Integrated Intelligent Energy ›› 2024, Vol. 46 ›› Issue (5): 73-80.doi: 10.3969/j.issn.2097-0706.2024.05.009

• Network Security Protection • Previous Articles     Next Articles

Security protection for photovoltaic data acquisition and storage

LIU Xu1(), LU Jun1(), GONG Gangjun1,*(), HOU Zanyu2, ZHANG Chunmeng2, LIU Bo3   

  1. 1. Beijing Engineering Research Center of Energy Electric Power Information Security(North China Electric Power University),Beijing 102206,China
    2. State Grid Liaoning Electric Power Supply Company Limited,Shenyang 110004,China
    3. Kangping County Power Supply Branch, State Grid Shenyang Power Supply,Kangping 110500,China
  • Received:2024-03-18 Revised:2024-04-07 Published:2024-05-25
  • Contact: GONG Gangjun E-mail:guatai315@163.com;lujun@ncepu.edu.cn;gong@ncepu.edu.cu
  • Supported by:
    National Key R&D Program of China(2022YFB3105101)

Abstract:

With the energy structure transformation and upgrading, photovoltaic power, a representative emerging new energy, gets increasing attention. However, with the continuous development of photovoltaic systems, the security protection of photovoltaic data faces great challenges. Based on this, a security protection method for photovoltaic data collection and storage is proposed. First,a two-way trusted authentication technology is implemented at the photovoltaic collection end to ensure that the collected photovoltaic data is complete and reliable. Secondly, in terms of photovoltaic data storage, distributed transmission protocols and consistent hashing algorithm are used to complete grouping storage of photovoltaic data. In order to prevent photovoltaic data leakage and illegal theft, a trusted security architecture and a privacy protection method are used to protect stored photovoltaic data. Finally, the feasibility of the method is verified through simulation examples.

Key words: energy, photovoltaic system, photovoltaic data, trusted computing, two-way authentication, data storage, safety protection

CLC Number: