Learn More
Smart grid, envisioned as an indispensable power infrastructure, is featured by real-time and two-way communications. How to securely retrieve and audit the communicated metering data for validation testing is, however, still challenging for smart grid. In this paper, we propose a novel privacy-preserving range query (PaRQ) scheme over encrypted metering(More)
Distributed energy resources (DERs), which are characterized by small-scale power generation technologies to provide an enhancement of the traditional power system, have been strongly encouraged to be integrated into the smart grid, and numerous trading strategies have recently been proposed to support the energy auction in the emerging smart grid(More)
In the big data era, duplicated copies of data may be generated by various smart devices. Although convergent encryption has been extensively adopted for secure deduplication, it is still very challenging to efficiently and reliably manage the convergent keys and support keyword search over encrypted data. This paper addresses this problem by presenting an(More)
—To efficiently provide cloud storage services, most providers implement data deduplication schemes so as to reduce storage and network bandwidth consumption. Due to its broad application, many security issues about data deduplication have been investigated, such as data security, user privacy, etc. Nevertheless, we note that the threat of establishing(More)
In this paper, we present an efficient key management scheme for resource limited sensor networks. Motivated by the fact that group key distribution from remote base station is costly in term of communication, we introduce the scheme of locally group key management scheme with revocation and self-healing capability for sensor network. The idea behind the(More)