CN115987566A - Isolation framework based on new energy power system server - Google Patents

Isolation framework based on new energy power system server Download PDF

Info

Publication number
CN115987566A
CN115987566A CN202211537388.XA CN202211537388A CN115987566A CN 115987566 A CN115987566 A CN 115987566A CN 202211537388 A CN202211537388 A CN 202211537388A CN 115987566 A CN115987566 A CN 115987566A
Authority
CN
China
Prior art keywords
new energy
server
isolation
energy power
domain0
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211537388.XA
Other languages
Chinese (zh)
Inventor
余云昊
狄查美玲
张博达
罗扶华
郭翔
陈晓谨
曹扬
张文哲
苏扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN202211537388.XA priority Critical patent/CN115987566A/en
Publication of CN115987566A publication Critical patent/CN115987566A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a server isolation framework based on a new energy power system, which is realized by adopting a virtual program Xen, wherein the Xen has more than one layer, and the bottommost layer and the highest privilege layer are Xen programs per se; the architecture is deployed according to the following positions: two software modules in the privileged Domain0, one for data isolation and one for network isolation; a marking Service (Labeling Service) is deployed on a storage device of a cloud Service provider; the system level information flow tracking component of the Peertree operation system is arranged on a user virtual machine example of the new energy power station using OmniSep; the technical problems of preventing sensitive information on the cloud service from being leaked and the like are solved.

Description

Isolation framework based on new energy power system server
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a new energy power system server isolation framework.
Background
Renewable energy such as wind energy, solar energy as primary energy has can not store and the fluctuation characteristic for new energy power generation such as wind-powered electricity generation has great uncertainty, and the controllability of electric power system supply side reduces, and new energy electric power system needs in time to make the adjustment to electric power system's operational aspect in real time, in order to ensure new energy electric power system safety and stability operation. On the other hand, the computer network technology is used by modern power systems to replace the traditional distributed plant automation equipment technology, and emerging technologies such as cloud computing, big data and the internet of things are widely applied to the power systems. As a core carrier of the cloud computing technology, the data center is in contact with the whole digital and information network on one hand, and is in fusion development and inseparable with the traditional industry on the other hand, and the data center can realize power load regulation and control by changing the processing time and processing nodes of computing tasks. However, a data center of an existing power system simultaneously accesses data information of a plurality of new energy power stations, a large number of users share a unified network and a server, and how to ensure the safety and privacy of power data in such an environment is a serious problem.
At present, no good solution for preventing network attacks exists, and even if a data leakage prevention system is deployed, sensitive information on cloud services cannot be prevented from being leaked. The lack of technical means can lead to malicious attacks from inside, and how to control, protect and monitor power data becomes an important problem to be faced by a power system, so that a set of data security isolation methods for effective control is urgently needed.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the isolation architecture based on the new energy power system server is provided, so that a cloud service provider can provide safety as service to each new energy power station user, and even if software and service operated by the transformer substation are unsafe, the method can ensure data safety of each point side station, so that the technical problems that sensitive information on the cloud service cannot be prevented from being leaked even if a data leakage prevention system is deployed and a good solution for preventing network attack is not provided are solved.
The technical scheme of the invention is as follows:
an isolation framework based on a new energy power system server is realized by adopting a virtual program Xen, wherein the Xen has more than one layer, and the lowest layer and the highest privilege layer are the Xen program; the architecture is deployed according to the following positions: two software modules in the privileged Domain0, one for data isolation and one for network isolation; a marking Service (Labeling Service) is deployed on a storage device of a cloud Service provider; and the Pedigree operating system level information flow tracking component is installed on a user virtual machine example of the new energy power station using OmniSep.
The framework operation method comprises the following steps: the method comprises the steps that a service provider starts a cloud server, and a new energy power station user sends a registration request to the server; the server verifies the uniqueness through the domain name after receiving the registration request, if the uniqueness passes the verification, the server is allowed to log in, and the cloud server provider sets the authority for the user to operate the power system at the server side; and starting the Xen program, finding the virtual machine with the Domain0 through the xm list, wherein the Domain0 serves as a manager and a controller of the rest virtual machines.
Domain0 constructs Domain and manages virtual devices, and server processes of Xend in the virtual program manage systems through Domain0, and Xend is responsible for managing respective virtual hosts and providing a console access to these systems.
The command is transmitted to Xend through a HTTP interface by a command line tool; a user of the new energy power station operating the Pedigree specifies a security policy and automatically distributes marked data by using a marking service deployed in a cloud service provider, so that the Pedigree can track all information flows between processes and files in a virtual machine instance, and when the data of the new energy power station flows to a network outside the cloud in a non-compliance manner, an execution component in the Domain0 terminates similar data exchange.
And the module for network isolation in the privileged Domain0 is used for detecting user data of the new energy power station sharing hardware resources.
The detection method comprises the following steps: the IP address of the virtual machine instance is rewritten through the server database, so that other new energy power station users are prevented from detecting the real IP address of another user, and the ping value return time is adjusted, so that the ping time value between the virtual machines on the same physical host is the same as the ping time value between different physical hosts.
The invention has the beneficial effects that:
the invention provides a solution based on OmnisSep, and the architecture comprises a series of technologies for enhancing data and network isolation for the user environment of a plurality of new energy power stations in cloud computing. OmnisSep realizes data and network isolation according to the user intention through components deployed at different positions in the cloud, and fully guarantees the data security of the user.
The method has the advantages that the cloud service provider can provide safety as service to each new energy power station user, even if the software and service operated by the transformer substation are unsafe, the method can also ensure the safety of data of each point side station, and the technical problems of preventing sensitive information on the cloud service from being leaked and the like are solved.
Drawings
FIG. 1 is a block diagram of the logical structure of the operation of the present invention.
Detailed Description
The invention provides a new energy power system server isolation framework, so that a cloud service provider can provide safety as service to each new energy power station user, and even if software and service operated by a transformer substation are unsafe, the method can also ensure the safety of data of each point side station.
Example 1: based on a new energy power system server isolation framework, the framework is realized by adopting a virtual program Xen, the Xen has a plurality of layers, the lowest layer and the highest privilege layer are Xen programs, and the framework is deployed according to the following positions:
1) Two software modules in the privileged Domain0, one for data isolation and one for network isolation;
2) A marking Service (marking Service) is deployed on a storage device of a cloud Service provider;
3) The system level information flow tracking component of the Peertree operation system is arranged on a user virtual machine example of the new energy power station using OmniSep;
when Xen starts to run, finding a virtual machine with Domain0 through xm list, wherein the Domain0 is used as a manager and a controller of other virtual hosts, the Domain0 can construct other more domains and manage virtual equipment, a server process of Xend in a virtual program manages a system through the Domain0, and the Xend is responsible for managing a plurality of virtual hosts and providing a console for entering the systems; commands are transferred to Xend via a command line facility through an HTTP interface. A user of the new energy power station operating the Pedigree specifies a security policy and automatically distributes the data marked to the user by using a marking service deployed at a cloud service provider, so that the Pedigree can track all information flow between processes and files in a virtual machine instance, and when the data of the new energy power station flows to a network outside the cloud in a non-specified manner, an execution component in the Domain0 terminates similar data exchange.
The module aiming at network isolation in the privileged Domain0 is used for detecting the user data of the new energy power station sharing hardware resources, rewriting the IP address of the virtual machine instance through the server database, firstly preventing other new energy power station users from detecting the real IP address of another user, and simultaneously adjusting the ping value return time, so that the ping time value between virtual machines on the same physical host and the ping time value between different physical hosts are the same.
The architecture comprises a series of technologies for enhancing data and network isolation for the user environment of a plurality of new energy power stations through cloud computing, omnimeSep realizes data and network isolation according to the user intention through components deployed at different positions in the cloud, and the data security of users is fully guaranteed.

Claims (6)

1. The utility model provides a keep apart framework based on new forms of energy electric power system server which characterized in that: the architecture is realized by adopting a virtual program Xen, wherein Xen has more than one layer, and the bottommost layer and the highest privilege layer are the Xen program; the architecture is deployed according to the following positions: two software modules in privileged Domain0, one for data isolation and one for network isolation; a marking Service (Labeling Service) is deployed on a storage device of a cloud Service provider; and the Pedigree operating system level information flow tracking component is installed on a user virtual machine example of the new energy power station using OmniSep.
2. The new energy based power system server isolation framework of claim 1, wherein: the framework operation method comprises the following steps: the method comprises the steps that a service provider starts a cloud server, and a new energy power station user sends a registration request to the server; the server verifies the uniqueness through the domain name after receiving the registration request, if the uniqueness passes the verification, the server is allowed to log in, and the cloud server provider sets the authority for the user to operate the power system at the server side; and starting the Xen program, finding a virtual machine with Domain0 through xm list, wherein the Domain0 serves as a manager and a controller of the rest virtual machines.
3. The new energy power system server isolation architecture based on claim 2, wherein: domain0 constructs Domain and manages virtual devices, and server processes of Xend in the virtual program manage systems through Domain0, and Xend is responsible for managing respective virtual hosts and providing a console access to these systems.
4. The new energy based power system server isolation framework of claim 3, wherein: the command is transmitted to Xend through an HTTP interface via a command line tool; a user of the new energy power station operating the Pedigree specifies a security policy and automatically distributes marked data by using a marking service deployed in a cloud service provider, so that the Pedigree can track all information flows between processes and files in a virtual machine instance, and when the data of the new energy power station flows to a network outside the cloud in a non-compliance manner, an execution component in the Domain0 terminates similar data exchange.
5. The new energy based power system server isolation framework of claim 2, wherein: and the module for network isolation in the privileged Domain0 is used for detecting user data of the new energy power station sharing hardware resources.
6. The new energy based power system server isolation framework of claim 5, wherein: the detection method comprises the following steps: the IP address of the virtual machine instance is rewritten through the server database, so that other new energy power station users are prevented from detecting the real IP address of another user, and the ping value return time is adjusted, so that the ping time value between the virtual machines on the same physical host is the same as the ping time value between different physical hosts.
CN202211537388.XA 2022-12-01 2022-12-01 Isolation framework based on new energy power system server Pending CN115987566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211537388.XA CN115987566A (en) 2022-12-01 2022-12-01 Isolation framework based on new energy power system server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211537388.XA CN115987566A (en) 2022-12-01 2022-12-01 Isolation framework based on new energy power system server

Publications (1)

Publication Number Publication Date
CN115987566A true CN115987566A (en) 2023-04-18

Family

ID=85963771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211537388.XA Pending CN115987566A (en) 2022-12-01 2022-12-01 Isolation framework based on new energy power system server

Country Status (1)

Country Link
CN (1) CN115987566A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136579A1 (en) * 2005-12-09 2007-06-14 University Of Washington Web browser operating system
EP2513810A2 (en) * 2009-12-14 2012-10-24 Citrix Systems, Inc. Methods and systems for communicating between trusted and non-trusted virtual machines
CN103902884A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 System and method for protecting data of virtual machine
CN103997502A (en) * 2014-06-05 2014-08-20 浪潮电子信息产业股份有限公司 Safety enhanced model designing method based on cloud computing data center
CN104009885A (en) * 2014-05-22 2014-08-27 北京大学 Virtual machine simultaneous-locating detection method based on hidden channel under cloud environment
US20150309832A1 (en) * 2014-03-24 2015-10-29 Huawei Technologies Co., Ltd. Isolation Method for Management Virtual Machine and Apparatus
US20170155724A1 (en) * 2015-12-01 2017-06-01 Telefonaktiebolaget Lm Ericsson Architecture for enabling fine granular service chaining
CN107179936A (en) * 2016-03-11 2017-09-19 中国电子科技集团公司电子科学研究院 A kind of virtualization partition method based on privilege separation
CN107992755A (en) * 2016-10-26 2018-05-04 湖南移商动力网络技术有限公司 A kind of configurable research of virutal machine memory partition method
US20190332683A1 (en) * 2018-04-30 2019-10-31 Nutanix, Inc. Virtualized server systems and methods including domain joining techniques
CN112236752A (en) * 2018-04-11 2021-01-15 康奈尔大学 Method and system for improving software container performance and isolation
US20220279421A1 (en) * 2021-03-01 2022-09-01 Juniper Networks, Inc. Containerized router with a generic data plane interface
CN115309511A (en) * 2022-09-28 2022-11-08 亿咖通(湖北)技术有限公司 Xen-based data interaction method and device, storage medium and electronic equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136579A1 (en) * 2005-12-09 2007-06-14 University Of Washington Web browser operating system
EP2513810A2 (en) * 2009-12-14 2012-10-24 Citrix Systems, Inc. Methods and systems for communicating between trusted and non-trusted virtual machines
CN103902884A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 System and method for protecting data of virtual machine
US20150309832A1 (en) * 2014-03-24 2015-10-29 Huawei Technologies Co., Ltd. Isolation Method for Management Virtual Machine and Apparatus
CN104009885A (en) * 2014-05-22 2014-08-27 北京大学 Virtual machine simultaneous-locating detection method based on hidden channel under cloud environment
CN103997502A (en) * 2014-06-05 2014-08-20 浪潮电子信息产业股份有限公司 Safety enhanced model designing method based on cloud computing data center
US20170155724A1 (en) * 2015-12-01 2017-06-01 Telefonaktiebolaget Lm Ericsson Architecture for enabling fine granular service chaining
CN107179936A (en) * 2016-03-11 2017-09-19 中国电子科技集团公司电子科学研究院 A kind of virtualization partition method based on privilege separation
CN107992755A (en) * 2016-10-26 2018-05-04 湖南移商动力网络技术有限公司 A kind of configurable research of virutal machine memory partition method
CN112236752A (en) * 2018-04-11 2021-01-15 康奈尔大学 Method and system for improving software container performance and isolation
US20190332683A1 (en) * 2018-04-30 2019-10-31 Nutanix, Inc. Virtualized server systems and methods including domain joining techniques
US20220279421A1 (en) * 2021-03-01 2022-09-01 Juniper Networks, Inc. Containerized router with a generic data plane interface
CN115309511A (en) * 2022-09-28 2022-11-08 亿咖通(湖北)技术有限公司 Xen-based data interaction method and device, storage medium and electronic equipment

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
SANDRA SCOTT-HAYWARD,ET AL: ""A Survey of Security in Software Defined Networks"", 《IEEE》, 31 December 2016 (2016-12-31) *
YOGESH MUNDADA,ET AL: ""SilverLine: Data and Network Isolation for Cloud Services"", 《USENIX WORKSHOP ON HOT TOPICS IN CLOUD COMPUTING 》, 31 December 2011 (2011-12-31) *
杨丽芳, 刘琳: ""基于虚拟机的可信计算安全平台架构设计"", 《煤炭技术》, 28 February 2014 (2014-02-28) *
王蕾;: "基于可信虚拟域的政务云应用研究", 计算机应用与软件, no. 08, 15 August 2012 (2012-08-15) *
胡志希;戴新发;徐士伟;: "一种可配置的虚拟机内存隔离方法", 计算机与数字工程, no. 08, 20 August 2016 (2016-08-20) *
陈涛;马威;刘刚;: "一种高效的虚拟网络结构", 信息安全与技术, no. 08, 10 August 2013 (2013-08-10) *

Similar Documents

Publication Publication Date Title
Zhang Distributed network security framework of energy internet based on internet of things
CN105553097A (en) Working method of remote control system of unattended substation automation system
Jin et al. Multi-agent-based cloud architecture of smart grid
CN104780221A (en) Intellectual property comprehensive service platform system for middle and small-sized enterprises
CN106899553A (en) A kind of industrial control system safety protecting method based on private clound
CN102403796B (en) The stipulations self-adaptive access method of the intensive managing and control system of unattended substation
CN115987566A (en) Isolation framework based on new energy power system server
CN107465688B (en) Method for identifying network application permission of state monitoring and evaluating system
CN115225664A (en) Construction method of meteorological information infrastructure resource cloud platform
Paukatong SCADA security: A new concerning issue of an in-house EGAT-SCADA
Chen et al. Research on the application and security of cloud computing in smart power grids
Wen et al. Form follows function: designing smart grid communication systems using a framework approach
CN113760449A (en) Power transmission and transformation three-dimensional design data sharing system based on desktop cloud xView
Wang et al. Lightweight IT operation and maintenance integrated monitoring method for APP system
CN112291157A (en) Intelligent service access control center based on hybrid cloud in scoring system
Fei et al. The research on cyber-attack testbed with hardware-in-loop
Yadav et al. 5. Federated cloud service management and IoT
Yan et al. Realization of Electric Power Communication Network
Zhang et al. Research on resource scheduling algorithm in cloud computing data center
Chen et al. Automatic Analysis of RPA in Digital Service Testing of Grid System
Zhu et al. Research on User Electrical Safety Monitoring System Based on Cloud Computing Technology
Hwang et al. Analysis of the impact of cyber attacks on energy management system in smart grid environment
Lin Research on IT Operation and Maintenance Management Model in Cloud Computing Environment
Li et al. Access control method of SDN network based on zero trust
Liu et al. Wind Turbine operation and maintenance video supportive system based on the mobile internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination