About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Smart City 360°. First EAI International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papers

Research Article

Secure Management and Processing of Metered Data in the Cloud

Download(Requires a free EAI acccount)
304 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-33681-7_30,
        author={Bokun Zhang and Pirathayini Srikantha and Deepa Kundur},
        title={Secure Management and Processing of Metered Data in the Cloud},
        proceedings={Smart City 360°. First EAI International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papers},
        proceedings_a={SMARTCITY360},
        year={2016},
        month={6},
        keywords={Cloud Homomorphic encryption Security Demand response},
        doi={10.1007/978-3-319-33681-7_30}
    }
    
  • Bokun Zhang
    Pirathayini Srikantha
    Deepa Kundur
    Year: 2016
    Secure Management and Processing of Metered Data in the Cloud
    SMARTCITY360
    Springer
    DOI: 10.1007/978-3-319-33681-7_30
Bokun Zhang1,*, Pirathayini Srikantha1,*, Deepa Kundur1,*
  • 1: University of Toronto
*Contact email: bokun.zhang@mail.utoronto.ca, pirathayini.srikantha@mail.utoronto.ca, dkundur@mail.utoronto.ca

Abstract

The recent cyber-physical integration in the electric power grid provides unprecedented insights and management capabilities to the grid operator. Devices such as smart meters have been widely deployed in urban cities and produce granular user consumption information that can be used for many useful applications such as demand response. Efficiently managing and processing this expansive sensitive data in a secure manner is a challenging task. We address this in this paper by leveraging on light-weight encryption and the cloud services. Results indicate that our proposed solution is economical and eliminates many of the issues associated with relying on third party services for data management.

Keywords
Cloud Homomorphic encryption Security Demand response
Published
2016-06-29
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-33681-7_30
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL