CFP last date
22 April 2024
Reseach Article

Hierarchical based Cloud Computing and De-Identification of Secured Big Data

by C. Heartina Heaveny, V. Sarala, J.C. Kavitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 13
Year of Publication: 2016
Authors: C. Heartina Heaveny, V. Sarala, J.C. Kavitha
10.5120/ijca2016909544

C. Heartina Heaveny, V. Sarala, J.C. Kavitha . Hierarchical based Cloud Computing and De-Identification of Secured Big Data. International Journal of Computer Applications. 140, 13 ( April 2016), 23-28. DOI=10.5120/ijca2016909544

@article{ 10.5120/ijca2016909544,
author = { C. Heartina Heaveny, V. Sarala, J.C. Kavitha },
title = { Hierarchical based Cloud Computing and De-Identification of Secured Big Data },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 13 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number13/24673-2016909544/ },
doi = { 10.5120/ijca2016909544 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:12.409023+05:30
%A C. Heartina Heaveny
%A V. Sarala
%A J.C. Kavitha
%T Hierarchical based Cloud Computing and De-Identification of Secured Big Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 13
%P 23-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A smart grid is modernized electrical equipment that uses analog or digital information in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. The main challenges of smart grids, however, to manage different types of front-end intelligent devices such as power assets and smart meters efficiently, and how to process a huge amount of data received from these devices. Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources. It relies on sharing of resources to achieve coherence and economies of scale. This Cloud computing technology is used to address the challenges of Smart grid. The system consists of secure cloud computing based framework for big data information management in smart grids. It has a hierarchical structure of cloud computing center to provide different types of computing services for information management and big data analysis. In addition to this structural framework, a security solution is proposed based attribute based encryption to address critical security issues of the proposed framework.

References
  1. Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, and Yang Xiang, “A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid”. IEEE Transactions on Cloud Computing, vol. 3, no. 2, Apr/Jun 2015.
  2. H. Lim and K. G. Paterson, “Identity-based cryptography for grid security”, Int. J. Inf. Security, vol. 10, no. 1, pp. 15–32, 2011.
  3. K. P. Birman, L. Ganesh, and R. V. Renesse, “Running smart grid control software on cloud computing architectures”, in Proc. Workshop 2011, pp. 1–33.
  4. H. Khurana, M. Hadley, N. Lu, and D. Frincke, “Smart-grid security issues”, IEEE Security Privacy, vol. 8, no. 1, Feb. 2010.
  5. C. Schridde, T. D. Ornemann, E. Juhnke, B. Freisleben, and M.Smith, “An identity-based security infrastructure for cloud environments”, in Proc. IEEE Wireless Commun., Netw. Inf. Security, 2010, pp. 644–649.
  6. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption”, in Proc. IEEE Conf. Smart Grid Commun., 2010, pp. 327–332.
  7. S. Rusitschka, K. Eger, and C. Gerdes, “Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain”, in Proc. 1st Int. Conf. Smart Grid Commun., 2010.
  8. H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing”, in Proc. 1st Int. Conf. Cloud Comput., 2009, vol. 5931.
  9. M. Green and G. Ateniese, “Identity-based proxy re-encryption”, in Proc. 5th Int. Conf. Appl. Cryptograph. Netw. Security, 2007.
  10. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage”, ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006.
  11. Jun Shao, Zhenfu Cao, “CCA-Secure Proxy Re-Encryption without Pairings”, www.iacr.org/54430361.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Smart Grid Attribute Based Encryption Cloud.