Data Protection in a Cloud-Enabled Smart Grid

  • Alexander Fromm
  • Florian Kelbert
  • Alexander Pretschner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7823)


Today’s electricity grid is evolving into the smart grid which ought to be reliable, flexible, efficient, and sustainable. To fulfill these requirements, the smart grid draws on a plenty of core technologies. Advanced Metering Infrastructure (AMI). These technologies facilitate easy and fast accumulation of different data, e.g. fine-grained meter readings. Various security and privacy concerns w.r.t. the gathered data arise, since research has shown that it is possible to deduce and extract user behaviour from smart meter readings. Hence, these meter readings are very sensitive and require appropriate protection.

Unlike other data protection approaches that are primarily based on data obfuscation and data encryption, we introduce a usage control based data protection mechanism for the smart grid. We show how the concept of distributed data usage control can be integrated with smart grid services and concretize this approach for an energy marketplace that runs on a cloud platform for performance, scalability, and economic reasons.


Cloud Computing Smart Grid Usage Control Abstraction Layer Policy Decision Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ács, G., Castelluccia, C.: I Have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  2. 2.
    BMWi, T.C.: PeerEnergyCloud,
  3. 3.
    BMWi, E-Energy: eTelligence Project,
  4. 4.
    Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3, 275–294 (2010)CrossRefGoogle Scholar
  5. 5.
    Clements, S., Kirkham, H.: Cyber-security considerations for the smart grid. In: 2010 IEEE Power and Energy Society General Meeting, pp. 1–5 (July 2010)Google Scholar
  6. 6.
    Eckert, C., Krauß, C.: Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit - DuD 35, 535–541 (2011)CrossRefGoogle Scholar
  7. 7.
    Efthymiou, C., Kalogridis, G.: Smart Grid Privacy via Anonymization of Smart Metering Data. In: 1st IEEE Intl. Conf. on Smart Grid Communications (October 2010)Google Scholar
  8. 8.
    Farhangi, H.: The path of the smart grid. IEEE Power and Energy Magazine 8(1), 18–28 (2010)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The Characteristics of Cloud Computing. In: 39th Intl. Conf. on Parallel Processing Workshops (September 2010)Google Scholar
  10. 10.
    Kalogridis, G., Efthymiou, C., Denic, S., Lewis, T., Cepeda, R.: Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures. In: First IEEE International Conference on Smart Grid Communications, pp. 232–237 (October 2010)Google Scholar
  11. 11.
    Kelbert, F., Pretschner, A.: Towards a Policy Enforcement Infrastructure for Distributed Usage Control. In: Proc. 17th ACM Symp. on Access Control Models and Technologies (June 2012)Google Scholar
  12. 12.
    Kelbert, F., Pretschner, A.: Data Usage Control Enforcement in Distributed Systems. In: Proc. 3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013. ACM (to appear, February 2013)Google Scholar
  13. 13.
    Kumari, P., Kelbert, F., Pretschner, A.: Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example. In: Proc. Workshop on Dependable Software for Critical Infrastructures. GI Lecture Notes in Informatics (October 2011)Google Scholar
  14. 14.
    Kumari, P., Pretschner, A.: Deriving implementation-level policies for usage control enforcement. In: Proc. 2nd ACM Conf. on Data and Application Security and Privacy (2012)Google Scholar
  15. 15.
    Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Tech. rep., National Institute of Standards and Technology (September 2011)Google Scholar
  16. 16.
    Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66 (2010)Google Scholar
  17. 17.
    National Energy Technology Laboratory for the U.S. Department of Energy: Advanced Metering Infrastructure. Tech. rep., U.S. Department of Energy (February 2008)Google Scholar
  18. 18.
    Ockwell, G.: The DOE’s “7 Traits of a Smart Grid”. Fortnightly’s Spark (October 2009)Google Scholar
  19. 19.
    Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004), CrossRefGoogle Scholar
  20. 20.
    Pretschner, A.: An Overview of Distributed Usage Control. In: Proc. 2nd Conf. Knowledge Engineering: Principles and Techniques, Romania (July 2009)Google Scholar
  21. 21.
    Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for Usage Control. In: Proc. 2008 ACM Symposium on Information, Computer and Communications Security, pp. 240–244 (March 2008)Google Scholar
  22. 22.
    Pretschner, A., Lovat, E., Büchler, M.: Representation-Independent Data Usage Control. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 122–140. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  23. 23.
    Quinn, E.L.: Smart Metering & Privacy: Existing Law and Competting Policies. Tech. Rep., Colorado Public Utilities Commission (2009)Google Scholar
  24. 24.
    Rusitschka, S., Eger, K., Gerdes, C.: Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain. In: First IEEE International Conference on Smart Grid Communications, pp. 483–488 (October 2010)Google Scholar
  25. 25.
    Simmhan, Y., Aman, S., Cao, B., Giakkoupis, M., Kumbhare, A., Zhou, Q., Paul, D., Fern, C., Sharma, A., Prasanna, V.: An Informatics Approach to Demand Response Optimization in Smart Grids. Tech. rep. (2011)Google Scholar
  26. 26.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1) (2011)Google Scholar
  27. 27.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Alexander Fromm
    • 1
  • Florian Kelbert
    • 2
  • Alexander Pretschner
    • 2
  1. 1.Karlsruhe Institute of TechnologyGermany
  2. 2.Technische Universität MünchenGermany

Personalised recommendations