虚拟电厂(virtual power plants,VPP)可为电网运行提供容量可观的备用资源。准确评估和量化VPP的备用是VPP参与电网调控的关键。然而,分布式新能源出力、负荷用电、电价等具有较强的不确定性,可能导致传统基于确定性方法的备用评估结果...虚拟电厂(virtual power plants,VPP)可为电网运行提供容量可观的备用资源。准确评估和量化VPP的备用是VPP参与电网调控的关键。然而,分布式新能源出力、负荷用电、电价等具有较强的不确定性,可能导致传统基于确定性方法的备用评估结果不可靠。为此,结合VPP的特征,提出了考虑多重不确定性的可信备用定义及评估方法。首先,给出了VPP架构和可信备用定义。然后,构建了考虑各类资源聚合的VPP提供备用的模型。通过蒙特卡洛模拟各类不确定因素,利用核密度估计法确定具有不同置信度的可信备用集合,有效量化了VPP的可信备用。最后,以典型VPP为例进行仿真,验证了所提方法能够有效地刻画多重不确定性条件下VPP所能提供备用的概率特性,能够为调度机构提供更全面可靠的备用信息。展开更多
Virtual trusted platform module (vTPM) is an impor- tant part in building trusted cloud environment. Aiming at the remediation of lack of effective security assurances of vTPM in- stances in the existing virtual TPM...Virtual trusted platform module (vTPM) is an impor- tant part in building trusted cloud environment. Aiming at the remediation of lack of effective security assurances of vTPM in- stances in the existing virtual TPM architecture, this paper pre- sents a security-improved scheme for virtual TPM based on ker- nel-based virtual machine (KVM). By realizing the TPM2.0 speci- fication in hardware and software, we add protection for vTPM's secrets using the asymmetric encryption algorithm of TPM. This scheme supports the safety migration of a TPM key during VM-vTPM migration and the security association for different virtual machines (VMs) with vTPM instances. We implement a virtual trusted platform with higher security based on KVM virtual infrastructure. The experiments show that the proposed scheme can enhance the security of virtual trusted platform and has fewer additional performance loss for the VM migration with vTPM.展开更多
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM...With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.展开更多
文摘虚拟电厂(virtual power plants,VPP)可为电网运行提供容量可观的备用资源。准确评估和量化VPP的备用是VPP参与电网调控的关键。然而,分布式新能源出力、负荷用电、电价等具有较强的不确定性,可能导致传统基于确定性方法的备用评估结果不可靠。为此,结合VPP的特征,提出了考虑多重不确定性的可信备用定义及评估方法。首先,给出了VPP架构和可信备用定义。然后,构建了考虑各类资源聚合的VPP提供备用的模型。通过蒙特卡洛模拟各类不确定因素,利用核密度估计法确定具有不同置信度的可信备用集合,有效量化了VPP的可信备用。最后,以典型VPP为例进行仿真,验证了所提方法能够有效地刻画多重不确定性条件下VPP所能提供备用的概率特性,能够为调度机构提供更全面可靠的备用信息。
基金Supported by the National Basic Research Program of China(973 Program)(2014CB340600)the National High Technology Research and Development Program of China(863 Program)(2015AA016002)the National Natural Science Foundation of China(61173138,61272452,61332018)
文摘Virtual trusted platform module (vTPM) is an impor- tant part in building trusted cloud environment. Aiming at the remediation of lack of effective security assurances of vTPM in- stances in the existing virtual TPM architecture, this paper pre- sents a security-improved scheme for virtual TPM based on ker- nel-based virtual machine (KVM). By realizing the TPM2.0 speci- fication in hardware and software, we add protection for vTPM's secrets using the asymmetric encryption algorithm of TPM. This scheme supports the safety migration of a TPM key during VM-vTPM migration and the security association for different virtual machines (VMs) with vTPM instances. We implement a virtual trusted platform with higher security based on KVM virtual infrastructure. The experiments show that the proposed scheme can enhance the security of virtual trusted platform and has fewer additional performance loss for the VM migration with vTPM.
基金Supported by the National Program on Key Basic Re-search Project of China (G1999035801)
文摘With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.