[HTML][HTML] Data sharing in energy systems

J Wang, F Gao, Y Zhou, Q Guo, CW Tan, J Song… - Advances in Applied …, 2023 - Elsevier
Big data has been advocated as a dominant driving force to unleash the great waves of the
next-generation industrial revolution. While the ever-increasing proliferation of …

[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …

Privacy provision in collaborative ehealth with attribute-based encryption: Survey, challenges and future directions

K Edemacu, HK Park, B Jang, JW Kim - IEEE Access, 2019 - ieeexplore.ieee.org
Collaborative eHealth that enables the collection and sharing of patients' data is eliminating
the location and accessibility barriers in healthcare service delivery. With advances in …

Privacy-preserving multi-authority attribute-based data sharing framework for smart grid

L Zhang, J Ren, Y Mu, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In smart power grid systems, real-time electricity data sharing can bring many benefits.
However the security and privacy challenges have been a concern. This is because shared …

Secure decentralized access control policy for data sharing in smart grid

Y Ye, L Zhang, W You, Y Mu - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Smart grid has improved the security, efficiency of the power system and balanced the
supply and demand by intelligent management, which enhanced stability and reliability of …

Cross-domain attribute-based access control encryption

M Sedaghat, B Preneel - … Conference on Cryptology and Network Security, 2021 - Springer
Logic access control enforces who can read and write data; the enforcement is typically
performed by a fully trusted entity. At TCC 2016, Damgård et al. proposed Access Control …

Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications

MH Ameri, M Delavar, J Mohajeri - International Journal of …, 2019 - Wiley Online Library
Many smart grid applications need broadcast communications. Because of the critical role of
the broadcasted messages in these applications, their authentication is very important to …

An efficient and secure attribute-based signcryption scheme for smart grid applications

SM Sedaghat, MH Ameri, M Delavar… - Cryptology ePrint …, 2018 - eprint.iacr.org
With regards to the development of modern power systems, Smart Grid (SG) as an intelligent
generation of electricity networks has been faced with a tremendous attention. Fine-grained …

On the security of O-PSI a delegated private set intersection on outsourced datasets

MM Oliaee, M Delavar, MH Ameri… - … ISC (Iranian Society …, 2017 - ieeexplore.ieee.org
In recent years, determining the common information privately and efficiently between two
mutually mistrusting parties have become an important issue in social networks. Many …

Smart grid data security using practical CP-ABE with obfuscated policy and outsourcing decryption

A Pradhan, K Sethi, P Bera - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Smart grid consists of multiple different entities related to various energy management
systems which share fine-grained energy measurements among themselves in an optimal …