KEYWORDS: Data processing, Computer security, Clouds, Network security, Data storage, Mathematical modeling, Data analysis, Telecommunications, Data storage servers, Safety
With the development of society, the power system is becoming larger and larger, which makes the analysis and processing of power data more and more complex. It is necessary to introduce modern data technology to make the power system develop rapidly in the new era and better serve people's production and life. From the perspective of cloud computing technology, this paper analyzes the smart grid big data processing in detail.
KEYWORDS: Network security, Clouds, Computer security, Data storage, Information security, Defense and security, Data centers, Internet, Computing systems, Data conversion
Cloud computing uses cloud resources to provide users with computing and storage services It has changed the processing mode of information resources for individuals and enterprises But The existing security reinforcement methods of cloud computing environment can not deal with external attacks caused by the singularity of cloud computing environment services and its own vulnerabilities This article starts from the cloud service itself the security threats of cloud computing platform are studied from three aspects: cloud service interface and network interface In order to deal with these security threats, the cloud service itself is analyzed and compared Randomization method of cloud service interface and network interface next. A randomization deployment model with multi-level, inter layer randomization awareness and distributed collaboration is proposed. The problem of randomization parameter awareness in model deployment is discussed the cooperation of the same layer services on different virtual machines The corresponding solutions are given. Finally, the security measures and limitations of the randomization method are discussed. Point out the future research direction.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.