04431nam 22007815 450 991029856330332120201114080218.01-322-03987-93-319-06355-310.1007/978-3-319-06355-3(CKB)3710000000111970(EBL)1731118(OCoLC)884592867(SSID)ssj0001237562(PQKBManifestationID)11675901(PQKBTitleCode)TC0001237562(PQKBWorkID)11259538(PQKB)11334328(MiAaPQ)EBC1731118(DE-He213)978-3-319-06355-3(PPN)178780928(EXLCZ)99371000000011197020140509d2014 u| 0engur|n|---|||||txtccrQuerying over Encrypted Data in Smart Grids /by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (85 p.)SpringerBriefs in Computer Science,2191-5768Description based upon print version of record.3-319-06354-5 Includes bibliographical references.Introduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work.This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.SpringerBriefs in Computer Science,2191-5768Data encryption (Computer science)Electrical engineeringComputer networksComputer securityCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data encryption (Computer science)Electrical engineering.Computer networks.Computer security.Cryptology.Communications Engineering, Networks.Computer Communication Networks.Systems and Data Security.005.74Wen Miauthttp://id.loc.gov/vocabulary/relators/aut981308Lu Rongxingauthttp://id.loc.gov/vocabulary/relators/autLiang Xiaohuiauthttp://id.loc.gov/vocabulary/relators/autLei Jingshengauthttp://id.loc.gov/vocabulary/relators/autShen Xuemin (Sherman)authttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910298563303321Querying over Encrypted Data in Smart Grids2239822UNINA