False data separation for data security in smart grids

2017 ◽  
Vol 52 (3) ◽  
pp. 815-834 ◽  
Author(s):  
Hao Huang ◽  
Qian Yan ◽  
Yao Zhao ◽  
Wei Lu ◽  
Zhenguang Liu ◽  
...  
Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1337 ◽  
Author(s):  
Jayme Milanezi Junior ◽  
João Paulo C. L. da da Costa ◽  
Caio C. R. Garcez ◽  
Robson de Oliveira de Oliveira Albuquerque ◽  
Arnaldo Arancibia ◽  
...  

Due to the drastic increase of electricity prosumers, i.e., energy consumers that are also producers, smart grids have become a key solution for electricity infrastructure. In smart grids, one of the most crucial requirements is the privacy of the final users. The vast majority of the literature addresses the privacy issue by providing ways of hiding user’s electricity consumption. However, open issues in the literature related to the privacy of the electricity producers still remain. In this paper, we propose a framework that preserves the secrecy of prosumers’ identities and provides protection against the traffic analysis attack in a competitive market for energy trade in a Neighborhood Area Network (NAN). In addition, the amount of bidders and of successful bids are hidden from malicious attackers by our framework. Due to the need for small data throughput for the bidders, the communication links of our framework are based on a proprietary communication system. Still, in terms of data security, we adopt the Advanced Encryption Standard (AES) 128 bit with Exclusive-OR (XOR) keys due to their reduced computational complexity, allowing fast processing. Our framework outperforms the state-of-the-art solutions in terms of privacy protection and trading flexibility in a prosumer-to-prosumer design.


2020 ◽  
Vol 76 (1) ◽  
Author(s):  
Lebogang Bopape ◽  
Bakhe Nleya ◽  
Andrew Mutsvangwa ◽  
Philani Khumalo

2018 ◽  
Vol 5 (4) ◽  
pp. 389
Author(s):  
Dedi Darwis ◽  
Rizky Prabowo ◽  
Nurul Hotimah

<p class="Abstrak">Informasi merupakan hal yang sangat berharga. Saat informasi atau data jatuh ke tangan yang tidak bertanggung jawab, maka akan menjadi bencana bagi pemiliknya. Berbagai macam cara dilakukan untuk melindungi data atau informasi. Teknik pengamanan data atau informasi telah berkembang dengan sangat pesat. Proses pengamanan pesan yang banyak beredar diataranya dengan menggunakan kriptografi dan steganografi. Dua teknik ini merupakan teknik yang berbeda maksud dan tujuannya. Kriptografi bertujuan untuk mengacak pesan supaya sulit dibaca oleh pihak yang tidak berkepentingan. Sedangakan steganografi bertujuan untuk menyembunyikan pesan.</p><p class="Abstrak">Pada penelitian ini akan menggabungkan teknik kriptografi metode AES dengan teknik steganografi metode <em>gifsuffle</em>. Teknik kriptografi metode AES akan digunakan untuk merubah data atau informasi yang berbentuk <em>plain</em>-<em>text</em> menjadi <em>cipher</em>-<em>text</em>. Selanjutnya <em>cipher</em>-<em>text</em> tesebut akan disembunyikan ke dalam gambar berformat gif dengan metode steganografi <em>gifsuffle</em>. Metode <em>gifsuffle</em>  akan dikombinasikan dengan algoritma huffman untuk memperbanyak pesan yang dikirimkan.</p><p class="Abstrak">Penelitian ini berhasil menggabungkan metode kriptografi AES dengan metode steganografi <em>gifsuffle</em>. Hasil pengujian <em>imperceptibility</em> menunjukkan 85% responden tidak dapat membedakan gambar asli dengan gambar yang telah disisipi pesan. Pemisahan gambar dengan pesan dapat dilakukan dengan akurasi 100% dan proses dekripsi pesan cipher-text menjadi plain-text juga dapat dilakukan dengan sempurna.</p><p class="Abstrak"> </p><p class="Judul2"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>Information is a very valuable thing. When information or data falls into irresponsible hands, it will be disastrous for the owner. A variety of ways are done to protect data or information. Data security techniques have grown very rapidly. The process of securing a message that many circulated diataranya by using cryptography and steganography. These two techniques are different techniques of purpose and purpose. Cryptography aims to randomize messages to be difficult to read by unauthorized parties. While steganografi aims to hide the message.</em></p><p class="Abstract"><em>In this research combine AES cryptographic method and with gifsuffle steganography method. AES method will be used to convert data or information in the plain-text form into cipher-text form. Furthermore, the cipher-text will be hidden into gif-format images with gifsuffle steganography method. The gifsuffle method will be combined with the huffman algorithm to multiply the transmitted data.</em></p><p class="Abstract"><em>This research successfully combined AES cryptography method with gifsuffle steganography method. Imperceptibility test results show 85% of respondents can not distinguish original images with images that have been inserted data. Separation of images with data can be well done and the accuration reach 100%. Process of decrypting cipher-text into plain-text can also be done perfectly.</em></p>


2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

Sign in / Sign up

Export Citation Format

Share Document