Cluster Computing

, Volume 17, Issue 3, pp 653–664 | Cite as

Implementation of load management application system using smart grid privacy policy in energy management service environment



As the Smart grid is intelligent power grid, combining information Technology to the existing power grid. Electricity suppliers and consumers exchange real-time information to two-way and is a next-generation power grid to optimize energy efficiency. This paper suggests the implementation of load management application system using smart grid privacy policy in energy management service in energy management service environment. The structure of the privacy policy-based protection system using load management system in the smart grid environment is the structure that serves data in the load management system to the web through the application service network. For this, the privacy policy-based protection system suggested and developed the smart grid privacy policy-based protection system which controls service access by protecting items related to the personal information of the user and setting the privacy protection level for each item.


Energy management Load management Smart socket Energy 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A4A01013587).


  1. 1.
    Lee, J., Park, N.: Individual information protection in Smart Grid. In: Kim, T.H., et al. (eds.) SecTech/CA/CES-CUBE 2012, CCIS 339, pp. 153–159. Springer, Berlin (2012)Google Scholar
  2. 2.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)Google Scholar
  3. 3.
    Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)Google Scholar
  4. 4.
    Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. ICCCI 2011. LNCS. Springer, Heidelberg (2011)Google Scholar
  5. 5.
    Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8(4), 205–219 (2011)CrossRefGoogle Scholar
  6. 6.
    Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)Google Scholar
  7. 7.
    Park, N., Song, Y.: AONT encryption based application data management in mobile RFID environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)Google Scholar
  8. 8.
    Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. Communications in Computer and Information Science, vol. 206, pp. 467–474. Springer, Heidelberg (2011).Google Scholar
  9. 9.
    Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer, Heidelberg (2011)Google Scholar
  10. 10.
    Park, N., Song, Y.: Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)Google Scholar
  11. 11.
    Park, N., Ko, Y.: In: Park, J., Zomaya, A., Yeo, S., et al. (eds.) Computer Education‘s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education, vol. 7513, pp. 320–327. Springer, Berlin (2012)Google Scholar
  12. 12.
    Ko, Y., An, J., Park, N.: In: Kim, T., Stoica, A., Fang, W., et al. (eds.) Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology, vol. 339, pp. 109–114. Springer, Berlin (2012)Google Scholar
  13. 13.
    Ko, Y., Park, N.: In: Kim, T., Adeli, H., Slezak, D., et al. (eds.) Experiment and Verification of Teaching Fractal Geometry Concepts Using a Logo-Based Framework for Elementary School Children, vol. 7105, pp. 257–267. Springer, Berlin (2011)Google Scholar
  14. 14.
    An, J., Park, N.: In: Park, J.J., Jeong, Y., Park, S.O., et al. (eds.) The Effect of EPL Programming Based on CPS Model for Enhancing Elementary School Students‘ Creativity, vol. 181, pp. 237–244. Springer, Dordrecht (2012)Google Scholar
  15. 15.
    An, J., Park, N.: In: Park, J.J., Arabnia, H., Chang, H., et al. (eds.) Computer Application in Elementary Education Bases on Fractal Geometry Theory Using LOGO Programming, vol. 107, pp. 241–249. Springer, Dordrecht (2011)Google Scholar
  16. 16.
    Kim, Y., Park, N.: In: Yeo, S., Pan, Y., Lee, Y.S., et al. (eds.) Development and Application of STEAM Teaching Model Based on the Rube Goldberg‘s Invention, vol. 203, pp. 693–698. Springer, Dordrecht (2012)Google Scholar
  17. 17.
    Kim, Y., Park, N., Stoica, A.: In: Kim, T., Stoica, A., Fang, W., et al. (eds.) The Effect of STEAM Education on Elementary School Student‘s Creativity Improvement, vol. 309, pp. 115–121. Springer, Berlin (2012)Google Scholar
  18. 18.
    Kim, Y., Park, N.: In: Park, J.H., Kim, J., Zou, D., et al. (eds.) lementary Education of Creativity Improvement Using Rube Goldberg‘s Invention, vol. 180, pp. 257–263. Springer, Dordrecht (2012)Google Scholar
  19. 19.
    Park, N., Cho, S., Kim, B., et al.: In: Yeo, S., Pan, Y., Lee, Y.S., et al. (eds.) Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System, vol. 203, pp. 699–705. Springer, Dordrecht (2012)Google Scholar
  20. 20.
    Kim, K., Kim, B., Lee, B. et al.: In: Kim, T., Stoica, A., Fang, W., et al. (eds.) Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform, vol. 339, pp. 94–100. Springer, Berlin (2012)Google Scholar
  21. 21.
    Kim, G., Park, N.: In: Kim, T., Stoica, A., Fang, W., et al. (eds.) Program Development of Science and Culture Education Tapping into Jeju‘s Special Characteristics for Adults, vol. 339, pp. 133–138. Springer, Berlin (2012)Google Scholar
  22. 22.
    Hong, J., Park, N.: In: Yeo, S., Pan, Y., Lee, Y.S., et al. (eds.) Teaching-learning Methodology of STS Based on Computer and CAI in Information Science Education, vol. 203, pp. 733–738. Springer, Dordrecht (2012)Google Scholar
  23. 23.
    Taysi, Z.C., Yavuz, A.G.: ETSI compliant GeoNetworking protocol layer implementation for IVC simulations. Hum. Centric Comput. Inf. Sci. 3, 4 (2013)Google Scholar
  24. 24.
    Kwon, D., Chung, K., Choi, K.: A dynamic Zigbee protocol for reducing power consumption. J. Inf. Process. Syst. 9(1), 44–52 (2013)Google Scholar
  25. 25.
    Sinha, A., Lobiyal, D.K.: Performance evaluation of data aggregation for cluster-based wireless sensor network. Hum. Centric Comput. Inf. Sci. 3, 13 (2013) Google Scholar
  26. 26.
    Liu, J., Chung, S.H.: An efficient load balancing scheme for multi-gateways in wireless mesh networks. J. Inf. Process. Syst. 9(3), 365–378 (2013)Google Scholar
  27. 27.
    Choi, H.-Y., Min, S.-G., Han, Y.-H., Koodli, R.: Design and simulation of a flow mobility scheme based on proxy mobile IPv6. J. Inf. Process. Syst. 8(4), 603–620 (2012)Google Scholar
  28. 28.
    Degefa, F.B., Won, D.: Extended key management scheme for dynamic group in multi-cast communication. J. Converg. 4(4), 7–13 (2013)Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Department of Computer Education, Teachers CollegeJeju National UniversityJeju-siKorea
  2. 2.Electronics and Telecommunications Research Institute (ETRI)Daejeon Korea

Personalised recommendations