2010 IEEE/IFIP Network Operations and Management Symposium Workshops 2010
DOI: 10.1109/nomsw.2010.5486559
|View full text |Cite
|
Sign up to set email alerts
|

Blind processing: Securing data against system administrators

Abstract: Multi-owner systems such as power grid need information from all parties to operate efficiently. However, in general, information sharing is limited by market and other constraints. In addition, the emerging problem of demand side management in distribution systems as a part of "smarter grid" efforts, secure communication and execution between the utilities and the customers is required to ensure the privacy. In this paper, we propose blind processing, a novel communication and execution approach for entities … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 73 publications
0
9
0
Order By: Relevance
“…In [77] the authors investigated the integrity of a known set of processes loaded in a deterministic order and running in an isolated environment from the rest of the processes. Using a security kernel, a system needs to ensure integrity of the TPM, the BIOS, the security kernel and a well-known set of processes providing blind processing.…”
Section: ) Data Integritymentioning
confidence: 99%
“…In [77] the authors investigated the integrity of a known set of processes loaded in a deterministic order and running in an isolated environment from the rest of the processes. Using a security kernel, a system needs to ensure integrity of the TPM, the BIOS, the security kernel and a well-known set of processes providing blind processing.…”
Section: ) Data Integritymentioning
confidence: 99%
“…Finally, a cloud provider might track who is accessing individual files and gain knowledge about interactions of a user [15,23]. Note that, to download content, a friend just uses direct link to the file without logging into the cloud.…”
Section: Security Challengesmentioning
confidence: 99%
“…Having a root of trust in the tamper-resistant chip, a smart meter can perform integrity checks using fingerprints of its code [19]. Fingerprints of a code can be generated using hash functions.…”
Section: ) Home Area Network (Han)mentioning
confidence: 99%