TY - GEN
T1 - Blind processing
T2 - 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010
AU - Guneş, Mehmet Hadi
AU - Evrenosoǧlu, Cansin Y.
PY - 2010
Y1 - 2010
N2 - Multi-owner systems such as power grid need information from all parties to operate efficiently. However, in general, information sharing is limited by market and other constraints. In addition, the emerging problem of demand side management in distribution systems as a part of "smarter grid" efforts, secure communication and execution between the utilities and the customers is required to ensure the privacy. In this paper, we propose blind processing, a novel communication and execution approach for entities that compete with each other but need to cooperate for the overall good of the system. Our goal is to allow information exchange between system components with protection mechanisms against everyone including system administrators. Shielding information will prevent gaining access to the sensitive data while providing a complete picture of the whole system in computations. Such a security mechanism can be provided by employing the functionality of Trusted Computing, a security technology that utilizes hardware and software modules to improve the trustworthiness of a system.
AB - Multi-owner systems such as power grid need information from all parties to operate efficiently. However, in general, information sharing is limited by market and other constraints. In addition, the emerging problem of demand side management in distribution systems as a part of "smarter grid" efforts, secure communication and execution between the utilities and the customers is required to ensure the privacy. In this paper, we propose blind processing, a novel communication and execution approach for entities that compete with each other but need to cooperate for the overall good of the system. Our goal is to allow information exchange between system components with protection mechanisms against everyone including system administrators. Shielding information will prevent gaining access to the sensitive data while providing a complete picture of the whole system in computations. Such a security mechanism can be provided by employing the functionality of Trusted Computing, a security technology that utilizes hardware and software modules to improve the trustworthiness of a system.
UR - http://www.scopus.com/inward/record.url?scp=77957888726&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77957888726&partnerID=8YFLogxK
U2 - 10.1109/NOMSW.2010.5486559
DO - 10.1109/NOMSW.2010.5486559
M3 - Conference contribution
AN - SCOPUS:77957888726
SN - 9781424460380
T3 - 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010
SP - 304
EP - 311
BT - 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010
Y2 - 19 April 2010 through 23 April 2010
ER -