Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2018

12.03.2018

De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment

verfasst von: Donghyeok Lee, Namje Park, Geonwoo Kim, Seunghun Jin

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2018

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users’ life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shargal M, Houseman D (2009) The big picture of your coming smart grid. Smart Grid News 1(1):1–2 Shargal M, Houseman D (2009) The big picture of your coming smart grid. Smart Grid News 1(1):1–2
2.
Zurück zum Zitat Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653–664CrossRef Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653–664CrossRef
3.
Zurück zum Zitat Park N, Kang N (2015) Mutual authentication scheme in secure internet of things Technology for Comfortable Lifestyle. Sensors 16(1):1–16CrossRef Park N, Kang N (2015) Mutual authentication scheme in secure internet of things Technology for Comfortable Lifestyle. Sensors 16(1):1–16CrossRef
4.
Zurück zum Zitat Sung DK, Song N-O, Ko KS, Cha J, Bae KY, Jang H (2013) Convergence of power system technology and information communication Technology in Smart Grid. Commun Kor Inf Sci Soc 31(3):10–21 Sung DK, Song N-O, Ko KS, Cha J, Bae KY, Jang H (2013) Convergence of power system technology and information communication Technology in Smart Grid. Commun Kor Inf Sci Soc 31(3):10–21
5.
Zurück zum Zitat Park N (2013) UHF/HF dual-band integrated mobile RFID/NFC linkage method for mobile device-based business application. J KICS 38(10):841–851CrossRef Park N (2013) UHF/HF dual-band integrated mobile RFID/NFC linkage method for mobile device-based business application. J KICS 38(10):841–851CrossRef
6.
Zurück zum Zitat Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219CrossRef Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219CrossRef
7.
Zurück zum Zitat Rusitschka S, Eger K, Gerdes C (2010) Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm) 1(1):483–488CrossRef Rusitschka S, Eger K, Gerdes C (2010) Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm) 1(1):483–488CrossRef
8.
Zurück zum Zitat Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) Advanced web and network technologies, and applications, APWeb 2006 (Lecture notes in computer science), vol 3842. Springer, Heidelberg, pp 741–748 Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) Advanced web and network technologies, and applications, APWeb 2006 (Lecture notes in computer science), vol 3842. Springer, Heidelberg, pp 741–748
11.
Zurück zum Zitat Agrawal R, et al (2004) Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM Agrawal R, et al (2004) Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM
12.
Zurück zum Zitat Lee D, Park N (2016) Geocasting-based synchronization of almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1103–1118CrossRef Lee D, Park N (2016) Geocasting-based synchronization of almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1103–1118CrossRef
13.
Zurück zum Zitat Park N (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. J KICS 39C(6):466–475CrossRef Park N (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. J KICS 39C(6):466–475CrossRef
14.
Zurück zum Zitat Choi D, Lee Y (2014) Privacy protection Technology for Public Information Open & sharing. J KIISE : Comput Syst Theory 41(3):109–115 Choi D, Lee Y (2014) Privacy protection Technology for Public Information Open & sharing. J KIISE : Comput Syst Theory 41(3):109–115
15.
Zurück zum Zitat Park H-A (2012) Dong Hoon lee, Taik Yeong Chung,"comprehensive study on security and privacy requirements for retrieval system over encrypted database". J Kor Inst Inf Sec Cryptol 22(3):621–635 Park H-A (2012) Dong Hoon lee, Taik Yeong Chung,"comprehensive study on security and privacy requirements for retrieval system over encrypted database". J Kor Inst Inf Sec Cryptol 22(3):621–635
16.
Zurück zum Zitat Park N (2010) The implementation of open embedded S/W platform for secure mobile RFID reader. J Kor Inst Commun Inf Sci 35(5B):785–793 Park N (2010) The implementation of open embedded S/W platform for secure mobile RFID reader. J Kor Inst Commun Inf Sci 35(5B):785–793
17.
Zurück zum Zitat Lee D, Park N (2016) A proposal of SH-tree based data synchronization method for secure maritime cloud. J Kor Inst Inf Sec Cryptol 26(4):929–940 Lee D, Park N (2016) A proposal of SH-tree based data synchronization method for secure maritime cloud. J Kor Inst Inf Sec Cryptol 26(4):929–940
18.
Zurück zum Zitat Park N, Bang H-C (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Sec Commun Netw 9(6):500–512CrossRef Park N, Bang H-C (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Sec Commun Netw 9(6):500–512CrossRef
19.
Zurück zum Zitat Kim D, Lee H (2015) Personal information de-Idenification trends based on big data. Rev Kor Soc Internet Inf 16(2):15–22 Kim D, Lee H (2015) Personal information de-Idenification trends based on big data. Rev Kor Soc Internet Inf 16(2):15–22
20.
Zurück zum Zitat NIST (2014) Guidelines for smart grid cybersecurity, volume 2 - privacy and the smart grid. U.S. Department of Commerce, pp 291-473 NIST (2014) Guidelines for smart grid cybersecurity, volume 2 - privacy and the smart grid. U.S. Department of Commerce, pp 291-473
22.
Zurück zum Zitat Park N (2014) Implementation of inter-VTS data exchange format protocol based on mobile platform for next-generation vessel traffic service system. Inf Int Interdisciplinary J 17(10A):4847–4856 Park N (2014) Implementation of inter-VTS data exchange format protocol based on mobile platform for next-generation vessel traffic service system. Inf Int Interdisciplinary J 17(10A):4847–4856
Metadaten
Titel
De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment
verfasst von
Donghyeok Lee
Namje Park
Geonwoo Kim
Seunghun Jin
Publikationsdatum
12.03.2018
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0637-1

Weitere Artikel der Ausgabe 6/2018

Peer-to-Peer Networking and Applications 6/2018 Zur Ausgabe