论文:2022,Vol:40,Issue(5):1188-1194
引用本文:
何佩, 郑文斌, 池晓金, 蔡怡挺, 姚红静. 电力物联网终端存储设备身份认证与数据保护方法研究[J]. 西北工业大学学报
HE Pei, ZHENG Wenbin, CHI Xiaojin, CAI Yiting, YAO Hongjing. A method for identity authentication and data protection of terminal storage devices of power internet of things[J]. Journal of Northwestern Polytechnical University

电力物联网终端存储设备身份认证与数据保护方法研究
何佩1, 郑文斌2, 池晓金2, 蔡怡挺2, 姚红静1
1. 西北工业大学 计算机学院, 陕西 西安 710072;
2. 国网浙江省电力有限公司温州供电公司, 浙江 温州 325000
摘要:
针对电力物联网智能终端与数据中心通信链路低带宽、高延迟的特点,结合泛在物联的网络环境中数据同步和共享的安全需求,以实现通信资源受限情况下尽量减少更新文件传输代价为目标,设计了一种实现轻量级信息动态安全存储与验证的方法,确保了终端存储设备的信息安全。该方法通过动态证明存储技术对数据中心存储密态文件完整性进行验证,并且支持对密态文件的动态修改处理和增量更新。对于修改的文件,仅传输修改部分的数据块到数据中心完成更新,无需重新上传整个文件,有效降低了验证的计算开销和传输的通信开销。
关键词:    电力物联网    终端    身份认证    数据保护    动态证明存储    安全性   
A method for identity authentication and data protection of terminal storage devices of power internet of things
HE Pei1, ZHENG Wenbin2, CHI Xiaojin2, CAI Yiting2, YAO Hongjing1
1. School of Computer Science, Northwestern Polytechnical University, Xi'an 710072, China;
2. State Grid Wenzhou Electric Power Co., Ltd, Wenzhou 325000, China
Abstract:
The communication link between the intelligent terminal of the power internet of things and its data center has the characteristics of low bandwidth and high delay. Combined with the security requirements of data synchronization and sharing in the ubiquitous internet of things network environment, based on the goal of minimizing the transmission cost of updated files under the conditions of limited communication resources, this paper designs a method for dynamic secure storage and verification of lightweight information to realize the information security of a terminal storage device. The method verifies the integrity of secret files stored in the data center through dynamic proof of storage (DyPoS) technology and supports their dynamic modification. At the same time, it supports the incremental update of secret files. For modified files, only modified data blocks are transmitted to the data center to complete the update without the need to upload the whole file again, thus effectively reducing the calculation overhead of verification and the communication overhead of transmission.
Key words:    power internet of things    terminal    identity authentication    data protection    dynamic proof of storage    security   
收稿日期: 2021-12-18     修回日期:
DOI: 10.1051/jnwpu/20224051188
基金项目: 国网浙江省电力有限公司科技项目(5211WZ1900RU)、JCKY项目和中央高校基本科研业务费(D500022035)资助
通讯作者:     Email:
作者简介: 何佩(1991—),西北工业大学博士研究生,主要从事数字化系统智能运维研究。e-mail:1059293443@qq.com
相关功能
PDF(2640KB) Free
打印本文
把本文推荐给朋友
作者相关文章
何佩  在本刊中的所有文章
郑文斌  在本刊中的所有文章
池晓金  在本刊中的所有文章
蔡怡挺  在本刊中的所有文章
姚红静  在本刊中的所有文章

参考文献:
[1] LI Xin, LAI Ji, CHEN Zhongtao, et al. Intelligent fault detection system for state grid IoT equipment based on edge computing[C]//2019 IEEE 3rd International Electrical and Energy Conference, 2019:1434-1439
[2] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007:598-609
[3] ARMKNECHT F, BOHLI J M, KARAME G O, et al. Outsourced proofs of retrievability[C]//Proceedings of the 21st ACM Conference on Computer and Communications Security, 2014:831-843
[4] SHACHAM H, WATERS B. Compact proofs of retrievability[C]//Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, 2008
[5] DODIS Y, VADHAN S, WICHS D. Proofs of retrievability via hardness amplification[C]//Proceedings of the 6th Theory of Cryptography Conference, 2009
[6] BOWERS K D, JUELS A, OPREA A. HAIL:A high-availability and integrity layer for cloud storage[C]//Proceedings of 14th ACM Conference on Computer and Communications Security, 2009:187-198
[7] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//IEEE International Conference on Computer Communications, 2010:1-9
[8] ATENIESE G, BURNS R, CURTMOLA R, et al. Remote data checking using provable data possession[J]. ACM Transactions on Information and System Security, 2011, 14(1):1-34
[9] XU J, CHANG E C. Towards efficient proofs of retrievability[C]//Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012:79-80
[10] CHEN J, PENG Y, DU R, et al. Regeneratingcodes-based efficient remote data checking and repairing in cloud storage[C]//Proceedings of 2015 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2015:143-150
[11] SHI E, STEFANOV E, PAPAMANTHOU C. Practical dynamic proofs of retrievability[C]//Proceedings of 20th ACM Conference on Computer and Communications Security, 2013:325-336
[12] REN Z, WANG L, WANG Q, et al. Dynamic proofs of retrievability for coded cloud storage systems[J]. IEEE Trans on Serv Comput, 2018, 11(4):685-698