当前位置: X-MOL 学术Wirel. Commun. Mob. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems
Wireless Communications and Mobile Computing Pub Date : 2021-01-05 , DOI: 10.1155/2021/6694729
Jiayong Zhong 1 , Xiaofu Xiong 1
Affiliation  

The existing cloud storage methods cannot meet the delay requirements of intelligent devices in the power distribution Internet of Things (IoT), and it is difficult to ensure the data security in the complex network environment. Therefore, a data Security Storage method for the power distribution IoT is proposed. Firstly, based on the “cloud tube edge end” power distribution IoT structure, a cloud edge collaborative centralized distributed joint control mode is proposed, which makes full use of the collaborative advantages of cloud computing and edge computing to meet the real-time requirements. Then, a distributed data storage method based on the Kademlia algorithm is proposed, and the homomorphic encryption and secret sharing algorithm are used to store the data in the cloud as ciphertext and perform data query directly on the ciphertext. Finally, considering the heterogeneity of edge nodes, the security protection model of edge nodes based on noncooperative differential game is established, and the algorithm of optimal defense strategy of edge nodes is designed to ensure the security of edge nodes. The experimental results show that the proposed method obtained excellent query performance, and the ability to resist network attacks is better than other comparison methods. It can reduce the data storage and query delay and ensure the data security of the system.

中文翻译:

网络物理能源系统中配电物联网的数据安全存储方法

现有的云存储方法无法满足配电物联网(IoT)中智能设备的延迟要求,在复杂的网络环境中难以保证数据安全。因此,提出了一种用于配电物联网的数据安全存储方法。首先,基于“云管端端”配电物联网结构,提出了一种云边缘协同集中分布式联合控制模式,充分利用云计算和边缘计算的协同优势来满足实时性要求。然后,提出了一种基于Kademlia算法的分布式数据存储方法,并采用同态加密和秘密共享算法将数据作为密文存储在云中,并直接对密文进行数据查询。最后,考虑边缘节点的异构性,建立了基于非合作差分博弈的边缘节点安全保护模型,设计了边缘节点的最优防御策略算法,以保证边缘节点的安全性。实验结果表明,该方法取得了较好的查询性能,并且具有比其他比较方法更好的抗网络攻击能力。它可以减少数据存储和查询延迟,并确保系统的数据安全性。实验结果表明,该方法取得了较好的查询性能,并且具有比其他比较方法更好的抗网络攻击能力。它可以减少数据存储和查询延迟,并确保系统的数据安全性。实验结果表明,该方法取得了较好的查询性能,并且具有比其他比较方法更好的抗网络攻击能力。它可以减少数据存储和查询延迟,并确保系统的数据安全性。
更新日期:2021-01-05
down
wechat
bug