Data Encryption Mechanism for Power Internet of Things Based on Data Characteristics

Xiuming Yu,Ping Zhou,Shaoyong Guo,Zijian Chang
DOI: https://doi.org/10.1109/iciscae52414.2021.9590815
2021-01-01
Abstract:In order to solve the problem of easy leakage and tampering in the use of power terminal data, this paper proposes a blockchain-based data encryption control model, which includes four parts: blockchain nodes, data owners, data users, and cloud servers. Through the mutual cooperation of blockchain nodes, power terminals and cloud servers, the problem of leakage or tampering of power terminal data information is effectively solved. In order to solve the problem of low performance of power terminals, this paper proposes a data encryption mechanism for power Internet of Things based on data characteristics. The encryption mechanism divides the data encryption process into two processes: pre-encryption and full encryption. In the pre-encryption stage, the power terminal performs a simple initial encryption of the data to ensure the security of the data during the transmission of the data from the power terminal to the cloud server. In the complete encryption phase, an encryption algorithm with a higher security level is adopted to improve the security of the data storage process. In the performance analysis part, it analyzes the existing algorithms from the two dimensions of data encryption time and data decryption time, and it verifies that the algorithm in this paper has improved the efficiency of the use of power terminal data.
What problem does this paper attempt to address?