Advertisement

Distributed Network Data Security Protection for SG-eIoT

  • Zhiyu Chen
  • Tianliang PengEmail author
  • Yanling Zhang
  • Xuehao Yu
  • Longchuan Yan
  • Shaoyan Gong
  • Xiaolin Liu
  • Limin Li
  • Zheping Song
  • Decheng Wang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1075)

Abstract

With the continuous advancement of power system reform, grid enterprises relying on new technologies such as big data, cloud computing, artificial intelligence, internet of things (IoT) and blockchain are transforming towards more open energy internet enterprises, which brings more challenges to network security. The construction of SG-eIoT has promoted the circulation of data in all aspects of the system, cleaning up the barriers of data islands and effectively improving the operational efficiency of power company. However, due to the large scale of data access points, complex business operations, and huge amount of upstream and downstream enterprises in the industry chain, security risks may exist in the information circulation process such as being tampered and untrustworthy. Aiming at the problem of information security and credibility in the distributed network environment of power enterprises, this paper studies the application of blockchain technology in business information flow, and constructs a new data management mode of weak service connection to strong data interoperability based on the characteristics of blockchain technology, such as non-tampering property, collective maintenance and transaction non-repudiation, which achieves accurate data protection, and fully spports the construction of world-class energy internet company with excellent competitiveness.

Keywords

Distributed network security Power system SG-eIoT 

Notes

Acknowledgment

This research was supported by the Foundation of Jiangxi Educational Committee (GJJ161132) and the National Natural Science Fund of China (Grant No. 61701215).

References

  1. 1.
    Haiming, J., Danni, X., Yuan, L., et al.: Mobile operation and maintenance system of electric power communication access network based on IoT technology. Telecommun. Sci. 34(10), 170–180 (2018)Google Scholar
  2. 2.
    Aodi, L., Xuehui, D., Na, W., et al.: Research progress of blockchain technology and its application in information security. J. Softw. 29(7), 2092–2115 (2018)Google Scholar
  3. 3.
    Huiming, Z., Lu, Z., Jin, Q.: A framework of trusted services management based on blockchain in social Internet of Things. Telecommun. Sci. 33(10), 19–25 (2017)Google Scholar
  4. 4.
    Guishan, D., Yuxiang, C., Zhaolei, Z., et al.: Research on identity management authentication based on blockchain. Comput. Sci. 45(11), 52–59 (2018)Google Scholar
  5. 5.
    Ting, Y., Junjie, Z., Weixin, Z., et al.: Data blockchain generation algorithm of cyber physical power system. Electr. Power Autom. Equipment 38(10), 74–80 (2018)Google Scholar
  6. 6.
    Yan, Y., Jin, Z.: A study on supply chain subject with a risk-aversion retailer based on block chain technology. Industr. Eng. Manage. 23(6), 33–42 (2018)Google Scholar
  7. 7.
    Hauwu, H., An, Y., Zehua, C.: Survey of smart contract technology and application based on blockchain. J. Comput. Res. Dev. 55(11), 2452–2466 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Zhiyu Chen
    • 1
  • Tianliang Peng
    • 2
    Email author
  • Yanling Zhang
    • 3
  • Xuehao Yu
    • 1
  • Longchuan Yan
    • 1
  • Shaoyan Gong
    • 4
  • Xiaolin Liu
    • 1
  • Limin Li
    • 1
  • Zheping Song
    • 5
  • Decheng Wang
    • 6
  1. 1.State Grid Information & Telecommunication BranchBeijingChina
  2. 2.School of Information EngineeringNanchang Institute of TechnologyNanchangChina
  3. 3.China Electric Power Research InstituteBeijingChina
  4. 4.Global Energy Interconnection Research InstituteBeijingChina
  5. 5.PICC Investment Holding Co., Ltd.BeijingChina
  6. 6.HangZhou PolytechnicHangzhouChina

Personalised recommendations