[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid

Published: 01 November 2013 Publication History

Abstract

Smart grid uses intelligent transmission and distribution networks to deliver electricity. It aims to improve the electric system's reliability, security, and efficiency through two-way communication of consumption data and dynamic optimization of electric-system operations, maintenance, and planning. The smart grid systems use fine-grained power grid measurements to provide increased grid stability and reliability. Key to achieving this is securely sharing the measurements among grid entities over wide area networks. Typically, such sharing follows policies that depend on data generator and consumer preferences and on time-sensitive contexts. In smart grid, as well as the data, policies for sharing the data may be sensitive because they directly contain sensitive information, and reveal information about underlying data protected by the policy, or about the data owner or recipients. In this study, we propose an attribute-based data sharing scheme in smart grid. Not only the data but also the access policies are obfuscated in grid operators' point of view during the data sharing process. Thus, the data privacy and policy privacy are preserved in the proposed scheme. The access policy can be expressed with any arbitrary access formula. Thus, the expressiveness of the policy is enhanced. The security is also improved such that the unauthorized key generation center or the grid manage systems that store the data cannot decrypt the data to be shared. The computation overhead of recipients are also reduced by delegating most of the laborious decryption operations to the more powerful grid manage systems.

Cited By

View all
  1. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Parallel and Distributed Systems
    IEEE Transactions on Parallel and Distributed Systems  Volume 24, Issue 11
    November 2013
    201 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 November 2013

    Author Tags

    1. Data privacy
    2. Encryption
    3. Generators
    4. Receivers
    5. Smart grid
    6. Smart grids
    7. policy-based data sharing
    8. privacy
    9. security

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)HA-MedIET Information Security10.1049/2024/24982452024Online publication date: 1-Jan-2024
    • (2024)Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharingCluster Computing10.1007/s10586-024-04283-z27:5(6013-6038)Online publication date: 1-Aug-2024
    • (2023)Access control scheme based on blockchain and attribute-based searchable encryption in cloud environmentJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00444-412:1Online publication date: 18-Apr-2023
    • (2022)Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring SystemsComputational Intelligence and Neuroscience10.1155/2022/37679122022Online publication date: 1-Jan-2022
    • (2022)Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based EncryptionSecurity and Communication Networks10.1155/2022/22048322022Online publication date: 1-Jan-2022
    • (2022)PREEN: An Aggregation Mechanism for Privacy-Preserving Smart-Metering CommunicationsIEEE Transactions on Consumer Electronics10.1109/TCE.2022.322508870:1(2949-2959)Online publication date: 28-Nov-2022
    • (2022)A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANETTransactions on Emerging Telecommunications Technologies10.1002/ett.378533:5Online publication date: 27-May-2022
    • (2021)A Blockchain-Based CP-ABE Scheme with Partially Hidden Access StructuresSecurity and Communication Networks10.1155/2021/41325972021Online publication date: 1-Jan-2021
    • (2020)Attribute-based Encryption for Cloud Computing Access ControlACM Computing Surveys10.1145/339803653:4(1-41)Online publication date: 3-Aug-2020
    • (2020)Attribute-Based Searchable Encryption Scheme with Fuzzy KeywordsSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-030-68851-6_3(44-61)Online publication date: 18-Dec-2020
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media