Information Masking Theory for Data Protection in Future Cloud-Based Energy Management

被引:24
|
作者
Xin, Shujun [1 ]
Guo, Qinglai [1 ]
Wang, Jianhui [3 ,4 ]
Chen, Chen [2 ]
Sun, Hongbin [1 ]
Zhang, Boming [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, State Key Lab Power Syst, Beijing 100084, Peoples R China
[2] Argonne Natl Lab, Div Energy Syst, Argonne, IL 60049 USA
[3] Southern Methodist Univ, Dept Elect Engn, Dallas, TX 75275 USA
[4] Argonne Natl Lab, Div Energy Syst, Argonne, IL 60449 USA
关键词
Information security; data protection; network transformation; cloud computing; energy management system; OPTIMAL POWER-FLOW; SYSTEM STRUCTURE; ATTACKS;
D O I
10.1109/TSG.2017.2693345
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Implementation of advanced information and communication technologies upgrades energy management systems (EMSs) by allowing more participants and improving the control ability, in which cloud-based service plays an essential role. However, its information exchange also raises concern about information safety and privacy. To overcome this challenge, we propose the mechanism of information masking (IM), which helps to hide the original information by transforming it to another form. In the main body, we first review the basic theory of IM. Then, we introduce three typical scenarios for cloud-based EMSs [i.e., home/building EMS (for end users), aggregated load/generation management (for aggregated loads), and coordinated dispatch (for multi-regional power systems)], then analyze and compare their IM requirements. After discussing the IM design rules for two general requirements, we discuss IM algorithms for the three scenarios and study three typical cases to verify the feasibility and effectiveness of the IM approaches. The results show that the proposed IM approaches successfully hide all the targeted information while leading to only minor increases in computation cost and matrix sparsity.
引用
收藏
页码:5664 / 5676
页数:13
相关论文
共 50 条
  • [1] Cloud-Based Information Systems Management
    Levy, Richard
    [J]. IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL II, 2010, : 96 - 101
  • [2] Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR
    Yu, Jingze
    Shen, Wenting
    Zhang, Xi
    [J]. COMPUTERS & SECURITY, 2024, 144
  • [3] Cloud-based RDF Data Management
    Kaoudi, Zoi
    Manolescu, Ioana
    [J]. SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 725 - 729
  • [4] Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems
    Anthi, Eirini
    Javed, Amir
    Rana, Omer
    Theodorakopoulos, George
    [J]. CLOUD INFRASTRUCTURES, SERVICES, AND IOT SYSTEMS FOR SMART CITIES, 2018, 189 : 228 - 242
  • [5] CloudCraft: Cloud-based Data Management for MMORPGs
    Diao, Ziqiang
    Wang, Shuo
    Schallehn, Eike
    Saake, Gunter
    [J]. DATABASES AND INFORMATION SYSTEMS VIII, 2014, 270 : 71 - 84
  • [6] Cloud-based Healthcare data management Framework
    Sha, Mohemmed M.
    Rahamathulla, Mohamudha Parveen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (03): : 1014 - 1025
  • [7] A Cloud-Based Trajectory Data Management System
    Li, Ruiyuan
    Ruan, Sijie
    Bao, Jie
    Zheng, Yu
    [J]. 25TH ACM SIGSPATIAL INTERNATIONAL CONFERENCE ON ADVANCES IN GEOGRAPHIC INFORMATION SYSTEMS (ACM SIGSPATIAL GIS 2017), 2017,
  • [8] A cloud-based energy data mining information agent system based on big data analysis technology
    Lin, Hsueh-Yuan
    Yang, Sheng-Yuan
    [J]. MICROELECTRONICS RELIABILITY, 2019, 97 : 66 - 78
  • [9] Cloud-based Security Mechanisms for Critical Information Infrastructure Protection
    van Niekerk, Brett
    Jacobs, Pierre
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,
  • [10] Information Security Management Issues in a Cloud-based environment
    Moeti, Michael
    Sigama, Khuliso
    [J]. 2015 17TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2015, : 349 - 354