A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid

被引:159
作者
Baek, Joonsang [1 ]
Quang Hieu Vu [2 ]
Liu, Joseph K. [3 ]
Huang, Xinyi [4 ]
Xiang, Yang [5 ]
机构
[1] Khalifa Univ Sci Technol & Res, Elect & Comp Engn Dept, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ Sci Technol & Res, Etisalat BT Innovat Ctr EBTIC, Abu Dhabi, U Arab Emirates
[3] Inst Infocomm Res, Dept Infocomm Secur ICS, Singapore, Singapore
[4] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350000, Peoples R China
[5] Deakin Univ, Sch Informat Technol, Burwood, Vic, Australia
关键词
Big data; cloud computing; secure; information management; smart grid; PRIVACY;
D O I
10.1109/TCC.2014.2359460
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services. It plays a crucial role in modern energy infrastructure. The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters efficiently; and how to process a huge amount of data received from these devices. Cloud computing, a technology that provides computational resources on demands, is a good candidate to address these challenges since it has several good properties such as energy saving, cost saving, agility, scalability, and flexibility. In this paper, we propose a secure cloud computing based framework for big data information management in smart grids, which we call "Smart-Frame." The main idea of our framework is to build a hierarchical structure of cloud computing centers to provide different types of computing services for information management and big data analysis. In addition to this structural framework, we present a security solution based on identity-based encryption, signature and proxy re-encryption to address critical security issues of the proposed framework.
引用
收藏
页码:233 / 244
页数:12
相关论文
共 43 条
[1]  
[Anonymous], 2011, P COMP NEEDS NEXT GE
[2]  
[Anonymous], 2011, P2030D70 IEEE
[3]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[4]  
Baek J, 2012, INT CONF INTERNET, P668
[5]  
Bartoli A, 2010, INT CONF SMART GRID, P333, DOI 10.1109/SMARTGRID.2010.5622063
[6]  
Bojkovic Z., 2012, P 11 INT CORIFERENCE, P83
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Boyen Xavier, 2008, International Journal of Applied Cryptography, V1, P3, DOI 10.1504/IJACT.2008.017047
[9]  
Cheung H, 2008, IEEE POW ENER SOC GE, P2301
[10]  
Chu C.-K., 2013, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, P369, DOI DOI 10.1145/2484313.2484362