Architecture of Data Access Based on Power Dispatch Control Cloud

被引:0
|
作者
Zhou Xiaoming [1 ]
Lei, Tao [1 ]
Li Dapeng [1 ]
Tao, Xie [1 ]
机构
[1] China Elect Power Res Inst, Beijing 100192, Peoples R China
关键词
Power Dispatch Control Cloud; Client-Proxy-Proxy-Server; Data Proxy Service; Cloud Center;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The data synchronization between all the regional dispatching system under the dispatch control center and power dispatch control cloud has been realized. The data information from each region such as real-time data, manipulate data, model data and graph data firstly is sent to the communication server for this region. Besides, the communication server sends this data to the dispatch control cloud center after some processing. In order to obtain the resource from cloud center, the workstations in each region have to access cloud center remotely. However, most process in man-machine remote access adopts client/server architecture, which affects the security of data access. To solve this problem and provide data proxy service in cloud center, a new architecture of data access based on power dispatch control cloud is proposed in this paper. The architecture of data access is a client-proxy-proxy-server architecture, which can not only ensure remote workstation accessing its own resource from the cloud center, but also ensure it obtaining resource of other regions from the cloud center with not switching the platform environment of smart grid dispatching and control system.
引用
收藏
页码:353 / 357
页数:5
相关论文
共 50 条
  • [31] MEDICAL DATA PRIVACY MONITORING BASED ON CLOUD COMPUTING AND ACCESS CONTROL STRATEGY
    Liu, W.
    Tang, C. C.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 107 - 107
  • [32] A Provenance-Based Access Control Model for Securely Storing Data in Cloud
    Mirajkar, Shweta Balasaheb
    Khatawkar, S. D.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 906 - 909
  • [33] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [34] CloudFile: A cloud data access control system based on mobile social trust
    Yan, Zheng
    Shi, Wangyang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 86 : 46 - 58
  • [35] Context Aware Based Access Control Model in Cloud Data Center Environment
    Byun, Yun Sang
    Kwak, Jin
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 515 - 524
  • [36] DACPCC: A Data Access Control Scheme with Access Permission for Cloud Computing
    Wang Y.-D.
    Yang J.-H.
    Yang, Jia-Hai (yang@cernet.edu.cn), 2018, Chinese Institute of Electronics (46): : 236 - 244
  • [37] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064
  • [38] Access Control and Data Separation Metrics in Cloud Infrastructures
    Jaeger, Bernd
    Kraftt, Reiner
    Luhn, Sebastian
    Selzer, Annika
    Waldmann, Ulrich
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 205 - 210
  • [39] Temporal Access Control with User Revocation for Cloud Data
    Balani, Nihal
    Ruj, Sushmita
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 336 - 342
  • [40] Cloud-Based Data Architecture Security
    Semenov, N. A.
    Poltavtsev, A. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1056 - 1064