Managing Incidents in Smart Grids à la Cloud

作者: Cristina Alcaraz , Isaac Agudo , David Nunez , Javier Lopez

DOI: 10.1109/CLOUDCOM.2011.79

关键词:

摘要: Over the last decade, Cloud Computing paradigm has emerged as a panacea for many problems in traditional IT infrastructures. Much been said about potential of context Smart Grid, but unfortunately it is still relegated to second layer when comes critical systems. Although advantages outsourcing these kinds applications cloud clear, data confidentiality and operational privacy stand mayor drawbacks. In this paper, we describe some security mechanisms, specifically, cryptographic schemes, that will help better integration Grids Clouds. We propose use Virtual SCADA (VS-Cloud) means improve reliability efficiency whilst maintaining same protection level architectures.

参考文章(16)
Seny Kamara, Kristin Lauter, Cryptographic Cloud Storage Financial Cryptography and Data Security. ,vol. 6054, pp. 136- 149 ,(2010) , 10.1007/978-3-642-14992-4_13
Dan Boneh, Brent Waters, Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography. pp. 535- 554 ,(2007) , 10.1007/978-3-540-70936-7_29
Thomas Fuhr, Pascal Paillier, Decryptable Searchable Encryption Provable Security. pp. 228- 236 ,(2007) , 10.1007/978-3-540-75670-5_17
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Lucas Ballard, Seny Kamara, Fabian Monrose, Achieving Efficient Conjunctive Keyword Searches over Encrypted Data Information and Communications Security. pp. 414- 426 ,(2005) , 10.1007/11602897_35
Benny Chor, Eyal Kushilevitz, Oded Goldreich, Madhu Sudan, Private information retrieval Journal of the ACM. ,vol. 45, pp. 965- 981 ,(1998) , 10.1145/293347.293350
Ari Juels, Burton S. Kaliski, Pors: proofs of retrievability for large files computer and communications security. pp. 584- 597 ,(2007) , 10.1145/1315245.1315317
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song, Provable data possession at untrusted stores computer and communications security. pp. 598- 609 ,(2007) , 10.1145/1315245.1315318
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, Searchable symmetric encryption Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 79- 88 ,(2006) , 10.1145/1180405.1180417
Cristina Alcaraz, Javier Lopez, A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems systems man and cybernetics. ,vol. 40, pp. 419- 428 ,(2010) , 10.1109/TSMCC.2010.2045373