Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Big Data, 20 October 2025

Sec. Cybersecurity and Privacy

Volume 8 - 2025 | https://doi.org/10.3389/fdata.2025.1600540

Research on fault-tolerant decision algorithm for data security automation

  • 1China School of Cyberspace Security, Changzhou College of Information Technology, Changzhou, Jiangsu, China
  • 2College of Computer Science, Sichuan University, Chengdu, Sichuan, China
  • 3School of Artificial Intelligence, Leshan Vocational and Technical College, Leshan, Sichuan, China
  • 4School of Computer Science, Civil Aviation Flight University of China, Guanghan, Sichuan, China

Introduction: Traditional operation and maintenance decision algorithms often ignore the analysis of data source security, making them highly susceptible to noise, time-consuming in execution, and lacking in rationality.

Methods: In this study, we design an automated operation and maintenance decision algorithm based on data source security analysis. A multi-angle learning algorithm is adopted to establish a noise data model, introduce relaxation variables, and compare sharing factors with noise data characteristics to determine whether the data source is secure. Taking the ideal power shortage and minimum maintenance cost as the objective function, we construct a classical particle swarm optimization model and derive the expressions for particle search velocity and position. To address the problem of local optima, a niche mechanism is incorporated: the obtained automated data is treated as the population, a reasonable number of iterations is determined, individual fitness is stored, and the optimal state is obtained through a continuous iterative update strategy.

Results: Experimental results show that the proposed strategy can shorten operation and maintenance time, enhance the rationality of decision-making, improve algorithm convergence, and avoid falling into local optima.

Discussion: In addition, fault-tolerant analysis is performed on data source security, effectively eliminating bad data, preventing interference from malicious data, and further improving convergence performance.

1 Introduction

Power stations in China are large in scale, dispersed in different regions, and equipped with numerous power equipment. Therefore, how to realize rational operation and maintenance of the power system has become a prominent problem. With the development of the power grid information integration platform, information services will be fully promoted. However, due to the large number of businesses and users, combined with the emergence of new technologies such as the Internet of Things, automated operation and maintenance decision-making has become a pressing issue. At the same time, a large number of power information collection devices are connected to the power grid, generating massive volumes of power grid big data. However, some bad or false data may exist in the collected data due to malicious attacks or sensor failures. If these data are used directly in operation and maintenance decision-making, they can affect the assessment of the real state of the power grid, impact decision results, and even cause serious economic losses.

Therefore, to improve scientific decision-making, Xue et al. (2019) proposed a data-driven optimization algorithm for operation and maintenance of the power acquisition system. They analyzed the structure of the power data acquisition system and constructed an operation and maintenance scheme based on the historical database collected by the system. According to the operation and maintenance cycle of different regions and the safety requirements of the power grid, an optimization operation and maintenance model is established, and the particle swarm optimization algorithm is used to solve the model. Zhang et al. (2020) designed a power data operation analysis algorithm. The algorithm includes grid-related geographic information, service information, and distribution information. Through an improved machine learning method to analyze the correlation and risk level of power grid data, it is beneficial for the operation and maintenance decisions of the power sector. Although the above two algorithms can extract false information in power grid big data, they ignore the analysis of data source security, which leads to the algorithm being greatly affected by noise, and the application process taking a long time and being of poor rationality. In order to further improve the data security analysis, domestic and foreign experts in related fields have also put forward some good research results. Suryaprabha and Saravana Kumar (2020) take a wireless sensor network as the research environment, because a wireless sensor network can detect various types of information from the environment and deliver it to users in real time. Information is stored in the cloud and accessible to users. However, because information is part of collaborative communication and therefore vulnerable to attack, node-level building algorithms are not secure, which provides the scope for this study to focus on algorithms that can be used for denial-of-service attacks, as they minimize network performance.

In recent years, research on operational optimization and data source security has advanced considerably, yet important gaps remain. For instance, while Por et al. (2024) provide a comprehensive taxonomy of attacks and countermeasures in graphical passwords, and Gabr et al. (2024) demonstrate biologically inspired approaches to secure data modeling, these findings have not yet been systematically integrated into fault-tolerant optimization for complex infrastructures. At the same time, swarm intelligence has emerged as a promising paradigm in critical infrastructures, with Khan et al. (2025) presenting an adaptive model for distributed grid security that strengthens the theoretical foundation of swarm-based optimization methods. Moreover, Adebimpe et al. (2023) highlight recognition-based authentication strategies resistant to noise and shoulder-surfing, offering insights that can enhance anomaly detection and robust AI-driven decision-making in data source validation. In this study, scholars proposed an optimized energy-based constrained DoS (Denial of Service) detection algorithm, namely the Optimized energy-Based constrained Scheme (OBES) algorithm, used to deal with denial-of-service attacks, which learns network traffic and manages intruders to realize security analysis of wireless sensor network data sources. Wang et al. (2020) proposed that the current communication network cannot handle large-scale malicious code attacks, and the network security mechanism is weak, resulting in a serious lag in response. Therefore, they proposed a security response method for a multi-service communication network under malicious code attacks. Based on the timeliness and destructiveness of malicious code, the K-L divergence value of a Gaussian mixture distribution is obtained, and the optimal divergence solution is obtained by using an approximate calculation. The minimum distance clustering center is used to complete the malicious code clustering. The component mean is re-estimated by the maximum expectation algorithm, the cumulative value of the mean is analyzed by weighting, and the eigenvalues are extracted. Based on the risk minimization criterion of malicious code attack, the optimal classification surface function of the least square support vector machine is transformed into an optimization problem. By introducing the Lagrange operator, the equality constraint and Lagrange constraint conditions are replaced. The kernel function is created according to the quadratic programming problem solution obtained, so as to achieve the derivation of the decision function of the support vector machine. After the normalization of the security response risk level and the optimization of kernel parameters and regularization parameters, the data source security is analyzed. However, the above two data security analysis methods ignore the extraction of noisy data features, resulting in more noise in the process of data analysis, leading to a certain deviation in data security analysis results.

Based on the above research results and background content, this study combines the multi-angle learning (Hussain, 2017) method with the niche particle swarm method to realize automatic operation and maintenance decisions. Multi-angle learning is a kind of machine learning (Hawezi et al., 2022), and observations from different perspectives are usually complementary. If the data from multiple perspectives are placed in the same subspace, the shared factors existing in all perspectives can be obtained through continuous mining, and then the data source information can be traced, and the security of the data source can be judged to provide a necessary data security guarantee for operation and maintenance decisions. Through the improvement of the particle swarm optimization algorithm and the use of niche sharing theory, the diversity of population distribution can be improved to avoid local optimal decision results, which can be better applied in power grid operation and maintenance problems.

2 Multi-angle data source security analysis

Big data plays a key role in the stable operation of the power grid, but with the continuous expansion of the network scale, it also faces great difficulties, the most important of which is the challenge of data quality. Accurate estimation of power system state relies on good data security. Inaccurate or missing data will interfere with the decision-making analysis of dispatchers and even cause wrong judgments, which will bring huge losses to people's production and life.

2.1 Data source security analysis problem modeling

If it represents the observation data vectors collected by the operation and maintenance system in a certain period of time, these vectors form a matrix in a certain time series. Assuming that they are observed through various perspectives, a multi-angle sample set X = {X(1), X(2), ..., X(V)} is generated.

If a dictionary is used to represent the data source from any perspective, then write:

X(V)=A(V)Z(V)+E(V)    (1)

In the formula, Z(V) represents the coefficient matrix, and E(V) describes the noise information. Because there will be shared information in multi-angle information, the shared factors are placed together in a certain subspace. At this time, Z(V) should belong to the block matrix with low-rank features (Kong et al., 2017; Zhang and Zhou, 2019). Since Z(V) describes shared factors, different Z(V) will have certain similarities. In addition, both false data and attack data are bursty, so these data are not included in the scope of the sharing factor (Zhang, 2021; Collins et al., 2017).

Divide the observation data into two parts: sharing factor and noise data, and find out false data and attack data from the noise data. For the number of observations, the number of these unsafe data is limited, so sparsity will be reflected in the data matrix. The noise data model is constructed by the L1 norm, and the following objective equation is obtained (Li et al., 2019):

minZ(V),E(V)=V=1V(rank(Z(V))+α||E(V)||1)+βV=1Vj=V+1V||Z(V)-Z(j)||F2s.t X(V)=A(V)Z(V)+E(V),v=1,2,,V    (2)

In the formula, ||·||1 represents the L1 norm, ||·||F is the Frobenius norm, and both are balance parameters. In Formula 2, before the plus sign, it can be used for sparse detection of test data (Chen et al., 2020; Zhao et al., 2020), and after the plus sign, it can reduce the similarity of shared factors (Wu et al., 2020; Chen et al., 2019). Because it is unknown in the equation, it is initialized to make it become, then the Formula 2 is transformed into the following equivalent problem:

minZ(V),E(V)=V=1V(||Z(V)||*+α||E(V)||1)+βV=1Vj=V+1V||Z(V)-Z(j)||Fs.t X(V)=A(V)Z(V)+E(V),v=1,2,,V    (3)

In the formula, ||Z(V)||* is the nuclear norm of Z(V).

2.2 Dangerous data source detection

This article only analyzes data source security issues from two perspectives, that is, 11. Due to the low-rank constraints in 22, slack variables are added, and the optimized equivalent form of Formula 3 at 22 is obtained:

minZ(1),E(1),Z(2),E(2)=V=12(||JV||*+α||E(v)||1)+β||Z(1)-Z(2)||F2s.t X(V)=A(V)Z(V)+E(V),Z(V)=J(V),V=1,2    (4)

In the formula, J(V) represents the optimization variable, and the Formula 4 is solved by the Lagrangian method, and the following expression is obtained:

V=12J(V)=Y1(V),X(V)X(V)Z(V)E(V)                            +2/μ(Y2(V)X(V)X(V)Z(V)E(V)F2                            +Z(V)JVF2)    (5)

In the above formula, Y1(V) and Y2(V) are the data source Lagrangian multipliers under the two perspectives, μ belongs to the balance parameter (Peng et al., 2019; Ding et al., 2020). Treat the quantity other than Z(1) as a constant, calculate its partial derivative, and set the partial derivative equal to 0, then the solution to obtain Z(1) is expressed as:

Z(1)=(X(1)X(1))(X(1)(X(1)-E(1))+J(1)+Z(2)+X(1)Y1(1)-Y2(1)+βZ(2)μ)    (6)

In the same way, the solution of Z(2) is obtained. And solve EV by the following formula:

E(V)=argminE(V)V=12(α/μ||E(V)||2,1+1/2||E(V)-(X(V)-X(V)Z(V)+Y1(V)/μ)||F2)    (7)

Use Formulas 6, 7 to continuously optimize and iterate, and judge the acceptance conditions after each iteration. If convergence occurs, stop updating; otherwise, continue to iterate until the conditions are met. If the data source of the i observed value is safe, the difference Z(V) will be very similar, and the product of the difference Z(V) is larger at this time (Zhang and Ma, 2020). By obtaining the value of Zi(V) and Ei(V), it can be judged whether the data source is safe.

Using the above method to determine whether the data source collected by the power grid is safe, remove false and attack data, and use valid data for operation and maintenance decision-making will greatly improve the rationality of decision-making.

3 Operation and maintenance decision-making with an improved ant colony algorithm

3.1 Objective function determination

The operation and maintenance system mainly provides services for the following projects:

Scheduling: It involves using layered thinking to conduct integrated management of power dispatching and is responsible for the command and management of the regional information system. The operation and maintenance target it faces is the entire power system and all staff related to dispatching.

Maintenance: Periodic maintenance and emergency repair are important components of maintenance. In addition, it is necessary to ensure effective equipment maintenance and acceptance (Tang and Zhou, 2020).

Combined with the main items of operation and maintenance, the objective function of operation and maintenance decision-making is set. Usually, equipment maintenance will not cut off the load directly, but it will increase the risk of a power outage. Therefore, this study regards the ideal power shortage as the objective function.

The ideal power shortage: the ideal power shortage is the sum of the power loss caused by the shutdown of the power grid during the maintenance period, which can indicate the degree of power grid reliability reduction caused by emergency repairs (Zhou and Long, 2020; Zhang et al., 2019).

minf1=t=1T(xSiCxi=1MPixi(1-Pi)1-xi)Tt    (8)

In the formula, T represents the number of maintenance periods, St represents the collection of load-shedding states in the t time period during the maintenance process, x = (x1, ..., xn) State vector describing the element, Cx represents the load shedding amount of the fault state x, M is the number of components, xi Describe the operating state of the component i′ at this time, Pi represents the probability that the component will fail, Tt is the number of hours for the overhaul process.

Overhaul cost: Overhaul cost represents the total economic cost of the equipment during the overhaul process. The cost of different maintenance methods is quite different; for example, the cost of different maintenance times is also different.

minf2=iNi=1Tpitzituit    (9)

In the formula, N represents the total number of equipment that needs to be overhauled, pit is the time cost when a working group overhauls the line i″, including overtime pay for holiday maintenance, zit represents the team that overhauls the line t within i″ time periods, uit is the maintenance status of the equipment. These include uit and uit.

3.2 Automated operation and maintenance aid decision making

3.2.1 Classical particle swarm model

In the classic particle swarm optimization method, the solution generated by the optimization problem is regarded as a particle in the search space, and after multiple iterations, the optimal solution is obtained (Zhao et al., 2019). During the iterative process, the particles track the best position Pbest and the global best position Gbest, and constantly update their own positions. The speed and position of the particle search are given by the following formula:

ui*dt+1=wui*dt+c1r1(pi*dt-yi*dt)+c2r2(pgdt-yi*dt)    (10)
yi*dt+1=xi*dt+ui*dt+1    (11)

In the formula, t′ is the number of iterations, w is the weight information (Liu E. G. et al., 2019; Yang et al., 2019), c1 and c2 are the acceleration constants of the two iterations (Lu et al., 2021), r1and r2 are random numbers between [0, 1], ui*d and yi*d are, respectively the d velocity and position components of particle i*, describes the optimal position of particle i*. Also known as Pbest, pgd is the global optimal position of the particle i*. That is Gbest.

3.2.2 The decision-making process of the niche particle swarm optimization algorithm

When optimizing for multiple objectives, the global best position is not just one, but has multiple undominated best positions (Zhou et al., 2020). Therefore, this study transforms individual particle swarms into multi-objective particle swarms and proposes a niche particle swarm method.

(1) Individual and global best position determination

For the individual optimal position, if the particle termination is effective, the particle will dominate Pbest, then take Pbest as the current position; If it has a dominant effect on the current position of Pbest particles, in this case Pbest will remain unchanged (Jin and Yang, 2020). If there is no dominance relationship between the two, just choose one of them arbitrarily. The global optimum is determined by combining the fitness values of all solutions in the external archive.

(2) External archive

Use the external archive method to store the best solution obtained in the iterative process, and organize the external files to improve the calculation efficiency. If the number of particles in the file is higher than the specified number, the minimum fitness particles are removed to ensure that all solutions in the file are evenly distributed (Tang et al., 2020).

Niche sharing mechanism

Express the fitness of an individual Yi* in the file as:

Fi*=1Si*,i*=1,2,...,NS    (12)

In the formula, Ns represents the number of individuals in the niche, and Si* describes the sharing degree of an individual Yi*. The expression is as follows:

Si*=j=1NSfSh(di*j),j=1,2,,NS    (13)

fsh'(di*j) in the formula is the sharing function of individuals Xi* and Xj, it reflects the correlation between two individuals in the niche (Liu X. J. et al., 2019).

When there are more individuals, the greater the degree of sharing, the smaller the fitness; on the contrary, the higher the fitness value. Niche sharing is to use this method to reduce individual adaptability, and then minimize the occurrence of local optimum and premature phenomena in the iterative process (Tan et al., 2020; Liu Y. D. et al., 2019).

The process of making automated operation and maintenance decisions through the above methods is as follows:

Step 1: Initialize the population, generate the original position and velocity, and set a reasonable number of iterations.

Step 2: Determine the objective functions of all particles, and place the solutions without a dominance relationship in the external file.

Step 3: Calculate the fitness of all individuals in the file, compare these values, and select an individual as the global optimal position.

Step 4: Constantly update the position and velocity of the incoming particles through Formulas 11, 12, and update accordingly.

Step 5: Update the file through the solution without a dominance relationship.

Step 6: If the number of individuals in the external file exceeds the set maximum value, the individual with the lowest fitness should be removed at this time.

Step 7: If the end requirements are met, no longer search, and output the best operation and maintenance strategy from the external file; otherwise, go back to step 3 and continue (Zhang, 2020).

4 Simulation experiment analysis

The simulation experiment takes a power grid as the research object to verify the effectiveness of the proposed automatic operation and maintenance decision-making algorithm based on the security analysis of data sources. The hardware environment for simulation experiments utilizes an Intel Core i7-12700K processor (3.6 GHz, 12 cores, 20 threads), equipped with 32 GB DDR4-3200 memory, a 1TB NVMe SSD, and an NVIDIA GeForce RTX 3060 graphics card (12 GB VRAM). The software environment was based on the Windows 10 Professional (64-bit) operating system, utilizing MATLAB R2022b as the simulation platform. Code was written in the MATLAB scripting language, with data processing performed using Python 3.9 (equipped with the Pandas 1.5.3 and NumPy 1.24.3 libraries). The experimental dataset is based on actual operation and maintenance data from a regional power grid during January to March 2023. It comprises 1,000 samples, each containing timestamps, power plant ID, substation ID, load values, data acquisition perspective, and data labels. This dataset is used to validate the experimental process and assess algorithm performance. The experimental parameter settings are shown in Table 1.

Table 1
www.frontiersin.org

Table 1. Parameter settings.

Assume that the regional power grid consists of five power stations and several substations. When a fault occurs and a large-scale power outage occurs, the method in this study, the data-driven algorithm, and the power data analysis system are used to give different recovery plans for the power stations. The power grid structure of the region is shown in Figure 1.

Figure 1
Diagram showing a network of five substations connected by electrical lines. Substations are labeled 1 to 5. Thin black lines denote 220V connections, while thick black lines denote 500V connections. Substation 3 is linked to Substations 1 and 4. Substation 4 connects to Substations 1, 5, and 2.

Figure 1. Schematic diagram of the power grid architecture in a certain place.

The fault recovery sequence of the three algorithms is simulated using the grid architecture. The three algorithms give the fault recovery sequence as follows:

The algorithm in this study: power plant 3 - power plant 2 - power plant 5 - power plant 4 - power plant 1;

Literature (Xue et al., 2019) algorithm: power plant 1 - power plant 3 - power plant 4 - power plant 5 - power plant 2;

Literature (Zhang et al., 2020) algorithm: power plant 2 - power plant 5 - power plant 4 - power plant 3 - power plant 1.

According to three different sequences for emergency repair, the required recovery time is shown in Figure 2. According to the experimental results, it can be seen that the fault repair sequence in this study has an obvious advantage in time. For different substations, the fault recovery time of this method is up to 1.2 h, and the shortest is 1.0 h. Although for substation 2 and substation 3, the emergency repair time of this method is not the shortest, but it takes the least time overall, and all emergency repair tasks can be completed in the shortest time. In contrast, the failure recovery time of the method in Kong et al. (2017) is the longest at 2.0 h and the shortest at 1.3 h. The longest fault recovery time of the method in Zhang and Zhou (2019) is 1.5 h, and the shortest is 0.8 h.

Figure 2
Line graph showing failure recovery time in hours across five substations. The orange line represents the algorithm in the paper, blue for reference [1], and green for reference [2]. The orange line consistently stays near one hour, while the blue and green lines fluctuate, peaking at substation 5.

Figure 2. Comparison chart of fault repair time of different algorithms.

The main reason why the proposed method has this application advantage is that the proposed method takes the minimum power shortage as the objective function, and at the same time, makes the most accurate decision based on the collected safety data.

In order to verify the rationality of the allocation of emergency repair points by the algorithm in this study, it is known that there are three emergency repair stations in this area, and the overall area is divided into 20 small areas. The above three algorithms are used to match the emergency repair points in these small areas, and the obtained configuration results are shown in Figures 3ac, respectively. The star in the figure represents the emergency repair station, and the circle represents the small area, and the connection between them is the allocation of the area to the connected emergency repair station.

Figure 3
Three graphs labeled (a), (b), and (c) display network diagrams with nodes connected by lines. Each graph has three central blue stars connected to surrounding open circles with red lines, indicating node connections. The axes are labeled x/km and y/km, with values ranging from 0 to 300 on the x-axis and 0 to 300 on the y-axis.

Figure 3. Allocation results of the algorithm in different algorithms. (a) The results of the area assignment of the algorithm in this study. (b) The results of the area assignment of the algorithm in literature (Xue et al., 2019). (c) The results of the area assignment of the algorithm in literature (Zhang et al., 2020).

From the above experimental results, it can be seen that the proposed algorithm can reasonably allocate the sub-areas corresponding to the emergency repair station according to the distance; in the algorithm of literature (Kong et al., 2017), the emergency repair station (175, 250) only allocates three areas, and there is a large difference in the number of allocations; while the result given by the algorithm in literature (Zhang and Zhou, 2019) guarantees the equalization of the workload of the emergency repair station, but it cannot be allocated according to the constraint of the shortest distance. In contrast, the decision result given by the method in this study is the best. The experimental results show that using the proposed algorithm to complete automatic operation and maintenance can greatly reduce the operation and maintenance cost.

Based on the above experimental results, in order to further prove the convergence performance of the algorithm, the number of iterations is set to 70, and the optimal solution for each generation of the optimal decision result is obtained by comparing the algorithm in the literature (Kong et al., 2017), the algorithm in the literature (Zhang and Zhou, 2019), and the algorithm proposed in this study. attribute value.

It can be seen from Figures 4ac that although the algorithm in literature (Kong et al., 2017) can present a stable trend within the shortest number of iterations, there will still be certain fluctuations in the stable process; the convergence time of the algorithm in literature (Zhang and Zhou, 2019) is long; Some improvements have been made to determine the best individual position and population position, improve the convergence performance of the algorithm, and avoid falling into local optimum. On the other hand, this study analyzes the security of data sources, which can effectively remove bad data, ensure that the algorithm will not be disturbed by malicious data, and improve the convergence performance.

Figure 4
Three line graphs labeled (a), (b), and (c) depict the optimal solution attribute value versus the number of iterations. Each graph varies in line color: orange (a), purple (b), and green (c). Values range from 30 to 70 on the y-axis and 10 to 70 on the x-axis. All graphs illustrate fluctuating patterns with eventual stabilization.

Figure 4. Convergence performance comparison of different algorithms. (a) Convergence performance of the algorithm in this study. (b) Convergence performance of literature (Kong et al., 2017) algorithm. (c) Convergence performance of the literature (Zhang and Zhou, 2019) algorithm.

To clarify the independent contributions of the three core components of multi-angle analysis, noise filtering, and niche Particle Swarm Optimization (PSO) to algorithm performance, four sets of ablation experiments were designed, namely: Experimental group A (complete algorithm): the algorithm proposed in this study, which includes multi angle analysis, noise filtering, and niche PSO; Experimental group B (removing multi-angle analysis): only retaining noise filtering and niche PSO, using single perspective data observation in the data source security analysis stage; Experimental group C (removing noise filtering): only retaining multi-angle analysis and niche PSO, without constructing a noise data model (Formulas 27), and directly using the original collected data for decision-making; Experimental Group D (Removing Small Habitat PSO): Only multi-angle analysis and noise filtering are retained, and the classical particle swarm optimization algorithm (without small habitat sharing mechanism and external archives) is used to solve the objective function. The experimental indicators were selected as the total duration of fault recovery, decision rationality (average distance of emergency repair point allocation), and algorithm convergence iteration times. Each experiment was repeated 10 times, and the average value was taken. The results are shown in Table 2.

Table 2
www.frontiersin.org

Table 2. Results of the ablation experiment.

According to Table 2, experimental group A (complete algorithm) performs the best in all three indicators, with a total fault recovery time of 5.8hree i an average distance of 3.2hree indicators, lts are shown in Table esfaul and a convergence iteration of 42dicators, Compared with experimental group A, experimental group B(excluding multi-angle analysis)increased the total time for fault recovery to 7.5taltia, the average distance for emergency repair point allocation to 4.8esfault and the number of convergence iterations slightly increased to 45esfault r Experimental group C (removing noise filtering)showed the most significant deterioration in various indicators, with a total fault recovery time of 8.2ecover an average distance of 5.3y time of 8.2cators, showed the mos and an increase in convergence iterations to 58howed the The total time for fault recovery in experimental group D (excluding small habitat PSO) was 6.9owed t with an average distance of 3.5bitat PSO was 6.9owed the most si5 The number of convergence iterations increased significantly to 65sfault re In summary, multi perspective analysis can improve the accuracy of data security judgments by mining shared factors from multiple perspectives, laying the foundation for rational emergency repair planning; Noise filtering can eliminate false and attack data, reduce iterative interference to ensure accurate decision-making and search efficiency; Small habitat PSO can prevent algorithms from falling into local optima, significantly improve convergence speed, and achieve optimal algorithm performance through the synergistic effect of the three. All of them are necessary components for the efficient and reliable operation of the automated operation and maintenance decision-making algorithm in this study.

5 Conclusion

The automated operation and maintenance system can effectively improve the low efficiency of decision-making, but there is also the risk of bad data attacks. In this study, based on the analysis of data source security, the particle swarm optimization algorithm is improved to enhance convergence performance. Simulation experiments show that this method can reasonably provide operation and maintenance decision-making results, ensure grid stability to the greatest extent, and improve economic benefits. At the same time, with the support of this decision-making method, the efficiency of troubleshooting, daily maintenance, and other tasks has been greatly improved, thereby enhancing user satisfaction and enterprise competitiveness. Nevertheless, several limitations should be acknowledged. While our chosen parameters proved effective in this study, their optimality across all potential scenarios cannot be guaranteed; automating parameter tuning represents a valuable direction for future research to enhance adaptability and ease of use. Moreover, although the present study demonstrates the overall efficacy of the proposed integrated framework, a thorough ablation study to isolate the contribution of each component (e.g., the niche mechanism, multi-angle preprocessing) would provide deeper insights. Beyond this, broader benchmarking against recent hybrid optimization and anomaly detection algorithms, a formal convergence and stability analysis, and more extensive testing on larger, noisier, and more complex power systems will be essential to more convincingly validate the robustness, scalability, and practical applicability of the approach.

Data availability statement

Publicly available datasets were analyzed in this study. This data can be found here: amlhcnVjaHVuQHN0dS5zY3UuZWR1LmNu.

Author contributions

JL: Writing – original draft, Writing – review & editing. RJ: Writing – original draft, Writing – review & editing. NX: Writing – original draft, Writing – review & editing. YT: Writing – review & editing.

Funding

The author(s) declare that no financial support was received for the research and/or publication of this article.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The author(s) declare that no Gen AI was used in the creation of this manuscript.

Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Adebimpe, L. A., Ng, I. O., Idris, M. Y. I., Okmi, M., Ang, T. F., Por, L. Y., et al. (2023). Systemic literature review of recognition-based authentication method resistivity to shoulder-surfing attacks. Appl. Sci. 13:10040. doi: 10.3390/app131810040

Crossref Full Text | Google Scholar

Chen, H. Y., Qi, H. W., and Yin, H. (2019). Integrated solution for intelligent operation and maintenance of cloud data center in the field of aerospace test mission. Microelectr. Comput. 36, 33–37. doi: 10.19304/j.cnki.issn1000-7180.2019.05.008

Crossref Full Text | Google Scholar

Chen, W. H., Tian, Z., Zhang, L. Z., et al. (2020). Outlier detection method for high-dimensional sparse data based on interpolation. Comput. Eng. Sci. 42, 966–972. doi: 10.3969/j.issn.1007-130X.2020.06.003

Crossref Full Text | Google Scholar

Collins, S., Deane, J. P., Poncelet, K., Panos, E., Pietzcker, R. C., Delarue, E., et al. (2017). Integrating short term variations of the power system into integrated energy system models: a methodological review. Renew. Sust. Energy Rev. 76, 839–856. doi: 10.1016/j.rser.2017.03.090

Crossref Full Text | Google Scholar

Ding, Y., Wang, Y. J., Tian, L., Wang, B. Y., Yuan, F., and Zhang, K. (2020). Smart grid data security aggregation scheme supporting third-party arbitration. Acta Electr. Sin. 48, 350–358. doi: 10.3969/j.issn.0372-2112.2020.02.018

Crossref Full Text | Google Scholar

Gabr, M., Diab, A., Elshoush, H. T., Chen, Y. L., Por, L. Y., Ku, C. S., et al. (2024). Data security utilizing a memristive coupled neural network in 3D models. IEEE Access 12, 116457–116477. doi: 10.1109/ACCESS.2024.3447075

Crossref Full Text | Google Scholar

Hawezi, R. S., Khoshaba, F. S., and Kareem, S. W. (2022). A comparison of automated classification techniques for image processing in video internet of things. Comput. Electr. Eng. 101:108074. doi: 10.1016/j.compeleceng.2022.108074

Crossref Full Text | Google Scholar

Hussain, M. I. (2017). Internet of Things: challenges and research opportunities. CSI Trans. ICT 5, 87–95. doi: 10.1007/s40012-016-0136-6

Crossref Full Text | Google Scholar

Jin, B., and Yang, P. (2020). Analysis of archive data security management strategy in the era of big data. Inform. Sci. 38, 30–35. doi: 10.13833/j.issn.1007-7634.2020.09.005

Crossref Full Text | Google Scholar

Khan, A. A., Yang, J., Laghari, A. A., Baqasah, A. M., Alroobaea, R., Ku, C. S., et al. (2025). BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng. Appl. Artif. Intell. 141:109838. doi: 10.1016/j.engappai.2024.109838

Crossref Full Text | Google Scholar

Kong, Y., Kong, Z., Liu, Z., Wei, C., Zhang, J., and An, G. (2017). Pumped storage power stations in China: the past, the present, and the future. Ren. Sust. Energy Rev. 71, 720–731. doi: 10.1016/j.rser.2016.12.100

Crossref Full Text | Google Scholar

Li, Y. Q., Li, D. D., Wang, Z., and Zhang, J. (2019). Multi-view learning with gravitational nearest neighbor classifier. Comput. Eng. Applic. 55, 137–142.+179. doi: 10.3778/j.issn.1002-8331.1805-0448

Crossref Full Text | Google Scholar

Liu, E. G., Wang, L., Yi, C. J., et al. (2019). Secure data transmission of substation terminal based on aggregate signature. Comput. Eng. Design 40, 1809–1815. doi: 10.16208/j.issn1000-7024.2019.07.002

Crossref Full Text | Google Scholar

Liu, X. J., Ye, W., Jiang, J. W., and Zhang, L. (2019). Data security storage scheme in hybrid cloud mode. J. Beijing Univ. Technol. 45, 295–303. doi: 10.15918/j.tbit1001-0645.2019.03.012

PubMed Abstract | Crossref Full Text | Google Scholar

Liu, Y. D., Wang, X., Tu, G. S., and Wang, H. (2019). Full life cycle cloud outsourcing data security audit protocol. Comput. Applic. 39, 1954–1958. doi: 10.11772/j.issn.1001-9081.2018122438

Crossref Full Text | Google Scholar

Lu, J. D., Xiao, R. Z., and Jin, S. Y. (2021). Research progress of cloud data security. J. Electr. Inform. 43:11. Available online at: https://jeit.ac.cn/cn/article/pdf/preview/10.11999/JEIT200158

Google Scholar

Peng, Z., Zhang, X., Zhang, Q., Su, D., and Huo, X. (2019). Remote operation and maintenance technology of substation monitoring system based on GSP. Power Autom. Equip. 39, 210–216. doi: 10.16081/j.issn.1006-6047.2019.04.031

Crossref Full Text | Google Scholar

Por, L. Y., Ng, I. O., Yang, J., Chen, Y. L., and Ku, C. S. (2024). A systematic literature review on the security attacks and countermeasures used in graphical passwords. IEEE Access 12, 53408–53423. doi: 10.1109/ACCESS.2024.3373662

Crossref Full Text | Google Scholar

Suryaprabha, E., and Saravana Kumar, N. M. (2020). Retracted article: enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network. Soft Comput. 24, 10681–10691. doi: 10.1007/s00500-019-04573-4

Crossref Full Text | Google Scholar

Tan, P. L., Wang, X. J., Tang, W. Q., and Wan, L. X. R. (2020). Design of MCPs data security architecture based on blockchain. Comput. Eng. Design 41:7. doi: 10.16208/j.issn1000-7024.2020.12.007

PubMed Abstract | Crossref Full Text | Google Scholar

Tang, X., Shan, W., Liu, D., and Zhou, L. (2020). Cloud data security de duplication method against side channel attack based on threshold re encryption. J. Commun. 41:14. doi: 10.11959/j.issn.1000-436x.2020103

Crossref Full Text | Google Scholar

Tang, X., and Zhou, L. N. (2020). Cloud data security de duplication method against additional block attack based on response fuzziness. Comput. Applic. 40:6. doi: 10.11772/j.issn.1001-9081.2019081468

Crossref Full Text | Google Scholar

Wang, X. Y., Liu, Q. J., and Pang, G. L. (2020). Security response simulation of multi service communication network under malicious code attack. Comput. Simul. 37, 137–141. doi: 10.3969/j.issn.1006-9348.2020.10.030

Crossref Full Text | Google Scholar

Wu, W. L., Liu, G. H., and Zhang, J. B. (2020). Complexity analysis of function query solution on big data. Comput. Appli. 40:4. doi: 10.11772/j.issn.1001-9081.2019091618

PubMed Abstract | Crossref Full Text | Google Scholar

Xue, L., Zheng, T., Guo, L., Ren, W., Huang, L. H., and Zeng, X. J. (2019). Research on optimal operation and maintenance of power user power acquisition system based on data drive. Electr. Measur. Instrument. 56, 42–46. doi: 10.19753/j.issn1001-1390.2019.017.008

Crossref Full Text | Google Scholar

Yang, G., Ding, H., Zou, J., Jiang, H., and Chen, Y. (2019). Big data security scheme based on high-performance password. Comput. Res. Dev. 56:2207. doi: 10.7544/ISSN1000-1239.2019.20190390

Crossref Full Text | Google Scholar

Zhang, J. (2021). Distributed network security framework of energy internet based on internet of things. Sust. Energy Technol. Assess. 44:101051. doi: 10.1016/j.seta.2021.101051

Crossref Full Text | Google Scholar

Zhang, L. (2020). Research on storage data security of network service cloud platform based on OSI model. Modern Electr. Technol. 43:5. doi: 10.16652/j.issn.1004-373x.2020.05.017

Crossref Full Text | Google Scholar

Zhang, M., and Zhou, Z. P. (2019). Deep subspace clustering with low rank constraint a priori. Pattern Recognit. Artif. Intell. 32, 652–660. doi: 10.16451/j.cnki.issn1003-6059.201907009

Crossref Full Text | Google Scholar

Zhang, S. G., Xian, H. Q., Liu, H. Y., and Wang, L. M. (2019). Cloud encrypted data security deduplication method. J. Softw. 30, 3815–3828. doi: 10.13328/j.cnki.jos.005610

Crossref Full Text | Google Scholar

Zhang, T., and Ma, H. Q. (2020). Collaborative research on open data and data security policy based on policy text calculation. Inform. Theory Pract. 43:8. doi: 10.16353/j.cnki.1000-7490.2020.06.023

Crossref Full Text | Google Scholar

Zhang, W., Sheng, W., and Du, S. (2020). Architecture and technical implementation of distribution network operation analysis system based on massive data. Power Syst. Autom. 44, 147–153. Available online at: https://link.cnki.net/urlid/32.1180.TP.20191205.1203.002

Google Scholar

Zhao, H. X., Li, Y., and Shi, H. B. (2020). Research on Weighted Naive Bayesian algorithm based on high-dimensional data. Stat. Decis. Ma. 36, 5–9. doi: 10.13546/j.cnki.tjyjc.2020.08.001

Crossref Full Text | Google Scholar

Zhao, Z., Wang, J., Zhu, Z., and Sun, L. (2019). Attribute based encryption scheme for secure sharing of Internet of things data. Comput. Res. Dev. 56, 1290–1301. doi: 10.7544/issn1000-1239.2019.20180288

Crossref Full Text | Google Scholar

Zhou, W. K., and Long, M. (2020). Secure transmission scheme of environmental monitoring data based on blockchain. Comput. Sci. 47, 315–320. doi: 10.11896/jsjkx.190100195

Crossref Full Text | Google Scholar

Zhou, X. X., Liu, W. G., Sui, H. M., and Cheng, H. Y. (2020). Five safes security framework and its enlightenment to the security access of sensitive data in China's library field. Inform. Theory Pract. 43:6. doi: 10.16353/j.cnki.1000-7490.2020.03.015

Crossref Full Text | Google Scholar

Keywords: data source security, multi angle analysis, automation, fault tolerance, operation and maintenance decision, niche mechanism

Citation: Li J, Jia R, Xiang N and Tian Y (2025) Research on fault-tolerant decision algorithm for data security automation. Front. Big Data 8:1600540. doi: 10.3389/fdata.2025.1600540

Received: 06 April 2025; Accepted: 24 September 2025;
Published: 20 October 2025.

Edited by:

Hai Dong, RMIT University, Australia

Reviewed by:

Por Lip Yee, University of Malaya, Malaysia
Ramchand Vedaiyan, Villa College, Maldives

Copyright © 2025 Li, Jia, Xiang and Tian. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Ruchun Jia, amlhcnVjaHVuQHN0dS5zY3UuZWR1LmNu

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.