2016
DOI: 10.1016/j.comcom.2015.08.016
|View full text |Cite
|
Sign up to set email alerts
|

Efficient smart metering based on homomorphic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(36 citation statements)
references
References 4 publications
0
36
0
Order By: Relevance
“…In the first set of experiments, we compare a simple aggregation implemented with homomorphic encryption, which would also enable trusted data processing in untrusted infrastructures, with SGX (but without any other components of the proposed architecture), and in pure C, without SGX. The implementation used in the homomorphic encryption aggregation is based on the scheme proposed by Busom et al [8]. The goal is to illustrate how the raw SGX performance compares to a traditional approach that would enable comparable benefits for running protected data analysis in cloud environments, and to an approach that offers no security, but also no overhead.…”
Section: Discussionmentioning
confidence: 99%
“…In the first set of experiments, we compare a simple aggregation implemented with homomorphic encryption, which would also enable trusted data processing in untrusted infrastructures, with SGX (but without any other components of the proposed architecture), and in pure C, without SGX. The implementation used in the homomorphic encryption aggregation is based on the scheme proposed by Busom et al [8]. The goal is to illustrate how the raw SGX performance compares to a traditional approach that would enable comparable benefits for running protected data analysis in cloud environments, and to an approach that offers no security, but also no overhead.…”
Section: Discussionmentioning
confidence: 99%
“…The datasets between two parties can be compared without compromising the data privacy of the users. Busom et al 60 suggested a homomorphic encryption solution based on Elgamal encryption. The proposal is secure against a coalition composed of a misbehaving substation and some corrupted meters.…”
Section: Key Generationmentioning
confidence: 99%
“…In this paper we first describe a security flaw found in a homomorphic aggregation-based smart metering system [3]. By exploiting that flaw, a misbehaving substation is able to obtain the non-aggregated reading of any smart meter.…”
Section: Contribution and Plan Of This Papermentioning
confidence: 99%
“…Hence, appropriate measures have to be taken to preserve clients' privacy in smart metering systems. In this paper, we first analyze a recent proposal by Busom et al (2016) and show how a corrupted substation is able to get the individual reading of any arbitrarily chosen smart meter without requiring the collaboration of any other party. After that, we propose a way to fix the mentioned security flaw which is based on adding an additional step in which the substation proves that it has properly followed all the protocol steps.…”
mentioning
confidence: 99%