2021
DOI: 10.1155/2021/2398460
|View full text |Cite|
|
Sign up to set email alerts
|

[Retracted] Security and Privacy Risk Assessment of Energy Big Data in Cloud Environment

Abstract: Considering the importance of energy in our lives and its impact on other critical infrastructures, this paper starts from the whole life cycle of big data and divides the security and privacy risk factors of energy big data into five stages: data collection, data transmission, data storage, data use, and data destruction. Integrating into the consideration of cloud environment, this paper fully analyzes the risk factors of each stage and establishes a risk assessment index system for the security and privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…In addition to the above parameters, each user has advised the input of each recommendation R x , x = A , B , C of all users, that is, p x ( τ ), to make the final decision and action a ( τ ). Given the actions of the users regarding the selection of the recommendation, the users take part in a distributed noncooperative game for the determination of the visit time, played in each repetition of the machine learning algorithm, to regulate the optimal visit time as well as the corresponding value of their QoE [ 33 , 35 , 36 ].…”
Section: Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to the above parameters, each user has advised the input of each recommendation R x , x = A , B , C of all users, that is, p x ( τ ), to make the final decision and action a ( τ ). Given the actions of the users regarding the selection of the recommendation, the users take part in a distributed noncooperative game for the determination of the visit time, played in each repetition of the machine learning algorithm, to regulate the optimal visit time as well as the corresponding value of their QoE [ 33 , 35 , 36 ].…”
Section: Modelingmentioning
confidence: 99%
“…The combined QoE function of user i , i ∈ N , N = N a ∪ N b ∪ N f ∪ N g is convex in the strategy interval Τ i ′ corresponding to the interval of the relevant time ratio [ 19 , 33 , 36 , 39 ]. …”
Section: Modelingmentioning
confidence: 99%
“…The evaluation method specifies the technical requirements related to the privacy protection capability's test and evaluation process, including evaluation analysis, preparation, method selection, steps, and documents. Evaluation indicators specify the requirements of various indicators involved in SHPP capability testing and evaluation, such as stability, reliability, compliance, probability of privacy attribute disclosure, and block correlation [31]. Competency certification mainly handles the privacy protection level of an organization, product, service, and other related competency certification requirements, including privacy management competency certification and product privacy security certification.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…However, the data collected by these organizations can be reused repeatedly, making users difficult to delete. Besides, these sensitive data may contain unique personal identical information such as faces and voices, which inevitably bring risks when stolen by malicious attackers and used for illegal benefits [10,11].…”
Section: Introductionmentioning
confidence: 99%