Design and Implementation of an SGX Based Electricity Information Collection and Management System
DOI:
https://doi.org/10.4108/ew.5756Keywords:
SGX, electricity information, information collection and management, block chain, webAbstract
With the rapid growth of the number and scale of smart grid users, traditional data encryption transmission methods can no longer meet the performance requirements of data aggregation. In response, a power consumption information collection and management system based on SGX software protection extension is proposed. The system mainly consists of three parts: user electricity data acquisition terminal, SGX data security processing and distributed storage module on the chain, and data monitoring management display platform. The user electricity data collection terminal collects electricity data from various buildings, residences, rooms, and other smart meters, analyzes and uploads it. After calling the trusted function of SGX technology, it enters the security zone provided by SGX for data processing. Finally, the data security processing results and data are uploaded to the blockchain for storage. In order to visually display user electricity usage data, an intelligent monitoring platform for user electricity collection and management has been established. This system can reduce the workload of user electricity data collection, ensure the accuracy of data collection, and provide an efficient and highly reliable system platform for user electricity data management.
Downloads
References
Feng Ruiqi, Wang Leilei, Lin Xiang, Xiong Jinbo SGX Based Safety Data Processing Framework for Vehicle Network Road Condition Monitoring [J/OL]. Computer Applications: 1-10 [2023-04-16] http://kns.cnki.net/kcms/detail/51.1307.TP.20220630.1539.008.html.
Liu Mingda, Shi Yijuan, Rao Xiang, Fan Lei A Distributed Privacy Protection Data Search Scheme [J]. Computer Science, 2022,49 (10): 291-296
Ru Sisong Research on Federated Learning Mechanism Based on Centralized Differential Privacy [D]. University of Science and Technology of China, 2022. DOI: 10.27517/dcnki. gzkju. 2022-001302
Jin Cheng Research on Weak Password Monitoring and Publishing Technology for Privacy Protection [D]. University of Electronic Science and Technology, 2022. DOI: 10.27005/d. cnki. gdzku. 2022-003211
Zhang Xiaoting, Li Xiaofeng, Fang Shiyu Design and Implementation of a Tea Garden Ecological Monitoring System Based on SGX [J]. Instrument Technology, 2021 (05): 1-4+34. DOI: 10.19432/j.cnki.issn1006-2394.2021.05.001
Wei Wentao Privacy protected malware detection based on SGX [D]. Xi'an University of Electronic Science and Technology, 2021. DOI: 10.27389/d.cnki. gxadu.2021.003547
Wang Jiamin Privacy Protection Scheme for Cloud Resource Auction Based on SGX [D]. Xi'an University of Electronic Science and Technology, 2020. DOI: 10.27389/dcnki. gxadu.2020.001887
Sun Si Design and Implementation of a Privacy Protection Scheme for Face Recognition Based on SGX [D]. Guangzhou University, 2018
Wang Jinwen, Jiang Yong, Li Qi, Yang Yuan Overview of SGX Technology Application Research [J]. Network New Media Technology, 2017,6 (05): 3-9
Haonan Sun; Rongyu He; Yong Zhang; Ruiyun Wang; Wai Hung Ip; Kai Leung Yung; "ETPM: A Trusted Cloud Platform Enclave TPM Scheme Based On Intel SGX Technology", SENSORS (BASEL, SWITZERLAND), 2018. (IF: 3)
Roland Kunkel; Do Le Quoc; Franz Gregor; Sergei Arnautov; Pramod Bhatotia; Christof Fetzer; "TensorSCONE: A Secure TensorFlow Framework Using Intel SGX", ARXIV-CS.CR, 2019. (IF: 3)
Pengfei Wu; Qingni Shen; R. Deng; Ximeng Liu; Yinghui Zhang; Zhonghai Wu; "ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof", PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND ..., 2019.
Anter Faree; Yongzhi Wang; "Protecting Security-Sensitive Data Using Program Transformation and Intel SGX", 2019 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK ..., 2019.
Ishtiaq Ahmed; Saeid Mofrad; Shiyong Lu; Changxin Bai; Fengwei Zhang; Dunren Che; "SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under Deadline Constraints", 2020 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING ..., 2020. DOI: https://doi.org/10.1109/SCC49832.2020.00023
Zhongqiu Zhang; "Design and Implementation of High-performance Cloud Computing System", 2020 INTERNATIONAL CONFERENCE ON BIG DATA AND ..., 2020. DOI: https://doi.org/10.1109/ICBDIE50010.2020.00106
Yarong Lv; "Analysis of Cloud Computing Security Based on SGX Enhanced National Secret Algorithm", 2021 IEEE ASIA-PACIFIC CONFERENCE ON IMAGE PROCESSING, ..., 2021.
Anter Abdu Alhag Ali Faree; Yongzhi Wang; "Protecting Security-Sensitive Data Using Program Transformation and Trusted Execution Environment", 2021.
Wenxiu Ding; Wei Sun; Zheng Yan; Robert H. Deng; "An Efficient and Secure Scheme of Verifiable Computation for Intel SGX", ARXIV-CS.CR, 2021. DOI: https://doi.org/10.1109/TrustCom56396.2022.00072
Tsu-Yang Wu; Liyang Wang; Xinglan Guo; Yeh-Cheng Chen; S. Chu; "SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing", SUSTAINABILITY, 2022.
Dalton Cézane Gomes Valadares; Matteus Sthefano Leite da Silva; Andrey Elísio Monteiro Brito; Ewerton Monteiro Salvador; "Achieving Data Dissemination With Security Using FIWARE And Intel Software Guard Extensions (SGX)", ARXIV-CS.CR, 2018. (IF: 3) DOI: https://doi.org/10.1109/ISCC.2018.8538590
Do Le Quoc; Franz Gregor; Jatinder Singh; Christof Fetzer; "SGX-PySpark: Secure Distributed Data Analytics", WWW, 2019. (IF: 3) DOI: https://doi.org/10.1145/3308558.3314129
Pengfei Wu; Qingni Shen; R. Deng; Ximeng Liu; Yinghui Zhang; Zhonghai Wu; "ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof", PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND ..., 2019.
Anter Faree; Yongzhi Wang; "Protecting Security-Sensitive Data Using Program Transformation and Intel SGX", 2019 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK ..., 2019. DOI: https://doi.org/10.1109/NaNA.2019.00079
Joao Guerreiro; Rui Moura; João Nuno Silva; "TEEnder: SGX Enclave Migration Using HSMs", COMPUT. SECUR., 2020. DOI: https://doi.org/10.1016/j.cose.2020.101874
Qasmaoui Youssef; Maleh Yassine; Abdelkrim Haqiq; "Secure Software Defined Networks Controller Storage Using Intel Software Guard Extensions", INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND ..., 2020.
Anter Abdu Alhag Ali Faree; Yongzhi Wang; "Protecting Security-Sensitive Data Using Program Transformation and Trusted Execution Environment", 2021.
Munan Yuan; Xiaofeng Li; Xiru Li; Haibo Tan; Jinlin Xu; "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data", ELECTRONICS, 2021. DOI: https://doi.org/10.3390/electronics10131546
Tsu-Yang Wu; Liyang Wang; Xinglan Guo; Yeh-Cheng Chen; S. Chu; "SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing", SUSTAINABILITY, 2022.
Shaohua Li; Kaiping Xue; "SecGrid: A Secure And Efficient SGX-enabled Smart Grid System With Rich Functionalities", ARXIV-CS.CR, 2018. (IF: 3)
Ferdinand Brasser; David Gens; Patrick Jauernig; Ahmad-Reza Sadeghi; Emmanuel Stapf; "SANCTUARY: ARMing TrustZone with User-space Enclaves", PROCEEDINGS 2019 NETWORK AND DISTRIBUTED SYSTEM SECURITY ..., 2019. (IF: 4) DOI: https://doi.org/10.14722/ndss.2019.23448
Roland Kunkel; Do Le Quoc; Franz Gregor; Sergei Arnautov; Pramod Bhatotia; Christof Fetzer; "TensorSCONE: A Secure TensorFlow Framework Using Intel SGX", ARXIV-CS.CR, 2019. (IF: 3)
Juan Wang; Shirong Hao; Yi Li; Zhi Hong; Fei Yan; Bo Zhao; Jing Ma; Huanguo Zhang; "TVIDS: Trusted Virtual IDS with SGX", CHINA COMMUNICATIONS, 2019. DOI: https://doi.org/10.23919/JCC.2019.10.009
Franz Ferdinand Brasser; "Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications", 2020.
Hongliang Liang; Mingyu Li; Yixiu Chen; Lin Jiang; Zhuosi Xie; Tianqi Yang; "Establishing Trusted I/O Paths for SGX Client Systems With Aurora", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020. (IF: 3) DOI: https://doi.org/10.1109/TIFS.2019.2945621
Qasmaoui Youssef; Maleh Yassine; Abdelkrim Haqiq; "Secure Software Defined Networks Controller Storage Using Intel Software Guard Extensions", INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND ..., 2020. DOI: https://doi.org/10.14569/IJACSA.2020.0111060
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 EAI Endorsed Transactions on Energy Web
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.