浏览全部资源
扫码关注微信
1. 国家电网有限公司大数据中心,北京 100031
2. 国网山西省电力公司信息通信分公司,山西 太原 030021
3. 国网陕西省电力公司西咸新区供电公司,陕西 西咸新区 712000
[ "朱洪斌(1980- ),男,国家电网有限公司大数据中心高级工程师,主要研究方向为数据安全、安全运行等" ]
[ "安龙(1988- ),男,国网山西省电力公司信息通信分公司工程师,主要研究方向为信息安全、数据安全等" ]
[ "杨铭辰(1986- ),男,国网陕西省电力公司西咸新区供电公司工程师,主要研究方向为数据管理、信息安全等" ]
网络出版日期:2019-11,
纸质出版日期:2019-11-20
移动端阅览
朱洪斌, 安龙, 杨铭辰. 电力大数据安全治理体系研究[J]. 电信科学, 2019,35(11):140-145.
Hongbin ZHU, Long AN, Mingchen YANG. Research and practice on power big data security governance system[J]. Telecommunications science, 2019, 35(11): 140-145.
朱洪斌, 安龙, 杨铭辰. 电力大数据安全治理体系研究[J]. 电信科学, 2019,35(11):140-145. DOI: 10.11959/j.issn.1000-0801.2019281.
Hongbin ZHU, Long AN, Mingchen YANG. Research and practice on power big data security governance system[J]. Telecommunications science, 2019, 35(11): 140-145. DOI: 10.11959/j.issn.1000-0801.2019281.
近年来,针对大数据的勒索攻击事件和数据泄露问题日趋严重,针对数据安全国家相继出台了一系列相关法律法规,明确了大数据安全工作的要求,电力大数据资产具有数据量大、分布面广、利用价值高、敏感度高等特点,急需开展大数据安全治理技术研究。在分析电力大数据安全面临的挑战的基础上,设计了电力大数据安全治理体系,提出了电力大数据安全治理要求,研发了电力大数据安全治理平台,在实验中对数据安全管控进行了验证。
The blackmail attacks and data leakage problems of big data had become increasingly serious in recent years
and the state had successively issued a series of relevant laws and regulations to clarify the requirements for big data security work.Power big data assets had the characteristics of large data volume
wide distribution
high utilization value and high sensitivity.It was urgent to carry out research on big data security governance technology.Based on the analysis of the challenges faced by power big data security
the power big data security governance system was designed
the power big data security governance requirements were put forward
and the data security management and control was verified by the research and development of power big data security governance platform.
曾鸣 , 王雨晴 , 李明珠 , 等 . 泛在电力物联网体系架构及实施方案初探 [J ] . 智慧电力 , 2019 , 47 ( 4 ): 1 - 7 ,58.
ZENG M , WANG Y Q , LI M Z , et al . Preliminary study on the architecture and implementation plan of widespread power internet of things [J ] . Smart Power , 2019 , 47 ( 4 ): 1 - 7 ,58.
赵佩 . 勒索病毒攻击事件漏洞分析及应对防护策略 [J ] . 电子技术与软件工程 , 2019 ( 4 ):201.
ZHAO P . Vulnerability analysis and response protection strategy of Ransom ware attack event [J ] . Network Security Technology & Application , 2019 ( 4 ):201 .
吴信东 , 董丙冰 , 堵新政 , 等 . 数据治理技术 [J ] . 软件学报 , 2019 , 30 ( 9 ): 25 - 27 .
WU X D , DONG B B , DU X Z , et al . Data governance technology [J ] . Journal of Software , 2019 , 30 ( 9 ): 25 - 27 .
史琳 , 吴疆 , 吴霞虹 . 电力企业级数据治理体系的研究 [J ] . 电子世界 , 2018 ( 22 ): 184 - 185 .
SHI L , WU J , WU X H . Research on power enterprise data management system [J ] . Electronics World , 2018 ( 22 ): 184 - 185 .
韩昌选 , 乐璐 . 大数据时代下信息数据安全的探讨 [J ] . 电子技术与软件工程 , 2013 ( 24 ): 227 - 228 .
HAN C X , LE L . Discussion on the security of information data in the age of big data [J ] . Electronic Technology & Software Engineering , 2013 ( 24 ): 227 - 228 .
周景 . 大数据时代信息安全的防范对策思考与探讨 [J ] . 信息与电脑 , 2019 ( 2 ): 218 - 220 .
ZHOU J . Thinking and discussion on the countermeasures of information security in the age of big data [J ] . Computer Programming Skills & Maintenance , 2019 ( 2 ): 218 - 220 .
秦体德 . 浅析计算机网络安全管理技术的开发及应用 [J ] . 湖北科技学院学报 , 2013 ( 10 ): 19 - 20 .
QIN T D . Analysis on the development and application of computer network security management technology [J ] . Journal of Hubei University of Science and Technology , 2013 ( 10 ): 19 - 20 .
沈玲 . 美国如何保护关键信息基础设施 [J ] . 人民邮电 ,2016-11-30(6).
SHEN L . How the United States protects critical information infrastructure [J ] . People's post and telecommunications ,2016-11-30(6).
张新刚 , 于波 , 程新党 , 等 . 大数据与云计算环境下个人信息安全协同保护研究 [J ] . 电脑知识与技术 , 2016 ( 3 ): 53 - 55 .
ZHANG X G , YU B , CHENG X D , et al . Research on collaborative protection of personal information security in big data and cloud computing environment [J ] . Computer Knowledge and Technology , 2016 ( 3 ): 53 - 55 .
童云海 , 陶有东 , 唐世渭 , 等 . 隐私保护数据发布中身份保持的匿名方法 [J ] . 软件学报 , 2010 ( 4 ): 771 - 781 . http://d.wanfangdata.com.cn/Periodical_rjxb201004016.aspx http://d.wanfangdata.com.cn/Periodical_rjxb201004016.aspx
TONG Y H , TAO Y D , TANG S W , et al . Identity-reserved anonymity in privacy preserving data publishing [J ] . Journal of Software , 2010 ( 4 ): 771 - 781 .
张亮 . 基于云计算环境的大数据安全存储机制研究 [D ] . 南京:东南大学 , 2016 .
ZHANG L . Research on secure storage mechanisms for big data based on cloud computing [D ] . Nanjing:Southeast University , 2016 .
李如初 , 沈名龙 , 彭海棠 . 大数据、云计算在电力工业中的应用 [J ] . 电信科学 , 2018 , 34 ( 4 ): 151 - 155 .
LI R C , SHEN M L , PENG H T . Application of big data and cloud computing in power industry [J ] . Telecommunications Science , 2018 , 34 ( 4 ): 151 - 155 .
0
浏览量
611
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构