Skip to main content
Top

2021 | OriginalPaper | Chapter

Encrypted Data Sharing Using Proxy ReEncryption in Smart Grid

Authors : Anass Sbai, Cyril Drocourt, Gilles Dequen

Published in: Proceedings of the 2nd International Conference on Electronic Engineering and Renewable Energy Systems

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In a rapidly changing territory, energy networks must be increasingly responsive and flexible. New models of multi-fluid management and energy production are being created and developed on national and international level. This involves the use, monitoring and supervision of many sensors that reports lot of data. This paper deals with the secure management of large amounts of data within the context of smart grid. We propose a solution based on proxy re-encryption designed primarily to allow decryption delegation, which allow a neat management of large amount of data while respecting the GDPR (General Data Protection Regulation) and security standards.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Matrosov A, Rodionov E, Harley D, Malcho J (2010) Stuxnet under the microscope. ESET LLC (September 2010) Matrosov A, Rodionov E, Harley D, Malcho J (2010) Stuxnet under the microscope. ESET LLC (September 2010)
2.
go back to reference Smart Grid Coordination CEN-CENELEC-ETSI. Group sgcg/m490. B\(\_\)Smart Grid Report First set of standards Version, 2 (2014) Smart Grid Coordination CEN-CENELEC-ETSI. Group sgcg/m490. B\(\_\)Smart Grid Report First set of standards Version, 2 (2014)
3.
go back to reference Boronat J-P (2017) Véritable énergie du territoire positif et modulaire Boronat J-P (2017) Véritable énergie du territoire positif et modulaire
5.
go back to reference Sbai A., Drocourt C, Dequen G (2019) Pre as a service within smart grid cities. In: 16th international conference on security and cryptography Sbai A., Drocourt C, Dequen G (2019) Pre as a service within smart grid cities. In: 16th international conference on security and cryptography
6.
go back to reference Fiat A, Naor M (1993) Broadcast encryption. In: Annual international cryptology conference. Springer, pp 480–491 Fiat A, Naor M (1993) Broadcast encryption. In: Annual international cryptology conference. Springer, pp 480–491
7.
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 457–473
8.
go back to reference Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference. Springer, pp 213–229 Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference. Springer, pp 213–229
9.
go back to reference Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 127–144 Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 127–144
10.
go back to reference Ivan A-A, Dodis Y (2003) Proxy cryptography revisited. In: NDSS Ivan A-A, Dodis Y (2003) Proxy cryptography revisited. In: NDSS
11.
go back to reference Jivanyan A, Yeghiazaryan R, Darbinyan A, Manukyan A (2015) Secure collaboration in public cloud storages. In: CYTED-RITOS international workshop on groupware. Springer, pp 190–197 Jivanyan A, Yeghiazaryan R, Darbinyan A, Manukyan A (2015) Secure collaboration in public cloud storages. In: CYTED-RITOS international workshop on groupware. Springer, pp 190–197
12.
go back to reference Sbai A, Drocourt C, Dequen G (2020) CCA secure unidirectional pre with key pair in the standard model without pairings. In: 6th international conference on information systems security and privacy Sbai A, Drocourt C, Dequen G (2020) CCA secure unidirectional pre with key pair in the standard model without pairings. In: 6th international conference on information systems security and privacy
13.
go back to reference Gueron S, Krasnov V (2015) Fast prime field elliptic-curve cryptography with 256-bit primes. J Cryptogr Eng 5(2):141–151CrossRef Gueron S, Krasnov V (2015) Fast prime field elliptic-curve cryptography with 256-bit primes. J Cryptogr Eng 5(2):141–151CrossRef
14.
go back to reference Stark E, Hamburg M, Boneh D (2013) Stanford javascript crypto library Stark E, Hamburg M, Boneh D (2013) Stanford javascript crypto library
Metadata
Title
Encrypted Data Sharing Using Proxy ReEncryption in Smart Grid
Authors
Anass Sbai
Cyril Drocourt
Gilles Dequen
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-6259-4_15