Securing smart grid data under key exposure and revocation in cloud computing

被引:0
|
作者
Navya, J. M. [1 ]
Sanjay, H. A. [2 ]
Deepika, K. M. [2 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci Engn, Bangalore, Karnataka, India
[2] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore, Karnataka, India
关键词
CP-ABE; cloud supported IoT; smart grid; revocation; key exposure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid systems data has been exposed to several threats and attacks from different perspectives and have resulted in several system failures. Obtaining security of data and key exposure and enhancing system ability in data collection and transmission process are challenging, on the grounds smart grid data is sensitive and enormous sum. In this paper we introduce smart grid data security method along with advanced Cipher text policy attribute based encryption (CP-ABE). Cloud supported IoT is widely used in smart grid systems. Smart IoT devices collect data and perform status management. Data obtained from the IOT devices will be divided into blocks and encrypted data will be stored in different cloud server with different encrypted keys even when one cloud server is assaulted and encrypted key is exposed data cannot be decrypted, thereby the transmission and encryption process are done in correspondingly. We protect access-tree structure information even after the data is shared to user by solving revocation problem in which cloud will inform data owner to revoke and update encryption key after user has downloaded the data, which preserves the data privacy from unauthorized users. The analysis of the system concludes that our proposed system can meet the security requirements in smart grid systems along with cloud-Internet of things
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Mobile Sensor Cloud Computing Controlling and Securing Data Processing Over Smart Environment through Mobile Sensor Cloud Computing (MSCC)
    Kumar, Ranbijay
    Rajalakshmi, S.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 687 - 694
  • [22] ENCRYPTION AS A SERVICE FOR SECURING DATA IN MOBILE CLOUD COMPUTING
    Mouhib, Ibtihal
    Driss, El Ouadghiri
    Zine-Dine, Khalid
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 546 - 550
  • [23] Efficient Revocation on Identity based Encryption with Public Key Infrastructure in Cloud Computing
    Sale, Nitin
    Talhar, Nitin
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [24] Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid
    Jiang, Rong
    Lu, Rongxing
    Lai, Chengzhe
    Luo, Jun
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 802 - 807
  • [25] Smart Grid Management Using Cloud and Fog Computing
    Ashraf, Muhammad Hassaan
    Javaid, Nadeem
    Abbasi, Sadam Hussain
    Rehman, Mubariz
    Sharif, Muhammad Usman
    Saeed, Faizan
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 624 - 636
  • [26] Smart Grid Rebuilding based on Cloud Computing Architecture
    Ziouche, Leila
    Ben Meskina, Syrine
    Khalgui, Mohamed
    Kahloul, Laid
    Li, ZhiWu
    2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 2259 - 2266
  • [27] Cloud Computing Technology Research Oriented Smart Grid
    Wang XiaoKan
    Chen Dongzhao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 1005 - 1009
  • [28] The Application of Cloud Computing in Smart Grid Status Monitoring
    Bai, Hongwei
    Ma, Zhiwei
    Zhu, Yongli
    INTERNET OF THINGS-BK, 2012, 312 : 460 - +
  • [29] Information platform of smart grid based on cloud computing
    Wang, Dewen
    Song, Yaqi
    Zhu, Yongli
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2010, 34 (22): : 7 - 12
  • [30] Design of smart grid system based on cloud computing
    Hou Jiazheng
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 87 - 94