{"id":"https://openalex.org/W2894011632","doi":"https://doi.org/10.1109/indin.2018.8471959","title":"An Algorithmic Method for Tampering-Proof and Privacy-Preserving Smart Metering","display_name":"An Algorithmic Method for Tampering-Proof and Privacy-Preserving Smart Metering","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2894011632","doi":"https://doi.org/10.1109/indin.2018.8471959","mag":"2894011632"},"language":"en","primary_location":{"id":"doi:10.1109/indin.2018.8471959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin.2018.8471959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100440920","display_name":"Dongsheng Li","orcid":"https://orcid.org/0000-0003-3103-8442"},"institutions":[{"id":"https://openalex.org/I4210126794","display_name":"IBM Research (China)","ror":"https://ror.org/02yg1pf55","country_code":"CN","type":"company","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126794"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongsheng Li","raw_affiliation_strings":["IBM Research - China, Shanghai, P. R. China"],"affiliations":[{"raw_affiliation_string":"IBM Research - China, Shanghai, P. R. China","institution_ids":["https://openalex.org/I4210126794"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076462524","display_name":"Yingying Zhao","orcid":"https://orcid.org/0000-0001-5902-1306"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingying Zhao","raw_affiliation_strings":["Tongji University, Shanghai, P. R. China"],"affiliations":[{"raw_affiliation_string":"Tongji University, Shanghai, P. R. China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100692586","display_name":"Yawen Zhang","orcid":"https://orcid.org/0000-0003-2935-6089"},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yawen Zhang","raw_affiliation_strings":["University of Colorado Boulder, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Boulder, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089831843","display_name":"Qin Lv","orcid":"https://orcid.org/0000-0002-9437-1376"},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qin Lv","raw_affiliation_strings":["University of Colorado Boulder, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Boulder, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004722925","display_name":"Li Shang","orcid":"https://orcid.org/0000-0003-3944-7531"},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Li Shang","raw_affiliation_strings":["University of Colorado Boulder, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado Boulder, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100440920"],"corresponding_institution_ids":["https://openalex.org/I4210126794"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1067303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":null,"first_page":"459","last_page":"465"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.804311215877533},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7853195071220398},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7619308829307556},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6467180252075195},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6214006543159485},{"id":"https://openalex.org/keywords/metering-mode","display_name":"Metering mode","score":0.6132462620735168},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5723637938499451},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.5044440031051636},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.49250563979148865},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49139276146888733},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.4549505412578583},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2893415093421936},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1361403465270996},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09964016079902649}],"concepts":[{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.804311215877533},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7853195071220398},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7619308829307556},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6467180252075195},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6214006543159485},{"id":"https://openalex.org/C30905978","wikidata":"https://www.wikidata.org/wiki/Q815598","display_name":"Metering mode","level":2,"score":0.6132462620735168},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5723637938499451},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.5044440031051636},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.49250563979148865},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49139276146888733},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.4549505412578583},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2893415093421936},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1361403465270996},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09964016079902649},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/indin.2018.8471959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin.2018.8471959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W17579607","https://openalex.org/W1507098372","https://openalex.org/W1892798954","https://openalex.org/W1973309971","https://openalex.org/W1975153313","https://openalex.org/W1976060656","https://openalex.org/W1980256734","https://openalex.org/W1988273886","https://openalex.org/W1993673439","https://openalex.org/W2002506366","https://openalex.org/W2010605996","https://openalex.org/W2022079499","https://openalex.org/W2038178117","https://openalex.org/W2072354098","https://openalex.org/W2080071438","https://openalex.org/W2096219879","https://openalex.org/W2109394932","https://openalex.org/W2122991029","https://openalex.org/W2128292595","https://openalex.org/W2132172731","https://openalex.org/W2135193968","https://openalex.org/W2147383536","https://openalex.org/W2159065056","https://openalex.org/W2164083904","https://openalex.org/W2164284862","https://openalex.org/W2165992167","https://openalex.org/W2168662357","https://openalex.org/W2278015510","https://openalex.org/W2725337021","https://openalex.org/W2730936454","https://openalex.org/W3145585884","https://openalex.org/W4300349690","https://openalex.org/W6695095516"],"related_works":["https://openalex.org/W4312869071","https://openalex.org/W2028978355","https://openalex.org/W1990698919","https://openalex.org/W2077996342","https://openalex.org/W2561882072","https://openalex.org/W2499925746","https://openalex.org/W2377996584","https://openalex.org/W4283216089","https://openalex.org/W1136749283","https://openalex.org/W4310881972"],"abstract_inverted_index":{"The":[0,69],"fast-growing":[1],"smart":[2,23,64,94,135],"meter":[3,24,95],"installation":[4],"enables":[5],"utility":[6,55,109],"providers":[7,110],"to":[8,80],"better":[9],"track":[10],"and":[11,41,62,84,105,141],"manage":[12],"the":[13,20,42,51,120,125],"electricity":[14,32],"use":[15],"of":[16,22,44,73,93],"end":[17,39],"customers.":[18],"However,":[19],"adoption":[21],"faces":[25],"several":[26],"challenges.":[27],"In":[28,57],"particular,":[29],"collecting":[30],"fine-grained":[31],"usage":[33],"data":[34,45,52,87,91,106,117],"raises":[35],"privacy":[36,83,101],"concerns":[37],"by":[38,47],"customers;":[40],"possibility":[43],"manipulation":[46,88],"malicious":[48,86],"customers":[49,104],"threatens":[50],"integrity":[53],"for":[54,103,108],"providers.":[56],"this":[58],"article,":[59],"a":[60,74,129],"tampering-proof":[61],"privacy-preserving":[63,134],"metering":[65,136],"method":[66,79],"is":[67],"proposed.":[68],"proposed":[70,121],"work":[71,122],"consists":[72],"new":[75],"secure":[76],"multi-party":[77],"computation":[78,126],"protect":[81],"customer":[82],"detect":[85],"during":[89],"real-time":[90],"aggregation":[92],"applications.":[96],"Theoretical":[97],"analysis":[98],"proves":[99],"that":[100,119],"preservation":[102],"tamper-proof":[107],"can":[111],"be":[112],"guaranteed.":[113],"Experiments":[114],"using":[115],"real-world":[116],"demonstrate":[118],"significantly":[123],"improves":[124],"efficiency":[127],"over":[128],"state-of-the-art":[130],"homomorphic":[131],"encryption":[132],"based":[133],"approach,":[137],"with":[138],"minimal":[139],"communication":[140],"storage":[142],"overhead.":[143]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
