期刊文献+

面向云计算的智能电网数据安全策略分析 被引量:2

Analysis of Data Security Strategies for Smart Grid Based on Cloud Computing
在线阅读 下载PDF
导出
摘要 阐述云计算技术在智能电网中的应用,针对智能电网数据安全问题,提出面向云计算的智能电网数据安全策略,包括数据加密、实时监测和响应、备份和恢复策略、漏洞管理和应急响应的安全策略。 This paper describes the application of cloud computing technology in smart grids.In response to data security issues in smart grids,a cloud computing oriented smart grid data security strategy is proposed,including data encryption,real-time monitoring and response,backup and recovery strategies,vulnerability management,and emergency response security strategies.
作者 张荻 孙蓉 ZHANG Di;SUN Rong(State Grid Hubei Electric Power Co.,Ltd.Technical Training Center(Wuhan Electric Power Vocational and Technical College),Hubei 430079,China)
出处 《集成电路应用》 2023年第12期89-91,共3页 Application of IC
关键词 计算机技术 智能电网 数据安全策略 computer technology smart grid data security strategy
作者简介 张荻,国网湖北省电力有限公司技术培训中心(武汉电力职业技术学院),工程师,硕士研究生,研究方向:信息技术、软件工程。
  • 相关文献

参考文献9

二级参考文献101

  • 1王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 2徐胜超,方华亮,曹芳.志愿者计算模型在电力系统潮流计算中的运用[J].计算机工程与应用,2007,43(9):189-192. 被引量:5
  • 3Weiss A. Computing in the clouds[J].networker, 2007,11(4):16-25.
  • 4John Rittinghouse, James Ransome "Cloud Computing: Implementation, Management, and Securiw'" [M], 2009 March.
  • 5张唯维.云计算用户数据传输与存储安全方案研究[D].北京:北京邮电大学,2011.
  • 6P. Barreto, B. Libert, N. McCullagh, J. Quisquater, "Efficient and provably-secure identity-based signatures and sign cryption from bilinear maps", Proc. Crypto, pp. 515-532, 2005.
  • 7B. Wang, B. Li, H. Li, "Oruta: Privacy-Preserving Public Audi- ting for Shared Data in the Cloud", Proc. IEEE CLOUD, pp. 295- 302, 2012.
  • 8P. McDaniel, S. McLaughlin, "Security and privacy challenges in the smart grid", IEEE Security & Privacy, vol. 7, no. 3, pp. 75-77,2009.
  • 9P. Paillier, "Public-key cryptosystems based on composite degree re- siduosity classes", The 17th International Conference on Theory and Application of Cryptographic Techniques, Springer, pp. 223- 238, 1999.
  • 10T. Ge, S. Zdonik. Answering Aggregation Queries in a Secure Sys- tem Model. In Prec. of the 30th conference on Very Large Databases, Vienna, Austria, 2007: 519-530.

共引文献107

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部