Font Size: a A A

Research On Power Information Security Protection Technology In Smart Grid

Posted on:2023-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:J B ChenFull Text:PDF
GTID:2568306797998069Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
The deep integration of information technology and energy technology promotes the emergence of smart grid.The emergence of smart grid not only improves the power management level of power supply companies,but also further realizes the fine regulation and control of power.At the same time,there are a lot of sensitive information in the smart grid’s electricity information.Once it is leaked,if it is used illegally,it will cause immeasurable losses to users and power supply enterprises.Therefore,to ensure the information security of smart grid power consumption is a difficulty that must be overcome on the road of smart grid development.This paper mainly studies the information security protection technology for power use in smart grid.Guided by the information security issues of smart grid,the information security protection technology involved in these three periods is studied in the first,middle and last stages of user access process.The specific research contents are as follows:(1)Role-based access control strategies cannot dynamically allocate user privileges for the early stages of the user access process.To try to solve this problem,this paper presents an access control strategy based on trust values.Establish a trust evaluation system and use mathematical methods to evaluate the direct and indirect trust values of users.At the same time,the corresponding access control model is established,and the workflow and monitoring mechanism of the model are described in detail.Finally,the time performance of the access control model and the number of resources allowed to access are compared.The experimental results show that the access control model has obvious advantages in time performance and number of accessible resources.(2)In the mid-stage of user access process,illegal operation of legitimate users is an important reason for the leakage of power information in smart grid,and information security protection in this stage is also the weakest.Therefore,this paper presents an access process-oriented dynamic access control model,builds a user-based behavior sequence based on user roles and business logic,and collects the user’s access behavior sequence in real time.Then,fuzzy inference is used to get the fuzzy user risk level,and according to the fuzzy user risk level,the access rights of users are dynamically adjusted in real time.Finally,the authorization capability of the model is verified by an example demonstration.(3)For the later stage of user access process,this paper focuses on the smart grid power information system background database audit log analysis technology research and discussion.At the same time,an improved FP-Growth algorithm is presented,and the time and space performance of the algorithm are compared and verified experimentally.The experimental results show that the improved algorithm outperforms the original FP-Growth algorithm in both time and space performance.Finally,the improved algorithm is applied to the field of database audit log analysis and an example is presented.
Keywords/Search Tags:Smart Grid, Access Control, Dynamic Permissions, Log Analysis
PDF Full Text Request
Related items