Skip to main content

Research on Cloud Computing Security Technology of Power System

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1563))

Included in the following conference series:

Abstract

The integrated function of cloud computing technology can effectively guarantee the security of power system data, and lay a solid foundation for the healthy and stable development of power system. At present, the application of cloud computing security technology in the power system is still in the primary stage, and there is a large space for improvement in both the application depth and the strategy level. On account of this, this paper first analyzes the overall security requirements of power system and the concept and connotation of cloud computing security technology in power system. Then it proposes the security structure target of power system. Finally, this paper analyses and studies the power system architecture of cloud computing security and applied technologies of cloud computing security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agarwal, A., Jain, S.: Efficient optimal algorithm of task scheduling in cloud computing environment. Int. J. Comput. Trends Tech 9(7), 81–83 (2014)

    Article  Google Scholar 

  2. Fu, T.: Discussion on resource pool construction of power grid enterprise information system on account of cloud computing. Electron. World 24, 7 (2014)

    Google Scholar 

  3. Huang, C.: Discussion on data security technology of power information system on account of cloud computing. Sci. Technol. Innov. 17(33), 27–28 (2015)

    Google Scholar 

  4. Fei, L., Qi, H., Yuan, J., et al.: Realization of graphic browsing service for GIS platform of power transmission and distribution. Power Syst. Autom. 41(11), 99–105 (2017)

    Google Scholar 

  5. Liu, X., Ma, L., Yu, H.: Research on data security technology of power information system in cloud computing environment. Info Comput. Theor. Ed. 12, 23–24 (2016)

    Google Scholar 

  6. Luo, X., Duan, X.: Research on multi graph display and hierarchical management in power system software. Power Autom. Equipment 22(6), 16–19 (2012)

    Google Scholar 

  7. Maguluri, S.T.: Optimal resource allocation algorithms for cloud computing Dissertations Theses-Gradworks, (5), pp. 634–645 (2015)

    Google Scholar 

  8. Ni, J., Han, Q.: Design of data recovery system for power information system on account of Oracle database. Electr. Utilizations 12, 74–76 (2016)

    Google Scholar 

  9. Qiao, L., Hu, N., Tong, D., et al.: Design of power grid integrated information system on account of GIS technology. Electron. Des. Eng. 24(15), 88–92 (2016)

    Google Scholar 

  10. Qu, C., Diao, Y., Bo, X., et al.: Database caching model of power information system on account of multi prediction tree combination algorithm. Electr. Measure. Instrum. 51(6), 70–75 (2014)

    Google Scholar 

  11. Su, Z.: Infrastructure and key technologies of power data center on account of cloud computing. East China Sci. Technol. Acad. Ed. 7, 187 (2014)

    Google Scholar 

  12. Wang, B., Liu, Z.: Remote file synchronization optimization model on account of Rsync. Comput. Modernization 4, 10–13 (2015)

    Google Scholar 

  13. Wang, X., Yan, J., Zeng, Q.: Intelligent task scheduling algorithm for multi-level optimization in cloud computing. Control. Eng. 24(5), 1008–1012 (2017)

    Google Scholar 

  14. Wang, Y., Chang, F.: Utilization and analysis of cloud computing technology in power system. Comput. Knowl. Technol. 7, 101–122 (2015)

    Google Scholar 

  15. Wu, K., Liu, W., Li, Y., et al.: Power big data analysis technology and utilization on account of cloud computing. China Electr. Power 48(2), 111–116 (2015)

    Google Scholar 

  16. Xie, F., Ding, Y.: Data security protection technology in the process of information system management and control. Netw. Secur. Technol. Utilization 8, 65 (2015)

    Google Scholar 

  17. Jie, Y., Tian, N., Yi, Y.: Utilization effect of smart grid information platform on account of cloud computing. Electron. Technol. Softw. Eng. 22, 189–190 (2014)

    Google Scholar 

  18. Yang, Y., Jiang, X., Wu, S.: Exploring the security problems and Countermeasures of power information system. Info Commun. 190(10), 284–285 (2018)

    Google Scholar 

  19. Chun, Z., Jing, C.: Cloud environment service classification algorithm on account of data mining technology. Laser J. 36(3), 84–87 (2015)

    Google Scholar 

  20. Zhou, H.: Research on information security of power system. China Hi Tech Zone 14, 233 (2018)

    Google Scholar 

Download references

Acknowledgement

This paper is supported by the science and technology project of State Grid Corporation of China: “Research and Application of Scenario-Driven Data Dynamic Authorization and Compliance Control Key Technology” (Grand No. 5700-202058481A-0-0-00).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiong, H., Cheng, J., Wang, Y., Yang, X., Wang, K. (2022). Research on Cloud Computing Security Technology of Power System. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics