首页 | 本学科首页   官方微博 | 高级检索  
     检索      

电力终端基于信任和信誉的灵活数据访问控制
引用本文:杨云,傅宏,王凌宇.电力终端基于信任和信誉的灵活数据访问控制[J].重庆大学学报(自然科学版),2020,43(8):117-126.
作者姓名:杨云  傅宏  王凌宇
作者单位:国网重庆市电力公司 信息通信分公司, 重庆 400014;国网重庆市电力公司 客户服务中心, 重庆 400000
基金项目:国家电网重庆市电力公司电力缴费终端安全防护技术研究项目(SGCQKH00JSJS1800056)。
摘    要:为了解决当前电力缴费终端身份认证和访问控制中存在的口令嗅探、重放攻击、越权操作等问题,提出了一种基于信任和信誉的灵活数据访问控制方案,结合云计算技术将其应用到电力终端设备数据访问控制中。该方案通过使用基于属性的加密和代理重加密、终端设备评估的信任级别和由多个信誉中心生成的用户信誉来共同控制电力终端的数据访问,将用户信任级别和信誉评估的概念集成到加密系统中,以支持各种控制方案和访问策略。通过对所提出方案的安全性和性能分析,证明该方案访问控制的细粒度,数据保密性良好,通信开销灵活可控,计算复杂度低,减少了电力终端设备的负担。

关 键 词:访问控制  云计算  数据安全  电力终端安全
收稿时间:2020/3/5 0:00:00

Flexible data-access control based on trust and reputation of power terminals
YANG Yun,FU Hong,WANG Lingyu.Flexible data-access control based on trust and reputation of power terminals[J].Journal of Chongqing University(Natural Science Edition),2020,43(8):117-126.
Authors:YANG Yun  FU Hong  WANG Lingyu
Institution:Information & Telecommunication Branch, State Grid Chongqing Electric Power Company, Chongqing 400014, P. R. China;Customer Service Center, State Grid Chongqing Electric Power Company, Chongqing 400000, P. R. China
Abstract:In order to solve the problems of password sniffing, replay attack and unauthorized operation in the current power payment terminal identity authentication and access control, in this paper a flexible data-access control scheme based on trust and reputation is proposed, which is applied to the power-terminal equipment data-access control in combination with cloud computing technology. The scheme controls the data access of the power terminal jointly by using attribute-based encryption and proxy re-encryption, the trust level evaluated by the terminal device and the user reputation generated by multiple reputation centers, and integrates the concept of user trust level and reputation evaluation into the encryption to support various control schemes and access strategies. Through the security and performance analysis of the proposed scheme, the fine-grained access control is proved, the data confidentiality is good, the communication overhead is flexible and controllable, the computational complexity is low, and the burden of the power terminal equipment is reduced.
Keywords:access control  cloud computing  data security  power terminal security
本文献已被 CNKI 等数据库收录!
点击此处可从《重庆大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号