Loading…

Research on Data Security Protection Method Based on Big Data Technology

The construction of power Internet of things is an important development direction of power grid enterprises in the future. Big data not only brings economic and social benefits to the power system industry, but also brings many information security problems. Therefore, in the case of accelerating t...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Donglan, Wang, Rui, Zhang, Hao, Ma, Lei, Liu, Xin, Huang, Hua, Chang, Yingxian
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 83
container_issue
container_start_page 79
container_title
container_volume
creator Liu, Donglan
Wang, Rui
Zhang, Hao
Ma, Lei
Liu, Xin
Huang, Hua
Chang, Yingxian
description The construction of power Internet of things is an important development direction of power grid enterprises in the future. Big data not only brings economic and social benefits to the power system industry, but also brings many information security problems. Therefore, in the case of accelerating the construction of ubiquitous electric Internet of things, it is urgent to standardize the data security protection in the ubiquitous electric Internet of things environment. By analyzing the characteristics of big data in power system, this paper discusses the security risks faced by big data in power system. Finally, we propose some methods of data security protection based on the defects of big data security in current power system. By building a data security intelligent management and control platform, it can automatically discover and identify the types and levels of data assets, and build a classification and grading information base of dynamic data assets. And through the detection and identification of data labels and data content characteristics, tracking the use of data flow process. So as to realize the monitoring of data security state. By protecting sensitive data against leakage based on the whole life cycle of data, the big data security of power grid informatization can be effectively guaranteed and the safety immunity of power information system can be improved.
doi_str_mv 10.1109/ICCSN49894.2020.9139118
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9139118</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9139118</ieee_id><sourcerecordid>9139118</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-4df919768a9bc7aff2dfaa9bcfb437c8f33aa76d73e5194b4fd9170a20b43ba13</originalsourceid><addsrcrecordid>eNotj81OAjEUhauJiYg8gQvnBQZ72zJtlzKKkOBPBNfkTnvL1CBjZupi3l4IrM5Jvi8nOYzdAx8DcPuwKMvVm7LGqrHggo8tSAtgLtgNaGHAGpjAJRsIpUVulLHXbNR135xzKKCQWg_Y_JM6wtbVWbPPnjBhtiL318bUZx9tk8ileACvlOrGZ1PsyB_Fadye5DW5et_smm1_y64C7joanXPIvmbP63KeL99fFuXjMo-Cy5QrHyxYXRi0ldMYgvABjz1USmpngpSIuvBa0gSsqlTwFjRHwQ-8QpBDdnfajUS0-W3jD7b95nxc_gPJk03O</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on Data Security Protection Method Based on Big Data Technology</title><source>IEEE Xplore All Conference Series</source><creator>Liu, Donglan ; Wang, Rui ; Zhang, Hao ; Ma, Lei ; Liu, Xin ; Huang, Hua ; Chang, Yingxian</creator><creatorcontrib>Liu, Donglan ; Wang, Rui ; Zhang, Hao ; Ma, Lei ; Liu, Xin ; Huang, Hua ; Chang, Yingxian</creatorcontrib><description>The construction of power Internet of things is an important development direction of power grid enterprises in the future. Big data not only brings economic and social benefits to the power system industry, but also brings many information security problems. Therefore, in the case of accelerating the construction of ubiquitous electric Internet of things, it is urgent to standardize the data security protection in the ubiquitous electric Internet of things environment. By analyzing the characteristics of big data in power system, this paper discusses the security risks faced by big data in power system. Finally, we propose some methods of data security protection based on the defects of big data security in current power system. By building a data security intelligent management and control platform, it can automatically discover and identify the types and levels of data assets, and build a classification and grading information base of dynamic data assets. And through the detection and identification of data labels and data content characteristics, tracking the use of data flow process. So as to realize the monitoring of data security state. By protecting sensitive data against leakage based on the whole life cycle of data, the big data security of power grid informatization can be effectively guaranteed and the safety immunity of power information system can be improved.</description><identifier>EISSN: 2472-8489</identifier><identifier>EISBN: 1728198151</identifier><identifier>EISBN: 9781728198156</identifier><identifier>DOI: 10.1109/ICCSN49894.2020.9139118</identifier><language>eng</language><publisher>IEEE</publisher><subject>Big Data ; data life cycle ; Data security ; data security protection ; Power grids ; Power measurement ; Power system dynamics ; Sensitivity ; smart grid ; Software ; ubiquitous power Internet of things</subject><ispartof>2020 12th International Conference on Communication Software and Networks (ICCSN), 2020, p.79-83</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9139118$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,23910,23911,25119,27904,54534,54911</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9139118$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Ma, Lei</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Huang, Hua</creatorcontrib><creatorcontrib>Chang, Yingxian</creatorcontrib><title>Research on Data Security Protection Method Based on Big Data Technology</title><title>2020 12th International Conference on Communication Software and Networks (ICCSN)</title><addtitle>ICCSN</addtitle><description>The construction of power Internet of things is an important development direction of power grid enterprises in the future. Big data not only brings economic and social benefits to the power system industry, but also brings many information security problems. Therefore, in the case of accelerating the construction of ubiquitous electric Internet of things, it is urgent to standardize the data security protection in the ubiquitous electric Internet of things environment. By analyzing the characteristics of big data in power system, this paper discusses the security risks faced by big data in power system. Finally, we propose some methods of data security protection based on the defects of big data security in current power system. By building a data security intelligent management and control platform, it can automatically discover and identify the types and levels of data assets, and build a classification and grading information base of dynamic data assets. And through the detection and identification of data labels and data content characteristics, tracking the use of data flow process. So as to realize the monitoring of data security state. By protecting sensitive data against leakage based on the whole life cycle of data, the big data security of power grid informatization can be effectively guaranteed and the safety immunity of power information system can be improved.</description><subject>Big Data</subject><subject>data life cycle</subject><subject>Data security</subject><subject>data security protection</subject><subject>Power grids</subject><subject>Power measurement</subject><subject>Power system dynamics</subject><subject>Sensitivity</subject><subject>smart grid</subject><subject>Software</subject><subject>ubiquitous power Internet of things</subject><issn>2472-8489</issn><isbn>1728198151</isbn><isbn>9781728198156</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2020</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81OAjEUhauJiYg8gQvnBQZ72zJtlzKKkOBPBNfkTnvL1CBjZupi3l4IrM5Jvi8nOYzdAx8DcPuwKMvVm7LGqrHggo8tSAtgLtgNaGHAGpjAJRsIpUVulLHXbNR135xzKKCQWg_Y_JM6wtbVWbPPnjBhtiL318bUZx9tk8ileACvlOrGZ1PsyB_Fadye5DW5et_smm1_y64C7joanXPIvmbP63KeL99fFuXjMo-Cy5QrHyxYXRi0ldMYgvABjz1USmpngpSIuvBa0gSsqlTwFjRHwQ-8QpBDdnfajUS0-W3jD7b95nxc_gPJk03O</recordid><startdate>202006</startdate><enddate>202006</enddate><creator>Liu, Donglan</creator><creator>Wang, Rui</creator><creator>Zhang, Hao</creator><creator>Ma, Lei</creator><creator>Liu, Xin</creator><creator>Huang, Hua</creator><creator>Chang, Yingxian</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>202006</creationdate><title>Research on Data Security Protection Method Based on Big Data Technology</title><author>Liu, Donglan ; Wang, Rui ; Zhang, Hao ; Ma, Lei ; Liu, Xin ; Huang, Hua ; Chang, Yingxian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-4df919768a9bc7aff2dfaa9bcfb437c8f33aa76d73e5194b4fd9170a20b43ba13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Big Data</topic><topic>data life cycle</topic><topic>Data security</topic><topic>data security protection</topic><topic>Power grids</topic><topic>Power measurement</topic><topic>Power system dynamics</topic><topic>Sensitivity</topic><topic>smart grid</topic><topic>Software</topic><topic>ubiquitous power Internet of things</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Ma, Lei</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Huang, Hua</creatorcontrib><creatorcontrib>Chang, Yingxian</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Donglan</au><au>Wang, Rui</au><au>Zhang, Hao</au><au>Ma, Lei</au><au>Liu, Xin</au><au>Huang, Hua</au><au>Chang, Yingxian</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on Data Security Protection Method Based on Big Data Technology</atitle><btitle>2020 12th International Conference on Communication Software and Networks (ICCSN)</btitle><stitle>ICCSN</stitle><date>2020-06</date><risdate>2020</risdate><spage>79</spage><epage>83</epage><pages>79-83</pages><eissn>2472-8489</eissn><eisbn>1728198151</eisbn><eisbn>9781728198156</eisbn><abstract>The construction of power Internet of things is an important development direction of power grid enterprises in the future. Big data not only brings economic and social benefits to the power system industry, but also brings many information security problems. Therefore, in the case of accelerating the construction of ubiquitous electric Internet of things, it is urgent to standardize the data security protection in the ubiquitous electric Internet of things environment. By analyzing the characteristics of big data in power system, this paper discusses the security risks faced by big data in power system. Finally, we propose some methods of data security protection based on the defects of big data security in current power system. By building a data security intelligent management and control platform, it can automatically discover and identify the types and levels of data assets, and build a classification and grading information base of dynamic data assets. And through the detection and identification of data labels and data content characteristics, tracking the use of data flow process. So as to realize the monitoring of data security state. By protecting sensitive data against leakage based on the whole life cycle of data, the big data security of power grid informatization can be effectively guaranteed and the safety immunity of power information system can be improved.</abstract><pub>IEEE</pub><doi>10.1109/ICCSN49894.2020.9139118</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2472-8489
ispartof 2020 12th International Conference on Communication Software and Networks (ICCSN), 2020, p.79-83
issn 2472-8489
language eng
recordid cdi_ieee_primary_9139118
source IEEE Xplore All Conference Series
subjects Big Data
data life cycle
Data security
data security protection
Power grids
Power measurement
Power system dynamics
Sensitivity
smart grid
Software
ubiquitous power Internet of things
title Research on Data Security Protection Method Based on Big Data Technology
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A10%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20Data%20Security%20Protection%20Method%20Based%20on%20Big%20Data%20Technology&rft.btitle=2020%2012th%20International%20Conference%20on%20Communication%20Software%20and%20Networks%20(ICCSN)&rft.au=Liu,%20Donglan&rft.date=2020-06&rft.spage=79&rft.epage=83&rft.pages=79-83&rft.eissn=2472-8489&rft_id=info:doi/10.1109/ICCSN49894.2020.9139118&rft.eisbn=1728198151&rft.eisbn_list=9781728198156&rft_dat=%3Cieee_CHZPO%3E9139118%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-4df919768a9bc7aff2dfaa9bcfb437c8f33aa76d73e5194b4fd9170a20b43ba13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9139118&rfr_iscdi=true