Energy Internet and Its Trusted Protection Architecture
نویسندگان
چکیده
Through the combination of new energy and Internet technology, Energy deeply integrates various complex network systems such as power, transportation natural gas, aiming to change utilization model promote sustainable development economy society. The takes power grid "Backbone Network" , integrating autonomous units distributed energy, information through open-peer integration architecture. Information interaction scenarios include "human-object" "human-human" "object-object" . In this interconnection mechanism environment, lack any security defenses may leave exposed risk leakage, theft loss, resulting in immeasurable losses. From scenarios, paper puts forward fine-grained access control mechanism, trusted computing environment building IoT devices communication channel construction, designs a protection architecture for ensure data throughout its life cycle. We verify that proposed can provide Internet.
منابع مشابه
Mobile Agent Protection Mechanisms, and the Trusted Agent Proxy Server (TAPS) Architecture
Autonomous mobile agents have been purported as a promising new alternative to traditional distributed computing approaches, bringing many advantageous features. Notwithstanding this, mobile agent technology has yet to see wide deployment in open networks like the Internet. The lack of interoperability between agent systems has impaired such progress. Moreover, fears of security breaches by mal...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملTIVA: Trusted Integrity Verification Architecture
We are moving towards the era of pervasive computing. The embedded computing devices are everywhere and they need to interact in many insecure ways. Verifying the integrity of the software running on these devices in such a scenario is an interesting and difficult problem. The problem is simplified if the verifying entity has access to the original binary image. However, the verifier itself may...
متن کاملDRM, Trusted Computing and Operating System Architecture
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft’...
متن کاملActive Protection of Trusted Security Services
Secure electronic communication relies on the application of cryptography. Recently, there has been an explosion in the growth of Public Key Infrastructure technology, where centralized or partially centralized services provide addresses and keys for participants desiring to establish secure channels with one another. We consider the traffic to and from these servers to be the foundation of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wuhan University Journal of Natural Sciences
سال: 2022
ISSN: ['1007-1202', '1993-4998']
DOI: https://doi.org/10.1051/wujns/2022272169