Towards Secure Demand-Response Systems on the Cloud

Demand response (DR) systems are gaining fast adoption and utilities are increasingly relying on them for peak load shaving, demand side management, and maintaining power quality. DR systems are cyber-physical systems (CPS) where the communication component is cyber, whereas the control components have physical effects. As DR systems experience wider adoption and manipulate much larger loads, achieving scalability has become an important concern. On the other hand, demand response events are often sporadic, and maintaining systems and infrastructure that could easily scale up or down is often desirable for utility companies in terms of operational cost, which makes us envision that DR systems would eventually move to the cloud. However, moving to cloud is not an elixir as it brings some concerns of its own. In this paper, we focus on Open ADR 2.0-based systems and discuss security properties and challenges that must be considered when migrating DR systems to the cloud.

[1]  Ting Yu,et al.  1 Supplemental Material: Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds , 2022 .

[2]  A. Mohan,et al.  Towards addressing common security issues in smart grid specifications , 2012, 2012 5th International Symposium on Resilient Control Systems.

[3]  Barack Obama,et al.  Statement on the Release of the 'Framework for Improving Critical Infrastructure Cybersecurity' by the National Institute of Standards and Technology, February 12, 2014 , 2014 .

[4]  Sean Turner,et al.  Transport Layer Security , 2014, IEEE Internet Computing.

[5]  Dan S. Wallach,et al.  Efficient Data Structures For Tamper-Evident Logging , 2009, USENIX Security Symposium.

[6]  Wei-Peng Chen,et al.  Enhancing Demand Response signal verification in automated Demand Response systems , 2014, ISGT 2014.

[7]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[8]  Rakesh Bobba,et al.  Cloud Computing for the Power Grid: From Service Composition to Assured Clouds , 2013, HotCloud.

[9]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[10]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[11]  Donald E. Eastlake,et al.  (Extensible Markup Language) XML-Signature Syntax and Processing , 2002, RFC.

[12]  Gregory A. Witte,et al.  Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .

[13]  Nandkishor Kinhekar,et al.  Automated demand response for residential consumers , 2016, 2016 National Power Systems Conference (NPSC).

[14]  Mohammed H. Albadi,et al.  Demand Response in Electricity Markets: An Overview , 2007, 2007 IEEE Power Engineering Society General Meeting.

[15]  Valentin Tudor,et al.  Analysis of the impact of data granularity on privacy for the smart grid , 2013, WPES.

[16]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.