ISSN 1000-1239 CN 11-1777/TP


    Default Latest Most Read
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Block Chain Based Data Security Sharing Network Architecture Research
    Wang Jiye, Gao Lingchao, Dong Aiqiang, Guo Shaoyong, Chen Hui, Wei Xin
    Journal of Computer Research and Development    2017, 54 (4): 742-749.   DOI: 10.7544/issn1000-1239.2017.20160991
    Abstract3959)   HTML74)    PDF (3104KB)(2626)       Save
    For the process of internal and external data sharing in energy Internet enterprises, there are centralized deployment, non-uniqueness identification, and theft or tampering to affect the efficiency of data asset sharing. Based on the character of decentralization, peer-to-peer and difficult-to-change, we construct data security sharing network architecture base on block chain to support exchange information for internal and inter-enterprise. It is to achieve a trusted network environment with the distributed storage. Firstly, we propose a block chain based data security sharing network architecture, including decentralized data unified naming technology, authorized data distributed storage and data distribution protocol. Secondly, an open data index naming structure (ODIN) is designed, including single-level basic ODIN and multi-level extended ODIN. And then ODIN operation mechanism is described. Thirdly, we design the decentralized DNS (domain name sever) resolution module with ODIN. Then the part of system function is realized. And we analyze its performance.
    Related Articles | Metrics
    Threat Propagation Based Security Situation Quantitative Assessment in Multi-Node Network
    Tian Jianwei, Tian Zheng, Qi Wenhui, Hao Hanyong, Li Renfa, Li Xi, Qiao Hong, Xue Haiwei
    Journal of Computer Research and Development    2017, 54 (4): 731-741.   DOI: 10.7544/issn1000-1239.2017.20161015
    Abstract1415)   HTML8)    PDF (2598KB)(882)       Save
    The traditional security situation assessment mainly focuses on the small scale network system, which has neglected the risk correlation among network nodes. In view of the complex network structure in the energy Internet, a quantitative assessment for multi-node network security situation based on threat propagation is proposed. This method firstly gives concept and definition of network nodes in energy Internet, and models the energy Internet network structure by using graph theory; secondly, quantitative method is proposed based on threat propagation probability to calculate the node security situation, also a multi-node weighting method called LR-NodeRank is put forward to evaluate fusion network security situation. Finally, a security situation improvement based on the simplest threat graph is proposed to calculate the network border needed to reinforce. Experimental results show that the proposed method can accurately assess the security situation of multi-node network, and can also effectively carry out the border connections.
    Related Articles | Metrics
    Multi-Agent Multi-Criticality Scheduling Based Self-Healing System of Power Grid
    Wang Juanjuan, Wang Hongan
    Journal of Computer Research and Development    2017, 54 (4): 720-730.   DOI: 10.7544/issn1000-1239.2017.20161026
    Abstract1376)   HTML12)    PDF (3421KB)(781)       Save
    With the rapid development of smart grid, information and new energy technology, the concept of energy Internet has gained great research attention most recently, and the trend of flexible and secure coordination between “generation-grid-load-energy storage” has become a really hot and interesting topic. From smart grid to energy Internet, the self-healing system of power grid is always a safety-critical real-time system. When fault happens, great amount of correlated and deadline-constrained operations need to be executed timely so as to the recovery of the system. Based on the multi-agent architecture of the self-healing system of power grid towards energy Internet, a multi-agent real-time multi-criticality scheduling task model and scheduling approach are proposed in this paper. Fault chain and secure tree with deadline constraints are added into the self-healing process in the power grid in order to protect the system from unpredicted sequences of fault dealing operations,resulting in less successive fault occurrence with security assurance. The experimental results show that our proposed method can effectively increase the success ratio of self-healing tasks by average 17.74% and lower the successive fault occurrence ratio by average 7.72%, which is promising to be applied in the self-healing system of power grid for security concern.
    Related Articles | Metrics
    Energy Efficiency Optimization Based on Storage Scheduling and Multi-Source Power Supplying of Data Center in Energy Internet
    Sun Chunlei, Wen Xiangming, Lu Zhaoming, Sheng Wanxing, Zeng Nan, Li Yang
    Journal of Computer Research and Development    2017, 54 (4): 703-710.   DOI: 10.7544/issn1000-1239.2017.20161016
    Abstract1357)   HTML4)    PDF (2800KB)(820)       Save
    Recently, the optimization problem of energy efficiency for data centers has been paid widespread attention. In this paper, we investigate this problem in a new idea under the background of energy Internet, where subscribers are equipped with storage and smart energy management devices, especially for industry subscribers. In addition, there are large scale of clean energy generation and electricity-sale companies, which means that industry subscribers can purchase electricity from multi-source suppliers to cut down their energy cost and improve their energy efficiency based on real-time price, pollution index, etc. It is assumed that data centers always attempt to choose cheaper and cleaner energy in each hour and buy more electricity in valley hours with lower price compared to peak hours to reduce the energy cost. Thus both of pollution index function and real-time price are adopted to formulate the multi-source energy-purchasing cost. And both of the operation cost and potential cost are adopted to model the charging and discharging cost of storage devices, or storage cost for short. Based on this, the energy cost model with storage is formulated and is compared with the one without storage. Then we give the related algorithm to solve these problems and give the analysis of performance. Simulation results confirm that the proposed model can greatly reduce the daily cost of electricity and encourage the utilization of renewable energy resources by choosing optimal strategies of energy source selecting and daily storage scheduling.
    Related Articles | Metrics
    Key Techniques for Phased and Multi-Mode Hybrid Simulation of Multi-Energy Micro Grid
    Zhang Shuqing, Tang Shaopu, Zhu Yaping, Yu Siqi, Sun Yubo
    Journal of Computer Research and Development    2017, 54 (4): 683-694.   DOI: 10.7544/issn1000-1239.2017.20161011
    Abstract1322)   HTML7)    PDF (3785KB)(765)       Save
    Energy Internet has become a powerful driving force of energy production and consumption revolution allover China. Two core technologies, including smart micro grid and multi-energy complementary, are widely integrated into micro energy Internet. Energy sources, loads and storages of various energy forms are constructed and integrated as a whole, which imply complicated energy conversion, transmission mechanism and complex operation characteristics. However, the existing simulation means of various energy systems always only aim at one independent energy system, thus they cannot be directly applied to the coupling and interaction mechanism of different energy forms, or to the analysis of operation and control characteristics of multi-energy system. This paper has summarized the current development and achievement of simulations of micro-grids and other types of energy systems, which are the foundations of multi-energy system simulation. Then it has analyzed and summarized the basic characteristics of multi-energy system, intricacies and main points to implement its simulation. Furthermore, phased and multi-mode hybrid simulation is designed and presented with its key techniques. By the hybrid simulation, it is expected to make full use of the foundations of the existing energy equipment-system simulation models and algorithms and to establish dynamic and transient simulation of multi-energy system. The application of the phased and multi-mode hybrid simulation in the multi energy system is illustrated by a typical example of cold combined heat and power system.
    Related Articles | Metrics
    Performance Evaluation of Power Quantum Secure Communication System for Energy Internet
    Chen Zhiyu, Gao Dequan, Wang Dong, Li Guochun, Wei Xiaojing
    Journal of Computer Research and Development    2017, 54 (4): 711-719.   DOI: 10.7544/issn1000-1239.2017.20161024
    Abstract1295)   HTML6)    PDF (3216KB)(1069)       Save
    With the rapid development of energy Internet, more and more distributed energy systems are accessed. The demand for network and information security of energy information is increasingly urgent. Theoretically, quantum secure communication can achieve unconditional and absolute security in information communication. However, its application in power grid is still in the stage of exploring. This paper focuses on the performance evaluation of power quantum secure communication in the global energy Internet field. Firstly, considering the diversity of the grid business scenario and transmission loss, the system architecture diagram of power quantum secure communication is proposed. Then, through the simulation of the power communication transmission environment and actual business scenario, indicators that quantum channel and data exchange channel of power quantum secure communication system are evaluated in six aspects (e.g. distance loss, pendulum loss and connection loss). Finally, the feasibility and security of quantum secure communication technology in power communication field are verified by simulation experiments, and the development of energy Internet can be effectively assured.
    Related Articles | Metrics
    The Energy Access Administration Research Based on a Linkage Routing Network
    Ren Guang, Yang Gang, Hua Haochen, Yang Fang, Bai Cuifen, Qiu Zhongtao, Cao Junwei
    Journal of Computer Research and Development    2017, 54 (4): 695-702.   DOI: 10.7544/issn1000-1239.2017.20161022
    Abstract1225)   HTML3)    PDF (2289KB)(894)       Save
    Aiming at the application requirement of the energy router in the energy Internet demonstration projects, this paper proposes one type of chain routing network and an edge diffusion way, thus it can solve the energy management issue in the user’s level in the demonstration projects. Firstly, based on introducing a single energy router, a chain routing network which consists of several energy routers is designed, and completes the regional division for the whole demonstration project. Then the edge diffusion strategy is given, in which a single energy router is regarded as a decision center, which can realize the power balance by passing the power’s imbalance to an adjacent energy router, until the external low-voltage grids. Finally, a communication network and an application scenario are respectively illustrated, so the feasibility of the chain routing network in the demonstration projects can be shown preliminarily.
    Related Articles | Metrics
    Journal of Computer Research and Development    2017, 54 (): 681-682.  
    Abstract505)   HTML0)    PDF (405KB)(627)       Save
    Related Articles | Metrics