Anonymous Web transactions with Crowds
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
SPINS: security protocols for sensor networks
Wireless Networks
IEEE Internet Computing
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
On Defining Proofs of Knowledge
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Verifiable secret-ballot elections
Verifiable secret-ballot elections
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
IEEE Transactions on Mobile Computing
Who Are You? The Trade-Off between Information Utility and Privacy
IEEE Internet Computing
Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy
IEEE Internet Computing
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Security and Privacy Challenges in the Smart Grid
IEEE Security and Privacy
IEEE Security and Privacy
A Dynamic User Management in Networked Consumer Electronics via Authentication Proxies
PDCAT '09 Proceedings of the 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Handbook of Information and Communication Security
Handbook of Information and Communication Security
Affordable Privacy for Home Smart Meters
ISPAW '11 Proceedings of the 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops
Privacy-preserving smart metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds
CLOUD '11 Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing
Security and Privacy in Smart Grid Infrastructures
DEXA '11 Proceedings of the 2011 22nd International Workshop on Database and Expert Systems Applications
Enhance Data Privacy in Service Compositions through a Privacy Proxy
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Data Mining and Privacy of Personal Behaviour Types in Smart Grid
ICDMW '11 Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops
Rank and kernel of binary Hadamard codes
IEEE Transactions on Information Theory
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
The smart grid is an electronically controlled electrical grid that connects power generation, transmission, distribution, and consumers using information communication technologies. One of the key characteristics of the smart grid is its support for bi-directional information flow between the consumer of electricity and the utility provider. This two-way interaction allows electricity to be generated in real-time based on consumers' demands and power requests. As a result, consumer privacy becomes an important concern when collecting energy usage data with the deployment and adoption of smart grid technologies. To protect such sensitive information it is imperative that privacy protection mechanisms be used to protect the privacy of smart grid users. We present an analysis of recently proposed smart grid privacy solutions and identify their strengths and weaknesses in terms of their implementation complexity, efficiency, robustness, and simplicity.