CN117094041B - Automatic storage method and system for digital power grid data - Google Patents

Automatic storage method and system for digital power grid data Download PDF

Info

Publication number
CN117094041B
CN117094041B CN202311355068.7A CN202311355068A CN117094041B CN 117094041 B CN117094041 B CN 117094041B CN 202311355068 A CN202311355068 A CN 202311355068A CN 117094041 B CN117094041 B CN 117094041B
Authority
CN
China
Prior art keywords
data
sub
calling
storage space
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311355068.7A
Other languages
Chinese (zh)
Other versions
CN117094041A (en
Inventor
刘勇昊
常强
吴传强
乔玉辉
王皓
岑云
黄飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Central China Technology Development Of Electric Power Co ltd
Original Assignee
Hubei Central China Technology Development Of Electric Power Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Central China Technology Development Of Electric Power Co ltd filed Critical Hubei Central China Technology Development Of Electric Power Co ltd
Priority to CN202311355068.7A priority Critical patent/CN117094041B/en
Publication of CN117094041A publication Critical patent/CN117094041A/en
Application granted granted Critical
Publication of CN117094041B publication Critical patent/CN117094041B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides an automatic storage method and system for digital power grid data, wherein the method comprises the steps of dividing the digital power grid data into a plurality of sub-data after the system acquires the digital power grid data, respectively encrypting the sub-data and storing the sub-data into different second storage spaces, recording the calling times and the calling frequencies of the sub-data to determine the storage positions of the sub-data, and determining the processing mode of the data calling instruction according to the grade of a user sending the data calling instruction and the security level of the sub-data corresponding to the data calling instruction when the data calling instruction is acquired. According to the scheme, the storage efficiency and the overall storage performance are improved by respectively storing the digital power grid data in a mode of dividing the storage space, the storage positions of the data can be dynamically scheduled and managed according to the calling times and the calling frequency of the sub data, the overall data calling efficiency can be improved, meanwhile, the sub data is protected by using different encryption modes, and the scheme has higher flexibility and safety.

Description

Automatic storage method and system for digital power grid data
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to an automatic storage method and system for digital power grid data.
Background
The digital power grid is a power network combining a traditional power system with a modern intelligent technology based on a modern communication technology, a computer technology and an information technology, and is a novel power system capable of realizing intelligent, high-efficiency, low-carbon emission and sustainable development. The digital power grid can realize real-time monitoring, control and optimization of the power system, and can better meet the requirements of energy crisis, environmental protection, safety, stability and the like.
The digital power grid data has the characteristics of large data volume, high real-time requirement, multiple data sources and the like, the digital power grid relates to a large number of power system equipment and sensors, and many data are required to be transmitted, processed and decided in a short time, so that the digital power grid data contains great potential value of data, and through analysis and excavation of the data, the intelligent management, optimal scheduling, fault prediction and other applications of the power grid can be realized, the efficiency and reliability of the power system are improved, and meanwhile, the digital power grid data also has higher requirements on safety.
However, in the prior art, the reading efficiency of the digital power grid data is not high, particularly, delay problems often occur in the case of frequently accessed data, and the conventional method cannot flexibly manage according to the access mode and the importance of the data, which can lead to unbalanced utilization of the storage space and reduce the overall data calling efficiency.
Disclosure of Invention
In order to overcome the above-mentioned drawbacks of the prior art, the present invention provides an automatic storage method of digital power grid data, a system for storing the digital power grid data includes a plurality of first storage spaces and a plurality of second storage spaces, a data reading speed stored in the first storage spaces is higher than a data reading speed stored in the second storage spaces, the method includes:
after the system acquires the digital power grid data, dividing the digital power grid data into a plurality of sub-data, respectively encrypting the sub-data and storing the sub-data into different second storage spaces;
recording the calling times and the calling frequency of each piece of sub data;
if the calling times and the calling frequencies of the sub data stored in the second storage space are not lower than the preset times and are not lower than the preset frequencies, the encrypted sub data are moved to the first storage space to be stored;
if the calling frequency of the sub data stored in the first storage space is lower than the preset frequency, the encrypted sub data is moved to the second storage space for storage;
when a data calling instruction is acquired, determining the level of a user sending the data calling instruction, and if the security level corresponding to the level is not lower than the security level of the sub-data corresponding to the data calling instruction, extracting the sub-data corresponding to the data calling instruction from a first storage space or a second storage space; discarding the data calling instruction if the security level corresponding to the level is lower than the security level of the sub-data corresponding to the data calling instruction; different sub-data correspond to different encryption modes, and different encryption modes correspond to different secret classes.
Preferably, the "move the sub data to the first storage space save" further includes:
the sub data is divided for the second time so as to be divided into a plurality of different sub data again, and the sub data is stored into different first storage spaces after being encrypted; and inheriting the calling times and the security level of the sub-data before the secondary division by all the subdivision data obtained after the secondary division.
Further, the method further comprises:
after the user invokes the sub-data, if the analysis intermediate parameters which are fed back by the user and are related to the invoked sub-data are obtained, the invoked sub-data and the analysis intermediate parameters are associated, and then are respectively encrypted and stored;
the "extracting the sub data corresponding to the data call instruction from the first storage space or the second storage space" includes:
inquiring sub-data corresponding to the data calling instruction;
determining an analysis intermediate parameter associated with the queried sub-data;
extracting the encrypted analysis intermediate parameters from the first storage space or the second storage space and decrypting the analysis intermediate parameters; or alternatively, the first and second heat exchangers may be,
and extracting the encrypted analysis intermediate parameters and the queried sub data from the first storage space or the second storage space, and decrypting the analysis intermediate parameters and the queried sub data respectively.
Optionally, the security level of the analysis intermediate parameter is the same as or different from the associated security level of the sub-data.
Further, the method further comprises:
if the analysis intermediate parameters which are fed back by the user and related to the called sub-data are obtained, setting the security level of the analysis intermediate parameters to be the same as the security level of the called sub-data;
and if the analysis intermediate parameters which are fed back by the user and are related to the called sub-data and the security information set by the user for the analysis intermediate parameters are obtained, setting the security of the analysis intermediate parameters according to the security information.
Preferably, the method further comprises:
summarizing extraction information of the users for data extraction based on the data calling instruction;
analyzing the extracted information of each user;
and if the existence of the preset abnormal behavior is confirmed based on the extracted information, locking the user, reducing the grade of the user to the minimum, and reporting the abnormal behavior of the user at the same time.
The invention also proposes an automatic storage system of digital grid data for implementing the method as described hereinbefore, said system comprising:
the division and storage module is used for dividing the digital power grid data into a plurality of sub-data after the system acquires the digital power grid data, and respectively encrypting and storing the sub-data into different second storage spaces; different sub-data correspond to different encryption modes, and different encryption modes correspond to different secret classes;
the recording module is used for recording the calling times and the calling frequency of each piece of sub data;
the first moving module is used for moving the encrypted sub data to the first storage space for storage when the calling times of the sub data stored in the second storage space are not lower than the preset times and the calling frequency is not lower than the preset frequency;
the second moving module is used for moving the encrypted sub data to the second storage space for storage when the calling frequency of the sub data stored in the first storage space is lower than the preset frequency;
the verification module is used for determining the grade of a user sending the data calling instruction when the data calling instruction is acquired;
the calling module is used for extracting the sub-data corresponding to the data calling instruction from the first storage space or the second storage space when the security level corresponding to the level is not lower than the security level of the sub-data corresponding to the data calling instruction;
and the discarding module is used for discarding the data calling instruction when the security level corresponding to the level is lower than the security level of the sub-data corresponding to the data calling instruction.
Preferably, the first mobile module includes:
the secondary dividing unit is used for carrying out secondary division on the sub-data so as to re-divide the sub-data into a plurality of different sub-divided data; all the sub-divided data obtained after the secondary division inherit the calling times and the security level of the sub-data before the secondary division;
and the encryption unit is used for encrypting each piece of subdivision data and then respectively storing the encrypted piece of subdivision data into different first storage spaces.
Further, the system further comprises:
the association storage module is used for carrying out association on the called sub-data and the analysis intermediate parameters, respectively encrypting and storing the sub-data after the sub-data is called by a user if the analysis intermediate parameters which are fed back by the user and are related to the called sub-data are obtained;
the calling module comprises:
the inquiring unit is used for inquiring the sub data corresponding to the data calling instruction;
a determining unit, configured to determine an analysis intermediate parameter associated with the queried sub data;
the first decryption unit is used for extracting the encrypted analysis intermediate parameters from the first storage space or the second storage space and decrypting the encrypted analysis intermediate parameters;
and the second decryption unit is used for extracting the encrypted analysis intermediate parameters and the queried sub data from the first storage space or the second storage space and decrypting the sub data respectively.
The invention also proposes a computer readable storage medium storing executable instructions for implementing a method as described in the foregoing when executed by a processor.
The invention has at least the following beneficial effects:
according to the invention, the digital power grid data is divided into a plurality of sub-data and stored in different storage spaces in an encryption manner, so that the data reading speed is effectively improved, more sub-data are transferred to the first storage space for storage according to the transfer times and the transfer frequency of the sub-data, the sub-data with lower transfer frequency are transferred to the second storage space for storage, the storage space can be reasonably utilized, the requirement of the storage space is reduced, and the security of sensitive data is protected by encrypting each sub-data in different encryption manners;
furthermore, the scheme can further improve the data storage efficiency by carrying out secondary division on the sub-data and respectively storing the sub-data into different storage spaces, and can carry out encryption storage after carrying out correlation on analysis intermediate parameters related to the sub-data, so that analysis results of the prior user can be displayed to other users who call later, the workload required by analysis or help to be used as a reference when the data are repeatedly called is reduced, the scheme can also detect the abnormal behaviors of the users, timely response is carried out on the users with the abnormal behaviors, and the safety of the digital power grid data is effectively protected.
Therefore, the invention provides an automatic storage method and system for digital power grid data, which are used for respectively storing the digital power grid data in a mode of dividing storage space, so that the storage efficiency and the overall storage performance are improved, dynamic scheduling and management of the storage position of the data can be realized according to the calling times and the calling frequency of the sub data, the overall data calling efficiency can be improved, and meanwhile, the sub data is protected in different encryption modes, so that the scheme has higher flexibility and safety.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is an overall flow chart of an automatic storage method of digital grid data provided in embodiment 1;
FIG. 2 is a flow chart of a method for determining a processing mode of a data call instruction according to a class of a user sending the data call instruction and a security class of sub-data corresponding to the data call instruction;
FIG. 3 is a flow chart of a method for extracting sub-data corresponding to a data call instruction and analyzing intermediate parameters;
FIG. 4 is a flow chart of a method of protecting digital grid data;
fig. 5 is a schematic block diagram of an automatic storage system for digital grid data according to embodiment 2.
Reference numerals
10-dividing and storing the module; 11-an associated storage module; 12-a first setting module; 13-a second setting module; 20-a recording module; 30-a first mobile module; 31-a secondary dividing unit; a 32-encryption unit; 40-a second mobile module; 50-a verification module; 60-calling a module; 61-a query unit; 62-a determination unit; 63-a first decryption unit; a 64-second decryption unit, a 70-discard module; 81-a summarizing module; 82-an analysis module; 83-protection module.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Hereinafter, various embodiments of the present invention will be described more fully. The invention is capable of various embodiments and of modifications and variations therein. However, it should be understood that: there is no intention to limit the various embodiments of the invention to the specific embodiments disclosed herein, but rather the invention is to be understood to cover all modifications, equivalents, and/or alternatives falling within the spirit and scope of the various embodiments of the invention.
Hereinafter, the terms "comprises" or "comprising" as may be used in various embodiments of the present invention indicate the presence of the disclosed functions, operations or elements, and are not limiting of the addition of one or more functions, operations or elements. Furthermore, as used in various embodiments of the invention, the terms "comprises," "comprising," and their cognate terms are intended to refer to a particular feature, number, step, operation, element, component, or combination of the foregoing, and should not be interpreted as first excluding the existence of or increasing likelihood of one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the invention, the expression "or" at least one of a or/and B "includes any or all combinations of the words listed simultaneously. For example, the expression "a or B" or "at least one of a or/and B" may include a, may include B or may include both a and B.
Expressions (such as "first", "second", etc.) used in the various embodiments of the invention may modify various constituent elements in the various embodiments, but the respective constituent elements may not be limited. For example, the above description does not limit the order and/or importance of the elements. The above description is only intended to distinguish one element from another element. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present invention.
It should be noted that: in the present invention, unless explicitly specified and defined otherwise, terms such as "mounted," "connected," "secured," and the like are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium; may be a communication between the interiors of the two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
In the present invention, it should be understood by those of ordinary skill in the art that the terms indicating an orientation or a positional relationship are based on the orientation or positional relationship shown in the drawings, and are merely for convenience of description and simplicity of description, not to indicate or imply that the apparatus or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the invention.
The terminology used in the various embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the invention. As used herein, the singular is intended to include the plural as well, unless the context clearly indicates otherwise. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the invention belong. The terms (such as those defined in commonly used dictionaries) will be interpreted as having a meaning that is the same as the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in connection with the various embodiments of the invention.
Example 1
The embodiment provides an automatic storage method of digital power grid data, a system for storing the digital power grid data includes a plurality of first storage spaces and a plurality of second storage spaces, a data reading speed stored in the first storage spaces is higher than a data reading speed stored in the second storage spaces, referring to fig. 1, the method includes:
s100: after the system acquires the digital power grid data, the digital power grid data is divided into a plurality of sub-data, and the sub-data are respectively encrypted and stored in different second storage spaces.
It should be noted that, the ways of dividing the digital power grid data include, but are not limited to, time division, space division, type division and event division; for example, when the digital power grid data is divided by the type division manner, different types of data such as power generation data, load data, network state data and the like can be stored in different storage spaces, and the type division manner is beneficial to specially processing and managing the different types of data.
In this embodiment, different sub-data corresponds to different encryption modes, and different encryption modes correspond to different security classes.
S200: and recording the calling times and the calling frequencies of the sub data.
S300: and if the calling times and the calling frequencies of the sub data stored in the second storage space are not lower than the preset times and are not lower than the preset frequencies, moving the encrypted sub data to the first storage space for storage.
Further, the "move child data to first storage space save" described in step S300 may specifically further include:
sub-data is divided for the second time to be divided into a plurality of different sub-divided data again, and the sub-data is stored into different first storage spaces after being encrypted; all the sub-divided data obtained after the secondary division inherit the calling times and the secret classes of the sub-data before the secondary division.
S400: and if the calling frequency of the sub data stored in the first storage space is lower than the preset frequency, moving the encrypted sub data to the second storage space for storage.
Referring to fig. 2, the method further comprises:
s500: when the data call instruction is acquired, the grade of the user sending the data call instruction is determined.
S600: and if the security level corresponding to the level is not lower than the security level of the sub-data corresponding to the data calling instruction, extracting the sub-data corresponding to the data calling instruction from the first storage space or the second storage space.
S700: and if the security level corresponding to the level is lower than the security level of the sub-data corresponding to the data calling instruction, discarding the data calling instruction.
Preferably, the method further comprises:
after the user invokes the sub-data, if the analysis intermediate parameters which are fed back by the user and related to the invoked sub-data are obtained, the invoked sub-data and the analysis intermediate parameters are associated, and then are respectively encrypted and stored;
on this basis, referring to fig. 3, the "extracting the sub data corresponding to the data call instruction from the first storage space or the second storage space" described in step S600 includes:
s610: sub-data corresponding to the data call instruction is queried.
S620: an analytical intermediate parameter associated with the queried sub-data is determined.
S630: and extracting the encrypted analysis intermediate parameters from the first storage space or the second storage space and decrypting the encrypted analysis intermediate parameters.
S640: and extracting the encrypted analysis intermediate parameters and the queried sub data from the first storage space or the second storage space, and decrypting the analysis intermediate parameters and the queried sub data respectively.
It should be noted that, the security level of the analysis intermediate parameter is the same as or different from the security level of the associated sub-data, and preferably, the method further includes:
if the analysis intermediate parameters which are fed back by the user and are related to the called sub-data are obtained, setting the security level of the analysis intermediate parameters to be the same as the security level of the called sub-data;
if the analysis intermediate parameters which are fed back by the user and are related to the called sub-data and the security information set by the user for the analysis intermediate parameters are obtained, the security of the analysis intermediate parameters is set according to the security information.
Therefore, when the security level of the analysis intermediate parameter is different from the security level of the associated sub-data, when the security level corresponding to the user level is not lower than the security level of the sub-data corresponding to the data calling instruction, and the security level corresponding to the user level is not lower than the security level of the analysis intermediate parameter related to the sub-data corresponding to the data calling instruction, step S630 is executed;
and when the security level corresponding to the user level is not lower than the security level of the sub-data corresponding to the data calling instruction and the security level corresponding to the user level is lower than the security level of the analysis intermediate parameter related to the sub-data corresponding to the data calling instruction, executing step S640.
Preferably, referring to fig. 4, the method further comprises:
s810: and summarizing extraction information of each user for data extraction based on the data calling instruction.
S820: and analyzing the extracted information of each user.
S830: if the existence of the preset abnormal behavior is confirmed based on the extracted information, locking the user, minimizing the grade of the user, and reporting the abnormal behavior of the user at the same time.
It should be noted that the preset abnormal behavior in step S830 includes, but is not limited to, behaviors such as frequent illegal access, occurrence of a large number of abnormal requests, misuse or improper use of digital grid data.
Example 2
The present embodiment proposes an automatic storage system for digital power grid data, for implementing a method as proposed in embodiment 1, referring to fig. 5, the system includes:
the division and storage module 10 is configured to divide the digital power grid data into a plurality of sub-data after the digital power grid data is acquired by the system, and respectively encrypt the sub-data and store the sub-data in different second storage spaces; different sub-data correspond to different encryption modes, and different encryption modes correspond to different secret classes;
the recording module 20 is used for recording the calling times and the calling frequencies of all the sub data;
the first moving module 30 is configured to move the encrypted sub-data to the first storage space for storage when the number of times of calling the sub-data stored in the second storage space is not less than a preset number of times and the frequency of calling the sub-data is not less than a preset frequency;
a second moving module 40, configured to move the encrypted sub-data to the second storage space for storage when the calling frequency of the sub-data stored in the first storage space is lower than the preset frequency;
the verification module 50 is configured to determine, when the data call instruction is acquired, a level of a user who sends the data call instruction;
the calling module 60 is configured to extract the sub-data corresponding to the data calling instruction from the first storage space or the second storage space when the security level corresponding to the level is not lower than the security level of the sub-data corresponding to the data calling instruction;
and the discarding module 70 is configured to discard the data call instruction when the security level corresponding to the level is lower than the security level of the sub-data corresponding to the data call instruction.
Specifically, the first mobile module 30 includes:
a sub-division unit 31 for sub-dividing sub-data to sub-data into a plurality of different sub-divided data; all the sub-divided data obtained after the secondary division inherit the calling times and the secret classes of the sub-data before the secondary division;
the encryption unit 32 is configured to encrypt each piece of sub-divided data and store the encrypted piece of sub-divided data in different first storage spaces.
Preferably, the system further comprises:
the association storage module 11 is configured to, after the user invokes the sub-data, if an analysis intermediate parameter related to the invoked sub-data fed back by the user is obtained, associate the invoked sub-data with the analysis intermediate parameter, and then encrypt and store the sub-data and the analysis intermediate parameter respectively;
a first setting module 12, configured to, when acquiring an analysis intermediate parameter related to the invoked sub-data and fed back by the user, set a security level of the analysis intermediate parameter to be the same as that of the invoked sub-data;
and the second setting module 13 is configured to set the security level of the analysis intermediate parameter according to the security level information when the analysis intermediate parameter related to the invoked sub-data and the security level information set by the user for the analysis intermediate parameter are obtained.
Further, the calling module 60 includes:
a query unit 61, configured to query sub-data corresponding to the data call instruction;
a determining unit 62 for determining an analysis intermediate parameter associated with the queried sub data;
a first decryption unit 63, configured to extract the encrypted analysis intermediate parameter from the first storage space or the second storage space and decrypt the encrypted analysis intermediate parameter;
the second decryption unit 64 is configured to extract the encrypted analysis intermediate parameter and the queried sub data from the first storage space or the second storage space, and decrypt the analysis intermediate parameter and the queried sub data, respectively.
Preferably, the system further comprises:
a summarizing module 81, configured to summarize extraction information of each user for data extraction based on the data call instruction;
an analysis module 82, configured to analyze the extracted information of each user;
the protection module 83 is configured to lock the user and minimize the user's level when it is determined that there is a preset abnormal behavior based on the extracted information, and report the abnormal behavior of the user at the same time.
Example 3
The present embodiment proposes a computer readable storage medium storing executable instructions for implementing the automatic storage method of digital grid data as proposed in embodiment 1 when executed by a processor.
In summary, the present invention provides an automatic storage method and system for digital power grid data, which improves storage efficiency and overall storage performance by respectively storing digital power grid data in a manner of dividing storage space, and can dynamically schedule and manage storage positions of data according to calling times and calling frequencies of sub data, so that overall data calling efficiency can be improved, and meanwhile, the scheme protects the sub data by using different encryption modes, thereby having higher flexibility and security.
The foregoing description of the preferred embodiments of the invention is not intended to limit the invention to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the invention are intended to be included within the scope of the invention.

Claims (8)

1. An automatic storage method of digital power grid data, wherein a system for storing the digital power grid data comprises a plurality of first storage spaces and a plurality of second storage spaces, and a data reading speed stored in the first storage spaces is higher than a data reading speed stored in the second storage spaces, the method comprising:
after the system acquires the digital power grid data, dividing the digital power grid data into a plurality of sub-data, respectively encrypting the sub-data and storing the sub-data into different second storage spaces;
recording the calling times and the calling frequency of each piece of sub data;
if the calling times and the calling frequencies of the sub data stored in the second storage space are not lower than the preset times and are not lower than the preset frequencies, the encrypted sub data are moved to the first storage space to be stored;
if the calling frequency of the sub data stored in the first storage space is lower than the preset frequency, the encrypted sub data is moved to the second storage space for storage;
when a data calling instruction is acquired, determining the level of a user sending the data calling instruction, and if the security level corresponding to the level is not lower than the security level of the sub-data corresponding to the data calling instruction, extracting the sub-data corresponding to the data calling instruction from a first storage space or a second storage space; discarding the data calling instruction if the security level corresponding to the level is lower than the security level of the sub-data corresponding to the data calling instruction; different sub-data correspond to different encryption modes, and different encryption modes correspond to different secret classes; the method further comprises the steps of:
after the user invokes the sub-data, if the analysis intermediate parameters which are fed back by the user and are related to the invoked sub-data are obtained, the invoked sub-data and the analysis intermediate parameters are associated, and then are respectively encrypted and stored;
the "extracting the sub data corresponding to the data call instruction from the first storage space or the second storage space" includes:
inquiring sub-data corresponding to the data calling instruction;
determining an analysis intermediate parameter associated with the queried sub-data;
extracting the encrypted analysis intermediate parameters from the first storage space or the second storage space and decrypting the analysis intermediate parameters; or alternatively, the first and second heat exchangers may be,
and extracting the encrypted analysis intermediate parameters and the queried sub data from the first storage space or the second storage space, and decrypting the analysis intermediate parameters and the queried sub data respectively.
2. The method of claim 1, wherein the moving the child data to the first storage space for saving further comprises:
the sub data is divided for the second time so as to be divided into a plurality of different sub data again, and the sub data is stored into different first storage spaces after being encrypted; and inheriting the calling times and the security level of the sub-data before the secondary division by all the subdivision data obtained after the secondary division.
3. The method of claim 1, wherein the security level of the analysis intermediate parameter is the same as or different from the security level of the associated sub-data.
4. A method according to claim 3, characterized in that the method further comprises:
if the analysis intermediate parameters which are fed back by the user and related to the called sub-data are obtained, setting the security level of the analysis intermediate parameters to be the same as the security level of the called sub-data;
and if the analysis intermediate parameters which are fed back by the user and are related to the called sub-data and the security information set by the user for the analysis intermediate parameters are obtained, setting the security of the analysis intermediate parameters according to the security information.
5. The method according to claim 1 or 4, characterized in that the method further comprises:
summarizing extraction information of the users for data extraction based on the data calling instruction;
analyzing the extracted information of each user;
and if the existence of the preset abnormal behavior is confirmed based on the extracted information, locking the user, reducing the grade of the user to the minimum, and reporting the abnormal behavior of the user at the same time.
6. An automated storage system for digital grid data, for implementing the method of any of claims 1-5, the system comprising:
the division and storage module is used for dividing the digital power grid data into a plurality of sub-data after the system acquires the digital power grid data, and respectively encrypting and storing the sub-data into different second storage spaces; different sub-data correspond to different encryption modes, and different encryption modes correspond to different secret classes;
the recording module is used for recording the calling times and the calling frequency of each piece of sub data;
the first moving module is used for moving the encrypted sub data to the first storage space for storage when the calling times of the sub data stored in the second storage space are not lower than the preset times and the calling frequency is not lower than the preset frequency;
the second moving module is used for moving the encrypted sub data to the second storage space for storage when the calling frequency of the sub data stored in the first storage space is lower than the preset frequency;
the verification module is used for determining the grade of a user sending the data calling instruction when the data calling instruction is acquired;
the calling module is used for extracting the sub-data corresponding to the data calling instruction from the first storage space or the second storage space when the security level corresponding to the level is not lower than the security level of the sub-data corresponding to the data calling instruction;
the discarding module is used for discarding the data calling instruction when the security level corresponding to the level is lower than the security level of the sub-data corresponding to the data calling instruction;
the association storage module is used for carrying out association on the called sub-data and the analysis intermediate parameters, respectively encrypting and storing the sub-data after the sub-data is called by a user if the analysis intermediate parameters which are fed back by the user and are related to the called sub-data are obtained;
the calling module comprises:
the inquiring unit is used for inquiring the sub data corresponding to the data calling instruction;
a determining unit, configured to determine an analysis intermediate parameter associated with the queried sub data;
the first decryption unit is used for extracting the encrypted analysis intermediate parameters from the first storage space or the second storage space and decrypting the encrypted analysis intermediate parameters;
and the second decryption unit is used for extracting the encrypted analysis intermediate parameters and the queried sub data from the first storage space or the second storage space and decrypting the sub data respectively.
7. The automated storage system of digital grid data of claim 6, wherein the first mobile module comprises:
the secondary dividing unit is used for carrying out secondary division on the sub-data so as to re-divide the sub-data into a plurality of different sub-divided data; all the sub-divided data obtained after the secondary division inherit the calling times and the security level of the sub-data before the secondary division;
and the encryption unit is used for encrypting each piece of subdivision data and then respectively storing the encrypted piece of subdivision data into different first storage spaces.
8. A computer readable storage medium storing executable instructions for implementing the method of any one of claims 1 to 5 when executed by a processor.
CN202311355068.7A 2023-10-19 2023-10-19 Automatic storage method and system for digital power grid data Active CN117094041B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311355068.7A CN117094041B (en) 2023-10-19 2023-10-19 Automatic storage method and system for digital power grid data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311355068.7A CN117094041B (en) 2023-10-19 2023-10-19 Automatic storage method and system for digital power grid data

Publications (2)

Publication Number Publication Date
CN117094041A CN117094041A (en) 2023-11-21
CN117094041B true CN117094041B (en) 2024-01-02

Family

ID=88780696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311355068.7A Active CN117094041B (en) 2023-10-19 2023-10-19 Automatic storage method and system for digital power grid data

Country Status (1)

Country Link
CN (1) CN117094041B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020029657A (en) * 2002-01-12 2002-04-19 우제학 Method and system of the information protection for digital contents
CN107784108A (en) * 2017-10-31 2018-03-09 郑州云海信息技术有限公司 A kind of data storage and management method, device and equipment
CN111581209A (en) * 2020-04-27 2020-08-25 佛山科学技术学院 Computer big data storage system, method and storage medium
CN111782148A (en) * 2020-06-30 2020-10-16 中国工商银行股份有限公司 Data storage control method and device, electronic equipment and storage medium
WO2020244070A1 (en) * 2019-06-06 2020-12-10 平安科技(深圳)有限公司 Digital information encryption method and apparatus, computer device, and storage medium
CN112231659A (en) * 2020-09-25 2021-01-15 山东浪潮通软信息科技有限公司 Hierarchical protection access control method and device under multi-security system
CN112364323A (en) * 2020-11-16 2021-02-12 深圳安捷丽新技术有限公司 High-security storage access method and device based on user iris recognition
WO2022161327A1 (en) * 2021-01-29 2022-08-04 威讯柏睿数据科技(北京)有限公司 Streaming data processing method and system for multi-level security protection
CN114942729A (en) * 2022-06-21 2022-08-26 哈尔滨学院 Data safety storage and reading method for computer system
CN115344505A (en) * 2022-08-01 2022-11-15 江苏华存电子科技有限公司 Memory access method based on perception classification
CN116821923A (en) * 2022-12-11 2023-09-29 黄晓妍 Protection method and device for protecting computer memory data security

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120123210A (en) * 2011-04-19 2012-11-08 삼성전자주식회사 Method for controlling for providing storage space to application and terminal and server therefor

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020029657A (en) * 2002-01-12 2002-04-19 우제학 Method and system of the information protection for digital contents
CN107784108A (en) * 2017-10-31 2018-03-09 郑州云海信息技术有限公司 A kind of data storage and management method, device and equipment
WO2020244070A1 (en) * 2019-06-06 2020-12-10 平安科技(深圳)有限公司 Digital information encryption method and apparatus, computer device, and storage medium
CN111581209A (en) * 2020-04-27 2020-08-25 佛山科学技术学院 Computer big data storage system, method and storage medium
CN111782148A (en) * 2020-06-30 2020-10-16 中国工商银行股份有限公司 Data storage control method and device, electronic equipment and storage medium
CN112231659A (en) * 2020-09-25 2021-01-15 山东浪潮通软信息科技有限公司 Hierarchical protection access control method and device under multi-security system
CN112364323A (en) * 2020-11-16 2021-02-12 深圳安捷丽新技术有限公司 High-security storage access method and device based on user iris recognition
WO2022161327A1 (en) * 2021-01-29 2022-08-04 威讯柏睿数据科技(北京)有限公司 Streaming data processing method and system for multi-level security protection
CN114942729A (en) * 2022-06-21 2022-08-26 哈尔滨学院 Data safety storage and reading method for computer system
CN115344505A (en) * 2022-08-01 2022-11-15 江苏华存电子科技有限公司 Memory access method based on perception classification
CN116821923A (en) * 2022-12-11 2023-09-29 黄晓妍 Protection method and device for protecting computer memory data security

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种多密级移动存储设备多级密钥管理方案;冯力;邓国庆;郁滨;;信息安全研究(第04期);全文 *
数据库字段安全分级的加密方案;徐军;卢建朱;;计算机工程(04);全文 *

Also Published As

Publication number Publication date
CN117094041A (en) 2023-11-21

Similar Documents

Publication Publication Date Title
JP4729262B2 (en) Location awareness architecture and systems
CN101430752B (en) Sensitive data switching control module and method for computer and movable memory device
US8566934B2 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
CN112800472B (en) Industrial internet identification data protection system based on micro-service architecture
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
CN109697370A (en) Database data encipher-decipher method, device, computer equipment and storage medium
Backes et al. On the cryptographic key secrecy of the strengthened Yahalom protocol
CN116150242A (en) Transparent encryption and access control method, device and equipment for database
CN112187472A (en) Information processing method and system based on multi-terminal cooperation
CN117094041B (en) Automatic storage method and system for digital power grid data
CN108833500B (en) Service calling method, service providing method, data transmission method and server
CN107622207A (en) Encryption system DBMS structure
CN112866998B (en) Trusted computing-based 5G slice configuration data security protection method
CN112437082A (en) Data sending method based on block chain
Ma et al. A novel verification scheme for fine-grained top-k queries in two-tiered sensor networks
CN113507691B (en) Information pushing system and method based on power distribution network cross-region service
CN111093194A (en) Edge computing virtual base station management method and device based on block chain
CN116522355A (en) Electric power data boundary protection method, equipment, medium and device
CN115459919A (en) Internet of things universal terminal security authentication system, method and device and Internet of things communication terminal
CN115062588A (en) Method and electronic equipment for converting file format
CN109379444B (en) Method and system for providing private cloud service based on automatic adaptation
CN112926070A (en) Domestic CPU and operating system based non-secret-related domain and secret-related domain official document exchange method and system
CN106339301A (en) Method for acquiring operation log of TPM (Trusted Platform Module)
CN109040062A (en) A kind of the safe condition management method and system of network transmission
CN103782304A (en) Method for provisioning cryptographic keys during manufacturing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant