Method and device for evaluating power one-network-through multi-state data sharing risk

文档序号:8969 发布日期:2021-09-17 浏览:41次 中文

1. A method for evaluating the sharing risk of the polymorphic data of the power 'one-network-through' is characterized by comprising the following steps:

according to the service scene and the service mode of the power one-network-through handling, risk factors in the power one-network-through handling multi-state data sharing service are identified;

constructing a power one-network-through multi-state data sharing risk measurement system, and carrying out quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;

and performing power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result.

2. The method of claim 1, wherein identifying risk factors in the power one-net-through polymorphic data sharing service according to the power one-net-through service scenario and the service mode comprises:

determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';

and (3) discovering risk sources in the 'one-network-through' polymorphic data sharing link of the electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.

3. The method according to claim 2, wherein the service forms of the electric power one-network-through multi-state data sharing comprise an electric power system operation service, an electric power transaction service and an electric power system planning service;

risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business;

the risk classification list comprises data loss risks, data leakage risks and data tampering risks.

4. The method according to claim 3, wherein the risk of data loss refers to that the polymorphic data of the power 'one-network-through' is not completely transmitted from an upstream provider of the data to a downstream user of the data due to equipment failure in a sharing link, and the risk is originated from the links of uploading, storing and consuming the data, so that business decisions of the downstream user of the data cannot be normally performed;

the data leakage risk refers to that the electric power one-network-through multi-state data is stolen by a third-party data main body except a data upstream provider and an authorized downstream user in a sharing link, the risk comes from the links of data storage and consumption, the unauthorized third-party data main body obtains corresponding data, the data safety is damaged, and the privacy and fairness of the electric power one-network-through multi-state data sharing are damaged;

the data tampering risk refers to that the polymorphic data of the power 'one-network-through' are maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, the data tampering risk possibly occurs in the processes of data generation, uploading, storage and consumption, the correctness of the polymorphic data sharing is influenced by the tampering of the power data, and the normal operation of a power system is damaged.

5. The method according to claim 1, wherein the constructing the electric power one-network-through polymorphic data sharing risk measurement system, and performing quantitative analysis on risk factors in the electric power one-network-through polymorphic data sharing service to obtain a risk factor measurement result in the electric power one-network-through polymorphic data sharing service comprises:

acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;

and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.

6. The method of claim 5, wherein the data sharing risk metric function is:

wherein the content of the first and second substances,for data sharing linksjIn, sharing risksiThe probability of occurrence;for data sharing linksjIn, sharing risksiThe degree of severity of the resulting outcome;for data sharing linksjIn, risk of data sharingiThe result of the risk metric of (a);

7. the method of claim 6, wherein the probability of occurrence of the risk of data loss is determined by evaluating:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields lost in the data sharing link j in the kth data sharing;

the occurrence probability of the data leakage risk is determined by the following evaluation:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,the number of fields revealed by a data sharing link j in the kth data sharing is represented;

the probability of occurrence of the risk of data tampering is determined by evaluating:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning discrete data sharing in a historical data statistics period;initiating a service set for operation and/or transaction and/or planning continuous data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields tampered in the data sharing link j in the kth data sharing;a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,is a matrix of valuesA p-th row and a q-th column;representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,is a matrix of valuesThe p-th row and the q-th column.

8. The method of claim 6, wherein the data sharing risk metric function is characterized in that the losses caused by data leakage risk, data loss risk and data tampering risk are evaluated by expert experience.

9. The method as claimed in claim 1, wherein performing the power one-net-work polymorphic data sharing risk assessment according to the risk factor measurement result in the power one-net-work polymorphic data sharing service to obtain a power one-net-work polymorphic data sharing risk assessment result, comprises:

normalizing the risk factor measurement result in the power one-network-through multi-state data sharing service;

and establishing a variable-angle radar chart-based power one-network-through business polymorphic data sharing risk visual comprehensive evaluation model according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk evaluation result.

10. The method of claim 9, wherein normalizing the risk factor measurement results in the power one-network-through polymorphic data sharing service comprises:

normalizing the risk factor measurement result in the power 'one-network-through' multi-state data sharing service according to the following formula:

wherein the content of the first and second substances,andrespectively representing the lower limit and the upper limit of the measurement result of the shared risk i in the data sharing link j,and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.

11. The method of claim 10, wherein the weight of the risk factor measurement result in the power one-net-through polymorphic data sharing service is determined by calculating according to the following formula:

wherein the content of the first and second substances,expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,and measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.

12. The method as claimed in claim 11, wherein the step of establishing a visual comprehensive assessment model of the polymorphic data sharing risk of the power one-network-through business based on the variable-angle radar chart according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain the power one-network-through business polymorphic data sharing risk assessment result comprises:

making a unit circle;

3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc of the ith x j fan-shaped area satisfiesEach region representing an evaluation index(ii) a The intersection point of the unit circle and each ray is

Taking the angular bisector of the fan-shaped ij as an evaluation indexCoordinate axes of (1), vertices thereof、……Represents;

in evaluating the indexOn the coordinate axis ofFor recording the length as the index value scale, use、……Represents;

at the center of a circle O, pointAnd withThe adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding indexContribution to the comprehensive evaluation result;

the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:

wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;representing a theoretical optimum value;as the center of a circle O, pointAnd withQuadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axisThe length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.

13. An assessment device for power 'one-network-through' polymorphic data sharing risk is characterized by comprising:

the risk identification unit is used for identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scene and the electric power one-network-through service mode;

the risk measurement unit is used for constructing a power one-network-through multi-state data sharing risk measurement system, and quantitatively analyzing risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;

and the risk evaluation unit is used for carrying out the risk evaluation of the electric power one-network-through multi-state data sharing according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service.

Background

The 'one-network communication' polymorphic data sharing of electric power refers to the establishment of a digital mutual trust and cross-domain sharing mechanism, breaks through data barriers, and realizes cross-regional, cross-unit and cross-level interconnection and intercommunication of government affair data and electric power data. The 'one-network-through' multi-state data sharing of the electric power is beneficial to improving convenience and instantaneity of data transfer of electric power business on one hand, improving business handling efficiency for customers and reducing business handling cost on the other hand, and meanwhile, an important foundation is laid for deeply mining application value of electric power big data and establishing an electric power data sharing center.

The electric power one-network-connection-oriented polymorphic data sharing relates to data production, circulation and consumption of cross-business, cross-region, cross-unit and cross-level, which also causes polymorphic data sharing risks, and a sharing risk assessment method facing the electric power one-network-connection-oriented polymorphic data is lacking at present.

Disclosure of Invention

Based on the technical current situation, the application provides an evaluation method and device for the sharing risk of the multi-state data of the power 'one-network-through' which can be used for evaluating the sharing risk of the multi-state data of the power 'one-network-through'.

In order to achieve the above purpose, the present application proposes the following technical solutions:

a method for evaluating the sharing risk of the polymorphic data of one-network communication of electric power comprises the following steps:

according to the service scene and the service mode of the power one-network-through handling, risk factors in the power one-network-through handling multi-state data sharing service are identified;

constructing a power one-network-through multi-state data sharing risk measurement system, and carrying out quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;

and performing power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result.

Optionally, the identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scenario and the electric power one-network-through service mode includes:

determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';

and (3) discovering risk sources in the 'one-network-through' polymorphic data sharing link of the electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.

Optionally, the service form of the electric power one-network-through multi-state data sharing includes an electric power system operation service, an electric power transaction service, and an electric power system planning service;

risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business;

the risk classification list comprises data loss risks, data leakage risks and data tampering risks.

Optionally, the risk of data loss refers to that the polymorphic data "one-network-through" is not completely transmitted from an upstream provider of the data to a downstream user of the data due to an equipment failure in a sharing link, and the risk is originated from the links of uploading, storing and consuming the data, which results in that a business decision of the downstream user of the data cannot be normally performed;

the data leakage risk refers to that the electric power one-network-through multi-state data is stolen by a third-party data main body except a data upstream provider and an authorized downstream user in a sharing link, the risk comes from the links of data storage and consumption, the unauthorized third-party data main body obtains corresponding data, the data safety is damaged, and the privacy and fairness of the electric power one-network-through multi-state data sharing are damaged;

the data tampering risk refers to that the polymorphic data of the power 'one-network-through' are maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, the data tampering risk possibly occurs in the processes of data generation, uploading, storage and consumption, the correctness of the polymorphic data sharing is influenced by the tampering of the power data, and the normal operation of a power system is damaged.

Optionally, the constructing a power one-network-through multi-state data sharing risk measurement system, and performing quantitative analysis on risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service includes:

acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;

and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.

Optionally, the data sharing risk metric function is:

wherein the content of the first and second substances,for data sharing linksjIn, sharing risksiThe probability of occurrence;for data sharing linksjIn, sharing risksiThe degree of severity of the resulting outcome;for data sharing linksjIn, risk of data sharingiThe result of the risk metric of (a);

optionally, the probability of occurrence of the risk of data loss is determined by the following evaluation:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields lost in the data sharing link j in the kth data sharing;

the occurrence probability of the data leakage risk is determined by the following evaluation:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,the number of fields revealed by a data sharing link j in the kth data sharing is represented;

the probability of occurrence of the risk of data tampering is determined by evaluating:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning discrete data sharing in a historical data statistics period;initiating a service set for operation and/or transaction and/or planning continuous data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields tampered in the data sharing link j in the kth data sharing;a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,is a matrix of valuesA p-th row and a q-th column;representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,is a matrix of valuesThe p-th row and the q-th column.

Optionally, in the data sharing risk measurement function, the loss caused by the risk of data leakage, the risk of data loss, and the risk of data tampering is obtained through expert experience evaluation.

Optionally, the performing the electric power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service to obtain an electric power one-network-through multi-state data sharing risk assessment result includes:

normalizing the risk factor measurement result in the power one-network-through multi-state data sharing service;

and establishing a variable-angle radar chart-based power one-network-through business polymorphic data sharing risk visual comprehensive evaluation model according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk evaluation result.

Optionally, the normalizing process is performed on the risk factor measurement result in the power "one-network-through" multi-state data sharing service, and includes:

normalizing the risk factor measurement result in the power 'one-network-through' multi-state data sharing service according to the following formula:

wherein the content of the first and second substances,andrespectively representing the lower limit and the upper limit of the measurement result of the shared risk i in the data sharing link j,and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.

Optionally, the weight of the risk factor measurement result in the power "one-network-through" polymorphic data sharing service is determined by calculation according to the following formula:

wherein the content of the first and second substances,expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,and measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.

Optionally, the method for obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result includes the steps of establishing a power "one-network-through office" business polymorphic data sharing risk visual comprehensive evaluation model based on the variable-angle radar chart according to the normalized risk factor measurement result in the power "one-network-through office" polymorphic data sharing business, and obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result:

making a unit circle;

3X 4 rays are led out from the center of the circle to divide a unit circleIs 3 x 4 sector areas, wherein the angular arc degree of the ith x j sector area satisfiesEach region representing an evaluation index(ii) a The intersection point of the unit circle and each ray is

Taking the angular bisector of the fan-shaped ij as an evaluation indexCoordinate axes of (1), vertices thereof、……Represents;

in evaluating the indexOn the coordinate axis ofFor recording the length as the index value scale, use、……Represents;

at the center of a circle O, pointAnd withThe adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding indexContribution to the comprehensive evaluation result;

the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:

wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;representing a theoretical optimum value;as the center of a circle O, pointAnd withQuadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axisThe length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.

An assessment device for power 'one-network-through' polymorphic data sharing risk comprises:

the risk identification unit is used for identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scene and the electric power one-network-through service mode;

the risk measurement unit is used for constructing a power one-network-through multi-state data sharing risk measurement system, and quantitatively analyzing risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;

and the risk evaluation unit is used for carrying out the risk evaluation of the electric power one-network-through multi-state data sharing according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service.

The method can identify risk factors in the electric power one-network-through multi-state data sharing service, measure the occurrence probability and the severity of the consequences of each risk factor, comprehensively evaluate the electric power one-network-through multi-state data sharing risk according to the quantitative result, and generate a visual evaluation result.

Drawings

In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.

Fig. 1 is a schematic flowchart of an evaluation method for electric power "one-network-through" polymorphic data sharing risk according to an embodiment of the present application;

fig. 2 is a schematic diagram illustrating a relationship among a power grid service form, a data sharing link, and a data sharing risk classification list according to an embodiment of the present application;

fig. 3 is a schematic diagram of a power "one-network-through" polymorphic data sharing risk assessment result provided in the embodiment of the present application;

fig. 4 is a schematic structural diagram of an apparatus for evaluating a risk of sharing polymorphic data in power "one-network-through".

Detailed Description

The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

The embodiment of the application provides an evaluation method for the electric power one-network-through multi-state data sharing risk, the method can identify risk factors in the electric power one-network-through multi-state data sharing service, measure the occurrence probability and the resulting severity of each risk factor, comprehensively evaluate the electric power one-network-through multi-state data sharing risk according to the quantitative result, and generate a visual evaluation result.

Referring to fig. 1, the method includes:

s1, identifying risk factors in the electric power one-network-connection-handling multi-state data sharing service according to the electric power one-network-connection-handling service scene and the service mode;

s2, constructing a power one-network-through multi-state data sharing risk measurement system, and analyzing risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;

and S3, performing power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the power one-network-through multi-state data sharing service to obtain a power one-network-through multi-state data sharing risk assessment result.

Specifically, step S1 specifically includes:

s1.1, determining a data source shared by the multi-state data of the power one-network communication according to the service form of the multi-state data of the power one-network communication.

The service form of the electric power one-network-through multi-state data sharing comprises an electric power system operation service, an electric power transaction service and an electric power system planning service.

S1.2, discovering risk sources in the link of 'one-network-through' multi-state data sharing of electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.

The risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business.

The risk classification list comprises data loss risks, data leakage risks and data tampering risks.

The risk of data loss refers to that the polymorphic data of the power 'one-network-through' cannot be completely transmitted to a downstream user of the data from an upstream provider of the data due to equipment failure in a sharing link, and the risk is mainly derived from the links of uploading, storing and consuming the data, so that the business decision of the downstream user of the data cannot be normally carried out;

the data leakage risk refers to that the electric power 'one-network-through' polymorphic data is stolen by a third party data main body except a data upstream provider and an authorized downstream user in a sharing link, and the risk is mainly derived from the links of data storage and consumption. Corresponding data are obtained by a third-party data main body which causes unauthorized data, so that data safety is damaged, and privacy and fairness of power 'one-network-through' polymorphic data sharing are damaged;

the data tampering risk refers to that the electric power 'one-network-through' polymorphic data is maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, and the data tampering risk may occur in the processes of generation, uploading, storage and consumption of the data. The correctness of multi-state data sharing is influenced by the tampering of the electric power data, and the normal operation of an electric power system is damaged.

The relationship among the power grid service form, the data sharing link, and the data sharing risk classification list may be specifically shown in fig. 2.

Step S2 specifically includes:

s2.1, acquiring historical data of risk factors in the power one-network-through multi-state data sharing service.

S2.2, establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.

Specifically, the data sharing risk metric function is:

wherein the content of the first and second substances,the probability of occurrence of the sharing risk i in the data sharing link j is shown;the severity degree of the consequences caused by the sharing risk i in the data sharing link j (namely, the loss caused by the occurrence of the data sharing risk i);a risk measurement result of a data sharing risk i in a data sharing link j;

the probability of occurrence of risk of data loss can be estimated from historical data by the following equation:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields lost in the data sharing link j in the kth data sharing;

the probability of occurrence of the data leakage risk can be determined from the historical data by evaluating the following formula:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,the number of fields revealed by a data sharing link j in the kth data sharing is represented;

the probability of occurrence of the risk of data tampering can be determined from the historical data by evaluating:

wherein the content of the first and second substances,a service set shared by operation and/or transaction initiation and/or discrete data planning (such as unit operation and/or maintenance state, power transaction user registration information and the like) in a historical data statistics period;initiating operation and/or transaction and/or planning a service set shared by continuous data (such as a power generation and utilization curve, a transaction bidding function, a historical transaction condition, a load prediction curve and the like) in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields tampered in the data sharing link j in the kth data sharing;a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,is a matrix of valuesThe numerical value elements of the p-th row and the q-th column in the middle are taken as an example of a power generation curve data matrix,representing the electricity generation and consumption amount of the kth user p in the q-th time period after the sharing link j is tampered;representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,is a matrix of valuesThe p-th row and the q-th column.

In the data sharing risk measurement function, losses caused by data leakage risks, data loss risks and data tampering risks are obtained through expert experience assessment.

Step S3 specifically includes:

s3.1, normalizing risk factor measurement results in the power one-network-through multi-state data sharing service;

specifically, the risk factor measurement result in the power one-network-through multi-state data sharing service is normalized according to the following formula:

wherein, the first and second guide rollers are arranged in a row,andrespectively representing the upper and lower limits of the measurement result of the shared risk i in the data sharing link j, wherein,the lower limit is the lower limit of the total weight,is the upper limit;and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.

The weight of the risk factor measurement result in the power 'one-network-through' polymorphic data sharing service is determined by calculation according to the following formula:

wherein the content of the first and second substances,expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,and measuring the weight of the result for the finally determined risk factors in the power 'one-network-through' polymorphic data sharing service.

And S3.2, establishing a visual comprehensive evaluation model of the polymorphic data sharing risk of the electric power one-network-through business based on the variable-angle radar chart according to the normalized risk factor measurement result in the electric power one-network-through business polymorphic data sharing business, and obtaining an electric power one-network-through business polymorphic data sharing risk evaluation result.

Specifically, according to the following processing steps, a variable-angle radar chart-based visual comprehensive evaluation model for the polymorphic data sharing risk of the power one-network-through business is established according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business, so that a power one-network-through business polymorphic data sharing risk evaluation result is obtained:

(1) making a unit circle;

(2) 3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc of the ith x j fan-shaped area satisfiesEach region representing an evaluation index(ii) a The intersection point of the unit circle and each ray is

(3) Taking the angular bisector of the fan-shaped ij as an evaluation indexCoordinate axes of (1), vertices thereof、……Represents;

(4) in evaluating the indexOn the coordinate axis ofFor recording the length as the index value scale, use、……Represents;

(5) at the center of a circle O, pointAnd withThe adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding indexContribution to the comprehensive evaluation result;

(6) the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:

wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;representing a theoretical optimum value;as the center of a circle O, pointAnd withAdjacent 2 crossoversThe quadrangle obtained by taking the point as the vertex is vertical to the coordinate axis of the indexThe length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.

Specifically, the comprehensive evaluation result of the risk of polymorphic data loss can be obtained by the following formula:

wherein the content of the first and second substances,representing the comprehensive evaluation quantitative area of the risk of polymorphic data loss;expressing the theoretical optimal value, namely the area of a unit circle data loss risk sector area;the comprehensive evaluation result of the risk of the polymorphic data loss is shown and expressed in percentage.

The method for obtaining the comprehensive evaluation result of the data leakage risk and the data tampering risk is similar to the method, and is not described in detail.

The finally obtained power "one-network-through-the-office" polymorphic data sharing risk assessment result is shown in fig. 3.

Another embodiment of the present application further provides an apparatus for evaluating a risk of sharing polymorphic data in a power "one-network-through", which is shown in fig. 4, and includes:

the risk identification unit 100 is configured to identify risk factors in the power one-network-through multi-state data sharing service according to the power one-network-through service scenario and the service mode;

the risk measurement unit 110 is configured to construct an electric power one-network-through multi-state data sharing risk measurement system, and analyze risk factors in the electric power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the electric power one-network-through multi-state data sharing service; the measurement result comprises occurrence probability and severity of the generated result;

and the risk evaluation unit 120 is configured to perform the risk evaluation on the sharing of the power one-network-through polymorphic data according to the risk factor measurement result in the power one-network-through polymorphic data sharing service.

Optionally, the identifying risk factors in the electric power one-network-through multi-state data sharing service according to the electric power one-network-through service scenario and the electric power one-network-through service mode includes:

determining a data source shared by the polymorphic data of the power 'one-network-through' according to the service form shared by the polymorphic data of the power 'one-network-through';

and (3) discovering risk sources in the 'one-network-through' polymorphic data sharing link of the electric power, analyzing risk factors influencing normal operation of data sharing, and generating a risk classification list.

Optionally, the service form of the electric power one-network-through multi-state data sharing includes an electric power system operation service, an electric power transaction service, and an electric power system planning service;

risk sources in the electric power one-network-through multi-state data sharing link comprise business data generation, uploading, storage and consumption links in electric power system operation, transaction and planning business;

the risk classification list comprises data loss risks, data leakage risks and data tampering risks.

Optionally, the risk of data loss refers to that the polymorphic data "one-network-through" is not completely transmitted from an upstream provider of the data to a downstream user of the data due to an equipment failure in a sharing link, and the risk is mainly derived from the links of uploading, storing and consuming the data, which causes that a business decision of the downstream user of the data cannot be normally performed;

the data leakage risk refers to that the electric power 'one-network-through' polymorphic data is stolen by a third party data main body except a data upstream provider and an authorized downstream user in a sharing link, and the risk is mainly derived from the links of data storage and consumption. Corresponding data are obtained by a third-party data main body which causes unauthorized data, so that data safety is damaged, and privacy and fairness of power 'one-network-through' polymorphic data sharing are damaged;

the data tampering risk refers to that the electric power 'one-network-through' polymorphic data is maliciously modified by a third-party data main body in a sharing link by an improper means, so that the polymorphic data cannot be correctly transmitted from an upstream provider of the data to a downstream user of the data, and the data tampering risk may occur in the processes of generation, uploading, storage and consumption of the data. The correctness of multi-state data sharing is influenced by the tampering of the electric power data, and the normal operation of an electric power system is damaged.

Optionally, the constructing a power one-network-through multi-state data sharing risk measurement system, analyzing risk factors in the power one-network-through multi-state data sharing service, and obtaining a risk factor measurement result in the power one-network-through multi-state data sharing service includes:

acquiring historical data of risk factors in a power one-network-through multi-state data sharing service;

and establishing a data sharing risk measurement function, and analyzing the occurrence probability and the severity of the consequences of each risk factor by combining historical data of the risk factors in the power one-network-through multi-state data sharing service to obtain a risk factor measurement result in the power one-network-through multi-state data sharing service.

Optionally, the data sharing risk metric function is:

wherein the content of the first and second substances,for data sharing linksjIn, sharing risksiThe probability of occurrence;for data sharing linksjIn, sharing risksiThe degree of severity of the resulting outcome;for data sharing linksjIn, risk of data sharingiThe result of the risk metric of (a);

optionally, the probability of occurrence of the risk of data loss is determined by the following evaluation:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields lost in the data sharing link j in the kth data sharing;

the occurrence probability of the data leakage risk is determined by the following evaluation:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,the number of fields revealed by a data sharing link j in the kth data sharing is represented;

the probability of occurrence of the risk of data tampering is determined by evaluating:

wherein the content of the first and second substances,initiating a service set for operation and/or transaction and/or planning discrete data sharing in a historical data statistics period;initiating a service set for operation and/or transaction and/or planning continuous data sharing in a historical data statistics period;indicates the total field number processed by the data sharing link j in the k-th data sharing,indicating the number of fields tampered in the data sharing link j in the kth data sharing;a numerical matrix after the data sharing link j is tampered in the kth data sharing is shown,is a matrix of valuesA p-th row and a q-th column;representing the original value matrix before the tampering of the data sharing link j in the kth data sharing,is a matrix of valuesThe p-th row and the q-th column.

Optionally, in the data sharing risk measurement function, the loss caused by the risk of data leakage, the risk of data loss, and the risk of data tampering is obtained through expert experience evaluation.

Optionally, the performing the electric power one-network-through multi-state data sharing risk assessment according to the risk factor measurement result in the electric power one-network-through multi-state data sharing service to obtain an electric power one-network-through multi-state data sharing risk assessment result includes:

normalizing the risk factor measurement result in the power one-network-through multi-state data sharing service;

and establishing a variable-angle radar chart-based power one-network-through business polymorphic data sharing risk visual comprehensive evaluation model according to the normalized risk factor measurement result in the power one-network-through business polymorphic data sharing business to obtain a power one-network-through business polymorphic data sharing risk evaluation result.

Optionally, the normalizing process is performed on the risk factor measurement result in the power "one-network-through" multi-state data sharing service, and includes:

normalizing the risk factor measurement result in the power 'one-network-through' multi-state data sharing service according to the following formula:

wherein the content of the first and second substances,andrespectively representing the lower limit and the upper limit of the measurement result of the shared risk i in the data sharing link j,and representing the measurement result of the shared risk i in the data sharing link j obtained after preprocessing.

Optionally, the weight of the risk factor measurement result in the power "one-network-through" polymorphic data sharing service is determined by calculation according to the following formula:

wherein the content of the first and second substances,expressing subjective weight determined by expert consultation and evaluation of shared risk i in a data sharing link j;representing the objective weight obtained by the sharing risk i through an objective weighting method in the data sharing link j,for finally determined electric power 'one network connection' multi-state dataThe risk factors in the shared business measure the weight of the result.

Optionally, the method for obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result includes the steps of establishing a power "one-network-through office" business polymorphic data sharing risk visual comprehensive evaluation model based on the variable-angle radar chart according to the normalized risk factor measurement result in the power "one-network-through office" polymorphic data sharing business, and obtaining the power "one-network-through office" polymorphic data sharing risk evaluation result:

making a unit circle;

3 x 4 rays are led out from the center of the circle, the unit circle is divided into 3 x 4 fan-shaped areas, wherein the angular arc of the ith x j fan-shaped area satisfiesEach region representing an evaluation index(ii) a The intersection point of the unit circle and each ray is

Taking the angular bisector of the fan-shaped ij as an evaluation indexCoordinate axes of (1), vertices thereof、……Represents;

in evaluating the indexOn the coordinate axis ofFor recording the length as the index value scale, use、……Represents;

at the center of a circle O, pointAnd withThe adjacent 2 intersection points are taken as vertexes to form a quadrangle, and the area of the quadrangle represents a corresponding indexContribution to the comprehensive evaluation result;

the power one-network-through polymorphic data sharing risk assessment result is calculated by the following formula:

wherein S represents the comprehensive evaluation quantitative area of the polymorphic data sharing risk;representing a theoretical optimum value;as the center of a circle O, pointAnd withQuadrangle obtained by taking adjacent 2 intersection points as vertexes is perpendicular to index coordinate axisThe length of the diagonal line of (a); and y represents the power 'one-network-through' polymorphic data sharing risk assessment result and is expressed in percentage.

Specifically, please refer to the corresponding content of the above method embodiment for the specific work content of each unit of the above evaluation apparatus for electric power "one-network-through" polymorphic data sharing risk, which is not described herein again.

While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present application is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.

It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.

The steps in the method of each embodiment of the present application may be sequentially adjusted, combined, and deleted according to actual needs, and technical features described in each embodiment may be replaced or combined.

The modules and sub-modules in the device and the terminal in the embodiments of the application can be combined, divided and deleted according to actual needs.

In the several embodiments provided in the present application, it should be understood that the disclosed terminal, apparatus and method may be implemented in other manners. For example, the above-described terminal embodiments are merely illustrative, and for example, the division of a module or a sub-module is only one logical division, and there may be other divisions when the terminal is actually implemented, for example, a plurality of sub-modules or modules may be combined or integrated into another module, or some features may be omitted or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.

The modules or sub-modules described as separate parts may or may not be physically separate, and parts that are modules or sub-modules may or may not be physical modules or sub-modules, may be located in one place, or may be distributed over a plurality of network modules or sub-modules. Some or all of the modules or sub-modules can be selected according to actual needs to achieve the purpose of the solution of the present embodiment.

In addition, each functional module or sub-module in the embodiments of the present application may be integrated into one processing module, or each module or sub-module may exist alone physically, or two or more modules or sub-modules may be integrated into one module. The integrated modules or sub-modules may be implemented in the form of hardware, or may be implemented in the form of software functional modules or sub-modules.

Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.

The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software unit executed by a processor, or in a combination of the two. The software cells may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.

Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:基于大数据分析的安全生产区域人员管理方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!