|
Showing 1 - 2 of
2 matches in All Departments
This SpringerBrief presents the concept of the smart grid
architecture and investigates the security issues of the smart grid
and the existing encrypted data query techniques. Unique
characteristics of smart grid impose distinguished challenges on
this investigation, such as multidimensional attributes in metering
data and finer grained query on each dimension. Three kinds of
queries are introduced, namely, equality query, conjunctive query
and range query. For the equality query over encrypted metering
data, an efficient searchable encryption scheme is introduced and
can be applied for auction in emerging smart grid marketing. Later
chapters examine the conjunctive query and range query over
encrypted data. Different techniques are used, including the Public
key Encryption with Keyword Search (PEKS) and Hidden Vector
Encryption (HVE), to construct the comparison predicate and range
query predicate. Their correctness is demonstrated in the book.
Concise and practical, Encrypted Data Querying in Smart Grids is
valuable for professionals and researchers involved in data privacy
or encryption. It is also useful for graduate students interested
in smart grid and related technologies.
This book focuses on three emerging research topics in mobile
social networks (MSNs): privacy-preserving profile matching (PPM)
protocols, privacy-preserving cooperative data forwarding (PDF)
protocols, and trustworthy service evaluation (TSE) systems. The
PPM helps two users compare their personal profiles without
disclosing the profiles. The PDF helps users forward data to their
friends via multiple cooperative relay peers while preserving their
identity and location privacy. The TSE enables users to locally
share service reviews on the vendors such that users receive more
valuable information about the services not only from vendors but
also from their trusted social friends. The authors address both
theoretic and practical aspects of these topics by introducing the
system model, reviewing the related works, and presenting the
solutions. Security and Privacy for Mobile Social Networks further
provides the security analysis and the performance evaluation based
on real-trace simulations. It also summarizes the future research
directions for this rapidly growing area of research. The book will
be valuable for researchers and practitioners who work with mobile
social networks, communication platforms, wireless communication
techniques, and internet applications. "Suitable for any type of
reader as an introduction to the topic... The chapters are well
motivated and presented... It is recommended for researchers." -ACM
Computing Reviews, 21 July 2014
|
You may like...
Midnights
Taylor Swift
CD
R418
Discovery Miles 4 180
|