Information Masking Theory for Data Protection in Future Cloud-Based Energy Management

被引:28
作者
Xin, Shujun [1 ]
Guo, Qinglai [1 ]
Wang, Jianhui [3 ,4 ]
Chen, Chen [2 ]
Sun, Hongbin [1 ]
Zhang, Boming [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, State Key Lab Power Syst, Beijing 100084, Peoples R China
[2] Argonne Natl Lab, Div Energy Syst, Argonne, IL 60049 USA
[3] Southern Methodist Univ, Dept Elect Engn, Dallas, TX 75275 USA
[4] Argonne Natl Lab, Div Energy Syst, Argonne, IL 60449 USA
关键词
Information security; data protection; network transformation; cloud computing; energy management system; OPTIMAL POWER-FLOW; SYSTEM STRUCTURE; ATTACKS;
D O I
10.1109/TSG.2017.2693345
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Implementation of advanced information and communication technologies upgrades energy management systems (EMSs) by allowing more participants and improving the control ability, in which cloud-based service plays an essential role. However, its information exchange also raises concern about information safety and privacy. To overcome this challenge, we propose the mechanism of information masking (IM), which helps to hide the original information by transforming it to another form. In the main body, we first review the basic theory of IM. Then, we introduce three typical scenarios for cloud-based EMSs [i.e., home/building EMS (for end users), aggregated load/generation management (for aggregated loads), and coordinated dispatch (for multi-regional power systems)], then analyze and compare their IM requirements. After discussing the IM design rules for two general requirements, we discuss IM algorithms for the three scenarios and study three typical cases to verify the feasibility and effectiveness of the IM approaches. The results show that the proposed IM approaches successfully hide all the targeted information while leading to only minor increases in computation cost and matrix sparsity.
引用
收藏
页码:5664 / 5676
页数:13
相关论文
共 22 条
[1]  
[Anonymous], P 48 INT U C POW ENG
[2]  
Baktir S., 2014, P INT C IT CONV SEC, P1
[3]   Cloud Computing Applications for Smart Grid: A Survey [J].
Bera, Samaresh ;
Misra, Sudip ;
Rodrigues, Joel J. P. C. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) :1477-1494
[4]  
Bitzer B., 2015, P 50 INT U POWER ENG, P1, DOI [10.1109/UPEC.2015.7339938, DOI 10.1109/UPEC.2015.7339938]
[5]  
Borden AR, 2012, ANN ALLERTON CONF, P1300, DOI 10.1109/Allerton.2012.6483368
[6]  
Borden AR, 2013, ANN ALLERTON CONF, P1021, DOI 10.1109/Allerton.2013.6736637
[7]   Impact analysis of false data injection attacks on power system static security assessment [J].
Chen, Jiongcong ;
Liang, Gaoqi ;
Cai, Zexiang ;
Hu, Chunchao ;
Xu, Yan ;
Luo, Fengji ;
Zhao, Junhua .
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2016, 4 (03) :496-505
[8]   Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets [J].
Choi, Dae-Hyun ;
Xie, Le .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (03) :1235-1243
[9]  
Dreier J., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P916, DOI 10.1109/PASSAT/SocialCom.2011.19
[10]  
Feng L, 2016, PROT CONTR MOD POW, V1, DOI 10.1186/s41601-016-0021-1