高鹏, 陈智雨, 闫龙川, 玄佳兴, 王文婷, 沈雪晴, 史睿. 面向零信任环境的新一代电力数据安全防护技术[J]. 电力信息与通信技术, 2021, 19(2): 7-14. DOI: 10.16543/j.2095-641x.electric.power.ict.2021.02.002
引用本文: 高鹏, 陈智雨, 闫龙川, 玄佳兴, 王文婷, 沈雪晴, 史睿. 面向零信任环境的新一代电力数据安全防护技术[J]. 电力信息与通信技术, 2021, 19(2): 7-14. DOI: 10.16543/j.2095-641x.electric.power.ict.2021.02.002
GAO Peng, CHEN Zhiyu, YAN Longchuan, XUAN Jiaxing, WANG Wenting, SHEN Xueqing, SHI Rui. A New Generation of Power Data Security Protection Technology for Zero-trust Environment[J]. Electric Power Information and Communication Technology, 2021, 19(2): 7-14. DOI: 10.16543/j.2095-641x.electric.power.ict.2021.02.002
Citation: GAO Peng, CHEN Zhiyu, YAN Longchuan, XUAN Jiaxing, WANG Wenting, SHEN Xueqing, SHI Rui. A New Generation of Power Data Security Protection Technology for Zero-trust Environment[J]. Electric Power Information and Communication Technology, 2021, 19(2): 7-14. DOI: 10.16543/j.2095-641x.electric.power.ict.2021.02.002

面向零信任环境的新一代电力数据安全防护技术

A New Generation of Power Data Security Protection Technology for Zero-trust Environment

  • 摘要: 能源互联网的建设促进了海量终端高效互联,为能源流和信息流的高效交互提供了强有力的支撑。然而,信息共享时效性提高的同时,也随之带来了越发模糊的电力信息网络边界。随着系统规模急剧扩大,数据交互愈加频繁,系统运行环境更加复杂,运营数据安全交互面临更高要求。文章对国产密码、量子秘钥分发和区块链等技术在电力信息网络核心业务场景中的应用进行研究,旨在构建新一代的电力数据安全防护模型。分析结果显示,所提方法能够适应电力信息网络发展需求,弥补了零信任环境下电力数据交互时存在的安全短板,可进一步提升电力系统运营数据的安全防护能力。

     

    Abstract: The construction of energy Internet promotes the efficient interconnection of massive terminals and provides a strong support for the efficient interaction of energy flow and information flow. However, it also made the boundary of power information network more and more obscure. The rapid expansion of the system scale may result in more frequent data interaction, more complex system operating environment, as well as higher security requirements for operational data interaction. This paper studies the application of Chinese cipher, quantum key distribution and blockchain technology in the core operational scenarios of power information network, towards to build a new generation of power data security protection model. The analysis results show that the proposed method can meet the development requirements of the power information network and make up for the security deficiencies in the power data interaction process under the zero-trust environment, which can further improve the security protection of the operation data of the power system.

     

/

返回文章
返回