Show simple item record

Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid

dc.contributor.authorUludag, Suleyman
dc.contributor.authorZeadally, Sherali
dc.contributor.authorBadra, Mohamad
dc.date.accessioned2015-05-18T07:06:57Z
dc.date.available2015-05-18T07:06:57Z
dc.date.issued2015-05-18
dc.identifier.isbn978-3-319-08469-5
dc.identifier.issn1617-7975
dc.identifier.urihttps://hdl.handle.net/2027.42/111644
dc.description.abstractAs the ease with which any data are collected and transmitted increases, more privacy concerns arise leading to an increasing need to protect and preserve it. Much of the recent high-profile coverage of data mishandling and public mis- leadings about various aspects of privacy exasperates the severity. The Smart Grid (SG) is no exception with its key characteristics aimed at supporting bi-directional information flow between the consumer of electricity and the utility provider. What makes the SG privacy even more challenging and intriguing is the fact that the very success of the initiative depends on the expanded data generation, sharing, and pro- cessing. In particular, the deployment of smart meters whereby energy consumption information can easily be collected leads to major public hesitations about the tech- nology. Thus, to successfully transition from the traditional Power Grid to the SG of the future, public concerns about their privacy must be explicitly addressed and fears must be allayed. Along these lines, this chapter introduces some of the privacy issues and problems in the domain of the SG, develops a unique taxonomy of some of the recently proposed privacy protecting solutions as well as some if the future privacy challenges that must be addressed in the future.en_US
dc.language.isoen_USen_US
dc.publisherSpringer International Publishingen_US
dc.subjectSmart Grid Privacyen_US
dc.titleTechniques, Taxonomy, and Challenges of Privacy Protection in the Smart Griden_US
dc.typeBook Chapteren_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumCSEP, UM-Flinten_US
dc.contributor.affiliationotherCollege of Communication and Information, University of Kentucky, Lexington, KY, USAen_US
dc.contributor.affiliationotherZayed University, Abu Dhabi 144534en_US
dc.contributor.affiliationumcampusFlinten_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/111644/1/Uludag2015SG-privacy_book-chapter.pdf
dc.identifier.sourcePrivacy in a Digital, Networked World Technologies, Implications and Solutionsen_US
dc.identifier.orcidorcid.org/0000-0002-7207-6683en_US
dc.identifier.name-orcidUludag, Suleyman; 0000-0002-7207-6683en_US
dc.owningcollnameInnovation and Technology, College of (UM-Flint)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.