An Efficient and Secure Data Acquisition in Smart Grid through Internet of Things

Authors

  • Koppisetti Srinivasarao  PG Scholar, Dept. of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
  • Mohammed Alisha  Associate Professor & Head of the Department, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
  • Dr. D. Mohan Reddy  Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

Keywords:

Information and Communications Technology, Machine-to-Machine (M2M) communications, Smart Grid, Cloud.

Abstract

Over the most recent couple of years, the world has seen real development of regular devices that are Internet-empowered, an idea usually alluded to as The Internet of Things (IoT). The Internet of Things is realized by a blend of minimal effort sensors, computing innovation, and networking which permit items, structures, and other framework to speak with one another and to be remotely gotten to by means of the Internet. We will keep on seeing an increasing speed of inter connectedness between the physical world and the advanced world; IDC predicts that by 2020 there will be an introduced base of 212 billion associated things, including 30.1 billion associated self-ruling things or things that can settle on choices in view of inherent tenets running locally or remotely (Lund, MacGillivray, and Turner 2013). In this paper, we will investigate how Machine-to-Machine (M2M) communications and IoT empowers us to push past vitality proficiency at the device level, into a significant new level of productivity at the frameworks level while preserving privacy and security and empowering new vitality administrations. We realize that Information and Communications Technology (ICT) is now driving productivity picks up crosswise over numerous industries and frameworks. In this paper, we will feature different free market activity side energy management applications, exhibiting how these advances deliver new potential outcomes in gathering continuous information which empowers new components, for example, prescient examination, energy load disaggregation, mechanization, and complex multi-dimensional upgrading calculations. We will highlight the part these advancements play in empowering new vitality proficiency, building dispatching, and request reaction benefits and incorporate bits of knowledge from research and exhibition tasks to demonstrate the effects of keen, associated devices and examination arrangements in private, business, and industrial applications.

References

  1. Z. Fu, L. Xin, J. Wang, X. Sun, "Data Access Control for Multi-authorityCloud Storage Systems", in proc. IIH-MSP, 2014, pp. 714-717.
  2. J. Han, W. Susilo, Y. Mu, J. Zhou, "Improving Privacy and Security inDecentralized Ciphertext-Policy Attribute-Based Encryption", IEEETransactions on Information Forensics and Security, vol. 10, no. 3, pp.665-678, Mar. 2015.
  3. F. Li, Y. Rahulamathavan, M. Rajarajan, CW. Phan, "Low ComplexityMulti-authority Attribute Based Encryption Scheme for Mobile CloudComputing", in proc. IEEE SOSE, 2013, pp. 573-577.
  4. H. Yadav, M. Dave, "Secure data storage operations with verifiableoutsourced decryption for mobile cloud computing", in proc. IEEEICRAIE, 2014, pp. 1-5.
  5. Z. Zhou, D. Huang, "Efficient and secure data storage operations formobile cloud computing", in proc. CNSM Workshop on systemsvirtualiztion management (svm), 2012, pp. 37-45.
  6. J. Lai, RH. Deng, C. Guan, J. Weng, "Attribute-Based Encryption WithVerifiable Outsourced Decryption", IEEE Transactions on InformationForensics and Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  7. S. Lin, R. Zhang, H. Ma, M. Wang, "Revisiting Attribute-BasedEncryption With Verifiable Outsourced Decryption", IEEETransactions on Information Forensics & Security, vol. 10, no. 10, pp.2119-2130, Oct. 2015.
  8. X. Mao, J. Lai, Q. Mei, K. Chen, "Generic and Efficient Constructions ofAttribute-Based Encryption with Verifiable Outsourced Decryption",IEEE Transactions on Dependable & Secure Computing, IEEETransactions on Dependable & Secure Computing, vol. 13, no. 5, pp.533-546, Sept.-Oct. 2016.
  9. M. Green, G. Ateniese, "Identity-Based Proxy Re-encryption", in proc.ACNS, 2007, pp. 288-306.
  10. X. Fang, S. Misra, G. Xue, and D. Yang, "Smart grid—The new andimproved power grid: A survey", IEEE communications surveys &tutorials, vol. 14, no. 4, pp. 944-980, Dec. 2012.
  11. J. Singh, T. Pasquier, J. Bacon, and H. Ko, "Twenty Security Considerations for Cloud-Supported Internet of Things", IEEE Internetof Things Journal, vol. 3, no. 3, pp. 269-284, Dec. 2016.
  12. L. Jiang, L. D. Xu, H. Cai, Z. Jiang. "An IoT-Oriented Data StorageFramework in Cloud Computing Platform", IEEE Transactions onIndustrial Informatics, vol. 10, no. 2, pp. 1443-1451, Feb. 2014.
  13. X. Du, Y. Xiao, M. Guizani, and H. H. Chen, "An effective keymanagement scheme for heterogeneous sensor networks", Ad HocNetworks, vol. 5, no. 1, pp. 24-34, Jan. 2007.
  14. X. Du, and H. H. Chen, "Security in wireless sensor networks", IEEEWireless Communications, vol. 15, no. 4, pp. 60-66, Aug. 2008.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Koppisetti Srinivasarao, Mohammed Alisha, Dr. D. Mohan Reddy, " An Efficient and Secure Data Acquisition in Smart Grid through Internet of Things, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.397-404, January-February-2018.