2015
DOI: 10.3837/tiis.2015.04.008
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

Abstract: In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. Ho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Effective access control with policy updating for big data in the cloud was suggested in a the study [32]. An effective attribute revocation and policy updating fine-grained access control method (FAC) for the smart grid was suggested by [27]. [28] proposed adaptively secure CP-ABE with policy updation feature in multi-authority scenario.…”
Section: Policy Updating Techniques In Ma-cp-abe Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Effective access control with policy updating for big data in the cloud was suggested in a the study [32]. An effective attribute revocation and policy updating fine-grained access control method (FAC) for the smart grid was suggested by [27]. [28] proposed adaptively secure CP-ABE with policy updation feature in multi-authority scenario.…”
Section: Policy Updating Techniques In Ma-cp-abe Schemesmentioning
confidence: 99%
“…Several schemes have been discussed earlier, which uses outsourced decryption. Decryption cost of schemes [27], [23], [21], [24] and [25] are summarized in Table 5 and Table 7.…”
Section: Fast Decryption and Computation Outsourcing In Ma-cp-abe Sch...mentioning
confidence: 99%