scholarly journals Location-Based Optimized Service Selection for Data Management with Cloud Computing in Smart Grids

Energies ◽  
2019 ◽  
Vol 12 (23) ◽  
pp. 4517 ◽  
Author(s):  
C. ◽  
Padmanaban ◽  
Eklas ◽  
Holm-Nielsen ◽  
Hemalatha

: To maximize the utilization, reliability and availability of power resources, some distribution strategy has to be implemented, which is possible nowadays with the support of modern information technologies (IT). To further develop power utilization, the customer should be aware of efficient power utilization, and the problem of customer management has to be resolved, where payment of electric bills could be through online solutions. A customer-aware power regulatory model is proposed that provides awareness to the consumer regarding the usage of electrical energy, in a secure and reliable solution that combines the features of electrical engineering with cloud computing to ensure better performance in notifying issues, which is done based on location and enhances the operation of smart grids. Instant electric meters are equipped with remote gadgets which communicate with a central cloud administration to produce electric bills for the client. The model provides mindfulness by showing history/notifications and suggestions for energy utilization through the smart meters. The user is provided with security keys to view the reading values and pay bills. To make the solution more accessible, the electronic data will be maintained on various servers at different locations of the cloud. Subsequently, there will be a service provider who manages service requests. A hardwired electric meter transmits the electric readings, which in turn access the particular service to make an entry for the particular connection on the cloud. The usage data will also be maintained at different locations in the cloud, which are accessible to different levels of users with appropriate security measures. The user accessibility is controlled by a Third Party Auditor (TPA) that computes the trustworthiness of users using a trust management scheme. This article also proposes a hash function, which computes and verifies the signature of the keys submitted by the users and also has a higher completeness ratio, which reaches 0.93, than typical methods. This is noteworthy, and the investigation results prove the system’s proficiency in providing assured service.

2022 ◽  
pp. 127-164
Author(s):  
Abdelmadjid Recioui ◽  
Fatma Zohra Dekhandji

The conventional energy meters are not suitable for long operating purposes as they spend much human and material resources. Smart meters, on the other hand, are devices that perform advanced functions including electrical energy consumption recording of residential/industrial users, billing, real-time monitoring, and load balancing. In this chapter, a smart home prototype is designed and implemented. Appliances are powered by the grid during daytime, and a photovoltaic panel stored power during the night or in case of an electricity outage. Second, consumed power from both sources is sensed and further processed for cumulative energy, cost calculations and bill establishment for different proposed scenarios using LABVIEW software. Data are communicated using a USB data acquisition card (DAQ-USB 6008). Finally, a simulation framework using LABVIEW software models four houses each equipped with various appliances. The simulator predicts different power consumption profiles to seek of peak-demand reduction through a load control process.


Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.


Author(s):  
Nawal Ait Aali ◽  
Amine Baina ◽  
Loubna Echabbi

Currently, smart grids have changed the world, given the great benefits of these critical infrastructures regarding the customers' satisfaction by offering them the electrical energy that they need for their business. Also, the smart grid aims to solve all the problems encountered in the current electrical grid (outage, lack of renewable energy, an excess in the produced power, etc.) by transmitting and sharing the information in real time between the different entities through the installation of the sensors. This chapter therefore presents the architecture of the smart grid by describing its objectives and advantages. In addition, the microgrids are presented as small electric networks. Then, focusing on the security aspects, an analysis of the different attacks and risks faced in the smart grids and more particularly in the microgrids is presented. After, different techniques and suitable security solutions are detailed to protect and secure the various elements of the smart grids and microgrids.


2022 ◽  
pp. 368-379
Author(s):  
Kimmi Kumari ◽  
M. Mrunalini

The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.


2019 ◽  
Vol 8 (4) ◽  
pp. 6594-6597

This work shows a multi-target approach for planning vitality utilization in server farms thinking about customary and environmentally friendly power vitality information sources. Cloud computing is a developing innovation. Cloud computing offers administrations such as IaaS, SaaS, PaaS and it gives computing resources through virtualization over data network. Data center consumes huge amount of electrical energy in which it releases very high amount of carbon-di-oxide. The foremost critical challenge in cloud computing is to implement green cloud computing with the help of optimizing energy utilization. The carbon footprint is lowered while minimizing the operating cost. We know that renewable energies that are produced on-site are highly variable and unpredictable but usage of green energy is very important for the mankind using huge amount of single sourced brown energy is not suggested, so our algorithm which evolves genetically and gives practical solution in order to use renewable energy


Author(s):  
Abdelmadjid Recioui ◽  
Fatma Zohra Dekhandji

The conventional energy meters are not suitable for long operating purposes as they spend much human and material resources. Smart meters, on the other hand, are devices that perform advanced functions including electrical energy consumption recording of residential/industrial users, billing, real-time monitoring, and load balancing. In this chapter, a smart home prototype is designed and implemented. Appliances are powered by the grid during daytime, and a photovoltaic panel stored power during the night or in case of an electricity outage. Second, consumed power from both sources is sensed and further processed for cumulative energy, cost calculations and bill establishment for different proposed scenarios using LABVIEW software. Data are communicated using a USB data acquisition card (DAQ-USB 6008). Finally, a simulation framework using LABVIEW software models four houses each equipped with various appliances. The simulator predicts different power consumption profiles to seek of peak-demand reduction through a load control process.


2022 ◽  
pp. 1317-1334
Author(s):  
Nawal Ait Aali ◽  
Amine Baina ◽  
Loubna Echabbi

Currently, smart grids have changed the world, given the great benefits of these critical infrastructures regarding the customers' satisfaction by offering them the electrical energy that they need for their business. Also, the smart grid aims to solve all the problems encountered in the current electrical grid (outage, lack of renewable energy, an excess in the produced power, etc.) by transmitting and sharing the information in real time between the different entities through the installation of the sensors. This chapter therefore presents the architecture of the smart grid by describing its objectives and advantages. In addition, the microgrids are presented as small electric networks. Then, focusing on the security aspects, an analysis of the different attacks and risks faced in the smart grids and more particularly in the microgrids is presented. After, different techniques and suitable security solutions are detailed to protect and secure the various elements of the smart grids and microgrids.


Cloud computing has become extremely popular. It is one of the fastest evolving technologies. It is mostly used in industrial IoT, where the data generated is huge. It has many advantages. But there are also a few security issues we have to deal with when it comes to using the cloud. Data plays a very significant role in cloud computing. But data breaching can collapse a business. Also, any third party can log in to these cloud servers and use the valuable data for various other purposes. So trustworthy security measures have to be taken, to make sure that the information is protected and misuse of data does not take place. A few biometric methods have been implemented, but it not very cost-effective. And since the data is stored on remote servers, the data can never be a hundred percent safe. A new system has to be implemented, which is both easy to execute and demands less cost. This paper discusses how Iris and Retina scanners can be put together to ensure the security of the data stored in the cloud servers.


2019 ◽  
Vol 1 (2) ◽  
pp. 66-72
Author(s):  
Ravi D ◽  
Ravina T ◽  
Buvanasundhari P ◽  
Vikram G.K

Cloud computing is third party administrative control so our data is outsourced it gives rise to security concerns.security is one of the important aspect of any technology. Therefore high security measures are required to protect our data. In this paper, we propose Detaching and Reproducting of Data in a cloud for excellent performance and security that collectively approaches security issues and data sharing protectively. In this methodology, we divide the file into fragments and replicated over cloud nodes. Files are fragmented and shuffled like (1-2,2-3,3-4.4-1)in sequential order and stored in multiple servers. Moreover nodes sharing fragments are separated with certain distance by using T-colouring graph to prohibit an attacker by guessing the location of fragments. This methodology does not rely on traditional cryptography techniques.


Author(s):  
Kimmi Kumari ◽  
M. Mrunalini

The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.


Sign in / Sign up

Export Citation Format

Share Document