Querying over Encrypted Data in Smart Grids Querying over Encrypted Data in Smart Grids
SpringerBriefs in Computer Science

Querying over Encrypted Data in Smart Grids

Mi Wen und andere
    • 42,99 €
    • 42,99 €

Beschreibung des Verlags

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.

GENRE
Computer und Internet
ERSCHIENEN
2014
9. Mai
SPRACHE
EN
Englisch
UMFANG
87
Seiten
VERLAG
Springer International Publishing
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
2
 MB
Applied Cryptography in Computer and Communications Applied Cryptography in Computer and Communications
2021
Cloud Computing, Security, Privacy in New Computing Environments Cloud Computing, Security, Privacy in New Computing Environments
2017
Frontiers in Cyber Security Frontiers in Cyber Security
2018
Information Security and Privacy Information Security and Privacy
2016
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
2016
Frontiers in Cyber Security Frontiers in Cyber Security
2019
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Manifold Learning Manifold Learning
2024
The Mathematical Theory of Semantic Communication The Mathematical Theory of Semantic Communication
2025
Developing Sustainable and Energy-Efficient Software Systems Developing Sustainable and Energy-Efficient Software Systems
2023
Objective Information Theory Objective Information Theory
2023
Distributed Hash Table Distributed Hash Table
2013