Secure Power Grid Simulation on Cloud
Abstract:
Power grid (PG) simulation is critical for analysis and verification of
power supply noises for robust and reliable IC designs. Computational
demands to simulate PG for ICs with increasing complexity is never-
ending. Cloud computing platforms can be leveraged to mitigate costs
associated with making these resources available. However, since
simulation data usually contains sensitive design information, simulating
on third-party platforms lead to major security concerns. In this paper, we
propose a framework for secure PG simulation on Cloud. A transformation
algorithm to hide current excitations is presented, while still allowing a
majority of computations to be completed on Cloud. We employ multiple
compression strategies to significantly reduce communication overheads.
Experiments show that our framework can achieve similar turn-around
time as an insecure simulator on Cloud, while securing current excitations
and output voltage vectors with reasonable communication and
computational overheads.
Existing System:
Complexity of the verification task grows with growing design complexity.
Users of electronic design software are forced to spend heavily to satisfy
the never-ending demand for computing resources. As semiconductor
industries expand their infrastructure for increased and complex
workloads, they also need to manage their systems much more efficiently
in terms of administration, consolidation, and utilization. Even while
design enterprises can afford the hardware expansion costs, many of them
have reached other limitations like data center space, power and cooling
capacities.
Hardware redundancy and obsolescence also need to be considered. The
resulting costs can be several times more than the cost of hardware itself. A
recent study on improving data center efficiency concluded that power and
cooling requirements, rather than floor space are the major inhibitors in
data center expansion.
Proposed System:
Cloud computing can be utilized for PG simulations. However, security is
a vital concern, since outsourcing computations cause users to lose
significant control over their data. In this paper, we investigate secure
outsourcing of system of DAE for a PG network, to a Cloud platform.
We present a technique to transform the excitation waveforms, such that all
computations are performed on transformed patterns and Cloud has no
access to the inputs as well as the outputs of the simulator. In essence, this
secures temporal and spatial power consumption profile of the IC under
consideration, which could leak crucial information on placement of vital
circuit blocks within an IC and their switching activities.
Current variables can be re-ordered to obfuscate spatial information.
However, PGs exhibit a fairly uniform structure. Therefore, a determined
adversary can still reverse the ordering to gain significant insight on the
location of critical blocks. The proposed scheme can be extended to
simulate the PG under multiple input excitations simultaneously, thus
mitigating the costs for the aforementioned transform.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

Secure power grid simulation on cloud

  • 1.
    Secure Power GridSimulation on Cloud Abstract: Power grid (PG) simulation is critical for analysis and verification of power supply noises for robust and reliable IC designs. Computational demands to simulate PG for ICs with increasing complexity is never- ending. Cloud computing platforms can be leveraged to mitigate costs associated with making these resources available. However, since simulation data usually contains sensitive design information, simulating on third-party platforms lead to major security concerns. In this paper, we propose a framework for secure PG simulation on Cloud. A transformation algorithm to hide current excitations is presented, while still allowing a majority of computations to be completed on Cloud. We employ multiple compression strategies to significantly reduce communication overheads. Experiments show that our framework can achieve similar turn-around time as an insecure simulator on Cloud, while securing current excitations and output voltage vectors with reasonable communication and computational overheads.
  • 2.
    Existing System: Complexity ofthe verification task grows with growing design complexity. Users of electronic design software are forced to spend heavily to satisfy the never-ending demand for computing resources. As semiconductor industries expand their infrastructure for increased and complex workloads, they also need to manage their systems much more efficiently in terms of administration, consolidation, and utilization. Even while design enterprises can afford the hardware expansion costs, many of them have reached other limitations like data center space, power and cooling capacities. Hardware redundancy and obsolescence also need to be considered. The resulting costs can be several times more than the cost of hardware itself. A recent study on improving data center efficiency concluded that power and cooling requirements, rather than floor space are the major inhibitors in data center expansion. Proposed System: Cloud computing can be utilized for PG simulations. However, security is a vital concern, since outsourcing computations cause users to lose significant control over their data. In this paper, we investigate secure outsourcing of system of DAE for a PG network, to a Cloud platform. We present a technique to transform the excitation waveforms, such that all computations are performed on transformed patterns and Cloud has no access to the inputs as well as the outputs of the simulator. In essence, this secures temporal and spatial power consumption profile of the IC under consideration, which could leak crucial information on placement of vital circuit blocks within an IC and their switching activities.
  • 3.
    Current variables canbe re-ordered to obfuscate spatial information. However, PGs exhibit a fairly uniform structure. Therefore, a determined adversary can still reverse the ordering to gain significant insight on the location of critical blocks. The proposed scheme can be extended to simulate the PG under multiple input excitations simultaneously, thus mitigating the costs for the aforementioned transform. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP.
  • 4.
    • Front End: - .Net • Back End : - SQL Server