|
|
1 | (18) |
|
1.1 Smart Grid Architecture |
|
|
1 | (3) |
|
|
3 | (1) |
|
1.1.2 Communications Layer |
|
|
3 | (1) |
|
1.2 Security Challenges in SGCN |
|
|
4 | (5) |
|
1.2.1 Security Objectives in SGCN |
|
|
5 | (1) |
|
|
5 | (2) |
|
1.2.3 Coutermeasures in SGCN |
|
|
7 | (2) |
|
1.3 Existing Techniques for Encrypted Data Query |
|
|
9 | (3) |
|
1.3.1 Order-Preserving Encryption |
|
|
10 | (1) |
|
1.3.2 Searchable Encryption Techniques |
|
|
10 | (1) |
|
1.3.3 Special Data Structure Traversal |
|
|
11 | (1) |
|
1.3.4 Data Partitioning Problems |
|
|
11 | (1) |
|
|
12 | (7) |
|
|
12 | (1) |
|
1.4.2 PKE with Keyword Search |
|
|
12 | (1) |
|
1.4.3 HEV Based Query Predicate |
|
|
13 | (2) |
|
|
15 | (4) |
|
2 Equality Query for Auction in Emerging Smart Grid Marketing |
|
|
19 | (18) |
|
|
19 | (1) |
|
2.2 System Model and Design Goal |
|
|
20 | (3) |
|
2.2.1 Smart Grid Marketing Architecture |
|
|
21 | (1) |
|
2.2.2 Security Requirements |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
23 | (1) |
|
|
24 | (1) |
|
2.3.3 Pre-filtering Phase |
|
|
24 | (1) |
|
2.3.4 Decision-of-Winner Phase |
|
|
25 | (1) |
|
2.4 Extended SESA with Conjunctive Keywords Search |
|
|
25 | (3) |
|
|
25 | (1) |
|
2.4.2 Information Encryption |
|
|
26 | (1) |
|
2.4.3 Pre-filtering Phase |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (4) |
|
|
29 | (2) |
|
2.6.2 Extended SESA vs. EPPKS |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
34 | (3) |
|
|
34 | (3) |
|
3 Conjunctive Query over Encrypted Multidimensional Data |
|
|
37 | (14) |
|
|
37 | (1) |
|
3.2 System Model, Security Requirements and Design Goal |
|
|
38 | (3) |
|
|
39 | (1) |
|
3.2.2 Security Requirements |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (3) |
|
|
41 | (1) |
|
3.3.2 Data and Tags Encryption Phase |
|
|
41 | (1) |
|
3.3.3 Conjunctive Query Phase |
|
|
42 | (1) |
|
3.3.4 Data Recovery Phase |
|
|
43 | (1) |
|
|
44 | (4) |
|
|
44 | (1) |
|
3.4.2 Performance Evaluation |
|
|
45 | (3) |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
50 | (1) |
|
4 Range Query over Encrypted Metering Data for Financial Audit |
|
|
51 | (26) |
|
|
51 | (2) |
|
4.2 System Model, Security Requirements and Design Goal |
|
|
53 | (3) |
|
|
53 | (1) |
|
4.2.2 Security Requirements |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (7) |
|
4.3.1 Construction of the Range Query Predicate |
|
|
56 | (1) |
|
4.3.2 The Encrypted Data Deposit Phase |
|
|
57 | (3) |
|
|
60 | (3) |
|
4.3.4 Enhancement with Collusion Resilience |
|
|
63 | (1) |
|
|
63 | (3) |
|
4.5 Performance Evaluation |
|
|
66 | (6) |
|
4.5.1 Communication Overhead |
|
|
66 | (2) |
|
4.5.2 Computation Overhead |
|
|
68 | (1) |
|
|
69 | (3) |
|
|
72 | (2) |
|
4.6.1 Security and Privacy in Smart Grid |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (3) |
|
|
74 | (3) |
|
5 Conclusions and Future Works |
|
|
77 | |
|
|
77 | (1) |
|
5.2 Future Research Directions |
|
|
78 | |