Distributed Network Data Security Protection for SG-eIoT
With the continuous advancement of power system reform, grid enterprises relying on new technologies such as big data, cloud computing, artificial intelligence, internet of things (IoT) and blockchain are transforming towards more open energy internet enterprises, which brings more challenges to network security. The construction of SG-eIoT has promoted the circulation of data in all aspects of the system, cleaning up the barriers of data islands and effectively improving the operational efficiency of power company. However, due to the large scale of data access points, complex business operations, and huge amount of upstream and downstream enterprises in the industry chain, security risks may exist in the information circulation process such as being tampered and untrustworthy. Aiming at the problem of information security and credibility in the distributed network environment of power enterprises, this paper studies the application of blockchain technology in business information flow, and constructs a new data management mode of weak service connection to strong data interoperability based on the characteristics of blockchain technology, such as non-tampering property, collective maintenance and transaction non-repudiation, which achieves accurate data protection, and fully spports the construction of world-class energy internet company with excellent competitiveness.
KeywordsDistributed network security Power system SG-eIoT
This research was supported by the Foundation of Jiangxi Educational Committee (GJJ161132) and the National Natural Science Fund of China (Grant No. 61701215).
- 1.Haiming, J., Danni, X., Yuan, L., et al.: Mobile operation and maintenance system of electric power communication access network based on IoT technology. Telecommun. Sci. 34(10), 170–180 (2018)Google Scholar
- 2.Aodi, L., Xuehui, D., Na, W., et al.: Research progress of blockchain technology and its application in information security. J. Softw. 29(7), 2092–2115 (2018)Google Scholar
- 3.Huiming, Z., Lu, Z., Jin, Q.: A framework of trusted services management based on blockchain in social Internet of Things. Telecommun. Sci. 33(10), 19–25 (2017)Google Scholar
- 4.Guishan, D., Yuxiang, C., Zhaolei, Z., et al.: Research on identity management authentication based on blockchain. Comput. Sci. 45(11), 52–59 (2018)Google Scholar
- 5.Ting, Y., Junjie, Z., Weixin, Z., et al.: Data blockchain generation algorithm of cyber physical power system. Electr. Power Autom. Equipment 38(10), 74–80 (2018)Google Scholar
- 6.Yan, Y., Jin, Z.: A study on supply chain subject with a risk-aversion retailer based on block chain technology. Industr. Eng. Manage. 23(6), 33–42 (2018)Google Scholar
- 7.Hauwu, H., An, Y., Zehua, C.: Survey of smart contract technology and application based on blockchain. J. Comput. Res. Dev. 55(11), 2452–2466 (2018)Google Scholar