Skip to main content

Security Issues in Distributed Data Acquisition and Management of Large Data Volumes

  • Conference paper
  • First Online:
Data Management Technologies and Applications (DATA 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 178))

  • 471 Accesses

Abstract

The internet is faced with new application scenarios like smart homes, smart traffic control and guidance systems, smart power grids, or smart buildings. They all have in common that they require a high degree of robustness, reliability, scalability, safety, and security. This paper provides a list of criteria for these properties and focuses on the aspect of data exchange and management. It introduces a security concept for scalable and easy-to-use Secure Generic Data Services, called SeGDS, which covers application scenarios extending from embedded field devices for data acquisition to large-scale generic data applications and data management. Our concept is based largely on proven standard solutions and uses standard enterprise hardware. The first application deals with transport and management of mass data originating from high-resolution electrical data devices, which measure parameters of the electrical grid with a high sample rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fed. Min. of Economy and Energy: E-Energy: Startpage. http://www.e-energy.de/en/. Last accessed on May 14, 2014

  2. U.S. Dept. of Energy: Home| SmartGrid.gov. https://www.smartgrid.gov/. Last accessed on May 14, 2014

  3. Bakken, D., Bose, A., Hauser, C., Whitehead, D., Zweigle, G.: Smart Generation and Transmission with Coherent, Real-Time Data. Proc. IEEE 99, 928–951 (2011)

    Article  Google Scholar 

  4. Smart Grid Security. Annex II: Security aspects of the smart grid (2012)

    Google Scholar 

  5. Maaß, H., Çakmak, H.K., Süß, W., Quinte, A., Jakob, W., Stucky, K.-U., Kuehnapfel, U.G.: Introducing the electrical data recorder as a new capturing device for power grid analysis. Applied Measurements for Power Systems (AMPS). 2012 IEEE International Workshop on, pp. 1–6. IEEE, Piscataway (2012)

    Google Scholar 

  6. Stucky, K.-U., Süß, W., Çakmak, H.K., Jakob, W., Maaß, H.: Generic Data Management Services for Large Scale Data Applications. to be published (2015)

    Google Scholar 

  7. Maaß, H., Çakmak, H.K., Bach, F., Kuehnapfel, U.: Preparing the electrical data recorder for comparative power network measurements. accepted for publication. In: 2014 IEEE International Energy Conference and Exhibition (ENERGYCON). IEEE, Piscataway (2014)

    Google Scholar 

  8. Bach, F., Çakmak, H.K., Maaß, H., Kuehnapfel, U.: Power grid time series data analysis with Pig on a hadoop cluster compared to multi core systems. In: Stotzka, R., Milligan, P., Kilpatrick, P. (eds.) Proceedings of the 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-based Processing, pp. 208–212. IEEE, Piscataway (2012)

    Google Scholar 

  9. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  10. Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering, Design principles and practical applicationns. Wiley, Indianapolis (2010)

    Google Scholar 

  11. Partida, A., Andina, D.: IT security management. Springer, Dordrecht, London (2010)

    Google Scholar 

  12. Yu, T., Jajodia, S. (eds.): Secure Data Management in Decentralized Systems. Springer, New York (2007)

    MATH  Google Scholar 

  13. Doraswamy, N., Harkins, D.: IPSec. The new security standard for the Internet, intranets, and virtual private networks. Prentice Hall PTR, Upper Saddle River (2003)

    Google Scholar 

  14. Stallings, W.: Network Security Essentials: Applications and Standards. Prentice Hall, Upper Saddle River (2013)

    Google Scholar 

  15. Rescorla, E.: SSL and TLS: Building and Designing Secure Systems. Addison-Wesley, Harlow (2000)

    Google Scholar 

  16. Oppliger, R.: SSL and TLS: Theory and Practice. Artech House, Boston (2009)

    Google Scholar 

  17. Berger, L.T., Iniewski, K.: Smart Grid Applications, Communications, and Security. Wiley, Hoboken (2012)

    Google Scholar 

  18. Mlynek, P., Misurec, J., Koutny, M., Raso, O.: Design of secure communication in network with limited resources. In: 2013 4th IEEE/PES Innovative Smart Grid Technologies Europe (ISGT EUROPE), pp. 1–5. IEEE, Piscataway (2013)

    Google Scholar 

  19. Cisco Systems: Grid Security - Industry Solutions. http://www.cisco.com/web/strategy/energy/smart_grid_security.html. Last update on January 1, 2011; last accessed on May 13, 2014

  20. Juniper Networks: Energy and Utilities - Smart Grid Security Solution. http://www.juniper.net/as/en/solutions/enterprise/energy-utilities/. Last accessed on May 13, 2014

  21. IBM Corporation: IBM and Alliance - Energy and utilities solutions from IBM and Juniper Networks - United States. http://www.ibm.com/solutions/alliance/us/en/index/juniper_energy.html. Last update on May 8, 2014; last accessed on May 13, 2014

  22. Li, F., Luo, B., Liu, P.: Secure and privacy-preserving information aggregation for smart grids. IJSN 6, 28–39 (2011)

    Article  Google Scholar 

  23. IEEE: Smart Grid Experts, Information, News & Conferences. http://smartgrid.ieee.org/. Last accessed on May 16, 2014

  24. Eckert, C.: IT-Sicherheit: Konzepte Verfahren, Protokolle. Oldenbourg, München (2012)

    Book  Google Scholar 

  25. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Unc. Fuzz. Knowl. Based Syst. 10, 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  26. Stegelmann, M., Kesdogan, D.: GridPriv: A Smart Metering Architecture Offering k-Anonymity. In: IEEEE (ed.) 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications Communications (TrustCom), pp. 419–426. IEEE, Piscataway (2012)

    Google Scholar 

  27. García, A., Bourov, S., Hammad, A., van Wezel, J., Neumair, B., Streit, A., Hartmann, V., Jejkal, T., Neuberger, P., Stotzka, R.: The large scale data facility: data intensive computing for scientific experiments. 25th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2011. Workshop Proceedings, pp. 1467–1474. IEEE, Piscataway, NJ (2011)

    Google Scholar 

  28. Finseth, C.: An Access Control Protocol, Sometimes Called TACACS. https://tools.ietf.org/html/rfc1492. Created: July 1993; last accessed on October 22, 2014

  29. NIST: SHA-3 Standardization. http://csrc.nist.gov/groups/ST/hash/sha-3/sha-3_standardization.html. Last update on April 7, 2014; last accessed on May 12, 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wilfried Jakob .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kramer, A., Jakob, W., Maaß, H., Süß, W. (2015). Security Issues in Distributed Data Acquisition and Management of Large Data Volumes. In: Helfert, M., Holzinger, A., Belo, O., Francalanci, C. (eds) Data Management Technologies and Applications. DATA 2014. Communications in Computer and Information Science, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-319-25936-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25936-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25935-2

  • Online ISBN: 978-3-319-25936-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics