Skip to main content

Optimal Risk Management of Electric Power Systems with CLOUD Simulation and Security Meter Algorithms

  • Reference work entry
  • First Online:
Handbook of Smart Energy Systems
  • 26 Accesses

Abstract

This review chapter studies a discrete event simulator (DES), CLOURAM: CLOUD Risk Assessor and Manager that quantitatively estimates and manages risk with optimal mitigation targets within an Electric Power CLOUD computing framework. The 2-state (UP, DOWN) units are assumed to fail and recover with a Negative Exponential density for simplicity and as a result of goodness-of-fit studies. The ultimate goal is to manage risk and improve the operational quality of Power CLOUD by optimizing the number of servers for capacity addition, and optimizing the maintenance repair crew count. One also optimizes the generating unit repair rates and consumer load cycle by using Linear Programming (LP)-based optimization schemes with proper objective functions and constraints. Authentic Electric Power Systems are simulated with cost and benefit comparisons for optimality. As an alternative, Security Meter (SM) algorithm is applied to mitigate a nation’s overall risk studying the vulnerabilities, threats, and countermeasures of electric power networks with cost parameters. Various alternatives to electric power sector optimization are surveyed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 1,399.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 1,399.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Y.O. Aderinto, A.O. Afolabi, I.T. Issa, On optimal planning of electric power generation systems, Punjab University. J. Math. 50(1), 898–895 (2018) ISSN 1016-2526

    Google Scholar 

  • A. Castillo, Risk analysis and management in power outage and restoration: A literature survey. Electr. Power Syst. Res. 107, 9–15 (2014)

    Article  Google Scholar 

  • Central Archive, Management of power outage risks (www.continuitycentral.com) (2015)

  • Charles River Associates, The State of Enterprise Risk Management for Power Companies, NAPCO Conference Scottsdale, AZ (2013)

    Google Scholar 

  • W. Fu, Risk Assessment and Optimization for Electric Power Systems. PhD Dissertation, Iowa State University, 2000, Retrospective Theses and Dissertations, 12684, https://lib.dr.iastatade.edu/rtd/12684 (2000)

  • P.K. Ghosh, M. Sahinoglu, V. Phoha, Resource management for uninterrupted microgrid operation, in Proc. of the 7th International Conference on Smart Energy Grid Engineering (SEGE-2019), (2019), pp. 321–324. Ottawa, Canada

    Google Scholar 

  • Z. Li, K. Liu, K. Wang, X. Shen, Research on financial risk management for electric power enterprises. Syst. Eng. Procedia 4, 54–60 (2012)

    Article  Google Scholar 

  • S. Livingston, S. Sanborn, A. Slaughter, P. Zonneveld, Managing cyber risk in the electric power sector: Deloitte Global report | EPICOS) (2019)

    Google Scholar 

  • H. Ritchie, M. Roser, P. Rosado, Energy Production and Consumption – Our World in Data (2021). https://ourworldindata.org/energy; https://ourworldindata.org/energy-production-consumption

  • M. Sahinoglu, Security meter- a practical decision tree model to quantify risk. IEEE Secur. Privacy Mag. 3(3), 18–24 (2005)

    Article  Google Scholar 

  • M. Sahinoglu, Trustworthy Computing: Analytical and Quantitative Engineering Evaluation (Book) (Wiley, Hoboken, 2007)

    Book  Google Scholar 

  • M. Sahinoglu, An input-output measurable design for the security meter model to quantify and manage software security risk. IEEE Trans. Instrum. Meas. 57(6), 1251–1260 (2008)

    Article  Google Scholar 

  • M. Sahinoglu, The modeling and simulation in engineering. Invitational overview article for WIREs (Wiley Interdisciplinary Review Series). WIREs Comput. Stat., 239–266 (2013). https://doi.org/10.1002/wics1254

  • M. Sahinoglu, Cyber-Risk Informatics: Engineering Evaluation with Data Science (Wiley, Hoboken, 2016), pp. 1–527. ISBN: 9781119087519

    Google Scholar 

  • M. Sahinoglu, CLOUD computing risk management for server-farm repair rates, consumer load cycle, server-farm repair crew count, and additional servers. Wiley Interdiscip. Rev. (WIREs): Comput. Stat. EOCS-405.R1, WICS1424, 1–34 (2018). https://doi.org/10.1002/wics.1424. http://onlinelibrary.wiley.com/doi/10.1002/wics.1424/full

  • M. Sahinoglu, Risk assessment of electric power generation systems by stochastic simulation using cloud computing, in Handbook of Smart Energy Systems, ed. by M. Fathi, E. Zio, P. Pardalos, (Springer Nature, 2021)

    Google Scholar 

  • M. Sahinoglu, L. Cueva-Parra, Cloud computing. Invited Authors (Advanced Review) for Wiley Interdisciplinary Reviews: Computational Stat, New Jersey, Eds.-in-Chief: Ed Wegman, Yasmin H. Said, D. W. Scott, 3(1), 47–68 (2011). https://doi.org/10.1002/wics.139. (WIREs Most Accessed Review Paper)

  • M. Sahinoglu, P. Vasudev, Stochastic simulation of cyber CLOUD and power grid, in Proceedings of the International on Information Technology and Science (ICITS) Conference, p. 45, Pattaya Beach, Thailand; IJCTE vol 9, no 1 (2017), pp. 43–47. ISSN 1793-8201

    Google Scholar 

  • M. Sahinoglu, Y.L. Yuan, D. Banks, Validation of a security and privacy risk metric using triple uniform product rule. IJCITAE – Int. J. Comput. Inf. Technol. Eng. 4(2), 125–135 (2010)

    Google Scholar 

  • M. Sahinoglu, S.J. Simmons, L. Cahoon, Ecological risk-o-meter: a risk assessor and manager software for decision-making in ecosystems, submitted on 4/30/2012 Invitational paper to special “Environmental Risk Assessment” issue of Environmetrics, accepted on October 27, 2012 (wileyonlinelibtraray.com) (2012a). https://doi.org/10.1002/env.2186. Environmetrics (23), 729–737

  • M. Sahinoglu, L. Cueva-Parra, D. Ang, Game-theoretic computing in risk analysis. WIREs (Wiley Interdisciplinary Review Series) Comput. Stat. 4, 227–248 (2012b). https://doi.org/10.1002/wics.1205

    Article  Google Scholar 

  • M. Sahinoglu, C. Kelsoe, S. Morton, M. Eryilmaz, Quantitative metrics to assess and manage national cybersecurity risk using risk-meter software. Int. J. Comput. Inf. Technol. Eng. (IJCITAE) 8(2), 83–98 (2014)

    Google Scholar 

  • M. Sahinoglu, S. Ashokan, P. Vasudev, Cost-efficient risk management with reserve risk repair crew planning in CLOUD computing, in International Conference on Risk Computing and Software Engineering at Berkeley, California, (SCSE2015). Procedia Comput. Sci. 62, 335–342 (2015a)

    Google Scholar 

  • M. Sahinoglu, S. Ashokan, P. Vasudev, Cost-efficient risk management with additional product deployment in CLOUD computing, in International Conference on Risk Computing and Software Engineering at Berkeley, California (SCSE2015). Procedia Comput. Sci. 62, 319–325 (2015b)

    Google Scholar 

  • O.K. Yoro, M.O. Daramola, P.T. Sekoai, U.N. Wilson, O. Eterigho-Ikelegbe, Update on current approaches, challenges, and prospects of modeling and simulation in renewable and sustainable energy systems. Renew. Sust. Energ. Rev. 150 (2021). https://doi.org/10.1016/j.rser.2021.111506. Elsevier Ltd

  • M. Zahid, I. Inayat, M. Daneva, Z. Mehmood, A security risk mitigation framework for cyber physical systems. Wiley Softw. Evol. Process (2019). https://doi.org/10.1002/smr.2219

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehmet Sahinoglu .

Editor information

Editors and Affiliations

Appendices

Appendix A

Table 5 Group no generator type, #generators, capacity, failure and repair rates, forced outage rate for Turkey’s Interconnected Power Generation System (1995: Grp 1–24; 1996: Grp 1–27; 1997:1 Grp1–61; 1998: Grp1–77; 1999: Grp1–91; and 2000: Grp1–103) with TE: thermal, HE: hydroelectric; FO: Fuel Oil; AUTO: auto-producer (gas, LNG). The bracketed repair rates are the improved values from 1st group to the 24th inclusive resulting from 1995 data set’s repair rate planning in Fig. 4. The repair rate planning improved the 1995 LOLP from 5.42% to 3.26% in Table 4

Appendix B

1.1 How to Install CYBERRISKSOLVER to RUN the CLOUD Assessment Derated and Security Meter APPLETS

  1. 1.

    Click www.areslimited.com. Type in the user name: mehmetsuna, password: Mehpareanne, click OK.

  2. 2.

    Go to DOWNLOAD on www.areslimited.com for l.h.s. menu’s 4th from the top.

  3. 3.

    Click on the Cyber Risk Solver in red and download the application which a ZIP file. Unzip or extract the downloaded application into C:\myapp folder. See C:\myapp\dist. Open a Command Prompt and go to C:\myapp\dist folder and run the following command: //For Cyber Risk Solver, java –jar twcSolver.jar. Use license code: EFE28SEP1986 for twcSolver.jar.

  4. 4.

    Click CLOUD Assessment Derated button (checked 1st in the 2nd row) or Security Meter (unchecked 4th in the top row). Click EXECUTE. Follow instructions of the Help Desk. Use license code: HAKAN07MAR1995 for Security Meter.

figure a
figure b
figure c
figure d

Cross-References

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Sahinoglu, M. (2023). Optimal Risk Management of Electric Power Systems with CLOUD Simulation and Security Meter Algorithms. In: Fathi, M., Zio, E., Pardalos, P.M. (eds) Handbook of Smart Energy Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-97940-9_85

Download citation

Publish with us

Policies and ethics