Open Access Open Access  Restricted Access Subscription or Fee Access

Smart Grid Advanced Metering Infrastructure: Overview of Cloud-Based Cyber Security Solutions


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v8i4.13394

Abstract


The vision of making the traditional power grid smart has necessitated the incorporation of so many intelligent and smart technologies driven by ICT into virtually all domains of the smart grid. Expectedly, this has opened a lot of routes for vulnerabilities which can be maliciously exploited by today’s cyber criminals. The advanced metering infrastructure (AMI) is believed to be the foundation of the smart grid. Malicious exploitations of security vulnerabilities present in the smart grid AMI by cyber criminals would be detrimental to both energy providers and final consumers. This is in view of the huge task involved in the management and storage of data from the numerous intelligent electronic devices (IEDs) that traverse the smart grid’s AMI and beyond. A lack of capability in terms of processing, computations and storage of these data can only compound the cyber security problems facing the SG AMI. Cloud Computing is therefore a potential technology that can address the above challenging issues. Previous review works had concentrated mainly on the potentials of cloud computing for the smart grid. None of such works to the best of our knowledge had an extensive focus on the security of the SG AMI. We therefore provide in this paper firstly, a review of the cloud based solutions for the smart grid with appropriate SG domain classification in order to determine the focus points of previous related works. We then provide an elaborate overview on cloud based security solutions for the SG AMI. At the end, future research challenges were highlighted with open research ideas that could help to address the challenges also suggested.
Copyright © 2018 Praise Worthy Prize - All rights reserved.

Keywords


Advanced Metering Infrastructure; Cloud Based Firewall; Cloud Computing; Cyber Security; Smart Grid

Full Text:

PDF


References


Kennedy O. Aduda, Wim Zeiler, Gert Boxem, and Timilehil Labeodan, “On defining Information and communication technology requirements and associated challenges for energy and comfort active buildings” 4th International Symposium on frontiers in Ambient Mobil Systems Procedia Computer Science 32 (2014) 979- 984.
http://dx.doi.org/10.1016/j.procs.2014.05.521

European Commission Smart Grids: from Innovation to deployment, Communication from the Commission to the European Parliament. The Council, the European Economic and Social Committee and of the regions, COM (2011) 202, Final, 2011.

Melvin Greer, Manuel Rodriguez-Martinez, “Autonomic Computing Drives of Energy Smart Grids” Procedia Computer Science 12 (2012) 314 – 319.
http://dx.doi.org/10.1016/j.procs.2012.09.077

U.S Department of Energy (DOE) National Energy Technology Laboratory (NETL): A systems View of the Modern Grid, 2007.

Sebastian Meiling, Till Steinbach, Thomas C. Schmidt, and Mathias Wahlisch, “A Scalable Communication Infrastructure for Smart Grid Applications using Multicast over Public Networks” Project SMART POWER HAMBURG Germany.
http://dx.doi.org/10.1145/2480362.2480495

S. Sridhar, A. Hahn and M. Govindarasu, “Cyber-Physical System Security for the Electric Power Grid,” Proceedings of IEEE, vol.100, No. 1, 2012.
http://dx.doi.org/10.1109/jproc.2011.2165269

E. B. Rice and A. AlMajali, “Mitigating the Risk of Cyber Attack on Smart Grid Systems,” Conference on Systems Engineering Research, Procedia Computer Science 28(2014), 575-582.
http://dx.doi.org/10.1016/j.procs.2014.03.070

Eraj Khan, B. Adebisi and B. Honary, “Location Based Security for Smart Grid Applications,” Energy Procedia 42(2013), 299-307.
http://dx.doi.org/10.1016/j.egypro.2013.11.030

A. Califano, E. Dincelli and S. Goel, “Using Features of the Cloud Computing to Defend the Smat Grid against DDoS Attacks,” 10th Annual Symposium on Information Assurance (ASIA ’15), June 2-3, 2013, Albany, NY.

E. Brynjolfsson, P. Hofmann and J. Jordan, “Cloud Computing and Electricity: Beyond the Utility Model,” Communication of the ACM, vol. 53, No.5, pp. 32-34, 2010.
http://dx.doi.org/10.1145/1735223.1735234

M. T Khorshed, A. S. Ali, and S. A. Wasimi, “A Survey on Gaps, Threats Remediation Challenges and Thoughts for Proactive Attack Detection in Cloud Computing,” Future Generation Computer Systems, vol. 28, no. 6, pp. 833-851, 2012.
http://dx.doi.org/10.1016/j.future.2012.01.006

L. Zheng, S. Chen, Y. Hu, and J. He, “Applications of Cloud Computing in the Smart Grid,” in 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), IEEE.
http://dx.doi.org/10.1109/aimsec.2011.6010461

Henri Groenewald, “NRS049-Advanced Metering Infrastructure (AM) for Residential and Commercial Customers,” ESKOM, Johannesburg, presentation, 2009.

Subramoney K. P. and Madhoo H. V., “AMI PMO Internal Stakeholder Communication, Eskom Report, Version 4, January, 2013.

Y. S. Baohua Cao and V. Prasanna, “Adaptive Rate Stream Processing for Smart Grid Applications on Clouds,” in ACM Workshop on Scientific Cloud Computing (Science Cloud), 2011.
http://dx.doi.org/10.1145/1996109.1996116

Q. H. Vu, Joseph K. Liu and X. Huang, “A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid,” IEEE Transactions on Cloud Computing, vol. 3, Issue 2, pp. 233-244, Sept. 2014.
http://dx.doi.org/10.1109/tcc.2014.2359460

J. Popeang, “Cloud Computing and Smart Grids,” ERP E-Business Application Deployment of Open Source Distribution,” Cloud Systems III, pp. 57-66, 2012.

M. Yigit, V. Cagri Gungor and Selcuk Baktir, “Cloud Computing for Smart Grid Applications,” Computer Networks 70(2014) 312-329.
http://dx.doi.org/10.1016/j.comnet.2014.06.007

Liang Yu, Tao Jiang and Yulong Zou, “Real-Time Management for Cloud Data Centres in Smart Microgrids,” IEEE Access, vol. 4, pp. 941-950, 2016.

D. S Markovic, D. Zivkovic, I. Branovic, R. Popovic and D. Cvetkovic, “Smart Power Grid and Cloud Computing,” Renewable and Sustainable Energy Reviews 24(2013) 566-577.
http://dx.doi.org/10.1016/j.rser.2013.03.068

X. Fang, S. Misra, G. Xue and D. Yang, “Managing Smart Grid Information in the Cloud: Opportunities, Model, and Applications,” IEEE Network vol. 26, pp. 32-38, 2012.
http://dx.doi.org/10.1109/mnet.2012.6246750

Y. Simmhan, S. Aman, B. Cao, M. Giakkoupis, A Kumbhare, Q. Zhou, D. Paul, C. Fern , A. Sharma and V. Prasanna, “An Informatics Approach to Demand Response Optimization in Smart Grids,” Natural Gas 31(2011) 60.

J. Byun, Y. Kim, Z. Hwang and S. Park, “An Intelligent Cloud-Based Energy Management System using Machine-to-Machine Communication in Future Energy Environments,” in IEEE International Conference on Consumer Electronics (ICCE), pp. 659-665, 2012.
http://dx.doi.org/10.1109/icce.2012.6162018

X. Jin, Z. He and Z. Liu, “Multi-Agent Based Cloud Architecture of Smart Grid,” Energy Procedia vol. 12, pp. 60-66, 2011.
http://dx.doi.org/10.1016/j.egypro.2011.10.010

H. Bai, Z. Ma and Y. Zhu, “The Application of Cloud Computing in Smart Grid Status Monitoring,” Internet of Things (2012), pp. 460-465.
http://dx.doi.org/10.1007/978-3-642-32427-7_64

P. Wang, L. Rao, X Liu and Y. Qi, “D-Pro: Dynamic Data Centre Operations with Demand Responsive Electricity Prices in Smart Grid,” IEEE Transactions of the Smart Grid, vol. 3, pp. 1743-1754, 2012.
http://dx.doi.org/10.1109/tsg.2012.2211386

K. Nagothu, B. Kelley, M. Jamshidi and A. Rajaee, “Persistence Net-AMI for Micogrid Infrastructure using Cognitive Radio on Cloud Data Centres, IEEE Systems Journal, vol. 6, pp. 4-15, 2012.
http://dx.doi.org/10.1109/jsyst.2011.2162794

Baling Fang, X. Yin, Y. Tan, C. Li, Y. Gao, Y. Cao and J. Li, “The Contributions of Cloud Technologies to Smart Grid,” Renewable and Sustainable Energy Reviews, vol. 59, pp. 1326-1331, 2016.
http://dx.doi.org/10.1016/j.rser.2016.01.032

Joonsang Baek, QuangHieu Vu, Joseph K. Liu, Xinyi Huang and Yang Xiang, “A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid” IEEE Transactions on Cloud Computing, vol.3 No 2, 2015.
http://dx.doi.org/10.1109/tcc.2014.2359460

A. Shamir, “Identity-based cryptosystems and signature schemes” in proceedings CRYPTO ’84, LNCS 196, pp 47-53, Springer-Verlag, 1984.
http://dx.doi.org/10.1007/3-540-39568-7_5

D. Boneh and M. K Franklin, “Identity-Based encryption from the well pairing,” in Proceed. 21st Annual Cryptol. Conf. Adv. Cryptol., 2001, vol. 2139, pp. 213-229.
http://dx.doi.org/10.1007/3-540-44647-8_13

D. Kalyani and R. Sridevi, “Survey on Identity based and Hierarchical Identity based Encryption Schemes” International Journal of Computer Applications (0975-8887), vol. 134, no. 14, January 2016.
http://dx.doi.org/10.5120/ijca2016908158

E. Liu, M. L Chan, C.W. Huang, N.C. Wang and C.N. Lu, “Electricity Grid Operation and Planning related Benefits of Advanced Metering Infrastructure,” in Proceedings of Conference on Critical Infrastructure, Beijing, China, Sept. 20-22, 2010.
http://dx.doi.org/10.1109/cris.2010.5617583

D. Wei, Y. Lu, M. Jafari, P. Skare and K. Rohde, “An Integrated Security System of Protecting Smart Grid against Cyber Attacks,” in Proceedings of the Conference on Innovative Smart Grid Technologies, Gaithersburg, MD, January 19-21, 2010.
http://dx.doi.org/10.1109/isgt.2010.5434767

Idaho National Laboratory, “Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues,” Idaho National Laboratory, April, 1, 2009.
http://dx.doi.org/10.2172/957512

D. G. Hart, “Using AMI to realize the Smart Grid,” in Proceedings of the Conference on Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburg, PA, July 20-24, 2008.
http://dx.doi.org/10.1109/pes.2008.4596961

United States Data Protection and Privacy,

www.gettingthedealthrough.com

Act No 4 of 2013: “Protection of Personal Information in South Africa (POPI),” Government Gazette, vol, 581, no 37067, 26 November, 2013.

The Smart Grid Interoperability Panel Cyber Security Working Group, “Introduction to NISTIR 7628 Guidelines for Smart Grid Security,” Sept. 2010.

M. Asif Khan and M. Hussain, “Cyber Security Quantification Model,” Bahria University Journal of Information and Communication Technology, vol. 3, Issue 1, December 2010.
http://dx.doi.org/10.1145/1854099.1854130

Haibo He and Jun Yan, “Cyber-Physical Attacks and Defenses in the Smart Grid: A Survey,” IET Cyber-Physical Systems: Theory & Applications, vol. 1, Issue 1, pp. 13-27, 2016.
http://dx.doi.org/10.1049/iet-cps.2016.0019

M. Simonov, G. Daltoe, G. Zanetto and R. Conti, “Smart Meters using the Architecture of Future Internet,” IEEE Eindhoven Power Tech, pp. 1-6, 2015.
http://dx.doi.org/10.1109/ptc.2015.7232255

K. Billewicz, “The use of Cloud Computing in AMI System Architecture,” IEEE 20125 Modern Electric Power Systems (MEPS), pp. 1-6.
http://dx.doi.org/10.1109/meps.2015.7477213

Md. Mahmud Hasan and H. T Mouftah, “Encryption as a Service for Smart Grid Advanced Metering Infrastructure,” Fifth International Workshop on Management of Cloud and Smart City Systems, 2015.
http://dx.doi.org/10.1109/iscc.2015.7405519

B. Alohali, M. Merabti and K. Kifayat, “A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid,” 8th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 326-330, 2014
http://dx.doi.org/10.1109/ngmast.2014.50

N. Saxena and B. J Choi, “Integrated Distributed Authentication Protocol for Smart Grid Communications,” IEEE Systems Journal, vol. PP, Issue 99, pp. 1-12, July 2016.
http://dx.doi.org/10.1109/jsyst.2016.2574699

B. Y. Mo, T. H. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig and B. Sinopoli, “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of IEEE, June 2011.
http://dx.doi.org/10.1109/jproc.2011.2161428

NISTIR 7628 Guidelines for Smart Grid Cyber Security, vol. 1, August 2010.
http://dx.doi.org/10.1109/peci.2014.6804566

N. Amalina, R. Alasaqour, M. Uddin, O. Alsaqour and M. Al-Hubaishi, “Enhanced Network Security Systems using Firewalls,” ARPN Journal of Engineering and Applied Sciences, vol. 8, No. 12, December 2013

R. Braden, D. Clark, S. Crocker and C. Huitema, “Report of IAB Workshop on Security in the Internet Architecture,” RFC 1636, June 1994.
http://dx.doi.org/10.17487/rfc1636

A. Muffett, “Proper Care and Feeding of Firewalls,” in Proceedings of the UKERNA Computer Security Workshop, Atlas Centre, Chilton, Didcot, Oxfordshire, OX110QS UK, Nov. 1994.

W. R Cheswick, S. M Bellovin and A.D Rubin, “Firewalls and Internet Security: Repelling the Wily Hacke,” Addison-Wesley Longman Publishing Co. Inc, 2003.
http://dx.doi.org/10.1002/adma.19960080319

Niall McKay, “China: The Great Firewall,” Dec. 1998, available at http://www.wired.com/news/

M. J. Ranum, “A Network Firewall,” in Proceedings of the First World Conference on Systems Administration and Security,” 5401 Westbard Ave. Suite 1501, Bethesda 1992


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize