期刊文献+

智能电网隐私保护工程分析与相关对策

Privacy Protection Technology in Smart Grid
下载PDF
导出
摘要 保护电力消费者的数据和隐私对于智能电网来说是至关重要的。纵观全球,目前的智能电网往往趋于关注隐私安全的需要,隐私仅仅作为智能电网的一个特性存在。为了填补隐私保护在智能电网中的空白,同时帮助智能电网工程师分析隐私威胁、选择合适的策略即隐私保护技术最后达到解决智能电网系统开发阶段的隐私问题的目的,描述了相应的方法框架和指导规则,对现有的隐私保护技术进行了详细的总结,讨论了其应用的环境,并阐述了隐私实施过程中面对的潜在挑战。 Protecting energy consumers' data and privacy is a essential for smart grid technologies and applications.However throughout the world,current smart grid implementations tend to focus on the need for privacy security and just consider privacy as a feature to add after system design.This article aims to fill in the the blank about smart grid privacy protection,proposed meth- odological framework to help the smart grid system designers solve development phase privacy issues,and describes the methods or guiding rules to help engineers to analyze smart grid privacy threats and choose a set of suitable privacy protection technology and strategy. In addition, the existing privacy protection techniques and its application context are detailed in summary,finally fac- ing potential privacy challenges are described.
作者 刘洋洋 祖向荣 乔金凤 LIU Yang-yang, ZU Xiang-rong, QIAO Jin-feng (North China Electric Power University, Beijing 102206, China)
机构地区 华北电力大学
出处 《电脑知识与技术》 2013年第8期5163-5165,共3页 Computer Knowledge and Technology
关键词 隐私威胁 隐私保护技术 智能电网 敏感信息 隐私保护策略 privacy threat privacy protection smart grid sensitive information privacy policy
  • 相关文献

参考文献7

  • 1National Energy Technology Laboratory (NETL).A Vision for the Smart Grid.[EB/OL].[2009-02].http://www.netl.doe.gov/moderngrid/.
  • 2The Smart Grid Interoperability Panel-Cyber Security Working Group.Smart grid cyber security strateg-y and requirements.The Na- tional Institute of Standards and Technology(NIST),Tech,2010.
  • 3Hervais Simo Fhom,Kpatcha M Bayarou.Towards a Holistic Privacy Engineering Approach for Smart Grid Systems[C].2011 Internation- al Joint Conference of IEEE TrustCom.2011:234-240.
  • 4Clarke R.Privacy impact assessment: Its origins and development[J].Computer Law & Security Review,2009,2(25):123-135.
  • 5Ni Q,Trombetta A,Bertino E,et al.Privacy-aware role based access control[C].Proceedings of the 12th ACM symposium on Access con- trol models and technologies.2007:41 - 50.
  • 6Priem B,Kosta E,Kuczerawy A,et al.User-Centric Privacy-Enhancing Identity Management.Digital Privacy,ser[J].Lecture Notes in Com- puter Science,2011 (65):4591-106.
  • 7Guarda P,Zannone N.Towards the development of privacy-aware system[J].Inf. Softw. Technol.2009,2(51): 357-350.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部