Skip to main content

Advertisement

Log in

Benefits of cloud computing adoption for smart grid security from security perspective

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing is a new IT trend with several economic benefits and many applications are migrating to the cloud environment. However, there are concerns on its adoption for critical data infrastructure caused by security issues and privacy data. Survey results show the most sensitive items of IT managers for cloud platform adoption are cost efficiency and data security. To review the benefits and challenges of cloud environment adoption in critical infrastructure, we identify new energy system of smart grid as an example. Also, we compare the well-defined security requirements of smart grid system with current cloud computing status to check if smart grid system can use cloud computing environment from the security perspective. In addition to functional review, we anticipate the changes of security investment efficiency after cloud environment adoption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Armbrust M et al (2010) A view of cloud computing. Commun ACM 53.4:50–58

    Article  Google Scholar 

  2. Gurjar YS, Rethore VS (2013) Cloud business intelligence-is what business need today. Int J Recent Technol Eng 1.6:81–86

    Google Scholar 

  3. Mell P, Grance T (2011) The NIST definition of cloud computing

  4. Locke G, Gallagher PD (2010) NIST framework and roadmap for smart grid interoperability standards, release 1.0. National Institute of Standards and Technology, vol 33

  5. Natarajan B (2009) A dozen things the smart grid can learn from the internet. earth2tech. 4.30

  6. Cardenas AA et al (2008) Research challenges for the security of control systems. In: Proceedings of the 3rd conference on hot topics in security

  7. Naruchitparames J, Güneş MH, Evrenosoglu CY (2011) Secure communications in the smart grid. In: Consumer communications and networking conference (CCNC), 2011 IEEE. IEEE

  8. NIST (2009) Smart grid cyber security strategy and requirements, CSCTG (Cyber Security Coordination Task Group)

  9. McDaniel P, Smith SW (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77

    Article  Google Scholar 

  10. Popovic K, Hocenski Z (2010) Cloud computing security issues and challenges. In: MIPRO, 2010 proceedings of the 33rd international convention. IEEE, pp 344–349

  11. Kim W (2009) Cloud computing: today and tomorrow. J Object Technol 8(1):65–72

    Article  Google Scholar 

  12. Motahari-nezhad HR, Stephenson B, Singhal S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE Int Comput 10

  13. Roehrig P (2009) New market pressures will drive next-generation IT services outsourcing. Forrester Research

  14. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1.1:7–18

    Article  Google Scholar 

  15. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Network Comput Appl 34(1):1–11

    Article  Google Scholar 

  16. KISA (2013) Survey on security activities in online service providers. http://isis.kisa.or.kr/board/index.jsp?pageId=040200&bbsId=15&itemId=43&pageIndex=1

  17. Anderson R, Moore T (2006) The economics of information security. Science 314.5799:610–613

    Article  Google Scholar 

  18. Bojanc R, Jerman-blažič B (2012) Quantitative model for economic analyses of information security investment in an enterprise information system. Organizacija 45.6:276–288

    Google Scholar 

  19. Mclean G, Brown J (2003) Determining the ROI in IT security. CA Magazine

  20. Purser SA (2004) Improving the ROI of the security management process. Comput Secur 23.7:542–546

    Article  Google Scholar 

  21. Sklavos N, Souras P (2006) Economic models and approaches in information security for computer networks. IJ Netw Secur 2.1:14–20

    Google Scholar 

  22. Gordon LA, LOEB MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur (TISSEC) 5.4:438–457

    Article  Google Scholar 

  23. Gordon AL, Richardson R (2004) The new economics of information security. In: Information Week, pp 53–56. Retrieved February 11th, 2007

  24. Lee A, Brewer T (2010) Smart grid cyber security strategy and requirements (NISTIR 7628 Draft). National Institute of Standards and Technology, Gaithersburg

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanghoon Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, J., Kim, Y. Benefits of cloud computing adoption for smart grid security from security perspective. J Supercomput 72, 3522–3534 (2016). https://doi.org/10.1007/s11227-015-1547-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1547-0

Keywords

Navigation