• Title/Summary/Keyword: Smart Grid Personal Information

Search Result 16, Processing Time 0.024 seconds

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

Legislative Reform of Smart Grid Privacy Act (스마트그리드 개인정보보호법제 개선)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.415-423
    • /
    • 2016
  • Smart grid systems can be real-time information exchange between suppliers and consumers, and provides a lot of convenience. However, the risk to the user's personal information exposure is ever-present. Depending on the characteristic of the smart grid environment, there is a threat of the disclosure of personal information based on the personal information life-cycle, and can also be exposed a variety of information based on energy consumption pattern analysis. In this paper, we analyze the existing privacy act in the smart grid and propose improvements for the existing directive.

A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment

  • Lee, Donghyeok;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.263-270
    • /
    • 2017
  • Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users' life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

Security Vulnerability and Technology Status of AMI (AMI의 보안 취약성 및 기술 현황)

  • Jo, Han-Seong;Lee, Yong-Gu;Jeong, Sang-In;Choe, Jin-Ho
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.73-78
    • /
    • 2017
  • Recently, a number of foreign electric power companies including domestic Korea Electric Power Corporation (KEPCO) have actively engaged in the construction of a power grid with the concept of a smart grid. The Smart grid is a technology that increases the efficiency of the power by converging the information network with the power grid. It can maximize the energy efficiency through the two-way communication between the utility and the consumer. However, as the power grid converges with the information and communication network, security threats are increasing more than existing power grids. Due to the nature of the power grid, the damage caused by security threats is not only personal privacy but also economic loss of society. So smart grid becomes the target of hackers. In this paper, we discuss security vulnerabilities of Advanced Metering Infrastructure (AMI), which is a core technology of smart grid construction, and the corresponding security technologies to prevent security damage of smart grid.

A Study on the Prospective IT R&D Fields in the Smart Grid Area (스마트그리드산업에서의 유망 IT R&D 분야 도출)

  • Sim, Jin-Bo;Ha, Young-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1416-1427
    • /
    • 2010
  • Except for some fields, Smart Grid-related technology in Korea is considered to be below the level of developed countries. Under this situation, this study is conducted to look into IT technology related to Smart Grid and draw prospective IT R&D fields in the Smart Grid Industry. To seek out prospective IT R&D fields, the two-stage process evaluating economics, political property, and technical validity. According to the result, four fields of (1) sensor, (2) information protection, (3) AMI middleware, (4) electricity management are selected as prospective fields. The sensor and AMI middleware fields focus on development of key technology, so the strategy that launches leading products in global market faster than other countries(Focusing & First Mover Strategy). The information protection felid is divided into the safety technology for the felid electricity network and the personal & corporate information protection technology, and therefore the R&D Sharing strategy is efficient. For the electricity management filed, a strategic alliance for developing component technology of Grid is desirable.

Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid (스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조)

  • Park, Nam-Je;Song, You-Jin;Park, Kwang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.57-67
    • /
    • 2010
  • Smart grid technology can expand energy efficiency into the home by monitoring consumer energy usage in real time and communicating with household devices that respond to demands to shut off during periods of non-use, allowing individual consumers to control their electricity usage more effectively. But, the information collected on a smart grid will form a library of personal information, the mishandling of which could be highly invasive of consumer privacy. There will be major concerns if consumer-focused principles of transparency and control are not treated as essential design principles from beginning to end. In this paper, using. All-Or-Nothing Transform encryption mode for providing smart grid security, we propose efficient distributed data Management based on XOR operation. The contribution of this paper is to provide a secure algorithm that manages efficiently distributed data in the field of private data in smart grid environment.

Grid Computing System based on Web Worker for Smart TV Environments (스마트 TV환경에 적합한 Web Worker 기반의 그리드 컴퓨팅 시스템)

  • Kim, Hyun-Sik;Jo, Geun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.11-17
    • /
    • 2012
  • In recent years, there has been a popularity rose up on Smart TV (Smart Television) usage at home. Therefore, it is also have increase the demand on grid computing system. Smart TV has a variety of platform and usage compare to PC (Personal computer). Base on this, it is difficult to apply a traditional grid system on Smart TV. One major reason are concerning the small idle time compare to PC. To overcome this problem, this paper will propose a Javascript grid system and introducing a new scheduling policy that best suit for a smart TV. We have conduct an experiment on the proposed method. The result provides an average of 1.78 percent, which is improved compare to the traditional method which is only provides an average of 0.09 percent.

A Study on Metering Data De-identification Method for Smart Grid Privacy Protection (스마트그리드 개인정보보호를 위한 미터링 데이터 비식별화 방안 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1593-1603
    • /
    • 2016
  • In the smart grid environment, there are various security threats. In particular, exposure of smart meter data can lead to serious privacy violation. In this paper, we propose a method for de-identification method of metering data. The proposed method is to de-identify the time data and the numeric data, respectively. Therefore, it can't analyze the pattern information from the metering data. In addition, there is an advantage that the query is available, such as the range of search in the database for statistical analysis.

Smart Social Grid System using Interactive Sketch Map (인터랙티브 스케치맵을 활용한 스마트 소셜 그리드 시스템)

  • Kim, Jung-Sook;Lee, Hee-Young;Lee, Ya-Ree;Kim, Bo-Won
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.3
    • /
    • pp.388-397
    • /
    • 2012
  • Recently, one of the received attraction fields in web based service is 'Human Relationship Service' that is called SNS. This relationship map service is able to deliver information to user more easily and visually because it is intuitive data that is linked with offline real world. While past map service put physical real information in the map, present map service is evolving into new communicative platform that expresses social relationship beyond simple search platform that shows real world. In this paper, we propose smart social grid system using sketch map that is based on online map service structure. This system has features such as standardized interface provision for various SNS, use to governance hub tool in case of establishing a personal network through expanded social grid, a role of bridge to mashup software linked with other SNS, user environment construction that reproduces social grid data, and the faster service setup by improved search technology.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.