Architecture of Data Access Based on Power Dispatch Control Cloud

被引:0
|
作者
Zhou Xiaoming [1 ]
Lei, Tao [1 ]
Li Dapeng [1 ]
Tao, Xie [1 ]
机构
[1] China Elect Power Res Inst, Beijing 100192, Peoples R China
关键词
Power Dispatch Control Cloud; Client-Proxy-Proxy-Server; Data Proxy Service; Cloud Center;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The data synchronization between all the regional dispatching system under the dispatch control center and power dispatch control cloud has been realized. The data information from each region such as real-time data, manipulate data, model data and graph data firstly is sent to the communication server for this region. Besides, the communication server sends this data to the dispatch control cloud center after some processing. In order to obtain the resource from cloud center, the workstations in each region have to access cloud center remotely. However, most process in man-machine remote access adopts client/server architecture, which affects the security of data access. To solve this problem and provide data proxy service in cloud center, a new architecture of data access based on power dispatch control cloud is proposed in this paper. The architecture of data access is a client-proxy-proxy-server architecture, which can not only ensure remote workstation accessing its own resource from the cloud center, but also ensure it obtaining resource of other regions from the cloud center with not switching the platform environment of smart grid dispatching and control system.
引用
收藏
页码:353 / 357
页数:5
相关论文
共 50 条
  • [41] The Cloud Data Security and Access Control Model in the Study
    Dong, Jing
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 498 - 500
  • [42] Biometric verified Access Control of Critical Data on a Cloud
    Haqani, Hamid
    Saleem, Mir
    Banday, Shoaib Amin
    Khan, Ab Rouf
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [43] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [44] An efficient signcryption for data access control in cloud computing
    Fagen Li
    Bo Liu
    Jiaojiao Hong
    Computing, 2017, 99 : 465 - 479
  • [45] Elimination of Redundant Data in Cloud with Secured Access Control
    Vidhya, R.
    Rajan, Ganesh P.
    Lawrance, Alex T.
    2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC), 2017, : 141 - 143
  • [46] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [47] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    COMPUTING, 2017, 99 (05) : 465 - 479
  • [48] Controlling Cloud Data Access Based on Reputation
    Zheng Yan
    Xueyun Li
    Raimo Kantola
    Mobile Networks and Applications, 2015, 20 : 828 - 839
  • [49] Role based access control using identity and broadcast based encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (03) : 171 - 182
  • [50] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182