skip to main content
10.1145/3377170.3377225acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicitConference Proceedingsconference-collections
research-article

A Master-Slave Chain Architecture Model for Cross-Domain Trusted and Authentication of Power Services

Published: 20 March 2020 Publication History

Abstract

With the gradual complexity of China's electricity consumption information, the current power business is diversified, and multi-service integration has increasingly become the direction of power business development. However, the problem of converged business trust and mutual trust has not been effectively solved, and it will bring huge economic losses to the power grid. Therefore, while effectively isolating multiple services, how to ensure multi-service integration and credibility is an urgent security issue. As a decentralized distributed storage peer-to-peer trusted network, blockchain is highly transparent, decentralized, trusted, unchangeable, and anonymous. This paper introduces a master-slave chain architecture based on blockchain for cross-domain trusted authentication of power services. It uses the slave chain to isolate multiple services. The backbone ensures the trust of the business and minimizes the security risk of untrustworthiness.

References

[1]
R. Sharma and S. Chakraborty, "BlockAPP: Using Blockchain for Authentication and Privacy Preservation in IoV," 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 2018, pp. 1--6.
[2]
Yuanyu, Zhang, et al. "Smart Contract-Based Access Control for the Internet of Things." IEEE Internet of Things Journal (2018):1--1.
[3]
Novo, and Oscar. "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT." IEEE Internet of Things Journal (2018):1--1.
[4]
Xinping Min, et al. "Multi Center Dynamic Consensus Mechanism of License Chain." Journal of Computer Science v.41; no.425.05 (2018): 39--54.
[5]
Bing Li, Wangzhang Cao, Jie Zhang, et al. Multi Energy System Trading System and Key Technologies Based on Heterogeneous Blockchain [J]. Automation of Electric Systems, 2018.
[6]
M. Ma, G. Shi and F. Li, "Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario," in IEEE Access, vol. 7, pp. 34045--34059, 2019.

Cited By

View all
  • (2021)A Cross-domain Authentication Scheme Based on Zero-Knowledge ProofAlgorithms and Architectures for Parallel Processing10.1007/978-3-030-95388-1_43(647-664)Online publication date: 3-Dec-2021
  • (2021)A novel decentralized cross‐domain identity authentication protocol based on blockchainTransactions on Emerging Telecommunications Technologies10.1002/ett.4377Online publication date: 20-Oct-2021

Index Terms

  1. A Master-Slave Chain Architecture Model for Cross-Domain Trusted and Authentication of Power Services

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIT '19: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
    December 2019
    601 pages
    ISBN:9781450376631
    DOI:10.1145/3377170
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shanghai Jiao Tong University: Shanghai Jiao Tong University
    • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
    • University of Malaya: University of Malaya

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 March 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Blockchain
    2. CBFT
    3. Master-slave chain

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICIT 2019
    ICIT 2019: IoT and Smart City
    December 20 - 23, 2019
    Shanghai, China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)A Cross-domain Authentication Scheme Based on Zero-Knowledge ProofAlgorithms and Architectures for Parallel Processing10.1007/978-3-030-95388-1_43(647-664)Online publication date: 3-Dec-2021
    • (2021)A novel decentralized cross‐domain identity authentication protocol based on blockchainTransactions on Emerging Telecommunications Technologies10.1002/ett.4377Online publication date: 20-Oct-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media