An efficient cloud based architecture to improve smart grid performance
Subject Areas : Renewable energyMohammad Rasoul Momeni 1 , Fatemeh Haghighat 2 , Mohsen Haghighat 3
1 - MSc – Department of Electrical Engineering, Golpayegan University of Technology, Golpayegan, Iran
2 - MSc – Department of Electrical Engineering, Golpayegan University of Technology, Golpayegan, Iran
3 - MSc - Great Tehran Electricity Distribution Company, Tehran. Iran
Keywords: smart grid, cloud computing, Security, privacy, cyber threats,
Abstract :
Due to explosive growth of users, increasing energy demand and also the need to improve efficiency and maintain the stability of the electricity grid, smart grid is the only option available to electrical industry engineers. In fact, the smart grid is a physical-cyber system that provides coherent and integrated communication, processing and control functions. The smart grid provides control and management of millions of devices in the electricity industry in a reliable, scalable, cost-effective, real time and two-sided manner. Given the increasing growth of cyber threats in the last decade, the need to protect the electricity industry and its critical systems seems essential. The slightest disruption to the power industry's systems results in disruption to other industries, reduced productivity, and discontent. Hence we proposed an efficient cloud based architecture to improve smart grid performance. Proposed architecture provides data security and privacy against different types of cyber-attacks such as replay attack, modification attack and so on.
[1] P. Mell, T. Grance, The NIST definition of cloud computing (draft), 2011, Available: http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf.
[2] M. R. Momeni. “A survey of mobile cloud computing: advantages, challenges and approaches”. InternationalJournal of Computer Science and Business Informatics, Vol. 15, No. 4, pp. 14-28, 2015.
[3] B. Fang, X. Yin, Y. Tan, C. Li, Y. Gao, Y. Cao, J. Li, “The contributions of cloud technologies to smart grid”, Renewable and Sustainable Energy Reviews, Vol. 59, pp. 1326-1331, June 2016 (doi:10.1016/j.rser.2016.01.032).
[4] K. Demir, H. Ismail, T. Gurova, N. Suri, “Securing the cloud-assisted smart grid”, International Journal of Critical Infrastructure Protection, pp. 100-111, Dec. 2018 (doi:10.1016/j.ijcip.2018.08.004).
[5] A. O. Otuoze, M. W. Mustafa, R. M. Larik, “Smart grid security challenges: Classification by sources of threat”, Journal of Electrical Systems and Information Technology, Vol. 5, No. 3, pp. 468-483, Dec. 2018 (doi:10.1016/j.jesit.2018.01.001).
[6] T. Li,” How to build the virtual system in power enterprise information system”, Electr. Power Inf. Technol, 2009.
[7] Z. Hua, Z. Nan, “Cloud computing based data storage and disaster recovery”, Proceeding of the IEEE/ICFCSE, 629-632, Aug. 2011 (doi:10.1109/ICFCSE.2011.157).
[8] N. Koblitz, “Elliptic curve cryptosystem”, Journal of Mathematics Computation, Vol. 48, No. 177, pp. 203-209, 1987.
[9] V. Miller, Use of elliptic curves in cryptography, Advances in Cryptology, pp. 417-426, 1985.
[10] D. Hankerson, A. Menzes, S. Vanston, Guide to elliptic curve cryptography, New York, USA: Springer-Verlag, 2004.
[11]R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, S. Piergiovanni, “Coupling-based internal clock synchronizationfor large-scale dynamic distributed systems”, IEEE Trans. on Parallel and Distributed Systems, Vol. 21, No. 5, pp. 607–619, May 2010 (doi:10.1109/TPDS.2009.111).
[12] Z. Tan, “A user anonymity preserving three-factorauthentication scheme for telecare medicine informationsystems”, Journal of Medical Systems, Vol. 38, No. 3, pp. 1-9, March 2014 (doi:10.1007/s10916-014-0016-2).
_||_[1] P. Mell, T. Grance, The NIST definition of cloud computing (draft), 2011, Available: http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf.
[2] M. R. Momeni. “A survey of mobile cloud computing: advantages, challenges and approaches”. InternationalJournal of Computer Science and Business Informatics, Vol. 15, No. 4, pp. 14-28, 2015.
[3] B. Fang, X. Yin, Y. Tan, C. Li, Y. Gao, Y. Cao, J. Li, “The contributions of cloud technologies to smart grid”, Renewable and Sustainable Energy Reviews, Vol. 59, pp. 1326-1331, June 2016 (doi:10.1016/j.rser.2016.01.032).
[4] K. Demir, H. Ismail, T. Gurova, N. Suri, “Securing the cloud-assisted smart grid”, International Journal of Critical Infrastructure Protection, pp. 100-111, Dec. 2018 (doi:10.1016/j.ijcip.2018.08.004).
[5] A. O. Otuoze, M. W. Mustafa, R. M. Larik, “Smart grid security challenges: Classification by sources of threat”, Journal of Electrical Systems and Information Technology, Vol. 5, No. 3, pp. 468-483, Dec. 2018 (doi:10.1016/j.jesit.2018.01.001).
[6] T. Li,” How to build the virtual system in power enterprise information system”, Electr. Power Inf. Technol, 2009.
[7] Z. Hua, Z. Nan, “Cloud computing based data storage and disaster recovery”, Proceeding of the IEEE/ICFCSE, 629-632, Aug. 2011 (doi:10.1109/ICFCSE.2011.157).
[8] N. Koblitz, “Elliptic curve cryptosystem”, Journal of Mathematics Computation, Vol. 48, No. 177, pp. 203-209, 1987.
[9] V. Miller, Use of elliptic curves in cryptography, Advances in Cryptology, pp. 417-426, 1985.
[10] D. Hankerson, A. Menzes, S. Vanston, Guide to elliptic curve cryptography, New York, USA: Springer-Verlag, 2004.
[11]R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, S. Piergiovanni, “Coupling-based internal clock synchronizationfor large-scale dynamic distributed systems”, IEEE Trans. on Parallel and Distributed Systems, Vol. 21, No. 5, pp. 607–619, May 2010 (doi:10.1109/TPDS.2009.111).
[12] Z. Tan, “A user anonymity preserving three-factorauthentication scheme for telecare medicine informationsystems”, Journal of Medical Systems, Vol. 38, No. 3, pp. 1-9, March 2014 (doi:10.1007/s10916-014-0016-2).