Data Analysis and Applications

Power marketing big data access control scheme based on a multi-level strategy

  • Yue ZHANG ,
  • Xiuxia TIAN ,
  • Yuncheng YAN ,
  • Guanyu LU
Expand
  • 1. College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 200090, China
    2. College of Energy and Mechanical Engineering, Shanghai University of Electric Power, Shanghai 200090, China

Received date: 2021-08-09

  Online published: 2021-09-28

Abstract

With the rapid proliferation of technology, the degree of informatization in the financial industry continues to increase. The integration of financial data with power marketing platforms, moreover, is accelerating the interaction between users and power marketing platform data (e.g., basic customer details, energy metering data, electricity fee recovery data). The increased interaction, however, leads to higher data transmission leakage which can result in incorrect formulation of power usage strategies and electricity prices. Therefore, to satisfy the security requirements for data interaction in power marketing systems and ensure economic benefits for the power company, we propose an Ordered Binary Decision Diagram (OBDD) based on Ciphertext Policy Attribute Based Encryption (CP-ABE). This multi-level access approach can reduce the autonomy of shared data authority control in the remote terminal unit and improve the efficiency of data access. In addition, based on security and performance analysis, the proposed access control scheme is both more efficient and more secure than other schemes.

Cite this article

Yue ZHANG , Xiuxia TIAN , Yuncheng YAN , Guanyu LU . Power marketing big data access control scheme based on a multi-level strategy[J]. Journal of East China Normal University(Natural Science), 2021 , 2021(5) : 169 -184 . DOI: 10.3969/j.issn.1000-5641.2021.05.015

References

1 张鄞吴. 金融科技中数据安全的挑战与对策分析. 科学与信息化, 2020, (3): 140- 141.
2 KHALID H, SHOBOLE A. Existing developments in adaptive smart grid protection: A review. Electric Power Systems Research, 2021, 191, 106901.
3 叶婉琦. 大数据环境下电网信息安全技术分析. 电子技术与软件工程, 2020, 185 (15): 239- 240.
4 周一波, 李战, 庞潇. 电力企业金融业务信息安全保障体系建设研究 [C]//2012电力行业信息化年会论文集. 中国电机工程学会电力信息化专业委员会, 2012: 5.
5 LI L, GU T, CHANG L, et al. A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access, 2017,
6 EDEMACU K, JANG B, KIM J W. Collaborative ehealth privacy and security: An access control with attribute revocation based on OBDD access structure. IEEE Journal of Biomedical and Health Informatics, 2020,
7 袁小芳. 一种基于用户角色—权限分级的访问控制模型. 矿业工程研究, 2003, 25 (4): 30- 32.
8 肖宝亮, 顾春华, 高小伍, 等. 基于分级角色的访问控制. 华东理工大学学报 (社会科学版), 2006, (11): 1327- 1330.
9 SAHAI A, WATERS B. Fuzzy identity-based encryption [C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark. 2005: 457–473.
10 GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]//Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA. 2006: 89–98.
11 邓宇乔, 杨波, 唐春明, 等. 基于密文策略的流程加密研究. 计算机学报, 2019, 42 (5): 1063- 1075.
12 王冬, 李文, 徐高升, 等. 一种大数据环境下的数据隐私保护策略及其实践. 微型电脑应用, 2013, 30 (6): 6- 8.
13 康丽珠, 黄青松, 刘利军. 一种改进的基于角色的分级授权访问控制模型. 昆明理工大学学报(理工版), 2009, 34 (1): 39- 42.
14 郭军. 基于角色的访问控制分级授权管理的研究 [D]. 西安: 西安电子科技大学, 2012.
15 李莉, 史国振, 王璇, 等. 共享文件加密存储分级访问控制方案的实现. 网络与信息安全学报, 2016, 2 (7): 26- 32.
16 林曦, 韩益亮. 基于属性加密的共享文件分级访问控制方案. 燕山大学学报, 2017, 41 (5): 450- 456.
17 WAN Z, LIU J, DENG R H. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics and Security, 2012, 7 (2): 743- 754.
18 AKINYELE J A, GARMAN C, MIERS I, et al. Charm: A framework for rapidly prototyping cryptosystems. Journal of Cryptographic Engineering, 2013, 3 (2): 111- 128.
19 黄宁玉, 宋式斌, 孙浩志. 高校网上支付系统的访问控制模型研究及系统实现. 华东师范大学学报(自然科学版), 2015, (S1): 340- 344.
20 李家治. 云存储中基于属性的密文检索与访问控制 [D]. 上海: 华东师范大学, 2015.
Outlines

/