Hierarchical-Based Dynamic Scenario-Adaptive Risk Assessment for Power Data Lifecycle

Author:

Song Yubo12ORCID,Jiang Shuai12,Shan Qiuhong12,Yang Yixin12,Yu Yue12,Shen Wen3,Guo Qian3

Affiliation:

1. School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China

2. Purple Mountain Laboratories, Nanjing 211189, China

3. Power Grid Smart Grid Research Institute Co., Ltd., Nanjing 210003, China

Abstract

In an era marked by rapid advancements in information technology, the task of risk assessment for data security within the complex infrastructure of the power grid has become increasingly vital. This paper introduces a novel methodology for dynamic, scenario-adaptive risk assessment, specifically designed to address the entire lifecycle of power data. Integrating hierarchical analysis with fuzzy comprehensive evaluation, our approach provides a flexible and robust framework for assessing and managing risks in various scenarios. This method enables the generation of adaptive weight matrices and precise risk level determinations, ensuring a detailed and responsive analysis of data security at each lifecycle stage. In our study, we applied predictive analytics and anomaly detection to conduct a thorough examination of diverse data scenarios within the power grid, aiming to proactively identify and mitigate potential security threats. The results of this research demonstrate a significant enhancement in the effectiveness of risk detection and management, leading to improved data protection and operational efficiency. This study contributes a scalable, adaptable model for data security risk assessment, meeting the challenges of big data and complex information systems in the power sector.

Funder

Science and Technology Programme of the power grid Corporation Headquarters

Publisher

MDPI AG

Reference25 articles.

1. A lifecycle security solution for sensitive data;Xie;Telecommun. Eng. Stand.,2020

2. Gartner (2024, January 02). How to Use the Data Security goverznance Framework [EB/OL]. 15 August 2019. Available online: https://www.gartner.com/en/documents/3873369/how-to-use-the-data-security-governance-framework.

3. Summary Version of Data Security Governance White Paper;Yang;Cyber Secur. Informatiz.,2018

4. (2022, October 30). Huawei Cloud, Huawei Cloud Data Security White Paper. Available online: https://www.huaweicloud.com/special/baipishu-sjaq.html.

5. Zhang, G., Qiu, X., and Gao, Y. (2019, January 12–15). Software defined security architecture with deep learning-based network anomaly detection module. Proceedings of the 11th IEEE Int Conf on Communication Software and Networks (ICCSN), Chongqing, China.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Research on Quantum Encryption Information Security Protection Technology for Distribution Networks;2024 6th International Conference on Energy Systems and Electrical Power (ICESEP);2024-06-21

2. Intelligent Recognition and Classification of IoT Devices via Information Physics-Based Multi-Source Data Association;2024 5th International Conference on Computer Engineering and Application (ICCEA);2024-04-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3