LEADER 04431nam 22007815 450 001 9910298563303321 005 20201114080218.0 010 $a1-322-03987-9 010 $a3-319-06355-3 024 7 $a10.1007/978-3-319-06355-3 035 $a(CKB)3710000000111970 035 $a(EBL)1731118 035 $a(OCoLC)884592867 035 $a(SSID)ssj0001237562 035 $a(PQKBManifestationID)11675901 035 $a(PQKBTitleCode)TC0001237562 035 $a(PQKBWorkID)11259538 035 $a(PQKB)11334328 035 $a(MiAaPQ)EBC1731118 035 $a(DE-He213)978-3-319-06355-3 035 $a(PPN)178780928 035 $a(EXLCZ)993710000000111970 100 $a20140509d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aQuerying over Encrypted Data in Smart Grids /$fby Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (85 p.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $aDescription based upon print version of record. 311 $a3-319-06354-5 320 $aIncludes bibliographical references. 327 $aIntroduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work. 330 $aThis SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies. 410 0$aSpringerBriefs in Computer Science,$x2191-5768 606 $aData encryption (Computer science) 606 $aElectrical engineering 606 $aComputer networks 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aData encryption (Computer science) 615 0$aElectrical engineering. 615 0$aComputer networks. 615 0$aComputer security. 615 14$aCryptology. 615 24$aCommunications Engineering, Networks. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 676 $a005.74 700 $aWen$b Mi$4aut$4http://id.loc.gov/vocabulary/relators/aut$0981308 702 $aLu$b Rongxing$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aLiang$b Xiaohui$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aLei$b Jingsheng$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aShen$b Xuemin (Sherman)$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298563303321 996 $aQuerying over Encrypted Data in Smart Grids$92239822 997 $aUNINA