scholarly journals An access control and authorization model with Open stack cloud for Smart Grid

Author(s):  
Yagnik A Rathod

In compare to Authentication for identification and relationship of an identity of a user with its task and process within the system, authorization in access control is much anxious about confirming that user and its task in the form of system process, access to the assets of any particular domain is only approved when proven obedient to the identified policies. Access control and authorization is always an area of interest for researchers for enhancing security of critical assets from many decades. Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer level of granularity in access policies for domain like smart grid. Technical advancement of current era demands that critical infrastructure like traditional electrical grid open ups to the modern information and communication technology to get the benefit in terms of efficiency, scalability, accessibility and transparency for better adaptability in real world. Incorporation of ICT with electric grid makes it possible to do greater level of bi-directional interaction among stake holders like customer, generation units, distribution units and administrations and these leads international organization to contribute for standardization of smart grid concepts and technology so that the realization of smart grid becomes reality. Smart grid is a distributed system of very large scale by its nature and needs to integrate available legacy systems with its own security requirements. Cloud computing proven to be most efficient approach for said requirements and we have identified openstack as our cloud platform. We have integrated ABAC approach with default RBAC approach of openstack and provide a frame work that supports and integrate multiple access control polices in making authorization decisions. Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization.

2013 ◽  
Vol 462-463 ◽  
pp. 924-928
Author(s):  
Ling Zheng ◽  
Zhen Wei Wang ◽  
Chang Song Zhao

During the process of the Smart Grid systems construction, the Safe Access Platform has an increasing important role. Not only could it meet the demand that people of power system can telecommute, but also provides different level of security mechanisms for various smart devices, such as Hand-hold Terminal System PDA, Ultra Mobile Personal Computer (UMPC) and Wireless Data Acquisition Terminal. Determining how to guarantee the internal security and meet the security requirements of access control based on roles is an important subject. The paper presents a new network access control system (NAC system) based on roles. According to the security metrics of the network access equipment (NAE), the NAC system has been designed and implemented to provide different safety strategies for different application scenarios. Besides, 802.1x and L2-IP are discussed specially as the most important key techniques of the implementation of the system.


Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 6862
Author(s):  
Milan Stojkov ◽  
Nikola Dalčeković ◽  
Branko Markoski ◽  
Branko Milosavljević ◽  
Goran Sladić

The critical infrastructure is constantly under cyber and physical threats. Applying security controls without guidance or traceability can create a false sense of security. Security standards facilitate security knowledge and control best practices in a more systematic way. However, the number of standards is continually increasing. Product providers that operate in multiple geographical regions often face the obligation to comply with multiple standards simultaneously. This introduces the problem of the convenient interpretation of different standards. Thus, a comprehensive analysis of the requirements from different security standards and guidelines applicable to the smart grid has been performed to detect similarities that can be shaped into entities of the conceptual model for requirement representation. The purpose of the model—presented in a form of a Unified Modeling Language (UML) class diagram—is to give product providers a canonical way to map requirements from arbitrary standards, guidelines, and regulations and accelerate the cross-standard compliance readiness by defining priority for requirement implementation. In addition, the research showed that multiple vectors should impact the priority of the implementation of the security controls defined through the requirements: domain affiliation, the essence of the requirement, associated threats, risks, and social dependencies between actors involved in the implementation. To examine the model correctness, NISTIR 7628—de facto smart grid standard—was used to provide insights into how the model would be used for requirements implementation tracking. The structure of individual requirements was analyzed to detect the building blocks and extract relevant parts that can be mapped to the model components. Further, all requirements were classified into one of the defined domains to provide the basis for referencing similar requirements from different standards. Finally, one arbitrary requirement was used to demonstrate model usage, and depict all available information that can be provided to the users in a custom-made scenario where the need arises to have simultaneous alignment with three standards—NISTIR 7628, NIST 800-53, and IEC 62443-3-3.


Author(s):  
Alan T. Murray ◽  
Tony H. Grubesic

Large scale, geospatial networks—such as the Internet, the interstate highway system, gas pipelines, and the electrical grid—are integral parts of modern society, facilitating the capability to communicate, transport goods and services between locations, and connect homes and businesses to basic necessities like water and electricity. The associated management and protection of this critical infrastructure is a challenging task because it is often compromised or damaged by natural disasters, human error, or sabotage. Further, the cascading effects associated with disruptions can impact related interdependent infrastructure, such as supervisory control and data acquisition systems (SCADA). In this context, although the protection and/or hardening of network elements can reduce disruptive impacts, the cost to protect all equipment in the system is prohibitive. The purpose of this chapter is to detail an optimization approach for selecting elements on a network to be protected, under budget constraints, in order to maximize system performance if one or more components are damaged or destroyed. Applications results for a large scale, geospatial network are explored and presented, illustrating problem complexities as well as the potential for informed strategic investment decision making. The implications for SCADA systems relying on large scale geospatial networks, including the public Internet, are also discussed.


2013 ◽  
pp. 224-246 ◽  
Author(s):  
Alan T. Murray ◽  
Tony H. Grubesic

Large scale, geospatial networks—such as the Internet, the interstate highway system, gas pipelines, and the electrical grid—are integral parts of modern society, facilitating the capability to communicate, transport goods and services between locations, and connect homes and businesses to basic necessities like water and electricity. The associated management and protection of this critical infrastructure is a challenging task because it is often compromised or damaged by natural disasters, human error, or sabotage. Further, the cascading effects associated with disruptions can impact related interdependent infrastructure, such as supervisory control and data acquisition systems (SCADA). In this context, although the protection and/or hardening of network elements can reduce disruptive impacts, the cost to protect all equipment in the system is prohibitive. The purpose of this chapter is to detail an optimization approach for selecting elements on a network to be protected, under budget constraints, in order to maximize system performance if one or more components are damaged or destroyed. Applications results for a large scale, geospatial network are explored and presented, illustrating problem complexities as well as the potential for informed strategic investment decision making. The implications for SCADA systems relying on large scale geospatial networks, including the public Internet, are also discussed.


2018 ◽  
Vol 7 (2) ◽  
pp. 732 ◽  
Author(s):  
Anilkumar Chunduru ◽  
Sumathy S

Emphasis on security for providing Access Control in Cloud computing environment plays a significant role. Cloud computing provides number of benefits such as resource sharing, low speculation and large storage space. Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. Access Control in cloud computing has become a critical issue due to increasing number of users experiencing dynamic changes. Authentication, authorization and approval of the access ensuring liability of entities from login credentials including passwords and biometric scan is essential. Also, the federated authentication management is secured. Current approaches require large-scale distributed access control in cloud environment. Data security and access control are the drawbacks in existing access control schemes. Due to the drawbacks in existing access control schemes such as privacy of information when susceptible information is stored in intermediary service provider a federated identity access management is essential. Access control applications majorly concentrate on Healthcare, Government Organizations, Commercial, Critical Infrastructure and Financial Institutions. This review illustrates a detailed study of access control models in cloud computing and various cloud identity management schemes.


2018 ◽  
Vol 2018 ◽  
pp. 1-15
Author(s):  
Nawal Ait Aali ◽  
Amine Baina ◽  
Loubna Echabbi

Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several security policies must be applied among the organizations of CI. Based on our conducted study about the different constraints and requirements of the collaborative systems within CI, we reached a security solution: Tr-OrBAC. Its principle is to evaluate the trustworthiness of collaborating organizations based on relevant trust criteria aimed at enhancing collaboration decision-making. The taken decision presents the attribution of the access to the desired service based on calculated trust score which is the result of the combination of the trust criteria values. Generally, the desired services do not meet the same criticism, security requirements, sensitivity, etc. Also, the collaboration context varies from a set of collaborating organizations to another. In this sense, the importance of each trust criterion depends on the desired service and the collaboration context. In this paper, we focus on detailing the trust criteria used in our approach for collaborative system security. Then, we analyze the context variability with the trust evaluation process. In addition, we present a case study to demonstrate and illustrate the feasibility of our solution for CI protection, especially the electrical grid.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5448
Author(s):  
George Suciu ◽  
Mari-Anais Sachian ◽  
Alexandru Vulpe ◽  
Marius Vochin ◽  
Aristeidis Farao ◽  
...  

Recent advancements in information and communication technologies (ICT) have improved the power grid, leading to what is known as the smart grid, which, as part of a critical economic and social infrastructure, is vulnerable to security threats from the use of ICT and new emerging vulnerabilities and privacy issues. Access control is a fundamental element of a security infrastructure, and security is based on the principles of less privilege, zero-trust, and segregation of duties. This work addresses how access control can be applied without disrupting the power grid’s functioning while also properly maintaining the security, scalability, and interoperability of the smart grid. The authentication in the platform presumes digital certificates using a web of trust. This paper presents the findings of the SealedGRID project, and the steps taken for implementing Attribute-based access control policies specifically customized to the smart grid. The outcome is to develop a novel, hierarchical architecture composed of different licensing entities that manages access to resources within the network infrastructure. They are based on well-drawn policy rules and the security side of these resources is placed through a context awareness module. Together with this technology, the IoT is used with Big Data (facilitating easy handling of large databases). Another goal of this paper is to present implementation and evaluations details of a secure and scalable security platform for the smart grid.


2019 ◽  
Vol 14 (3) ◽  
pp. 33
Author(s):  
L. V. Tomin

The article is devoted to the analysis of the structure, the peculiarities of functioning and the socio-economic and political effects of the «platform capitalism». The basis of this model is the network effects produced by the integrated information and communication infrastructure, which contribute to the monopolization and the constant expansion of platform companies into new areas. The principle of functioning of this infrastructure is the continuous collection and further monetization of data extracted from the interactions of individuals among themselves or with one of the elements of a digitalized economy or government structures. Such an infrastructure — forms a potential threat of strengthening state and corporate control over citizens. In addition, the activities of platform companies produce negative effects on the labor market, reinforcing the process of precarization of employment. The integrated information and communication infrastructure of platform companies form a system of a kind of «digital Taylorism», which deprives the employee of autonomy and privacy in the workplace. The influence of digitalization, subjected to the technocratic logic of the neoliberal model of governance in democratic countries, strengthens the de-politicization of relations between the citizen and the state and further changes the balance of power between labor and capital in favor of the latter. Large-scale protests of the last years against the companies of “capitalism of platforms” demonstrated the structural contradictions of this model and formed new forms of organization and actions of grassroots workers of the “digital economy”.


2020 ◽  
pp. 75-117
Author(s):  
A.N. Shvetsov

The article compares the processes of dissemination of modern information and communication technologies in government bodies in Russia and abroad. It is stated that Russia began the transition to «electronic government» later than the developed countries, in which this process was launched within the framework of large-scale and comprehensive programs for reforming public administration in the 1980s and 1990s. However, to date, there is an alignment in the pace and content of digitalization tasks. At a new stage in this process, the concept of «electronic government» under the influence of such newest phenomena of the emerging information society as methods of analysis of «big data», «artificial intelligence», «Internet of things», «blockchain» is being transformed into the category of «digital government». Achievements and prospects of public administration digitalization are considered on the example of countries with the highest ratings — Denmark, Australia, Republic of Korea, Great Britain, USA and Russia.


Sign in / Sign up

Export Citation Format

Share Document