Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on RBAC and Development of Visual Operation and Maintenance Platform

Authors

  • Lv Zheng Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China
  • Fang Xi Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China
  • Huang Lei Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China
  • Jiang Dan Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China
  • Ran Shuang Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China
  • Liang Lei Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.13511

Keywords:

Role Access Control, information security management, distribution network information storage, security optimization strategy

Abstract

Facing the challenge of information storage security brought by the rapid development of distribution network technology, this paper analyzes the essential requirements and current security problems of distribution network information storage and designs. It implements a set of security management schemes based on the RBAC model. User authentication and authorization processes are emphasized to ensure only authorized users can access critical information resources. The application in the actual distribution network environment shows that the scheme can improve the security performance of the system, reduce unauthorized access attempts by up to 40%, and improve data processing efficiency by about 30%. The scheme also reduces the complexity of system maintenance, and the number of security events that administrators need to deal with is reduced by about 50% compared to traditional security mechanisms. These data fully prove that the security management mechanism based on RBAC is efficacious in improving the distribution network’s information storage security and operational efficiency. This article proposes and studies an optimization scheme for information security management mechanisms based on RBAC in distribution network information storage technology. This scheme effectively improves the security and reliability of the distribution network information storage system through refined permission management and access control. This study provides innovative strategies, empirical data for distribution network information storage security management, and valuable references for future research on power grid information security.

Downloads

Download data is not yet available.

Author Biographies

Lv Zheng, Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

Lv Zheng graduated with a bachelor’s degree in 2006, is a senior engineer. He currently works at Tongren Power Supply Bureau of Guizhou Power Grid Co., Ltd. as the deputy general manager, responsible for production management work. He has rich management experience and has won multiple company science and technology progress awards and patent invention awards.

Fang Xi, Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

Fang Xi graduated with a bachelor’s degree in 2006 and is a senior engineer. Currently, she works in the Production Technology Department of Tongren Power Supply Bureau of Guizhou Power Grid Co., Ltd., responsible for science and technology management. She has led or participated in the implementation of multiple grid and provincial-level science and technology projects, and has rich project management experience. She has won multiple Guizhou Power Grid Company Science and Technology Progress Awards.

Huang Lei, Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

Huang Lei graduated with a bachelor’s degree in 2009 and is a senior engineer. He currently works at the Power Dispatching and Control Center of Tongren Power Supply Bureau of Guizhou Power Grid Co., Ltd. as the deputy team leader of the Distribution Network Automation Class. He has led or participated in the implementation of multiple network and provincial-level science and technology projects, and has rich project management experience.

Jiang Dan, Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

Jiang Dan graduated with a bachelor’s degree in 2019, currently works at Tongren Power Supply Bureau of Guizhou Power Grid Co., Ltd. Based on his position, he effectively utilizes new technologies to solve practical problems, and is engaged in the operation of intelligent distribution network systems, data monitoring, and other work.

Ran Shuang, Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

Ran Shuang graduated with a bachelor’s degree in 2015, is an engineer and currently works at the Transmission Management Institute of Tongren Power Supply Bureau of Guizhou Power Grid Co., Ltd. He is the Deputy General Manager. He has participated in skill competitions organized by provincial-level companies and won awards. He has led his team to participate in provincial-level skill competitions multiple times and achieved excellent results, demonstrating strong team leadership abilities.

Liang Lei, Tongren Power Supply Bureau of Guizhou Power Grid Co. LTD., Tongren, Guizhou, 554300, China

Liang Lei graduated with a bachelor’s degree in 2019, currently works at Tongren Power Supply Bureau of Guizhou Power Grid Co., Ltd. Based on his position as an inspector in a transmission management institute, he effectively utilizes new drone technology to solve practical problems in power lines and quickly discovers faults in overhead lines. Research and practice unmanned aerial vehicle autonomous inspection technology to promote the digital construction of overhead power transmission.

References

Zhao Xianqiu, Xu Qingshan, Yang Yongbiao and Zhou Gan.(2024). Distributed distributionally robust optimization of distribution network incorporating novel battery charging and swapping station. International Journal of Electrical Power and Energy Systems (PB).

Pleskach, V., Pleskach, M., and Zelikovska, O. (2019). Information Security Management System in Distributed Information Systems. 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT). IEEE.

Cui, J., Liu, T., Zheng, Y., Bai, S., Li, X., and Xue, C. (2023). Optimization of electromagnetic-triboelectric wind energy harvester based on coaxial reversed mechanism with tip discharge. Energy Conversion & Management (Oct.), 293.

Xiao, J., and Guo, F. (2019). Research on network data security storage optimization management. DEStech Transactions on Computer Science and Engineering.

Zhong, C., Wu, P., Zhang, Q., and Ma, Z. (2023). Online prediction of network-level public transport demand based on principle component analysis. Communications in Transportation Research, 3, null-null.

Bu, S. J., and Cho, S. B. (2019). A convolutional neural-based learning classifier system for detecting database intrusion via insider attack. Information Sciences, 512.

Alcántara Antonio, and Ruiz Carlos. A neural network-based distributional constraint learning methodology for mixed-integer stochastic optimization. Expert Systems With Applications 232.(2023):

Laverdiere, M. A., and Merlo, E. (2018). Detection of protection-impacting changes during software evolution. IEEE International Conference on Software Analysis (pp.434-444). IEEE Computer Society.

Aftab, M. U., Oluwasanmi, A., Alharbi, A., Sohaib, O., Nie, X., and Qin, Z., et al. (2021). Secure and dynamic access control for the internet of things (IoT) based traffic system. PeerJ Computer Science.

Al-Lail, M. (2021). Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. SACMAT ’21: The 26th ACM Symposium on Access Control Models and Technologies. ACM.

Jiang, R., Xin, Y., Cheng, H., and Wu, W. (2021). T-rbac model based on two-dimensional dynamic trust evaluation under medical big data. Wireless Communications and Mobile Computing.

Sasikumar, R., Priya, S. D., Swathi, M., Aarthirai, P., Madhumitha, S., and Poornima, G. (2021). Invalidating malicious users by identification of medium access control address using efficient traitor tracing and revocation. Journal of computational and theoretical nanoscience (3), 18.

Mitra, B., and Harika, B. (2019). Enhancing user access information with spatial data. Journal of Information & Optimization Sciences, 40(2), 203–217.

Zhao Zheng, Zheng Kuan, Xing Yong and Yu Jinpu. (2023). Optimal planning of distributed generation and energy storage systems in DC distribution networks with application of category-based multi-objective algorithm. Energy Reports (S11), 529–534.

Yaira K. Rivera Sánchez, Demurjian, S.A., and Baihan, M.S. (2019). A service-based RBAC & MAC approach incorporated into the FHIR standard. Digital Communications and Networks, 5(4), 214–225.

Shin, W., Lee, J. G., Kook, H., Kim, and Sakurai, K. (2019). Letter special section on cryptography and information security procedural constraints in the extended RBAC and the coloured petri net modeling.

Zhang, J. (2023). Analysis of Security Access Control Systems in Fog Computing Environment. Journal of Cyber Security and Mobility, 12(05), 653–674.

Rao, X., and Yan, X. (2022). Particle swarm optimization algorithm based on information sharing in industry 4.0. Wireless Communications and Mobile Computing.

Feng, X. (2021). Optimization of Property Information Management Model Based on Cloud Computing in Big Data Era. IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference. IEEE.

Zhang, W., Yu, C., and Zhong, R. Y. (2023). Stability measure for prefab balancing in prefabrication construction supply chain management. Computers & Industrial Engineering, 183.

Sun, W. (2022). Constrained role-engineering optimization using boolean matrix decomposition and integer linear programming techniques. International journal of innovative computing, information and control.

Zhiyu Zhao, Keyou Wang, Guojie Li, Xiuchen Jiang and Xingang Wang. (2019). Economic dispatch of distribution network with inn for electric vehicles and photovoltaic. The Journal of Engineering (16), 2864–2868.

Kumar, N., Kasbekar, G. S. and Xue, Y. (2023). Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. Journal of Cyber Security and Mobility, 12(05), 697–710.

Kumar, N., Kasbekar, G. S. and Manjunath, D. (2022). Application of data collected by endpoint detection and response systems for implementation of a network security system based on zero trust principles and the eigentrust algorithm.

Cao, X., and Ye, J. (2022). Role Access Control Search Scheme Based on Attribute Encryption. International Conference on Innovative Computing. Springer, Singapore.

Saman Nikkhah, Abbas Rabiee, Seyed Masoud Mohseni-Bonab and Innocent Kamwa. (2020). Risk averse energy management strategy in the presence of distributed energy resources considering distribution network reconfiguration: an information gap decision theory approach. IET Renewable Power Generation (2), 305–312.

Mokhtari, J. E., Kalam, A. A. E., Benhaddou, S., and Leroy, J. P. (2021). Coupling of inference and access controls to ensure privacy protection. International Journal of Safety and Security Engineering: An interdisciplinary journal for research and applications (5), 11.

Quimatio, B. M. A., and Fidèle Tsognong. (2021). Horbac optimization based on comparative behavior detection using information theory. SN Computer Science, 2 (2).

Zhu, L., He, P., Hei, X., Yao, Y., and Pan, L. (2020). Combined access control model embedding configurable policy for fine-grained data security. Microprocessors and Microsystems, 75, 103060.

Zhou, X., and He, J. (2023). Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model. Journal of Cyber Security and Mobility, 12(05), 757–784.

Downloads

Published

2024-09-03

How to Cite

1.
Zheng L, Xi F, Lei H, Dan J, Shuang R, Lei L. Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on RBAC and Development of Visual Operation and Maintenance Platform. JCSANDM [Internet]. 2024 Sep. 3 [cited 2024 Nov. 18];13(05):1061-84. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/25665

Issue

Section

Cyber Security Issues and Solutions