Skip to main content

Research on Identification Method of Sensitive Data in Power System

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1563))

Included in the following conference series:

  • 1020 Accesses

Abstract

The power system equipment is currently facing more serious risk and threat of data leakage. The online monitoring of power transmission lines, the complexity of power consumption information collection methods and the uncontrollable operating environment make the business data of power system more prone to data leakage. On account of this, this paper firstly analyses the risk of sensitive data in power system, then studies the identification process of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amin, S.U., Alsulaiman, M., Muhammad, G., et al.: Multilevel weighted feature fusion using convolutional neural networks for EEG motor imagery classification. IEEE Access 7, 18940–18950 (2019)

    Article  Google Scholar 

  2. Duan, Y.: Utilization of support vector machine in text classification. Comput. Digit. Eng. 40(7), 87–88 (2012)

    Google Scholar 

  3. Qingyong, G.: Database encryption technology. Post Telecommun. Des. Technol. 7, 58–60 (2017)

    Google Scholar 

  4. Weiwei, L., Tao, Z., Weimin, L., et al.: Research and implementation of sensitive data recognition method on account of text content. Comput. Eng. Des. 4(34), 1202–1203 (2013)

    Google Scholar 

  5. Xiaohong, L.: Feature word extraction method in Chinese text classification. Comput. Eng. Des. 30(17), 4127–4129 (2009)

    Google Scholar 

  6. Zin, L., Lv, H., Ming, L., et al.: A novel self-adaptive grid-partitioning noise optimization algorithm on account of differential privacy. Comput. Sci. Inf. Syst. 16(3), 915–938 (2019)

    Article  Google Scholar 

  7. Mehmood, A., Natgunanathan, I., Xiang, Y., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)

    Article  Google Scholar 

  8. Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and utilizations. IEEE Access 5, 10562–10582 (2017)

    Article  Google Scholar 

  9. Sasikala, S., Banu, N.: Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3), 302–306 (2014)

    Google Scholar 

  10. Schaub, F., Konings, B., Weber, M.: Context-adaptive privacy: leveraging context awareness to support privacy decision making. IEEE Pervasive Comput. 14(1), 34–43 (2015)

    Article  Google Scholar 

  11. Singh, B.C., Carminati, B., Ferrari, E.: Privacy-aware personal data storage (P-PDS): learning how to protect user privacy from external utilizations. IEEE Trans. Depend. Secure Comput. 1–14 (2019)

    Google Scholar 

  12. Sorber, L., Van Barel, M., De Lathauwer, L.: Structured data fusion. IEEE J. Select. Top. Signal Proc. 9(4), 586–600 (2015)

    Article  Google Scholar 

  13. Sweeney, L.: k-anonymity: a model for protecting privacy. Inter. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  14. Yanlin, T., Honggeng, Y.: Research method of voltage sag fault frequency of sensitive load on account of maximum entropy principle. Electr. Meas. Instrument. 52(18), 27–30 (2015)

    Google Scholar 

  15. Yi, W., Ning, Z., Chongqing, K., et al.: Power user behavior model: basic concepts and research framework. Acta Electro-Technics Sinica 34(10), 2056–2068 (2019)

    Google Scholar 

  16. Xuetao, Y.: Research on sensitive data protection technology of wireless music service. Telecommun. Eng. Technol. Standard. 12, 5–59 (2013)

    Google Scholar 

  17. Ying, J.W., Xin, H., Chen, G.E., et al.: Adaptive parameter optimization for real-time differential privacy streaming data publication. Comput. Sci. 46(9), 99–105 (2019)

    Google Scholar 

  18. Qianhong, Z., Xuehua, C., Chuanguo, M., et al.: Research on computer terminal data security protection on account of network environment. Elect. Power Inf. 9(11), 84–88 (2011)

    Google Scholar 

  19. Zhao, P., Wang, H.H., Tan, C.X.: Design and implementation of network isolation security audit system on account of firewall log. Comput. Util. Res. 7, 114–116 (2007)

    Google Scholar 

  20. Kai, Z., Qianwen, G., Le, L., et al.: Rapid evaluation method for transient voltage disturbance tolerance of variable speed drive equipment. China Test 46(07), 75–82 (2020)

    Google Scholar 

Download references

Acknowledgement

This paper is supported by the science and technology project of State Grid Corporation of China: “Research and Application of Scenario-Driven Data Dynamic Authorization and Compliance Control Key Technology” (Grand No. 5700-202058481A-0-0-00).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, P., Wang, D., Zhang, S. (2022). Research on Identification Method of Sensitive Data in Power System. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics