2022
DOI: 10.3390/s22124365
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids

Abstract: With the development of the Internet of Things, smart grids have become indispensable in our daily life and can provide people with reliable electricity generation, transmission, distribution and control. Therefore, how to design a privacy-preserving data aggregation protocol has been a research hot-spot in smart grid technology. However, these proposed protocols often contain some complex cryptographic operations, which are not suitable for resource-constrained smart meter devices. In this paper, we combine d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…“Smart” outsourcing refers to the use of “smart” technologies based on artificial intelligence in outsourcing (Annarelli et al, 2022 ; Reza-Gharehbagh et al, 2022 ; Zhai et al, 2022 ). The article aims to fill the identified gaps in the literature, find answers to the research questions (RQs) and test the hypotheses put forward (H 1 and H 2 ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…“Smart” outsourcing refers to the use of “smart” technologies based on artificial intelligence in outsourcing (Annarelli et al, 2022 ; Reza-Gharehbagh et al, 2022 ; Zhai et al, 2022 ). The article aims to fill the identified gaps in the literature, find answers to the research questions (RQs) and test the hypotheses put forward (H 1 and H 2 ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Securing communication channels and implementing robust authentication mechanisms are crucial for protecting smart-grid infrastructure [28]. The research has focused on encryption algorithms [29], secure protocols [30], access control mechanisms [31,32], and authentication schemes to ensure the confidentiality, integrity, and authenticity of the data transmitted in smart grids [33,34].…”
Section: Existing Researchmentioning
confidence: 99%