Power Industry Big Data Privacy Protection Processing Method Based on Fuzzy Logic and Intelligent Clustering

Authors

  • Feilu Hang Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China
  • Linjiang Xie Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China
  • Zhenhong Zhang Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China
  • Wei Guo Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China
  • Hanruo Li Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China

DOI:

https://doi.org/10.13052/dgaej2156-3306.3758

Keywords:

Power industry, big data, fuzzy logic method, privacy protection

Abstract

The power industry is the corporate globe’s backbone, delivering vital energy to industrial, manufacturing, promotional, and residential clients worldwide. Investment has been prompted by the shift of fuel and energy sources, rising environmental laws, and an ageing generating fleet and transmission infrastructure in industrialized nations with mature power systems. The evolving requirement in the power industry is causing several workforce challenges, including massive shifts in skills required, a skills gap for delivering. Performing newer technologies, changes occur when the Industry is experiencing high retirements and challenges recruiting a strengthening workforce. In this paper, Big Data based on the fuzzy logic method has been suggested to protect sensitive information. BD-FLM proposes a large data clustering-based privacy preservation probabilistic model that aims to cause the least disruption while maintaining the greatest amount of privacy. To alter or generalize sensitive data, use a methodology that secures sensitive information after detecting sensitive data clusters. In terms of conventional performance assessment metrics, the model’s privacy protection of individual data in large data with little disruption and effective reconstruction underlines its importance. This paper can automatically cluster based on the power characteristic factor and efficiently identify the power-related aspects of distinct user groups. The simulation results demonstrate that the proposed technique outperforms the comparison algorithm regarding prediction accuracy. As a result of anticipating the accurate values, individual privacy is preserved, but data accuracy is improved.

Author Biographies

Feilu Hang, Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China

Feilu Hang was born in 1984 in Zhaotong, Yunnan province, China. Graduated from Yunnan University with a master’s degree in system Analysis and integration. At present, I am working in equipment management Department of information center of Yunnan Power Grid Co., LTD. His research interest covers network and information security.

Linjiang Xie, Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China

Linjiang Xie was born in 1985 in Qujing, Yunnan Province, China. Graduated from Yunnan University with a bachelor’s degree in information security. At present, I am working in equipment management Department of information center of Yunnan Power Grid Co., LTD. His research interest is network security operation.

Zhenhong Zhang, Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China

Zhenhong Zhang, born in Qujing city, Yunnan Province, China in 1989, graduated from Beijing University of Posts and Telecommunications with a master’s degree in computer technology. Currently, he is working in the equipment management department of information Center of Yunnan Power Grid Co., LTD., and his research direction is information system operation and maintenance.

Wei Guo, Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China

Wei Guo, born in 1986 in Kunming, Yunnan Province, China, graduated from Chongqing University of Posts and Telecommunications with a bachelor’s degree in Information Management and Information System. Currently, he is working in the equipment management department of information Center of Yunnan Power Grid Co., LTD. His research direction is network and network security operation and peacekeeping management.

Hanruo Li, Information Center of Yunnan Power Grid Co., Ltd, Yunnan 650000, China

Hanruo Li born in 1991 in Zhaotong, Yunnan, China, graduated from Fuzhou University with a bachelor’s degree in network engineering. Currently, he is working in the equipment management Department of the information Center of Yunnan Power Grid Co., LTD. His research direction is network security operation and maintenance.

References

Amudha, G., and Narayanasamy, P. (2018). Distributed location and trust based replica detection in wireless sensor networks. Wireless Personal Communications, 102(4), 3303–3321.

Gheisari, M., Najafabadi, H. E., Alzubi, J. A., Gao, J., Wang, G., Abbasi, A. A., and Castiglione, A. (2021). OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Generation Computer Systems, 123, 1–13.

Krishnamoorthy, S., Shanthini, A., Manogaran, G., Saravanan, V., Manickam, A., and Samuel, R. D. J. (2021). Regression Model-based Feature Filtering for Improving Hemorrhage Detection Accuracy in Diabetic Retinopathy Treatment. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 29(Supp01), 51–71.

Manogaran, G., Shakeel, P. M., Baskar, S., Hsu, C. H., Kadry, S. N., Sundarasekar, R., …and Muthu, B. A. (2020). FDM: Fuzzy-optimized data management technique for improving big data analytics. IEEE Transactions on Fuzzy Systems, 29(1), 177–185.

Saravanan, V., Nuneviller, M., Pillai, A. S., and Anpalagan, A. (2020). Foundation of Big Data and Internet of Things: Applications and Case Study. Securing IoT and Big Data, 1–14.

Amudha, G., Jayasri, T., Saipriya, K., Shivani, A., and Praneetha, C. H. Behavioural Based Online Comment Spammers in Social Media.

Gao, J., Wang, H., and Shen, H. (2020). Task failure prediction in cloud data centers using deep learning. IEEE Transactions on Services Computing.

Do, D. T., Van Nguyen, M. S., Nguyen, T. N., Li, X., and Choi, K. (2020). Enabling multiple power beacons for uplink of noma-enabled mobile edge computing in wirelessly powered IOT. IEEE Access, 8, 148892–148905.

Seyhan, K., Nguyen, T. N., Akleylek, S., Cengiz, K., and Islam, S. H. (2021). Bi-GISISKE: Modified key exchange protocol with reusable keys for IoT security. Journal of Information Security and Applications, 58, 102788.

Krishnamoorthy, S., Shanthini, A., Manogaran, G., Saravanan, V., Manickam, A., and Samuel, R. D. J. (2021). Regression Model-based Feature Filtering for Improving Hemorrhage Detection Accuracy in Diabetic Retinopathy Treatment. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 29(Supp01), 51–71.

Manogaran, G., Baskar, S., Hsu, C. H., Kadry, S. N., Sundarasekar, R., Kumar, P. M., and Muthu, B. A. (2020). FDM: Fuzzy-optimized Data Management Technique for Improving Big Data Analytics. IEEE Transactions on Fuzzy Systems.

Baskar, S., Shakeel, P. M., Sridhar, K. P., and Kanimozhi, R. (2019, July). Classification System for Lung Cancer Nodule Using Machine Learning Technique and CT Images. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 1957–1962). IEEE.

Krishnan, E., Mohammed, R., Alnoor, A., Albahri, O. S., Zaidan, A. A., Alsattar, H., …and Alazab, M. (2021). Interval type 2 trapezoidal-fuzzy weighted with zero inconsistency combined with VIKOR for evaluating smart e-tourism applications. International Journal of Intelligent Systems.

Sedik, A., Hammad, M., Abd El-Latif, A. A., El-Banby, G. M., Khalaf, A. A., Abd El-Samie, F. E., and Iliyasu, A. M. (2021). Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities. IEEE Access, 9, 94780–94788.

Zhang, R., and Jackson Samuel, R. D. (2020). Fuzzy efficient energy smart home management system for renewable energy resources. Sustainability, 12(8), 3115.

Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.

Diamantoulakis, P. D., Kapinas, V. M., and Karagiannidis, G. K. (2015). Big data analytics for dynamic energy management in smart grids. Big Data Research, 2(3), 94–101.

Zhang, Y., Huang, T., and Bompard, E. F. (2018). Big data analytics in smart grids: a review. Energy informatics, 1(1), 1–24.

Zhou, K., Fu, C., and Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215–225.

Tannahill, B. K., and Jamshidi, M. (2014). System of Systems and Big Data analytics–Bridging the gap. Computers & Electrical Engineering, 40(1), 2–15.

Ren, Y., Leng, Y., Zhu, F., Wang, J., and Kim, H. J. (2019). Data storage mechanism based on blockchain with privacy protection in wireless body area network. Sensors, 19(10), 2395.

Tu, C., He, X., Shuai, Z., and Jiang, F. (2017). Big data issues in smart grid–A review. Renewable and Sustainable Energy Reviews, 79, 1099–1107.

Li, Y., Gai, K., Qiu, L., Qiu, M., and Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.

Iqbal, S., Zhang, C., Arif, M., Hassan, M., and Ahmad, S. (2020). A new fuzzy time series forecasting method based on clustering and weighted average approach. Journal of Intelligent & Fuzzy Systems, 38(5), 6089–6098.

Alahakoon, D., and Yu, X. (2015). Smart electricity meter data intelligence for future energy systems: A survey. IEEE Transactions on Industrial Informatics, 12(1), 425-436.

Guo, Y., Zhao, Z., He, K., Lai, S., Xia, J., and Fan, L. (2021). Efficient and flexible management for industrial Internet of Things: A federated learning approach. Computer Networks, 192, 108122.

Batista, E., and Solanas, A. (2021). A uniformization-based approach to preserve individuals’ privacy during process mining analyses. Peer-to-Peer Networking and Applications, 14(3), 1500–1519.

Shahbazi, Z., and Byun, Y. C. (2021). A Procedure for Tracing Supply Chains for Perishable Food Based on Blockchain, Machine Learning and Fuzzy Logic. Electronics, 10(1), 41.

Iqbal, R., Doctor, F., More, B., Mahmud, S., and Yousuf, U. (2020). Big data analytics: Computational intelligence techniques and application areas. Technological Forecasting and Social Change, 153, 119253.

Wang, H., Xu, Z., and Pedrycz, W. (2017). An overview on the roles of fuzzy set techniques in big data processing: Trends, challenges and opportunities. Knowledge-Based Systems, 118, 15–30.

Manogaran, G., Rawal, B. S., Saravanan, V., Kumar, P. M., Martínez, O. S., Crespo, R. G., …and Krishnamoorthy, S. (2020). Blockchain based integrated security measure for reliable service delegation in 6G communication environment. Computer Communications, 161, 248–256.

Saravanan, V., Hussain, F., and Kshirasagar, N. (2022). Role of big data in Internet of Things networks. In Research Anthology on Big Data Analytics, Architectures, and Applications (pp. 336–363). IGI Global.

Baskar, S., Shakeel, P. M., Kumar, R., Burhanuddin, M. A., and Sampath, R. (2020). A dynamic and interoperable communication framework for controlling the operations of wearable sensors in smart healthcare applications. Computer Communications, 149, 17–26.

Published

2022-07-01

How to Cite

Hang, F. ., Xie, L. ., Zhang, Z. ., Guo, W. ., & Li, H. . (2022). Power Industry Big Data Privacy Protection Processing Method Based on Fuzzy Logic and Intelligent Clustering. Distributed Generation &Amp; Alternative Energy Journal, 37(05), 1461–1492. https://doi.org/10.13052/dgaej2156-3306.3758

Issue

Section

Articles