李韫莛,邱朝明,梁东贵.基于联盟链和属性加密的电力大数据安全共享技术研究[J].电测与仪表,2026,63(4):99-111. LI Yunting,QIU Chaoming,LIANG Donggui.Research on Secure Sharing Technology of Power Big Data Based on Consortium Chain and Attribute Encryption[J].Electrical Measurement & Instrumentation,2026,63(4):99-111.
基于联盟链和属性加密的电力大数据安全共享技术研究
Research on Secure Sharing Technology of Power Big Data Based on Consortium Chain and Attribute Encryption
Power big data covers all links such as power generation, transmission, transformation, distribution and consumption. The data has the characteristics of wide data sources, complex data structure, high real-time requirements and containing a large amount of sensitive information. During the sharing process, once the data is leaked, it will not only infringe upon users" privacy, but also threaten the safe and stable operation of the power system. It has significantly increased the difficulty of sharing power big data. Traditional methods usually complete encryption directly before data sharing, but they cannot ensure the security of the encryption environment for power big data, resulting in the problem of theft still occurring during the sharing process. Therefore, a secure sharing technology for power big data based on consortium chain and attribute encryption is proposed. Establish a power big data sharing platform based on alliance chain; On the consortium chain, use attribute encryption methods to set encryption access policies for power big data. The consortium chain can provide a trusted environment where all parties can record the sharing process and usage of data through blockchain, ensuring that only users who meet specific attribute conditions can access the corresponding power data; Based on Lagrange interpolation and Shamir secret sharing scheme, power data is segmented and distributed to ensure the security and privacy of power data during the sharing process, while improving the efficiency and flexibility of power data access. The experimental results indicate that the proposed data security sharing method is more suitable for practical applications and has higher security.