SlideShare uma empresa Scribd logo
1 de 32
A Secure Cloud Computing Based
Framework for Big Data Information
Management of Smart Grid
Presented by:
Pavan B
Network and Internet Engineering
Dept of ISE
Jain University Bangalore
INTRODUCTION
• Smart grid is a technological innovation that improves
efficiency, reliability, economics, and sustainability of
electricity services. It plays a crucial role in modern energy
infrastructure.
• The main challenges of smart grids, are how to manage
different types of front-end intelligent devices such as smart
meters efficiently.
• How to process a huge amount of data received from these
devices.
• Cloud computing, a technology that provides computational
resources on demands, is a good candidate to address these
challenges.
• It has several good properties such as energy saving, cost
saving, agility, scalability, and flexibility.
• The main idea of our framework is to build a hierarchical
structure of cloud computing centers to provide different
types of computing services for information management and
big data analysis.
• In addition to this framework, a security solution based on
identity-based encryption, signature and proxy re-encryption
added to address critical security issues of the proposed
framework.
• Smart Grids have recently been adopted by many countries,
replacing traditional power grids.
 Ex: The ENEL Telegestore project in Italy, is the first
commercial project using smart grid technology, & it’s annual
savings of approximately 500 million Euros.
 Hydro One project in Canada,
 The Evora InovGrid project in Portugal, and
 The Moma project in Germany.
• There are several challenges that prevent smart grids
deployment at a larger scale one of which is
 Information management that is related to information
gathering, information storing, and information processing.
 The estimation of amount of data required to process
transactions of 2 million customers could reach 22 gigabytes
per day.
 Any delay may cause a serious consequence in the whole
system which has to be avoided as much as possible.
Assistance from Cloud Computing
• Cloud computing has become popular recently due to several
advantages over traditional computing models.
• By employing cloud computing in smart grids, we not only
address the issue of large information management but also
provide a high energy and cost saving platform.
• Our basic idea is to build the framework at three hierarchical
levels: top, regional, and end- user levels in which the first
two levels consist of cloud computing centres while the last
level contains end-user smart devices
• The top cloud computing center takes responsibility of
managing general devices and accumulation of data across
the regional cloud computing centers
• The regional cloud computing centers are in turn in charge of
managing intelligent devices smart meters.
• In each of these cloud computing centers, the following cloud
computing services could be deployed, which are
 Infrastructure-as-a-service (IaaS).
 Software-as-a-service (SaaS).
 Platform-as-a-service (PaaS).
 Data-as-a-service (DaaS).
• Infrastructure-as-a-service (IaaS)
This type of service forms the backbone of the system. It helps
to provide resources on demand for all applications and
services deployed in the system.
Main tasks of information management in smart grids such as
information gathering, information processing, and
information storing, are all executed inside this layer of
service.
• Platform-as-a-service (PaaS)
PaaS provides tools and libraries to develop cloud computing
applications and services.
• Software-as-a-service (SaaS)
While IaaS is the back- bone of the system, all smart grid
services will be deployed as SaaS at the top of the system.
Ex: services that save & optimize the energy usage such as
Google Power Meter
• Data-as-a-service (DaaS)
DaaS could be deployed to provide useful information for
statistics purpose.
It provide such statistics services for users. These are also
used to optimize electricity providers at different levels.
Basic Identity-Based Cryptographic
Schemes
• a security solution for the framework based on identity-based
encryption (IBE) and signature, and identity-based proxy re-
encryption.
• Providing information security for smart grids is very
important since much of the information in smart grids is
sensitive and needs to be strictly protected.
• Information leakage in smart grids can lead to vulnerabilities
that affect not only individuals but also the whole nation.
• The main idea of our security solution for the Smart-Frame is
to allow all the involved entities, i.e., top and regional cloud
computing centers and end-users to be represented by their
identities which can be used as encryption keys or signature
verification keys.
•
• The entities in the lower level can use the identities of higher-
level entities to encrypt the data for secure communication
with the entities in the higher level.
• For example, the regional centers use the top cloud’s entity to
encrypt their messages.
• By employing an identity-based re- encryption scheme, the
information storages, which are components of regional
clouds, can re-encrypt the received confidential data from the
end-user devices so that services requested by the end-users
decrypt and process the confidential data without
compromising the information storages’ private keys.
• Two very basic cryptographic building blocks for the security
of the Smart-Frame are identity-based encryption and
identity-based signature schemes.
• In an identity-based encryption scheme, the private key gen-
erator (PKG), a trusted party, first generates secret master key
mk and public parameter params.
• Once a receiver submits his/her identity, denoted by IDrec,
the PKG computes the private key KIDrec associated with IDrec
by running the private key extraction algorithm.
Identity-Based Encryption
• Here,the identity IDrec can be any string such as an email
address, a telephone number, etc.
• Users would authenticate themselves to the PKG and obtain
private keys (KIDrec) associated with their identities.
Identity-Based Signature
• An identity-based signature scheme has described as when
the signer submits his/her identity IDsig, the PKG computes
the private key KIDsig associated with IDsig by running the
Extract with the master secret mk.
• Using KIDsig, the signer can sign a message M to create a
corresponding signature s by running the Sign algorithm.
• Note that both IBE and IBS avoid the use of digital certificates
Security of Smart-Frame Supported by
Identity-Based Cryptography
• Security is a major concern in the smart grids. public key
cryptography requires high cost for maintaining PKI public key
infrastructure and it is difficult to deploy widely.
• Identity-based cryptography can be a good solution.
• Identity-based cryptography has several advantages in regards
to the Smart-Frame security over public key cyrptography.
• We assume that the PKG is a national level fully trusted party.
• The PKG can issue private keys for top and regional clouds,
and end-users when they register.
• The top cloud, regional clouds and end-users (smart meters at
home) are identified by unique strings such as Email Ids or
telephone numbers, which are used as encryption keys or
signature verification keys.
• Each entity will obtain a private key KIDrec associated with its
identity IDrec, so it can decrypt the confidential data.
• Each entity will send confidential data to the entity which is
only one-level higher. That is, end-users send data to the
regional cloud entities.
• Each entity will authenticate data using the private key KIDrec
obtained from the PKG.
• At the top of the hierarchy is the top cloud, which consists of
power stations, distribution services or management services.
• The regional clouds that consist of general user services and
information storages.
• smart (intelligent) end-user devices which are at the bottom
of the hierarchy.
• Based on the principle of IB cryptography, the PKG will
generate private keys for top cloud and any entities in regional
clouds and end-users.
• Using their identifiers and private keys, each entity can utilize
IBE schemes to secure information flow
Logical Component View of Smart Grids
• There are four main functional clusters
• Information storages: These are main storages keeping all
smart grid information received from front-end intelligent
devices.
• General user services: This consists of all services an
electricity user needs to use.
Examples are monitor, control or optimize the electric usage
services. The majority of SaaS fall into this type of service.
• Control and management services: This type of services
includes all services needed for system management such as
governance service, monitoring service, task scheduling
service, and security service.
• Electricity distribution services: This type of services is directly
related to electricity distribution. Examples are distribution
management service, optimization service, and quality of
service measurement.
Information Flow Management
• Since smart grids need to handle huge amount of data, it is
extremely important to manage information flows efficiently.
• In the Smart-Frame, we suggest a centralized service to
manage information flows.
• This service takes inputs as both information requests from
service clusters and general statistics (e.g., the amount of
information, time of arrival) from information storages.
• Using these inputs, the service generates an information flow
schedule, which specifies sources and destinations of
information flows.
• Both information storages and services clusters need to follow
this schedule for execution.
Figure below shows information flow schedule.
Thank You !!

Mais conteúdo relacionado

Mais procurados

Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)Chinedu Opara
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundanKundan Kumar
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Tia 942 Data Center Standards
Tia 942 Data Center StandardsTia 942 Data Center Standards
Tia 942 Data Center StandardsSri Chalasani
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosisM Reza Rahmati
 
smart Grid
smart Gridsmart Grid
smart Gridmkanth
 
Power qualty conditioners
Power qualty conditionersPower qualty conditioners
Power qualty conditionersSudhanshu Goel
 
Smart Charging: How to scale adoption
Smart Charging: How to scale adoption  Smart Charging: How to scale adoption
Smart Charging: How to scale adoption accenture
 
Interconnection issue in microgrid
Interconnection issue in microgridInterconnection issue in microgrid
Interconnection issue in microgridAmarjeet S Pandey
 
Artificial intelligence in power system
Artificial intelligence in power systemArtificial intelligence in power system
Artificial intelligence in power systemBittu Goswami
 
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSEAUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSEBitan Das
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart citysanalkumar k
 
Wide Area Monitoring System WAMS & Applications
Wide Area Monitoring System WAMS & ApplicationsWide Area Monitoring System WAMS & Applications
Wide Area Monitoring System WAMS & ApplicationsPower System Operation
 

Mais procurados (20)

Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundan
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Tia 942 Data Center Standards
Tia 942 Data Center StandardsTia 942 Data Center Standards
Tia 942 Data Center Standards
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
 
Smart grid
Smart gridSmart grid
Smart grid
 
smart Grid
smart Gridsmart Grid
smart Grid
 
Power qualty conditioners
Power qualty conditionersPower qualty conditioners
Power qualty conditioners
 
Smart Charging: How to scale adoption
Smart Charging: How to scale adoption  Smart Charging: How to scale adoption
Smart Charging: How to scale adoption
 
Interconnection issue in microgrid
Interconnection issue in microgridInterconnection issue in microgrid
Interconnection issue in microgrid
 
Artificial intelligence in power system
Artificial intelligence in power systemArtificial intelligence in power system
Artificial intelligence in power system
 
Smart Grid ppt
Smart Grid pptSmart Grid ppt
Smart Grid ppt
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid
 
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSEAUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
AUTOMATIC ENERGY METER READING SYSTEM FOR BILLING PURPOSE
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
Micro-grid
Micro-gridMicro-grid
Micro-grid
 
The Smart Grid
The Smart GridThe Smart Grid
The Smart Grid
 
Wide Area Monitoring System WAMS & Applications
Wide Area Monitoring System WAMS & ApplicationsWide Area Monitoring System WAMS & Applications
Wide Area Monitoring System WAMS & Applications
 
Substation
SubstationSubstation
Substation
 

Destaque

A secure cloud computing based framework for big data information management ...
A secure cloud computing based framework for big data information management ...A secure cloud computing based framework for big data information management ...
A secure cloud computing based framework for big data information management ...Nexgen Technology
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
 
Selective Data Replication with Geographically Distributed Hadoop
Selective Data Replication with Geographically Distributed HadoopSelective Data Replication with Geographically Distributed Hadoop
Selective Data Replication with Geographically Distributed HadoopDataWorks Summit
 
CCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportCCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportMark Cain
 
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messagesSînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messagesCodecamp Romania
 
Programming Languages For The Cloud
Programming Languages For The CloudProgramming Languages For The Cloud
Programming Languages For The CloudTed Leung
 
ITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU
 
g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008guest462d7
 
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...Ryousei Takano
 
Benefits of Grid Computing in the Cloud
Benefits of Grid Computing in the CloudBenefits of Grid Computing in the Cloud
Benefits of Grid Computing in the CloudRightScale
 
Presentation grid cloud computing
Presentation grid cloud computingPresentation grid cloud computing
Presentation grid cloud computingsebky adil adil
 
Spurious correlation (updated)
Spurious correlation (updated)Spurious correlation (updated)
Spurious correlation (updated)jemille6
 
UCGEC Smart Grid Seminar Ii
UCGEC Smart Grid Seminar IiUCGEC Smart Grid Seminar Ii
UCGEC Smart Grid Seminar IiMartin Kurtovich
 
HDFS for Geographically Distributed File System
HDFS for Geographically Distributed File SystemHDFS for Geographically Distributed File System
HDFS for Geographically Distributed File SystemKonstantin V. Shvachko
 
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...jemille6
 

Destaque (20)

A secure cloud computing based framework for big data information management ...
A secure cloud computing based framework for big data information management ...A secure cloud computing based framework for big data information management ...
A secure cloud computing based framework for big data information management ...
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...
 
Selective Data Replication with Geographically Distributed Hadoop
Selective Data Replication with Geographically Distributed HadoopSelective Data Replication with Geographically Distributed Hadoop
Selective Data Replication with Geographically Distributed Hadoop
 
CCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress ReportCCAF Criminal Justice Web Progress Report
CCAF Criminal Justice Web Progress Report
 
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messagesSînică Alboaie - Programming for cloud computing Flows of asynchronous messages
Sînică Alboaie - Programming for cloud computing Flows of asynchronous messages
 
Programming Languages For The Cloud
Programming Languages For The CloudProgramming Languages For The Cloud
Programming Languages For The Cloud
 
ITU-T Study Group 13 Introduction
ITU-T Study Group 13 IntroductionITU-T Study Group 13 Introduction
ITU-T Study Group 13 Introduction
 
g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008
 
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Benefits of Grid Computing in the Cloud
Benefits of Grid Computing in the CloudBenefits of Grid Computing in the Cloud
Benefits of Grid Computing in the Cloud
 
Presentation grid cloud computing
Presentation grid cloud computingPresentation grid cloud computing
Presentation grid cloud computing
 
What is a Smart Machine?
What is a Smart Machine?What is a Smart Machine?
What is a Smart Machine?
 
Spurious correlation (updated)
Spurious correlation (updated)Spurious correlation (updated)
Spurious correlation (updated)
 
UCGEC Smart Grid Seminar Ii
UCGEC Smart Grid Seminar IiUCGEC Smart Grid Seminar Ii
UCGEC Smart Grid Seminar Ii
 
HDFS for Geographically Distributed File System
HDFS for Geographically Distributed File SystemHDFS for Geographically Distributed File System
HDFS for Geographically Distributed File System
 
Data mining
Data miningData mining
Data mining
 
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
Surrogate Science: How Fisher, Neyman-Pearson, and Bayes Were Transformed int...
 

Semelhante a A secure cloud computing based framework for big information management system for smart grid

12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptxdrth5
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory CouncilDESMOND YUEN
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart CityFanky Christian
 
Smart Grid, Smart Metering and Cybersecurity
Smart Grid, Smart Metering and CybersecuritySmart Grid, Smart Metering and Cybersecurity
Smart Grid, Smart Metering and CybersecurityDavid Wallom
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Infosys
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewSudiptaDas684406
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for UtilitiesSteve Lennon
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...RahulJain989779
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Bharath Kumar
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 

Semelhante a A secure cloud computing based framework for big information management system for smart grid (20)

12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge comp
Edge compEdge comp
Edge comp
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart Grid, Smart Metering and Cybersecurity
Smart Grid, Smart Metering and CybersecuritySmart Grid, Smart Metering and Cybersecurity
Smart Grid, Smart Metering and Cybersecurity
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, Overview
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for Utilities
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

A secure cloud computing based framework for big information management system for smart grid

  • 1. A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid Presented by: Pavan B Network and Internet Engineering Dept of ISE Jain University Bangalore
  • 2. INTRODUCTION • Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services. It plays a crucial role in modern energy infrastructure. • The main challenges of smart grids, are how to manage different types of front-end intelligent devices such as smart meters efficiently.
  • 3. • How to process a huge amount of data received from these devices. • Cloud computing, a technology that provides computational resources on demands, is a good candidate to address these challenges. • It has several good properties such as energy saving, cost saving, agility, scalability, and flexibility.
  • 4. • The main idea of our framework is to build a hierarchical structure of cloud computing centers to provide different types of computing services for information management and big data analysis. • In addition to this framework, a security solution based on identity-based encryption, signature and proxy re-encryption added to address critical security issues of the proposed framework.
  • 5. • Smart Grids have recently been adopted by many countries, replacing traditional power grids.  Ex: The ENEL Telegestore project in Italy, is the first commercial project using smart grid technology, & it’s annual savings of approximately 500 million Euros.  Hydro One project in Canada,  The Evora InovGrid project in Portugal, and  The Moma project in Germany.
  • 6. • There are several challenges that prevent smart grids deployment at a larger scale one of which is  Information management that is related to information gathering, information storing, and information processing.  The estimation of amount of data required to process transactions of 2 million customers could reach 22 gigabytes per day.  Any delay may cause a serious consequence in the whole system which has to be avoided as much as possible.
  • 7. Assistance from Cloud Computing • Cloud computing has become popular recently due to several advantages over traditional computing models. • By employing cloud computing in smart grids, we not only address the issue of large information management but also provide a high energy and cost saving platform. • Our basic idea is to build the framework at three hierarchical levels: top, regional, and end- user levels in which the first two levels consist of cloud computing centres while the last level contains end-user smart devices
  • 8.
  • 9. • The top cloud computing center takes responsibility of managing general devices and accumulation of data across the regional cloud computing centers • The regional cloud computing centers are in turn in charge of managing intelligent devices smart meters. • In each of these cloud computing centers, the following cloud computing services could be deployed, which are  Infrastructure-as-a-service (IaaS).  Software-as-a-service (SaaS).  Platform-as-a-service (PaaS).  Data-as-a-service (DaaS).
  • 10. • Infrastructure-as-a-service (IaaS) This type of service forms the backbone of the system. It helps to provide resources on demand for all applications and services deployed in the system. Main tasks of information management in smart grids such as information gathering, information processing, and information storing, are all executed inside this layer of service. • Platform-as-a-service (PaaS) PaaS provides tools and libraries to develop cloud computing applications and services.
  • 11. • Software-as-a-service (SaaS) While IaaS is the back- bone of the system, all smart grid services will be deployed as SaaS at the top of the system. Ex: services that save & optimize the energy usage such as Google Power Meter • Data-as-a-service (DaaS) DaaS could be deployed to provide useful information for statistics purpose. It provide such statistics services for users. These are also used to optimize electricity providers at different levels.
  • 12. Basic Identity-Based Cryptographic Schemes • a security solution for the framework based on identity-based encryption (IBE) and signature, and identity-based proxy re- encryption. • Providing information security for smart grids is very important since much of the information in smart grids is sensitive and needs to be strictly protected. • Information leakage in smart grids can lead to vulnerabilities that affect not only individuals but also the whole nation.
  • 13. • The main idea of our security solution for the Smart-Frame is to allow all the involved entities, i.e., top and regional cloud computing centers and end-users to be represented by their identities which can be used as encryption keys or signature verification keys. • • The entities in the lower level can use the identities of higher- level entities to encrypt the data for secure communication with the entities in the higher level. • For example, the regional centers use the top cloud’s entity to encrypt their messages.
  • 14. • By employing an identity-based re- encryption scheme, the information storages, which are components of regional clouds, can re-encrypt the received confidential data from the end-user devices so that services requested by the end-users decrypt and process the confidential data without compromising the information storages’ private keys.
  • 15. • Two very basic cryptographic building blocks for the security of the Smart-Frame are identity-based encryption and identity-based signature schemes. • In an identity-based encryption scheme, the private key gen- erator (PKG), a trusted party, first generates secret master key mk and public parameter params. • Once a receiver submits his/her identity, denoted by IDrec, the PKG computes the private key KIDrec associated with IDrec by running the private key extraction algorithm.
  • 17. • Here,the identity IDrec can be any string such as an email address, a telephone number, etc. • Users would authenticate themselves to the PKG and obtain private keys (KIDrec) associated with their identities.
  • 19. • An identity-based signature scheme has described as when the signer submits his/her identity IDsig, the PKG computes the private key KIDsig associated with IDsig by running the Extract with the master secret mk. • Using KIDsig, the signer can sign a message M to create a corresponding signature s by running the Sign algorithm. • Note that both IBE and IBS avoid the use of digital certificates
  • 20. Security of Smart-Frame Supported by Identity-Based Cryptography • Security is a major concern in the smart grids. public key cryptography requires high cost for maintaining PKI public key infrastructure and it is difficult to deploy widely. • Identity-based cryptography can be a good solution. • Identity-based cryptography has several advantages in regards to the Smart-Frame security over public key cyrptography.
  • 21. • We assume that the PKG is a national level fully trusted party. • The PKG can issue private keys for top and regional clouds, and end-users when they register. • The top cloud, regional clouds and end-users (smart meters at home) are identified by unique strings such as Email Ids or telephone numbers, which are used as encryption keys or signature verification keys.
  • 22. • Each entity will obtain a private key KIDrec associated with its identity IDrec, so it can decrypt the confidential data. • Each entity will send confidential data to the entity which is only one-level higher. That is, end-users send data to the regional cloud entities. • Each entity will authenticate data using the private key KIDrec obtained from the PKG.
  • 23.
  • 24. • At the top of the hierarchy is the top cloud, which consists of power stations, distribution services or management services. • The regional clouds that consist of general user services and information storages. • smart (intelligent) end-user devices which are at the bottom of the hierarchy.
  • 25. • Based on the principle of IB cryptography, the PKG will generate private keys for top cloud and any entities in regional clouds and end-users. • Using their identifiers and private keys, each entity can utilize IBE schemes to secure information flow
  • 26. Logical Component View of Smart Grids
  • 27. • There are four main functional clusters • Information storages: These are main storages keeping all smart grid information received from front-end intelligent devices. • General user services: This consists of all services an electricity user needs to use. Examples are monitor, control or optimize the electric usage services. The majority of SaaS fall into this type of service.
  • 28. • Control and management services: This type of services includes all services needed for system management such as governance service, monitoring service, task scheduling service, and security service. • Electricity distribution services: This type of services is directly related to electricity distribution. Examples are distribution management service, optimization service, and quality of service measurement.
  • 29. Information Flow Management • Since smart grids need to handle huge amount of data, it is extremely important to manage information flows efficiently. • In the Smart-Frame, we suggest a centralized service to manage information flows. • This service takes inputs as both information requests from service clusters and general statistics (e.g., the amount of information, time of arrival) from information storages.
  • 30. • Using these inputs, the service generates an information flow schedule, which specifies sources and destinations of information flows. • Both information storages and services clusters need to follow this schedule for execution. Figure below shows information flow schedule.
  • 31.