CN113395286A - Sensitive data multidimensional encryption processing method - Google Patents

Sensitive data multidimensional encryption processing method Download PDF

Info

Publication number
CN113395286A
CN113395286A CN202110673617.XA CN202110673617A CN113395286A CN 113395286 A CN113395286 A CN 113395286A CN 202110673617 A CN202110673617 A CN 202110673617A CN 113395286 A CN113395286 A CN 113395286A
Authority
CN
China
Prior art keywords
value
sensitivity
power utilization
data
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110673617.XA
Other languages
Chinese (zh)
Other versions
CN113395286B (en
Inventor
刘积娟
黄丽榕
翁斌新
林朝灯
黄鹏
陈强
林松海
蒋鑫
杨启帆
杨劲怀
郑飘飘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Information and Telecommunication Co Ltd
Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd
Great Power Science and Technology Co of State Grid Information and Telecommunication Co Ltd
Original Assignee
State Grid Information and Telecommunication Co Ltd
Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd
Great Power Science and Technology Co of State Grid Information and Telecommunication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Information and Telecommunication Co Ltd, Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd, Great Power Science and Technology Co of State Grid Information and Telecommunication Co Ltd filed Critical State Grid Information and Telecommunication Co Ltd
Priority to CN202110673617.XA priority Critical patent/CN113395286B/en
Publication of CN113395286A publication Critical patent/CN113395286A/en
Application granted granted Critical
Publication of CN113395286B publication Critical patent/CN113395286B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • General Physics & Mathematics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a sensitive data multidimensional encryption processing method, which is provided with an encryption processing system, wherein the encryption processing system comprises a multidimensional data acquisition subsystem, a processing subsystem, an encryption subsystem and a storage subsystem; the multidimensional data acquisition subsystem comprises an area identification module, an electricity utilization time period acquisition module and an electricity utilization parameter acquisition module, wherein the electricity utilization area identification module is used for acquiring an electricity utilization area, the electricity utilization area comprises a plurality of electricity utilization units, the electricity utilization time period acquisition module is used for acquiring an electricity utilization time period in the electricity utilization area, and the electricity utilization parameter acquisition module is used for acquiring an electricity utilization parameter in the electricity utilization area.

Description

Sensitive data multidimensional encryption processing method
Technical Field
The invention relates to the technical field of sensitive data processing, in particular to a sensitive data multi-dimensional encryption processing method.
Background
Sensitive data refers to data that may pose serious harm to the society or individuals after leakage. Including personal privacy data such as name, identification number, address, telephone, bank account, mailbox, password, medical information, educational background, etc.; but also data that the enterprise or social organization is not suitable for publishing, such as the business situation of the enterprise, the network structure of the enterprise, the IP address list, etc. Especially in the field of power grids, some power utilization data belong to sensitive data and need to be encrypted. The dimensions of data are diverse, with the necessary commonly used parameter dimensions such as: time, gender, region, etc., may also be divided into qualitative and quantitative dimensions.
However, in the prior art, when data existing in a power grid is processed, the data is insufficient in the aspect of dimensional analysis, so that the encryption processing efficiency in the power grid data is low, when the data needing encryption processing is excessive, the processing difficulty of a back-end server is increased, the time consumed in the processing process is increased, meanwhile, the data protection effect is not good enough, if a simple encryption means is adopted, the safety is low, and if a complex encryption means is adopted, the operation time of back-end processing is increased, and the energy consumption is increased.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a sensitive data multidimensional encryption processing method which can carry out multidimensional hierarchical encryption processing on sensitive data in a power grid so as to solve the problem that the encryption processing method is poor in the existing power grid data processing process.
In order to achieve the purpose, the invention is realized by the following technical scheme: a sensitive data multidimensional encryption processing method is provided with an encryption processing system, wherein the encryption processing system comprises a multidimensional data acquisition subsystem, a processing subsystem, an encryption subsystem and a storage subsystem; the multi-dimensional data acquisition subsystem comprises an area identification module, an electricity utilization time period acquisition module and an electricity utilization parameter acquisition module;
the power utilization area identification module is used for acquiring a power utilization area, the power utilization area comprises a plurality of power utilization units, the power utilization time period acquisition module is used for acquiring a power utilization time period in the power utilization area, and the power utilization parameter acquisition module is used for acquiring power utilization parameters in the power utilization area;
the processing subsystem is used for receiving the electricity utilization data acquired by the multi-dimensional data acquisition subsystem, processing the electricity utilization data and obtaining data needing to be encrypted;
the encryption subsystem is used for encrypting the data which needs to be encrypted and is obtained by the processing subsystem;
the storage subsystem is used for storing the encrypted data.
The encryption processing method comprises the following steps:
step S1, dividing a database in the field of power utilization networks into three-dimensional data, wherein the three-dimensional data comprise an area dimension, a time dimension and a parameter dimension of power utilization products;
step S2, dividing the area dimension into a plurality of power utilization units, dividing the power utilization units according to the sensitivity levels into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area;
step S3, dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively;
step S4, dividing the parameter dimension of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into a high sensitivity grade parameter, a medium sensitivity grade parameter and a low sensitivity grade parameter according to the sensitivity grade;
step S5, calculating a first risk value of a certain item of data to be encrypted through a first risk algorithm, performing primary encryption processing when the first risk value is greater than a first threshold value, and performing secondary encryption processing when the first risk value is greater than a second threshold value, wherein the second threshold value is greater than the first threshold value;
and step S6, respectively numbering the data subjected to the primary encryption processing and the data subjected to the secondary encryption processing, and storing the numbered data in the storage subsystem.
Further, the step S5 further includes the following steps:
step A1, performing region classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity level region, a medium-sensitivity level region and a low-sensitivity level region into a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value respectively, and when the region classification value taking on the electricity consumption data belongs to one of the high-sensitivity level region value, the medium-sensitivity level region value and the low-sensitivity level region value, recording the belonging region value as 1, and recording the rest two non-belonging region values as 0;
step A2, classifying and dereferencing the power consumption data in time periods, classifying and dereferencing the data belonging to the time periods with high sensitivity levels, middle sensitivity levels and low sensitivity levels into a time period value with high sensitivity levels, a time period value with middle sensitivity levels and a time period value with low sensitivity levels, when the time period dereferencing of the power consumption data belongs to one of the time period value with high sensitivity levels, the time period value with middle sensitivity levels and the time period value with low sensitivity levels, the belonged time period value is marked as 1, and the other two time period values which do not belong to are marked as 0;
step A3, carrying out parameter classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity grade parameter, a medium-sensitivity grade parameter and a low-sensitivity grade parameter into a high-sensitivity grade parameter value, a medium-sensitivity grade parameter value and a low-sensitivity grade parameter value respectively, recording the belonging parameter value as 1 when the parameter value of the electricity consumption data belongs to one of the high-sensitivity grade parameter value, the medium-sensitivity grade parameter value and the low-sensitivity grade parameter value, and recording the other two parameter values which do not belong to as 0;
step A4, calculating the first risk algorithm according to the area value, the time period value and the parameter value of the data to obtain a first risk value of the data to be encrypted.
Further, the first risk algorithm is configured to:
Figure BDA0003119783670000031
wherein F1 is a first risk value, Qg, Qz and Qd are respectively a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value, Dg, Dz and Dd are respectively a high-sensitivity level time period value, a medium-sensitivity level time period value and a low-sensitivity level time period value, Cg, Cz and Cd are respectively a high-sensitivity level parameter value, a medium-sensitivity level parameter value and a low-sensitivity level parameter value, and a1 to a9 are respectively first to ninth weighted values.
Further, the electricity utilization unit at least comprises a floor subunit;
the step S1 further includes:
step B1, dividing the floor subunits in the high-sensitivity level area into a high-sensitivity level floor, a medium-sensitivity level floor and a low-sensitivity level floor according to the sensitivity levels;
step B2, classifying the electricity utilization floors, and respectively taking the floors belonging to the high-sensitivity level floors, the medium-sensitivity level floors and the low-sensitivity level floors as high-sensitivity level floor values, medium-sensitivity level floor values and low-sensitivity level floor values, wherein when the electricity utilization floor values belong to one of the high-sensitivity level floor values, the medium-sensitivity level floor values and the low-sensitivity level floor values, the belonged floor values are marked as 1, and the rest two floor values which do not belong to are marked as 0;
further, the electricity usage parameters include electricity usage, electricity usage types including industrial electricity, commercial electricity, residential electricity, and non-industrial electricity, and electricity usage voltage;
the step S4 further includes:
and step C1, carrying out power utilization type value determination on the power utilization types belonging to industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, wherein the values are respectively an industrial power utilization value, a commercial power utilization value, a residential power utilization value and a non-industrial power utilization value, when the power utilization type value belongs to one of the industrial power utilization value, the commercial power utilization value, the residential power utilization value and the non-industrial power utilization value, the belonging power utilization type value is marked as 1, and the other three power utilization type values which are not belong are marked as 0.
Further, the step S5 further includes:
and D1, performing three-level encryption processing when the second risk value is greater than a second threshold value, and performing four-level encryption processing when the second risk value is greater than a fourth threshold value, wherein the fourth threshold value is greater than a third threshold value, through a second risk value of a certain item of data needing to be encrypted by a second risk algorithm.
Further, the step S5 further includes:
and D2, calculating the second risk algorithm according to the area value, the time period value, the parameter value, the floor value, the electricity consumption, the electricity utilization voltage and the electricity utilization type value of the data to obtain a second risk value of the data needing to be encrypted.
Further, the second risk algorithm is configured to:
Figure BDA0003119783670000051
wherein F2 is a second risk value, DL is power consumption, DY is power consumption voltage, K1 is a first proportional coefficient, K2 is a second proportional coefficient, Lg, Lz and Ld are respectively a high-sensitivity-level floor value, a medium-sensitivity-level floor value and a low-sensitivity-level floor value, Gd, Sd, Zd and FGd are respectively an industrial power consumption value, a commercial power consumption value, a residential power consumption value and a non-industrial power consumption value, and a10 to a16 are respectively tenth weighted value to sixteenth weighted value.
The invention has the beneficial effects that: according to the method, a database in the field of power grid utilization is divided into three-dimensional data, the three-dimensional data comprise an area dimension, a time dimension and a power utilization product parameter dimension, the area dimension is divided into a plurality of power utilization units, the power utilization units are divided according to sensitivity levels and are respectively divided into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area; dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively; the method comprises the steps of dividing parameter dimensions of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into high sensitivity grade parameters, medium sensitivity grade parameters and low sensitivity grade parameters according to sensitivity grades, calculating a first risk value required to be encrypted for a certain item of data through a first risk algorithm, and performing accurate hierarchical encryption processing on the data through the first risk value, so that the targeted protection on the power grid data is improved, and the safety of the whole data processing is improved.
According to the invention, the floor subunits in the high-sensitivity grade area are divided into high-sensitivity grade floors, medium-sensitivity grade floors and low-sensitivity grade floors according to the sensitivity grade, the power utilization parameters are divided into power consumption, power utilization types and power utilization voltage, the power utilization types are divided into industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, and a second risk value of the data needing to be encrypted is obtained by calculating according to the area value, the time period value, the parameter value, the floor value, the power consumption, the power utilization voltage and the power utilization type value of the data through a second risk algorithm, so that the classification of the data can be refined, and the protection strength of the precise data is improved.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a functional block diagram of an encryption processing system of the present invention;
FIG. 2 is a flow chart of the method steps of the present invention.
In the figure: 1. an encryption processing system; 11. a multi-dimensional data acquisition subsystem; 111. a region identification module; 112. a power consumption time period acquisition module; 113. a power consumption parameter acquisition module; 12. a processing subsystem; 13. an encryption subsystem; 14. a storage subsystem.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
In a first embodiment, referring to fig. 1 and fig. 2, a multidimensional encryption processing method for sensitive data is configured with an encryption processing system 1, where the encryption processing system 1 includes a multidimensional data acquisition subsystem 11, a processing subsystem 12, an encryption subsystem 13, and a storage subsystem 14; the multidimensional data acquisition subsystem 11 comprises an area identification module 111, an electricity consumption time period acquisition module and an electricity consumption parameter acquisition module 113, and the processing subsystem 12 is used for receiving the electricity consumption data acquired by the multidimensional data acquisition subsystem 11, processing the electricity consumption data and obtaining data to be encrypted; the encryption subsystem 13 is used for encrypting data which needs to be encrypted and is obtained by processing of the processing subsystem 12; the storage subsystem 14 is used for storing encrypted data.
The data of a plurality of dimensions that can acquire the power consumption data through multidimensional data acquisition subsystem 11 are handled the power consumption data through processing subsystem 12, can obtain the data that need encrypt in grades, carry out the encryption in grades through encryption subsystem 13, can improve the precision of the multidimensional encryption processing to sensitive data, improve the efficiency of data encryption to promote entire system's data processing's operating efficiency.
The power utilization region identification module 111 is used for acquiring a power utilization region, the power utilization region comprises a plurality of power utilization units, the power utilization time period acquisition module is used for acquiring a power utilization time period in the power utilization region, the power utilization parameter acquisition module 113 is used for acquiring power utilization parameters in the power utilization region, and the power utilization region, the power utilization time period and the power utilization parameters are split on power utilization data from three dimensions, so that the sensitive data can be finely split and protected, and the safety of sensitive data processing is guaranteed.
The encryption processing method comprises the following steps:
step S1, dividing a database in the field of power utilization networks into three-dimensional data, wherein the three-dimensional data comprise an area dimension, a time dimension and a parameter dimension of power utilization products;
step S2, dividing the area dimension into a plurality of power utilization units, dividing the power utilization units according to the sensitivity levels into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area;
step S3, dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively;
step S4, dividing the parameter dimension of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into a high sensitivity grade parameter, a medium sensitivity grade parameter and a low sensitivity grade parameter according to the sensitivity grade;
step S5, calculating a first risk value of a certain item of data to be encrypted through a first risk algorithm, performing primary encryption processing when the first risk value is greater than a first threshold value, and performing secondary encryption processing when the first risk value is greater than a second threshold value, wherein the second threshold value is greater than the first threshold value;
the step S5 further includes the steps of:
step A1, performing region classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity level region, a medium-sensitivity level region and a low-sensitivity level region into a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value respectively, and when the region classification value taking on the electricity consumption data belongs to one of the high-sensitivity level region value, the medium-sensitivity level region value and the low-sensitivity level region value, recording the belonging region value as 1, and recording the rest two non-belonging region values as 0;
step A2, classifying and dereferencing the power consumption data in time periods, classifying and dereferencing the data belonging to the time periods with high sensitivity levels, middle sensitivity levels and low sensitivity levels into a time period value with high sensitivity levels, a time period value with middle sensitivity levels and a time period value with low sensitivity levels, when the time period dereferencing of the power consumption data belongs to one of the time period value with high sensitivity levels, the time period value with middle sensitivity levels and the time period value with low sensitivity levels, the belonged time period value is marked as 1, and the other two time period values which do not belong to are marked as 0;
step A3, carrying out parameter classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity grade parameter, a medium-sensitivity grade parameter and a low-sensitivity grade parameter into a high-sensitivity grade parameter value, a medium-sensitivity grade parameter value and a low-sensitivity grade parameter value respectively, recording the belonging parameter value as 1 when the parameter value of the electricity consumption data belongs to one of the high-sensitivity grade parameter value, the medium-sensitivity grade parameter value and the low-sensitivity grade parameter value, and recording the other two parameter values which do not belong to as 0;
step A4, calculating the first risk algorithm according to the area value, the time period value and the parameter value of the data to obtain a first risk value of the data to be encrypted.
The first risk algorithm is configured to:
Figure BDA0003119783670000081
wherein F1 is a first risk value, Qg, Qz and Qd are respectively a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value, Dg, Dz and Dd are respectively a high-sensitivity level time period value, a medium-sensitivity level time period value and a low-sensitivity level time period value, Cg, Cz and Cd are respectively a high-sensitivity level parameter value, a medium-sensitivity level parameter value and a low-sensitivity level parameter value, and a1 to a9 are respectively first to ninth weighted values.
Step S6, respectively numbering the data subjected to the primary encryption processing and the data subjected to the secondary encryption processing, and storing the numbered data in the storage subsystem 14.
In the second embodiment, on the basis of the first embodiment, floor subunits are added, the area dimension is subdivided, the power grid data of a terminal area can be further encrypted and protected, and the power utilization unit at least comprises one floor subunit;
the step S1 further includes:
step B1, dividing the floor subunits in the high-sensitivity level area into a high-sensitivity level floor, a medium-sensitivity level floor and a low-sensitivity level floor according to the sensitivity levels;
step B2, classifying the electricity utilization floors, and respectively taking the floors belonging to the high-sensitivity level floors, the medium-sensitivity level floors and the low-sensitivity level floors as high-sensitivity level floor values, medium-sensitivity level floor values and low-sensitivity level floor values, wherein when the electricity utilization floor values belong to one of the high-sensitivity level floor values, the medium-sensitivity level floor values and the low-sensitivity level floor values, the belonged floor values are marked as 1, and the rest two floor values which do not belong to are marked as 0;
in the third embodiment, on the basis of the second embodiment, subdivision of power utilization parameters is added, the game degree of sensitive data is further improved, and the protection safety of high-sensitive data is ensured, wherein the power utilization parameters comprise power consumption, power utilization types and power utilization voltage, and the power utilization types comprise industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization;
the step S4 further includes:
and step C1, carrying out power utilization type value determination on the power utilization types belonging to industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, wherein the values are respectively an industrial power utilization value, a commercial power utilization value, a residential power utilization value and a non-industrial power utilization value, when the power utilization type value belongs to one of the industrial power utilization value, the commercial power utilization value, the residential power utilization value and the non-industrial power utilization value, the belonging power utilization type value is marked as 1, and the other three power utilization type values which are not belong are marked as 0.
The step S5 further includes:
and D1, performing three-level encryption processing when the second risk value is greater than a second threshold value, and performing four-level encryption processing when the second risk value is greater than a fourth threshold value, wherein the fourth threshold value is greater than a third threshold value, through a second risk value of a certain item of data needing to be encrypted by a second risk algorithm.
The step S5 further includes:
and D2, calculating the second risk algorithm according to the area value, the time period value, the parameter value, the floor value, the electricity consumption, the electricity utilization voltage and the electricity utilization type value of the data to obtain a second risk value of the data needing to be encrypted.
The second risk algorithm is configured to:
Figure BDA0003119783670000091
wherein F2 is a second risk value, DL is power consumption, DY is power consumption voltage, K1 is a first proportional coefficient, K2 is a second proportional coefficient, Lg, Lz and Ld are respectively a high-sensitivity-level floor value, a medium-sensitivity-level floor value and a low-sensitivity-level floor value, Gd, Sd, Zd and FGd are respectively an industrial power consumption value, a commercial power consumption value, a residential power consumption value and a non-industrial power consumption value, and a10 to a16 are respectively tenth weighted value to sixteenth weighted value.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (8)

1. A multidimensional encryption processing method for sensitive data is characterized in that the encryption processing method is provided with an encryption processing system (1), and the encryption processing system (1) comprises a multidimensional data acquisition subsystem (11), a processing subsystem (12), an encryption subsystem (13) and a storage subsystem (14); the multi-dimensional data acquisition subsystem (11) comprises an area identification module (111), a power utilization time period acquisition module (112) and a power utilization parameter acquisition module (113);
the power utilization area identification module (111) is used for acquiring a power utilization area, the power utilization area comprises a plurality of power utilization units, the power utilization time period acquisition module (112) is used for acquiring a power utilization time period in the power utilization area, and the power utilization parameter acquisition module (113) is used for acquiring power utilization parameters in the power utilization area;
the processing subsystem (12) is used for receiving the electricity utilization data acquired by the multi-dimensional data acquisition subsystem (11), then processing the electricity utilization data and obtaining data needing to be encrypted;
the encryption subsystem (13) is used for encrypting the data which is obtained by the processing subsystem (12) and needs to be encrypted;
the storage subsystem (14) is used for storing the encrypted data.
The encryption processing method comprises the following steps:
step S1, dividing a database in the field of power utilization networks into three-dimensional data, wherein the three-dimensional data comprise an area dimension, a time dimension and a parameter dimension of power utilization products;
step S2, dividing the area dimension into a plurality of power utilization units, dividing the power utilization units according to the sensitivity levels into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area;
step S3, dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively;
step S4, dividing the parameter dimension of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into a high sensitivity grade parameter, a medium sensitivity grade parameter and a low sensitivity grade parameter according to the sensitivity grade;
step S5, calculating a first risk value of a certain item of data to be encrypted through a first risk algorithm, performing primary encryption processing when the first risk value is greater than a first threshold value, and performing secondary encryption processing when the first risk value is greater than a second threshold value, wherein the second threshold value is greater than the first threshold value;
and step S6, numbering the data subjected to the primary encryption processing and the data subjected to the secondary encryption processing respectively, and storing the numbered data in the storage subsystem (14).
2. The multidimensional encryption processing method for sensitive data according to claim 1, wherein the step S5 further comprises the steps of:
step A1, performing region classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity level region, a medium-sensitivity level region and a low-sensitivity level region into a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value respectively, and when the region classification value taking on the electricity consumption data belongs to one of the high-sensitivity level region value, the medium-sensitivity level region value and the low-sensitivity level region value, recording the belonging region value as 1, and recording the rest two non-belonging region values as 0;
step A2, classifying and dereferencing the power consumption data in time periods, classifying and dereferencing the data belonging to the time periods with high sensitivity levels, middle sensitivity levels and low sensitivity levels into a time period value with high sensitivity levels, a time period value with middle sensitivity levels and a time period value with low sensitivity levels, when the time period dereferencing of the power consumption data belongs to one of the time period value with high sensitivity levels, the time period value with middle sensitivity levels and the time period value with low sensitivity levels, the belonged time period value is marked as 1, and the other two time period values which do not belong to are marked as 0;
step A3, carrying out parameter classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity grade parameter, a medium-sensitivity grade parameter and a low-sensitivity grade parameter into a high-sensitivity grade parameter value, a medium-sensitivity grade parameter value and a low-sensitivity grade parameter value respectively, recording the belonging parameter value as 1 when the parameter value of the electricity consumption data belongs to one of the high-sensitivity grade parameter value, the medium-sensitivity grade parameter value and the low-sensitivity grade parameter value, and recording the other two parameter values which do not belong to as 0;
step A4, calculating the first risk algorithm according to the area value, the time period value and the parameter value of the data to obtain a first risk value of the data to be encrypted.
3. The multidimensional encryption processing method for sensitive data according to claim 2, wherein the first risk algorithm is configured to:
Figure FDA0003119783660000031
wherein F1 is a first risk value, Qg, Qz and Qd are respectively a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value, Dg, Dz and Dd are respectively a high-sensitivity level time period value, a medium-sensitivity level time period value and a low-sensitivity level time period value, Cg, Cz and Cd are respectively a high-sensitivity level parameter value, a medium-sensitivity level parameter value and a low-sensitivity level parameter value, and a1 to a9 are respectively first to ninth weighted values.
4. The multidimensional encryption processing method for the sensitive data according to claim 3, wherein the electricity utilization unit at least comprises a floor subunit;
the step S1 further includes:
step B1, dividing the floor subunits in the high-sensitivity level area into a high-sensitivity level floor, a medium-sensitivity level floor and a low-sensitivity level floor according to the sensitivity levels;
and step B2, classifying the power utilization floors to obtain values, respectively obtaining the floors belonging to the high-sensitivity-level floors, the medium-sensitivity-level floors and the low-sensitivity-level floors as high-sensitivity-level floors, medium-sensitivity-level floors and low-sensitivity-level floors, recording the belonged floors as 1 when the power utilization floors belong to one of the high-sensitivity-level floors, the medium-sensitivity-level floors and the low-sensitivity-level floors, and recording the rest two floors which do not belong to as 0.
5. The multi-dimensional encryption processing method for the sensitive data according to claim 4, wherein the electricity utilization parameters comprise electricity consumption, electricity utilization types and electricity utilization voltage, and the electricity utilization types comprise industrial electricity, commercial electricity, residential electricity and non-industrial electricity;
the step S4 further includes:
and step C1, carrying out power utilization type value determination on the power utilization types belonging to industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, wherein the values are respectively an industrial power utilization value, a commercial power utilization value, a residential power utilization value and a non-industrial power utilization value, when the power utilization type value belongs to one of the industrial power utilization value, the commercial power utilization value, the residential power utilization value and the non-industrial power utilization value, the belonging power utilization type value is marked as 1, and the other three power utilization type values which are not belong are marked as 0.
6. The multidimensional encryption processing method for sensitive data according to claim 5, wherein the step S5 further comprises:
and D1, performing three-level encryption processing when the second risk value is greater than a second threshold value, and performing four-level encryption processing when the second risk value is greater than a fourth threshold value, wherein the fourth threshold value is greater than a third threshold value, through a second risk value of a certain item of data needing to be encrypted by a second risk algorithm.
7. The multidimensional encryption processing method for sensitive data according to claim 6, wherein the step S5 further comprises:
and D2, calculating the second risk algorithm according to the area value, the time period value, the parameter value, the floor value, the electricity consumption, the electricity utilization voltage and the electricity utilization type value of the data to obtain a second risk value of the data needing to be encrypted.
8. The multidimensional encryption processing method for sensitive data according to claim 7, wherein the second risk algorithm is configured to:
Figure FDA0003119783660000041
wherein F2 is a second risk value, DL is power consumption, DY is power consumption voltage, K1 is a first proportional coefficient, K2 is a second proportional coefficient, Lg, Lz and Ld are respectively a high-sensitivity-level floor value, a medium-sensitivity-level floor value and a low-sensitivity-level floor value, Gd, Sd, Zd and FGd are respectively an industrial power consumption value, a commercial power consumption value, a residential power consumption value and a non-industrial power consumption value, and a10 to a16 are respectively tenth weighted value to sixteenth weighted value.
CN202110673617.XA 2021-06-17 2021-06-17 Sensitive data multidimensional encryption processing method Active CN113395286B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110673617.XA CN113395286B (en) 2021-06-17 2021-06-17 Sensitive data multidimensional encryption processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110673617.XA CN113395286B (en) 2021-06-17 2021-06-17 Sensitive data multidimensional encryption processing method

Publications (2)

Publication Number Publication Date
CN113395286A true CN113395286A (en) 2021-09-14
CN113395286B CN113395286B (en) 2023-03-24

Family

ID=77621698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110673617.XA Active CN113395286B (en) 2021-06-17 2021-06-17 Sensitive data multidimensional encryption processing method

Country Status (1)

Country Link
CN (1) CN113395286B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553536A (en) * 2022-02-22 2022-05-27 国网浙江省电力有限公司宁波供电公司 Automatic desensitization system and desensitization method for power grid data
CN114785596A (en) * 2022-04-22 2022-07-22 贵州爱信诺航天信息有限公司 Industrial control service platform, method and storage medium based on domestic password

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103855808A (en) * 2014-03-26 2014-06-11 四川启明星蜀达电气有限公司 PPCloud-based intelligent household power efficiency analysis system and method
CN105046583A (en) * 2015-08-06 2015-11-11 国电南瑞科技股份有限公司 Power grid model partitioning method suitable for distributed real-time data processing
CN105139282A (en) * 2015-08-20 2015-12-09 国家电网公司 Power grid index data processing method, device and calculation device
US20160357177A1 (en) * 2015-06-02 2016-12-08 Rockwell Automation Technologies, Inc. Security System for Industrial Control Infrastructure using Dynamic Signatures
CN106250517A (en) * 2016-08-02 2016-12-21 广东电网有限责任公司中山供电局 The storage system and method for regional power grid power consumption data
CN106407191A (en) * 2015-07-27 2017-02-15 中国移动通信集团公司 Data processing method and server
CN107944283A (en) * 2017-11-15 2018-04-20 中国农业银行股份有限公司 A kind of data sensitive recognition methods and device
CN109871699A (en) * 2019-01-28 2019-06-11 中国平安财产保险股份有限公司 Method, apparatus, computer equipment and the storage medium of tables of data safe handling
CN111222777A (en) * 2019-12-31 2020-06-02 嘉兴太美医疗科技有限公司 Data leakage protection method and integrated system based on risk management
CN111680856A (en) * 2020-01-14 2020-09-18 国家电网有限公司 User behavior safety early warning method and system for power monitoring system
CN111898163A (en) * 2020-09-30 2020-11-06 南京信同诚信息技术有限公司 Big data center level protection safety coefficient
CN112085413A (en) * 2020-09-22 2020-12-15 厦门理工学院 Power quality grade calculation method, terminal equipment and storage medium
CN112527812A (en) * 2020-12-04 2021-03-19 北京顺达同行科技有限公司 Data permission processing method and device based on multiple dimensions and computer equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103855808A (en) * 2014-03-26 2014-06-11 四川启明星蜀达电气有限公司 PPCloud-based intelligent household power efficiency analysis system and method
US20160357177A1 (en) * 2015-06-02 2016-12-08 Rockwell Automation Technologies, Inc. Security System for Industrial Control Infrastructure using Dynamic Signatures
CN106407191A (en) * 2015-07-27 2017-02-15 中国移动通信集团公司 Data processing method and server
CN105046583A (en) * 2015-08-06 2015-11-11 国电南瑞科技股份有限公司 Power grid model partitioning method suitable for distributed real-time data processing
CN105139282A (en) * 2015-08-20 2015-12-09 国家电网公司 Power grid index data processing method, device and calculation device
CN106250517A (en) * 2016-08-02 2016-12-21 广东电网有限责任公司中山供电局 The storage system and method for regional power grid power consumption data
CN107944283A (en) * 2017-11-15 2018-04-20 中国农业银行股份有限公司 A kind of data sensitive recognition methods and device
CN109871699A (en) * 2019-01-28 2019-06-11 中国平安财产保险股份有限公司 Method, apparatus, computer equipment and the storage medium of tables of data safe handling
CN111222777A (en) * 2019-12-31 2020-06-02 嘉兴太美医疗科技有限公司 Data leakage protection method and integrated system based on risk management
CN111680856A (en) * 2020-01-14 2020-09-18 国家电网有限公司 User behavior safety early warning method and system for power monitoring system
CN112085413A (en) * 2020-09-22 2020-12-15 厦门理工学院 Power quality grade calculation method, terminal equipment and storage medium
CN111898163A (en) * 2020-09-30 2020-11-06 南京信同诚信息技术有限公司 Big data center level protection safety coefficient
CN112527812A (en) * 2020-12-04 2021-03-19 北京顺达同行科技有限公司 Data permission processing method and device based on multiple dimensions and computer equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王志强等: "基于公共模型技术的非结构化元数据管理技术研究与应用", 《工业仪表与自动化装置》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553536A (en) * 2022-02-22 2022-05-27 国网浙江省电力有限公司宁波供电公司 Automatic desensitization system and desensitization method for power grid data
CN114785596A (en) * 2022-04-22 2022-07-22 贵州爱信诺航天信息有限公司 Industrial control service platform, method and storage medium based on domestic password

Also Published As

Publication number Publication date
CN113395286B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
Jindal et al. Decision tree and SVM-based data analytics for theft detection in smart grid
CN113395286B (en) Sensitive data multidimensional encryption processing method
Song et al. An energy-cyber-physical system for personalized normative messaging interventions: Identification and classification of behavioral reference groups
Zhao et al. Analysis of users’ electricity consumption behavior based on ensemble clustering
CN116366374B (en) Security assessment method, system and medium for power grid network management based on big data
CN117574436B (en) Tensor-based big data privacy security protection method
CN116996220B (en) Safe storage method and system for big data of power grid
CN117692257A (en) High-speed encryption method and device for service data of electric power Internet of things
CN106651630B (en) Key electricity utilization industry identification method and system
Gholami et al. Detection and Classification of Anomalies in Power Distribution System Using Outlier Filtered Weighted Least Square
Cottrell et al. Multidimensional urban segregation: an exploratory case study
CN113297600B (en) Sensitive data processing system based on target pointer
CN106127602A (en) A kind of stealing discrimination method based on yojan outlier algorithm and device
Han et al. A method for assessing the fairness of health resource allocation based on geographical grid
Gerlitz et al. Anonymisation score for time series consumption data
CN113297601B (en) Data processing system based on sensitive characteristics
Zongbao A Line loss management method based on improved random forest algorithm in distributed generation system
CN105938610A (en) Illegal electricity utilization judgment and report automatic generation method applied to electricity utilization collection system
Li et al. Researches on data processing and data preventing technologies in the environment of big data in power system
CN113190595B (en) Construction method and device of abnormal electricity utilization data set driven by small sample
CN118171322B (en) Data management system based on three-dimensional live-action model sharing
CN110990869A (en) Electric power big data desensitization method applied to privacy protection
Henriksen-Bulmer et al. Translating contextual integrity into practice using CLIFOD.
Li et al. Load pattern analysis of key accounts based on two-step clustering
CN116633545B (en) Ammeter information acquisition terminal and acquisition method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant