Data Transactions in Energy Internet: Architecture and Key Technologies

被引:0
|
作者
Guo Q. [1 ,2 ]
Wang B. [1 ,2 ]
Tian N. [1 ,2 ]
Sun H. [1 ,2 ]
Wen B. [3 ]
机构
[1] Department of Electrical Engineering, Tsinghua University, Beijing
[2] State Key Laboratory of Control and Simulation of Power Systems and Generation Equipments, Tsinghua University, Beijing
[3] Information Center Guangdong Electric Power Company, Guangzhou
关键词
Data pricing; Data privacy protection; Data right confirmation; Data transactions; Data value evaluation; Energy internet;
D O I
10.19595/j.cnki.1000-6753.tces.200257
中图分类号
学科分类号
摘要
With the development of big data technology, data have become an increasingly important special asset. However, the protection of privacy by many members in the energy Internet makes the data in the energy Internet cut off from each other and unable to circulate, which seriously limits the potential of data to be converted into actual economic value. Under the background of the gradual maturity of energy Internet, the high integration of energy and data information will greatly promote the coordinated development of them. Therefore, it is of great strategic significance for the development of energy Internet to build a complete data transaction system architecture and study the related technology implementation. This paper summarizes the data transaction architecture in the energy Internet, and comprehensively surveys and discusses many problems in data transaction, such as data value evaluation, data pricing, data right confirmation, data privacy protection, etc. Besides, this paper explains the relationships between these problems and gets their preliminary solutions based on information theory, game theory, block chain technology, and other existing theories or technologies, which will guide the formation and promotion of data transaction technology in the energy Internet. © 2020, Electrical Technology Press Co. Ltd. All right reserved.
引用
收藏
页码:2285 / 2295
页数:10
相关论文
共 54 条
  • [41] Li Zhaocan, Wang Liming, Ge Sijiang, Et al., Big data plain text watermarking based on orthogonal coding, Computer Science, 46, 12, pp. 148-154, (2019)
  • [42] Zhang Jiale, Zhao Yanchao, Chen Bing, Et al., Survey on data security and privacy-preserving for the research of edge computing, Journal on Communications, 39, 3, pp. 1-21, (2018)
  • [43] Song Lei, Luo Qiliang, Luo Yi, Et al., Encryption on power systems real-time data communication, Automation of Electric Power Systems, 28, 14, pp. 76-81, (2004)
  • [44] (2006)
  • [45] Fang Liang, Yin Lihua, Guo Yunchuan, Et al., A survey of key technologies in attribute-based access control scheme, Chinese Journal of Computers, 40, 7, pp. 1680-1698, (2017)
  • [46] Wang Baoyi, Qiu Sugai, Zhang Shaomin, A credibility-based access control model in dispatching automation system, Automation of Electric Power Systems, 36, 12, pp. 76-81, (2012)
  • [47] Gupta A, Harinarayan V, Rajaraman A., Virtual database technology, Proceedings 14th International Conference on Data Engineering, pp. 297-301, (1998)
  • [48] Huo Chengyi, Research on key technologies of cloud computing data privacy protection, Journal of Information Security Research, 5, 12, pp. 1106-1109, (2019)
  • [49] (2013)
  • [50] Luo Yonglong, Xu Zhiyun, Huang Liusheng, Secure multi-party statistical analysis problems and their applications, Computer Engineering and Applications, 41, 24, pp. 141-143, (2005)