Research of electric power information security protection on cloud security

Informatization is an important feature of smart grid. With the construction of smart grid and the constant depth development of electric power information, the information networks of electric power have been continued to invade by all kinds of network threats. Traditional information security protection system for electric power had been unable to meet the security threats demand of ever changing and growing. Moreover, the cost of electrical safe operation was increased. Meanwhile, with the further application of electric power information engineering, operation capacity of electric power is required to be fully improved so that safe and stable operation is essential to electric power information system. Cloud security is service form that cloud computing provides for users. In view of the advantages of cloud computing and cloud security, architecture of electric power information security protection based on cloud security (AEPISP-CS) is put forward which combines with the current power information security status. Meanwhile, anti-virus system, spam mail filtering, threat detection based on cloud security are described in detail.

[1]  Huang Qi Design of Sensor Network for the Security Infrastructure of Electric Power System , 2008 .

[2]  Hao Wei Modulation Theory Based Analysis on Converter Transformer Core Saturation Instability , 2009 .

[3]  C. Singh,et al.  A practical approach for integrated power system vulnerability analysis with protection failures , 2004, IEEE Transactions on Power Systems.

[4]  Doug Johnson,et al.  Computing in the Clouds. , 2010 .

[5]  Xin Geng,et al.  A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[6]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[7]  Feng Yan Analysis of Cloud Computing and Information Security , 2008 .

[8]  Zhang Xiao-fei Discussion on Information Security of Electric Power , 2009 .

[9]  Igor Muttik,et al.  Cloud security technologies , 2009, Inf. Secur. Tech. Rep..

[10]  Antonio Puliafito,et al.  Security and Cloud Computing: InterCloud Identity Management Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[11]  Sadie Creese,et al.  Data Protection-Aware Design for Cloud Services , 2009, CloudCom.

[12]  Chen Guo-qi Application of Improved Transport Layer Security Protocol in Enhancing Data Communication Security of Wind Farm , 2009 .