An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems

Computing power and flexibility provided by cloud technologies represent an opportunity for Smart Grid applications, in general, and for Wide Area Monitoring Systems, in particular. Even though the cloud model is considered efficient for Smart Grids, it has stringent constraints in terms of security and reliability. An attack to the integrity or confidentiality of data may have a devastating impact for the system itself and for the surrounding environment. The main security risk is represented by malicious insiders, i.e., malevolent employees having privileged access to the hosting machines. In this paper, we evaluate a powerful hardening approach that could be leveraged to protect synchrophasor data processed at cloud level. In particular, we propose the use of homomorphic encryption to address risks related to malicious insiders. Our goal is to estimate the feasibility of such a security solution by verifying the compliance with frame rate requirements typical of synchrophasor standards.

[1]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[2]  William R. Claycomb,et al.  Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[3]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[4]  Flora Amato,et al.  Exploiting Cloud and Workflow Patterns for the Analysis of Composite Cloud Services , 2017, Future Gener. Comput. Syst..

[5]  Luigi Coppolino,et al.  Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..

[6]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[7]  Srdjan Capkun,et al.  An architecture for concurrent execution of secure environments in clouds , 2013, CCSW.

[8]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[9]  Nicolas Gama,et al.  Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.

[10]  Luigi Coppolino,et al.  Cloudifying Critical Applications: A Use Case from the Power Grid Domain , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).

[11]  Abir Awad Abir Awad , 2022 .

[12]  Rüdiger Kapitza,et al.  Secure Cloud Micro Services Using Intel SGX , 2017, DAIS.

[13]  Gianfranco Cerullo,et al.  A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network , 2016, SoMeT.

[14]  Johannes Götzfried,et al.  Hardware-Based Trusted Computing Architectures for Isolation and Attestation , 2018, IEEE Transactions on Computers.

[15]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[16]  Anjan Bose,et al.  GridCloud: Infrastructure for Cloud-Based Wide Area Monitoring of Bulk Electric Power Grids , 2019, IEEE Transactions on Smart Grid.

[17]  Carlos V. Rozas,et al.  Innovative instructions and software model for isolated execution , 2013, HASP '13.

[18]  Flora Amato,et al.  A model driven approach to data privacy verification in E-Health systems , 2015, Trans. Data Priv..