Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-42gr6 Total loading time: 0 Render date: 2024-04-23T23:46:52.555Z Has data issue: false hasContentIssue false

10 - Cloud-Based Security and Privacy

from Part II - Cloud Computing Applications for Smart Grid

Published online by Cambridge University Press:  20 October 2018

Sudip Misra
Affiliation:
Indian Institute of Technology, Kharagpur
Samaresh Bera
Affiliation:
Indian Institute of Technology, Kharagpur
Get access

Summary

Smart grid is essentially a cyber-physical system (CPS) integrated with electric distribution supported with bi-directional communication networks. To support the communication and computing requirements, third party service providers are also expected to participate. Consequently, the third party service providers also access customers’ information that is sent through smart meters and backbone networks. As a result, the smart grid system should have appropriate security and privacy policies to secure the smart meters data and other components from unauthorized access. It is a challenging issue to secure the smart grid from cyber attacks in the presence of online connectivity of all components with the Internet [1]. Among different threats that are present in the smart grid in terms of security, energy theft is one of the most important issues to consider. The intruder can access the control point of the smart meters, and thereby, modify real-time information to change energy consumption information reported to utility providers. Therefore, adequate security policies are needed to deal with such issues. In this chapter, we will discuss general security requirements in a communication network. Then specific security issues present in the smart grid and their remedies are discussed.

Security in Data Communication

In data communication, at least two parties (the sender and the receiver) are involved in message exchange. The sender sends a message for an intended receiver. On receiving the message, the receiver takes adequate actions or decisions. In such a scenario, if the sender sends the message directly to the receiver, it may happen that the message is modified or accessed by an attacker. However, the receiver assumes that the received message is the original one sent by the sender. Additionally, it may also happen that an attacker uses the sender's identity to send malicious data to the receiver. Finally, after sending a message, the sender should not be able to repudiate the sent message. Therefore, it is required to implement security mechanisms to prevent such incidents. For example, in banking transactions, appropriate security mechanisms should be in place so that no one other than the actual user can withdraw money. In this chapter, we focus on the cryptography-based security aspects in data communication instead of focusing on other aspects such as intrusion detection and denial-of-service (DoS) attacks. The basic terms used in security are as follows.

Type
Chapter
Information
Smart Grid Technology
A Cloud Computing and Data Management Approach
, pp. 147 - 166
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×