CN113408967B - Method and device for evaluating power one-network-through multi-state data sharing risk - Google Patents

Method and device for evaluating power one-network-through multi-state data sharing risk Download PDF

Info

Publication number
CN113408967B
CN113408967B CN202110945995.9A CN202110945995A CN113408967B CN 113408967 B CN113408967 B CN 113408967B CN 202110945995 A CN202110945995 A CN 202110945995A CN 113408967 B CN113408967 B CN 113408967B
Authority
CN
China
Prior art keywords
risk
data sharing
network
data
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110945995.9A
Other languages
Chinese (zh)
Other versions
CN113408967A (en
Inventor
李达
杨维
冯景丽
玄佳兴
张才俊
王合建
杨珂
苏展
鲜开强
章劲秋
李文健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Blockchain Technology Beijing Co ltd
State Grid Co ltd Customer Service Center
State Grid Digital Technology Holdings Co ltd
State Grid Jiangsu Electric Power Co ltd Marketing Service Center
State Grid Corp of China SGCC
Original Assignee
State Grid Blockchain Technology Beijing Co ltd
State Grid Co ltd Customer Service Center
State Grid Jiangsu Electric Power Co ltd Marketing Service Center
State Grid Corp of China SGCC
State Grid E Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Blockchain Technology Beijing Co ltd, State Grid Co ltd Customer Service Center, State Grid Jiangsu Electric Power Co ltd Marketing Service Center, State Grid Corp of China SGCC, State Grid E Commerce Co Ltd filed Critical State Grid Blockchain Technology Beijing Co ltd
Priority to CN202110945995.9A priority Critical patent/CN113408967B/en
Publication of CN113408967A publication Critical patent/CN113408967A/en
Application granted granted Critical
Publication of CN113408967B publication Critical patent/CN113408967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/16Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Mathematical Physics (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Mathematical Analysis (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Game Theory and Decision Science (AREA)
  • Mathematical Optimization (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Finance (AREA)
  • Computational Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Water Supply & Treatment (AREA)
  • Algebra (AREA)
  • Public Health (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides an assessment method and a device for electric power one-network-through multi-state data sharing risk, wherein the method comprises the following steps: identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scene and the service mode; constructing a power one-network-through multi-state data sharing risk measurement system, and carrying out quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; and performing power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result. The method can comprehensively evaluate the power 'one-network-through' polymorphic data sharing risk and generate a visual evaluation result.

Description

Method and device for evaluating power one-network-through multi-state data sharing risk
Technical Field
The application relates to the technical field of power system safety, in particular to an assessment method and device for power one-network-through multi-state data sharing risks.
Background
The 'one-network communication' polymorphic data sharing of electric power refers to the establishment of a digital mutual trust and cross-domain sharing mechanism, breaks through data barriers, and realizes cross-regional, cross-unit and cross-level interconnection and intercommunication of government affair data and electric power data. The 'one-network-through' multi-state data sharing of the electric power is beneficial to improving convenience and instantaneity of data transfer of electric power business on one hand, improving business handling efficiency for customers and reducing business handling cost on the other hand, and meanwhile, an important foundation is laid for deeply mining application value of electric power big data and establishing an electric power data sharing center.
The electric power one-network-connection-oriented polymorphic data sharing relates to data production, circulation and consumption of cross-business, cross-region, cross-unit and cross-level, which also causes polymorphic data sharing risks, and a sharing risk assessment method facing the electric power one-network-connection-oriented polymorphic data is lacking at present.
Disclosure of Invention
Based on the technical current situation, the application provides an evaluation method and device for the sharing risk of the multi-state data of the power 'one-network-through' which can be used for evaluating the sharing risk of the multi-state data of the power 'one-network-through'.
In order to achieve the above purpose, the present application proposes the following technical solutions:
a method for evaluating the sharing risk of the polymorphic data of one-network communication of electric power comprises the following steps:
according to the service scene and the service mode of the power one-network-through handling, risk factors in the power one-network-through handling multi-state data sharing service are identified;
constructing a power one-network-through multi-state data sharing risk measurement system, and carrying out quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;
and performing power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result.
Optionally, the identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scenario and the electric power one-network-through service mode includes:
determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';
and (3) discovering risk sources in the 'one-network-through' polymorphic data sharing link of the electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.
Optionally, the service form of the electric power one-network-through multi-state data sharing includes an electric power system operation service, an electric power transaction service, and an electric power system planning service;
risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business;
the risk classification list comprises data loss risks, data leakage risks and data tampering risks.
Optionally, the risk of data loss refers to that the polymorphic data "one-network-through" is not completely transmitted from an upstream provider of the data to a downstream user of the data due to an equipment failure in a sharing link, and the risk is originated from the links of uploading, storing and consuming the data, which results in that a business decision of the downstream user of the data cannot be normally performed;
the data leakage risk refers to that the electric power one-network-through multi-state data is stolen by a third-party data main body except a data upstream provider and an authorized downstream user in a sharing link, the risk comes from the links of data storage and consumption, the unauthorized third-party data main body obtains corresponding data, the data safety is damaged, and the privacy and fairness of the electric power one-network-through multi-state data sharing are damaged;
the data tampering risk refers to that the polymorphic data of the power 'one-network-through' are maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, the data tampering risk possibly occurs in the processes of data generation, uploading, storage and consumption, the correctness of the polymorphic data sharing is influenced by the tampering of the power data, and the normal operation of a power system is damaged.
Optionally, the constructing a power one-network-through multi-state data sharing risk measurement system, and performing quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service includes:
acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;
and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.
Optionally, the data sharing risk metric function is:
Figure 375158DEST_PATH_IMAGE001
wherein,
Figure 12813DEST_PATH_IMAGE002
for data sharing linksjIn, sharing risksiThe probability of occurrence;
Figure 552378DEST_PATH_IMAGE003
for data sharing linksjIn, sharing risksiThe degree of severity of the resulting outcome;
Figure 182949DEST_PATH_IMAGE004
for data sharing linksjIn, risk of data sharingiThe result of the risk metric of (a);
Figure 616204DEST_PATH_IMAGE005
Figure 565706DEST_PATH_IMAGE006
optionally, the probability of occurrence of the risk of data loss is determined by the following evaluation:
Figure 936775DEST_PATH_IMAGE007
wherein,
Figure 262714DEST_PATH_IMAGE008
initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 284897DEST_PATH_IMAGE009
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 779201DEST_PATH_IMAGE010
indicating the number of fields lost in the data sharing link j in the kth data sharing;
the occurrence probability of the data leakage risk is determined by the following evaluation:
Figure 293359DEST_PATH_IMAGE011
wherein,
Figure 282044DEST_PATH_IMAGE012
initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 34099DEST_PATH_IMAGE013
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 466349DEST_PATH_IMAGE014
the number of fields revealed by a data sharing link j in the kth data sharing is represented;
the probability of occurrence of the risk of data tampering is determined by evaluating:
Figure 202223DEST_PATH_IMAGE015
wherein,
Figure 994599DEST_PATH_IMAGE016
initiating a service set for operation and/or transaction and/or planning discrete data sharing in a historical data statistics period;
Figure 998500DEST_PATH_IMAGE017
initiating a service set for operation and/or transaction and/or planning continuous data sharing in a historical data statistics period;
Figure 726284DEST_PATH_IMAGE018
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 74089DEST_PATH_IMAGE019
indicating the number of fields tampered in the data sharing link j in the kth data sharing;
Figure 14363DEST_PATH_IMAGE020
a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,
Figure 881956DEST_PATH_IMAGE021
is a matrix of values
Figure 780642DEST_PATH_IMAGE020
A p-th row and a q-th column;
Figure 84584DEST_PATH_IMAGE022
representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,
Figure 468030DEST_PATH_IMAGE023
is a matrix of values
Figure 580342DEST_PATH_IMAGE024
The p-th row and the q-th column.
Optionally, in the data sharing risk measurement function, the loss caused by the risk of data leakage, the risk of data loss, and the risk of data tampering is obtained through expert experience evaluation.
Optionally, the performing the electric power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service to obtain an electric power one-network-through multi-state data sharing risk assessment result includes:
normalizing the risk factor measurement result in the power one-network-through multi-state data sharing service;
and establishing a variable-angle radar chart-based power one-network-through business polymorphic data sharing risk visual comprehensive evaluation model according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk evaluation result.
Optionally, the normalizing process is performed on the risk factor measurement result in the power "one-network-through" multi-state data sharing service, and includes:
normalizing the risk factor measurement result in the power 'one-network-through' multi-state data sharing service according to the following formula:
Figure 508984DEST_PATH_IMAGE025
wherein,
Figure 441168DEST_PATH_IMAGE026
and
Figure 864190DEST_PATH_IMAGE027
respectively representing the lower limit and the upper limit of the measurement result of the shared risk i in the data sharing link j,
Figure 831009DEST_PATH_IMAGE028
and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.
Optionally, the weight of the risk factor measurement result in the power "one-network-through" polymorphic data sharing service is determined by calculation according to the following formula:
Figure 930552DEST_PATH_IMAGE029
wherein,
Figure 615612DEST_PATH_IMAGE030
expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;
Figure 75281DEST_PATH_IMAGE031
representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,
Figure 21240DEST_PATH_IMAGE032
and measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.
Optionally, the method for obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result includes the steps of establishing a power "one-network-through office" business polymorphic data sharing risk visual comprehensive evaluation model based on the variable-angle radar chart according to the normalized risk factor measurement result in the power "one-network-through office" polymorphic data sharing business, and obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result:
making a unit circle;
3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc of the ith x j fan-shaped area satisfies
Figure 432630DEST_PATH_IMAGE033
Each region representing an evaluation index
Figure 214772DEST_PATH_IMAGE034
(ii) a The intersection point of the unit circle and each ray is
Figure 104231DEST_PATH_IMAGE035
Taking the angular bisector of the fan-shaped ij as an evaluation index
Figure 904696DEST_PATH_IMAGE036
Coordinate axes of (1), vertices thereof
Figure 221408DEST_PATH_IMAGE037
Figure 989382DEST_PATH_IMAGE038
、……
Figure 682531DEST_PATH_IMAGE039
Represents;
in evaluating the index
Figure 603083DEST_PATH_IMAGE036
On the coordinate axis of
Figure 966062DEST_PATH_IMAGE040
For recording the length as the index value scale, use
Figure 847431DEST_PATH_IMAGE041
Figure 203326DEST_PATH_IMAGE042
、……
Figure 853750DEST_PATH_IMAGE043
Represents;
at the center of a circle O, point
Figure 886165DEST_PATH_IMAGE043
And with
Figure 254830DEST_PATH_IMAGE043
The adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding index
Figure 414416DEST_PATH_IMAGE043
Contribution to the comprehensive evaluation result;
the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:
Figure 529133DEST_PATH_IMAGE044
Figure 624128DEST_PATH_IMAGE045
Figure 604723DEST_PATH_IMAGE046
wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;
Figure 177787DEST_PATH_IMAGE047
representing a theoretical optimum value;
Figure 911125DEST_PATH_IMAGE048
as the center of a circle O, point
Figure 177021DEST_PATH_IMAGE049
And with
Figure 379333DEST_PATH_IMAGE049
Quadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axis
Figure 21667DEST_PATH_IMAGE050
The length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.
An assessment device for power 'one-network-through' polymorphic data sharing risk comprises:
the risk identification unit is used for identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scene and the electric power one-network-through service mode;
the risk measurement unit is used for constructing a power one-network-through multi-state data sharing risk measurement system, and quantitatively analyzing risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;
and the risk evaluation unit is used for carrying out the risk evaluation of the electric power one-network-through multi-state data sharing according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service.
The method can identify risk factors in the electric power one-network-through multi-state data sharing service, measure the occurrence probability and the severity of the consequences of each risk factor, comprehensively evaluate the electric power one-network-through multi-state data sharing risk according to the quantitative result, and generate a visual evaluation result.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of an evaluation method for electric power "one-network-through" polymorphic data sharing risk according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating a relationship among a power grid service form, a data sharing link, and a data sharing risk classification list according to an embodiment of the present application;
fig. 3 is a schematic diagram of a power "one-network-through" polymorphic data sharing risk assessment result provided in the embodiment of the present application;
fig. 4 is a schematic structural diagram of an apparatus for evaluating a risk of sharing polymorphic data in power "one-network-through".
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides an evaluation method for the electric power one-network-through multi-state data sharing risk, the method can identify risk factors in the electric power one-network-through multi-state data sharing service, measure the occurrence probability and the resulting severity of each risk factor, comprehensively evaluate the electric power one-network-through multi-state data sharing risk according to the quantitative result, and generate a visual evaluation result.
Referring to fig. 1, the method includes:
s1, identifying risk factors in the electric power one-network-connection-handling multi-state data sharing service according to the electric power one-network-connection-handling service scene and the service mode;
s2, constructing a power one-network-through multi-state data sharing risk measurement system, and analyzing risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;
and S3, performing power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result.
Specifically, step S1 specifically includes:
s1.1, determining a data source shared by the multi-state data of the power one-network communication according to the service form of the multi-state data of the power one-network communication.
The service form of the electric power one-network-through multi-state data sharing comprises an electric power system operation service, an electric power transaction service and an electric power system planning service.
S1.2, discovering risk sources in the link of 'one-network-through' multi-state data sharing of electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.
The risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business.
The risk classification list comprises data loss risks, data leakage risks and data tampering risks.
The risk of data loss refers to that the polymorphic data of the power 'one-network-through' cannot be completely transmitted to a downstream user of the data from an upstream provider of the data due to equipment failure in a sharing link, and the risk is mainly derived from the links of uploading, storing and consuming the data, so that the business decision of the downstream user of the data cannot be normally carried out;
the data leakage risk refers to that the electric power 'one-network-through' polymorphic data is stolen by a third party data main body except a data upstream provider and an authorized downstream user in a sharing link, and the risk is mainly derived from the links of data storage and consumption. Corresponding data are obtained by a third-party data main body which causes unauthorized data, so that data safety is damaged, and privacy and fairness of power 'one-network-through' polymorphic data sharing are damaged;
the data tampering risk refers to that the electric power 'one-network-through' polymorphic data is maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, and the data tampering risk may occur in the processes of generation, uploading, storage and consumption of the data. The correctness of multi-state data sharing is influenced by the tampering of the electric power data, and the normal operation of an electric power system is damaged.
The relationship among the power grid service form, the data sharing link, and the data sharing risk classification list may be specifically shown in fig. 2.
Step S2 specifically includes:
s2.1, acquiring historical data of risk factors in the power one-network-through multi-state data sharing service.
S2.2, establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.
Specifically, the data sharing risk metric function is:
Figure 110976DEST_PATH_IMAGE001
wherein,
Figure 672408DEST_PATH_IMAGE002
the probability of occurrence of the sharing risk i in the data sharing link j is shown;
Figure 237381DEST_PATH_IMAGE051
the severity degree of the consequences caused by the sharing risk i in the data sharing link j (namely, the loss caused by the occurrence of the data sharing risk i);
Figure 526149DEST_PATH_IMAGE052
a risk measurement result of a data sharing risk i in a data sharing link j;
Figure 860178DEST_PATH_IMAGE053
Figure 592511DEST_PATH_IMAGE054
the probability of occurrence of risk of data loss can be estimated from historical data by the following equation:
Figure 644781DEST_PATH_IMAGE055
wherein,
Figure 238704DEST_PATH_IMAGE008
initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 551874DEST_PATH_IMAGE009
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 330474DEST_PATH_IMAGE010
indicating the number of fields lost in the data sharing link j in the kth data sharing;
the probability of occurrence of the data leakage risk can be determined from the historical data by evaluating the following formula:
Figure 243941DEST_PATH_IMAGE011
wherein,
Figure 766189DEST_PATH_IMAGE012
initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 933865DEST_PATH_IMAGE056
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 883367DEST_PATH_IMAGE057
the number of fields revealed by a data sharing link j in the kth data sharing is represented;
the probability of occurrence of the risk of data tampering can be determined from the historical data by evaluating:
Figure 520016DEST_PATH_IMAGE058
wherein,
Figure 845955DEST_PATH_IMAGE016
a service set shared by operation and/or transaction initiation and/or discrete data planning (such as unit operation and/or maintenance state, power transaction user registration information and the like) in a historical data statistics period;
Figure 133717DEST_PATH_IMAGE059
initiating operation and/or transaction and/or planning a service set shared by continuous data (such as a power generation and utilization curve, a transaction bidding function, a historical transaction condition, a load prediction curve and the like) in a historical data statistics period;
Figure 362442DEST_PATH_IMAGE060
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 876600DEST_PATH_IMAGE061
indicating the number of fields tampered in the data sharing link j in the kth data sharing;
Figure 865284DEST_PATH_IMAGE062
a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,
Figure 882919DEST_PATH_IMAGE063
is a matrix of values
Figure 315168DEST_PATH_IMAGE062
The numerical value elements of the p-th row and the q-th column in the middle are taken as an example of a power generation curve data matrix,
Figure 785464DEST_PATH_IMAGE063
representing the electricity generation and consumption amount of the kth user p in the q-th time period after the sharing link j is tampered;
Figure 312260DEST_PATH_IMAGE022
representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,
Figure 449980DEST_PATH_IMAGE023
is a matrix of values
Figure 286087DEST_PATH_IMAGE024
The p-th row and the q-th column.
In the data sharing risk measurement function, losses caused by data leakage risks, data loss risks and data tampering risks are obtained through expert experience assessment.
Step S3 specifically includes:
s3.1, normalizing risk factor measurement results in the power one-network-through multi-state data sharing service;
specifically, the risk factor measurement result in the power one-network-through multi-state data sharing service is normalized according to the following formula:
Figure 368313DEST_PATH_IMAGE064
wherein, the first and second guide rollers are arranged in a row,
Figure 839745DEST_PATH_IMAGE026
and
Figure 707338DEST_PATH_IMAGE027
respectively representing the upper and lower limits of the measurement result of the shared risk i in the data sharing link j, wherein,
Figure 74866DEST_PATH_IMAGE026
the lower limit is the lower limit of the total weight,
Figure 909967DEST_PATH_IMAGE027
is the upper limit;
Figure 919511DEST_PATH_IMAGE028
and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.
The weight of the risk factor measurement result in the power 'one-network-through' polymorphic data sharing service is determined by calculation according to the following formula:
Figure 874566DEST_PATH_IMAGE065
wherein,
Figure 68787DEST_PATH_IMAGE066
expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;
Figure 735392DEST_PATH_IMAGE067
representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,
Figure 423993DEST_PATH_IMAGE032
and measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.
And S3.2, establishing a visual comprehensive evaluation model of the polymorphic data sharing risk of the electric power one-network-through business based on the variable-angle radar chart according to the normalized risk factor measurement result in the electric power one-network-through business polymorphic data sharing business, and obtaining an electric power one-network-through business polymorphic data sharing risk evaluation result.
Specifically, according to the following processing steps, a variable-angle radar chart-based visual comprehensive evaluation model for the polymorphic data sharing risk of the power one-network-through business is established according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business, so that a power one-network-through business polymorphic data sharing risk evaluation result is obtained:
(1) making a unit circle;
(2) 3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc of the ith x j fan-shaped area satisfies
Figure 390812DEST_PATH_IMAGE033
Each region represents oneEvaluation index
Figure 224776DEST_PATH_IMAGE034
(ii) a The intersection point of the unit circle and each ray is
Figure 283737DEST_PATH_IMAGE035
(3) Taking the angular bisector of the fan-shaped ij as an evaluation index
Figure 635084DEST_PATH_IMAGE050
Coordinate axes of (1), vertices thereof
Figure 581043DEST_PATH_IMAGE068
Figure 726853DEST_PATH_IMAGE069
、……
Figure 243417DEST_PATH_IMAGE039
Represents;
(4) in evaluating the index
Figure 398454DEST_PATH_IMAGE050
On the coordinate axis of
Figure 198920DEST_PATH_IMAGE070
For recording the length as the index value scale, use
Figure 781211DEST_PATH_IMAGE041
Figure 283606DEST_PATH_IMAGE042
、……
Figure 101389DEST_PATH_IMAGE043
Represents;
(5) at the center of a circle O, point
Figure 897307DEST_PATH_IMAGE043
And with
Figure 525865DEST_PATH_IMAGE043
The adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding index
Figure 141654DEST_PATH_IMAGE043
Contribution to the comprehensive evaluation result;
(6) the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:
Figure 497549DEST_PATH_IMAGE044
Figure 147973DEST_PATH_IMAGE045
Figure 445969DEST_PATH_IMAGE046
wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;
Figure 814633DEST_PATH_IMAGE047
representing a theoretical optimum value;
Figure 708640DEST_PATH_IMAGE048
as the center of a circle O, point
Figure 88937DEST_PATH_IMAGE049
And with
Figure 183931DEST_PATH_IMAGE049
Quadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axis
Figure 898947DEST_PATH_IMAGE071
The length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.
Specifically, the comprehensive evaluation result of the risk of polymorphic data loss can be obtained by the following formula:
Figure 472010DEST_PATH_IMAGE072
Figure 470928DEST_PATH_IMAGE073
Figure 736824DEST_PATH_IMAGE074
wherein,
Figure 673556DEST_PATH_IMAGE075
representing the comprehensive evaluation quantitative area of the risk of polymorphic data loss;
Figure 925677DEST_PATH_IMAGE076
expressing the theoretical optimal value, namely the area of a unit circle data loss risk sector area;
Figure 405200DEST_PATH_IMAGE077
the comprehensive evaluation result of the risk of the polymorphic data loss is shown and expressed in percentage.
The method for obtaining the comprehensive evaluation result of the data leakage risk and the data tampering risk is similar to the method, and is not described in detail.
The finally obtained power "one-network-through-the-office" polymorphic data sharing risk assessment result is shown in fig. 3.
Another embodiment of the present application further provides an apparatus for evaluating a risk of sharing polymorphic data in a power "one-network-through", which is shown in fig. 4, and includes:
the risk identification unit 100 is configured to identify risk factors in the power one-network-through multi-state data sharing service according to the power one-network-through service scenario and the service mode;
the risk measurement unit 110 is configured to construct an electric power one-network-through multi-state data sharing risk measurement system, and analyze risk factors in the electric power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the electric power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;
and the risk evaluation unit 120 is configured to perform the risk evaluation on the sharing of the power one-network-through polymorphic data according to the risk factor measurement result in the power one-network-through polymorphic data sharing service.
Optionally, the identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scenario and the electric power one-network-through service mode includes:
determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';
and (3) discovering risk sources in the 'one-network-through' polymorphic data sharing link of the electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.
Optionally, the service form of the electric power one-network-through multi-state data sharing includes an electric power system operation service, an electric power transaction service, and an electric power system planning service;
risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business;
the risk classification list comprises data loss risks, data leakage risks and data tampering risks.
Optionally, the risk of data loss refers to that the polymorphic data "one-network-through" is not completely transmitted from an upstream provider of the data to a downstream user of the data due to an equipment failure in a sharing link, and the risk is mainly derived from the links of uploading, storing and consuming the data, which causes that a business decision of the downstream user of the data cannot be normally performed;
the data leakage risk refers to that the electric power 'one-network-through' polymorphic data is stolen by a third party data main body except a data upstream provider and an authorized downstream user in a sharing link, and the risk is mainly derived from the links of data storage and consumption. Corresponding data are obtained by a third-party data main body which causes unauthorized data, so that data safety is damaged, and privacy and fairness of power 'one-network-through' polymorphic data sharing are damaged;
the data tampering risk refers to that the electric power 'one-network-through' polymorphic data is maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, and the data tampering risk may occur in the processes of generation, uploading, storage and consumption of the data. The correctness of multi-state data sharing is influenced by the tampering of the electric power data, and the normal operation of an electric power system is damaged.
Optionally, the constructing a power one-network-through multi-state data sharing risk measurement system, analyzing risk factors in the power one-network-through multi-state data sharing service, and obtaining a risk factor measurement result in the power one-network-through multi-state data sharing service includes:
acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;
and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.
Optionally, the data sharing risk metric function is:
Figure 966632DEST_PATH_IMAGE001
wherein,
Figure 266026DEST_PATH_IMAGE002
for data sharing linksjIn, sharing risksiThe probability of occurrence;
Figure 820373DEST_PATH_IMAGE003
for data sharing linksjIn, sharing risksiThe degree of severity of the resulting outcome;
Figure 419981DEST_PATH_IMAGE004
for data sharing linksjIn, risk of data sharingiThe result of the risk metric of (a);
Figure 886735DEST_PATH_IMAGE078
Figure 548791DEST_PATH_IMAGE006
optionally, the probability of occurrence of the risk of data loss is determined by the following evaluation:
Figure 532928DEST_PATH_IMAGE007
wherein,
Figure 111677DEST_PATH_IMAGE012
initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 890277DEST_PATH_IMAGE013
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 296023DEST_PATH_IMAGE079
indicating the number of fields lost in the data sharing link j in the kth data sharing;
the occurrence probability of the data leakage risk is determined by the following evaluation:
Figure 818271DEST_PATH_IMAGE080
wherein,
Figure 251527DEST_PATH_IMAGE012
initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 201028DEST_PATH_IMAGE056
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 837677DEST_PATH_IMAGE081
the number of fields revealed by a data sharing link j in the kth data sharing is represented;
the probability of occurrence of the risk of data tampering is determined by evaluating:
Figure 22671DEST_PATH_IMAGE082
wherein,
Figure 451378DEST_PATH_IMAGE083
initiating a service set for operation and/or transaction and/or planning discrete data sharing in a historical data statistics period;
Figure 945682DEST_PATH_IMAGE084
initiating a service set for operation and/or transaction and/or planning continuous data sharing in a historical data statistics period;
Figure 928682DEST_PATH_IMAGE018
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 917366DEST_PATH_IMAGE085
indicating the number of fields tampered in the data sharing link j in the kth data sharing;
Figure 200580DEST_PATH_IMAGE020
a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,
Figure 367250DEST_PATH_IMAGE086
is a matrix of values
Figure 962180DEST_PATH_IMAGE020
A p-th row and a q-th column;
Figure 629921DEST_PATH_IMAGE022
representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,
Figure 875964DEST_PATH_IMAGE023
is a matrix of values
Figure 338169DEST_PATH_IMAGE087
The p-th row and the q-th column.
Optionally, in the data sharing risk measurement function, the loss caused by the risk of data leakage, the risk of data loss, and the risk of data tampering is obtained through expert experience evaluation.
Optionally, the performing the electric power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service to obtain an electric power one-network-through multi-state data sharing risk assessment result includes:
normalizing the risk factor measurement result in the power one-network-through multi-state data sharing service;
and establishing a variable-angle radar chart-based power one-network-through business polymorphic data sharing risk visual comprehensive evaluation model according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk evaluation result.
Optionally, the normalizing process is performed on the risk factor measurement result in the power "one-network-through" multi-state data sharing service, and includes:
normalizing the risk factor measurement result in the power 'one-network-through' multi-state data sharing service according to the following formula:
Figure 685974DEST_PATH_IMAGE088
wherein,
Figure 767194DEST_PATH_IMAGE026
and
Figure 759420DEST_PATH_IMAGE027
respectively representing the lower limit and the upper limit of the measurement result of the shared risk i in the data sharing link j,
Figure 517161DEST_PATH_IMAGE028
and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.
Optionally, the weight of the risk factor measurement result in the power "one-network-through" polymorphic data sharing service is determined by calculation according to the following formula:
Figure 227628DEST_PATH_IMAGE089
wherein,
Figure 345494DEST_PATH_IMAGE030
expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;
Figure 192228DEST_PATH_IMAGE031
representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,
Figure 386449DEST_PATH_IMAGE032
and measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.
Optionally, the method for obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result includes the steps of establishing a power "one-network-through office" business polymorphic data sharing risk visual comprehensive evaluation model based on the variable-angle radar chart according to the normalized risk factor measurement result in the power "one-network-through office" polymorphic data sharing business, and obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result:
making a unit circle;
3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc of the ith x j fan-shaped area satisfies
Figure 318632DEST_PATH_IMAGE033
Each region representing an evaluation index
Figure 741655DEST_PATH_IMAGE034
(ii) a The intersection point of the unit circle and each ray is
Figure 567528DEST_PATH_IMAGE090
Taking the angular bisector of the fan-shaped ij as an evaluation index
Figure 808017DEST_PATH_IMAGE091
Coordinate axes of (1), vertices thereof
Figure 335819DEST_PATH_IMAGE092
Figure 687166DEST_PATH_IMAGE093
、……
Figure 633125DEST_PATH_IMAGE039
Represents;
in evaluating the index
Figure 44515DEST_PATH_IMAGE036
On the coordinate axis of
Figure 561078DEST_PATH_IMAGE040
For recording the length as the index value scale, use
Figure 840750DEST_PATH_IMAGE041
Figure 516581DEST_PATH_IMAGE042
、……
Figure 207195DEST_PATH_IMAGE043
Represents;
at the center of a circle O, point
Figure 601267DEST_PATH_IMAGE043
And with
Figure 419050DEST_PATH_IMAGE043
The adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding index
Figure 214968DEST_PATH_IMAGE043
Contribution to the comprehensive evaluation result;
the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:
Figure 312368DEST_PATH_IMAGE094
Figure 318370DEST_PATH_IMAGE045
Figure 815211DEST_PATH_IMAGE046
wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;
Figure 573957DEST_PATH_IMAGE047
representing a theoretical optimum value;
Figure 498051DEST_PATH_IMAGE048
as the center of a circle O, point
Figure 725770DEST_PATH_IMAGE049
Andand
Figure 760722DEST_PATH_IMAGE049
quadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axis
Figure 141019DEST_PATH_IMAGE095
The length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.
Specifically, please refer to the corresponding content of the above method embodiment for the specific work content of each unit of the above evaluation apparatus for electric power "one-network-through" polymorphic data sharing risk, which is not described herein again.
While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present application is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The steps in the method of each embodiment of the present application may be sequentially adjusted, combined, and deleted according to actual needs, and technical features described in each embodiment may be replaced or combined.
The modules and sub-modules in the device and the terminal in the embodiments of the application can be combined, divided and deleted according to actual needs.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal, apparatus and method may be implemented in other manners. For example, the above-described terminal embodiments are merely illustrative, and for example, the division of a module or a sub-module is only one logical division, and there may be other divisions when the terminal is actually implemented, for example, a plurality of sub-modules or modules may be combined or integrated into another module, or some features may be omitted or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules or sub-modules described as separate parts may or may not be physically separate, and parts that are modules or sub-modules may or may not be physical modules or sub-modules, may be located in one place, or may be distributed over a plurality of network modules or sub-modules. Some or all of the modules or sub-modules can be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, each functional module or sub-module in the embodiments of the present application may be integrated into one processing module, or each module or sub-module may exist alone physically, or two or more modules or sub-modules may be integrated into one module. The integrated modules or sub-modules may be implemented in the form of hardware, or may be implemented in the form of software functional modules or sub-modules.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software unit executed by a processor, or in a combination of the two. The software cells may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (11)

1. A method for evaluating the sharing risk of the polymorphic data of the power 'one-network-through' is characterized by comprising the following steps:
according to the service scene and the service mode of the power one-network-through handling, risk factors in the power one-network-through handling multi-state data sharing service are identified;
constructing a power one-network-through multi-state data sharing risk measurement system, and carrying out quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;
performing power one-network-through multi-state data sharing risk assessment according to a risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result;
the identifying of the risk factors in the electric power one-network-through handling multi-state data sharing service according to the electric power one-network-through handling service scene and the service mode comprises the following steps:
determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';
the risk source in the multi-state data sharing link of 'one-network-through' of the electric power is excavated, risk factors influencing normal operation of data sharing are analyzed, and a risk classification list is generated;
the method for constructing the power one-network-through multi-state data sharing risk measurement system and quantitatively analyzing the risk factors in the power one-network-through multi-state data sharing service to obtain the risk factor measurement result in the power one-network-through multi-state data sharing service comprises the following steps of:
acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;
and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.
2. The method according to claim 1, wherein the business forms of the power one-network-through multi-state data sharing comprise power system operation business, power transaction business and power system planning business;
risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business;
the risk classification list comprises data loss risks, data leakage risks and data tampering risks.
3. The method according to claim 2, wherein the risk of data loss refers to that the polymorphic data of the power 'one-network-through' is not completely transmitted from an upstream provider of the data to a downstream user of the data due to equipment failure in a sharing link, and the risk is originated from the links of uploading, storing and consuming the data, so that business decisions of the downstream user of the data cannot be normally performed;
the data leakage risk refers to that the electric power one-network-through multi-state data is stolen by a third-party data main body except a data upstream provider and an authorized downstream user in a sharing link, the risk comes from the links of data storage and consumption, the unauthorized third-party data main body obtains corresponding data, the data safety is damaged, and the privacy and fairness of the electric power one-network-through multi-state data sharing are damaged;
the data tampering risk refers to that the polymorphic data of the power 'one-network-through' are maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, the data tampering risk occurs in the processes of data generation, uploading, storage and consumption, the correctness of the polymorphic data sharing is influenced by the tampering of the power data, and the normal operation of a power system is damaged.
4. The method of claim 1, wherein the data sharing risk metric function is:
R i,j (P i,j , I i,j )= P i,j × I i,j
wherein,P i,j for data sharing linksjIn, sharing risksiThe probability of occurrence;I i,j for data sharing linksjIn, sharing risksiThe degree of severity of the resulting outcome;R i,j for data sharing linksjIn, risk of data sharingiThe result of the risk metric of (a); i belongs to the { risk of data loss, data leakage and data tampering }; j belongs to { data generation, data uploading, data storage and data consumption }.
5. The method of claim 4, wherein the probability of occurrence of the risk of data loss is determined by evaluating:
Figure 546488DEST_PATH_IMAGE001
wherein omegaTInitiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 933607DEST_PATH_IMAGE002
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 241091DEST_PATH_IMAGE003
indicating the number of fields lost in the data sharing link j in the kth data sharing;
the occurrence probability of the data leakage risk is determined by the following evaluation:
Figure 131687DEST_PATH_IMAGE004
wherein omegaTInitiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;
Figure 115692DEST_PATH_IMAGE005
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 724528DEST_PATH_IMAGE006
the number of fields revealed by a data sharing link j in the kth data sharing is represented;
the probability of occurrence of the risk of data tampering is determined by evaluating:
Figure 898021DEST_PATH_IMAGE007
wherein omegaT,DInitiating a service set for operation and/or transaction and/or planning discrete data sharing in a historical data statistics period; omegaT,CInitiating a service set for operation and/or transaction and/or planning continuous data sharing in a historical data statistics period;
Figure 846385DEST_PATH_IMAGE008
indicates the total field number processed by the data sharing link j in the k-th data sharing,
Figure 814341DEST_PATH_IMAGE009
indicating the number of fields tampered in the data sharing link j in the kth data sharing;
Figure 910473DEST_PATH_IMAGE010
indicating a data sharing ring in the kth data sharingThe tampered value matrix of section j,
Figure 809028DEST_PATH_IMAGE011
is a matrix of values
Figure 674216DEST_PATH_IMAGE012
A p-th row and a q-th column;M k,j representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,m k,j,p,q is a matrix of valuesM k,j The p-th row and the q-th column.
6. The method of claim 4, wherein the data sharing risk metric function is characterized in that the losses caused by data leakage risk, data loss risk and data tampering risk are evaluated by expert experience.
7. The method as claimed in claim 1, wherein performing the power one-net-work polymorphic data sharing risk assessment according to the risk factor measurement result in the power one-net-work polymorphic data sharing service to obtain a power one-net-work polymorphic data sharing risk assessment result, comprises:
normalizing the risk factor measurement result in the power one-network-through multi-state data sharing service;
and establishing a variable-angle radar chart-based power one-network-through business polymorphic data sharing risk visual comprehensive evaluation model according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk evaluation result.
8. The method of claim 7, wherein normalizing the risk factor measurement results in the power one-network-through polymorphic data sharing service comprises:
normalizing the risk factor measurement result in the power 'one-network-through' multi-state data sharing service according to the following formula:
Figure 813073DEST_PATH_IMAGE013
wherein,
Figure 334184DEST_PATH_IMAGE014
and
Figure 583900DEST_PATH_IMAGE015
respectively representing the lower limit and the upper limit of the measurement result of the shared risk i in the data sharing link j,
Figure 569174DEST_PATH_IMAGE016
representing the measurement result of the shared risk i, R in the data sharing link j obtained after the preprocessingi,jIn the data sharing link j, the risk of data sharingiThe result of the risk metric of (1).
9. The method of claim 8, wherein the weight of the risk factor measurement result in the power one-net-through polymorphic data sharing service is determined by calculating according to the following formula:
Figure 893031DEST_PATH_IMAGE017
wherein λ isi,jExpressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j; thetai,jRepresenting the objective weight omega of the shared risk i obtained by an objective weighting method in a data sharing link ji,jAnd measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.
10. The method according to claim 9, wherein the step of establishing a visual comprehensive assessment model of the polymorphic data sharing risk of the power one-network-through business based on the variable-angle radar chart according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk assessment result comprises the following steps:
making a unit circle;
3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc degree of the ith x j fan-shaped area satisfies etai,j=2πωi,jEach region representing an evaluation index Ri,j(ii) a Recording the intersection points of the unit circle and each ray as A, B, … and L; the evaluation index Ri,jA risk measurement result of the data sharing risk i in the data sharing link j;
taking the angular bisector of the fan-shaped ij as an evaluation index Ri,jThe coordinate axis of (2), the vertex of which is Ll,1、Ll,2、……Li,jRepresents;
in evaluating the index Ri,jOn the coordinate axis of
Figure 963755DEST_PATH_IMAGE016
For length, marking the index value scale, using ll,1、ll,2、……li,jRepresents;
at the center of a circle O and a point li,jAnd with li,jThe adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding index li,jContribution to the comprehensive evaluation result;
the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:
Figure 17162DEST_PATH_IMAGE018
Figure 794625DEST_PATH_IMAGE019
Figure 275285DEST_PATH_IMAGE020
wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk; soptRepresenting a theoretical optimum value; h isi,jAs the center of circle O, point li,jAnd with li,jQuadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axis Ri,jThe length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.
11. An assessment device for power 'one-network-through' polymorphic data sharing risk is characterized by comprising:
the risk identification unit is used for identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scene and the electric power one-network-through service mode;
the risk measurement unit is used for constructing a power one-network-through multi-state data sharing risk measurement system, and quantitatively analyzing risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;
the risk evaluation unit is used for carrying out the risk evaluation of the sharing of the power one-network-through polymorphic data according to the risk factor measurement result in the power one-network-through polymorphic data sharing service;
the identifying of the risk factors in the electric power one-network-through handling multi-state data sharing service according to the electric power one-network-through handling service scene and the service mode comprises the following steps:
determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';
the risk source in the multi-state data sharing link of 'one-network-through' of the electric power is excavated, risk factors influencing normal operation of data sharing are analyzed, and a risk classification list is generated;
the method for constructing the power one-network-through multi-state data sharing risk measurement system and quantitatively analyzing the risk factors in the power one-network-through multi-state data sharing service to obtain the risk factor measurement result in the power one-network-through multi-state data sharing service comprises the following steps of:
acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;
and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.
CN202110945995.9A 2021-08-18 2021-08-18 Method and device for evaluating power one-network-through multi-state data sharing risk Active CN113408967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110945995.9A CN113408967B (en) 2021-08-18 2021-08-18 Method and device for evaluating power one-network-through multi-state data sharing risk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110945995.9A CN113408967B (en) 2021-08-18 2021-08-18 Method and device for evaluating power one-network-through multi-state data sharing risk

Publications (2)

Publication Number Publication Date
CN113408967A CN113408967A (en) 2021-09-17
CN113408967B true CN113408967B (en) 2021-11-12

Family

ID=77688804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110945995.9A Active CN113408967B (en) 2021-08-18 2021-08-18 Method and device for evaluating power one-network-through multi-state data sharing risk

Country Status (1)

Country Link
CN (1) CN113408967B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115835463B (en) * 2022-11-29 2023-09-08 普杰软件(南京)有限公司 Intelligent lighting control system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663240B (en) * 2012-03-23 2015-07-22 广东省电力调度中心 Analysis system and evaluation method for power telecommunication business risks
CN103632310A (en) * 2013-11-19 2014-03-12 中国南方电网有限责任公司 Risk evaluation method for operation of large power grid
CN108074021A (en) * 2016-11-10 2018-05-25 中国电力科学研究院 A kind of power distribution network Risk Identification system and method
CN107124325A (en) * 2017-03-10 2017-09-01 北京国电通网络技术有限公司 A kind of power communication network operation safety evaluation method and system
CN110717675A (en) * 2019-10-10 2020-01-21 广西电网有限责任公司 Power grid construction risk assessment method
CN112749940A (en) * 2019-10-29 2021-05-04 北京中电普华信息技术有限公司 Electric power operation supporting platform

Also Published As

Publication number Publication date
CN113408967A (en) 2021-09-17

Similar Documents

Publication Publication Date Title
CN109922032B (en) Method, device, equipment and storage medium for determining risk of logging in account
US20200252423A1 (en) Systems and methods for vulnerability assessment and remedy identification
CN112633780B (en) Method for processing carbon resource based on climate chain, related device and storage medium
CN115086089B (en) Method and system for network security assessment prediction
Xinlan et al. Information security risk assessment methodology research: Group decision making and analytic hierarchy process
KR20120040589A (en) Optimum tender price prediction method and system
CN111553563A (en) Method and device for determining enterprise fraud risk
CN113627566A (en) Early warning method and device for phishing and computer equipment
CN116842527A (en) Data security risk assessment method
CN113408967B (en) Method and device for evaluating power one-network-through multi-state data sharing risk
CN110348472A (en) Data Detection rule generating method, device, computer equipment and storage medium
CN110677290A (en) Electric power communication operation and maintenance risk early warning method based on annealing algorithm and neural network model
CN114358498A (en) Overseas information management method and device for multinational enterprise
CN115018291A (en) Large bridge engineering risk assessment method
CN115204608A (en) Method and device for determining quality index of power grid project and computer equipment
CN117151882B (en) Risk assessment method and system based on multi-variety power transaction
CN114139931A (en) Enterprise data evaluation method and device, computer equipment and storage medium
Imamov Digital threats in the transition of the Russian economy to the innovative path of development
CN110796450B (en) Trusted relationship processing method and device
CN111127201A (en) Financial anti-money laundering cloud computing resource optimal allocation system and method based on SMDP
CN115829744A (en) Microgrid transaction method, storage medium, equipment and system based on block chain
CN115358894A (en) Intellectual property life cycle trusteeship management method, device, equipment and medium
CN116934131A (en) Enterprise operation condition assessment method, device and equipment
US20100131317A1 (en) Organization assessment and representation system and method
CN114757702A (en) Virtual power plant business demand index construction and communication mode adaptation method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100032 room 8018, 8 / F, building 7, Guangyi street, Xicheng District, Beijing

Patentee after: State Grid Digital Technology Holdings Co.,Ltd.

Patentee after: State Grid blockchain Technology (Beijing) Co.,Ltd.

Patentee after: STATE GRID Co.,Ltd. CUSTOMER SERVICE CENTER

Patentee after: State Grid Jiangsu Electric Power Co.,Ltd. Marketing Service Center

Patentee after: STATE GRID CORPORATION OF CHINA

Address before: 100053 room 8018, 8 / F, building 7, Guangyi street, Xicheng District, Beijing

Patentee before: STATE GRID ELECTRONIC COMMERCE Co.,Ltd.

Patentee before: State Grid blockchain Technology (Beijing) Co.,Ltd.

Patentee before: STATE GRID Co.,Ltd. CUSTOMER SERVICE CENTER

Patentee before: State Grid Jiangsu Electric Power Co.,Ltd. Marketing Service Center

Patentee before: STATE GRID CORPORATION OF CHINA

CP03 Change of name, title or address