Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20–21, 2017, Proceedings

Research Article

Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems

Download
255 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-67636-4_24,
        author={Eirini Anthi and Amir Javed and Omer Rana and George Theodorakopoulos},
        title={Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems},
        proceedings={Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20--21, 2017, Proceedings},
        proceedings_a={IISSC \& CN4IOT},
        year={2017},
        month={11},
        keywords={Internet of Things Security and privacy Smart grids},
        doi={10.1007/978-3-319-67636-4_24}
    }
    
  • Eirini Anthi
    Amir Javed
    Omer Rana
    George Theodorakopoulos
    Year: 2017
    Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems
    IISSC & CN4IOT
    Springer
    DOI: 10.1007/978-3-319-67636-4_24
Eirini Anthi1,*, Amir Javed1,*, Omer Rana1, George Theodorakopoulos1
  • 1: Cardiff University
*Contact email: anthies@cardiff.ac.uk, javeda7@cardiff.ac.uk

Abstract

Analysing data acquired from one or more buildings (through specialist sensors, energy generation capability such as PV panels or smart meters) via a cloud-based Local Energy Management System (LEMS) is increasingly gaining in popularity. In a LEMS, various smart devices within a building are monitored and/or controlled to either investigate energy usage trends within a building, or to investigate mechanisms to reduce total energy demand. However, whenever we are connecting externally monitored/controlled smart devices there are security and privacy concerns. We describe the architecture and components of a LEMS and provide a survey of security and privacy concerns associated with data acquisition and control within a LEMS. Our scenarios specifically focus on the integration of Electric Vehicles (EV) and Energy Storage Units (ESU) at the building premises, to identify how EVs/ESUs can be used to store energy and reduce the electricity costs of the building. We review security strategies and identify potential security attacks that could be carried out on such a system, while exploring vulnerable points in the system. Additionally, we will systematically categorize each vulnerability and look at potential attacks exploiting that vulnerability for LEMS. Finally, we will evaluate current counter measures used against these attacks and suggest possible mitigation strategies.