2017
DOI: 10.1007/978-3-319-67636-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems

Abstract: Abstract. Analysing data acquired from one or more buildings (through specialist sensors, energy generation capability such as PV panels or smart meters) via a cloud-based Local Energy Management System (LEMS) is increasingly gaining in popularity. In a LEMS, various smart devices within a building are monitored and/or controlled to either investigate energy usage trends within a building, or to investigate mechanisms to reduce total energy demand. However, whenever we are connecting externally monitored/contr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 39 publications
0
8
0
Order By: Relevance
“…Traditional security system consists of static border barriers (e.g., firewalls and intrusion detection system [IDS]), universal utilization of end‐point resistances (e.g., against infection), and programming patches from sellers. Be that as it may, these systems cannot deal with IoT arrangements because of the heterogeneity in gadgets and of their utilization cases and gadget/seller requirements 4–7 . This implies that the customary methodologies may not scale the IoT gadget since these techniques can obstruct the outside assaults yet frequently neglect to keep the assaults from the inner gadgets or its applications 8–10 .…”
Section: Introductionmentioning
confidence: 99%
“…Traditional security system consists of static border barriers (e.g., firewalls and intrusion detection system [IDS]), universal utilization of end‐point resistances (e.g., against infection), and programming patches from sellers. Be that as it may, these systems cannot deal with IoT arrangements because of the heterogeneity in gadgets and of their utilization cases and gadget/seller requirements 4–7 . This implies that the customary methodologies may not scale the IoT gadget since these techniques can obstruct the outside assaults yet frequently neglect to keep the assaults from the inner gadgets or its applications 8–10 .…”
Section: Introductionmentioning
confidence: 99%
“…Although the massive data is stored centrally, it is convenient for data analysis and processing, but the loss and damage of big data caused by improper security management will cause devastating disaster. Due to the development of new technology and new business, the infringement of privacy right is not limited to physical and compulsory invasion, but is derived in a subtler way through various data, and the data security and privacy risks caused by this will be more serious [ 18 ].…”
Section: The Index System Of Security and Privacy Risk Assessment Of Energy Big Data In Cloud Environmentmentioning
confidence: 99%
“…The insufficient security measures and lack of dedicated anomaly detection systems for these heterogeneous networks make them vulnerable to a range of attacks such as data leakage, spoofing, disruption of service (DoS/DDoS), energy bleeding, insecure gateways, etc. These can lead to disastrous effects; causing damage to hardware, disrupting the system availability, causing system blackouts, and even physically harm individuals [5], [6]. Therefore, it is clear that the scale of impact of the attacks performed on IoT networks can vary significantly.…”
Section: Introductionmentioning
confidence: 99%