Journal article Open Access

An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems

Luigi Coppolino; Salvatore D'Antonio; Giovanni Mazzeo; Luigi Romano; Luigi Sgaglione

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.2539444</identifier>
      <creatorName>Luigi Coppolino</creatorName>
      <affiliation>Parthenope University of Naples</affiliation>
      <creatorName>Salvatore D'Antonio</creatorName>
      <affiliation>Parthenope University of Naples</affiliation>
      <creatorName>Giovanni Mazzeo</creatorName>
      <affiliation>Parthenope University of Naples</affiliation>
      <creatorName>Luigi Romano</creatorName>
      <affiliation>Parthenope University of Naples</affiliation>
      <creatorName>Luigi Sgaglione</creatorName>
      <affiliation>Parthenope University of Naples</affiliation>
    <title>An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems</title>
    <date dateType="Issued">2018-12-18</date>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.2539443</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;Computing power and flexibility provided by cloud technologies represent an opportunity for Smart Grid applications, in general, and for Wide Area Monitoring Systems, in particular. Even though the cloud model is considered efficient for Smart Grids, it has stringent constraints in terms of security and reliability. An attack to the integrity or confidentiality of data may have a devastating impact for the system itself and for the surrounding environment. The main security risk is represented by malicious insiders, i.e., malevolent employees having privileged access to the hosting machines. In this paper, we evaluate a powerful hardening approach that could be leveraged to protect synchrophasor data processed at cloud level. In particular, we propose the use of homomorphic encryption to address risks related to malicious insiders. Our goal is to estimate the feasibility of such a security solution by verifying the compliance with frame rate requirements typical of synchrophasor standards.&lt;/p&gt;</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/740712/">740712</awardNumber>
      <awardTitle>COmpetitive Methods to protect local Public Administration from Cyber security Threats</awardTitle>
All versions This version
Views 233232
Downloads 5555
Data volume 21.9 MB21.9 MB
Unique views 217216
Unique downloads 5353


Cite as