Paper
28 October 2022 Cloud computing security and its application in power grid
Kang Jing, Lang Bai, Aizaizi .Guzainuer, Xin ying Guo
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 124530D (2022) https://doi.org/10.1117/12.2660260
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
Starting from the research background and significance of the subject, this paper analyzes the data characteristics of smart grid and some data security problems it faces, analyzes the current research status of data confidentiality and integrity, and clarifies the practical significance and necessity of data security for the safe operation of smart grid. This paper mainly completes the following work: first, the shortcomings of the common hybrid encryption algorithm are analyzed, and the hybrid encryption algorithm is improved. Experimental verification and analysis are carried out to show that this method can improve the data Security. Secondly, through the analysis of the existing integrity verification methods and combined with the characteristics of smart grid, the improvement of the integrity verification method is completed. The experimental results show that this method can improve the accuracy and efficiency of verification. Finally, the smart grid simulation experiment is carried out to test the application of the improved method. The experiment shows that the improved method can improve the security of smart grid data storage to a certain extent.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Kang Jing, Lang Bai, Aizaizi .Guzainuer, and Xin ying Guo "Cloud computing security and its application in power grid", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 124530D (28 October 2022); https://doi.org/10.1117/12.2660260
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Clouds

Computer security

Data storage

Data modeling

Information security

Computing systems

Detection and tracking algorithms

Back to Top