Search

CN-122027188-A - Power data tamper-resistant integrity protection method, system, equipment and storage medium based on blockchain

CN122027188ACN 122027188 ACN122027188 ACN 122027188ACN-122027188-A

Abstract

The invention relates to the technical field of block chain data security, in particular to a block chain-based power data tamper-proof integrity protection method, a system, equipment and a storage medium. The method comprises the steps of receiving multi-source data streams from an electric power system, classifying according to the sensitivity level and sampling frequency of data, representing each data record as a node in a directed acyclic graph, establishing a directed edge representing data reference relation carrying a digital signature between the nodes, calculating the confirmation degree of a current node through the confirmation degree of a precursor node and the dynamic weight of the edge, selecting a verification path with highest confirmation degree from candidate paths by adopting Markov chain Monte Carlo sampling, calculating the confidence degree of a transaction node based on the historical transaction number of the reference, converting the validity of the electric power transaction into a verification circuit defined by constraint coefficients for extremely high frequency data or low sensitive data, generating a verification key and a verification key, and generating zero knowledge proof for the data meeting constraint conditions by using the verification key by data source equipment.

Inventors

  • LI QINMAN
  • ZHANG XIXIANG
  • LI JIN
  • LIAO WEIMING
  • Zhou Digui
  • WU GANGLIN

Assignees

  • 广西电网有限责任公司

Dates

Publication Date
20260512
Application Date
20251216

Claims (10)

  1. 1. The block chain-based power data tamper-resistant integrity protection method is characterized by comprising the steps of receiving a multi-source data stream from a power system and classifying according to the sensitivity level and the sampling frequency of the data; for high-frequency data or high-sensitivity data, each data record is represented as a node in a directed acyclic graph, the nodes comprise data hash values, time stamps and data source public keys, directed edges carrying digital signatures are established between the nodes to represent data reference relations, the confirmation degree of the current node is calculated through the confirmation degree of a precursor node and the dynamic weight of the edges, a certification path with the highest confirmation degree is selected from candidate paths by adopting Markov chain Monte Carlo sampling, and the confidence degree of a transaction node is calculated based on the referenced historical transaction quantity; For extremely high frequency data or low sensitivity data, the validity of the power transaction is converted into a verification circuit defined by constraint coefficients, a certification key and a verification key are generated, and the data source equipment generates zero knowledge certification for the data meeting constraint conditions by using the certification key; And verifying the digital signature corresponding to the data source public key, verifying the zero knowledge proof by using the verification key, calculating a risk score by combining the transaction confidence coefficient and the verification result, writing the data into the blockchain memory card when the risk score is lower than a safety threshold, triggering an alarm when the risk score exceeds the threshold, and encrypting and preserving the abnormal data.
  2. 2. The method for tamper-resistant integrity protection of blockchain-based power data of claim 1, wherein establishing a directed edge representation data reference relationship between nodes carrying a digital signature comprises, Mapping each received power data record into a node in the graph, and storing the data fingerprint calculated through a hash algorithm, the time stamp generated by the data and the public key of the data source equipment in the node; Establishing a directed edge between a current node and a previous node, and signing associated information of the edge by using a private key of data source equipment; and assigning a weight value for the edge according to the historical credit score and the data freshness of the data source, wherein the credit score is obtained by calculating the accuracy of the data reported by the data source.
  3. 3. The method for protecting the tamper-resistant integrity of the power data based on the blockchain as defined in claim 2, wherein the step of calculating the confirmation of the current node through the confirmation of the precursor nodes and the dynamic weight of the edges comprises traversing all precursor nodes referenced by the current node; And accumulating the product of the confirmation degree of the precursor node and the edge weight to obtain the confirmation degree of the current node.
  4. 4. The method for protecting the tamper-proof integrity of the power data based on the blockchain is characterized in that Markov chain Monte Carlo sampling is adopted to select a verification path with highest verification degree from candidate paths, the method comprises the steps of maintaining a plurality of candidate paths formed by connecting transaction nodes in time sequence, calculating selection probability of each path based on historical transaction data, updating probability distribution through iteration, calculating comprehensive values of verification degrees of all nodes on each path, counting the proportion of the number of paths with the comprehensive values of the verification degrees higher than a preset threshold value to the number of total sampling paths, and selecting the path with the highest verification degree as the verification path when the proportion exceeds a consensus threshold value.
  5. 5. The method for protecting the tamper-resistant integrity of the power data based on the blockchain, as set forth in claim 4, wherein the data source device generates zero-knowledge proof of the data meeting the constraint condition by using the proof key, and comprises the steps of constructing a verification circuit consisting of mathematical constraint units by taking the electric quantity of the power transaction, a timestamp and a device identifier as input variables, wherein each constraint unit describes algebraic relations among the variables through constraint coefficients; The data acquisition terminal uses the certification key to generate certification for private data conforming to the constraint of the verification circuit.
  6. 6. The method for protecting the tamper-resistant integrity of the blockchain-based power data of claim 5, wherein the calculating the risk score by combining the transaction confidence and the verification result comprises verifying a digital signature by using a data source public key, wherein the signature verification result is 1 if the verification passes, and is 0 if the verification passes; and calculating a risk score according to the transaction confidence, the weighted combination of the signature verification result and the proof verification result, and distributing a weight coefficient for each verification item, wherein the sum of the weight coefficients is 1.
  7. 7. The method for tamper-resistant integrity protection of blockchain-based power data as in claim 6, wherein receiving the multi-source data stream from the power system comprises performing a deduplication operation on the received raw data, filtering duplicate records, filling in missing values, calculating local information entropy of data points, calculating an anomaly score according to a deviation of the local entropy from a normal entropy level, and marking data points with anomaly scores exceeding a threshold as anomalies.
  8. 8. The block chain-based power data tamper-resistant integrity protection system is characterized by further comprising a data receiving and classifying module, a data receiving and classifying module and a data processing module, wherein the data receiving and classifying module is used for receiving multi-source data streams from a power system and classifying the multi-source data streams according to the sensitivity level and the sampling frequency of the data; The directed acyclic graph evidence storage module is used for constructing an evidence storage network consisting of nodes and directed edges for high-frequency data or high-sensitivity data, calculating the node confirmation degree, selecting an evidence storage path by adopting Markov chain Monte Carlo sampling, and calculating the transaction confidence degree; The zero knowledge proof module is used for constructing a verification circuit for extremely high frequency data or low sensitive data and generating zero knowledge proof; and the integrity verification module is used for verifying the digital signature and the zero knowledge proof, calculating a risk score, and executing data uplink evidence storage or triggering alarm according to the scoring result.
  9. 9. A computer device comprises a memory and a processor, wherein the memory stores a computer program, and the computer program is characterized in that the processor realizes the steps of the block chain-based power data tamper-proof integrity protection method in any one of claims 1-7 when executing the computer program.
  10. 10. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the steps of the blockchain-based power data tamper-resistant integrity protection method of any of claims 1-7.

Description

Power data tamper-resistant integrity protection method, system, equipment and storage medium based on blockchain Technical Field The invention relates to the technical field of block chain data security, in particular to a block chain-based power data tamper-proof integrity protection method, a system, equipment and a storage medium. Background In an electric power system, if sensitive data such as a dispatching instruction of electric power data, electricity consumption information, equipment running state and the like are tampered in the transmission or storage process, the safety of an electric power grid control system is directly threatened, equipment misoperation, user privacy leakage and even large-scale electric power grid safety accidents are caused, while the traditional data integrity protection mainly relies on digital signature and hash verification, and the authenticity of the data is guaranteed to a certain extent, but corresponding performance limitation exists, so that the integrity and tamper resistance of the electric power data in the production, transmission, storage and use processes become main problems. The traditional scheme mainly relies on a single trust node to carry out data verification and storage, once the central node is attacked or fails, the integrity protection capability of the whole system is weakened, single-point failure risks exist, the centralized verification is difficult in audit tracing, modification records of historical data are difficult to preserve, evidence collection and responsibility identification lack corresponding data support, and the traditional scheme usually adopts a plaintext transmission or simple encryption mode when sensitive data is processed, so that the integrity test cannot be completed on the premise of guaranteeing data privacy. In the prior art, the block chain is also applied to the integrity protection of the power data by virtue of the performances of decentralization, non-falsification of data and whole-course traceability, however, the traditional block chain adopts a linear chain structure, and is difficult to meet the real-time verification requirement of massive power data due to the fact that the performance bottleneck is faced in the high-concurrency and low-delay practical application scene of a power system, transaction data stored on the block chain are completely disclosed and transparent, the special requirement of the power industry on sensitive information protection cannot be met, and the balance among storage overhead, verification efficiency and privacy protection is difficult to realize by the traditional block chain scheme. Disclosure of Invention The present invention has been made in view of the problems occurring in the prior art. Therefore, the invention aims to solve the problems of breaking through the performance limit of the traditional block chain single chain structure, completing the data integrity verification on the premise of not revealing the original sensitive data, designing the light consensus and verification, establishing a multi-dimensional risk quantification evaluation system and the like. In order to solve the technical problems, the invention provides the following technical scheme: In a first aspect, an embodiment of the present invention provides a blockchain-based power data tamper-resistant integrity protection method, including receiving a multi-source data stream from a power system, classifying according to a sensitivity level and a sampling frequency of the data; for high-frequency data or high-sensitivity data, each data record is represented as a node in a directed acyclic graph, the nodes comprise data hash values, time stamps and data source public keys, directed edges carrying digital signatures are established between the nodes to represent data reference relations, the confirmation degree of the current node is calculated through the confirmation degree of a precursor node and the dynamic weight of the edges, a certification path with the highest confirmation degree is selected from candidate paths by adopting Markov chain Monte Carlo sampling, and the confidence degree of a transaction node is calculated based on the referenced historical transaction quantity; For extremely high frequency data or low sensitivity data, the validity of the power transaction is converted into a verification circuit defined by constraint coefficients, a certification key and a verification key are generated, and the data source equipment generates zero knowledge certification for the data meeting constraint conditions by using the certification key; And verifying the digital signature corresponding to the data source public key, verifying the zero knowledge proof by using the verification key, calculating a risk score by combining the transaction confidence coefficient and the verification result, writing the data into the blockchain memory card when the risk score is lower than a safety thresho