Research Article
Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems
@INPROCEEDINGS{10.1007/978-3-319-67636-4_24, author={Eirini Anthi and Amir Javed and Omer Rana and George Theodorakopoulos}, title={Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems}, proceedings={Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20--21, 2017, Proceedings}, proceedings_a={IISSC \& CN4IOT}, year={2017}, month={11}, keywords={Internet of Things Security and privacy Smart grids}, doi={10.1007/978-3-319-67636-4_24} }
- Eirini Anthi
Amir Javed
Omer Rana
George Theodorakopoulos
Year: 2017
Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems
IISSC & CN4IOT
Springer
DOI: 10.1007/978-3-319-67636-4_24
Abstract
Analysing data acquired from one or more buildings (through specialist sensors, energy generation capability such as PV panels or smart meters) via a cloud-based Local Energy Management System (LEMS) is increasingly gaining in popularity. In a LEMS, various smart devices within a building are monitored and/or controlled to either investigate energy usage trends within a building, or to investigate mechanisms to reduce total energy demand. However, whenever we are connecting externally monitored/controlled smart devices there are security and privacy concerns. We describe the architecture and components of a LEMS and provide a survey of security and privacy concerns associated with data acquisition and control within a LEMS. Our scenarios specifically focus on the integration of Electric Vehicles (EV) and Energy Storage Units (ESU) at the building premises, to identify how EVs/ESUs can be used to store energy and reduce the electricity costs of the building. We review security strategies and identify potential security attacks that could be carried out on such a system, while exploring vulnerable points in the system. Additionally, we will systematically categorize each vulnerability and look at potential attacks exploiting that vulnerability for LEMS. Finally, we will evaluate current counter measures used against these attacks and suggest possible mitigation strategies.