Abstract
The power system equipment is currently facing more serious risk and threat of data leakage. The online monitoring of power transmission lines, the complexity of power consumption information collection methods and the uncontrollable operating environment make the business data of power system more prone to data leakage. On account of this, this paper firstly analyses the risk of sensitive data in power system, then studies the identification process of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amin, S.U., Alsulaiman, M., Muhammad, G., et al.: Multilevel weighted feature fusion using convolutional neural networks for EEG motor imagery classification. IEEE Access 7, 18940–18950 (2019)
Duan, Y.: Utilization of support vector machine in text classification. Comput. Digit. Eng. 40(7), 87–88 (2012)
Qingyong, G.: Database encryption technology. Post Telecommun. Des. Technol. 7, 58–60 (2017)
Weiwei, L., Tao, Z., Weimin, L., et al.: Research and implementation of sensitive data recognition method on account of text content. Comput. Eng. Des. 4(34), 1202–1203 (2013)
Xiaohong, L.: Feature word extraction method in Chinese text classification. Comput. Eng. Des. 30(17), 4127–4129 (2009)
Zin, L., Lv, H., Ming, L., et al.: A novel self-adaptive grid-partitioning noise optimization algorithm on account of differential privacy. Comput. Sci. Inf. Syst. 16(3), 915–938 (2019)
Mehmood, A., Natgunanathan, I., Xiang, Y., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)
Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and utilizations. IEEE Access 5, 10562–10582 (2017)
Sasikala, S., Banu, N.: Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3), 302–306 (2014)
Schaub, F., Konings, B., Weber, M.: Context-adaptive privacy: leveraging context awareness to support privacy decision making. IEEE Pervasive Comput. 14(1), 34–43 (2015)
Singh, B.C., Carminati, B., Ferrari, E.: Privacy-aware personal data storage (P-PDS): learning how to protect user privacy from external utilizations. IEEE Trans. Depend. Secure Comput. 1–14 (2019)
Sorber, L., Van Barel, M., De Lathauwer, L.: Structured data fusion. IEEE J. Select. Top. Signal Proc. 9(4), 586–600 (2015)
Sweeney, L.: k-anonymity: a model for protecting privacy. Inter. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)
Yanlin, T., Honggeng, Y.: Research method of voltage sag fault frequency of sensitive load on account of maximum entropy principle. Electr. Meas. Instrument. 52(18), 27–30 (2015)
Yi, W., Ning, Z., Chongqing, K., et al.: Power user behavior model: basic concepts and research framework. Acta Electro-Technics Sinica 34(10), 2056–2068 (2019)
Xuetao, Y.: Research on sensitive data protection technology of wireless music service. Telecommun. Eng. Technol. Standard. 12, 5–59 (2013)
Ying, J.W., Xin, H., Chen, G.E., et al.: Adaptive parameter optimization for real-time differential privacy streaming data publication. Comput. Sci. 46(9), 99–105 (2019)
Qianhong, Z., Xuehua, C., Chuanguo, M., et al.: Research on computer terminal data security protection on account of network environment. Elect. Power Inf. 9(11), 84–88 (2011)
Zhao, P., Wang, H.H., Tan, C.X.: Design and implementation of network isolation security audit system on account of firewall log. Comput. Util. Res. 7, 114–116 (2007)
Kai, Z., Qianwen, G., Le, L., et al.: Rapid evaluation method for transient voltage disturbance tolerance of variable speed drive equipment. China Test 46(07), 75–82 (2020)
Acknowledgement
This paper is supported by the science and technology project of State Grid Corporation of China: “Research and Application of Scenario-Driven Data Dynamic Authorization and Compliance Control Key Technology” (Grand No. 5700-202058481A-0-0-00).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yu, P., Wang, D., Zhang, S. (2022). Research on Identification Method of Sensitive Data in Power System. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_4
Download citation
DOI: https://doi.org/10.1007/978-981-19-0852-1_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0851-4
Online ISBN: 978-981-19-0852-1
eBook Packages: Computer ScienceComputer Science (R0)