Privacy-Enhanced Secure Data Transaction System for Smart Grid
- Authors
- Go, Woong; Kwak, Jin
- Issue Date
- Jul-2012
- Publisher
- Science and Engineering Research Support Society
- Keywords
- Secure Data Transaction System; Smart Grid System; Privacy Protection; Electricity Consumption
- Citation
- International Journal of Security and its Applications, v.6, no.3, pp 37 - 44
- Pages
- 8
- Journal Title
- International Journal of Security and its Applications
- Volume
- 6
- Number
- 3
- Start Page
- 37
- End Page
- 44
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/15042
- ISSN
- 1738-9976
- Abstract
- A smart grid is a digitally enabled electrical grid that gathers, distributes, and acts on information about the behavior of all participants (suppliers and consumers) in order to improve the efficiency, importance, reliability, economics, and sustainability of electricity services. Currently, smart grid systems are widely considered to be fundamental components for improving the monitoring and control of a power distribution infrastructure. Using a distributed measurement architecture, it is possible to gather information about the smart grid status in order to monitor and control the overall infrastructure, including remote units. This technology can control the use of electricity. In particular, users can monitor and limit the electricity consumption of each home appliance in real time. Likewise, power companies can monitor and control electricity consumption in order to stabilize the electricity supply. However, these features may cause serious problems in the case of data leakage. For example, if a malicious attacker is able to sniff and analyze data, they can figure out the usage pattern and ascertain when a house is empty. Thus, users could suffer serious damage, such as burglary. Therefore, we propose a privacy-enhanced secure data transaction system. The proposed system can protect private data using encryption. The encrypted data includes the user's ID, home appliance serial number, and electricity consumption. Thus, attackers cannot obtain important data for analysis from transaction data. In addition, unauthorized power companies are unable to access this information.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Information Security Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/15042)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.