Abstract
The integrated function of cloud computing technology can effectively guarantee the security of power system data, and lay a solid foundation for the healthy and stable development of power system. At present, the application of cloud computing security technology in the power system is still in the primary stage, and there is a large space for improvement in both the application depth and the strategy level. On account of this, this paper first analyzes the overall security requirements of power system and the concept and connotation of cloud computing security technology in power system. Then it proposes the security structure target of power system. Finally, this paper analyses and studies the power system architecture of cloud computing security and applied technologies of cloud computing security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agarwal, A., Jain, S.: Efficient optimal algorithm of task scheduling in cloud computing environment. Int. J. Comput. Trends Tech 9(7), 81–83 (2014)
Fu, T.: Discussion on resource pool construction of power grid enterprise information system on account of cloud computing. Electron. World 24, 7 (2014)
Huang, C.: Discussion on data security technology of power information system on account of cloud computing. Sci. Technol. Innov. 17(33), 27–28 (2015)
Fei, L., Qi, H., Yuan, J., et al.: Realization of graphic browsing service for GIS platform of power transmission and distribution. Power Syst. Autom. 41(11), 99–105 (2017)
Liu, X., Ma, L., Yu, H.: Research on data security technology of power information system in cloud computing environment. Info Comput. Theor. Ed. 12, 23–24 (2016)
Luo, X., Duan, X.: Research on multi graph display and hierarchical management in power system software. Power Autom. Equipment 22(6), 16–19 (2012)
Maguluri, S.T.: Optimal resource allocation algorithms for cloud computing Dissertations Theses-Gradworks, (5), pp. 634–645 (2015)
Ni, J., Han, Q.: Design of data recovery system for power information system on account of Oracle database. Electr. Utilizations 12, 74–76 (2016)
Qiao, L., Hu, N., Tong, D., et al.: Design of power grid integrated information system on account of GIS technology. Electron. Des. Eng. 24(15), 88–92 (2016)
Qu, C., Diao, Y., Bo, X., et al.: Database caching model of power information system on account of multi prediction tree combination algorithm. Electr. Measure. Instrum. 51(6), 70–75 (2014)
Su, Z.: Infrastructure and key technologies of power data center on account of cloud computing. East China Sci. Technol. Acad. Ed. 7, 187 (2014)
Wang, B., Liu, Z.: Remote file synchronization optimization model on account of Rsync. Comput. Modernization 4, 10–13 (2015)
Wang, X., Yan, J., Zeng, Q.: Intelligent task scheduling algorithm for multi-level optimization in cloud computing. Control. Eng. 24(5), 1008–1012 (2017)
Wang, Y., Chang, F.: Utilization and analysis of cloud computing technology in power system. Comput. Knowl. Technol. 7, 101–122 (2015)
Wu, K., Liu, W., Li, Y., et al.: Power big data analysis technology and utilization on account of cloud computing. China Electr. Power 48(2), 111–116 (2015)
Xie, F., Ding, Y.: Data security protection technology in the process of information system management and control. Netw. Secur. Technol. Utilization 8, 65 (2015)
Jie, Y., Tian, N., Yi, Y.: Utilization effect of smart grid information platform on account of cloud computing. Electron. Technol. Softw. Eng. 22, 189–190 (2014)
Yang, Y., Jiang, X., Wu, S.: Exploring the security problems and Countermeasures of power information system. Info Commun. 190(10), 284–285 (2018)
Chun, Z., Jing, C.: Cloud environment service classification algorithm on account of data mining technology. Laser J. 36(3), 84–87 (2015)
Zhou, H.: Research on information security of power system. China Hi Tech Zone 14, 233 (2018)
Acknowledgement
This paper is supported by the science and technology project of State Grid Corporation of China: “Research and Application of Scenario-Driven Data Dynamic Authorization and Compliance Control Key Technology” (Grand No. 5700-202058481A-0-0-00).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xiong, H., Cheng, J., Wang, Y., Yang, X., Wang, K. (2022). Research on Cloud Computing Security Technology of Power System. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_21
Download citation
DOI: https://doi.org/10.1007/978-981-19-0852-1_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0851-4
Online ISBN: 978-981-19-0852-1
eBook Packages: Computer ScienceComputer Science (R0)