Visible to the public Research on Sensitivity Audit Scheme of Encrypted Data in Power Business

TitleResearch on Sensitivity Audit Scheme of Encrypted Data in Power Business
Publication TypeConference Paper
Year of Publication2020
AuthorsXu, P., Chen, L., Jiang, Y., Sun, Q., Chen, H.
Conference Name2020 IEEE International Conference on Energy Internet (ICEI)
KeywordsBusiness, ciphertext data, compositionality, cryptography, data information, Data models, data protection, data resource, Data security, data security protection, data storage, decryption key, Electricity supply industry, encrypted data, Encryption, encryption audits, Frequency measurement, Human Behavior, informatization construction, known plaintext attacks, plaintext attacks, power business data sensitivity, power engineering computing, Power industry, power production, power system economics, power system security, Predictive Metrics, pubcrawl, Resiliency, Scalability, Security Audits, security demonstration, sensitive data audit, Sensitivity, sensitivity audit scheme, Standard Network Data Security System, Standards, transparent encryption, Weight measurement
Abstract

With the rapid progress of informatization construction in power business, data resource has become the basic strategic resource of the power industry and innovative element in power production. The security protection of data in power business is particularly important in the informatization construction of power business. In order to implement data security protection, transparent encryption is one of the fifteen key technical standards in the Construction Guideline of the Standard Network Data Security System. However, data storage in the encrypted state is bound to affect the security audit of data to a certain extent. Based on this problem, this paper proposes a scheme to audit the sensitivity of the power business data under the protection of encryption to achieve an efficient sensitivity audit of ciphertext data with the premise of not revealing the decryption key or data information. Through a security demonstration, this paper fully proves that this solution is secure under the known plaintext attacks.

DOI10.1109/ICEI49372.2020.00010
Citation Keyxu_research_2020