Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security outsourcing computing architecture suitable for power grid big data

A technology of secure outsourcing and computing architecture, applied in electrical digital data processing, computing, digital data authentication, etc., can solve problems such as data security that cannot be covered, and achieve the effect of improving social productivity, reducing operating costs, and promoting economic development.

Pending Publication Date: 2021-10-01
SHENZHEN POWER SUPPLY BUREAU
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional encryption schemes can only ensure the security of data during storage and transmission, but cannot cover the security of data during use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security outsourcing computing architecture suitable for power grid big data
  • Security outsourcing computing architecture suitable for power grid big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The description of the following examples is a particular embodiment of the invention can be embodied in the following examples.

[0024] Outsourcing calculations can be understood as a cloud computing scenario, and the data owner has calculated data to the cloud by means of a powerful computing capacity of cloud platform. A typical safety outsourcing calculation role model consists of two parties: (1) Data Provonders: such as data companies, hospitals, individuals, and even Internet sensors, they have data, but due to severe computing resources, they cannot be calculated; 2) Calculation service providers: such as cloud computing platform, superior center, etc., this party may be with super integrated capacity, competing for special computing tasks, or have a certain advantage due to cost and reliability, thus Selected by customers to deploy computing services.

[0025] In response to this application scenario, embodiments of the present invention are intended to design a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security outsourcing computing architecture suitable for power grid big data, which comprises a power grid data center and a computing center, and is characterized in that the power grid data center is used for providing encrypted power grid data to be computed and initiating a computing request to the computing center; and the computing center is used for providing computing service according to the computing request sent by the power grid center and the encrypted power grid data provided by the power grid center, and returning a computing result to the power grid data center. According to the method, the security and secrecy problem of the power big data can be solved, the full life cycle of the data is protected, and the security of the data on the cloud is ensured, so that the data can be securely accessed to the cloud or outsourced to a computing service party for computing, the operation cost of an enterprise is reduced, and the social productivity is improved. Meanwhile, the power big data can be circulated, the power grid big data can be used for data analysis in a ciphertext state, and economic development is promoted.

Description

Technical field [0001] The present invention relates to the field of power system data security technology, and more particularly to a secondary equipment inspection knowledge map architecture and a secondary equipment intelligent inspection method. Background technique [0002] Power data has high sensitivity, involving citizen personal privacy, and more people will affect national security. [0003] Cloud computing is one of the distributed calculations, refers to the breakdown of huge data calculation processing procedures into countless small programs through the network "cloud", and then, the system is processed and analyzed by the system consisting of multiple servers. And return to the user. Because cloud computing has low cost costs and very high stability. Therefore, in general, the data on the cloud is a major trend in the future. However, the cloud itself is built and maintained by a third party, and in recent years, the data disclosure event on the cloud often occurs....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00H04L29/08G06F21/62G06F21/32
CPCH04L63/08H04L63/0428H04L9/008H04L63/0435H04L63/0861H04L67/02G06F21/6254G06F21/32
Inventor 吕志宁谢宏王程斯
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products