Research on Dynamic Data Security Protection Model Based on Petri Nets

被引:0
|
作者
Yang, Yang [1 ,2 ]
Sun, Lei [1 ,2 ]
Zhang, Chongchao [1 ,2 ]
Ma, Jing [1 ,2 ]
Gao, Xianzhou [3 ,4 ]
Lu, Ning [5 ]
Gao, Dongying [6 ,7 ]
机构
[1] State Grid Informat & Telecommun Co Ltd, Beijing, Peoples R China
[2] State Grid Cyber Secur Technol Beijing Co Ltd, Beijing, Peoples R China
[3] State Grid Smart Grid Res Inst Co Ltd, Beijing, Peoples R China
[4] State Grid Lab Power Cyber Secur Protect & Monito, Nanjing, Peoples R China
[5] State Grid Hebei Elect Power Co Ltd, Shijiazhuang, Hebei, Peoples R China
[6] State Grid Fujian Elect Power Co Ltd, Fuzhou, Peoples R China
[7] State Grid Fujian Informat & Telecommun Co, Fuzhou, Peoples R China
关键词
Petri nets; data categorization and classification; data security protection; PDRR model;
D O I
10.1145/3662739.3670857
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapidly developing information technology, however, data has become an indispensable and important resource in modern society. However, the growing number of security threats, such as data leakage and illegal access, has brought great challenges to the data security of enterprises and organisations. Therefore, this study is designed to propose an efficient and accurate data classification and grading method, and to design data security protection strategies in conjunction with the information assurance model in order to cope with the current complex and changing data security environment. Firstly, Petri net is adopted as a modelling tool to describe the process of data generation, transmission, storage and processing by defining repositories and variations, so as to achieve the classification and grading of data. Subsequently, a comprehensive data security protection framework is constructed by combining the PDRR (Prevention, Detection, Response, Recovery) model with targeted protection strategies for different levels of data, and customised protection mechanisms are provided for all levels of data. This study provides new ideas and methods for data security management, which can help enterprises and organisations to better address data security challenges and ensure data integrity, availability and confidentiality.
引用
收藏
页码:155 / 161
页数:7
相关论文
共 50 条
  • [11] Research on workflow patterns based on Petri nets
    Zhang, Liang
    2006 IEEE Conference on Robotics, Automation and Mechatronics, Vols 1 and 2, 2006, : 163 - 168
  • [12] Research of coordination mechanisms based on Petri Nets
    Hong, Liu
    Zhang, Zhen-Wen
    Chen, Chen
    Chen, Xue-Guang
    Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology, 2008, 30 (11): : 150 - 153
  • [13] Model checking Petri nets with names using data-centric dynamic systems
    Montali, Marco
    Rivkin, Andrey
    FORMAL ASPECTS OF COMPUTING, 2016, 28 (04) : 615 - 641
  • [14] Dynamic scheduling in flexible assembly system based on timed Petri nets model
    Zhang, WJ
    Freiheit, T
    Yang, HS
    ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING, 2005, 21 (06) : 550 - 558
  • [15] Formal security model research based on petri-net
    Liu, MX
    Yu, DM
    Zhang, QY
    Zhao, H
    2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 575 - 578
  • [16] Conceptual data modeling based on Petri nets
    Hirota, T
    Kumagai, S
    Kawabata, R
    Itoh, K
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2004, 108 : 7 - 14
  • [17] RESEARCH OF PROBABILITY PETRI NETS MODEL FOR FAULT DIAGNOSIS BASED ON BAYESIAN THEOREM
    Zhao, Xi-Lin
    Zhou, Jian-Zhong
    Fu, Bo
    Liu, Hui
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 6253 - +
  • [18] Research and Application of Time Workflow Model Based on Timing Constraint Petri Nets
    Pang, Hui
    Fang, Zong-de
    Li, Hong-yan
    Yang, Xiao-hui
    CEIS 2011, 2011, 15
  • [19] Research on E-leaming Behavior Model Based on Petri Nets and XML
    Peng Wenhui
    Wen Yi
    Zhang Juan
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 396 - 399
  • [20] Colored Petri Nets Based Modeling of Information Flow Security
    Wu, Ruoyu
    Li, Weiguo
    Huang, He
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 681 - 684