CN113395286A - Sensitive data multidimensional encryption processing method - Google Patents
Sensitive data multidimensional encryption processing method Download PDFInfo
- Publication number
- CN113395286A CN113395286A CN202110673617.XA CN202110673617A CN113395286A CN 113395286 A CN113395286 A CN 113395286A CN 202110673617 A CN202110673617 A CN 202110673617A CN 113395286 A CN113395286 A CN 113395286A
- Authority
- CN
- China
- Prior art keywords
- value
- sensitivity
- power utilization
- data
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- General Physics & Mathematics (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Computational Biology (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a sensitive data multidimensional encryption processing method, which is provided with an encryption processing system, wherein the encryption processing system comprises a multidimensional data acquisition subsystem, a processing subsystem, an encryption subsystem and a storage subsystem; the multidimensional data acquisition subsystem comprises an area identification module, an electricity utilization time period acquisition module and an electricity utilization parameter acquisition module, wherein the electricity utilization area identification module is used for acquiring an electricity utilization area, the electricity utilization area comprises a plurality of electricity utilization units, the electricity utilization time period acquisition module is used for acquiring an electricity utilization time period in the electricity utilization area, and the electricity utilization parameter acquisition module is used for acquiring an electricity utilization parameter in the electricity utilization area.
Description
Technical Field
The invention relates to the technical field of sensitive data processing, in particular to a sensitive data multi-dimensional encryption processing method.
Background
Sensitive data refers to data that may pose serious harm to the society or individuals after leakage. Including personal privacy data such as name, identification number, address, telephone, bank account, mailbox, password, medical information, educational background, etc.; but also data that the enterprise or social organization is not suitable for publishing, such as the business situation of the enterprise, the network structure of the enterprise, the IP address list, etc. Especially in the field of power grids, some power utilization data belong to sensitive data and need to be encrypted. The dimensions of data are diverse, with the necessary commonly used parameter dimensions such as: time, gender, region, etc., may also be divided into qualitative and quantitative dimensions.
However, in the prior art, when data existing in a power grid is processed, the data is insufficient in the aspect of dimensional analysis, so that the encryption processing efficiency in the power grid data is low, when the data needing encryption processing is excessive, the processing difficulty of a back-end server is increased, the time consumed in the processing process is increased, meanwhile, the data protection effect is not good enough, if a simple encryption means is adopted, the safety is low, and if a complex encryption means is adopted, the operation time of back-end processing is increased, and the energy consumption is increased.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a sensitive data multidimensional encryption processing method which can carry out multidimensional hierarchical encryption processing on sensitive data in a power grid so as to solve the problem that the encryption processing method is poor in the existing power grid data processing process.
In order to achieve the purpose, the invention is realized by the following technical scheme: a sensitive data multidimensional encryption processing method is provided with an encryption processing system, wherein the encryption processing system comprises a multidimensional data acquisition subsystem, a processing subsystem, an encryption subsystem and a storage subsystem; the multi-dimensional data acquisition subsystem comprises an area identification module, an electricity utilization time period acquisition module and an electricity utilization parameter acquisition module;
the power utilization area identification module is used for acquiring a power utilization area, the power utilization area comprises a plurality of power utilization units, the power utilization time period acquisition module is used for acquiring a power utilization time period in the power utilization area, and the power utilization parameter acquisition module is used for acquiring power utilization parameters in the power utilization area;
the processing subsystem is used for receiving the electricity utilization data acquired by the multi-dimensional data acquisition subsystem, processing the electricity utilization data and obtaining data needing to be encrypted;
the encryption subsystem is used for encrypting the data which needs to be encrypted and is obtained by the processing subsystem;
the storage subsystem is used for storing the encrypted data.
The encryption processing method comprises the following steps:
step S1, dividing a database in the field of power utilization networks into three-dimensional data, wherein the three-dimensional data comprise an area dimension, a time dimension and a parameter dimension of power utilization products;
step S2, dividing the area dimension into a plurality of power utilization units, dividing the power utilization units according to the sensitivity levels into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area;
step S3, dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively;
step S4, dividing the parameter dimension of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into a high sensitivity grade parameter, a medium sensitivity grade parameter and a low sensitivity grade parameter according to the sensitivity grade;
step S5, calculating a first risk value of a certain item of data to be encrypted through a first risk algorithm, performing primary encryption processing when the first risk value is greater than a first threshold value, and performing secondary encryption processing when the first risk value is greater than a second threshold value, wherein the second threshold value is greater than the first threshold value;
and step S6, respectively numbering the data subjected to the primary encryption processing and the data subjected to the secondary encryption processing, and storing the numbered data in the storage subsystem.
Further, the step S5 further includes the following steps:
step A1, performing region classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity level region, a medium-sensitivity level region and a low-sensitivity level region into a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value respectively, and when the region classification value taking on the electricity consumption data belongs to one of the high-sensitivity level region value, the medium-sensitivity level region value and the low-sensitivity level region value, recording the belonging region value as 1, and recording the rest two non-belonging region values as 0;
step A2, classifying and dereferencing the power consumption data in time periods, classifying and dereferencing the data belonging to the time periods with high sensitivity levels, middle sensitivity levels and low sensitivity levels into a time period value with high sensitivity levels, a time period value with middle sensitivity levels and a time period value with low sensitivity levels, when the time period dereferencing of the power consumption data belongs to one of the time period value with high sensitivity levels, the time period value with middle sensitivity levels and the time period value with low sensitivity levels, the belonged time period value is marked as 1, and the other two time period values which do not belong to are marked as 0;
step A3, carrying out parameter classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity grade parameter, a medium-sensitivity grade parameter and a low-sensitivity grade parameter into a high-sensitivity grade parameter value, a medium-sensitivity grade parameter value and a low-sensitivity grade parameter value respectively, recording the belonging parameter value as 1 when the parameter value of the electricity consumption data belongs to one of the high-sensitivity grade parameter value, the medium-sensitivity grade parameter value and the low-sensitivity grade parameter value, and recording the other two parameter values which do not belong to as 0;
step A4, calculating the first risk algorithm according to the area value, the time period value and the parameter value of the data to obtain a first risk value of the data to be encrypted.
Further, the first risk algorithm is configured to:
wherein F1 is a first risk value, Qg, Qz and Qd are respectively a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value, Dg, Dz and Dd are respectively a high-sensitivity level time period value, a medium-sensitivity level time period value and a low-sensitivity level time period value, Cg, Cz and Cd are respectively a high-sensitivity level parameter value, a medium-sensitivity level parameter value and a low-sensitivity level parameter value, and a1 to a9 are respectively first to ninth weighted values.
Further, the electricity utilization unit at least comprises a floor subunit;
the step S1 further includes:
step B1, dividing the floor subunits in the high-sensitivity level area into a high-sensitivity level floor, a medium-sensitivity level floor and a low-sensitivity level floor according to the sensitivity levels;
step B2, classifying the electricity utilization floors, and respectively taking the floors belonging to the high-sensitivity level floors, the medium-sensitivity level floors and the low-sensitivity level floors as high-sensitivity level floor values, medium-sensitivity level floor values and low-sensitivity level floor values, wherein when the electricity utilization floor values belong to one of the high-sensitivity level floor values, the medium-sensitivity level floor values and the low-sensitivity level floor values, the belonged floor values are marked as 1, and the rest two floor values which do not belong to are marked as 0;
further, the electricity usage parameters include electricity usage, electricity usage types including industrial electricity, commercial electricity, residential electricity, and non-industrial electricity, and electricity usage voltage;
the step S4 further includes:
and step C1, carrying out power utilization type value determination on the power utilization types belonging to industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, wherein the values are respectively an industrial power utilization value, a commercial power utilization value, a residential power utilization value and a non-industrial power utilization value, when the power utilization type value belongs to one of the industrial power utilization value, the commercial power utilization value, the residential power utilization value and the non-industrial power utilization value, the belonging power utilization type value is marked as 1, and the other three power utilization type values which are not belong are marked as 0.
Further, the step S5 further includes:
and D1, performing three-level encryption processing when the second risk value is greater than a second threshold value, and performing four-level encryption processing when the second risk value is greater than a fourth threshold value, wherein the fourth threshold value is greater than a third threshold value, through a second risk value of a certain item of data needing to be encrypted by a second risk algorithm.
Further, the step S5 further includes:
and D2, calculating the second risk algorithm according to the area value, the time period value, the parameter value, the floor value, the electricity consumption, the electricity utilization voltage and the electricity utilization type value of the data to obtain a second risk value of the data needing to be encrypted.
Further, the second risk algorithm is configured to:
wherein F2 is a second risk value, DL is power consumption, DY is power consumption voltage, K1 is a first proportional coefficient, K2 is a second proportional coefficient, Lg, Lz and Ld are respectively a high-sensitivity-level floor value, a medium-sensitivity-level floor value and a low-sensitivity-level floor value, Gd, Sd, Zd and FGd are respectively an industrial power consumption value, a commercial power consumption value, a residential power consumption value and a non-industrial power consumption value, and a10 to a16 are respectively tenth weighted value to sixteenth weighted value.
The invention has the beneficial effects that: according to the method, a database in the field of power grid utilization is divided into three-dimensional data, the three-dimensional data comprise an area dimension, a time dimension and a power utilization product parameter dimension, the area dimension is divided into a plurality of power utilization units, the power utilization units are divided according to sensitivity levels and are respectively divided into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area; dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively; the method comprises the steps of dividing parameter dimensions of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into high sensitivity grade parameters, medium sensitivity grade parameters and low sensitivity grade parameters according to sensitivity grades, calculating a first risk value required to be encrypted for a certain item of data through a first risk algorithm, and performing accurate hierarchical encryption processing on the data through the first risk value, so that the targeted protection on the power grid data is improved, and the safety of the whole data processing is improved.
According to the invention, the floor subunits in the high-sensitivity grade area are divided into high-sensitivity grade floors, medium-sensitivity grade floors and low-sensitivity grade floors according to the sensitivity grade, the power utilization parameters are divided into power consumption, power utilization types and power utilization voltage, the power utilization types are divided into industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, and a second risk value of the data needing to be encrypted is obtained by calculating according to the area value, the time period value, the parameter value, the floor value, the power consumption, the power utilization voltage and the power utilization type value of the data through a second risk algorithm, so that the classification of the data can be refined, and the protection strength of the precise data is improved.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a functional block diagram of an encryption processing system of the present invention;
FIG. 2 is a flow chart of the method steps of the present invention.
In the figure: 1. an encryption processing system; 11. a multi-dimensional data acquisition subsystem; 111. a region identification module; 112. a power consumption time period acquisition module; 113. a power consumption parameter acquisition module; 12. a processing subsystem; 13. an encryption subsystem; 14. a storage subsystem.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
In a first embodiment, referring to fig. 1 and fig. 2, a multidimensional encryption processing method for sensitive data is configured with an encryption processing system 1, where the encryption processing system 1 includes a multidimensional data acquisition subsystem 11, a processing subsystem 12, an encryption subsystem 13, and a storage subsystem 14; the multidimensional data acquisition subsystem 11 comprises an area identification module 111, an electricity consumption time period acquisition module and an electricity consumption parameter acquisition module 113, and the processing subsystem 12 is used for receiving the electricity consumption data acquired by the multidimensional data acquisition subsystem 11, processing the electricity consumption data and obtaining data to be encrypted; the encryption subsystem 13 is used for encrypting data which needs to be encrypted and is obtained by processing of the processing subsystem 12; the storage subsystem 14 is used for storing encrypted data.
The data of a plurality of dimensions that can acquire the power consumption data through multidimensional data acquisition subsystem 11 are handled the power consumption data through processing subsystem 12, can obtain the data that need encrypt in grades, carry out the encryption in grades through encryption subsystem 13, can improve the precision of the multidimensional encryption processing to sensitive data, improve the efficiency of data encryption to promote entire system's data processing's operating efficiency.
The power utilization region identification module 111 is used for acquiring a power utilization region, the power utilization region comprises a plurality of power utilization units, the power utilization time period acquisition module is used for acquiring a power utilization time period in the power utilization region, the power utilization parameter acquisition module 113 is used for acquiring power utilization parameters in the power utilization region, and the power utilization region, the power utilization time period and the power utilization parameters are split on power utilization data from three dimensions, so that the sensitive data can be finely split and protected, and the safety of sensitive data processing is guaranteed.
The encryption processing method comprises the following steps:
step S1, dividing a database in the field of power utilization networks into three-dimensional data, wherein the three-dimensional data comprise an area dimension, a time dimension and a parameter dimension of power utilization products;
step S2, dividing the area dimension into a plurality of power utilization units, dividing the power utilization units according to the sensitivity levels into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area;
step S3, dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively;
step S4, dividing the parameter dimension of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into a high sensitivity grade parameter, a medium sensitivity grade parameter and a low sensitivity grade parameter according to the sensitivity grade;
step S5, calculating a first risk value of a certain item of data to be encrypted through a first risk algorithm, performing primary encryption processing when the first risk value is greater than a first threshold value, and performing secondary encryption processing when the first risk value is greater than a second threshold value, wherein the second threshold value is greater than the first threshold value;
the step S5 further includes the steps of:
step A1, performing region classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity level region, a medium-sensitivity level region and a low-sensitivity level region into a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value respectively, and when the region classification value taking on the electricity consumption data belongs to one of the high-sensitivity level region value, the medium-sensitivity level region value and the low-sensitivity level region value, recording the belonging region value as 1, and recording the rest two non-belonging region values as 0;
step A2, classifying and dereferencing the power consumption data in time periods, classifying and dereferencing the data belonging to the time periods with high sensitivity levels, middle sensitivity levels and low sensitivity levels into a time period value with high sensitivity levels, a time period value with middle sensitivity levels and a time period value with low sensitivity levels, when the time period dereferencing of the power consumption data belongs to one of the time period value with high sensitivity levels, the time period value with middle sensitivity levels and the time period value with low sensitivity levels, the belonged time period value is marked as 1, and the other two time period values which do not belong to are marked as 0;
step A3, carrying out parameter classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity grade parameter, a medium-sensitivity grade parameter and a low-sensitivity grade parameter into a high-sensitivity grade parameter value, a medium-sensitivity grade parameter value and a low-sensitivity grade parameter value respectively, recording the belonging parameter value as 1 when the parameter value of the electricity consumption data belongs to one of the high-sensitivity grade parameter value, the medium-sensitivity grade parameter value and the low-sensitivity grade parameter value, and recording the other two parameter values which do not belong to as 0;
step A4, calculating the first risk algorithm according to the area value, the time period value and the parameter value of the data to obtain a first risk value of the data to be encrypted.
The first risk algorithm is configured to:wherein F1 is a first risk value, Qg, Qz and Qd are respectively a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value, Dg, Dz and Dd are respectively a high-sensitivity level time period value, a medium-sensitivity level time period value and a low-sensitivity level time period value, Cg, Cz and Cd are respectively a high-sensitivity level parameter value, a medium-sensitivity level parameter value and a low-sensitivity level parameter value, and a1 to a9 are respectively first to ninth weighted values.
Step S6, respectively numbering the data subjected to the primary encryption processing and the data subjected to the secondary encryption processing, and storing the numbered data in the storage subsystem 14.
In the second embodiment, on the basis of the first embodiment, floor subunits are added, the area dimension is subdivided, the power grid data of a terminal area can be further encrypted and protected, and the power utilization unit at least comprises one floor subunit;
the step S1 further includes:
step B1, dividing the floor subunits in the high-sensitivity level area into a high-sensitivity level floor, a medium-sensitivity level floor and a low-sensitivity level floor according to the sensitivity levels;
step B2, classifying the electricity utilization floors, and respectively taking the floors belonging to the high-sensitivity level floors, the medium-sensitivity level floors and the low-sensitivity level floors as high-sensitivity level floor values, medium-sensitivity level floor values and low-sensitivity level floor values, wherein when the electricity utilization floor values belong to one of the high-sensitivity level floor values, the medium-sensitivity level floor values and the low-sensitivity level floor values, the belonged floor values are marked as 1, and the rest two floor values which do not belong to are marked as 0;
in the third embodiment, on the basis of the second embodiment, subdivision of power utilization parameters is added, the game degree of sensitive data is further improved, and the protection safety of high-sensitive data is ensured, wherein the power utilization parameters comprise power consumption, power utilization types and power utilization voltage, and the power utilization types comprise industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization;
the step S4 further includes:
and step C1, carrying out power utilization type value determination on the power utilization types belonging to industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, wherein the values are respectively an industrial power utilization value, a commercial power utilization value, a residential power utilization value and a non-industrial power utilization value, when the power utilization type value belongs to one of the industrial power utilization value, the commercial power utilization value, the residential power utilization value and the non-industrial power utilization value, the belonging power utilization type value is marked as 1, and the other three power utilization type values which are not belong are marked as 0.
The step S5 further includes:
and D1, performing three-level encryption processing when the second risk value is greater than a second threshold value, and performing four-level encryption processing when the second risk value is greater than a fourth threshold value, wherein the fourth threshold value is greater than a third threshold value, through a second risk value of a certain item of data needing to be encrypted by a second risk algorithm.
The step S5 further includes:
and D2, calculating the second risk algorithm according to the area value, the time period value, the parameter value, the floor value, the electricity consumption, the electricity utilization voltage and the electricity utilization type value of the data to obtain a second risk value of the data needing to be encrypted.
The second risk algorithm is configured to:wherein F2 is a second risk value, DL is power consumption, DY is power consumption voltage, K1 is a first proportional coefficient, K2 is a second proportional coefficient, Lg, Lz and Ld are respectively a high-sensitivity-level floor value, a medium-sensitivity-level floor value and a low-sensitivity-level floor value, Gd, Sd, Zd and FGd are respectively an industrial power consumption value, a commercial power consumption value, a residential power consumption value and a non-industrial power consumption value, and a10 to a16 are respectively tenth weighted value to sixteenth weighted value.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (8)
1. A multidimensional encryption processing method for sensitive data is characterized in that the encryption processing method is provided with an encryption processing system (1), and the encryption processing system (1) comprises a multidimensional data acquisition subsystem (11), a processing subsystem (12), an encryption subsystem (13) and a storage subsystem (14); the multi-dimensional data acquisition subsystem (11) comprises an area identification module (111), a power utilization time period acquisition module (112) and a power utilization parameter acquisition module (113);
the power utilization area identification module (111) is used for acquiring a power utilization area, the power utilization area comprises a plurality of power utilization units, the power utilization time period acquisition module (112) is used for acquiring a power utilization time period in the power utilization area, and the power utilization parameter acquisition module (113) is used for acquiring power utilization parameters in the power utilization area;
the processing subsystem (12) is used for receiving the electricity utilization data acquired by the multi-dimensional data acquisition subsystem (11), then processing the electricity utilization data and obtaining data needing to be encrypted;
the encryption subsystem (13) is used for encrypting the data which is obtained by the processing subsystem (12) and needs to be encrypted;
the storage subsystem (14) is used for storing the encrypted data.
The encryption processing method comprises the following steps:
step S1, dividing a database in the field of power utilization networks into three-dimensional data, wherein the three-dimensional data comprise an area dimension, a time dimension and a parameter dimension of power utilization products;
step S2, dividing the area dimension into a plurality of power utilization units, dividing the power utilization units according to the sensitivity levels into a high-sensitivity level area, a medium-sensitivity level area and a low-sensitivity level area;
step S3, dividing the time dimension into a plurality of time periods, then dividing the plurality of time periods according to the sensitivity level into a high sensitivity level time period, a medium sensitivity level time period and a low sensitivity level time period respectively;
step S4, dividing the parameter dimension of the power utilization product into a plurality of power utilization parameters, then dividing the plurality of power utilization parameters into a high sensitivity grade parameter, a medium sensitivity grade parameter and a low sensitivity grade parameter according to the sensitivity grade;
step S5, calculating a first risk value of a certain item of data to be encrypted through a first risk algorithm, performing primary encryption processing when the first risk value is greater than a first threshold value, and performing secondary encryption processing when the first risk value is greater than a second threshold value, wherein the second threshold value is greater than the first threshold value;
and step S6, numbering the data subjected to the primary encryption processing and the data subjected to the secondary encryption processing respectively, and storing the numbered data in the storage subsystem (14).
2. The multidimensional encryption processing method for sensitive data according to claim 1, wherein the step S5 further comprises the steps of:
step A1, performing region classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity level region, a medium-sensitivity level region and a low-sensitivity level region into a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value respectively, and when the region classification value taking on the electricity consumption data belongs to one of the high-sensitivity level region value, the medium-sensitivity level region value and the low-sensitivity level region value, recording the belonging region value as 1, and recording the rest two non-belonging region values as 0;
step A2, classifying and dereferencing the power consumption data in time periods, classifying and dereferencing the data belonging to the time periods with high sensitivity levels, middle sensitivity levels and low sensitivity levels into a time period value with high sensitivity levels, a time period value with middle sensitivity levels and a time period value with low sensitivity levels, when the time period dereferencing of the power consumption data belongs to one of the time period value with high sensitivity levels, the time period value with middle sensitivity levels and the time period value with low sensitivity levels, the belonged time period value is marked as 1, and the other two time period values which do not belong to are marked as 0;
step A3, carrying out parameter classification value taking on the electricity consumption data, classifying the data belonging to a high-sensitivity grade parameter, a medium-sensitivity grade parameter and a low-sensitivity grade parameter into a high-sensitivity grade parameter value, a medium-sensitivity grade parameter value and a low-sensitivity grade parameter value respectively, recording the belonging parameter value as 1 when the parameter value of the electricity consumption data belongs to one of the high-sensitivity grade parameter value, the medium-sensitivity grade parameter value and the low-sensitivity grade parameter value, and recording the other two parameter values which do not belong to as 0;
step A4, calculating the first risk algorithm according to the area value, the time period value and the parameter value of the data to obtain a first risk value of the data to be encrypted.
3. The multidimensional encryption processing method for sensitive data according to claim 2, wherein the first risk algorithm is configured to:wherein F1 is a first risk value, Qg, Qz and Qd are respectively a high-sensitivity level region value, a medium-sensitivity level region value and a low-sensitivity level region value, Dg, Dz and Dd are respectively a high-sensitivity level time period value, a medium-sensitivity level time period value and a low-sensitivity level time period value, Cg, Cz and Cd are respectively a high-sensitivity level parameter value, a medium-sensitivity level parameter value and a low-sensitivity level parameter value, and a1 to a9 are respectively first to ninth weighted values.
4. The multidimensional encryption processing method for the sensitive data according to claim 3, wherein the electricity utilization unit at least comprises a floor subunit;
the step S1 further includes:
step B1, dividing the floor subunits in the high-sensitivity level area into a high-sensitivity level floor, a medium-sensitivity level floor and a low-sensitivity level floor according to the sensitivity levels;
and step B2, classifying the power utilization floors to obtain values, respectively obtaining the floors belonging to the high-sensitivity-level floors, the medium-sensitivity-level floors and the low-sensitivity-level floors as high-sensitivity-level floors, medium-sensitivity-level floors and low-sensitivity-level floors, recording the belonged floors as 1 when the power utilization floors belong to one of the high-sensitivity-level floors, the medium-sensitivity-level floors and the low-sensitivity-level floors, and recording the rest two floors which do not belong to as 0.
5. The multi-dimensional encryption processing method for the sensitive data according to claim 4, wherein the electricity utilization parameters comprise electricity consumption, electricity utilization types and electricity utilization voltage, and the electricity utilization types comprise industrial electricity, commercial electricity, residential electricity and non-industrial electricity;
the step S4 further includes:
and step C1, carrying out power utilization type value determination on the power utilization types belonging to industrial power utilization, commercial power utilization, residential power utilization and non-industrial power utilization, wherein the values are respectively an industrial power utilization value, a commercial power utilization value, a residential power utilization value and a non-industrial power utilization value, when the power utilization type value belongs to one of the industrial power utilization value, the commercial power utilization value, the residential power utilization value and the non-industrial power utilization value, the belonging power utilization type value is marked as 1, and the other three power utilization type values which are not belong are marked as 0.
6. The multidimensional encryption processing method for sensitive data according to claim 5, wherein the step S5 further comprises:
and D1, performing three-level encryption processing when the second risk value is greater than a second threshold value, and performing four-level encryption processing when the second risk value is greater than a fourth threshold value, wherein the fourth threshold value is greater than a third threshold value, through a second risk value of a certain item of data needing to be encrypted by a second risk algorithm.
7. The multidimensional encryption processing method for sensitive data according to claim 6, wherein the step S5 further comprises:
and D2, calculating the second risk algorithm according to the area value, the time period value, the parameter value, the floor value, the electricity consumption, the electricity utilization voltage and the electricity utilization type value of the data to obtain a second risk value of the data needing to be encrypted.
8. The multidimensional encryption processing method for sensitive data according to claim 7, wherein the second risk algorithm is configured to:wherein F2 is a second risk value, DL is power consumption, DY is power consumption voltage, K1 is a first proportional coefficient, K2 is a second proportional coefficient, Lg, Lz and Ld are respectively a high-sensitivity-level floor value, a medium-sensitivity-level floor value and a low-sensitivity-level floor value, Gd, Sd, Zd and FGd are respectively an industrial power consumption value, a commercial power consumption value, a residential power consumption value and a non-industrial power consumption value, and a10 to a16 are respectively tenth weighted value to sixteenth weighted value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110673617.XA CN113395286B (en) | 2021-06-17 | 2021-06-17 | Sensitive data multidimensional encryption processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110673617.XA CN113395286B (en) | 2021-06-17 | 2021-06-17 | Sensitive data multidimensional encryption processing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113395286A true CN113395286A (en) | 2021-09-14 |
CN113395286B CN113395286B (en) | 2023-03-24 |
Family
ID=77621698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110673617.XA Active CN113395286B (en) | 2021-06-17 | 2021-06-17 | Sensitive data multidimensional encryption processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113395286B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553536A (en) * | 2022-02-22 | 2022-05-27 | 国网浙江省电力有限公司宁波供电公司 | Automatic desensitization system and desensitization method for power grid data |
CN114785596A (en) * | 2022-04-22 | 2022-07-22 | 贵州爱信诺航天信息有限公司 | Industrial control service platform, method and storage medium based on domestic password |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103855808A (en) * | 2014-03-26 | 2014-06-11 | 四川启明星蜀达电气有限公司 | PPCloud-based intelligent household power efficiency analysis system and method |
CN105046583A (en) * | 2015-08-06 | 2015-11-11 | 国电南瑞科技股份有限公司 | Power grid model partitioning method suitable for distributed real-time data processing |
CN105139282A (en) * | 2015-08-20 | 2015-12-09 | 国家电网公司 | Power grid index data processing method, device and calculation device |
US20160357177A1 (en) * | 2015-06-02 | 2016-12-08 | Rockwell Automation Technologies, Inc. | Security System for Industrial Control Infrastructure using Dynamic Signatures |
CN106250517A (en) * | 2016-08-02 | 2016-12-21 | 广东电网有限责任公司中山供电局 | The storage system and method for regional power grid power consumption data |
CN106407191A (en) * | 2015-07-27 | 2017-02-15 | 中国移动通信集团公司 | Data processing method and server |
CN107944283A (en) * | 2017-11-15 | 2018-04-20 | 中国农业银行股份有限公司 | A kind of data sensitive recognition methods and device |
CN109871699A (en) * | 2019-01-28 | 2019-06-11 | 中国平安财产保险股份有限公司 | Method, apparatus, computer equipment and the storage medium of tables of data safe handling |
CN111222777A (en) * | 2019-12-31 | 2020-06-02 | 嘉兴太美医疗科技有限公司 | Data leakage protection method and integrated system based on risk management |
CN111680856A (en) * | 2020-01-14 | 2020-09-18 | 国家电网有限公司 | User behavior safety early warning method and system for power monitoring system |
CN111898163A (en) * | 2020-09-30 | 2020-11-06 | 南京信同诚信息技术有限公司 | Big data center level protection safety coefficient |
CN112085413A (en) * | 2020-09-22 | 2020-12-15 | 厦门理工学院 | Power quality grade calculation method, terminal equipment and storage medium |
CN112527812A (en) * | 2020-12-04 | 2021-03-19 | 北京顺达同行科技有限公司 | Data permission processing method and device based on multiple dimensions and computer equipment |
-
2021
- 2021-06-17 CN CN202110673617.XA patent/CN113395286B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103855808A (en) * | 2014-03-26 | 2014-06-11 | 四川启明星蜀达电气有限公司 | PPCloud-based intelligent household power efficiency analysis system and method |
US20160357177A1 (en) * | 2015-06-02 | 2016-12-08 | Rockwell Automation Technologies, Inc. | Security System for Industrial Control Infrastructure using Dynamic Signatures |
CN106407191A (en) * | 2015-07-27 | 2017-02-15 | 中国移动通信集团公司 | Data processing method and server |
CN105046583A (en) * | 2015-08-06 | 2015-11-11 | 国电南瑞科技股份有限公司 | Power grid model partitioning method suitable for distributed real-time data processing |
CN105139282A (en) * | 2015-08-20 | 2015-12-09 | 国家电网公司 | Power grid index data processing method, device and calculation device |
CN106250517A (en) * | 2016-08-02 | 2016-12-21 | 广东电网有限责任公司中山供电局 | The storage system and method for regional power grid power consumption data |
CN107944283A (en) * | 2017-11-15 | 2018-04-20 | 中国农业银行股份有限公司 | A kind of data sensitive recognition methods and device |
CN109871699A (en) * | 2019-01-28 | 2019-06-11 | 中国平安财产保险股份有限公司 | Method, apparatus, computer equipment and the storage medium of tables of data safe handling |
CN111222777A (en) * | 2019-12-31 | 2020-06-02 | 嘉兴太美医疗科技有限公司 | Data leakage protection method and integrated system based on risk management |
CN111680856A (en) * | 2020-01-14 | 2020-09-18 | 国家电网有限公司 | User behavior safety early warning method and system for power monitoring system |
CN112085413A (en) * | 2020-09-22 | 2020-12-15 | 厦门理工学院 | Power quality grade calculation method, terminal equipment and storage medium |
CN111898163A (en) * | 2020-09-30 | 2020-11-06 | 南京信同诚信息技术有限公司 | Big data center level protection safety coefficient |
CN112527812A (en) * | 2020-12-04 | 2021-03-19 | 北京顺达同行科技有限公司 | Data permission processing method and device based on multiple dimensions and computer equipment |
Non-Patent Citations (1)
Title |
---|
王志强等: "基于公共模型技术的非结构化元数据管理技术研究与应用", 《工业仪表与自动化装置》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553536A (en) * | 2022-02-22 | 2022-05-27 | 国网浙江省电力有限公司宁波供电公司 | Automatic desensitization system and desensitization method for power grid data |
CN114785596A (en) * | 2022-04-22 | 2022-07-22 | 贵州爱信诺航天信息有限公司 | Industrial control service platform, method and storage medium based on domestic password |
Also Published As
Publication number | Publication date |
---|---|
CN113395286B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jindal et al. | Decision tree and SVM-based data analytics for theft detection in smart grid | |
CN113395286B (en) | Sensitive data multidimensional encryption processing method | |
Song et al. | An energy-cyber-physical system for personalized normative messaging interventions: Identification and classification of behavioral reference groups | |
Zhao et al. | Analysis of users’ electricity consumption behavior based on ensemble clustering | |
CN116366374B (en) | Security assessment method, system and medium for power grid network management based on big data | |
CN117574436B (en) | Tensor-based big data privacy security protection method | |
CN116996220B (en) | Safe storage method and system for big data of power grid | |
CN117692257A (en) | High-speed encryption method and device for service data of electric power Internet of things | |
CN106651630B (en) | Key electricity utilization industry identification method and system | |
Gholami et al. | Detection and Classification of Anomalies in Power Distribution System Using Outlier Filtered Weighted Least Square | |
Cottrell et al. | Multidimensional urban segregation: an exploratory case study | |
CN113297600B (en) | Sensitive data processing system based on target pointer | |
CN106127602A (en) | A kind of stealing discrimination method based on yojan outlier algorithm and device | |
Han et al. | A method for assessing the fairness of health resource allocation based on geographical grid | |
Gerlitz et al. | Anonymisation score for time series consumption data | |
CN113297601B (en) | Data processing system based on sensitive characteristics | |
Zongbao | A Line loss management method based on improved random forest algorithm in distributed generation system | |
CN105938610A (en) | Illegal electricity utilization judgment and report automatic generation method applied to electricity utilization collection system | |
Li et al. | Researches on data processing and data preventing technologies in the environment of big data in power system | |
CN113190595B (en) | Construction method and device of abnormal electricity utilization data set driven by small sample | |
CN118171322B (en) | Data management system based on three-dimensional live-action model sharing | |
CN110990869A (en) | Electric power big data desensitization method applied to privacy protection | |
Henriksen-Bulmer et al. | Translating contextual integrity into practice using CLIFOD. | |
Li et al. | Load pattern analysis of key accounts based on two-step clustering | |
CN116633545B (en) | Ammeter information acquisition terminal and acquisition method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |