Abstract
Data security is an important request for electric company that takes responsibility of energy supply for our daily lives. In this paper, a blockchain based framework is proposed to grantee the integrity and authenticity of data transmission in electric company. We employ the blockchain to implement a decentralized system that records every data transformation operations in the network and a double-account strategy is designed to fulfill the anonymity data transmission. We implement the proposed method in a test network with five nodes, and the experimental results indicate that the proposed method is effective to improve the data security in electric company.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Iansiti, M., Lakhani, K.R.: The Truth About Blockchain. Harvard Business Review. Harvard University. Archived from the original on 18 January 2017, January 2017
Albeshri, A., Thayananthan, V.: Analytical techniques for decision making on information security for big data breaches. Int. J. Inf. Technol. Decis. Mak. 17(02), 527–545 (2018)
Yakut, I., Polat, H.: Privacy-preserving SVD-based collaborative filtering on partitioned data. Int. J. Inf. Technol. Decis. Mak. 09(03), 473–502 (2010)
Ou Yang, Y.-P., Shieh, H.-M., Leu, J.-D., Tzeng, G.-H.: A VIKOR-based multiple criteria decision method for improving information security risk. Int. J. Inf. Technol. Decis. Mak. 08(02), 267–287 (2009)
Shankar, S.K., Tomar, A.S., Tak, G.K.: Secure Medical data transmission by using ECC with mutual authentication in WSNs. Procedia Comput. Sci. 70, 455–461 (2015)
Dhivya, P., Karthik, S., Kalaikumaran, T.: SOA based secure data transmission over CMEA protocol in MANET. Procedia Comput. Sci. 47, 434–440 (2015)
Ahmed, M.N., Abdullah, A.H., Chizari, H., Kaiwartya, O.: F3TM: flooding factor based trust management framework for secure data transmission in MANETs. J. King Saud Univ. Comput. Inf. Sci. 29(3), 269–280 (2017)
Suresh, M., Neema, M.: Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things. Procedia Technol. 25, 248–255 (2016)
Wilkinson, S., Boshevski, T., Brandoff, J., Buterin, V.: Storj a peer-to-peer cloud storage network (2014)
Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data Security and Privacy Workshops (SPW). In: 2015 IEEE, pp. 180–184. IEEE (2015)
Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, P., Hu, C., Xu, M. (2020). A Blockchain Based Secure Data Transmission Mechanism for Electric Company. In: He, J., et al. Data Science. ICDS 2019. Communications in Computer and Information Science, vol 1179. Springer, Singapore. https://doi.org/10.1007/978-981-15-2810-1_48
Download citation
DOI: https://doi.org/10.1007/978-981-15-2810-1_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2809-5
Online ISBN: 978-981-15-2810-1
eBook Packages: Computer ScienceComputer Science (R0)