Paper
20 October 2023 Application of cloud computing in the construction of power network security immune system
Author Affiliations +
Proceedings Volume 12814, Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023); 1281415 (2023) https://doi.org/10.1117/12.3010347
Event: Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023), 2023, Chongqing, China
Abstract
With the increasing number of power grid information systems and the deepening requirements for information intensification, the concept of cloud computing has entered the sight of power grid enterprises. This paper discusses the application of cloud computing in power grid enterprises from the aspects of the concept, service level and core technology of cloud computing. This paper holds that the introduction of cloud computing into power network and the construction of power network security immune system cloud can provide effective support for the development of power network. Based on the characteristics of power network and relying on a new storage and calculation mode of cloud computing technology, this paper expounds how cloud computing technology provides technical support for data storage and analysis of power network, and analyzes the benefits brought by cloud computing technology to power network. The possible security threats of power network cloud and the corresponding preventive measures are discussed.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Meng Xu, Shenghan Liu, and Xuewu Li "Application of cloud computing in the construction of power network security immune system", Proc. SPIE 12814, Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023), 1281415 (20 October 2023); https://doi.org/10.1117/12.3010347
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Cloud computing

Computing systems

Computer security

Network security

Data storage

Power grids

Information security

Back to Top