Secure end-to-end processing of smart metering data

被引:3
|
作者
Brito, Andrey [1 ]
Fetzer, Christof [2 ]
Koepsell, Stefan [2 ]
Pietzuch, Peter [3 ]
Pasin, Marcelo [4 ]
Felber, Pascal [4 ]
Fonseca, Keiko [5 ]
Rosa, Marcelo [5 ]
Gomes-Jr, Luiz [5 ]
Riella, Rodrigo [6 ]
Prado, Charles [7 ]
Rust, Luiz F. [7 ]
Lucani, Daniel E. [8 ]
Sipos, Marton [8 ]
Nagy, Laszlo [8 ]
Feher, Marcell [8 ]
机构
[1] Univ Fed Campina Grande, Campina Grande, Paraiba, Brazil
[2] Tech Univ Dresden, Dresden, Germany
[3] Imperial Coll London, London, England
[4] Univ Neuchatel, Neuchatel, Switzerland
[5] Univ Tecnol Fed Parana, Curitiba, Parana, Brazil
[6] LACTEC, Curitiba, Parana, Brazil
[7] INMETRO, Rio De Janeiro, Brazil
[8] Chocolate Cloud ApS, Aalborg, Denmark
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2019年 / 8卷 / 01期
基金
欧盟地平线“2020”;
关键词
Cloud computing; Security; Trusted execution; Smart grids; Privacy; Confidential computing;
D O I
10.1186/s13677-019-0141-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Nevertheless, using shared infrastructures also creates more opportunities for attacks and data breaches. In this paper, we describe the SecureCloud approach. The SecureCloud project aims to enable confidentiality and integrity of data and applications running in potentially untrusted cloud environments. The project leverages technologies such as Intel SGX, OpenStack and Kubernetes to provide a cloud platform that supports secure applications. In addition, the project provides tools that help generating cloud-native, secure applications and services that can be deployed on potentially untrusted clouds. The results have been validated in a real-world smart grid scenario to enable a data workflow that is protected end-to-end: from the collection of data to the generation of high-level information such as fraud alerts.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Secure end-to-end processing of smart metering data
    Andrey Brito
    Christof Fetzer
    Stefan Köpsell
    Peter Pietzuch
    Marcelo Pasin
    Pascal Felber
    Keiko Fonseca
    Marcelo Rosa
    Luiz Gomes
    Rodrigo Riella
    Charles Prado
    Luiz F. Rust
    Daniel E. Lucani
    Márton Sipos
    László Nagy
    Marcell Fehér
    Journal of Cloud Computing, 8
  • [2] Cloud Challenge: Secure End-to-End Processing of Smart Metering Data
    Brito, Andrey
    Fetzer, Christof
    Kopsell, Stefan
    Pietzuch, Peter
    Pasin, Marcelo
    Felber, Pascal
    Fonseca, Keiko
    Rosa, Marcelo
    Gomes-, Luiz, Jr.
    Riella, Rodrigo
    Prado, Charles
    da Costa Carmo, Luiz F. C.
    Lucani, Daniel E.
    Sipos, Marton
    Nagy, Laszlo
    Feher, Marcell
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 36 - 42
  • [3] New partnership will provide end-to-end smart metering solution
    不详
    INTERNATIONAL GAS ENGINEERING AND MANAGEMENT, 2008, 48 (07): : 31 - 31
  • [4] A framework for an end-to-end secure wireless smart home system
    Al-Qutayri, M.
    Barada, H.
    Al-Mehairi, S.
    Nuaimi, J.
    2008 2ND ANNUAL IEEE SYSTEMS CONFERENCE, 2008, : 420 - 426
  • [5] HYPERSPECTRAL DATA PROCESSING: AN OPPORTUNITY FOR END-TO-END PROCESSING
    Cole, Marge
    Wilson, Anne
    Little, Michael
    IGARSS 2018 - 2018 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, 2018, : 6328 - 6331
  • [6] An End-to-End Secure Solution for IoMT Data Exchange
    El Jaouhari, Saad
    Tamani, Nouredine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 3 - 15
  • [7] MOZAIK: An End-to-End Secure Data Sharing Platform
    Abidin, Aysajan
    Marquet, Enzo
    Moeyersons, Jerico
    Limani, Xhulio
    Pohle, Erik
    Van Kenhove, Michiel
    Marquez-Barja, Johann M.
    Slamnik-Krijestorac, Nina
    Volckaert, Bruno
    PROCEEDINGS OF THE 2ND ACM DATA ECONOMY WORKSHOP, DEC 2023, 2023, : 34 - 40
  • [8] Modeling the End-to-End Energy Consumption of a Nation-Wide Smart Metering Infrastructure
    Gougeon, Adrien
    Lemercier, Francois
    Blavette, Anne
    Orgerie, Anne-Cecile
    2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [9] An implementation for secure data deduplication on end-to-end encrypted documents
    Jipianu, Tora-Mihnea
    Aciobanitei, Iulian
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 303 - 307
  • [10] Mobile mapping platform with integrated end-to-end data processing chain for smart city applications
    Stahl, Bastian
    Reiterer, Alexander
    REMOTE SENSING TECHNOLOGIES AND APPLICATIONS IN URBAN ENVIRONMENTS VII, 2022, 12269