Skip to main content
main-content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen

Erschienen in: Querying over Encrypted Data in Smart Grids

Verlag: Springer International Publishing

share
TEILEN

Abstract

Smart grid, envisioned as an indispensable power infrastructure, is featured by real-time and two-way communications. By installing smart meters at users’ houses, the smart grid can collect real-time data about power consumption by residential users. The amount of data generated by smart meters and intelligent sensors in smart grid will experience explosive growth in the next few years. According to a recent report from SBI Energy, the volume of smart grid data that will have to be managed by utilities is going to surge from 10,780 terabytes (TB) in 2010 to over 75,200 TB in 2015. How to query and mine this massive and heterogeneous power system raw data to support decision making and ensure reliability will be very critical for smart grid.
Literatur
1.
Zurück zum Zitat R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012. CrossRef R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012. CrossRef
2.
Zurück zum Zitat G. FitzPatrick and D. Wollman, “Nist interoperability framework and action plans,” in Proc. PESGM, pp. 1–4, IEEE, 2010. G. FitzPatrick and D. Wollman, “Nist interoperability framework and action plans,” in Proc. PESGM, pp. 1–4, IEEE, 2010.
3.
Zurück zum Zitat W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Computer Networks, vol. 57, no. 2103, p. 1344–1371, 2013. CrossRef W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Computer Networks, vol. 57, no. 2103, p. 1344–1371, 2013. CrossRef
4.
Zurück zum Zitat R. Sushmita and N. Amiya, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196–205, 2013. CrossRef R. Sushmita and N. Amiya, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196–205, 2013. CrossRef
5.
Zurück zum Zitat M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, 2011. CrossRef M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, 2011. CrossRef
6.
Zurück zum Zitat A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu, “Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 2, pp. 847–855, 2013. CrossRef A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu, “Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 2, pp. 847–855, 2013. CrossRef
7.
Zurück zum Zitat T. Liu, Y. Liu, and M. Yashan, “A dynamic secret-based encryption scheme for smart grid wireless communication,” IEEE Transactions on Smart Grid, vol. pp, no. 99, pp. 1–8, 2013. T. Liu, Y. Liu, and M. Yashan, “A dynamic secret-based encryption scheme for smart grid wireless communication,” IEEE Transactions on Smart Grid, vol. pp, no. 99, pp. 1–8, 2013.
8.
Zurück zum Zitat P. Jokar, N. Arianpoo, and V. Leung, “A survey on security issues in smart grids,” Security and Communication Networks, 2012. P. Jokar, N. Arianpoo, and V. Leung, “A survey on security issues in smart grids,” Security and Communication Networks, 2012.
9.
Zurück zum Zitat P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security & Privacy, vol. 7, no. 3, pp. 75–77, 2009. CrossRef P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security & Privacy, vol. 7, no. 3, pp. 75–77, 2009. CrossRef
10.
Zurück zum Zitat D. Von Dollen, “Report to nist on the smart grid interoperability standards roadmap,” 2009. D. Von Dollen, “Report to nist on the smart grid interoperability standards roadmap,” 2009.
12.
Zurück zum Zitat A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, “Smart grid data integrity attacks: characterizations and countermeasures π,” in Proc. SmartGridComm, pp. 232–237, IEEE, 2011. A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, “Smart grid data integrity attacks: characterizations and countermeasures π,” in Proc. SmartGridComm, pp. 232–237, IEEE, 2011.
13.
Zurück zum Zitat A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, “Smart grid data integrity attacks,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1244–1253, 2013. CrossRef A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, “Smart grid data integrity attacks,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1244–1253, 2013. CrossRef
14.
Zurück zum Zitat Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security, vol. 14, no. 1, p. 13, 2011. Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security, vol. 14, no. 1, p. 13, 2011.
15.
Zurück zum Zitat G. Dán and H. Sandberg, “Stealth attacks and protection schemes for state estimators in power systems,” in Proc. SmartGridComm, pp. 214–219, IEEE, 2010. G. Dán and H. Sandberg, “Stealth attacks and protection schemes for state estimators in power systems,” in Proc. SmartGridComm, pp. 214–219, IEEE, 2010.
16.
Zurück zum Zitat Y. Huang, M. Esmalifalak, H. Nguyen, R. Zheng, Z. Han, H. Li, and L. Song, “Bad data injection in smart grid: attack and defense mechanisms,” IEEE Communications Magazine, vol. 51, no. 1, pp. 27–33, 2013. CrossRef Y. Huang, M. Esmalifalak, H. Nguyen, R. Zheng, Z. Han, H. Li, and L. Song, “Bad data injection in smart grid: attack and defense mechanisms,” IEEE Communications Magazine, vol. 51, no. 1, pp. 27–33, 2013. CrossRef
17.
Zurück zum Zitat X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, “Securing smart grid: cyber attacks, countermeasures, and challenges,” IEEE Communications Magazine, vol. 50, no. 8, pp. 38–45, 2012. CrossRef X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, “Securing smart grid: cyber attacks, countermeasures, and challenges,” IEEE Communications Magazine, vol. 50, no. 8, pp. 38–45, 2012. CrossRef
18.
Zurück zum Zitat H. Li and Z. Han, “Manipulating the electricity power market via jamming the price signaling in smart grid,” in Proc. Globecom Workshop, pp. 1168–1172, IEEE, 2011. H. Li and Z. Han, “Manipulating the electricity power market via jamming the price signaling in smart grid,” in Proc. Globecom Workshop, pp. 1168–1172, IEEE, 2011.
19.
Zurück zum Zitat A. R. Metke and R. L. Ekl, “Security technology for smart grid networks,” IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99–107, 2010. CrossRef A. R. Metke and R. L. Ekl, “Security technology for smart grid networks,” IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99–107, 2010. CrossRef
20.
Zurück zum Zitat M. Blaze, J. Feigenbaum, and A. Keromytis, “Keynote: Trust management for public-key infrastructures,” in Proc. SP, pp. 59–63, Springer, 1999. M. Blaze, J. Feigenbaum, and A. Keromytis, “Keynote: Trust management for public-key infrastructures,” in Proc. SP, pp. 59–63, Springer, 1999.
21.
Zurück zum Zitat R. Ma, H.-H. Chen, Y.-R. Huang, and W. Meng, “Smart grid communication: Its challenges and opportunities,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 36–46, 2013. CrossRef R. Ma, H.-H. Chen, Y.-R. Huang, and W. Meng, “Smart grid communication: Its challenges and opportunities,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 36–46, 2013. CrossRef
22.
Zurück zum Zitat H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine, “Design principles for power grid cyber-infrastructure authentication protocols,” in Proc. HICSS, pp. 1–10, IEEE, 2010. H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine, “Design principles for power grid cyber-infrastructure authentication protocols,” in Proc. HICSS, pp. 1–10, IEEE, 2010.
23.
Zurück zum Zitat Q. Li and G. Cao, “Multicast authentication in the smart grid with one-time signature,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 686–696, 2011. CrossRef Q. Li and G. Cao, “Multicast authentication in the smart grid with one-time signature,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 686–696, 2011. CrossRef
24.
Zurück zum Zitat M. Kgwadi and T. Kunz, “Securing rds broadcast messages for smart grid applications,” International Journal of Autonomous and Adaptive Communications Systems, vol. 4, no. 4, pp. 412–426, 2011. CrossRef M. Kgwadi and T. Kunz, “Securing rds broadcast messages for smart grid applications,” International Journal of Autonomous and Adaptive Communications Systems, vol. 4, no. 4, pp. 412–426, 2011. CrossRef
25.
Zurück zum Zitat S. Ruj and A. Nayak, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196–205, 2013. CrossRef S. Ruj and A. Nayak, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196–205, 2013. CrossRef
26.
Zurück zum Zitat V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. CCS, pp. 89–98, ACM, 2006. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. CCS, pp. 89–98, ACM, 2006.
27.
Zurück zum Zitat J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. SP, pp. 321–334, IEEE, 2007. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. SP, pp. 321–334, IEEE, 2007.
28.
Zurück zum Zitat S. Ruj, A. Nayak, and I. Stojmenovic, “A security architecture for data aggregation and access control in smart grids,” 2011. S. Ruj, A. Nayak, and I. Stojmenovic, “A security architecture for data aggregation and access control in smart grids,” 2011.
29.
Zurück zum Zitat A. Bartoli, J. Herna?ndez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, “Secure lossless aggregation for smart grid m2m networks,” in Proc. SmartGridComm, pp. 333–338, IEEE, 2010. A. Bartoli, J. Herna?ndez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, “Secure lossless aggregation for smart grid m2m networks,” in Proc. SmartGridComm, pp. 333–338, IEEE, 2010.
30.
Zurück zum Zitat F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in Proc. SmartGridComm, pp. 327–332, IEEE, 2010. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in Proc. SmartGridComm, pp. 327–332, IEEE, 2010.
31.
Zurück zum Zitat X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Udp: Usage-based dynamic pricing with privacy preservation for smart grid.,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 141–150, 2013. CrossRef X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Udp: Usage-based dynamic pricing with privacy preservation for smart grid.,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 141–150, 2013. CrossRef
32.
Zurück zum Zitat B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, “Secure multidimensional range queries over outsourced data,” The International Journal on Very Large Data Bases, vol. 21, no. 3, pp. 333–358, 2012. CrossRef B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, “Secure multidimensional range queries over outsourced data,” The International Journal on Very Large Data Bases, vol. 21, no. 3, pp. 333–358, 2012. CrossRef
33.
Zurück zum Zitat R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. SIGMOD, pp. 563–574, ACM, 2004. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. SIGMOD, pp. 563–574, ACM, 2004.
34.
Zurück zum Zitat A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill, “Order-preserving symmetric encryption,” in Proc. EUROCRYPT, pp. 224–241, Springer, 2009. A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill, “Order-preserving symmetric encryption,” in Proc. EUROCRYPT, pp. 224–241, Springer, 2009.
35.
Zurück zum Zitat D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. Eurocrypt, pp. 506–522, Springer, 2004. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. Eurocrypt, pp. 506–522, Springer, 2004.
36.
Zurück zum Zitat P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Proc. ACNS, pp. 31–45, Springer, 2004. P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Proc. ACNS, pp. 31–45, Springer, 2004.
37.
Zurück zum Zitat E. Shi, J. Bethencourt, T. Chan, D. Song, and A. Perrig, “Multi-dimensional range query over encrypted data,” in Proc. SP, pp. 350–364, 2007. E. Shi, J. Bethencourt, T. Chan, D. Song, and A. Perrig, “Multi-dimensional range query over encrypted data,” in Proc. SP, pp. 350–364, 2007.
38.
Zurück zum Zitat J. Li and E. R. Omiecinski, “Efficiency and security trade-off in supporting range queries on encrypted databases,” in Proc. CDAS, pp. 69–83, Springer, 2005. J. Li and E. R. Omiecinski, “Efficiency and security trade-off in supporting range queries on encrypted databases,” in Proc. CDAS, pp. 69–83, Springer, 2005.
39.
Zurück zum Zitat J. Xu, J. Fan, M. H. Ammar, and S. B. Moon, “Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme,” in Proc. ICNP, pp. 280–289, IEEE, 2002. J. Xu, J. Fan, M. H. Ammar, and S. B. Moon, “Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme,” in Proc. ICNP, pp. 280–289, IEEE, 2002.
40.
Zurück zum Zitat D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Proc. TCC, pp. 535–554, 2007. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Proc. TCC, pp. 535–554, 2007.
41.
Zurück zum Zitat S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, “Efficient and private access to outsourced data,” in Proc. ICDCS, pp. 710–719, IEEE, 2011. S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, “Efficient and private access to outsourced data,” in Proc. ICDCS, pp. 710–719, IEEE, 2011.
42.
Zurück zum Zitat K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Mondrian multidimensional k-anonymity,” in Proc. ICDE, pp. 25–25, IEEE, 2006. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Mondrian multidimensional k-anonymity,” in Proc. ICDE, pp. 25–25, IEEE, 2006.
43.
Zurück zum Zitat J. Park, “Efficient hidden vector encryption for conjunctive queries on encrypted data,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483–1497, 2011. CrossRef J. Park, “Efficient hidden vector encryption for conjunctive queries on encrypted data,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483–1497, 2011. CrossRef
Metadaten
Titel
Introduction
verfasst von
Mi Wen
Rongxing Lu
Xiaohui Liang
Jingsheng Lei
Xuemin (Sherman) Shen
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-06355-3_1

Premium Partner