Visible to the public Securing smart grid data under key exposure and revocation in cloud computing

TitleSecuring smart grid data under key exposure and revocation in cloud computing
Publication TypeConference Paper
Year of Publication2018
AuthorsNavya, J M, Sanjay, H A, Deepika, KM
Conference Name2018 3rd International Conference on Circuits, Control, Communication and Computing (I4C)
Keywordsadvanced cipher text policy attribute, and smart grid, authorisation, Cipher Text Policy-Attribute Based Encryption (CP-ABE), Ciphers, cloud computing, cloud server, cloud supported IoT, Collaboration, CP-ABE, cryptography, Data collection, data owner, data privacy, encrypted key, Encryption, encryption key, encryption process, enhancing system ability, Internet of Things, key exposure, obtaining security, policy-based governance, power engineering computing, power system security, pubcrawl, revocation, Scalability, security requirements, Servers, smart grid data security method, smart grid systems data, Smart grids, smart IoT devices, smart power grids, system failures, transmission process
AbstractSmart grid systems data has been exposed to several threats and attacks from different perspectives and have resulted in several system failures. Obtaining security of data and key exposure and enhancing system ability in data collection and transmission process are challenging, on the grounds smart grid data is sensitive and enormous sum. In this paper we introduce smart grid data security method along with advanced Cipher text policy attribute based encryption (CP-ABE). Cloud supported IoT is widely used in smart grid systems. Smart IoT devices collect data and perform status management. Data obtained from the IOT devices will be divided into blocks and encrypted data will be stored in different cloud server with different encrypted keys even when one cloud server is assaulted and encrypted key is exposed data cannot be decrypted, thereby the transmission and encryption process are done in correspondingly. We protect access-tree structure information even after the data is shared to user by solving revocation problem in which cloud will inform data owner to revoke and update encryption key after user has downloaded the data, which preserves the data privacy from unauthorized users. The analysis of the system concludes that our proposed system can meet the security requirements in smart grid systems along with cloud-Internet of things.
Citation Keynavya_securing_2018