CFP last date
15 May 2024
Reseach Article

A Fog Computing based Smart Grid Cloud Data Security

by Ahmad Almadhor
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 6
Year of Publication: 2016
Authors: Ahmad Almadhor
10.5120/ijais2016451515

Ahmad Almadhor . A Fog Computing based Smart Grid Cloud Data Security. International Journal of Applied Information Systems. 10, 6 ( March 2016), 1-6. DOI=10.5120/ijais2016451515

@article{ 10.5120/ijais2016451515,
author = { Ahmad Almadhor },
title = { A Fog Computing based Smart Grid Cloud Data Security },
journal = { International Journal of Applied Information Systems },
issue_date = { March 2016 },
volume = { 10 },
number = { 6 },
month = { March },
year = { 2016 },
issn = { 2249-0868 },
pages = { 1-6 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number6/868-2016451515/ },
doi = { 10.5120/ijais2016451515 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:02:41.900413+05:30
%A Ahmad Almadhor
%T A Fog Computing based Smart Grid Cloud Data Security
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 6
%P 1-6
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today's electricity grid is sprouting into the smart grid which should be dependable, supple, effcient, and supportable. To fulfill these necessities, the smart grid draws on a lot of center advances. Advanced Metering Infrastructure (AMI). These advances or progressions encourage simple also, quick aggregation of different information, e.g. fine-grained meter readings. Various security and protection concerns with respect to the accumulated information/data emerge or arise, since explorations has demonstrated that it is conceivable to reason and extract user behavior from smart meter readings. Thus, these meter readings are extremely touchy and require suitable assurance. Smart grid is bleeding edge power grid. It takes in communication framework/network with information system as one more savvy system for strong and safe base. Cloud computing has made and propelled over the earlier years transforming into a certified choice for Smart Grids system because of the flexibility, openness, interoperability execution and most basic its execution. Regardless of the way that smart grid using two way communication and cloud there are still some break provisions as for security which have to ponder on.

References
  1. “G. Dán et al”, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. Smart Grid Communications (SmartGridComm), 2010.
  2. “Zhong Fan et al”, “Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities”, IEEE Communication Surveys & Tutorials, Vol.15, No.1, 2013,pp. 21-38.
  3. “Wu C et al”, “A real-valued genetic algorithm to optimize the parameters of support vector machine for predicting bankruptcy”, Expert System Applications 2007; 32(2):397–408.
  4. ”Y. Huang et al”, "Bad data injection in smart grid: attack and defense mechanisms," Communications Magazine, IEEE, vol.51, pp. 27-33, 2013.
  5. “A. Tarali et al”, "Bad data detection in two-stage state estimation using phasor measurements," in Proc. Innovative Smart Grid Technologies (ISGT Europe), 2012.
  6. “Y. Huang, H et al”, "Defending false data injection attack on smart grid network using adaptive cusum test," in Proc. 2011 Information Sciences and Systems (CISS), 2011.
  7. “T. Liu et al”, "A Novel Method to Detect Bad Data Injection Attack in Smart Grid," in Proc. IEEE INFOCOM Workshop on CCSES, 2013.
  8. “R. B. Bobba et al”, K. Nahrstedt and T. J. Overbye, "Detecting false data injection attacks on dc state estimation," in Proc. Preprints of the First Workshop on Secure Control Systems, 2010.
  9. “Q. Yang et al”, "On False Data Injection Attacks against Power System State Estimation: Modeling and Countermeasures," IEEE Transactions on Parallel and Distributed Systems, 2013.
  10. “P. Yong et al”, “Secure cloud storage based on cryptographic techniques”, The Journal of China Universities of Post and Telecommunications, vol. 19, sup. 2, pp. 182-189, 2012.
  11. “M. Esmalifalak et al”, "Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study", IEEE Transactions on Smart Grid, vol.4 , pp:106-169, 2012.
  12. “B. Gou et al”, "A pre-procedure of bad data detection for smart grid monitoring" in Power and Energy Society General Meeting, IEEE, 2012.
  13. “H. Khurana et al”, "Smart-grid security issues," Security & Privacy, IEEE, vol.8, pp. 81-85, 2010.
  14. “R. Q. Hu et al”, "Cyber security for smart grid communications: part II [Guest Editorial]," Communications Magazine, IEEE, vol.51, pp. 16-17, 2013.
  15. “Y. Liu et al”, "False Data Injection Attacks against State Estimation in Electric Power Grids,", Proceedings of the 16th ACM conference on Computer and communications security, 2009.
  16. “A. Giani et al “, "Smart Grid Data Integrity Attacks,", IEEE Transactions on Smart Grid, vol.4 , pp:1244-1253, 2013.
  17. “Zubair A. Baig et al”, “ An Analysis of Smart Grid Attacks and Countermeasures” Journal of Communications Vol. 8, No. 8, August 2013.
  18. “Rohit Ranjan et al”, “SPARSH”-Data Security in Cloud, ijetae 10 Oct 2011.
  19. “P. McDaniel et al”, "Security and privacy challenges in the smart grid," Security & Privacy, IEEE, vol.7, pp. 75-77, 2009.
  20. “Fog Computing Conference Speakers Explain How to Improve IoT Security” Available online at http://www.fogcomputingworld.com/topics/fogcomputing/ articles/ November 2014
  21. “J. Lin et al”, "On false data injection attacks against distributed energy routing in smart grid," in IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), , 2012.
  22. “Park, J et al”, The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128{174 (Feb 2004), http://doi.acm.org/10.1145/984334.984339
  23. “Mayur Subhash Chavan”, DESIGN OF SECURE FRAMEWORK FOR CLOUD DATA SECURITY IN SMART GRID WITH FOG COMPUTING, IJESMR , Aug 2015
  24. ”Farhangi, H”, The path of the smart grid. Power and Energy Magazine, IEEE 8(1), 18{28 (Jan 2010)
  25. National Energy Technology Laboratory for the U.S. Department of Energy: Advanced Metering Infrastructure. Tech. rep., U.S. Department of Energy (Feb 2008)
  26. ”Ockwell, G”, The DOE's "7 Traits of a Smart Grid". Fortnightly's Spark (Oct 2009) Quinn, E.L.: Smart Metering & Privacy: Existing Law and Competting Policies. Tech. rep., Colorado Public Utilities Commission (2009)
  27. ”Molina-Markham et al”, Private memoirs of a smart meter. In: Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-E_ciency in Building. pp. 61{66 (2010)
  28. ”Clements, et al”, Cyber-security considerations for the smart grid. In: Power and Energy Society General Meeting, 2010 IEEE. pp. 1{5 (Jul 2010)
  29. “Salvatore J. Stolfo et al”, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud” IEEE CS Security and Privacy Workshops pp 125-128, 2012.
  30. ”Maher Abdelshkour”, “IoT, from Cloud to fog”, online Avalaible at http://blogs.cisco.com/perspectives/iotfromcloudtofogcomputing
  31. ”Eckert, C et al”, Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit - DuD 35, 535{541 (2011)
  32. “Cavoukian et al”, SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3, 275{294 (2010)
  33. “Pretschner”, A.: An Overview of Distributed Usage Control. In: Proc. 2nd Conf. Knowledge Engineering: Principles and Techniques. Romania (Jul 2009)
  34. “Quinn E.L” , Smart Metering & Privacy: Existing Law and Competting Policies. Tech. rep., Colorado Public Utilities Commission (2009)
Index Terms

Computer Science
Information Sciences

Keywords

Smart Grid Cloud Computing Security IoT Power Grid