Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

A Fog Computing based Smart Grid Cloud Data Security

Ahmad Almadhor. Published in Distributed Systems

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Ahmad Almadhor
Download full text
  1. Ahmad Almadhor. Article: A Fog Computing based Smart Grid Cloud Data Security. International Journal of Applied Information Systems 10(6):1-6, March 2016. BibTeX

    	author = "Ahmad Almadhor",
    	title = "Article: A Fog Computing based Smart Grid Cloud Data Security",
    	journal = "International Journal of Applied Information Systems",
    	year = 2016,
    	volume = 10,
    	number = 6,
    	pages = "1-6",
    	month = "March",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"


Today's electricity grid is sprouting into the smart grid which should be dependable, supple, effcient, and supportable. To fulfill these necessities, the smart grid draws on a lot of center advances. Advanced Metering Infrastructure (AMI). These advances or progressions encourage simple also, quick aggregation of different information, e.g. fine-grained meter readings. Various security and protection concerns with respect to the accumulated information/data emerge or arise, since explorations has demonstrated that it is conceivable to reason and extract user behavior from smart meter readings. Thus, these meter readings are extremely touchy and require suitable assurance. Smart grid is bleeding edge power grid. It takes in communication framework/network with information system as one more savvy system for strong and safe base. Cloud computing has made and propelled over the earlier years transforming into a certified choice for Smart Grids system because of the flexibility, openness, interoperability execution and most basic its execution. Regardless of the way that smart grid using two way communication and cloud there are still some break provisions as for security which have to ponder on.


  1. “G. Dán et al”, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. Smart Grid Communications (SmartGridComm), 2010.
  2. “Zhong Fan et al”, “Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities”, IEEE Communication Surveys & Tutorials, Vol.15, No.1, 2013,pp. 21-38.
  3. “Wu C et al”, “A real-valued genetic algorithm to optimize the parameters of support vector machine for predicting bankruptcy”, Expert System Applications 2007; 32(2):397–408.
  4. ”Y. Huang et al”, "Bad data injection in smart grid: attack and defense mechanisms," Communications Magazine, IEEE, vol.51, pp. 27-33, 2013.
  5. “A. Tarali et al”, "Bad data detection in two-stage state estimation using phasor measurements," in Proc. Innovative Smart Grid Technologies (ISGT Europe), 2012.
  6. “Y. Huang, H et al”, "Defending false data injection attack on smart grid network using adaptive cusum test," in Proc. 2011 Information Sciences and Systems (CISS), 2011.
  7. “T. Liu et al”, "A Novel Method to Detect Bad Data Injection Attack in Smart Grid," in Proc. IEEE INFOCOM Workshop on CCSES, 2013.
  8. “R. B. Bobba et al”, K. Nahrstedt and T. J. Overbye, "Detecting false data injection attacks on dc state estimation," in Proc. Preprints of the First Workshop on Secure Control Systems, 2010.
  9. “Q. Yang et al”, "On False Data Injection Attacks against Power System State Estimation: Modeling and Countermeasures," IEEE Transactions on Parallel and Distributed Systems, 2013.
  10. “P. Yong et al”, “Secure cloud storage based on cryptographic techniques”, The Journal of China Universities of Post and Telecommunications, vol. 19, sup. 2, pp. 182-189, 2012.
  11. “M. Esmalifalak et al”, "Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study", IEEE Transactions on Smart Grid, vol.4 , pp:106-169, 2012.
  12. “B. Gou et al”, "A pre-procedure of bad data detection for smart grid monitoring" in Power and Energy Society General Meeting, IEEE, 2012.
  13. “H. Khurana et al”, "Smart-grid security issues," Security & Privacy, IEEE, vol.8, pp. 81-85, 2010.
  14. “R. Q. Hu et al”, "Cyber security for smart grid communications: part II [Guest Editorial]," Communications Magazine, IEEE, vol.51, pp. 16-17, 2013.
  15. “Y. Liu et al”, "False Data Injection Attacks against State Estimation in Electric Power Grids,", Proceedings of the 16th ACM conference on Computer and communications security, 2009.
  16. “A. Giani et al “, "Smart Grid Data Integrity Attacks,", IEEE Transactions on Smart Grid, vol.4 , pp:1244-1253, 2013.
  17. “Zubair A. Baig et al”, “ An Analysis of Smart Grid Attacks and Countermeasures” Journal of Communications Vol. 8, No. 8, August 2013.
  18. “Rohit Ranjan et al”, “SPARSH”-Data Security in Cloud, ijetae 10 Oct 2011.
  19. “P. McDaniel et al”, "Security and privacy challenges in the smart grid," Security & Privacy, IEEE, vol.7, pp. 75-77, 2009.
  20. “Fog Computing Conference Speakers Explain How to Improve IoT Security” Available online at articles/ November 2014
  21. “J. Lin et al”, "On false data injection attacks against distributed energy routing in smart grid," in IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), , 2012.
  22. “Park, J et al”, The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128{174 (Feb 2004),
  24. ”Farhangi, H”, The path of the smart grid. Power and Energy Magazine, IEEE 8(1), 18{28 (Jan 2010)
  25. National Energy Technology Laboratory for the U.S. Department of Energy: Advanced Metering Infrastructure. Tech. rep., U.S. Department of Energy (Feb 2008)
  26. ”Ockwell, G”, The DOE's "7 Traits of a Smart Grid". Fortnightly's Spark (Oct 2009) Quinn, E.L.: Smart Metering & Privacy: Existing Law and Competting Policies. Tech. rep., Colorado Public Utilities Commission (2009)
  27. ”Molina-Markham et al”, Private memoirs of a smart meter. In: Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-E_ciency in Building. pp. 61{66 (2010)
  28. ”Clements, et al”, Cyber-security considerations for the smart grid. In: Power and Energy Society General Meeting, 2010 IEEE. pp. 1{5 (Jul 2010)
  29. “Salvatore J. Stolfo et al”, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud” IEEE CS Security and Privacy Workshops pp 125-128, 2012.
  30. ”Maher Abdelshkour”, “IoT, from Cloud to fog”, online Avalaible at
  31. ”Eckert, C et al”, Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit - DuD 35, 535{541 (2011)
  32. “Cavoukian et al”, SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3, 275{294 (2010)
  33. “Pretschner”, A.: An Overview of Distributed Usage Control. In: Proc. 2nd Conf. Knowledge Engineering: Principles and Techniques. Romania (Jul 2009)
  34. “Quinn E.L” , Smart Metering & Privacy: Existing Law and Competting Policies. Tech. rep., Colorado Public Utilities Commission (2009)


Smart Grid, Cloud Computing, Security, IoT, Power Grid