Individual Information Protection in Smart Grid

  • Jun Wook Lee
  • Namje Park
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)


Smart grid is a new electricity grid which transmits and distributes electricity intelligently by converging the information technology into the traditional electricity grid. Recently, the smart grid projects are promoted rapidly because the ‘Green IT’ becomes more and more interesting. However, Modernization of the grid will increase the level of personal information detail available as well as the instances of collection, use and disclosure of personal information. This paper’s proposals will contribute the smart grid security and guarantee promotion of the smart grid.


Smart Grid Security Privacy Information Protection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Shamir, A.: How to Share a Secret. Communication of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Rivest, R.L.: All-or-Nothing Encryption and the Package Transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Dean, J.: Handling Large Datasets at Google: Current Systems and Future Directions. In: Data-Intensive Computing Symposium (2008)Google Scholar
  5. 5.
    Rmakrishnan, R.: Sherpa: Cloud Computing of the Third Kind. In: Data-Intensive Computing Symposium (2008)Google Scholar
  6. 6.
    Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (3, n)-threshold secret sharing scheme using exclusive-or operations. IEICE Trans. Fundamentals E91-A(1), 127–138 (2008)CrossRefGoogle Scholar
  7. 7.
    Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: A fast (2, n)-threshold scheme and its application. In: Proc. CSS 2005, pp. 631–636 (2005)Google Scholar
  8. 8.
    Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proc. CSS 2005, pp. 637–642 (2005)Google Scholar
  9. 9.
    Bellare, M., Rogaway, P.: Optimal Asymmetric Encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  10. 10.
    Kuwakado, H., Tanaka, H.: Strongly non-separable encryption mode for throwing a media away. Technical Report of IEICE 103(417), 15–18 (2003)Google Scholar
  11. 11.
    Boyko, V.: On the Security Properties of OAEP as an All-or-Nothing Transform. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 503–518. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  12. 12.
    Stinson, D.R.: Something about all or nothing (transform). Designs, Codes and Cryptography 22, 133–138 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Yamamoto, H.: On secret sharing systems using (k, L, n) threshold scheme. IECE Transactions J68-A(9), 945–953 (1985)Google Scholar
  14. 14.
    Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. on Inform. Theory 29(1), 35–41 (1983)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. In: 11th Information Security Conference, ISC 2008 (2008)Google Scholar
  16. 16.
    Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  17. 17.
    Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  18. 18.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar
  19. 19.
    Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  20. 20.
    Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  21. 21.
    Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  22. 22.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  23. 23.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  24. 24.
    Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar
  25. 25.
    Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  26. 26.
    Park, N., Kim, H., Kim, S., Won, D.: Open Location-based Service using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  27. 27.
    Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: Wegrzyn-Wolska, K.M., Szczepaniak, P.S. (eds.) Advances in Intelligent Web Mastering. ASC, vol. 43, pp. 278–283. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  28. 28.
    Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation Leveraging Globally Networked RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  29. 29.
    Kim, Y.: Harmful-word Dictionary DB based Text Classification for Improving Performances of Precesion and Recall. Sungkyunkwan University, Ph.D. Thesis (2009)Google Scholar
  30. 30.
    Kim, Y., Park, N., Hong, D.: Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers, Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201–208. Springer, Heidelberg (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jun Wook Lee
    • 1
  • Namje Park
    • 2
  1. 1.Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  2. 2.Department of Computer Education, Teachers CollegeJeju National UniversityJeju-siKorea

Personalised recommendations