Call for Paper - December 2019 Edition
IJCA solicits original research papers for the December 2019 Edition. Last date of manuscript submission is November 20, 2019. Read More

Hierarchical based Cloud Computing and De-Identification of Secured Big Data

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
C. Heartina Heaveny, V. Sarala, J.C. Kavitha
10.5120/ijca2016909544

Heartina C Heaveny, V Sarala and J C Kavitha. Article: Hierarchical based Cloud Computing and De-Identification of Secured Big Data. International Journal of Computer Applications 140(13):23-28, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {C. Heartina Heaveny and V. Sarala and J.C. Kavitha},
	title = {Article: Hierarchical based Cloud Computing and De-Identification of Secured Big Data},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {140},
	number = {13},
	pages = {23-28},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

A smart grid is modernized electrical equipment that uses analog or digital information in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. The main challenges of smart grids, however, to manage different types of front-end intelligent devices such as power assets and smart meters efficiently, and how to process a huge amount of data received from these devices. Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources. It relies on sharing of resources to achieve coherence and economies of scale. This Cloud computing technology is used to address the challenges of Smart grid. The system consists of secure cloud computing based framework for big data information management in smart grids. It has a hierarchical structure of cloud computing center to provide different types of computing services for information management and big data analysis. In addition to this structural framework, a security solution is proposed based attribute based encryption to address critical security issues of the proposed framework.

References

  1. Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, and Yang Xiang, “A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid”. IEEE Transactions on Cloud Computing, vol. 3, no. 2, Apr/Jun 2015.
  2. H. Lim and K. G. Paterson, “Identity-based cryptography for grid security”, Int. J. Inf. Security, vol. 10, no. 1, pp. 15–32, 2011.
  3. K. P. Birman, L. Ganesh, and R. V. Renesse, “Running smart grid control software on cloud computing architectures”, in Proc. Workshop 2011, pp. 1–33.
  4. H. Khurana, M. Hadley, N. Lu, and D. Frincke, “Smart-grid security issues”, IEEE Security Privacy, vol. 8, no. 1, Feb. 2010.
  5. C. Schridde, T. D. Ornemann, E. Juhnke, B. Freisleben, and M.Smith, “An identity-based security infrastructure for cloud environments”, in Proc. IEEE Wireless Commun., Netw. Inf. Security, 2010, pp. 644–649.
  6. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption”, in Proc. IEEE Conf. Smart Grid Commun., 2010, pp. 327–332.
  7. S. Rusitschka, K. Eger, and C. Gerdes, “Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain”, in Proc. 1st Int. Conf. Smart Grid Commun., 2010.
  8. H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing”, in Proc. 1st Int. Conf. Cloud Comput., 2009, vol. 5931.
  9. M. Green and G. Ateniese, “Identity-based proxy re-encryption”, in Proc. 5th Int. Conf. Appl. Cryptograph. Netw. Security, 2007.
  10. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage”, ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006.
  11. Jun Shao, Zhenfu Cao, “CCA-Secure Proxy Re-Encryption without Pairings”, www.iacr.org/54430361.pdf

Keywords

Smart Grid, Attribute Based Encryption, Cloud.