2015
DOI: 10.1007/s11276-015-0983-3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Abstract: With fast advancements of communication, systems and information technologies, a smart grid (SG) could bring much convenience to users because it could provide a reliable and efficient energy service. The data aggregation (DA) scheme for the SG plays an important role in evaluating information about current energy usage. To achieve the goal of preserving users' privacy, many DA schemes for the SG have been proposed in last decade. However, how to withstand attacks of internal adversaries is not considered in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
71
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 114 publications
(76 citation statements)
references
References 28 publications
0
71
0
Order By: Relevance
“…Multiple proposals have been developed, from the aggregation of values [5,6,7,28,29,30,31,32,33,34,35,36], to additions [2,3,26,37,38,39,40,41,42,43], calculus of minimums or maximums [10,44,45] or even more complex tasks such as averages [9,10,30,46], variances [9,46], range queries [6] or logic operations [8].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Multiple proposals have been developed, from the aggregation of values [5,6,7,28,29,30,31,32,33,34,35,36], to additions [2,3,26,37,38,39,40,41,42,43], calculus of minimums or maximums [10,44,45] or even more complex tasks such as averages [9,10,30,46], variances [9,46], range queries [6] or logic operations [8].…”
Section: Related Workmentioning
confidence: 99%
“…Anonymity is generally achieved by the use of cryptographic schemes, e.g. symmetric encryption [2,6,7,30] or more sophisticated schemes like homomorphic encryption [8,37,38,39,31,40,41,42,43,46], homomorphic aggregation of signatures [36] and homomorphic encryption with re-randomization applying a proxy [5]. By contrast, Groat et al [44] propose the use of randomized arrays instead of a cryptographic system.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations