THE smart grid is promising to revolutionize the provision

Size: px
Start display at page:

Download "THE smart grid is promising to revolutionize the provision"

Transcription

1 IEEE COMMUNICATIONS MAGAZINE 1 Do not Snoop my Habits. Preserving Privacy in the Smart Grid Félix Gómez Mármol, Christoph Sorge, Osman Ugus, and Gregorio Martínez Pérez Member, IEEE Abstract The recent deployment of smart grids has proved to bring numerous advantages in terms of energy consumption reduction in both homes and businesses. A more accurate measurement of up-to-date electricity necessities through smart meters utilization leads to an enhancement in the ability of monitoring, controlling and predicting energy use. Nevertheless, it has associated drawbacks related to the privacy of customers as well, since such management might reveal their personal habits and behavior, which electrical appliances they are using at each moment, whether they are at home or not, etc. In this paper we present a privacy enhanced architecture for smart metering aimed to tackle this threat by means of a new and novel protocol encrypting individual measurements while allowing the electricity supplier to access the aggregation of the corresponding decrypted values. The technique being used is named additively homomorphic encryption and enables the direct connection and exchange of data between electricity suppliers and final users, while preserving the privacy of the latter. Index Terms Smart grid, Smart meters, Privacy, Bihomomorphisms I. INTRODUCTION THE smart grid is promising to revolutionize the provision of electrical energy. Electricity suppliers receive more precise information about the state of their networks, and consumers are enabled to adapt their consumption behavior to the current supply situation. As the share of renewable energy sources in the production of electricity increases, this becomes more important. In contrast to coal, gas or nuclear power plants, sun or wind energy are not always available to the desired extent. This drawback, combined with the high costs of storing electrical energy, has had astonishing effects. During times of strong winds, negative electricity prices have been reported in some regions; at the European Energy Exchange, minus 500 Euros per MWh were reached during a peak hour. Better information about consumption patterns of energy consumers may contribute to improved forecasts about demand in the near future, allowing for appropriate reactions on the supply side. Customers can also help avoiding the problem by shifting their electricity consumption to different times. Obviously, this Félix Gómez Mármol works for NEC Europe Ltd., Kurfürsten-Anlage 36, Heidelberg, Germany, felix.gomez-marmol@neclab.eu Christoph Sorge is with the Department of Computer Science, University of Paderborn, Warburger Str. 100, Paderborn, Germany, christoph.sorge@upb.de Osman Ugus is with the Fachbereich Informatik, Hochschule für Angewandte Wissenschaften (HAW) Hamburg, Berliner Tor 7, Hamburg, Germany, osman.ugus@haw-hamburg.de Gregorio Martínez Pérez is with the Department of Information and Communications Engineering, University of Murcia, Murcia, Spain, gregorio@um.es Manuscript received July 1, 2011; revised February 8, is not always possible or appropriate. If, however, electricity is used to generate heat (which can be stored to some extent), to charge the batteries of an electric car, or to accomplish household functions like washing, customers will usually be flexible. One obvious way of influencing the electricity consumption by end users is the price mechanism. Prices might be updated every 15 minutes, and automated mechanisms on the customers premises can react to price changes in a previously configured way. For that purpose, electricity meters have to become smart; there must be a way for the electricity supplier to be sure that its customers pay the correct price for each period. Smart meters can also help customers save energy even without a dynamic pricing mechanism. Purely by displaying up-to-date information, awareness of electricity consumption is increased. An energy saving potential of around 15% has been suggested in a number of studies [1]. Nowadays, the positive effects of smart metering are achieved by transmitting up-to-date information to the electricity supplier in certain intervals, typically 15 minutes. It is possible for a consumer to see his/her electricity consumption in a web interface, and the information can also be used by the supplier for billing purposes. Unfortunately, this approach also threatens privacy. Even assuming that all data transmitted from the consumer s home is using a secure channel, the electricity supplier receives much more personal data than today. Using this data, it is possible to infer whether or not a customer is at home. Many devices even have individual consumption patterns, making it possible to find out when the washing machine or the TV set is in use. The fact that information provision and analysis for customers is sometimes outsourced to Google, for instance, does not help easing privacy concerns. The solution to this privacy problem cannot be to refrain from developing the smart grid. At least in the European Union, there is also a strong political will to introduce smart meters on a large scale. However, we are convinced that smart metering benefits can be kept without the electricity suppliers learning any personally identifiable information about individual customers, except what is strictly needed for billing. In this article, we do not address billing itself using trusted devices, billing can be done entirely by the meters themselves. Once per billing period, the sum to be paid by the customer can be sent to the supplier. Due to the aggregation over a long time span (e.g., one month), this information is not problematic. Instead, we focus on providing up-to-date and accurate aggregated information about the electricity consumption of customer groups to an electricity supplier, without revealing information about individual customers. In order to achieve

2 IEEE COMMUNICATIONS MAGAZINE 2 this goal, we have designed a novel solution that combines grouping of smart meters as well as the use of homomorphic encryption of the consumption reports. Obviously, an electricity network operator already receives some kind of aggregate information even nowadays; measurements on a large scale are possible and necessary for planning the use of power plants. Unfortunately, this information is very coarse-grained and does not even allow distinguishing customers of different electricity suppliers (which typically use the same network), let alone customer groups. One consequence is that electricity suppliers have to buy energy not based on the actual consumption of their customers at a certain point in time, but on an estimate. The electricity market could work more efficiently using the up-to-date information, which we can provide without intruding into customers privacy. The remainder of this article is structured as follows: At first, we give an overview on the background of our work in Section II, especially related work in the field of smart meter privacy. We then present our basic solution based on the use of homomorphic encryption (Section III); we extend this solution to avoid certain Denial-of-Service attacks. We then compare our results to previous work in Section IV before concluding the article in Section V. II. BACKGROUND Smart meters, besides their appealing social and technical benefits, have several problems concerning privacy [2]. Customer habits and behaviors can be detected by having a precise energy use information which is provided by smart meters. Any entity that knows the fine-grained energy consumptions can infer the customers lifestyle and habits (e.g., times of absence and even concrete activities like watching TV or cooking). Consequently, the customer privacy has to be protected while at the same time keeping all the benefits of smart meters by allowing detailed energy measurement reports of customers. The high frequency and volume of data transactions in the smart grid poses new challenges both from a technical and a regulatory perspective. Existing privacy laws, for example in the US, are not yet clearly defined to meet these challenges or are not applicable [2]. While the legal situation seems clearer in Europe with its more generalized approach to privacy regulations, the practical implementation of these rules is also an open issue. This leaves an open door for companies to share this information with third parties e.g., for marketing purposes. Privacy issues arisen by the use of smart meters are also discussed by government agencies. In the US, the NIST has issued guidelines for smart grid cyber security including privacy recommendations [3]. Its focus is on securing access to meter data, and on limiting the collection of data. In Germany, the Federal Office for Information Security (BSI) [4] has provided a protection profile for the gateway of a smart metering system. Additionally, it proposes to use pseudonyms for reporting energy measurements instead of real identifiers to protect customers privacy. In this work, we propose a solution for the smart meter privacy problem that allows to hide the individual smart meter measurements from the energy supplier while allowing it to access the aggregated energy usage information. The idea is to encrypt individual smart meter measurements with an encryption mechanism that allows the energy supplier to get their aggregation without decrypting them. That aim can be achieved by using a cryptographic scheme that allows performing a transformation (e.g., multiplication) on the ciphertext space, which is equivalent to evaluating a certain function on the plaintext space. In our case, the resulting function performed on the plaintext space is a simple addition. An encryption mechanism with this property is known as additively homomorphic encryption. The solution proposed in this work allows the delivery of individual smart meter measurements directly to the energy supplier while preserving the privacy of smart meter users. It is based on a bihomomorphic encryption function which is additively homomorphic on the plaintext and key space. Such an encryption mechanism is proposed in [5] as part of a previous work also done at NEC Laboratories Europe. We note that any secure additively bihomomorphic encryption mechanism can be used in the framework we provide in this paper. To the best of our knowledge, this paper is presenting one of the first works combining grouping of smart meters and use of a novel homomorphic encryption protocol in order to achieve real privacy in the smart grid. III. HOW TO PRESERVE USERS PRIVACY A. Scenario definition In our scenario, an Energy Supplier (from now on, ES) receives electricity measurements from smart meters sm in a given period. However, we do not want the ES to know individual measurements from smart meters, but the aggregation of the latter, instead. Additionally, we want to avoid the figure of an intermediate aggregator, since it might constitute a centralized point of failure and it should be universally trusted by every single smart meter. Hence, the ES must receive all the individual values encrypted, without being able to decrypt them. However, once the aggregation has been performed, it should be able to decrypt such aggregated value. Fig. 1. Scenario definition: distributed smart metering Figure 1 depicts this scenario definition. As it can be observed, smart meters encrypt their consumption reports

3 IEEE COMMUNICATIONS MAGAZINE 3 Fig. 2. Privacy enhanced architecture for smart metering before transmitting them to the ES. As the ES gathers all the encrypted values, it aggregates them in order to obtain a unique value representing the encryption of the total energy consumption of smart meters. Thus, the ES does not have access to the individual keys used to encrypt the users measurements, but it needs a mechanism that allows it to obtain the unique key K needed to decrypt the encrypted aggregation of plain values. Additionally, it should not be possible to obtain the individual keys of smart meters even if the ES knows the decryption key K. B. Physical and network layer While our approach prevents identification of customers based on application-layer (authentication) information, lower layers of the communication stack might reveal identity information. Different solutions have been suggested (and implemented) for these lower layers, either based on customers existing internet connection, or using power-line communication. In the first case (use of an existing internet connection, e.g., using DSL), users can have static or dynamically assigned IP addresses. The customer s internet service provider can always map IP address and customer identity, but will usually be a separate entity from the ES. Therefore, this mapping is not a major privacy threat. However, when a smart meter communicates with the ES, the IP address can be used to build a profile over an extended period of time if static IP addresses are used, or over a short period in case of dynamically assigned addresses. Anonymization above the network layer, using onion routing or the Crowds approach [6], is helpful in both cases. Both approaches can be used within a group of smart meters, so no external network nodes would be involved. As they are already existing standard techniques, we do not provide a detailed description as part of this work. Routing information through other nodes than the respective smart meter and the ES is not a security problem, as we use authentication and encryption on the application layer. The second case is the use of powerline communication (the reasoning also applies for several other techniques, such as dedicated ethernet lines in a block of buildings or WiMAX). Here, regular changes of MAC addresses suffice for anonymization within a broadcast domain if each anonymity group of smart meters is located within such a broadcast domain, no additional measures are required. This setup has the second advantage of allowing the ES to detect local bottlenecks. If a group of customers within one neighborhood uses (or generates) a lot of power at the same time, an overload situation may occur. With current setups, the ES cannot reliably detect such local overload situations before they lead to actual problems. Smart meters can help with this detection. C. Privacy-preserving protocol for smart metering In order to prevent an ES from snooping its customers habits and to preserve the privacy of individual measurements made by the smart meters, while allowing the ES to get an aggregation of such energy consumption reports, we have designed an effective as well as accurate solution consisting of hiding those measurements behind a smart meters grouping (see Figure 2). These groups of smart meters could be formed in a natural way by putting into the same group, for instance, all the smart meters belonging to the same building, or even those ones in the same street or neighborhood. In a practical deployment, groups would be limited to smart meters of one electricity suppliers customers (even though, in some markets, dozens or hundreds of suppliers use the same physical electricity network). We argue that such a grouping approach does not limit the benefits of the smart grid. For planning purposes,

4 IEEE COMMUNICATIONS MAGAZINE 4 the knowledge on the total energy consumption of a specific geographical region is the primary interest of an ES. The knowledge about the energy consumption of individual customers is not required for planning purposes and energy demand forecasts. Aggregation of the energy consumptions of groups allows precisely computing the total energy consumptions of certain buildings, neighborhoods, or even cities. Our scheme basically allows each smart meter sm to send a measurement, each encrypted with an individual key, to its corresponding ES, which does not get these individual keys. Instead, it receives an aggregate key allowing only the decryption of an aggregate measurement. The communication between smart meter and ES uses a secure channel, hiding the meter s real identity as a member of group G. The establishment of a secure channel requires the use of an authentication mechanism. In theory, any authentication mechanism could be used; the most suitable ones, in order to authenticate the smart meter only as a member of a group of authorized smart meters, would be group signatures or anonymous credential schemes [7]. Anonymous credential schemes are schemes that allow users to prove an authorization without revealing their identity. Group signatures achieve a similar goal: each user has different key material, but can sign messages on behalf of the group. Third parties cannot distinguish the signatures made by different group members, but most schemes use a group manager that can revoke this anonymity. A natural way to establish a secure channel in our scheme is for the smart meter and the ES to perform a key exchange (e.g., Diffie-Hellman key exchange). Afterwards, the ES signs the previously exchanged messages with a traditional signature scheme and the smart meter uses the group signature scheme for authentication (and to detect possible man-in-the middle attacks). Besides, one smart meter per group is periodically designated as the key aggregator, so the rest of members send it their keys, in a secure way. Thus, i) the aggregator cannot decrypt the values sent by each smart meter, even if it knows their keys, since such measurements are sent directly to the ES through a secure channel (and therefore the key aggregator has no access to them), ii) nobody knows other members keys (except the current key aggregator), and iii) it does not matter if the key aggregator acts maliciously and shares those keys with the ES since in such case the latter would need to try all the possible combinations between the set of keys and the set of received values from that group to disclose the actual measurements; but since those individual keys change every round (as we will see next), and the key aggregator is elected periodically, it is computationally expensive and therefore not worthy for the ES to perform such an attack. Once the key aggregator has received all the group members keys, it aggregates (sums) them in order to obtain key K and sends it to the ES through a secure channel. Note that this key K has to be sent to the ES only once when bootstrapping the system (and every time one smart meter leaves/fails or enters/joins the group). To achieve this, each smart meter actually uses a different random key per period. However, the aggregation of all the keys, i.e., key K, remains constant. To this end, smart meters within the same group form a ring 1. In each period, each smart meter in this ring selects a random value. It subtracts this random value from its own key and, at the same time, it sends that random value to its successor through a secure channel. The random value received from the predecessor is added to each smart meter s own key. Each random value added to one smart meter s key is therefore subtracted from another one s to keep the key K constant. So, in summary, the steps to be followed by our protocol in order to send encrypted measurements to the ES, while allowing it to decrypt the aggregation of such reports, are: 1) Each smart meter updates its key in a smart ring and sends the new one to the key aggregator. 2) The key aggregator computes the aggregation of all received keys in order to obtain the aggregated key K. 3) The key aggregator then sends the aggregated key K to the ES (only once at the beginning or every time a smart meter leaves/fails or enters/joins the group). The key aggregator, in any case, checks that the aggregation of received keys is equal to K every round, for consistency. 4) Each smart meter encrypts its consumption measurement at time using its current key and sends it to the ES. 5) The ES aggregates the encrypted consumption values. Through the use of bihomomorphic encryption, the result equals the aggregate of the original values, encrypted with the aggregated key K. The ES is therefore able to decrypt the aggregation just by subtracting the aggregated key K from the aggregated encrypted consumption value. The application of such bihomomorphic encryption in order to preserve users privacy in the smart grid while still allowing its numerous benefits, is one of our major contributions in this work. In short, a bihomomorphic encryption is an encryption which is additive homomorphic both on the plaintext space and on the key space, as described in a previous work [5] performed at NEC Laboratories Europe. As mentioned before, this type of encryption allows the ES to decrypt the aggregation of encrypted reports, but not those encrypted measurements individually. The key aggregator only knows the individual keys, while the ES only knows both the aggregated key K and the individual encrypted measurements. We note that any secure additive bihomomorphic encryption mechanism with these features might be suitable for this proposal. As the key aggregator only has to perform quite simple operations, its role can be played by any smart meter and does not require, say, a state-of-the-art personal computer. Unfortunately, an important issue might arise if a smart meter within a group fails, or even acts maliciously, and sends its key to the key aggregator, but does not send the corresponding encrypted measurement (or vice versa), since in such a situation the ES would not be able to perform the decryption of the aggregation of received encrypted reports. In order to tackle this problem, we also propose an additional mechanism named tokens solution that would execute on top of the previously described one, and that would be enabled just for the round where this threat is detected 1 The formation and updating of this ring is out of the scope of this paper.

5 IEEE COMMUNICATIONS MAGAZINE 5 (disabling it right afterwards the problem is overcome). As the main focus of this paper is the privacy protection, we skip the details and describe it briefly. The basic idea is that the key aggregator (KA) and the ES accept inputs from smart meters iff they are authenticated by the ES and the KA, respectively. That is to say, before aggregating the individual keys received from smart meters to obtain the key K, the KA generates a token for each key and sends them back to the corresponding smart meters. Each smart meter reports its encrypted measurement together with the received token to the ES. The ES sends an acknowledgement message for each measurement received with a valid token to the KA. The KA then aggregates only the keys which are acknowledged by the ES to obtain the key K. By applying the described bihomomorphic encryption/decryption of energy consumption measurements generated by smart meters, together with the constitution of smart meters groups, the explained keys updating mechanism and, when necessary, the tokens solution, we achieve a system in which the ES can still benefit from the instantaneous reports from smart meters in order to better monitor, control, and predict energy use, while preserving the privacy of final users in terms of their daily habits at home or their appliances usage patterns, for instance. IV. DISCUSSION In this section we carried out a concise survey of some of the current works aimed to preserve the privacy of end users in the smart grid. For instance, [8] presents two solutions for smart metering both with and without involvement of a trusted third party (TTP). In the former case, smart meters report their encrypted measurements to an intermediate aggregation proxy rather than directly to the ES. The proxy sums up the individual measurements and sends the aggregation result to the ES. The solution is based on using a conventional encryption mechanism which allows no aggregation on the encrypted measurements. Thus, the aggregation proxy can see the measurements in clear text (though it does not necessarily have the ability to map them to a specific smart meter or customer). Hence, this scheme guarantees privacy as long as the trusted party and the ES do not collaborate. In the paper at hand, the aggregator is not a typical intermediary, but a smart meter like all other participants. The main advantage of this work compared to the TTP solution presented in [8] is the amount of trust that has to be placed in the aggregator (a key aggregator, in our case). Our solution does not even allow the key aggregator to see the measurements, let alone map them to a customer. Moreover, even in case of collaboration with the ES, the potential damage is limited due to constant changes of the role. We achieve this advantageous solution by exploiting a bihomomorphic encryption which allows aggregating encrypted measurements without decrypting them at the ES. Smart meter anonymity is achieved by hiding the real identity of smart meters behind groups. We note that in [8], a solution without involvement of a trusted intermediate aggregator is also proposed. The approach is based on adding a random noise to the smart meter measurements which sums up to zero in the final aggregation. Random values are chosen from a distribution such that the sum of all random values chosen by smart meters is zero with some deviation. The solution protects the privacy of customers as the individual measurements from smart meters are randomized. The ES can still compute the aggregation of the energy consumption with some deviation from the actual value as the sum of all smart meter measurements has a lower variance than caused in individual readings by the added noise. In contrast to the approach presented in this paper, such solution only leads to an acceptable precision if group sizes become very large. Our approach also allows relatively small group sizes. However, the main disadvantage of our solution is the loss of precision e.g., in case some readings from smart meters are missed. This problem is solved in our protocol with the token based approach as described in Section III-C. Note that our work is not the first to suggest using homomorphic encryption to achieve privacy for smart metering. Garcia and Jacobs [9] suggest a provably secure two-round protocol that allows the energy supplier to learn only an aggregate value by using a combination of additively homomorphic encryption and additive secret sharing. In every reporting period, every smart meter performs n 1 encryptions and a decryption for the aggregation of measurements from a group of n smart meters. This causes a large computation and communication overhead on the smart meters which is the drawback of this scheme. In contrast to this solution, we place a lower burden on the aggregating node by using only computationally cheap symmetric encryption, which makes it possible to choose that node from the set of smart meters. Furthermore, authors of [10] present a homomorphic encryption solution to perform in-network aggregation while keeping the outputs and intermediate results secure, which is in turn based on [5]. Smart meter data is forwarded using other smart meters as intermediate hops to perform an aggregation of homomorphically encrypted meter data on each hop. Smart meters are arranged in a tree structure, in which the collector node is the root node. However, they assume that smart meters follow the honest-but-curious model, which means that smart meters will never act maliciously (either intentionally or unintentionally). In our opinion this a too strong and even not valid assumption for realistic scenarios. Thus, we have also addressed and provided a successful solution by means of which the adverse situations caused by malicious or failing smart meters are tackled. Table I shows a brief summary of the aforementioned works, analyzing some of their most critical features. V. CONCLUSIONS AND FUTURE WORK Smart meters usually record consumption of end users in different intervals and then communicate all this data back to the electricity supplier for billing and monitoring purposes. They are used as near real-time sensors providing a bidirectional communication channel between the suppliers and these devices and thus establishing the base for smart grids. They allow providing added-value services such as the provision of

6 IEEE COMMUNICATIONS MAGAZINE 6 Aggregator (Scaling) [8] with TTP same TTP as aggregator in each round [8] without no explicit TTP aggregator needed; ES aggregates data [9] data aggregator for each group [10] each smart meter as intermediate aggregator; explicit aggregator for each group Paper at key aggregator hand for each group; ES aggregates data Computation Overhead: Smart Meter negligible (symmetric negligible (symmetric high (asymmetric high (asymmetric negligible (symmetric Computation Overhead: Aggregator negligible negligible high medium medium TABLE I PRIVACY PRESERVING SOLUTIONS FOR SMART GRID different prices for consumption based on different criteria, detection of service outage, etc. Even if these advantages are of interest for both electricity suppliers and final customers, the latter will need privacy-aware ways for recollecting and transmitting their consumption information, so the use of these devices do not reveal private information, habits and behaviors of these customers. This paper proposes a privacy-aware protocol applicable to the collection of smart meter information. It allows hiding individual measurements from the electricity supplier while allowing it to access the information on the aggregated energy use. The tool in use for that is additively homomorphic encryption, which allows the supplier to get the aggregation of the encrypted individual measurements without decrypting them. Our proposed solution also enables the direct communication between nodes of the smart grid and the supplier while preserving the privacy of the smart meter users, which some other existing models are not allowing. As future work, we are planning to perform a thorough security analysis of our suggested protocol. We are also preparing an evaluation of its scalability, and plan comparing the solution to alternative approaches defined in our own groups as well as by other researchers. Moreover, we will also investigate how to detect a corrupted electricity measurement in order to trigger the tokens solution accordingly. ACKNOWLEDGMENT The work presented in this paper was partially supported by the BMWI within the project SmartPowerHamburg. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements of the SmartPowerHamburg project. Thanks also to the Funding Program for Research Groups of Excellence granted as well by the Séneca Foundation with code 04552/GERM/06. REFERENCES [1] G. Wood and M. Newborough, Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design, Elsevier Energy and Buildings, vol. 35, no. 8, pp , [2] P. McDaniel and S. McLaughlin, Security and privacy challenges in the smart grid, IEEE Security and Privacy, vol. 7, pp , [3] National Institute of Standards and Technology Interagency Report 7628: Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid, August 2010, nistir-7628 vol2.pdf. [4] Bundesamt fuer Sicherheit in der Informationstechnik, Federal Office for Information Security, Protection profile for the gateway of a smart metering system, BSI/SmartMeter/PP-SmartMeter.pdf, September 02, [5] F. Armknecht, D. Westhoff, J. Girao, and A. Hessler, A lifetimeoptimized end-to-end encryption scheme for sensor networks allowing in-network processing, Computer Communications, vol. 31, no. 4, pp , [6] M. K. Reiter and A. D. Rubin, Anonymous web transactions with crowds, Communications of the ACM, vol. 42, pp , February [7] J. Camenisch and A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in Advances in Cryptology CRYPTO 04, 2004, pp [8] J.-M. Bohli, C. Sorge, and O. Ugus, A privacy model for smart metering, in IEEE International Conference on Communications, 2010, May [9] F. D. García and B. Jacobs, Privacy-friendly energy-metering via homomorphic encryption, in In 6th Workshop on Security and Trust Management (STM 2010), [10] F. Li, B. Luo, and P. Liu, Secure information aggregation for smart grids using homomorphic encryption, in First IEEE International Conference on Smart Grid Communications. Gaithersburg, USA: IEEE Communications Society, Oct 2010, pp Félix Gómez Mármol is a research scientist in the security group at NEC Laboratories Europe, Heidelberg, Germany. His research interests include authorization, authentication and trust management in distributed and heterogeneous systems, security management in mobile devices and design and implementation of security solutions for mobile and heterogeneous environments. He received an MSc and PhD in computer engineering from the University of Murcia. Contact him at felix.gomez-marmol@neclab.eu Christoph Sorge is an assistant professor in the computer science department at the University of Paderborn. His research interests include security and privacy of computer networks from both a technical and a legal perspective. Sorge has a PhD in computer science from the Karlsruhe Institute of Technology. Contact him at christoph.sorge@uni-paderborn.de.

7 IEEE COMMUNICATIONS MAGAZINE 7 Osman Ugus received his Diploma degree in 2007 from Technische Universität Darmstadt with a focus on IT-security. From April 2007 until December 2010, he worked at NEC Europe Network Laboratories as a Research Associate. He is currently a Research Assistant at HAW Hamburg. He is interested in security and lightweight cryptography especially in wireless sensor networks and mobile devices. Contact him at osman.ugus@haw-hamburg.de Gregorio Martínez Pérez is an associate professor in the Department of Information and Communications Engineering of the University of Murcia. His research interests include security, privacy and management of IP-based communication networks. He received an MSc and PhD in computer engineering from the University of Murcia. Contact him at gregorio@um.es

arxiv: v1 [cs.cr] 30 May 2014

arxiv: v1 [cs.cr] 30 May 2014 ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,

More information

Chapter 2 Background and Models

Chapter 2 Background and Models Chapter 2 Background and Models Abstract This chapter contextualizes the role of smart meters in smart grid initiatives around the world to show that the smart grid concept goes beyond energy supplier

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

Covert Identity Information in Direct Anonymous Attestation (DAA)

Covert Identity Information in Direct Anonymous Attestation (DAA) Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

Security and Privacy Issues In Smart Grid

Security and Privacy Issues In Smart Grid Security and Privacy Issues In Smart Grid J. Liu and Y. Xiao, S. Li, W. Liang, C. Chen IEEE COMMUNICATIONS SURVEYS & TUTORIALS, to appear Wednesday, September 26, 2012 Mohamed M. E. A. Mahmoud PhD, PDF,

More information

New Security Features in DLMS/COSEM

New Security Features in DLMS/COSEM New Security Features in DLMS/COSEM A comparison to the Smart Meter Gateway Workshop on Power Line Communications 2015 (HRW), Robin Massink (DNV GL), Gerd Bumiller (HRW) 21.09.2015 21.09.2015 1 Initiated

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

PET PhD Course 2012 SWITS The Smart Grid and Anonymous Communication Mechanisms

PET PhD Course 2012 SWITS The Smart Grid and Anonymous Communication Mechanisms PET PhD Course 2012 SWITS The Smart Grid and Anonymous Communication Mechanisms Leonardo Martucci Security and Networks Group, ADIT Department of Computer and Information Science About me EE Degree (95-00)

More information

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel. Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations

More information

On the Revocation of U-Prove Tokens

On the Revocation of U-Prove Tokens On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509

More information

ZigBee Security Using Attribute-Based Proxy Re-encryption

ZigBee Security Using Attribute-Based Proxy Re-encryption J. lnf. Commun. Converg. Eng. 10(4): 343-348, Dec. 2012 Regular Paper ZigBee Security Using Attribute-Based Proxy Re-encryption Hwajeong Seo and Howon Kim*, Member, KIICE Department of Computer Engineering,

More information

Chapter 8: Smart Grid Communication and Networking

Chapter 8: Smart Grid Communication and Networking Chapter 8: Smart Grid Communication and Networking Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 1. The framework of smart grid 2. Network

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem

MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem Georgios Karopoulos a,, Christoforos Ntantogian b, Christos Xenakis b a Department of Informatics and Telecommunications,

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Smart Gas Metering in Germany.

Smart Gas Metering in Germany. Smart Gas Metering in Germany. New OMS Standard for Germany. New security standard. 10 th October 2012, Metering Billing/CRM Europe 2012, Amsterdam Andreas Bolder, Deutsche Telekom Technischer Service

More information

The German IT Security Certification Scheme. Joachim Weber

The German IT Security Certification Scheme. Joachim Weber The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information

Service-Oriented Advanced Metering Infrastructure for Smart Grids

Service-Oriented Advanced Metering Infrastructure for Smart Grids Journal of Energy and Power Engineering 5 (2011) 455-460 Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer

More information

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are! Context Protocols for anonymity The nternet is a public network: Myrto Arapinis School of nformatics University of Edinburgh Routing information is public: P packet headers contain source and destination

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Towards Process-based Composition of Activities for Collecting Data in Supply Chains

Towards Process-based Composition of Activities for Collecting Data in Supply Chains Towards Process-based Composition of Activities for Collecting Data in Supply Chains Gregor Grambow, Nicolas Mundbrod, Vivian Steller and Manfred Reichert Institute of Databases and Information Systems

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Security analysis of Dutch smart metering systems

Security analysis of Dutch smart metering systems Sander Keemink and Bart Roos July 2, 2008 1 / 19 1 Smart metering introduction 2 Theoretical research 3 Practical research 4 Recommendations 5 Conclusion 2 / 19 Smart metering introduction Smart Metering

More information

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers

More information

Chapter 10 : Private-Key Management and the Public-Key Revolution

Chapter 10 : Private-Key Management and the Public-Key Revolution COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 10 : Private-Key Management and the Public-Key Revolution 1 Chapter 10 Private-Key Management

More information

Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks

Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, and Kemal Akkaya Department of Electrical and Computer Engineering,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

(Non-legislative acts) REGULATIONS

(Non-legislative acts) REGULATIONS 15.12.2012 Official Journal of the European Union L 347/1 II (Non-legislative acts) REGULATIONS COMMISSION IMPLEMENTING REGULATION (EU) No 1203/2012 of 14 December 2012 on the separate sale of regulated

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reed y Paul Syverson y January 28, 1999 1 Introduction Preserving privacy means not only hiding the content of messages,

More information

Cyber Security and Privacy Issues in Smart Grids

Cyber Security and Privacy Issues in Smart Grids Cyber Security and Privacy Issues in Smart Grids Acknowledgement: Slides by Hongwei Li from Univ. of Waterloo References Main Reference Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. Cyber

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

11:1 Anonymous Internet Access Method for Wireless Systems

11:1 Anonymous Internet Access Method for Wireless Systems 11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Washington DC October Consumer Engagement. October 4, Gail Allen, Sr. Manager, Customer Solutions

Washington DC October Consumer Engagement. October 4, Gail Allen, Sr. Manager, Customer Solutions Consumer Engagement Through Social Media October 4, 2012 Gail Allen, Sr. Manager, Customer Solutions KCP&L Company Overview Key Statistics Customers Generation 9 plant sites 26 generating units 830,000

More information

Privacy Policy. In this data protection declaration, we use, inter alia, the following terms:

Privacy Policy. In this data protection declaration, we use, inter alia, the following terms: Last updated: 20/04/2018 Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of VITO (Vlakwa). The

More information

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION #RSAC SESSION ID: CRYP-W04 CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION Adam Shull Recent Ph.D. Graduate Indiana University Access revocation on the cloud #RSAC sk sk Enc Pub Sym pk k

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

A simple approach of Peer-to-Peer E-Cash system

A simple approach of Peer-to-Peer E-Cash system A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization

More information

Secure by design: An approach for a virtual power plant

Secure by design: An approach for a virtual power plant Secure by design: An approach for a virtual power plant M.Sc. Stefan Siegl, Assoc. Prof. Nils Ulltveit-Moe SEMIAH - Scalable Energy Management Infrastructure for Aggregation of Households Starting date:

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters IDACCS Wireless 2014 Integrity protection in a smart grid environment for wireless access of smart meters Prof- Dr.-Ing. Kai-Oliver Detken DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen URL: http://www.decoit.de

More information

SUCCESS STORY INFORMATION SECURITY

SUCCESS STORY INFORMATION SECURITY SUCCESS STORY Landis+Gyr cares for security in Smart Metering Safety modules for Smart-Meter Gateways according to Common Criteria The fabrication of intelligent power meters, the so called Smart Meters,

More information

Group Key Establishment Protocols

Group Key Establishment Protocols Group Key Establishment Protocols Ruxandra F. Olimid EBSIS Summer School on Distributed Event Based Systems and Related Topics 2016 July 14, 2016 Sinaia, Romania Outline 1. Context and Motivation 2. Classifications

More information

Development Of Water Meter For Secure Communication In The Advanced Metering Infrastructure

Development Of Water Meter For Secure Communication In The Advanced Metering Infrastructure City University of New York (CUNY) CUNY Academic Works International Conference on Hydroinformatics 8-1-2014 Development Of Water Meter For Secure Communication In The Advanced Metering Infrastructure

More information

Key Protection for Endpoint, Cloud and Data Center

Key Protection for Endpoint, Cloud and Data Center Key Protection for Endpoint, Cloud and Data Center ENCRYPTION IS ONLY AS SECURE AS ITS LEAST SECURE KEY Encryption is undoubtedly one of the pillars of information security. It is used everywhere today:

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

1) The Definition of Personal Data, the Legal Basis of Data Processing, the Concepts of Data Controller and Data Processor

1) The Definition of Personal Data, the Legal Basis of Data Processing, the Concepts of Data Controller and Data Processor The Opinion of the Hungarian National Authority for Data Protection and Freedom of Information on Blockchain Technology in the Context of Data Protection A Hungarian citizen requested the Hungarian National

More information

White Paper Implementing mobile electronic identity

White Paper Implementing mobile electronic identity Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing

More information

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM Madhuri Martis 1, Rameshkumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering, STJIT, Ranebennur,

More information

Plaintext Awareness via Key Registration

Plaintext Awareness via Key Registration Plaintext Awareness via Key Registration Jonathan Herzog CIS, TOC, CSAIL, MIT Plaintext Awareness via Key Registration p.1/38 Context of this work Originates from work on Dolev-Yao (DY) model Symbolic

More information

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Kun Peng Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract Onion routing is the most common anonymous communication channel.

More information

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt On the Diculty of Software Key Escrow Lars R. Knudsen Katholieke Universiteit Leuven Dept. Elektrotechniek-ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Torben P. Pedersen y Cryptomathic Arhus Science

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab)

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels / PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS Christoph Krauß, christoph.krauss@aisec.fraunhofer.de Dagstuhl Seminar 11441: Science and Engineering of CPS, November 2011 Overview Introduction Securing

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

Anna Butenko User-centered innovation and regulatory framework

Anna Butenko User-centered innovation and regulatory framework Anna Butenko User-centered innovation and regulatory framework Energy prosumers market access in EU regulation Presentation Structure Theoretic framework: Regulatory disconnection Energy prosumers market

More information

A Remote Biometric Authentication Protocol for Online Banking

A Remote Biometric Authentication Protocol for Online Banking International Journal of Electrical Energy, Vol. 1, No. 4, December 2013 A Remote Biometric Authentication Protocol for Online Banking Anongporn Salaiwarakul Department of Computer Science and Information

More information

CONIKS: Bringing Key Transparency to End Users

CONIKS: Bringing Key Transparency to End Users CONIKS: Bringing Key Transparency to End Users Morris Yau 1 Introduction Public keys must be distributed securely even in the presence of attackers. This is known as the Public Key Infrastructure problem

More information

TEPZZ 6Z8446A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H04L 9/08 ( ) H04L 9/32 (2006.

TEPZZ 6Z8446A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H04L 9/08 ( ) H04L 9/32 (2006. (19) TEPZZ 6Z8446A_T (11) EP 2 608 446 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 26.06.2013 Bulletin 2013/26 (1) Int Cl.: H04L 9/08 (2006.01) H04L 9/32 (2006.01) (21) Application number:

More information

Trends in Lawful Interception and Its Applications in National Security

Trends in Lawful Interception and Its Applications in National Security Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Paul A. Karger

Paul A. Karger Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of

More information

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information