Xi'an Gongcheng Daxue xuebao (Jun 2022)

Security self-inspection model of power monitoring based on cloud computing access control

  • WANG Zhenyun,
  • YU Wenjing,
  • ZANG Jianing,
  • WU Fei,
  • HE Yuxin

DOI
https://doi.org/10.13338/j.issn.1674-649x.2022.03.017
Journal volume & issue
Vol. 36, no. 3
pp. 131 – 136

Abstract

Read online

The security protection of power system is still the focus of power enterprises. In order to solve the problem of untimely and inaccurate secret-related detection of the existing power monitoring system, cloud computing access control technology was used to improve the detection accuracy and efficiency. Firstly, a hierarchical architecture of the power monitoring system was built; with the focus on the control center of the system application layer, the data module and service module in the business layer were regularly scanned, and the system access control and database detection sub modules were connected. Finally, the security model of cloud computing access control was constructed in the sub module, and the self-test process of database secret-related sensitive data was designed to realize the system user access control and confidential and sensitive data self-test. The results show that the average accuracy of the designed secret-related self inspection model is more than 90%, and its response time is less than 7 s, which is better than the comparison model. With the support of the designed model, the power monitoring system can quickly complete the system secret-related detection and response, prevent users from accessing and ensure the security of the system.

Keywords