Securing smart grid data under key exposure and revocation in cloud computing

被引:0
|
作者
Navya, J. M. [1 ]
Sanjay, H. A. [2 ]
Deepika, K. M. [2 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci Engn, Bangalore, Karnataka, India
[2] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore, Karnataka, India
关键词
CP-ABE; cloud supported IoT; smart grid; revocation; key exposure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid systems data has been exposed to several threats and attacks from different perspectives and have resulted in several system failures. Obtaining security of data and key exposure and enhancing system ability in data collection and transmission process are challenging, on the grounds smart grid data is sensitive and enormous sum. In this paper we introduce smart grid data security method along with advanced Cipher text policy attribute based encryption (CP-ABE). Cloud supported IoT is widely used in smart grid systems. Smart IoT devices collect data and perform status management. Data obtained from the IOT devices will be divided into blocks and encrypted data will be stored in different cloud server with different encrypted keys even when one cloud server is assaulted and encrypted key is exposed data cannot be decrypted, thereby the transmission and encryption process are done in correspondingly. We protect access-tree structure information even after the data is shared to user by solving revocation problem in which cloud will inform data owner to revoke and update encryption key after user has downloaded the data, which preserves the data privacy from unauthorized users. The analysis of the system concludes that our proposed system can meet the security requirements in smart grid systems along with cloud-Internet of things
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Serverless Cloud computing framework for Smart grid architecture
    Dash, Shitikantha
    Dash, Dipak Kumar
    2016 IEEE 7TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON), 2016,
  • [32] Towards Cloud Computing Security Considerations in Smart Grid
    Ma, Shouming
    Yu, Chunlei
    Gu, Wei
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 443 - 446
  • [33] Operational Flexibility in Smart grid through Cloud computing
    Rajeev, T.
    Ashok, S.
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 21 - 24
  • [34] Study on the Cloud Computing Architecture for Smart Grid Application
    Fan, Bangkui
    Ding, Guanjun
    Long, Teng
    Lan, Haibin
    Wang, Jing
    ENERGY AND POWER TECHNOLOGY, PTS 1 AND 2, 2013, 805-806 : 1073 - +
  • [35] Application of Cloud Computing in the Development of Smart Power Grid
    Zheng, Ling
    Zhang, Bin
    Wang, Li-juan
    PROCEEDINGS OF 2012 3RD INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION (IEMI2012), 2013, : 747 - 758
  • [36] Research on Application Level of Big Data and Cloud Computing Information Technologies in Smart Grid
    Zhou, Jing
    INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS AND ELECTRONIC ENGINEERING (CMEE 2016), 2016,
  • [37] A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
    Baek, Joonsang
    Quang Hieu Vu
    Liu, Joseph K.
    Huang, Xinyi
    Xiang, Yang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) : 233 - 244
  • [38] Research on Key Technologies of communication and computing in Smart Grid
    Ou Qinghai
    He Qingsu
    Xu Shiliang
    Zeng Lingkang
    Liao Xiao
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 262 - 270
  • [39] Public Possession Checking for Shared Data with User Revocation in Cloud Computing
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    Niu, Xinxin
    Yao, Yuangang
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (06): : 1141 - 1149
  • [40] Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
    Guo, Hua
    Ma, Fangchao
    Li, Zhoujun
    Xia, Chunhe
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 127 - 136