Querying over Encrypted Data in Smart Grids Querying over Encrypted Data in Smart Grids
SpringerBriefs in Computer Science

Querying over Encrypted Data in Smart Grids

Mi Wen and Others
    • $59.99
    • $59.99

Publisher Description

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.

GENRE
Computing & Internet
RELEASED
2014
9 May
LANGUAGE
EN
English
LENGTH
87
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
2
MB
Applied Cryptography in Computer and Communications Applied Cryptography in Computer and Communications
2021
Cloud Computing, Security, Privacy in New Computing Environments Cloud Computing, Security, Privacy in New Computing Environments
2017
Frontiers in Cyber Security Frontiers in Cyber Security
2018
Information Security and Privacy Information Security and Privacy
2016
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
2016
Frontiers in Cyber Security Frontiers in Cyber Security
2019
Encrypted Email Encrypted Email
2015
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Fitting Splines to a Parametric Function Fitting Splines to a Parametric Function
2019
Edge Computing: A Primer Edge Computing: A Primer
2018
Autonomous Robotics and Deep Learning Autonomous Robotics and Deep Learning
2014
Agile Risk Management Agile Risk Management
2014