No. 14-F-ITP-1323
($
)
- .
!"
#*+ ,
#
%$&
' ()
!"#
%$!"#
%
[email protected]
[email protected] /"# $% (
&
/ $0
. .1
,
- .+ ) $ *
0 + 8 0
" 4 21
0 . ,
2
25
32 @ +:> 6 :A #
0 : 2#
7 4 , B2 2 . 012
)
2
#
@ 7+ ( 32 I2J,
L H
I J
#M
Q%
L
+:, 4 :
B
/"#
%$/
+ U
X [4] 41 Y, 0!
0>
. , X )
: 2# 0! ! +!3
!"#
%$0V
0V U
- BO[ @ TL 0
,
,:
/"#
%$: 2# 0!
6 0 (! P
2 @ 7+
> "# $% 0>
UG+?
6! > 7 7
0>
,
0V
- .
#*+ ,
&
0(. *
F
7
*F
.* 4
1
8
D
D:; $% 9!:3
#
D JK D=L I* 4
.
N +S
?
6 M
OP )
G. / + * #
F
:
* QA % D V
: O@ E
P4
J ($
46! >
%
T4Q R
0(F
O
W F (
)
F - 0. F HV
!" #
%$4 10 3J X$ + '
> 25
03 7 6
E
* 9!:3
V!:3
,U
! # \K
. 7
$; 6
= 7
> ) *
.
6 , :&
+ -Z P
T4
23 4
C4 B
G +
U:>
T2&C
: 0+,
7
(
1
> 7/
!E
23 4 7
R2
Q/+, ,
7
)
6
.1.1 (
> ) *@A +
F
8
7)5 "
6
P >
.[3] 2
6 .6
6
C+, ()
! : 2# 0! ( +, 6
,
7
7 H5
4 :
:;
&1 0 .O5 * # C
( ! +!3 7 0 : 2#
G ;
62
C+,
#@ ,
*
23 4 ? : 7
2/?, % 29:
2
:K +5 ,
=
7 ( ! +!3 0
5
7 6
L
,
(
0+; '
0 #
.[2]
:>
& =7
0 012
6
2A #
C
/+
0
= %(
+.
2/3
;
4 2
'
— #
% +
77
>
' . ,
,
X .
X X
!"
—
!
# $% X * = # O
#, 6
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
*&, P
2 6/ #
+5 ,
,
:> %
4 :
e #
%
P
.2
Y
L
% (6
+ "
(0!
0 10 #
Z - !
( ,
I J
0!: 0 012 0
. ,
6+
0 0
.[2]
P
>
#
> c2
0:
6
6 % iJ, '
0 -
2v >
Q%e J 2 M
@2f \ . ,
%(
& e #
A%
+ '
, 6!
x Pe # 0 GB 2 av,
6 77
0+; ' - 2K :
. , Q%
,
P
= %
P >
, 3
: [
3
: 2# 0!
: 2# 0! ( : [
( J + '
.2
0>
,
f+. 9
,@
)
: 2# 0! ,
ef l
(6 (0!
0V 0 (
s?" (
,
+,
f+. G 0 ,2
m J 0+; ' - 2K -O
% :P ;
23
2
&
, 5p (3 (2(WAMS)
5,
0>
0!
:;
% (2 ( ::>e f
(4 (
#0!
,
1
? -[
2 5
212 4 2 &
m.
2 i " (1) \!
#
C+,
(
(!
G . :+
9:
: 2# 0!
2&C @
#
# !# 0V
k % 32 4 :
G . L
$
#=?
= %
: 2# 0! L
d c2 #
G .H
.[6] 2
#
#=# $% \f
-
: 2# 0! ( G> /
(- &L
\V
& j12 ( 32 4 :
:T9
5 % * # 25 : 2#
. 5 % * # 25
L
: 2# 0!
"+: -Z 7
: 0+,
!#
0V - . *+ , UG+?
0
,
, (s?"
(0!
Xg2> Y 7 4 :
=# > j , 6 2
\ @
, : 2#
0327
- 2K 0; [ - 2K 0
32 4 :
[4] 41
- . *+ ,
Q3 (
J (#
m J
% w2f5
Q% R :+1
G . 0! 6 . '
#=3 g \
. :> -
6 :g
=
9+
/
5
#
> ,
' ::>e f
2:> 0!
:; X > 0 &: : 2# 0!
#0! #0!
0
&/
L
+
\ .
Q%e J
012 \ .
#
.[5]
( 29:
, +,
: 2#
2/?, % = %
X !
m7
. [9]
0> 0A P
0
4 2
.[8]
,
= 0+ Q' k +
\ . (6
( >
, %
4
#@
*+ , X 0
:; -O
4 : m [
.
=
GG 3 6 a C:> 6 ` ,
9+ e # .[7]
29: 0 ( +, 6
(6u J ( P > [ 6
Q'
: 2# 0!
0; K0
2
.
: 2# 0!
j3 .
"# ( P Y ,
7 0 o, % (1 \ ' ; @ +:> (5 ()
: (8 (4 2 0!
= % *+ ,
@ 7+
eJ
(7 (0+; " %
' . ,
>
.1.2 , y
Y 7
+5
4 2
+: m [
>p
#
=
d \ . "
4 :
* 7+
6 0>
,
.[10] #
.
P X > 0 0>
35 6 + > 4 :
Q'0
, 0
#
: 2
+,
.)
: 2# 0!
C: p
#
:; G 0 ,2
;
(
1
+,
0B2 L 0 0V
>
6
(! 2
= 0B2 L 0>
(# 5,
3
6
=
&+ ; < (
.[11] #
t
%X ( %4 :
1
+5
*
"
= ; ( # 2L
"
> ,
f?"
,P , +, 5 Y 7 ( 6 + >
3
6/ #
A % (0 Z :g
2 *# ;
@ 7+ ( 32
#=?
9 )
! +!3 0 o, % 2A #
0! m [
: !%Y, 0
NIST
Q/+, ,
2
UG+?
, +, 1
[
B2 2 0> 4 : 2
: 2# 0!
25 UG+?
#0 Z . ,
#0!
C+,
' :
:(1) Z
. l: /: t ( :> % 32 4 :
NIST (National Institute of Standards and Technology) Wide Area Measurement System 3 Layered & heterogeneous architecture 2
4
X
X # ?
HV ?
Cloud Computing
2
)
X 25 4 2 / ! (
7
(
@,
0 TL
&1
#) Y ; ] G5 : 2#
25
::>e f ( +"
, 25
2A # . ,
; 0
# , 25 14 :
:#
&
0 012
32 (
5 0V
5 ::> , 25 & 6
#
0> :+ # e #
:# 0V
. [ 0> +5
•,
5
L
P 0G •,2 0•>
• :; H••
6
,
(
•, X• 0•: &
(
,2
,
P
L . 2 C+,
6
.*
\ B *+ , 6 :g jf
,
B , 0 (1a
*# ;
0+ &
Z ( . ,
, :# 0V
2f
=
" "0 G> . 2
0
(3
0 0>
,X
(4
20 . ,
(
:# 0V
+5
UG+?
,2
5 0V
#@ & " (3) \!
+, #@
X ( 'a #@
,
j3 .
#@
. # 5
2:B
5
5
.[16-14 ,12] >
6 ") K
0>
2&C
2:B 0 T C+G% (2 (3
5
5 0V
ff?+
!
5 >
X
{ ?+,
.[13]
=
5,
2:B 0
,
U 2
2[ 0
C+, ( , 0!
&:%
5 0> 2 +" )
(@2
f ?G
T2&C
; T (1 \ 2:B 0
; ?, 4 :
2
Z2
. ( ::>e f (
L m [
=
> &:%
j3 .
2
:(2) Z
# 5,
B2:+ -
1
#0!
+ +: # 5 ,
#*+ ,
! ;
2v >
6 #
5
4 2 #6
( A%
•
•:
# L
\!
s?" .-
11
+
77
=%
L . ,
!
>
•
::>6
• \• B *+• , :g
C+, (M
P
L
• = • \ !••"
,
'
1
#6
! ; 4 : X3 :94 :
! ;4 : (
•L
GG 3 6 a C:> 6 ` ,
;
.[15] # 10
> ,
5•
# P
8
4:
,
#
.[12]
&B &B
L 4 : :
%
=
, 0C < ( # , 25
( :#
/
#
>•
: 2# 0!
L .
. , s?"
; :6
C+,
L 4 :
GB 2+
& 1394 – )
>
.[15] #M
(
#
5. ,
32
X 0V
j, : T L 0C < : 7 :#
C>
# o, % 29: 0
0>
1
C+,
2
B j
'
. 0! (
)
$ / H )
6 ") K
6"
/ V:!4 );
*
) K 6 "
, X• P 2•
, +:,
3
L
+:,
( , >
•; ?•,
#0
0
" (4) \!
M +6 "
0> 2J #
av, jf \ B *+ , X ( ; ?, (
,
L
) UU3:
7 :(4) \!
:; X > 0
.
CG+? - OJK
1
:2
= # P6 + &
?
#@
User Service Provider 8 Virtual Machine 9 Resource Provider 10 Virtualization 11 Distributed System
1
Service Provider or Cloud Provider Consumer or User or Client 3 Cloud Software as a Service (SaaS) 4 Cloud Platform as a Service (PaaS) 5 Cloud Infrastructure as a Service (IaaS) 2
3
i "
5 0 0
6 7
:(3) Z
0> 2
C+,
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
0 012
(
G B
0!:
#
:2
4 2
:# = ;
5
#@
5,
;, !
(
,
%@
c2
%
&G!
6
2 B
:; y
&+>
, K2f5
-
.) 6
5, ) : L
0 "
2
6B
€ ::>
. ::>
\ B
#=#
%$:T9
/J
kO 8Y2%2!,
. 41 / % 6 0>
, \3 6 0
2:> 0> >
0GL
# 21
GB
P4 1 25 GB
GB
=
#5 >0
# :+
0>
, T Z (c2 2
. '
. ,
2
#a C:> 6 :A # # P
-Z 7 %72.8)
*L 6 +" 0> # 2 2
57
4 2
.
2
P2
29: 0
5
&1 0+
%
C+,
C+,
;T
0+ Q' k + 0 UG+? . , ( /
-Z 7 %27.2 ' :> %
%X 4 2
( J5 ƒ
0 %0
. ,
0+; '
4 2 ,
3 2
4
&P
,2
#*+ , (
( 0C. )
2
L
G 3 25 6 . 2 3
: s7 \
- .•
U.2+ *+ , - G B
2 J5 0 2' # T
Hypervisor Geographically Distributed Environment 3 Fault Tolerance 2
@‚
&1 :4 : k + •
C+,
5
1
0>
: B , = ;•
: = % 6 / 1 *+ ,
„ - G B
•
#
>k
3
/
.= %
.
B ,= ;
#*+ , 0 B
. '
; d1 9
0
4
Scalability Public Cloud 6 Hybrid Cloud 7 Community Cloud 8 Scopus
0G 1
:> %
4 :
#*+ ,
(
+ \Z
#*+ , 0
0: &
#0!
J5 L
*+ , . :>
03 7
4 2
j,
; d1
B , - .(
; ?, 4 :
> 0 TZ 6 #0
, 01 2
= ;
,
CG+? j
+:,
/ 2/g
; •# j 2
; d1 ' :> %
,
, 6 = :
; • # 0>
:2 :> %
4 2
;
% :g
> 0>
! # 6 TL
@ ‚ 2J ( :+ # +"%
# / . #
C+, "
0 2008 @ ,
, /
( 2:B
GB -OL ,
(
Z 7 6+; ' 9 (
0V -
2
6 4 2
!;
C+,
G5
@
1 \
2 0
2
X
> '
,
0
#*+ ,
#
.
GB 0:
!g
25 6 0>
0>
0
L 1 6 :A # .
GB
: #(
#*+ , 0 ,2 jG. (
! 0!
*# c2 L
+? 25 - J. 0>
4 2
= +
0>
X #
#*+ ,
2 t
I J # 2v > @f M
012
- BO[ (Y2%2!,
,
.
*& 0 :1 6 :g U
21 # 2 v > c2
0+; '
" #@ , X !C 0 -Z 7 G3
€
4 2
&: & P 0> ::>
! #
%
&1 , ,
-OL
(
5
*L : *+ , X
0+
! (
:, 2 G
GB 03 7 28456 ;
0:
=
G> - G>
((5) \! m J . , c2 2
25
>0
, 6 0 :1 6 3
. ,
.2
#0
-Z2f
,
"
a C:>
BO[
'
L \ B *+ ,
0B2 L (
> , *+ , X
. : 0>
# 2v >
.
GB . ,
:+,
.[20]
( +, 6 0V
/ % 6 R ?+ +
#0
0 :1 . :+ # +? 25 \7+
29: 0 (03 7 6
=
;T 0 Z X 9
0 P X > 0 0>
:[17] 2
/ %(
0+5 :
. ,
"+:
TL
>
0V
#* L - 2K
2
6 T
H3 † s?
P4
::>= % 2:B
L 6
*+ , 0>
> j>
.[19 ,18] , 7( 2
: O@ E
x
( , P
0 & … > +" (
32
0> :+ # \7+
) K2f5
+
L 6
.2
0&
5,
> ,
5
,2
5 c2
#
j•f 25 0 f :
=
+5
+"%
g
(
,X
2
B , =# >
2
=?
=
#"
=
# V:
0. ) K
+
Smart Grid
7
Energy Efficiency
&
5
Energy Utilization
: &
3
Sustainable Development
% 0 ,2
3
Gas industry
' 4 :K
3
Better performance
(8) \!
=
H
# 2"> j
: 2# 0!
Pt
\K
j
0 t2
,2
# /"
0 t2
-Z 7
O,
*
+
V
/+
. ,
(
GB :+
&: 0>
> 0V
P U
+ -Z
> " 6 +"
> " 6 +" 0> 2
:# (
#0
ˆ% /"
03 7 144
. ,
3P
Z
,
0 " 0L +
0
-[
# /"
# 2">
2J
2 6
,
+ :K (
, 03 7
"+: & ( >
+ :K
: 2# 0! 0:
0 P ' :> % 0>
,
"+: 03 7 29 "
77 =
!K @W .
+ ; . :(8) Z
5
P2
T2&C
>
> 2 P 0>
0:
,
=# $% 0>
+ ; . :(6) Z
29: 0 ((7) \!
% H 0 0>
,
Z7
GB - :+
" ( 0+5 %
P
>
1 O > c2 2 X .
,
C # @W .
c2 2
03 7 253 \> 2 C
: .2 *GB 32
(6!%
(
+
> "
+ :(5) Z
!G B
: ,
a :C #* L
::>
2
# /"
497
#,
+&
=
6 g 2">
29
&: 2:>
.
a :C #* L
; !2 ?
32
!K @W .
1674 2129 (5898 (7491 "+
! @ ! :(1) ? % ,
*GB
C:
(6 g 2"> ((6) \! m J
> .2
!K @W .
0:
#
25
2015
2010
2 B 05 g \
2
#@ , = 32C[ 0G
>
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
' ::> 32
0
;T
C+,
&1 2 -
3
2:B 0
=
5, +"
L
.[22] ::>
*+ , X [9] 41 GK
( C+,
+:
'
> %
"+:
€ ()
#
2L+ 1 0 0> 3 !, \'2' 2L+ 1 2 2 %
:;
: 2#
#0!
Y2%2!,
#M '
GB
#03 , (j+> ( #03 7
=
/ % 0 mG +
&P
=
> 0:
- 2K 0
,
* # 25 # P
# ;T
TL
: 2# 0! X
# U K2 0 0
: 2# 0!
0> 2
: 07 [ : 5 %
+ &
# : =%
9+
2 U < TL #0: #
210; K
EMS *+
# '
!G B 2 & 0 X > •
: 2# 0!
D:;
?
, 2:B 0 # 2 v >
! K
7
:(9) Z
0 ,0: & 29: 0 (9) \!
" '
\p
# '
#
.\
- BO[
[
1M #\!
0
,
%
%m [
2 U">
:; :(
[ x
- 2f AMI ,2
T P(
" % c2. ƒ
.3.1
9 d
(Volt/VAR
'
BO[
:;
*+ ,
# .
C+,
:(- BO[
6 OP :x
5
- BO[
2
, :x) T2, T ' P
Emeter
, - BO[ j > 0+; " %
1
UG+?
9+
2 e # 0 \
7
Supervisory Control and Data Acquisition Advanced Metering Infrastructure 9 Stream Processing 8
6
21 0
2
>
%
+, 2A #
,2 : 2#
; T j3 . 5 .
x ,
({ 5 AMI
! # Verizon
#*+ ,
5
*L
6
,
P
!# )2;
5 2:B 0 25
7
0V
Energy Management Home Energy Management 3 Demand Side Management 4 Building Energy Management 5 Outage Management 6 Distribution Management System (DMS) 2
(DSM)
,0: & ( 4 2 *+ ,
=
! +!3
# '$ 6 :g . # o, %
6
(e f - BO[
#0!
+" 6
:; 0 +? 25 0+ 3 0> [21]
B2 2 ( : 2# 0!
o, % P
' ::> 32
3
.
.3.1.1
( 212 )
+5 ,
T'
0
, 6
\ .
(BEMS)
•
C+,
H
:
: 2# 0!
=
25
. # ( ':
x
4
2
. :+ #
(2(HEM) @ :
'
2 U">) T
B 0: &
: 2# 0!
,0g v!
7 o, % :@ T '
.8(AMI) : 2# 0+; " % 9
2
*+ ,
0
L 0 X > •
,=
1
#
0 012
> 2
J:
0G , 0 : 2#
B 46 &:
# >
=
/=
5,
0> 2
L (-O!" U"> (- BO[
L
:
0 -Z 7
.3
,0: &
#X :!
7 0: & o, % @ ,
H
G/
. :
1
- .+ e 4 *
0+ 3
2:B 0
=
: UG+?
- BO[
.
+
+
> ,
# ;T
@‚ 0V
#
5,
2A #
,
25 0>
%
0 ( :x =
; T
G>
5
L
7
. ]:%
0 6 ,
!3 SCADA
&1
C+,
=
GG 3 6 a C:> 6 ` ,
5 2:B
6 .2
5, 7
2
2
! (
. t
#\!
OB . ,
=
( 25 0 mG + IT
UG+?
*+ , 0V
C+,
3 :>
\ !"
'
: 2# 0!
'
V .( :2
.
C+,
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
: 2# 0!
=
#
> ,
GG 3 6 a C:> 6 ` ,
#@
C+,
:(
7
: =%
' ::> 32 6 m J T B ( A %
% 6
o, %
'
. :> 8
? :
6 ") K #
4 : @ +:> 0
4 2 0 012
;
#\ B .
0!
X
e f
, (
(DER)
:> % U
&
@ +:> ( : 2# 0! 2' 2'
,0: &
C+,
,0: &
. :>
% )2, 0: &
( +, 6
7
,
.
*# &L 6
21 . 2 C+,
:;
,
=
32
:; 0>
- ! +!3 0! *+ ,
6 :g X
+
AMI
,
0B2 L 0>
(\7+
Q%
=
( :>
(
.
P
C+, ( :> %) > + x *+ ,
,
G.
#
6 :A # >
\ B *+ , (
L 0Z
0>
.
0+; ' #
#0
+" 0
5p *+ , %
#
\ B *+ , (#
,) "
# 02
:; 6 77
0! g ( (
9 (DGs)
G .
6 O;P
(
=
?
*# ;
2 - 2f
*#
> + *+ ,
.((11) \! )
1
,
>
Natural Language Processing Parallel processing system 3 Multi-Agent System 4 Microgrid 2
Distributed Energy Resources
7
4 :; :(10) Z
5 2:B 0 3(MAS) G B :g *+ , X [24] 41
. ,
5
,
*+ ,
2 M
: 2# 0>
4 : &
\ !"
0
/ %) ,
: 2# 0! X >
L
% *+ , . :#
/ V:!4
, - B 0!
2[ 0
*# 0> : 2# 0! X (12) \!
32
(10) \! #0
#
( !, ) = % @ +:>
0
*#
. P :> %
, +, 0!
;
= %
>
. ,
jf 4 2 0! ::> 32
%
' ! >
#
2 M
@
+" 0
32 @ +:>
: 2# 0!
0Z
! ( : 2# '
& C
+
%
:> %
0> 2J # . ,
0+5 % - BO[ .
>
[
) e f
- BO[ R +> e # . ,
=
! ( / e [ , +
#
0
>
, 0 0!
'
e f
.6
,0
: 2#
# 25
.
(1
[1] 41 ( +, 6
R2g g
*+ , ( 5p *+ , (2
;
+"
2 2&
; #
' !
+" =? †
0>
%
P
> t
\! 6
>
' ::>e f
#M
L 0 Z X SCADA : @ +:> = %
+"
C+,
P >
. , 0+5 % =# $% 0 =
(2
32 4 : (
#M .2
0!
>
[23] 41
%
+" 0 o, %) *L:% T '
+" X
=
- 2K 0
:> %
# P
#0f?" 6 *&
X > 0!
0
5
0 25 0 : 2# '$ 0 012
\> 0: #
= %
G B :g *+ ,
%
1
0+ Q' k +" - BO[ '
:(11) Z
+
=
: 2#
( D:;
4 ,
0
' :
! K
:(
&1 @,
M
: =%
C+,
j, :+
0 ) T &g T '
#
. :> M
,
[ 40!
@ +:>
=
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
0G 1
. :
p?
TZ* f :2
X%
2 0
\&
>\ B
:# = 2%
Q'0
,
2
2
P
Q'
. 2 4C+:
.
#0
(#
2
#0: #
.
j, (
'2G1 X % .
K2f5 * +,
2 0+ Q' k +
‰C
# " 5
0 ,2 29: 0
: 2#
H3 † s?
*L ( # &
> (
>
,
(
3
4 2
0
.
, - BO[
,
&
. . ::>
X 0 #
, 5p (
; -O!" ( #
L
#M
2 \ C+, ( P *L 0> 2[ 5
/
0> 3
m [
- B 0
>
- BO[ .2
m [
:2
(6 > +"
& M
6 . ::>
. t
, : 2# \ , #
#=#
%$# 2 :,
C+,
0 012
+:,
.
/ !
0> B
,
3
# 0!:
- BO[ @ 7+ L
&1
; -O!" (
# %
M
%
, 5p -O!" > 4
(
#0 L M2#
= av,
- BO[ 0
.
(2
+5 0
2
C+, #
2 M
%
O
# " (14) \! 0! UG+?
1
\!
t
1
Real-time Communication Business Intelligent
2
8
:
" @
L 7+
(
:(13) Z
=
/
Virtual Energy Storage Data Storage Devices
C+,
1
T2&C 0 )
(2 :, 6
4
&
P 0 UG+?
. :>
,
3
#DER (0!
9B
L - BO[ M
#
X > P 0: &
:&% 4 :
# !
: 2# 0!
C+,
/
#.2 \
'
=
:(12) Z
0B2 L
2 #
.[8]
0 + 7* # "S D:;
21 0 012
.
. -
= ;
0G 1
1 0 #(
&1 : 2#
X
Q% R :+1
C+,
? 0!
O!"
32
C+, (- BO[ * 9B *L
,
(
:
9B *L 6 :g 6+ j, : 0
P4 1
: h $
%) 0! UG+?
.3.1.2
+ '
-[
0>
0> i K
(
!
.
6
=
(
+"
: 2# > +!3 0! 0 &L &
0+; '
- &L
$
B
& 0 :1 - BO[
# 2 G ( 32 6 .2
.
7
+"
. , : 2# 0! # '
GG 3 6 a C:> 6 ` ,
6
@ KiA 6 : 2# '
> ,
C+, - BO[
. 2 0+ Q' k + 0
X
#
+5 , 6
2
- BO[
,j, :+
=
"> - 2f .2
0
>
: 2# 0!
L
2
+5 ,
, 5p *+ , X ((13) (0
* 7+
t
0> 3
L 0!
#
#0!
UG+?
1
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
* f ( .
= %
2
)
(2 (( / - 2K (
T >
l: +G ; *+ , . ,
5p
[ 0+ 3 0> K2f5 *
2
( K2f5 *
€
,
#0G
0G 7
6
[
+
[8] (15) \!
, -
% U
6 ` ,
!
\ . j, : Y,
=
L (#
.
&
,:
. I2J, 0 G> =
: : 2# 0!
&1 L 0 Z X U
, , c2 2 0,
,
m [
, . '
2
>
% : 2# 0!
: 0:
#0! C IaaS
@
@A +
2
SaaS
=
- BO[ 1
:
6 :A #
:"
6
F
)O[
O>
: 2# 0!
6
X
210; K (
Q%Y 7 ( ! g :
6 M
UG+? -
#
C+, 0
%
5 0V
p
&1 (
+5 ,) : 2# * ; 2:B
0
2 Z
)
+;
#
= %
0 012 #
*+ ,
03
0> 2 # 25 P
6 0 012
K5
2
0: #
X (41 6
.
=
UG+? >
!#
# 0 O>
\G
- BO[
0V ( :
L
(2
# P
5
>
K2f5
j3 . (2
:
[26] 41
0> 2J # . ,
*L M 32
6 Q3 (
0 (Y , 6
0V
@
Z
T
: [
(*+ ,
0 %
.[27]
") 4 0G )
= ;
" (1 \ B x
(
Smart Front-End Tools Big Data 3 Security 4
9
Data Leakage
*& \V
!
2
6
+: *+ , / : M ;)
2[ 0 : . #
+:
,
%
# >
,
& =# > (0! :>
3 ; 6 > +"
, , c2 2 0, B - 2f
O>
'
*+ , X j, :
: 2# 0! > ,2
.3.1.3
3 ; * 7+
:
# P- † '
6
# ,
2
)O[
: 2#
G .= ;
& : 2#
1
Hyper Cloud
Q'0
*L : - BO[
: +
" (16)
7J:
6+; ' 9
"
@
:
B,
/ 2/g
*+ , 6
- BO[
/
#
#
. 2 :# 25
#0!
% B ,
B , 6 :A #
#
( : 2#
. 25 c
)
0G G, 2#
: H
#
#
3
0 [26] 41
Q%e J
&1 /
#
( : 2#
# '
.
GK 0C32 0,
2 5
P
>
6 :A # . , 0+5 %
.2
. , \!
: 2#
c2: (*L
2:B 0
= % UG+? c 2
\ ,
( : 2# 0!
P\
F @i + :(15) Z
=
+:
2?+,
m0 n o3
:;
2
O>
$
0 [25] 41 ( +, 6
:
#
C+,
* L
l 6
:(14) Z
([26] 41
. \ , #
)
: 2#
.
*L 6 :A # g
:;
> - 2f
0!: 0 012 k
;
GK =3 g 0> 0+
- &L "
PaaS
+
0>
#\!
. 012
#
/ V:!4
@
> ,
,
#=3 g 6 *&
,R m [
#
#
+5 ( , +, I2J, ( # 2L U
# 2L 6
#
=
6 6+; '
((
#\! -
" #a +5 I2J,
, I J
‰C (3
+ : UG+?
#0
T > 0> 0Gu
: 2# 0!
2
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
P
G . •
Q%0G
Z
%
E $
[
=
.3.2
% H
( , 0+; '
. 012
G 2 ( 0 0>
2
/:# .[29 ,28 ,22] #*+ ,
C:
,
5
,=
>
: 2# 0!
5,
-B,
2 2
: =%
j , c2 2 6 \ B
C+, O #*+ , .2 e K 0!
#M
P
>
( 0
1 -
1 0 0>
=
,
1 (
(
,=
TL
5
3
6 +&
-
=# > ; f
, =
L
# >
( ,
85.5
> >
0 ?G'
210; K
; < ‚> &/
; f
&/
,
C+,
=# >
-
2
C+,
&1
6
;T
TL
.6
: 2#
x )
# >
"
5 2:B 0
:
%
(UG+?
5 2:B 0 T C+G%
&1 : 5,
2 B X
j3 . 0,
5 2:B 0
"
2 B
>
:
5 0V
+"
C+, #0 '
X 0
GK
5
2:B 0
5,
K2f5
7+, .2
&1
+
&1 UG+?
B;
#*+ ,
6 )
;
0g v!
5 (
,0: &
,
C+, T B
>
,
/g v! (( 3
: [) 3 6 :A # .
#0: #
: 2#
0
03 7
[ [3] 41
0+5 % : 2# 0!
#
; Y +, (- BO[
- BO[ 0 I J - BO[ = > >p
:
7; - BO[ 0!: 2 \ >
. (
K
- 2K
L
>
9:
, +,
(
C+, UG+? \p
=
#
&
2
1
#=? \ > K2f5 *
2 G 12.3 : 2
6 > 32
,
Q% Y +,
: ,
.
:(16) Z
. L
#0!
; 0 - 1& Z
+ : \V ZE
# P 0 (0[2
C+,
32 =# > 0 X > T . 6 ;T
2
0!:
#M
#0: # 6 :A #
# > : [ )1 /
UG+?
+5
.[22] ::> L =# > 2020 @ ,
#0
1 P
' :# 0V
!
7; : 2# 0!
#0: #
>
: 2#
- 2f ) "
# '
jf
0+; '
5
6
#X > 6 *&
0
5 ' :# 0V (
-
7 (X % x
> : = % 6a! + #
2
> ,
0
L 0 X >(
#6
:# 0V
25 0>
( 25
L
& - BO[ @ 7+ L
-
C+,
#0: # # P
= 25 e f
:
1
; < 0>
.2
:# 0V
2g
#
#*+ , ,2
,= 5
%
6 :A # e '
X UG+?
X UG+?
:
\
.
x
%
: ,
. ::>
C+,
( ::>
0> 3
-
e f =# >
T2&C
&
>
GK H
# ::>e f
0> :+ # 2 L (- [ ? =# > P
0>
#
: 2# 0! X
0!
$
2 6
#*+ , :
% •
#\!
:
m [
Q%Y +, • !,
=
GG 3 6 a C:> 6 ` ,
7; •
: !% 4
: 2# 0!
!
6 2G
•
5 % •
+!3 ! ;
: • @ 7+ •
, 5p • • 4
1
5
2
Vulnerabilities Green computation 6 Verdantix
Confidentiality Integrity 3 Availability
10
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
: 2# 0!
0•V
M
•> (
% (@ +:> ( ;
=
' !
Q•%Y • 7 0•G 1
2 0 2:>
)4 ,
: (#
2:B 0
2/?, % (
.
6
0
0>
#0
(DER)
> + ,2 1
: 2# 0!
#=3 g
=
(
' !
6C #
-
32 0!
D:;
) [
QR T4
5p > +
O
#
Z
2 G 6.5
9
03 7 6
.
6E :(17) Z
:j, : +5 •,
- • ! 0•
•
• = •
;0
. ,
:&%
5,
, +,
T B) 2
4 2 UG+? m[ :
# 2">
UG+? t 7 ::>0V
# .
. 2 eC
#
j, :
(
#*+ ,
2
! 0>
21
!
@ ‚ 2J . , \7+
0+ 3 .
s?" #
4 2 UG+?
UG+? c 2 ( # ' 0> 6
5
,
0+
L X :! 21
5
' :# 0V
. :>
\!" 6
/
, X
"
#
tO+5
‰C
&1
+:
#\!
#
"
Y
' '
T2&C
#
# G
#6
m[ :
.
0: &
:2
::> 32
(
=
4.
L
&
#6
@2
2J
,:
60
11
Virtual Power Plant (VPP)
. 2:B
#0 L
e f
'
e f
Q%@ +:>
#
: #
:#
! 6
& 4C 0 # V
0+! .[22] :
25 " , \. )
::> 32
(
25
-
5
#
3 ; :2 0
"/# 0G , 6
:# 0V #0
2 > \!" 0>
# !
C+, (( / .
1
4:
2
#0
5 )
0+; '
#*+ , ( / - B 0
UG+? t 7
#6
# 25
( :
f+.
=# >
TL
, B2
, 6
.
L
# , 5p
0>
:2
0>
e f 0!G
(
32 0 " X % - B ,
eO+V \5
, 0!: 0 012
L
%
#
T B (e f X % - B ,
#0
\ . : 2#
0+; ' 9
L )
X -O
, 6
2
6 6 t
'
'
- / ' 105 0 2010
0> 0
> M2 5
L
j>
& 0 :1 . ,
+ L
&
; < ([22]
T2&C
0: & 2[ 0 : 2# 0!
, 6! +"
2017 @ ,
: . :# =# > K
(e f =# >
5
tO+5
:# 0V X UG+? L
-
6 & 0
# 2">
! 0> , m; 2 6 0 ( #
#0
! 6 ( ,
+; )
&1
::>e f (
:g
2
P
0+; ' 9
L 6
L y
'
25 ) e f (
Š ;-B,
, 0> L P
0>
L
0 012
.( 2
#
eO+V
"7 : 2
L
&1
+: 6u J
*+ ,
#
C
# ::>e f 0!G
=# >
O!"
::> 32 Xg2>-Y 7
L
"
\3 0 )
/ - B0 . , U
(
7;
UJ :
#
\ .
0>
0 # ::> 32
2
:> % 32
( ,
- / ' 45
:
0(
, 7
eO+V \ !" m [
@, 2/?, % 77
#
Xg2> ,
> " 0!: 0 012
2:B 0 #
6
=3 g
'
*#C
'
. T4
O* m; 2 iJ,
( +, 6
0 + $
4 :
\ !" e # UG+? Xg2>
* $
:> %
'
* # V: .3.3
#O
Q% # " T B L
.((17) \! ) 2 6" 1
> ,
D:; ) K *=
* 9B *L 0 (o, % .
#
GG 3 6 a C:> 6 ` ,
0 ( .4 • 5p ( 0•: #
=
: 2# 0!
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
($
)
!" #
%$: 2# 0!
=
#
> ,
GG 3 6 a C:> 6 ` ,
* # 4
J
HC4
W
(
:(18) Z 1
* # 4 ($ =
:
)
!"
62
0 ,2 @
#
+5 , M + ' \& 2 m;2
Xg2>
a% . P
( P s. 2
] G5 : 2#
% 0> ,
+
%(
\
! .2 1" I [ ( 2
# P
25
+,
0 3 J (T . 6
€
'2G1
f+. y
2/ 21
5 iJ, 0 :7; 2
% y
,
Y 7
.[30]
5
"(
2/?, %
5
2J - 9+
2
, 6; [
:# 0V
>
#0
0
0
/+ ' ,
:;
-
3
0V
#0 .
0>
' ,
0> #
7 (UG+? t 7 .
7 # )Y ;
1
2
12
6
Term of agreement
Disaster Recovery
[
‹ 2 c2. ( ,
, *& 6
,X 2
% I [ P +
1 Xg2> Y 7 - 2f
eC .
-
5 m; 2 iJ,
x s. 0 :7; 2 X
21
- [ ? c2.
Xg2> Y 7 ,
-
-
,: #
,e [
, +& . +;
0G 1
7+, (6 2
#
s?"
# (e C
: 2# 0!
+ \Z 0 :
#Y 7
;
+ *x GB
" 5 6 +& .
# ' A%
0> #I [ 6 #
, # P
' :# 0V
#
%$f+. ( , ,
-2G % - 2f
2
:;
# 2">
' !
H C 4 ? .5
5p
#
:
O †
, 6! :> %
;
(
#) Y ; ] G5 : 2#
1
X 0V & 1394 – )
(
-
5 c2 0Z 6
. ,
0V :2
: ({ 5 ,2
:
0!
0Z
0V \ p I
0
5 2:B 0
&
2
V . (Volt/VAR
: 2#
5 0 Z (T
#0
: 2# 0!
&1
. x e f = % (@ : .
L M2#
>
.
/"
,2 1391 @ , 5
1
2
.
20
> .@ 7+
: 2# 0!
1
#0
1
@ +:>
1
= %
+
,
# .
, L
+"% o 0 & (
•
'
.(
L
(
L
.
L
2 M
, 5p : )
%
L
,
R2
5,
2 Y ; ] G5 (
e f
1
,0: & (
,
2
6 :A # € 2
C+, (0G
# 5,
L
0 Z 4.
(T2, 0 Z
-
2
6 2. ( , +, I2J, ( + : .
'
6
(
#
3 ;
+"% o
0&
s?" 0 Z 6
@ 7+
2+ 0>
6
6 :;
2
#
-
. 0
:;
# >
:
5,
.
2:B0
;T
32+
2:B 0 5,
:K
> 0
X -
=
5,
5 2:B0
' !
&:" % : , 0 Z 6 :g \
: 2# 0!
#0! ,
)
:K
=
% T B 0 012 (
0
:>
C+,
5, 07J: ) )
+ '
2
? T'
(Y ;] G5 : 2# 0! 0,
†2
&:" % ()
(
02
2"> -
0>
-
>
;
()
32
5 2:B 0
; T j3 .
/ .
0 (
, 6 :A # ,
: @f
5 : 2#
2B I2J,
5 2:B
13
0G ,
\f+ Y ; ] G5 : 2#
Private Cloud
C+,
( x
#m [
a%
+5 0 012
% e # (@ 0 Z
+5 I2J, 6
! -
#
,
#
. :
1
@2K
+: 0 : 2+ 0>
4 2 #0!
:
, +, iJ, 6
#0B2 L :# 0V X
\ !"
.
: 2#
5
# >
U
\
:K 6 :A # G B 2J
2:B 0 )
5 2:B 0 T C+G% ( # >
> 0 012
5
5 c2 0, # Y ;
5 2:B0
1 : 2# 0!
2 B
0 T . 25
\
0V
0V
5
2 B
1 )
O =:
>
+"% GK
0V
.
\'2'
#I [
] G5 : 2# 5
#*
>
" 2:B
T C+G% (
2 1 % 0+ Q'
21
1
- 7
7+, @
:
C+:
% 29: 0
&:" %
P
: €
C+,
' ! ,
(
4 2
# 25
=
c 2 ("Y ; ] G5 : 2# 1
'
2, 2
03 7 6 .
G5
+5 ,
0+; " %
=
&:" % Q3 . 2
L
0 mG + 0 Z
# , ,6
&1
C+,
5
0
0&
# 0
x
" eQ O >
-
R2f # 25 #0!
C+,
K2f5
1
32 ( : 2#0!
.2
2 4 1 0 012 &:" % (18) \! m J
=
L
L
.2
. ,
% &
# ;T
. #
2">
5,
: 2#
#0 5
1
,
:K) +"&
1 6 .[30] ,
( : 2# 0!
\ > 2J
RP
# 2+:> (0[2
LP
+
# )Y ; ] G5 : 2#
:g
( 6 .2
(
: 2#
>
- † 2:# 0>
% e #
, 5p +
#
#@ , [
: 2# 0!
( : 2# 0 5 ( :> %
1 6
0Z
0+ Q'
1
l O - 2f
.(SCADA . +5 ,
\
2, 2 >p
5,
#
( : 2#
#*+ , ( : 2#
jf
5 2:B 0
\ #*+ ,
L e #
4 2 2, 2
: : )
#0
#
; > 0 ( 2v, B & )
: 2# \7
2 \ B *+ , jf e #
2, 2
>
( : 2# 1
> ,
+ '
;T •
#0
>
e [ 0+; ' - 2K
5 2:B 0 T C+G% •
:
-
I [ 2":
,0: & (4 2 *+ ,
+5 , : 2#
#
GG 3 6 a C:> 6 ` ,
. x AMI .(BMS)
=
0
( &P
(
2#
UG+?
C: p
(• Œ3 ( : 2# 6CG ) 1
2#
2 T C+G%
0 :2 +: 0Z
# ;T
, +,
(
#) Y ; ] G5 : 2#
1
X 0V (
& 1394 – )
: 2# 0!
=
#
GG 3 6 a C:> 6 ` ,
[21] X. Fang, et al., "Smart grid—The new and improved power grid: A survey," Communications Surveys & Tutorials, IEEE, vol. 14, pp. 944980, 2012.
8 [1] B. Bitzer and E. S. Gebretsadik, "Cloud computing framework for smart grid applications," in Power Engineering Conference (UPEC), 2013 48th International Universities', 2013, pp. 1-5.
[22] D. S. Markovic, et al., "Smart power grid and cloud computing," Renewable and Sustainable Energy Reviews, vol. 24, pp. 566-577, 2013. [23] B. Bitzer and E. S. Gebretsadik, "Cloud computing for monitoring and controlling of distributed energy generations," in Power Engineering Conference (UPEC), 2014 49th International Universities, 2014, pp. 1-5.
: 2# 0! 1392 ,
[24] S. Bertagna De Marchi, et al., "Design of a MAS as Cloud Computing Service to control Smart Micro Grid," in Innovative Smart Grid Technologies Europe (ISGT EUROPE), 4th IEEE/PES, 2013, pp. 1-5.
'
& + ,
.1392 ,
(
& ()
- BO[ , :&
: " ( O ' . (m. . ( GG 3 6 a C:> 6 +"#
M 2 P 0 :Gf; (" )
. T [27]
P2 ff?
+"% > >
((
#)Y ; ] G5 : 2#
(( 2v, B & )
RP
2%. k ( L . w [2] ("4 2
#
>
:K
62
9 € : 2# 0!
" /+, . T ( P (*#
;
@,(
2+; . T [6] , :&
[7] A. Zaballos, et al., "Heterogeneous communication architecture for the smart grid," Network, IEEE, vol. 25, pp. 30-37, 2011. [8] S. Bera, et al., "Cloud computing applications for smart grid: A survey," Parallel and Distributed Systems, IEEE Transactions on, vol. 26, pp. 1477-1494, 2015. [9] M. Yigit, et al" ,.Cloud computing for smart grid applications," Computer Networks, vol. 70, pp. 312-329, 2014.
1 I [ 2": [30] :K /" ) )
; , .M (T +
GG 3 6 a C:> 6 +"#
1393 (79-47 w (62
("T &;
[29] S. A. Saab, et al., "Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work?," in Energy Aware Computing Systems and Applications (ICEAC), 2013 4th Annual International Conference on, 2013, pp. 164-168. :K : ;P >
, :&
[5] "The smart grid: An introduction," The U.S. Department of Energy’s Report, 2008.
[28] A. Jain, et al., "Energy efficient computing-green cloud computing," in Energy Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on, 2013, pp. 978-982.
1391 6 & ( 2
& ()
[4] M. Shabanzadeh and M. Moghaddam, "What is the Smart Grid? Definitions, Perspectives, and Ultimate Goals," in 28th International Power System Conference (PSC), 2013.
[26] J. Baek, et al., "A secure cloud computing based framework for big data information management of smart grid," IEEE Transactions on Cloud Computing, Vol. 3, Issue 2, 2014. : 2#
23 + " (
0"7 6 (
[3] K. Kaur and N. Kumar, "Smart grid with cloud computing: Architecture, security issues and defense mechanism," in Industrial and Information Systems (ICIIS), 2014 9th International Conference on, 2014, pp. 1-6.
[25] F. Luo, et al., "Hybrid cloud computing platform: The next generation IT backbone for smart grid," in Power and Energy Society General Meeting, 2012 IEEE, pp. 1-7.
I [
> ,
[10] S. Chaisiri, et al., "Optimization of resource provisioning cost in cloud computing," Services Computing, IEEE Transactions on, vol. 5, pp. 164177, 2012.
RP
[11] A. SIclovan, "The Future of Cloud Computing," BRAND. Broad Research in Accounting, Negotiation, and Distribution, vol. 3, pp. pp. 3639, 2012. [12] P. Mell and T. Grance, "The NIST definition of cloud computing. National Institute of Standards and Technology," Information Technology Laboratory, Version, vol. 15, p. 2009, 2009. [13] H. Erdogmus, "Cloud computing: does Nirvana hide behind the nebula?," Software, IEEE, vol. 26, pp. 4-6, 2009. [14] B. P. Rimal, et al., "A taxonomy and survey of cloud computing systems," in INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on, 2009, pp. 44-51. [15] R. K. Sharma and N. Sharma, "A Dynamic Optimization Algorithm for Task Scheduling in Cloud Computing With Resource Utilization," International Journal of Scientific Engineering and Technology, vol. 10, pp. 1062-1068, 2013. [16] S. Tayal, "Tasks scheduling optimization for the cloud computing systems," International Journal of Advanced Engineering Sciences And Technologies (IJAEST), vol. 5, pp. 111-115, 2011. [17] S. Ghosh, Distributed systems: an algorithmic approach: CRC press, 2010. [18] O. Yaghmaei and F. Binesh, "Impact of Applying Cloud Computing On Universities Expenses". [19] M. S. Adrees, et al., "Cloud Computing Architecture For Higher Education In The Third World Countries (Republic Of The Sudan As Model", International Journal of Database Management Systems (IJDMS) Vol.7, No.3, June 2015 [20] Available at: http://www.elsevier.com/solutions/scopus/content
14