Computer and Modernization

Previous Articles     Next Articles

RBAC-based Security Access Scheme for Demand Response

  

  1. (1. School of Electronic Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China; 2. Beijing GuoDianTong Network Technology Co., Ltd., Beijing 100070, China; 3. Information and Telecommunication Branch, State Grid Zhejiang Electric Power Company, Hangzhou 310007, China; 4. Information and Telecommunication Branch, State Grid Gansu Electric Power Company, Lanzhou 730050, China)
  • Received:2015-11-06 Online:2016-03-17 Published:2016-03-17

Abstract: This paper studies role-based security access scheme for demand response. One time password (OTP) -based security authentication towards the participators is utilized after the access request. The security data of network devices is collected by active or passive data acquisition techniques. Security data are correlationally analyzed with historical data and role information. The participators will be granted roles and permission for the system and data resource according to the data analysis result. Comparisons and evaluation show the scheme enhances the security and flexibility at the price of additional overhead.

Key words: demand response, security access, RBAC

CLC Number: