综合智慧能源 ›› 2024, Vol. 46 ›› Issue (5): 73-80.doi: 10.3969/j.issn.2097-0706.2024.05.009

• 网络安全防护 • 上一篇    下一篇

面向光伏数据采集与存储的安全防护方法

柳旭1(), 陆俊1(), 龚钢军1,*(), 侯昝宇2, 张春萌2, 刘博3   

  1. 1.北京市能源电力信息安全工程技术研究中心(华北电力大学),北京 102206
    2.国网辽宁省电力有限公司, 沈阳 110004
    3.国网沈阳供电公司 康平县供电分公司, 辽宁 康平 110500
  • 收稿日期:2024-03-18 修回日期:2024-04-07 出版日期:2024-05-25
  • 通讯作者: *龚钢军(1974),男,教授,博士,从事区块链技术应用、能源电力信息安全等方面的研究,gong@ncepu.edu.cu
  • 作者简介:柳旭(1999),男,硕士生,从事配电网与数据资产安全等方面的研究,guatai315@163.com
    陆俊(1976),男,高级工程师,副教授,博士,从事配电网、数据安全等方面的研究,lujun@ncepu.edu.cn
  • 基金资助:
    国家重点研发计划项目(2022YFB3105101)

Security protection for photovoltaic data acquisition and storage

LIU Xu1(), LU Jun1(), GONG Gangjun1,*(), HOU Zanyu2, ZHANG Chunmeng2, LIU Bo3   

  1. 1. Beijing Engineering Research Center of Energy Electric Power Information Security(North China Electric Power University),Beijing 102206,China
    2. State Grid Liaoning Electric Power Supply Company Limited,Shenyang 110004,China
    3. Kangping County Power Supply Branch, State Grid Shenyang Power Supply,Kangping 110500,China
  • Received:2024-03-18 Revised:2024-04-07 Published:2024-05-25
  • Supported by:
    National Key R&D Program of China(2022YFB3105101)

摘要:

随着能源结构的转型升级,光伏作为新兴能源受到更多的重视,然而随着光伏系统的不断增加,光伏数据的安全防护面临极大挑战。基于此,提出一种面向光伏数据采集与存储的安全防护方法。首先,在光伏采集端实行可信双向认证技术,保证采集到的光伏数据完整、可靠;其次,在光伏数据存储方面,采用分布式传输协议和哈希一致性检测方法完成光伏数据的分组存储;然后,为防止光伏数据泄露、非法窃取,采用可信安全架构和隐私保护方法对已存储光伏数据进行安全防护;最后,通过仿真算例验证方法的可行性。

关键词: 能源, 光伏系统, 光伏数据, 可信计算, 双向认证, 数据存储, 安全防护

Abstract:

With the energy structure transformation and upgrading, photovoltaic power, a representative emerging new energy, gets increasing attention. However, with the continuous development of photovoltaic systems, the security protection of photovoltaic data faces great challenges. Based on this, a security protection method for photovoltaic data collection and storage is proposed. First,a two-way trusted authentication technology is implemented at the photovoltaic collection end to ensure that the collected photovoltaic data is complete and reliable. Secondly, in terms of photovoltaic data storage, distributed transmission protocols and consistent hashing algorithm are used to complete grouping storage of photovoltaic data. In order to prevent photovoltaic data leakage and illegal theft, a trusted security architecture and a privacy protection method are used to protect stored photovoltaic data. Finally, the feasibility of the method is verified through simulation examples.

Key words: energy, photovoltaic system, photovoltaic data, trusted computing, two-way authentication, data storage, safety protection

中图分类号: