In the process of multi-party collaborative data sharing, the power grid supply chain system often faces security risks such as data islands, privacy leakage and tampering risks. It is urgent to establish a security management mechanism that takes into account efficiency and credibility. To this end, this study proposes a power grid supply chain data security management model that integrates a dual alliance chain architec-ture and an improved Boneh-Goh-Nissim algorithm. This model uses the business chain and the chain of custody to separate transaction processing and audit supervision, and ensures the traceability and non-repudiation of data interaction through cross-chain communication; it also completes multi-party security calculation and privacy protection of aggregated data based on the improved Boneh-Goh-Nissim algo-rithm. Experimental results show that in a typical power grid supply chain scenario, the model's data integrity verification rate reaches 99.2%, the average transaction delay is 1.36 seconds, the encryption and decryption time is reduced by 27.4% compared with the traditional algorithm, and the system throughput is increased to 1,450 transactions per second. The research results have effectively improved the data security and operating efficiency of the power grid supply chain system under cross-domain sharing conditions, and provided a scalable technical path for supply chain collaboration and big data governance in the power industry.
Wang L, Wang Y. Supply chain financial service management system based on block chain IoT data sharing and edge computing. Alexandria Engineering Journal. 2022;61(1):147–58.
2.
Ting L, Khan M, Sharma A, Ansari MD. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing. Journal of Intelligent Systems. 2022;31(1):221–36.
3.
Pragadeswaran S, Subha N, Varunika S, Moulishwar P, Sanjay R, Karthikeyan P, et al. ENERGY EFFICIENT ROUTING PROTOCOL FOR SECURITY ANALYSIS SCHEME USING HOMOMORPHIC ENCRYPTION. Archives for Technical Sciences. 2024;31(2):148–58.
4.
Li KC, Shi RH, Guo WP, Wang PB, Shao BS. Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice. IEEE Transactions on Dependable and Secure Computing. 2024;21(4):1652–64.
5.
Sharma A. Design and Implementation of a Secure Cloud-Based Storage System. International Academic Journal of Science and Engineering. 2024;11(4):22–6.
6.
Zhonghua C, Goyal S, Rajawat A. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. The Journal of Supercomputing. 2024;(2):1396–425.
7.
B A, S H, G S, J.E V, T SS. An Efficient Privacy - Aware Authentication Framework for Mobile Cloud Computing. International Academic Journal of Innovative Research. 2023;10(1):1–7.
8.
Tulkinbekov K, Kim D. Blockchain-enabled approach for big data processing in edge computing. IEEE Internet of Things Journal. 2022;(19):18473–86.
9.
Prabu K, Sudhakar P. An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment. International Journal of Computer Networks and Applications. 2023;10(4):621.
10.
Zhang S, Wang Z, Zhou Z, Wang Y, Zhang H, Zhang G, et al. Blockchain and federated deep reinforcement learning based secure cloud-edge-end collaboration in power IoT. 2022;(2):84–91.
11.
Lee HS, Lim S, Yie I, Yun A. On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols. Fundamenta Informaticae. 2023;188(2):91–101.
12.
Hu C, Liu Z, Li R, Hu P, Xiang T, Han M. Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. IEEE Transactions on Dependable and Secure Computing. 2024;21(4):2145–61.
13.
Zhang Q, Wang K. Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing. International Journal of Network Security. 2024;(6):4.
14.
Benamara O, Merazka F. A new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysis. Journal of Discrete Mathematical Sciences and Cryptography. 2020;25(6):1633–47.
15.
Zhao M, Ding Y, Tang S, Liang H, Wang H. A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer-to-Peer Networking and Applications. 2023;(1):142–55.
16.
Zeng Z, Liu Y, Chang L. A Robust and Optional Privacy Data Aggregation Scheme for Fog-Enhanced IoT Network. IEEE Systems Journal. 2023;17(1):1110–20.
17.
Zhang X, Huang C, Xu C, Zhang Y, Zhang J, Wang H. Key-leakage resilient encrypted data aggregation with lightweight verification in fog-assisted smart grids. IEEE Internet of Things Journal. 2020;(10):8234–45.
18.
Zhang X, Huang C, Xu C, Zhang Y, Zhang J, Wang H. Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids. IEEE Internet of Things Journal. 2021;8(10):8234–45.
19.
Zhang S, Zhang Y, Wang B. Antiquantum Privacy Protection Scheme in Advanced Metering Infrastructure of Smart Grid Based on Consortium Blockchain and RLWE. IEEE Systems Journal. 2023;17(2):3036–46.
20.
Munjal K, Bhatia R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex & Intelligent Systems. 2023;(4):3759–86.
21.
Tomar A, Tripathi S. Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. Cluster Computing. 2022;(1):451–68.
22.
Vangala A, Das A, Chamola V, Korotaev V, Rodrigues J. Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. Cluster Computing. 2023;(2):879–902.
23.
Almasabi S, Shaf A, Ali T, Zafar M, Irfan M, Alsuwian T. Securing Smart Grid Data With Blockchain and Wireless Sensor Networks: A Collaborative Approach. IEEE Access. 2024;12:19181–98.
24.
Li D, Gong Y. The design of power grid data management system based on blockchain technology and construction of system security evaluation model. Energy Reports. 2022;8:466–79.
25.
Yu P, Huang W, Li Z. A Secure, lightweight, and verifiable data aggregation scheme for smart grids. Peer-to-Peer Networking and Applications. 2025;(3):1–1.
26.
Mahato G, Chakraborty S. Securing edge computing using cryptographic schemes: a review. Multimedia Tools and Applications. 2024;(12):34825–48.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.