期刊文献+

基于区块链和CP-ABE的电力工程检测数据安全共享方法 被引量:8

Security Sharing Scheme of Power Engineering Detection Data Based on Blockchain and CP-ABE
下载PDF
导出
摘要 针对电力工程质量管理中见证取样和检测数据在建设单位和施工单位等多部门之间共享过程中,存在不可信、难溯源和存储效率低等问题,文章提出了一种电力工程检测数据共享方案,方案中各参与单位组成联盟区块链,工程检测数据被加密后进行链上和链下混合存储,采用密文策略属性加密能有效地实现对密文数据跨单位安全共享,采用元数据与属性加密结合能够解决存储效率低的问题,也能解决溯源和隐私保护同时兼顾的矛盾。 Aiming at the problems of unreliability,difficult traceability and low storage efficiency in the sharing process of witness sampling and detecting data among the units of the proprietors and constructors in power engineering quality management,this paper proposes a power engineering detecting data sharing scheme,In the scheme,all participating units form an alliance blockchain,and the engineering detection data are encrypted for hybrid storage on and off the chain.Ciphertext-policy attribute-based encryption(CP-ABE)is used to realize the safe sharing of ciphertext data across units effectively.The combination of metadata and attribute encryption can solve the problem of low storage efficiency and the contradiction between traceability and privacy protection.
作者 罗仲达 李容嵩 彭凌烟 张博 蒋成 张定军 LUO Zhongda;LI Rongsong;PENG Lingyan;ZHANG Bo;JIANG Cheng;ZHANG Dingjun(Construction Branch,State Grid Hunan Electric Power Co.,Ltd.,Changsha 410007,Hunan Province,China;State Grid Hunan Electric Power Co.,Ltd.,Changsha 410007,Hunan Province,China)
出处 《电力信息与通信技术》 2023年第3期80-86,共7页 Electric Power Information and Communication Technology
基金 国网湖南省电力有限公司科技项目资助“工程检测业务存证与溯源区块链平台关键技术研究”(5216JF210002)。
关键词 电力工程检测 区块链 属性加密 数据共享 power engineering detection blockchain attribute encryption data sharing
  • 相关文献

参考文献9

二级参考文献115

  • 1董克峰.建筑工程质量监督管理及对策研究[J].住宅与房地产,2020,0(3):140-140. 被引量:2
  • 2曾华,刘春玲,戴会生.委托检验存在问题及改进要点探讨[J].商品混凝土,2020,0(5):1-4. 被引量:2
  • 3周鑫,邓莉荣,王彬,潘昭光.基于联盟链的去中心化能源交易系统[J].全球能源互联网,2019,0(6):556-565. 被引量:17
  • 4冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 5Cachin C, Keidar I, Shraer A. Trusting the cloud [ J ]. ACM SIGACT News,2009,40( 2 ) :81 -86.
  • 6Sahai A, Waters B. Fuzzy identity-based encryption [ M ]. Heidelberg : Springer, 2005:457 - 473.
  • 7Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C ]// The 13th ACM Conference on Computer and Communications Security. New York: ACM,2006 : 89 - 98.
  • 8Bethencourt J Sahai A Waters B. Ciphertext-policy attribute- based encryption [ C]//IEEE Symposium on Security and Privacy. Piscataway IEEE,2007:321 - 334.
  • 9Hohenberger S, Waters B. Attribute-based encryption with fast decryption [ M]. Berlin : Springer,2013 : 162 - 179.
  • 10Douceur J R, Adya A, Bolosky W J, et ai. Reclaiming space from duplicate files in a serverless distributed file system [ C]// The 22nd International Conference on Distributed Computing Systems. Piscataway : IEEE,2002:617 - 624.

共引文献110

同被引文献88

引证文献8

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部