期刊文献+

电力营销信息系统数据安全防护 被引量:4

Data Security Protection of Electricity Marketing Information System
下载PDF
导出
摘要 近年来,随着云计算、物联网、大数据、移动互联网等新技术的快速发展和日趋成熟,传统的电力营销系统也开展了大数据平台的建设。在对数据的挖掘和应用中,数据安全问题逐渐显露出来。电力营销系统中的数据涉及大量保密性较高的信息,信息泄露会给电力公司带来巨大损失,也会威胁到用户安全。因此,如何在不影响数据正常使用的情况下,保证数据的安全成为当下研究的热点。本文通过对可应用于电力营销系统中的数据安全防护措施进行研究,在数据层面进行变换,消除原始数据中的敏感信息,加强了数据保密性,保障了数据安全。 In recent years, with the improvement of cloud computing, Internet of Things, big data and mobile Internet, the classical electricity marketing system also develops the construction of big data platform. At the same time, the problem of data security is exposed during data mining. Due to there is much privacy information in the electricity marketing system, information leakage will bring huge loss to electricity company and will threaten user security, so many researches focus on the protection of data under using it normally. At present, most of the electricity companies still solve the security problem from the physical layer with authority management and firewall, but these methods are not enough in the society with highly developed information technology. This paper describes methods for electricity marketing system to ensure the safety of the database from data layer through the transformation on the original data, including data encryption and data masking. These methods reinforce the secrecy of the database by concealing sensitive information and eliminating data security risk fundamentally.
作者 方舟 程清 裴旭斌 FANG Zhou;CHENG Qing;PEI Xu-bin(Information and Communication Branch,State Grid Zhejiang Electric Power Co.Ltd.,Hangzhou 310007,China)
出处 《计算机与现代化》 2019年第3期111-116,共6页 Computer and Modernization
基金 国网营销专用资金资助项目(6211XT17009U)
关键词 电力营销系统 数据安全 数据库加密 敏感数据 数据脱敏 electricity marketing system data security database encryption sensitive data data masking
  • 相关文献

参考文献17

二级参考文献172

  • 1俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 2杜立健,唐晓燕,李守荣.几种信息加密算法的比较研究[J].网络安全技术与应用,2006(8):88-89. 被引量:10
  • 3MarkStamp著张戈译.信息安全原理与实践清华大学出版社.2013-5.
  • 4冯登国.信息安全中的数学方法与技术清华大学出版社,20009-10.
  • 5Chen M Y,Yang C C,Hwang M S.Privacy protection dataaccess control[J].International Journal of NetworkSecurity,2013,15(6):391-399.
  • 6Warren S D,Brandeis L D.The right to privacy[J].Harvard Law Review,1890,4(5):193-220.
  • 7Smith J,Dinev T,Xu H.Information privacy research:Aninterdisciplinary review[J].MIS Quarterly,2011,35(4):989-1016.
  • 8Bennett C J.The political economy of privacy:A review ofthe literature[R].Hackensack,NJ:Center for Social andLegal Research,1995.
  • 9Westin A F.Privacy and Freedom[M].New York:Atheneum,1968.
  • 10Bansal G,Zahedi F,Gefen D.The moderating influence ofprivacy concern on the efficacy of privacy assurance mechanisms for building trust:A multiple-contextinvestigation[C]//Proc of rhe Int Conf on Information System (ICIS 2008).Australian:AIS,2008:14-17.

共引文献373

同被引文献52

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部