In the process of multi-party collaborative data sharing, the power grid supply chain system often faces security risks such as data islands, privacy leakage and tampering risks. It is urgent to establish a security management mechanism that takes into account efficiency and credibility. To this end, this study proposes a power grid supply chain data security management model that integrates a dual alliance chain architec-ture and an improved Boneh-Goh-Nissim algorithm. This model uses the business chain and the chain of custody to separate transaction processing and audit supervision, and ensures the traceability and non-repudiation of data interaction through cross-chain communication; it also completes multi-party security calculation and privacy protection of aggregated data based on the improved Boneh-Goh-Nissim algo-rithm. Experimental results show that in a typical power grid supply chain scenario, the model's data integrity verification rate reaches 99.2%, the average transaction delay is 1.36 seconds, the encryption and decryption time is reduced by 27.4% compared with the traditional algorithm, and the system throughput is increased to 1,450 transactions per second. The research results have effectively improved the data security and operating efficiency of the power grid supply chain system under cross-domain sharing conditions, and provided a scalable technical path for supply chain collaboration and big data governance in the power industry.
Wang L, Wang Y. Supply chain financial service management system based on block chain IoT data sharing and edge computing. Alexandria engineering journal. 2022 Jan 1;61(1):147–58.
2.
Ting L, Khan M, Sharma A, Ansari MD. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing. Journal of Intelligent Systems. 2022 Feb 2;31(1):221–36.
3.
Pragadeswaran S, Subha N, Varunika S, Moulishwar P, Sanjay R, Karthikeyan P, et al. Energy Efficient Routing Protocol for Security Analysis Scheme Using Homomorphic Encryption. Archives for Technical Sciences. 2024 Oct;31(2):148-58.
4.
Li KC, Shi RH, Guo WP, Wang PB, Shao BS. Dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. IEEE Transactions on Dependable and Secure Computing. 2023 Jun 21;21(4):1652-64.
5.
Sharma A, Pandey A. Design and Implementation of a Secure Cloud-Based Storage System. International Academic Journal of Science and Engineering. 2024;11(4):22–6.
6.
Zhonghua C, Goyal SB, Rajawat AS. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. The Journal of Supercomputing. 2024 Jan;80(2):1396–425.
7.
Aravind B, Harikrishnan S, Santhosh G, Vijay JE, Saran Suaji T. An efficient privacy-aware authentication framework for mobile cloud computing. International Academic Journal of Innovative Research. 2023;10(1):1-7.
8.
Tulkinbekov K, Kim DH. Blockchain-enabled approach for big data processing in edge computing. IEEE Internet of Things Journal. 2022 Mar 21;9(19):18473–86.
9.
Prabu K, Sudhakar P. An automated intrusion detection and prevention model for enhanced network security and threat assessment. International Journal of Computer Networks and Applications. 2023 Aug;10(4):621.
10.
Zhang S, Wang Z, Zhou Z, Wang Y, Zhang H, Zhang G, et al. Blockchain and federated deep reinforcement learning based secure cloud-edge-end collaboration in power IoT. IEEE Wireless Communications. 2022 Apr;29(2):84–91.
11.
Lee HS, Lim S, Yie I, Yun A. On insecure uses of BGN for privacy preserving data aggregation protocols. Fundamenta Informaticae. 2023 Mar 15;188(2):91-101.
12.
Hu C, Liu Z, Li R, Hu P, Xiang T, Han M. Smart contract assisted privacy-preserving data aggregation and management scheme for smart grid. IEEE Transactions on Dependable and Secure Computing. 2023 Aug 1;21(4):2145-61.
13.
Zhang QY, Wang K. Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing. International Journal of Network Security. 2024 Nov 1;26(6):943–56.
14.
Benamara O, Merazka F. A new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysis. Journal of Discrete Mathematical Sciences and Cryptography. 2022 Aug 18;25(6):1633–47.
15.
Zhao M, Ding Y, Tang S, Liang H, Wang H. A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer-to-Peer Networking and Applications. 2023 Jan;16(1):142–55.
16.
Zeng Z, Liu Y, Chang L. A robust and optional privacy data aggregation scheme for fog-enhanced IoT network. IEEE Systems Journal. 2022 Jun 3;17(1):1110-20.
17.
Zhang X, Huang C, Xu C, Zhang Y, Zhang J, Wang H. Key-leakage resilient encrypted data aggregation with lightweight verification in fog-assisted smart grids. IEEE Internet of Things Journal. 2020 Dec 29;8(10):8234–45.
18.
Huang X, Wu Y, Liang C, Chen Q, Zhang J. Distance-aware hierarchical federated learning in blockchain-enabled edge computing network. IEEE Internet of Things Journal. 2023 Jun 28;10(21):19163-76.
19.
Zhang S, Zhang Y, Wang B. Antiquantum privacy protection scheme in advanced metering infrastructure of smart grid based on consortium blockchain and RLWE[J]. IEEE Systems Journal, 2023, 17(2): 3036-3046.
20.
Munjal K, Bhatia R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex & Intelligent Systems. 2023 Aug;9(4):3759–86.
21.
Tomar A, Tripathi S. Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. Cluster Computing. 2022 Feb;25(1):451–68.
22.
Vangala A, Das AK, Chamola V, Korotaev V, Rodrigues JJ. Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. Cluster Computing. 2023 Apr;26(2):879–902.
23.
Almasabi S, Shaf A, Ali T, Zafar M, Irfan M, Alsuwian T. Securing smart grid data with blockchain and wireless sensor networks: A collaborative approach. IEEE Access. 2024 Feb 2;12:19181-98.
24.
Li D, Gong Y. The design of power grid data management system based on blockchain technology and construction of system security evaluation model. Energy Reports. 2022 Oct 1;8:466–79.
25.
Yu P, Huang W, Li Z. A Secure, lightweight, and verifiable data aggregation scheme for smart grids. Peer-to-Peer Networking and Applications. 2025 Jun;18(3):1–1.
26.
Mahato GK, Chakraborty SK. Securing edge computing using cryptographic schemes: a review. Multimedia Tools and Applications. 2024 Apr;83(12):34825–48.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.