CN115834257A - Cloud electric power data safety protection method and protection system - Google Patents
Cloud electric power data safety protection method and protection system Download PDFInfo
- Publication number
- CN115834257A CN115834257A CN202310133859.9A CN202310133859A CN115834257A CN 115834257 A CN115834257 A CN 115834257A CN 202310133859 A CN202310133859 A CN 202310133859A CN 115834257 A CN115834257 A CN 115834257A
- Authority
- CN
- China
- Prior art keywords
- interference
- data
- matrix
- private
- private data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域technical field
本发明涉及电力数据安全技术领域,具体涉及一种云端电力数据安全防护方法及防护系统。The invention relates to the technical field of power data security, in particular to a cloud power data security protection method and protection system.
背景技术Background technique
目前电力系统传统IT基础设施中,网络管理、存储管理、计算管理是割裂的三大系统,导致所有的应用和安全策略部署,不得不面临多系统的协同配合,以及大量的人工操作。同时,目前电力系统传统IT基础设施在发生网络故障或者攻击时,只是通过强制机械关停或重启的方式进行应对,这种应对机制较简单,不能确保电力系统中的各个网络单元之间互不影响,不能将攻击或者故障限制在一定范围之内。因此,如何将传统IT资源向软件定义数据中心上迁移,在保证对当前运行的业务与应用影响降到最小的同时,还能够保证电力系统中的各个网络单元之间互不影响,并将攻击或者故障限制在一定范围之内,是目前有待研究攻克的技术难点。At present, in the traditional IT infrastructure of the power system, network management, storage management, and computing management are three separate systems. As a result, all applications and security policy deployments have to face the coordination of multiple systems and a large number of manual operations. At the same time, when a network failure or attack occurs in the traditional IT infrastructure of the power system, it only responds by forcing the machine to shut down or restart. Influence, attacks or failures cannot be limited to a certain range. Therefore, how to migrate traditional IT resources to the software-defined data center, while ensuring the minimum impact on the currently running business and applications, can also ensure that each network unit in the power system does not affect each other, and will Or the fault is limited within a certain range, which is a technical difficulty to be studied and overcome at present.
电网设备的运行和防护对于保证电网的稳定和可靠性至关重要。随着电网规模的扩大和对客户服务的更高要求,运行和维护电网的任务逐渐变得更加艰巨。传统运行和防护电网模式已经无法满足日益复杂的需求。在传统模式下,不同部门数据之间相互兼容较差,技术人员因为没有办法有效地分析和诊断电网状态,无法实时防护电力数据。因此,大数据、云计算、物联网和移动互联网技术正在推动智能电网发展与建设,开发新的运行和防护技术变得极其关键,也是智能电网发展的方向之一。The operation and protection of grid equipment is crucial to ensure the stability and reliability of the grid. The task of operating and maintaining the grid has gradually become more difficult as the scale of the grid has expanded and the requirements for customer service have increased. The traditional operation and protection grid mode can no longer meet the increasingly complex needs. In the traditional mode, data from different departments are not compatible with each other, and technicians cannot protect power data in real time because they have no way to effectively analyze and diagnose the status of the power grid. Therefore, big data, cloud computing, Internet of Things and mobile Internet technologies are promoting the development and construction of smart grids. The development of new operation and protection technologies has become extremely critical, and it is also one of the directions for the development of smart grids.
但无线通信链路的开放性也导致了其通信过程极易遭到第三者窃听、通信内容易被篡改等数据安全的威胁。此外,传统技术中对网络层数据密钥处理的密钥处理算法安全程度一般取决于数学模型的求解难度,无法保证通信安全。这些问题对计算能力有限、存储空间较小的无线传感网络都非常不利。However, the openness of the wireless communication link also makes the communication process vulnerable to data security threats such as eavesdropping by a third party and tampering in the communication. In addition, the security level of key processing algorithms for network layer data key processing in traditional technologies generally depends on the difficulty of solving mathematical models, which cannot guarantee communication security. These problems are very unfavorable to wireless sensor networks with limited computing power and small storage space.
为了保障云存储系统中的电力数据安全,特别是私密,目前常见的方法仍然是基于传统的数据密钥处理技术,即简单地用某种密钥处理技术将密钥处理后的数据托管到云存储系统中。现行机制存在的问题有:数据文件的内容对数据信息不加区分,作为一个整体进行相同的密钥处理;数据文件的整体存储,用户访问策略不能细分,即不能通过访问策略控制相应用户对私密数据的访问;数据托管方无法改变公有云本身存在的数据存储的不安全性;电力行业自身拥有的云存储设备没有充分利用,以提升存储安全性。In order to ensure the security of power data in the cloud storage system, especially the privacy, the current common method is still based on the traditional data key processing technology, that is, simply use some key processing technology to host the data processed by the key to the cloud in the storage system. The problems existing in the current mechanism are: the content of the data file does not distinguish the data information, and the same key is processed as a whole; the overall storage of the data file, the user access policy cannot be subdivided, that is, the corresponding user cannot be controlled by the access policy. Access to private data; the data custodian cannot change the insecurity of data storage in the public cloud itself; the cloud storage equipment owned by the power industry itself is not fully utilized to improve storage security.
发明内容Contents of the invention
为了解决上述技术问题,本发明提出了一种云端电力数据安全防护方法,包括如下步骤:In order to solve the above technical problems, the present invention proposes a cloud power data security protection method, comprising the following steps:
S1、对终端装置产生的数据进行处理及存储,将终端装置产生的数据分割为私密数据块和普通数据块;S1. Process and store the data generated by the terminal device, and divide the data generated by the terminal device into private data blocks and common data blocks;
S2、将私密数据块进行分类,将不同类别的私密数据块进行不同程度的密钥处理,得到密钥处理后的私密数据矩阵;S2. Classifying the private data blocks, performing key processing on different types of private data blocks to obtain a private data matrix after key processing;
S3、利用矩阵压缩算法对密钥处理后的所述私密数据矩阵进行矩阵压缩,得到干扰矩阵;S3. Using a matrix compression algorithm to perform matrix compression on the secret data matrix after key processing to obtain an interference matrix;
S4、对干扰矩阵进行数据干扰挖掘,形成干扰属性数据集,用干扰噪声值替换干扰属性数据集中的干扰属性值。S4. Perform data interference mining on the interference matrix to form an interference attribute data set, and replace the interference attribute values in the interference attribute data set with interference noise values.
进一步地,步骤S3中:Further, in step S3:
给定一组m列×n行的私密数据矩阵,私密数据矩阵通过矩阵压缩算法压缩得到m列×t行的左矩阵和t列×n行的右矩阵:Given a set of private data matrices with m columns x n rows , the secret data matrix The left matrix of m columns × t rows is obtained by compressing the matrix compression algorithm and the right matrix of t columns by n rows :
; ;
其中,私密数据矩阵最大化压缩为左矩阵和右矩阵,左矩阵和右矩阵压缩为多个干扰矩阵:m列×a行的干扰矩阵和a列×n行的干扰矩阵。Among them, the private data matrix maximize compression as left matrix and the right matrix , the left matrix and the right matrix Compressed into multiple interference matrices: interference matrix with m columns × a rows and an interference matrix of a column by n row .
进一步地,使用迭代算法求解左矩阵和右矩阵的干扰矩阵,定义干扰度为,通过如下公式计算:Further, use an iterative algorithm to solve the left matrix and the right matrix The interference matrix, define the interference degree as , calculated by the following formula:
;; ; ;
其中,为私密数据矩阵的i列×行的子矩阵,使干扰度最大的、,即为干扰矩阵。in, is the secret data matrix column i × Row submatrix such that the disturbance biggest , , which is the interference matrix.
进一步地,步骤S4包括如下步骤:Further, step S4 includes the following steps:
S41、获取干扰矩阵、的数据,用干扰矩阵中的最后一列乘以干扰矩阵中的第一行,得到原始干扰数据,从原始干扰数据中随机选取k个数据作为干扰属性值,构成干扰属性数据集:;其中为干扰属性数据集中的第j个干扰属性值。S41. Obtain the interference matrix , data, using the interference matrix The last column in is multiplied by the interference matrix In the first row, get the original interference data , from the raw noise data Randomly select k pieces of data as the interference attribute values to form the interference attribute data set: ;in is the jth disturbance attribute value in the disturbance attribute dataset.
S42、对于每个干扰属性值,定义一个干扰区间,表示为:S42. For each disturbance attribute value , define an interference interval, expressed as:
; ;
其中分别为干扰区间的下限和上限,分别由下述公式计算:in are the lower limit and upper limit of the interference interval, respectively, calculated by the following formulas:
; ;
; ;
其中,为干扰属性数据集的归一化值。in, is the disturbance attribute data set normalized value of .
S43、得到干扰属性值的干扰区间为,由以下公式计算干扰噪声值:S43. Get the disturbance attribute value The interference interval is , the interference noise value is calculated by the following formula :
; ;
其中N为随机数。where N is a random number.
S44、将干扰噪声值替换干扰属性数据集中的干扰属性值。S44, will disturb the noise value Replace the noise attribute dataset Interference attribute values in .
进一步地,步骤S2具体包括如下步骤:Further, step S2 specifically includes the following steps:
S21、将私密数据块传入时间卷积块,私密数据块在时间卷积块中先通过时间卷积层,再使用批量归一化通过ReLU激活函数得到该时间卷积块的输出,传送到下一个时间卷积块,重复2次上述过程;S21. Pass the private data block into the time convolution block. In the time convolution block, the private data block first passes through the time convolution layer, and then uses batch normalization to obtain the output of the time convolution block through the ReLU activation function, and transmits it to For the next time convolution block, repeat the above process twice;
S22、经过3个堆叠的时间卷积块输出的数据进入全局平均池化层和时间递归神经网络;S22. The data output by the three stacked time convolution blocks enter the global average pooling layer and the time recurrent neural network;
S23、将全局平均池化层和时间递归神经网络的输出结果进行串联,发送到分类层进行分类,得到不同类别的私密数据块;S23. Connect the output results of the global average pooling layer and the time recurrent neural network in series, and send them to the classification layer for classification to obtain private data blocks of different categories;
S24、将不同类别的私密数据块进行不同程度的密钥处理,得到密钥处理后的私密数据矩阵。S24. Perform different levels of key processing on different types of private data blocks to obtain a key-processed private data matrix.
本发明还提出了一种云端电力数据安全防护系统,用于实现云端电力数据安全防护方法,包括:电力数据系统、处理器、终端装置、云端处理层;The present invention also proposes a cloud power data security protection system for implementing a cloud power data security protection method, including: a power data system, a processor, a terminal device, and a cloud processing layer;
在所述电力数据系统中,所述处理器对终端装置产生的数据进行处理及存储,将终端装置产生的数据分为私密数据块和普通数据块;In the power data system, the processor processes and stores the data generated by the terminal device, and divides the data generated by the terminal device into private data blocks and common data blocks;
云端处理层包括级别分类单元、矩阵压缩单元、替换单元和云服务器;所述级别分类单元将私密数据块进行分类,将不同类别的私密数据块进行不同程度的密钥处理,得到密钥处理后的私密数据矩阵;所述矩阵压缩单元利用矩阵压缩算法对密钥处理后的私密数据矩阵进行矩阵压缩,得到干扰矩阵;所述替换单元对干扰矩阵进行数据干扰挖掘,形成干扰属性数据集,用干扰噪声值替换干扰属性数据集中的干扰属性值。The cloud processing layer includes a level classification unit, a matrix compression unit, a replacement unit, and a cloud server; the level classification unit classifies the private data blocks, performs different key processing on different types of private data blocks, and obtains key processing The secret data matrix; the matrix compression unit uses a matrix compression algorithm to perform matrix compression on the private data matrix after key processing to obtain an interference matrix; the replacement unit performs data interference mining on the interference matrix to form an interference attribute data set, using Disturbance noise values replace the disturbance attribute values in the disturbance attribute dataset.
进一步地,所述处理器包括标记单元和分割单元,所述标记单元按照数据属性,对每个数据的结点地址进行标记,所述分割单元用于根据标记将终端装置产生的数据分为私密数据块和普通数据块。Further, the processor includes a labeling unit and a segmentation unit, the labeling unit labels the node address of each data according to the data attribute, and the segmentation unit is used to divide the data generated by the terminal device into private Data blocks and normal data blocks.
进一步地,所述级别分类单元还包括密钥因子控制装置、密钥因子生成装置和密钥分发装置;所述密钥因子控制装置,用于生成密钥因子划分参数;所述密钥因子生成装置接收密钥因子划分参数,并将密钥因子划分参数划分为多个划分子参数,作为私钥因子;所述密钥分发装置根据私密数据矩阵每一行的序号将多个私钥因子发送给私密数据矩阵的每一行,对私密数据进行密钥处理。Further, the level classification unit also includes a key factor control device, a key factor generation device and a key distribution device; the key factor control device is used to generate key factor division parameters; the key factor generation The device receives the key factor division parameter, and divides the key factor division parameter into multiple sub-parameters as the private key factor; the key distribution device sends multiple private key factors to Each row of the private data matrix performs key processing on the private data.
相比于现有技术,本发明具有如下有益技术效果:Compared with the prior art, the present invention has the following beneficial technical effects:
对终端装置产生的数据进行处理及存储,将终端装置产生的数据分为私密数据块和普通数据块;将私密数据块进行分类,将不同类别的私密数据块进行不同程度的密钥处理;利用矩阵压缩算法对密钥处理后的私密数据矩阵进行矩阵压缩,得到干扰矩阵;对干扰矩阵进行数据干扰挖掘,形成干扰属性数据集,用干扰噪声值替换干扰属性数据集中的干扰属性值,提升了传输和存储的安全性。Process and store the data generated by the terminal device, divide the data generated by the terminal device into private data blocks and ordinary data blocks; classify the private data blocks, and perform different key processing on different types of private data blocks; use The matrix compression algorithm performs matrix compression on the private data matrix after key processing to obtain the interference matrix; performs data interference mining on the interference matrix to form an interference attribute data set, and replaces the interference attribute values in the interference attribute data set with the interference noise value, improving the Security of transmission and storage.
附图说明Description of drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. For those skilled in the art, other drawings can also be obtained based on these drawings without any creative effort.
图1为本发明的云端电力数据安全防护方法的流程图。FIG. 1 is a flow chart of the cloud power data security protection method of the present invention.
图2为本发明的数据干扰挖掘及替换的方法流程图。FIG. 2 is a flow chart of the data interference mining and replacement method of the present invention.
图3为本发明的云端电力数据安全防护系统的结构示意图。FIG. 3 is a schematic structural diagram of the cloud power data security protection system of the present invention.
具体实施方式Detailed ways
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
在本发明的具体实施例附图中,为了更好、更清楚的描述系统中的各元件的工作原理,表现所述装置中各部分的连接关系,只是明显区分了各元件之间的相对位置关系,并不能构成对元件或结构内的信号传输方向、连接顺序及各部分结构大小、尺寸、形状的限定。In the accompanying drawings of specific embodiments of the present invention, in order to better and more clearly describe the working principle of each component in the system, the connection relationship of each part in the device is shown, and only the relative positions between the components are clearly distinguished. The relationship does not constitute a limitation on the signal transmission direction, connection sequence, and the size, size, and shape of each part of the component or structure.
如图1所示,为本发明的云端电力数据安全防护方法的流程图,包括如下步骤:As shown in Figure 1, it is a flow chart of the cloud power data security protection method of the present invention, including the following steps:
S1、在云端电力数据系统中,处理器对终端装置产生的数据进行处理及存储,将终端装置产生的数据分为私密数据块和普通数据块。S1. In the cloud power data system, the processor processes and stores the data generated by the terminal device, and divides the data generated by the terminal device into private data blocks and common data blocks.
S11、对终端装置产生的数据进行索引存储,采用关键字识别技术,对每个数据的结点地址进行标记。S11. Index and store the data generated by the terminal device, and mark the node address of each data by using keyword recognition technology.
索引存储为在储存数据结点信息的同时,还建立附加的索引表。索引表由若干索引项组成。若每个结点在索引表中都有一个索引项,则该索引表称之为稠密索引。索引项的一般形式是:关键字+地址。关键字是能唯一标记一个结点的数据项,稠密索引中索引项的地址指示结点所在的存储位置。Index storage is to create an additional index table while storing data node information. An index table consists of several index entries. If each node has an index entry in the index table, the index table is called a dense index. The general form of an index item is: keyword + address. The key is a data item that can uniquely mark a node, and the address of the index item in the dense index indicates the storage location of the node.
S12、读取终端装置产生的数据的结点地址,根据结点地址的标记信息判定该结点地址为私密数据块的开始位置或者普通数据块的开始位置。S12. Read the node address of the data generated by the terminal device, and determine whether the node address is the start position of the private data block or the start position of the normal data block according to the tag information of the node address.
S13、依次读取下一个结点地址,直到下一结点地址的标记信息与开始位置的标记信息不同,对数据进行分割,生成私密数据块和普通数据块。S13. Read the address of the next node in sequence until the tag information of the next node address is different from the tag information of the start position, and divide the data to generate a private data block and a common data block.
当下一结点地址的标记信息与开始位置的标记信息不同时,说明两个位置所对应的数据属于不同属性的数据,所以需要以该结点地址作为分界点进行分割。When the tag information of the next node address is different from the tag information of the start position, it means that the data corresponding to the two positions belong to data with different attributes, so the node address needs to be used as the dividing point for segmentation.
优选地,可以将每个终端装置产生的数据文件压缩成多个数据块,完全具备接收到其中任意至少一半数量的数据块时,才能恢复原文件;当任意一半或少于一半数量的数据块丢失或损坏时仍能恢复原文件,从而提高了可靠性和可用性;同时任意不足一半数量的数据块被窃取时,不能还原成原文件,从而提高了安全性。若所有数据块均存储于云端处理层,则防护系统仍能获取数据私密信息。Preferably, the data files generated by each terminal device can be compressed into multiple data blocks, and the original file can only be restored when any at least half of the data blocks are fully equipped; when any half or less than half of the data blocks The original file can still be restored when it is lost or damaged, thereby improving reliability and availability; at the same time, when any data block less than half is stolen, it cannot be restored to the original file, thereby improving security. If all data blocks are stored in the cloud processing layer, the protection system can still obtain data private information.
S2、将私密数据块进行分类,将不同类别的私密数据块进行不同程度的密钥处理。S2. Classify the private data blocks, and perform different levels of key processing on different types of private data blocks.
处理器从云端处理层接收私密数据块,对私密数据块进行级别分类处理以便于之后的密钥处理。The processor receives the private data blocks from the cloud processing layer, and classifies the private data blocks to facilitate subsequent key processing.
优选地,采用LSTM-FCN对数据进行分类,分类过程如下。Preferably, LSTM-FCN is used to classify the data, and the classification process is as follows.
S21、将私密数据块传入时间卷积块,私密数据块在时间卷积块中先通过时间卷积层,再使用批量归一化,之后通过ReLU激活函数得到该时间卷积块的输出,输出再作为输入传送到下一个时间卷积块,重复2次上述过程。S21. Pass the private data block into the time convolution block. The private data block first passes through the time convolution layer in the time convolution block, then uses batch normalization, and then obtains the output of the time convolution block through the ReLU activation function. The output is then sent to the next time convolution block as the input, and the above process is repeated twice.
S22、经过3个堆叠的时间卷积块的私密数据块进入全局平均池化层和时间递归神经网络。S22. The private data block after three stacked temporal convolution blocks enters the global average pooling layer and the temporal recurrent neural network.
S23、将全局平均池化层和时间递归神经网络的输出进行串联,发送到分类层进行分类,得到不同类别的私密数据块。S23. Connect the outputs of the global average pooling layer and the time recurrent neural network in series, and send them to the classification layer for classification to obtain private data blocks of different categories.
S24、将不同类别的私密数据块进行不同程度的密钥处理,得到密钥处理后的私密数据矩阵并存储。S24. Perform different levels of key processing on different types of private data blocks to obtain and store a key-processed private data matrix.
将私密数据块按照不同类别划分为不同级别的私密数据块,按照私密数据块的级别进行不同程度的密钥处理,得到密钥处理后的私密数据矩阵,私密数据矩阵的每一行代表一个密钥处理级别。Divide the private data blocks into different levels of private data blocks according to different categories, and perform different levels of key processing according to the level of private data blocks to obtain the private data matrix after key processing. Each row of the private data matrix represents a key processing level.
在优选实施例中,通过密钥因子控制装置生成密钥因子划分参数,每一个密钥因子划分参数对应一个密钥处理级别;通过密钥因子生成装置接收密钥因子划分参数,并将密钥因子划分参数划分为多个划分子参数,作为私钥因子,通过密钥分发装置根据与私密数据矩阵的每一行的序号将多个私钥因子发送给私密数据矩阵的每一行,从而对该行的私密数据进行密钥处理。In a preferred embodiment, the key factor division parameter is generated by the key factor control device, and each key factor division parameter corresponds to a key processing level; the key factor generation device receives the key factor division parameter, and the key The factor division parameter is divided into a plurality of division sub-parameters, and as the private key factor, a plurality of private key factors are sent to each row of the private data matrix by the key distribution device according to the sequence number of each row of the private data matrix, so that the row private data for key processing.
S3、利用矩阵压缩算法对密钥处理后的私密数据矩阵进行矩阵压缩,得到干扰矩阵。S3. Use a matrix compression algorithm to perform matrix compression on the private data matrix after the key processing to obtain an interference matrix.
矩阵压缩算法将私密数据矩阵压缩为左右两个矩阵的乘积,私密数据矩阵中的一列向量为左矩阵中所有列向量的加权和,而权重系数为右矩阵中对应列向量中的元素。基于迭代计算的矩阵压缩算法具有收敛速度快、左右矩阵存储空间容量小的特点。The matrix compression algorithm compresses the private data matrix into the product of the left and right matrices. A column vector in the private data matrix is the weighted sum of all column vectors in the left matrix, and the weight coefficient is the element in the corresponding column vector in the right matrix. The matrix compression algorithm based on iterative calculation has the characteristics of fast convergence speed and small storage space capacity of left and right matrices.
具体地,给定一组m列×n行的私密数据矩阵,私密数据矩阵通过矩阵压缩算法压缩得到左右两个矩阵:m列×t行的左矩阵和t列×n行的右矩阵:Specifically, given a set of secret data matrix with m columns×n rows , the secret data matrix The left and right matrices are obtained by compressing the matrix compression algorithm: the left matrix of m columns × t rows and the right matrix of t columns by n rows :
; ;
其中,t值的选择满足(m+n)t<mn,则私密数据矩阵可最大化压缩为左矩阵和右矩阵,左矩阵的每一列包含了一个基向量,这组基向量构成了一个t维的空间,右矩阵的每一列则为私密数据矩阵对应列向量在该t维空间中的投影。左矩阵和右矩阵又可以压缩为多个干扰矩阵,即m列×a行的干扰矩阵和a列×n行的干扰矩阵。Among them, the choice of t value satisfies (m+n)t<mn, then the secret data matrix Maximally compressible to the left matrix and the right matrix , the left matrix Each column of contains a basis vector, and this set of basis vectors constitutes a t-dimensional space, the right matrix Each column of is the secret data matrix The projection of the corresponding column vector in this t-dimensional space. left matrix and the right matrix It can also be compressed into multiple interference matrices, that is, the interference matrix of m columns × a rows and an interference matrix of a column by n row .
使用迭代算法求解左矩阵和右矩阵的干扰矩阵,定义干扰度为,通过如下公式计算:Solve the left matrix using an iterative algorithm and the right matrix The interference matrix, define the interference degree as , calculated by the following formula:
;; ; ;
其中,为私密数据矩阵的i列×行的子矩阵,使干扰度最大的、,即为干扰矩阵。in, is the secret data matrix column i × Row submatrix such that the disturbance biggest , , which is the interference matrix.
S4、对干扰矩阵、进行数据干扰挖掘,形成干扰属性数据集,用干扰噪声值替换干扰属性数据集的干扰属性值。S4, pair interference matrix , Data interference mining is carried out to form the interference attribute data set, and the interference attribute value of the interference attribute data set is replaced with the interference noise value.
为了提高预测准确度和私密安全水平,本发明基于随机干扰方法进行数据干扰挖掘,随机干扰方法由四个处理步骤组成,并将该随机干扰方法应用于数据干扰挖掘的保护阶段,如图2所示,具体包括如下步骤:In order to improve the prediction accuracy and privacy security level, the present invention carries out data interference mining based on the random interference method. The random interference method is composed of four processing steps, and the random interference method is applied to the protection stage of data interference mining, as shown in FIG. 2 , specifically include the following steps:
S41、获取干扰矩阵、的数据,用干扰矩阵中的最后一列乘以干扰矩阵中的第一行,得到原始干扰数据,从原始干扰数据中随机选取k个数据作为干扰属性值,构成干扰属性数据集为;其中为干扰属性数据集中的第j个干扰属性值。S41. Obtain the interference matrix , data, using the interference matrix The last column in is multiplied by the interference matrix In the first row, get the original interference data , from the raw noise data Randomly select k data as the interference attribute value, and form the interference attribute data set as ;in is the jth disturbance attribute value in the disturbance attribute dataset.
S42、定义干扰属性干扰区间。S42. Define an interference attribute interference interval.
对于每个干扰属性值,定义一个干扰区间,表示为:For each disturbance attribute value , define an interference interval, expressed as:
; ;
其中分别为干扰属性干扰区间的下限和上限,分别由下述公式计算:in are the lower limit and upper limit of the interference interval of the interference attribute, respectively, and are calculated by the following formulas:
; ;
; ;
其中,为干扰属性数据集为的归一化值。in, For the interference attribute data set is normalized value of .
S43、生成随机干扰数据。S43. Generate random interference data.
基于上述两步,可以得到干扰属性值的干扰区间为,由以下公式计算干扰噪声值:Based on the above two steps, the interference attribute value can be obtained The interference interval is , the interference noise value is calculated by the following formula :
; ;
其中N为随机数。where N is a random number.
S44、将干扰噪声值替换干扰属性数据集中的干扰属性值。S44, will disturb the noise value Replace the noise attribute dataset Interference attribute values in .
随机扰乱技术通过随机化噪声对原始数据进行伪装,可以实现电力数据系统中对用户私密的保护。The random scrambling technology camouflages the original data through random noise, which can realize the protection of user privacy in the power data system.
如图3所示,为本发明的云端电力数据安全防护系统的结构示意图,该安全防护系统包括:电力数据系统、处理器、终端装置、云端处理层。As shown in FIG. 3 , it is a schematic structural diagram of the cloud power data security protection system of the present invention. The security protection system includes: a power data system, a processor, a terminal device, and a cloud processing layer.
在电力数据系统中,处理器对终端装置产生的数据进行处理及存储,将终端装置产生的数据分为私密数据块和普通数据块;In the power data system, the processor processes and stores the data generated by the terminal device, and divides the data generated by the terminal device into private data blocks and ordinary data blocks;
处理器包括标记单元和分割单元,标记单元按照数据属性,对每个数据的结点地址进行标记,分割单元用于将终端装置产生的数据分为私密数据块和普通数据块。The processor includes a marking unit and a splitting unit. The marking unit marks the node address of each data according to the data attribute. The splitting unit is used to divide the data generated by the terminal device into private data blocks and common data blocks.
云端处理层包括级别分类单元、矩阵压缩单元、替换单元和云服务器。The cloud processing layer includes level classification unit, matrix compression unit, replacement unit and cloud server.
级别分类单元将私密数据块进行分类,将不同类别的私密数据块进行不同程度的密钥处理,得到密钥处理后的私密数据矩阵。The level classification unit classifies the private data blocks, performs different key processing on different types of private data blocks, and obtains a secret data matrix after key processing.
在优选实施例中,级别分类单元还包括密钥因子控制装置、密钥因子生成装置和密钥分发装置。密钥因子控制装置,用于生成密钥因子划分参数,每一个密钥因子划分参数对应一个密钥处理级别;接收密钥因子生成装置发送的对应每个密钥处理级别的私钥因子,私钥因子由密钥因子划分参数生成,密钥分发装置将私钥因子赋予给私密数据矩阵的每一行。In a preferred embodiment, the class classification unit further includes key factor control means, key factor generation means and key distribution means. The key factor control device is used to generate key factor division parameters, and each key factor division parameter corresponds to a key processing level; receiving the private key factor corresponding to each key processing level sent by the key factor generation device, the private key factor The key factor is generated by dividing parameters of the key factor, and the key distribution device assigns the private key factor to each row of the secret data matrix.
密钥因子生成装置,接收密钥因子划分参数,并将密钥因子划分参数划分为多个划分子参数,作为私钥因子,将多个私钥因子发送至密钥分发装置;密钥分发装置根据与私密数据矩阵的每一行的序号将多个私钥因子发送给私密数据矩阵的每一行,从而对该行的私密数据进行密钥处理。The key factor generation device receives the key factor division parameter, and divides the key factor division parameter into a plurality of division sub-parameters, and sends the multiple private key factors to the key distribution device as the private key factor; the key distribution device A plurality of private key factors are sent to each row of the private data matrix according to the serial number of each row of the private data matrix, so as to perform key processing on the private data of the row.
矩阵压缩单元对利用矩阵压缩算法对密钥处理后的所述私密数据矩阵进行矩阵压缩,得到干扰矩阵。The matrix compression unit performs matrix compression on the secret data matrix after key processing by using a matrix compression algorithm to obtain an interference matrix.
替换单元,对干扰矩阵进行数据干扰挖掘,形成干扰属性数据集,用干扰噪声值替换干扰属性数据集中的干扰属性值。The replacement unit performs data interference mining on the interference matrix to form an interference attribute data set, and replaces interference attribute values in the interference attribute data set with interference noise values.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted via a computer-readable storage medium. The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) and the like.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。The above is only a specific embodiment of the application, but the scope of protection of the application is not limited thereto. Any person familiar with the technical field can easily think of various equivalents within the scope of the technology disclosed in the application. Modifications or replacements, these modifications or replacements shall be covered within the scope of protection of this application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310133859.9A CN115834257B (en) | 2023-02-20 | 2023-02-20 | A cloud power data security protection method and protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310133859.9A CN115834257B (en) | 2023-02-20 | 2023-02-20 | A cloud power data security protection method and protection system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115834257A true CN115834257A (en) | 2023-03-21 |
CN115834257B CN115834257B (en) | 2023-05-19 |
Family
ID=85521868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310133859.9A Active CN115834257B (en) | 2023-02-20 | 2023-02-20 | A cloud power data security protection method and protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115834257B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116186018A (en) * | 2023-04-25 | 2023-05-30 | 国网冀北电力有限公司 | Power data identification and analysis method based on safety control |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101401341A (en) * | 2005-11-18 | 2009-04-01 | 安全第一公司 | Secure data parser method and system |
US20090136023A1 (en) * | 2007-11-26 | 2009-05-28 | National Kaohsiung University Of Applied Sciences | Data Encryption Method Using Discrete Fractional Hadamard Transformation |
CN111835742A (en) * | 2020-07-03 | 2020-10-27 | 南京普建维思信息技术有限公司 | Data security management system and method based on distributed copy storage |
CN111970106A (en) * | 2020-08-19 | 2020-11-20 | 北京邮电大学 | Short ciphertext attribute-based encryption method and system supporting full homomorphism in lattice |
CN114630319A (en) * | 2022-03-16 | 2022-06-14 | 黄文孝 | Power transmission and transformation monitoring data safety management system and method for smart power grid |
-
2023
- 2023-02-20 CN CN202310133859.9A patent/CN115834257B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101401341A (en) * | 2005-11-18 | 2009-04-01 | 安全第一公司 | Secure data parser method and system |
CN103384196A (en) * | 2005-11-18 | 2013-11-06 | 安全第一公司 | Secure data parser method and system |
US20090136023A1 (en) * | 2007-11-26 | 2009-05-28 | National Kaohsiung University Of Applied Sciences | Data Encryption Method Using Discrete Fractional Hadamard Transformation |
CN111835742A (en) * | 2020-07-03 | 2020-10-27 | 南京普建维思信息技术有限公司 | Data security management system and method based on distributed copy storage |
CN111970106A (en) * | 2020-08-19 | 2020-11-20 | 北京邮电大学 | Short ciphertext attribute-based encryption method and system supporting full homomorphism in lattice |
CN114630319A (en) * | 2022-03-16 | 2022-06-14 | 黄文孝 | Power transmission and transformation monitoring data safety management system and method for smart power grid |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116186018A (en) * | 2023-04-25 | 2023-05-30 | 国网冀北电力有限公司 | Power data identification and analysis method based on safety control |
CN116186018B (en) * | 2023-04-25 | 2023-07-14 | 国网冀北电力有限公司 | Power data identification and analysis method based on safety control |
Also Published As
Publication number | Publication date |
---|---|
CN115834257B (en) | 2023-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7441582B2 (en) | Methods, devices, computer-readable storage media and programs for detecting data breaches | |
CN111565205B (en) | Network attack identification method and device, computer equipment and storage medium | |
US20230289661A1 (en) | Root cause discovery engine | |
KR102433425B1 (en) | Multi-signal analysis to identify damaged areas | |
US20210126936A1 (en) | Predicting vulnerabilities affecting assets of an enterprise system | |
US20180262525A1 (en) | Multi-modal, multi-disciplinary feature discovery to detect cyber threats in electric power grid | |
CN113961759B (en) | Abnormality detection method based on attribute map representation learning | |
WO2022142001A1 (en) | Target object evaluation method based on multi-score card fusion, and related device therefor | |
CN110532804A (en) | A kind of secure storage control method based on big data | |
Jeong et al. | Anomaly teletraffic intrusion detection systems on hadoop-based platforms: A survey of some problems and solutions | |
US12301589B2 (en) | Intrusion detection using machine learning | |
CN113746780B (en) | Abnormal host detection method, device, medium and equipment based on host image | |
US20230370486A1 (en) | Systems and methods for dynamic vulnerability scoring | |
CN115834257B (en) | A cloud power data security protection method and protection system | |
US11625438B2 (en) | Monitoring information processing systems utilizing co-clustering of strings in different sets of data records | |
CN116957112A (en) | Training method, device, equipment and storage medium of joint model | |
CN118747186B (en) | User equipment login bitmap data storage method, device, electronic device and medium | |
CN115543991B (en) | Data restoration method, device and related equipment based on feature sampling | |
US12223056B1 (en) | Graph-based detection of abusive computational nodes | |
US20240202370A1 (en) | Telemetry data protection for software applications | |
CN112087448B (en) | Security log extraction method, device and computer equipment | |
US20230029312A1 (en) | Similarity-based search for fraud prevention | |
CN114493850A (en) | Artificial intelligence-based online notarization method, system and storage medium | |
CN113221023B (en) | Information pushing method and device | |
US20230342488A1 (en) | Generating and processing personal information chains using machine learning techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |