A secure cloud computing based framework for big data information management of smart grid

Nexgen Technology
Nexgen Technology Managing Dircetor &CEO en Nexgen Technology
 A SECURE CLOUD COMPUTING BASED FRAMEWORK
FOR BIG DATA INFORMATION MANAGEMENT OF
SMART GRID
Smart grid is a technological innovation that improves efficiency, reliability,
economics, and sustainability of electricity services.
It plays a crucial role in modern energy infrastructure.
The main challenges of smart grids, however, are how to manage different types of
front-end intelligent devices such as power assets and smart meters efficiently; and
how to process a huge amount of data received from these devices.
Cloud computing, a technology that provides computational resources on demands,
is a good candidate to address these challenges since it has several good properties
such as energy saving, cost saving, agility, scalability, and flexibility.
In this paper, we propose a secure cloud computing based framework for big data
information management in smart grids, which we call “Smart-Frame.”
The main idea of our framework is to build a
hierarchical structure of cloud computing centers to
provide different types of computing services for
information management and big data analysis.
In addition to this structural framework, we present a
security solution based on identity-based encryption,
signature and proxy re-encryption to address critical
security issues of the proposed framework.
 Smart grid is a technological innovation that improves efficiency,
reliability, economics, and sustainability of electricity services.
 It plays a crucial role in modern energy infrastructure.
 The main challenges of smart grids, however, are how to manage
different types of front-end intelligent devices such as power
assets and smart meters efficiently; and how to process a huge
amount of data received from these devices.
In this paper, we propose a secure cloud
computing based framework for big data
information management in smart grids, which we
call “Smart-Frame.”
The main idea of our framework is to build a
hierarchical structure of cloud computing centers to
provide different types of computing services for
information management and big data analysis.
In addition to this structural framework, we
present a security solution based on identity-based
encryption, signature and proxy re-encryption to
address critical security issues of the proposed
framework.
 Smart Grid Information Management
Smart grid information management usually involves three basic tasks: information gathering,
information processing, and information storing.
For information gathering, since smart grids have to collect information from heterogeneous
devices at different locations, the main research challenge is to build efficient communication
architecture.
Several solutions have been proposed to address this challenge and most of them can be found in
the recent surveys.
In terms of information processing, data integration also lays a challenge as information can be
received from a number of devices, which may use different data structures to handle the
information.
Fortunately, a proposal for standardization of data structures used in smart grid applications has
recently been proposed to address this issue of data inter-operability.
Due to their large-scale deployment, smart grids suffer from several security
vulnerabilities. Since any security breach in smart grids may lead to a big loss, there
are initiatives to address security challenges in this type of systems.
On the other hand, key components for security in smart grids and presented an
authentication and integrity approach that used digital signatures and timestamps.
Recently identity-based cryptography was considered as good apparatus for secure
cloud computing and grid computing and proposed security architectures for smart
grid.
The security architectures that proposed and categorized as trusted computing based
architecture.
Two very basic cryptographic building blocks for the security of the Smart-Frame are identity-
based encryption and identity-based signature schemes.
Identity-based cryptography is to eliminate the requirement of checking the validity of
certificates in traditional public key infrastructure.
In an identity-based encryption scheme, the private key generator (PKG), a trusted party, first
generates secret master key m k and public parameter params.
Note that params, which is long-term, will be given to every party that is involved.
Once a receiver submits his/her identity, denoted by ID rec, the PKG computes the private key K
associated with ID rec ID rec by running the private key extraction algorithm Extract providing its
master secret key mk as input.
In this paper, we have introduced the Smart-Frame, a general framework for big data information
management in smart grids based on cloud computing technology.
Our basic idea is to set up cloud computing centers at three hierarchical levels to manage information: top,
regional, and end-user levels.
While each regional cloud center is in charge of processing and managing regional data, the top cloud level
provides a global view of the framework.
 Additionally, in order to support security for the framework, we Have presented a solution based on
identity-based cryptography and identity-based proxy re-encryption.
As a result, our proposed framework achieves not only scalability and flexibility but also security features.
We have implemented a proof-of-concept for our framework with a simple identity-based management for
data confidentiality.
Our immediate next step is to also support proxy re-encryption for the framework.
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to
secure distributed storage,” ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006.
[2] J. Baek, Q. Vu, A. Jones, S. Al-Mulla, and C. Yeun, “Smart-frame: A flexible, scalable, and secure information
management framework for smart grids,” in Proc. IEEE Int. Conf. Internet Technol. Secured Trans., 2012, pp. 668–
673.
[3] A. Bartoli, J. Hernandez-Serrano, M. Soriano, and M. Dohler, “Secure lossless aggregation for smart grid M2M
networks,” in Proc. IEEE Conf. Smart Grid Commun., 2010, pp. 333–338.
[4] K. P. Birman, L. Ganesh, and R. V. Renesse, “Running smart grid control software on cloud computing
architectures,” in Proc. Work- shop Comput. Needs Next Generation Electric Grid, 2011, pp. 1–33.
[5] Z. Bojkovic and B. Bakmaz, “Smart grid communications architecture: A survey and challenges,” in Proc. 11th Int.
Conf. Appl. Comput. Appl. Comput. Sci., 2012, pp. 83–89.
A secure cloud computing based framework for big data information management of smart grid
1 de 11

Recomendados

A secure cloud computing based framework for big information management syste... por
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...Pawan Arya
1.6K vistas32 diapositivas
Micro Grids and Smart grids for Canada and The world - analysis and trends - ... por
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...Micro Grids and Smart grids for Canada and The world - analysis and trends - ...
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...paul young cpa, cga
278 vistas12 diapositivas
Grid Computing (An Up-Coming Technology) por
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)LJ PROJECTS
1.5K vistas37 diapositivas
Grid computing por
Grid computingGrid computing
Grid computingDikshita_Viradia
11.6K vistas25 diapositivas
Grid Computing - Collection of computer resources from multiple locations por
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsDibyadip Das
4.3K vistas27 diapositivas
Grid protocol architecture por
Grid protocol architectureGrid protocol architecture
Grid protocol architecturePooja Dixit
2.2K vistas3 diapositivas

Más contenido relacionado

La actualidad más candente

Grid Computing por
Grid ComputingGrid Computing
Grid Computingabhiritva
1.5K vistas36 diapositivas
Grid computing ppt por
Grid computing pptGrid computing ppt
Grid computing pptricha chaudhary
14.8K vistas12 diapositivas
Computation grid as a connected world por
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected worldijcsa
2.8K vistas8 diapositivas
Grid computing por
Grid computingGrid computing
Grid computingWipro
2.1K vistas23 diapositivas
Challenges and advantages of grid computing por
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computingPooja Dixit
1.9K vistas5 diapositivas
GRID COMPUTING PRESENTATION por
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION Ashok Mannai
2.1K vistas16 diapositivas

La actualidad más candente(20)

Grid Computing por abhiritva
Grid ComputingGrid Computing
Grid Computing
abhiritva1.5K vistas
Computation grid as a connected world por ijcsa
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
ijcsa2.8K vistas
Grid computing por Wipro
Grid computingGrid computing
Grid computing
Wipro2.1K vistas
Challenges and advantages of grid computing por Pooja Dixit
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
Pooja Dixit1.9K vistas
GRID COMPUTING PRESENTATION por Ashok Mannai
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
Ashok Mannai2.1K vistas
Grid computing Seminar PPT por Upender Upr
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
Upender Upr78.7K vistas
Introduction of grid computing por Pooja Dixit
Introduction of grid computingIntroduction of grid computing
Introduction of grid computing
Pooja Dixit198 vistas
Grid computing por Keshab Nath
Grid computingGrid computing
Grid computing
Keshab Nath7.6K vistas
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr... por ijsrd.com
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
ijsrd.com391 vistas
Grid computing ppt 2003(done) por TASNEEM88
Grid computing ppt 2003(done)Grid computing ppt 2003(done)
Grid computing ppt 2003(done)
TASNEEM888.1K vistas
Monet, an IoT Energy Management Platform based on MongoDB por Sam_Francis
Monet, an IoT Energy Management Platform based on MongoDBMonet, an IoT Energy Management Platform based on MongoDB
Monet, an IoT Energy Management Platform based on MongoDB
Sam_Francis4.9K vistas
Domenico di mola_2023 i_iot_whole_190613 por domenico di mola
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
domenico di mola164 vistas

Destacado

A framework for secure healthcare systems based on big data analytics in mobi... por
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
856 vistas11 diapositivas
Selective Data Replication with Geographically Distributed Hadoop por
Selective Data Replication with Geographically Distributed HadoopSelective Data Replication with Geographically Distributed Hadoop
Selective Data Replication with Geographically Distributed HadoopDataWorks Summit
6.4K vistas26 diapositivas
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messages por
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messagesSînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messagesCodecamp Romania
386 vistas26 diapositivas
Programming Languages For The Cloud por
Programming Languages For The CloudProgramming Languages For The Cloud
Programming Languages For The CloudTed Leung
4.9K vistas71 diapositivas
Spurious correlation (updated) por
Spurious correlation (updated)Spurious correlation (updated)
Spurious correlation (updated)jemille6
25.9K vistas8 diapositivas
A Framework for Cloud Computing Adoption in South African Government por
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
3.2K vistas14 diapositivas

Destacado(20)

A framework for secure healthcare systems based on big data analytics in mobi... por ijasa
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...
ijasa856 vistas
Selective Data Replication with Geographically Distributed Hadoop por DataWorks Summit
Selective Data Replication with Geographically Distributed HadoopSelective Data Replication with Geographically Distributed Hadoop
Selective Data Replication with Geographically Distributed Hadoop
DataWorks Summit6.4K vistas
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messages por Codecamp Romania
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messagesSînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Codecamp Romania386 vistas
Programming Languages For The Cloud por Ted Leung
Programming Languages For The CloudProgramming Languages For The Cloud
Programming Languages For The Cloud
Ted Leung4.9K vistas
Spurious correlation (updated) por jemille6
Spurious correlation (updated)Spurious correlation (updated)
Spurious correlation (updated)
jemille625.9K vistas
A Framework for Cloud Computing Adoption in South African Government por GovCloud Network
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
GovCloud Network3.2K vistas
Power Line Carrier Communication por Neha Gethe
Power Line Carrier CommunicationPower Line Carrier Communication
Power Line Carrier Communication
Neha Gethe8.4K vistas
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int... por jemille6
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
jemille62.8K vistas
Introduction to phasor measurements units (pm us) por Supriya Senapati
Introduction to phasor measurements units (pm us)Introduction to phasor measurements units (pm us)
Introduction to phasor measurements units (pm us)
Supriya Senapati1.4K vistas
Challenges of phasor measurement units por sarasijdas
Challenges of phasor measurement unitsChallenges of phasor measurement units
Challenges of phasor measurement units
sarasijdas8.4K vistas
T8 hypothesis testing por kompellark
T8 hypothesis testingT8 hypothesis testing
T8 hypothesis testing
kompellark1.4K vistas
Role of phasor measuring unit in power system por HASEENA. M
Role of phasor measuring unit in power systemRole of phasor measuring unit in power system
Role of phasor measuring unit in power system
HASEENA. M6.2K vistas
Severe Testing: The Key to Error Correction por jemille6
Severe Testing: The Key to Error CorrectionSevere Testing: The Key to Error Correction
Severe Testing: The Key to Error Correction
jemille69.2K vistas
SmartGrid System Report por Gruene-it.org
SmartGrid System ReportSmartGrid System Report
SmartGrid System Report
Gruene-it.org7.3K vistas
Plcc ppt1 por Sunny Gupta
Plcc ppt1Plcc ppt1
Plcc ppt1
Sunny Gupta24.5K vistas
powerline communication system por Ahmed Hassan
powerline communication systempowerline communication system
powerline communication system
Ahmed Hassan7.1K vistas
Power Line Carrier Communication seminar por Aishwary Verma
Power Line Carrier Communication seminarPower Line Carrier Communication seminar
Power Line Carrier Communication seminar
Aishwary Verma17.4K vistas
Energy Industry Trends by Jonathan Tan, GZZ Cleantech Consulting por Jonathan L. Tan, M.B.A.
Energy Industry Trends  by Jonathan Tan, GZZ Cleantech ConsultingEnergy Industry Trends  by Jonathan Tan, GZZ Cleantech Consulting
Energy Industry Trends by Jonathan Tan, GZZ Cleantech Consulting

Similar a A secure cloud computing based framework for big data information management of smart grid

Proposed system for data security in distributed computing in using triple d... por
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
2 vistas10 diapositivas
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY por
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
501 vistas8 diapositivas
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal... por
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
44 vistas6 diapositivas
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co... por
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
28 vistas4 diapositivas
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
57 vistas8 diapositivas
Confidential Computing in Edge- Cloud Hierarchy por
Confidential Computing in Edge- Cloud HierarchyConfidential Computing in Edge- Cloud Hierarchy
Confidential Computing in Edge- Cloud HierarchyAIRCC Publishing Corporation
3 vistas10 diapositivas

Similar a A secure cloud computing based framework for big data information management of smart grid(20)

Proposed system for data security in distributed computing in using triple d... por IJECEIAES
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
IJECEIAES2 vistas
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY por Shakas Technologies
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies501 vistas
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal... por IJERA Editor
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor44 vistas
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co... por IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal28 vistas
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 vistas
Secure sensitive data sharing on a big data platform por Nexgen Technology
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Nexgen Technology 1.7K vistas
Secure sensitive data sharing on a big data platform por Nexgen Technology
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Nexgen Technology 404 vistas
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por IRJET Journal
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal15 vistas
Privacy and Integrity Preserving in Cloud Storage Devices por IOSR Journals
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals342 vistas
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE por IJNSA Journal
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal1.4K vistas
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE por IJNSA Journal
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal15 vistas
Iaetsd enhancement of performance and security in bigdata processing por Iaetsd Iaetsd
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd Iaetsd59 vistas
Secure hash based distributed framework for utpc based cloud authorization por IAEME Publication
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication492 vistas
Secure hash based distributed framework for utpc based cloud authorization por IAEME Publication
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication783 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... por IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD 246 vistas
4.report (cryptography & computer network) por JIEMS Akkalkuwa
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa169 vistas

Más de Nexgen Technology

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
130 vistas18 diapositivas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
34 vistas11 diapositivas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
120 vistas20 diapositivas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
40 vistas7 diapositivas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
98 vistas7 diapositivas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
81 vistas11 diapositivas

Más de Nexgen Technology (20)

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 130 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 34 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 120 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 40 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 98 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 81 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH... por Nexgen Technology
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
Nexgen Technology 150 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN... por Nexgen Technology
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
Nexgen Technology 78 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 106 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 103 vistas
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA... por Nexgen Technology
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Nexgen Technology 77 vistas
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai por Nexgen Technology
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Nexgen Technology 84 vistas
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics por Nexgen Technology
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Nexgen Technology 82 vistas
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen... por Nexgen Technology
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year... por Nexgen Technology
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Nexgen Technology 79 vistas
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr... por Nexgen Technology
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Nexgen Technology 81 vistas
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce... por Nexgen Technology
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology 116 vistas
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes... por Nexgen Technology
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology 103 vistas
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje... por Nexgen Technology
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Nexgen Technology 80 vistas
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best... por Nexgen Technology
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Nexgen Technology 84 vistas

Último

Volf work.pdf por
Volf work.pdfVolf work.pdf
Volf work.pdfMariaKenney3
90 vistas43 diapositivas
ANGULARJS.pdf por
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdfArthyR3
52 vistas10 diapositivas
Guess Papers ADC 1, Karachi University por
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi UniversityKhalid Aziz
105 vistas17 diapositivas
REFERENCING, CITATION.pptx por
REFERENCING, CITATION.pptxREFERENCING, CITATION.pptx
REFERENCING, CITATION.pptxabhisrivastava11
41 vistas26 diapositivas
DISTILLATION.pptx por
DISTILLATION.pptxDISTILLATION.pptx
DISTILLATION.pptxAnupkumar Sharma
75 vistas47 diapositivas
Papal.pdf por
Papal.pdfPapal.pdf
Papal.pdfMariaKenney3
73 vistas24 diapositivas

Último(20)

ANGULARJS.pdf por ArthyR3
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdf
ArthyR352 vistas
Guess Papers ADC 1, Karachi University por Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz105 vistas
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... por Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
Retail Store Scavenger Hunt.pptx por jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15453 vistas
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 por MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice por Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste52 vistas
Introduction to AERO Supply Chain - #BEAERO Trainning program por Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih123 vistas
EILO EXCURSION PROGRAMME 2023 por info33492
EILO EXCURSION PROGRAMME 2023EILO EXCURSION PROGRAMME 2023
EILO EXCURSION PROGRAMME 2023
info33492208 vistas
INT-244 Topic 6b Confucianism por S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer49 vistas
11.30.23A Poverty and Inequality in America.pptx por mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239181 vistas

A secure cloud computing based framework for big data information management of smart grid

  • 1.  A SECURE CLOUD COMPUTING BASED FRAMEWORK FOR BIG DATA INFORMATION MANAGEMENT OF SMART GRID
  • 2. Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services. It plays a crucial role in modern energy infrastructure. The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters efficiently; and how to process a huge amount of data received from these devices. Cloud computing, a technology that provides computational resources on demands, is a good candidate to address these challenges since it has several good properties such as energy saving, cost saving, agility, scalability, and flexibility. In this paper, we propose a secure cloud computing based framework for big data information management in smart grids, which we call “Smart-Frame.”
  • 3. The main idea of our framework is to build a hierarchical structure of cloud computing centers to provide different types of computing services for information management and big data analysis. In addition to this structural framework, we present a security solution based on identity-based encryption, signature and proxy re-encryption to address critical security issues of the proposed framework.
  • 4.  Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services.  It plays a crucial role in modern energy infrastructure.  The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters efficiently; and how to process a huge amount of data received from these devices.
  • 5. In this paper, we propose a secure cloud computing based framework for big data information management in smart grids, which we call “Smart-Frame.” The main idea of our framework is to build a hierarchical structure of cloud computing centers to provide different types of computing services for information management and big data analysis. In addition to this structural framework, we present a security solution based on identity-based encryption, signature and proxy re-encryption to address critical security issues of the proposed framework.
  • 6.  Smart Grid Information Management Smart grid information management usually involves three basic tasks: information gathering, information processing, and information storing. For information gathering, since smart grids have to collect information from heterogeneous devices at different locations, the main research challenge is to build efficient communication architecture. Several solutions have been proposed to address this challenge and most of them can be found in the recent surveys. In terms of information processing, data integration also lays a challenge as information can be received from a number of devices, which may use different data structures to handle the information. Fortunately, a proposal for standardization of data structures used in smart grid applications has recently been proposed to address this issue of data inter-operability.
  • 7. Due to their large-scale deployment, smart grids suffer from several security vulnerabilities. Since any security breach in smart grids may lead to a big loss, there are initiatives to address security challenges in this type of systems. On the other hand, key components for security in smart grids and presented an authentication and integrity approach that used digital signatures and timestamps. Recently identity-based cryptography was considered as good apparatus for secure cloud computing and grid computing and proposed security architectures for smart grid. The security architectures that proposed and categorized as trusted computing based architecture.
  • 8. Two very basic cryptographic building blocks for the security of the Smart-Frame are identity- based encryption and identity-based signature schemes. Identity-based cryptography is to eliminate the requirement of checking the validity of certificates in traditional public key infrastructure. In an identity-based encryption scheme, the private key generator (PKG), a trusted party, first generates secret master key m k and public parameter params. Note that params, which is long-term, will be given to every party that is involved. Once a receiver submits his/her identity, denoted by ID rec, the PKG computes the private key K associated with ID rec ID rec by running the private key extraction algorithm Extract providing its master secret key mk as input.
  • 9. In this paper, we have introduced the Smart-Frame, a general framework for big data information management in smart grids based on cloud computing technology. Our basic idea is to set up cloud computing centers at three hierarchical levels to manage information: top, regional, and end-user levels. While each regional cloud center is in charge of processing and managing regional data, the top cloud level provides a global view of the framework.  Additionally, in order to support security for the framework, we Have presented a solution based on identity-based cryptography and identity-based proxy re-encryption. As a result, our proposed framework achieves not only scalability and flexibility but also security features. We have implemented a proof-of-concept for our framework with a simple identity-based management for data confidentiality. Our immediate next step is to also support proxy re-encryption for the framework.
  • 10. [1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006. [2] J. Baek, Q. Vu, A. Jones, S. Al-Mulla, and C. Yeun, “Smart-frame: A flexible, scalable, and secure information management framework for smart grids,” in Proc. IEEE Int. Conf. Internet Technol. Secured Trans., 2012, pp. 668– 673. [3] A. Bartoli, J. Hernandez-Serrano, M. Soriano, and M. Dohler, “Secure lossless aggregation for smart grid M2M networks,” in Proc. IEEE Conf. Smart Grid Commun., 2010, pp. 333–338. [4] K. P. Birman, L. Ganesh, and R. V. Renesse, “Running smart grid control software on cloud computing architectures,” in Proc. Work- shop Comput. Needs Next Generation Electric Grid, 2011, pp. 1–33. [5] Z. Bojkovic and B. Bakmaz, “Smart grid communications architecture: A survey and challenges,” in Proc. 11th Int. Conf. Appl. Comput. Appl. Comput. Sci., 2012, pp. 83–89.