论文部分内容阅读
针对如何在用户隐私不被泄露的情况下实现智能电网的电能灵活调控问题,提出一种具有隐私保护的智能电网多级用户电量聚合控制方案(PPUAC).在该方案中,建立了一种基于行政区域划分的二级网关系统模型.例如,一个地区被划分为了l个区域,每个区域有m个社区,每个社区有n个用户.那么它对应的二级网关系统模型为,该地区部署一个控制中心,每个区域部署一个区域网关,控制中心与l个区域网关进行信息交互;每个社区部署一个社域网关,一个区域网关与它管辖范围内的m个社域网关进行信息交互.二级网关实现用户电量的二次聚合.二次聚合的结果使得区域用电总量隐藏在了一个符合霍纳规则(Horner Rule)的一元多项式中,其中每项系数对应区域内每个社区的用电总量.随后利用霍纳法则对二次聚合数据进行解析,解析出多项式的每项系数,使得方案可以获得各社区、各区域乃至整个地区的用电总量,可以实现针对整个地区的全局电量调控和对某个或某些区域的局部电量调控.同时,方案结合了同态加密技术和双线性对技术,实现了机密性和用户的隐私保护.此外,为了提高方案的性能,采用了一种高效抗伪造批验证方法,执行一次验证操作就可以完成对多个用户数据的验证.性能分析表明该方案在实际应用中具有高效的计算性能和通信性能.
To solve the problem of how to control the smart grid power intelligently without user privacy being leaked, this paper proposes a multi-level subscriber power aggregation control scheme (PPUAC) with privacy protection. In this scheme, For example, a region is divided into l regions, each region has m communities, each has n users, then its corresponding second-level gateway system model is that the region Deploys a control center, each area deploys a regional gateway, and the control center exchanges information with l regional gateways; each community deploys a social area gateway, and a regional gateway exchanges information with m social area gateways within its jurisdiction The secondary gateway realizes the secondary aggregation of users’ electricity.The result of secondary aggregation makes the total amount of regional electricity hidden in a unary polynomial that conforms to the Horner Rule, where each coefficient corresponds to each community in the region Of the total amount of electricity.And then use the Horner method to analyze the data of the second polymerization, analyze each coefficient of the polynomial, making the program can get the community, Regional and even the entire area of the total electricity consumption can be achieved for the entire region of the overall power regulation and control of a certain area or some of the local power regulation at the same time, the program combines the homomorphic encryption technology and bilinear pairing technology to achieve Confidentiality and user privacy protection.In addition, in order to improve the performance of the scheme, a highly efficient anti-counterfeit batch verification method is used to perform a verification operation to verify the data of multiple users.Performance analysis shows that the scheme is practical in practical application In the highly efficient computing performance and communication performance.