Research on Monitoring Data Security Sharing Method for Hydropower Station Operation and Maintenance

Author:

Ma Yuanjiang,Hong Liang,Qin Taisong,Hao Xia,Tan Taiquan

Abstract

Abstract The computer monitoring system centrally and uniformly manages the hydropower stations in the basin, which has high operation efficiency. The current data security sharing methods can not solve the multi-party trust problems such as data ownership and data security. In this regard, a monitoring data security sharing method for hydropower station operation and maintenance is proposed. The monitoring data of hydropower station comes from multiple independent operation systems developed by different suppliers according to different application requirements. The multi-source data are integrated and processed to meet the interactive needs of users. User permission has the characteristics of dynamic change, which can identify the permission attributes. Create a trusted container based on the user ID, locate the monitoring data, and trace the source in data sharing and storage. The access policy is formulated by the data user and bound with the private key, while the data is given an attribute set during encryption. Each data user has a corresponding access policy and a private key corresponding to the access policy, so as to realize the security sharing of monitoring data. The test results show that the design method in this paper can effectively reduce the communication overhead and storage overhead, and has good computing performance.

Publisher

IOP Publishing

Subject

General Physics and Astronomy

Reference6 articles.

1. Blockchain based secure storage and sharing scheme for EHR data;Cheng;Journal of Nanjing University of Posts and Telecommunications (Natural Science),2020

2. Towards a Modular On-Premise Approach for Data Sharing;Resende;Sensors,2021

3. A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain;Chen;Electronics,2021

4. Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment;Rajkumar;Computer Systems Science and Engineering,2022

5. Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders;Chen;IEEE Transactions on Dependable and Secure Computing,2022

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Research of Safety Management System for Hydropower Station Based on 5G Technology;2023 5th International Conference on Electronic Engineering and Informatics (EEI);2023-06-30

2. Research on Data Sharing Model Based on Multi-party Secure Computing;2022 The 6th International Conference on Big Data Research;2022-08-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3