Skip to main content

Data Protection in a Cloud-Enabled Smart Grid

  • Conference paper
Smart Grid Security (SmartGridSec 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7823))

Included in the following conference series:

Abstract

Today’s electricity grid is evolving into the smart grid which ought to be reliable, flexible, efficient, and sustainable. To fulfill these requirements, the smart grid draws on a plenty of core technologies. Advanced Metering Infrastructure (AMI). These technologies facilitate easy and fast accumulation of different data, e.g. fine-grained meter readings. Various security and privacy concerns w.r.t. the gathered data arise, since research has shown that it is possible to deduce and extract user behaviour from smart meter readings. Hence, these meter readings are very sensitive and require appropriate protection.

Unlike other data protection approaches that are primarily based on data obfuscation and data encryption, we introduce a usage control based data protection mechanism for the smart grid. We show how the concept of distributed data usage control can be integrated with smart grid services and concretize this approach for an energy marketplace that runs on a cloud platform for performance, scalability, and economic reasons.

Work supported by the “Peer Energy Cloud” project funded by the German Federal Ministry of Economics and Technology as well as by the Google focused research award “Usage control in the cloud.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ács, G., Castelluccia, C.: I Have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. BMWi, T.C.: PeerEnergyCloud, http://www.peerenergycloud.de/

  3. BMWi, E-Energy: eTelligence Project, http://www.etelligence.de

  4. Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3, 275–294 (2010)

    Article  Google Scholar 

  5. Clements, S., Kirkham, H.: Cyber-security considerations for the smart grid. In: 2010 IEEE Power and Energy Society General Meeting, pp. 1–5 (July 2010)

    Google Scholar 

  6. Eckert, C., Krauß, C.: Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit - DuD 35, 535–541 (2011)

    Article  Google Scholar 

  7. Efthymiou, C., Kalogridis, G.: Smart Grid Privacy via Anonymization of Smart Metering Data. In: 1st IEEE Intl. Conf. on Smart Grid Communications (October 2010)

    Google Scholar 

  8. Farhangi, H.: The path of the smart grid. IEEE Power and Energy Magazine 8(1), 18–28 (2010)

    Article  MathSciNet  Google Scholar 

  9. Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The Characteristics of Cloud Computing. In: 39th Intl. Conf. on Parallel Processing Workshops (September 2010)

    Google Scholar 

  10. Kalogridis, G., Efthymiou, C., Denic, S., Lewis, T., Cepeda, R.: Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures. In: First IEEE International Conference on Smart Grid Communications, pp. 232–237 (October 2010)

    Google Scholar 

  11. Kelbert, F., Pretschner, A.: Towards a Policy Enforcement Infrastructure for Distributed Usage Control. In: Proc. 17th ACM Symp. on Access Control Models and Technologies (June 2012)

    Google Scholar 

  12. Kelbert, F., Pretschner, A.: Data Usage Control Enforcement in Distributed Systems. In: Proc. 3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013. ACM (to appear, February 2013)

    Google Scholar 

  13. Kumari, P., Kelbert, F., Pretschner, A.: Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example. In: Proc. Workshop on Dependable Software for Critical Infrastructures. GI Lecture Notes in Informatics (October 2011)

    Google Scholar 

  14. Kumari, P., Pretschner, A.: Deriving implementation-level policies for usage control enforcement. In: Proc. 2nd ACM Conf. on Data and Application Security and Privacy (2012)

    Google Scholar 

  15. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Tech. rep., National Institute of Standards and Technology (September 2011)

    Google Scholar 

  16. Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66 (2010)

    Google Scholar 

  17. National Energy Technology Laboratory for the U.S. Department of Energy: Advanced Metering Infrastructure. Tech. rep., U.S. Department of Energy (February 2008)

    Google Scholar 

  18. Ockwell, G.: The DOE’s “7 Traits of a Smart Grid”. Fortnightly’s Spark (October 2009)

    Google Scholar 

  19. Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004), http://doi.acm.org/10.1145/984334.984339

    Article  Google Scholar 

  20. Pretschner, A.: An Overview of Distributed Usage Control. In: Proc. 2nd Conf. Knowledge Engineering: Principles and Techniques, Romania (July 2009)

    Google Scholar 

  21. Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for Usage Control. In: Proc. 2008 ACM Symposium on Information, Computer and Communications Security, pp. 240–244 (March 2008)

    Google Scholar 

  22. Pretschner, A., Lovat, E., Büchler, M.: Representation-Independent Data Usage Control. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 122–140. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  23. Quinn, E.L.: Smart Metering & Privacy: Existing Law and Competting Policies. Tech. Rep., Colorado Public Utilities Commission (2009)

    Google Scholar 

  24. Rusitschka, S., Eger, K., Gerdes, C.: Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain. In: First IEEE International Conference on Smart Grid Communications, pp. 483–488 (October 2010)

    Google Scholar 

  25. Simmhan, Y., Aman, S., Cao, B., Giakkoupis, M., Kumbhare, A., Zhou, Q., Paul, D., Fern, C., Sharma, A., Prasanna, V.: An Informatics Approach to Demand Response Optimization in Smart Grids. Tech. rep. (2011)

    Google Scholar 

  26. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1) (2011)

    Google Scholar 

  27. Wetzel, D.: Ende der Subventionen (September 2011), http://www.welt.de/print/die_welt/wirtschaft/article13603359/Ende-der-Subventionen.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fromm, A., Kelbert, F., Pretschner, A. (2013). Data Protection in a Cloud-Enabled Smart Grid. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2012. Lecture Notes in Computer Science, vol 7823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38030-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38030-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38029-7

  • Online ISBN: 978-3-642-38030-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics