ACM workshop on Smart Energy Grid Security最新文献

筛选
英文 中文
Customer-centric energy usage data management and sharing in smart grid systems 智能电网系统中以客户为中心的能源使用数据管理和共享
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516935
Gaurav Lahoti, D. Mashima, Wei-Peng Chen
{"title":"Customer-centric energy usage data management and sharing in smart grid systems","authors":"Gaurav Lahoti, D. Mashima, Wei-Peng Chen","doi":"10.1145/2516930.2516935","DOIUrl":"https://doi.org/10.1145/2516930.2516935","url":null,"abstract":"A recent study revealed that fine-grained energy usage data could potentially leak sensitive information about an electricity customer. On the other hand, a number of online service providers utilizing such data have emerged and improved effectiveness of smart grid technologies (for instance, demand-response aggregators), and therefore sharing of data is getting popular. In this work, we propose a customer-centric framework to manage, store, and share energy usage data in a privacy-enhanced way. We present a mechanism to enable customers to flexibly control the amount of energy usage information disclosed while still allowing third-party service providers to be convinced of the authenticity of data. A prototype implementation using the widely used Green Button data model is presented and evaluated. We further discuss the design of a demand-response aggregation service on top of the proposed framework.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Toward a cyber-physical topology language: applications to NERC CIP audit 迈向网络物理拓扑语言:NERC CIP审计的应用
ACM workshop on Smart Energy Grid Security Pub Date : 2013-11-08 DOI: 10.1145/2516930.2516934
G. Weaver, C. Cheh, E. Rogers, W. Sanders, Dennis Gammel
{"title":"Toward a cyber-physical topology language: applications to NERC CIP audit","authors":"G. Weaver, C. Cheh, E. Rogers, W. Sanders, Dennis Gammel","doi":"10.1145/2516930.2516934","DOIUrl":"https://doi.org/10.1145/2516930.2516934","url":null,"abstract":"Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several audit scenarios: account management, vulnerability assessment, and configuration management. Those scenarios occur in the context of the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) audits. The NERC CIP standards define security controls by which utilities must be audited. Although the standards were designed to make power control networks less vulnerable to cyber attack and to decrease the chance of outages, the audit process is manual and costly. In order to save utilities and auditors time and money, we used the limitations of those audit scenarios in formally specifying and implementing CPTL, which consists of both a representation of cyber-physical assets and operations upon that representation. First, CPTL uses graph theory to represent a network of cyber-physical assets; we currently implement this representation in GraphML. Second, CPTL defines operations upon that representation. In this paper, we introduce operators to process attributes by expanding and contracting components of a network, and implement these operations using the Boost Graph Library (BGL). In order to demonstrate the potential for CPTL to save auditors and utilities time and money, we provide a detailed example of how CPTL could help with vulnerability assessment and discuss additional applications beyond the audit scenarios mentioned above. We describe current approaches to those scenarios and argue that CPTL improves upon both the state-of-the-art and current practice. In fact, we intend CPTL to enable a broad range of new research on realistic cyber-physical architectures by giving utilities, auditors, managers, and researchers a common language with which to communicate and analyze those architectures.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信