Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network

Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network

Ying Zhang
Copyright: © 2022 |Pages: 11
DOI: 10.4018/IJDST.308003
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In order to solve the requirements of scheduling automation system for access control and the defects of access control model, an automatic access control model of power information system based on intelligent semantic network was designed. The overall structure of access control model of power information system is given. The detector is designed by artificial intelligence technology, combining artificial neural network and artificial immune algorithm, which provides the basis for checking access request module. By checking the access request module to find out whether there is a detector matching the access request, to judge whether the access request is legitimate. The verification results show that, the model can effectively support the access and modification of legitimate users and prevent the access of illegal users with high control precision.
Article Preview
Top

Introduction

As the Internet further strengthens its distributed computing characteristics, the degree of information exchange and collaboration among various systems is also strengthened, and a multi-domain environment is gradually formed(Zhang, X.,2021). In the power information system, the data exchange between various business systems becomes more and more frequent, which constitutes a typical multi-domain environment, but it also brings great security risks, especially access control issues, there are not only a large number of hacker attacks on the public network, but also computer crimes by internal users, such as illegal or unauthorized use of some services(Sizov, V. A., 2020). As the multi-domain environment is more complex than the traditional single-domain environment, the number of users and the source are larger, and the security design of different domains is also different, in this case, how to ensure that only authorized users have access to the corresponding services has become an urgent problem(Wang, X., 2020). As an important economic lifeline in China, electric power enterprises are an indispensable part of the national economy and people's daily life(Hu, C., 2019). With the popularization of the application of computer, remote operation and remote communication in power system, the level of dispatch automation in power system has been greatly improved. However, the openness of the network makes the power system has more and more security risks, therefore, it is necessary to be vigilant and strengthen the security mechanism to prevent the illegal leakage, modification and destruction of sensitive internal information(Suijia,2019).

Access control model based on intelligent semantic network is a hot topic in the field of access control and with obvious advantages over other access control models, but there are still some shortcomings in applying it directly to power dispatching automation system. For example: The authorization for the RBAC model is based on user identity only, If an illegal user logs into the system by posing as a legal user, Get all the permissions owned by the legal user, And as long as the user gets a role, All the permissions assigned to the role can be used indefinitely, This is prone to abuse of authority, Does not conform to the principle of minimum authority; In the power dispatching automation system, The ents are varied and vary frequently, While the RBAC model is authorized for an individual object, This makes the allocation of permissions and roles complex and detrimental to management; When the role inherits, The user who inherits the role is also the inherited ones, If the role changes, It is not easy to manage the user rights. Power information system is composed by many complex subsystems in heterogeneous environment, and complex communication between different subsystems improves the difficulty of access control to external users.

Based on the above analysis, an access control model of power information system based on artificial intelligence technology is designed. The detector adopts artificial intelligence technology, combines artificial neural network and artificial immune algorithm to design, and provides basis for detecting access request module.

  • 1.

    Introduction. First introduced the topic background and research significance of this topic, then analyzed the research status of identity authentication and access control in scheduling automation system, and finally introduced the research content and organizational form of this paper.

    • 2.The security technology related to the scheduling automation system is introduced, and the existing identity authentication technology and access control technology are introduced in detail.

      • 3.

        We analyze the problems of identity authentication in the scheduling automation system, give a two-way identity authentication model, explain the authentication process of this model in detail, and finally analyze the safety personality and effectiveness of the model.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing