A Trusted and Privacy-Preserving Internet of Mobile Energy
نویسندگان
چکیده
The rapid growth in distributed energy sources on power grids leads to increasingly decentralized management systems for the prediction of supply and demand dynamic setting an price signal. Within this emerging smart grid paradigm, electric vehicles can serve as consumers, transporters, providers through two-way charging stations, which highlights a critical feedback loop between movement patterns these state grid. This article proposes vision Internet Mobile Energy (IoME), where information flow seamlessly across transport sectors enhance stability end-user welfare. We identify key challenges trust, scalability, privacy, particularly location linking privacy EV owners, realizing IoME vision. propose architecture that uses scalable blockchain provide data integrity authenticity, introduces one-time keys public transactions verifiable anonymous trip extraction method users share their while protecting privacy. present example scenario details seamless closed sectors, along with design transaction vocabulary trusted decentralised transactions. finally discuss open presented by unlock significant benefits stability, innovation,
منابع مشابه
Privacy-preserving identities for a safer, more trusted internet
The problem Business and government services are increasingly being migrated online to improve convenience and reduce the cost of conducting these services in person. Migrating high-value transactions online require, however, high-level of identity assurance. The challenge is to create a system offering the richness of real-world credentials we carry in our pockets, while preserving the same le...
متن کاملPrivacy Preserving Energy Management
The improvement of energy efficiency is an important target on all levels of society. It is best achieved on the basis of locally and temporally fine-grained measurement data for identifying unnecessary use of energy. However, at the same time such fine-grained measurements allow deriving information about the persons using the energy. In this paper we describe our work towards a privacy preser...
متن کاملPrivacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do not address user privacy at all, while anonymous credentials that protect user privacy are complex and have compatibility problems with existing PKIs. In this paper we propose privacy-preserving credentials, a concept bet...
متن کاملPrivacy Preserving Record Matching Using Automated Semi-trusted Broker
In this paper, we present a novel scheme that allows multiple data publishers that continuously generate new data and periodically update existing data, to share sensitive individual records with multiple data subscribers while protecting the privacy of their clients. An example of such sharing is that of health care providers sharing patients’ records with clinical researchers. Traditionally, ...
متن کاملPrivacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, because data movement observed during computation could leak information. Designing algorithms that thwart such leakage is challenging. Many known...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Magazine
سال: 2021
ISSN: ['0163-6804', '1558-1896']
DOI: https://doi.org/10.1109/mcom.001.2000754