Blind processing: Securing data against system administrators

Mehmet Hadi Guneş, Cansin Y. Evrenosoǧlu

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations

    Abstract

    Multi-owner systems such as power grid need information from all parties to operate efficiently. However, in general, information sharing is limited by market and other constraints. In addition, the emerging problem of demand side management in distribution systems as a part of "smarter grid" efforts, secure communication and execution between the utilities and the customers is required to ensure the privacy. In this paper, we propose blind processing, a novel communication and execution approach for entities that compete with each other but need to cooperate for the overall good of the system. Our goal is to allow information exchange between system components with protection mechanisms against everyone including system administrators. Shielding information will prevent gaining access to the sensitive data while providing a complete picture of the whole system in computations. Such a security mechanism can be provided by employing the functionality of Trusted Computing, a security technology that utilizes hardware and software modules to improve the trustworthiness of a system.

    Original languageEnglish
    Title of host publication2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010
    Pages304-311
    Number of pages8
    DOIs
    StatePublished - 2010
    Event2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010 - Osaka, Japan
    Duration: 19 Apr 201023 Apr 2010

    Publication series

    Name2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010

    Conference

    Conference2010 IEEE/IFIP Network Operations and Management Symposium Workshops, NOMS 2010
    Country/TerritoryJapan
    CityOsaka
    Period19/04/1023/04/10

    Fingerprint

    Dive into the research topics of 'Blind processing: Securing data against system administrators'. Together they form a unique fingerprint.

    Cite this