Querying over Encrypted Data in Smart Grids [electronic resource] / by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen.
By: Wen, Mi [author.].
Contributor(s): Lu, Rongxing [author.] | Liang, Xiaohui [author.] | Lei, Jingsheng [author.] | Shen, Xuemin (Sherman) [author.] | SpringerLink (Online service).
Material type: BookSeries: SpringerBriefs in Computer Science: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Description: IX, 78 p. 22 illus., 17 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319063553.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Electrical engineering | Computer Science | Data Encryption | Communications Engineering, Networks | Computer Communication Networks | Systems and Data SecurityAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 Online resources: Click here to access onlineIntroduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work.
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.
There are no comments for this item.