Applications, 2020, 13(6): 23562366[46]Bonawitz K, Ivanov V, Kreuter B, et al. Practical secure aggregation for privacypreserving machine learning[C] Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2017: 11751191[47] Horvath S, Ho C Y, Horvath L, et al. Natural compression for distributed deep learning[J]. arXiv preprint, arXiv:1905.10988, 2019[48]Gilbert S, Lynch N. Perspectives on the CAP Theorem[J]. Computer, 2012, 45(2): 3036[49]Abadi D. Consistency tradeoffs in modern distributed database system design: CAP is only part of the story[J]. Computer, 2012, 45(2): 3742[50]Zheng S, Jin X, Huang G, et al. Coordination of commercial prosumers with distributed demandside flexibility in energy sharing and management system[JOL]. Energy, 2022 [20230205]. https:doi.org10.1016j.energy.2022.123634[51]Mengelkamp E, Notheisen B, Beer C, et al. A blockchainbased smart grid: Towards sustainable local energy markets[J]. Computer ScienceResearch and Development, 2018, 33(12): 207214[52]Antal C, Cioara T, Antal M, et al. Blockchain based decentralized local energy flexibility market[J]. Energy Report, 2021, 7: 52695288[53]Mu C, Ding T, Sun Y, et al. Energy blockbased peertopeer contract trading with secure multiparty computation innanogrid[J]. IEEE Trans on Smart Grid, 2022, 13(6): 47594772[54]Huh S, Cho S, Kim S. Managing IoT devices using blockchain platform[C] Proc of the 19th Int Conf on Advanced Communication Technology (ICACT). Piscataway, NJ: IEEE, 2017: 464467[55]Lao L, Li Z, Hou S, et al. A survey of IoT applications in blockchain systems[J]. ACM Computer Survey, 2020, 53(1): 132[56]Li M, Pei P, Yu F R, et al. Cloudedge collaborative resource allocation for blockchainenabled Internet of things: A collective reinforcement learning approach[J]. IEEE Internet of Things Journal, 2022, 9(22): 2311523129[57]Si F, Zhang N, Wang Y, et al. Distributed optimization for integrated energy systems with secure multiparty computation[JOL]. IEEE Internet of Things Journal, 2022 [20230205]. https:doi.org10.1109JIOT.2022.3209017[58]Song H, Zhou E, Pi B, et al. Apply blockchain technology to electric vehicle battery refueling[C] Proc of Hawaii Int Conf on System Sciences. 2018: 44944502[59]Kim N, Kang S M, Hong C S. Mobile charger billing system using lightweight Blockchain[C] Proc of the 19th AsiaPacific Network Operations and Management Symposium (APNOMS). 2017: 374377[60]Tanwar S, Kakkar R, Gupta R, et al. Blockchainbased electric vehicle charging reservation scheme for optimum pricing[J]. International Journal of Energy Research, 2022, 46(11): 1499415007[61]Saputra Y M, Hoang D T, Nguyen D N, et al. Energy demand prediction with federated learning for electric vehicle networks[J]. arXiv preprint, arXiv:1909.00907, 2019[62]Li K, Yang Y, Wang S, et al. A lightweight privacypreserving and sharing scheme with dualblockchain for intelligent pricing system of smart grid[J]. Computer Security, 2021, 103(5): 102189102201[63]Daghmehchi M, Ghorbani A. HyBridge: A hybrid blockchain for privacypreserving and trustful energy transactions in InternetofThings platforms[JOL]. Sensors, 2020 [20230205]. https:doi.org10.3390s20030928 |
[1] | 余晗, 李俊妮, 刘文思, 宣东海, . 基于区块链的能源数据共享访问控制方案[J]. 信息安全研究, 2023, 9(3): 220-. |
[2] | 余晗, 李俊妮, 吴海涵, 原洁璇, 史嘉伟, 李元诚, . 面向能源大数据的链上链下数据监管方案研究[J]. 信息安全研究, 2023, 9(3): 235-. |
[3] | 王志强, 王姿旖, 倪安发, . 基于Stacking集成学习的区块链异常交易检测技术研究[J]. 信息安全研究, 2023, 9(2): 98-. |
[4] | 刘萌, 陈丹伟, 马圣东, . 基于区块链可追溯的个人隐私数据共享技术研究[J]. 信息安全研究, 2023, 9(2): 109-. |
[5] | 张晴晴, 田潇, 田锦, . 基于区块链预言机的车联网可信身份方案研究[J]. 信息安全研究, 2023, 9(2): 120-. |
[6] | 李国良, 邵思豪, . 基于区块链的电子证照共享方案研究与实现[J]. 信息安全研究, 2023, 9(2): 127-. |
[7] | 王栋, 李达, 冯景丽, 石竹玉, 朴桂荣, . 基于区块链的数据要素资源共享及访问控制方案[J]. 信息安全研究, 2023, 9(2): 137-. |
[8] | 朱悦, 庄媛媛, . 联邦学习的个人信息保护合规分析框架[J]. 信息安全研究, 2023, 9(2): 162-. |
[9] | 张兴, 赵卫国, 覃艺, 陈谦, 王影, . 基于可信计算3.0的大数据安全计算管控系统设计与实现[J]. 信息安全研究, 2022, 8(E2): 61-. |
[10] | 韩蒙, 杨波, 邱晓慧, 林昶廷, . 面向金融行业的可信隐私计算评测解决方案[J]. 信息安全研究, 2022, 8(E2): 120-. |
[11] | 包森成, 刘亦哲, 税雪飞, 袁国平, . 一种可编辑区块链的一般构造[J]. 信息安全研究, 2022, 8(E2): 125-. |
[12] | 吕峥, 邢云龙, 吕延辉. “区块链+ABAC访问控制”解决方案[J]. 信息安全研究, 2022, 8(E1): 139-. |
[13] | 蒋才平, 亢洋, 李景华, 郭小波, 田青. 网络身份认证中隐私计算技术应用初探[J]. 信息安全研究, 2022, 8(9): 863-. |
[14] | 王中华, 徐杰, 韩健, 臧天宁. 基于卷积神经网络的恶意区块链域名检测方法[J]. 信息安全研究, 2022, 8(8): 760-. |
[15] | 刘宇航, 刘军杰, 文伟平. 基于符号执行的代币买卖漏洞和权限转移漏洞的检测验证方法[J]. 信息安全研究, 2022, 8(7): 632-. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||