Abstract
Cloud computing is a new IT trend with several economic benefits and many applications are migrating to the cloud environment. However, there are concerns on its adoption for critical data infrastructure caused by security issues and privacy data. Survey results show the most sensitive items of IT managers for cloud platform adoption are cost efficiency and data security. To review the benefits and challenges of cloud environment adoption in critical infrastructure, we identify new energy system of smart grid as an example. Also, we compare the well-defined security requirements of smart grid system with current cloud computing status to check if smart grid system can use cloud computing environment from the security perspective. In addition to functional review, we anticipate the changes of security investment efficiency after cloud environment adoption.
Similar content being viewed by others
References
Armbrust M et al (2010) A view of cloud computing. Commun ACM 53.4:50–58
Gurjar YS, Rethore VS (2013) Cloud business intelligence-is what business need today. Int J Recent Technol Eng 1.6:81–86
Mell P, Grance T (2011) The NIST definition of cloud computing
Locke G, Gallagher PD (2010) NIST framework and roadmap for smart grid interoperability standards, release 1.0. National Institute of Standards and Technology, vol 33
Natarajan B (2009) A dozen things the smart grid can learn from the internet. earth2tech. 4.30
Cardenas AA et al (2008) Research challenges for the security of control systems. In: Proceedings of the 3rd conference on hot topics in security
Naruchitparames J, Güneş MH, Evrenosoglu CY (2011) Secure communications in the smart grid. In: Consumer communications and networking conference (CCNC), 2011 IEEE. IEEE
NIST (2009) Smart grid cyber security strategy and requirements, CSCTG (Cyber Security Coordination Task Group)
McDaniel P, Smith SW (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77
Popovic K, Hocenski Z (2010) Cloud computing security issues and challenges. In: MIPRO, 2010 proceedings of the 33rd international convention. IEEE, pp 344–349
Kim W (2009) Cloud computing: today and tomorrow. J Object Technol 8(1):65–72
Motahari-nezhad HR, Stephenson B, Singhal S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE Int Comput 10
Roehrig P (2009) New market pressures will drive next-generation IT services outsourcing. Forrester Research
Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1.1:7–18
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Network Comput Appl 34(1):1–11
KISA (2013) Survey on security activities in online service providers. http://isis.kisa.or.kr/board/index.jsp?pageId=040200&bbsId=15&itemId=43&pageIndex=1
Anderson R, Moore T (2006) The economics of information security. Science 314.5799:610–613
Bojanc R, Jerman-blažič B (2012) Quantitative model for economic analyses of information security investment in an enterprise information system. Organizacija 45.6:276–288
Mclean G, Brown J (2003) Determining the ROI in IT security. CA Magazine
Purser SA (2004) Improving the ROI of the security management process. Comput Secur 23.7:542–546
Sklavos N, Souras P (2006) Economic models and approaches in information security for computer networks. IJ Netw Secur 2.1:14–20
Gordon LA, LOEB MP (2002) The economics of information security investment. ACM Trans Inf Syst Secur (TISSEC) 5.4:438–457
Gordon AL, Richardson R (2004) The new economics of information security. In: Information Week, pp 53–56. Retrieved February 11th, 2007
Lee A, Brewer T (2010) Smart grid cyber security strategy and requirements (NISTIR 7628 Draft). National Institute of Standards and Technology, Gaithersburg
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, J., Kim, Y. Benefits of cloud computing adoption for smart grid security from security perspective. J Supercomput 72, 3522–3534 (2016). https://doi.org/10.1007/s11227-015-1547-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1547-0