Page 368 - From Smart Grid to Internet of Energy
P. 368
332 From smart grid to internet of energy
and compression processes hide the attribution identities while decomposition
and permutation methods change sensitive identifiers by grouping and decou-
pling information between operators and sensitive properties. Four privacy
preserving methods that are expressed above are k-anonymity, l-diversity,
t-closeness, and differential privacy processes. It is noted that the key methods
and basic means on anonymity protection are still in their development stage for
structured data stacks in big data [5]. The access control is proposed as an effi-
cient process for data sharing applications. The difficulties are related to predic-
tion of authorization of each user in big data, variety of access requests, and
providing privilege in massive databases. The complexity and diversity of
big data prevents efficient calculation for privacy preserving algorithms. Thus,
encryption and decryption methods are proposed as alternative control opera-
tions in big data. The privacy preserving methods can be achieved by ensuring
communication security and using encryption algorithms in complex big data
contents. Therefore, the encryption based methods are mostly used in distrib-
uted application as data mining, distributed queries and distributed data deploy-
ment applications [5].
References
[1] X. He, Q. Ai, R.C. Qiu, W. Huang, L. Piao, H. Liu, A big data architecture design for smart
grids based on random matrix theory. IEEE Trans. Smart Grid (2015) 1, https://doi.org/
10.1109/TSG.2015.2445828.
[2] C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big data and cloud computing: innovation opportu-
nities and challenges. Int. J. Digital Earth 10 (2017) 13–53, https://doi.org/10.1080/
17538947.2016.1239771.
[3] K. Zhou, C. Fu, S. Yang, Big data driven smart energy management: from big data to big
insights. Renew. Sust. Energ. Rev. 56 (2016) 215–225, https://doi.org/10.1016/j.
rser.2015.11.050.
[4] Z. Asad, M.A. Rehman Chaudhry, A two-way street: green big data processing for a greener
smart grid. IEEE Syst. J. 11 (2017) 784–795, https://doi.org/10.1109/JSYST.2015.2498639.
[5] W. Fang, X.Z. Wen, Y. Zheng, M. Zhou, A survey of big data security and privacy preserving.
IETE Tech. Rev. 34 (2017) 544–560, https://doi.org/10.1080/02564602.2016.1215269.
[6] R.C. Qiu, P. Antonik, Smart Grid Using Big Data Analytics, John Wiley & Sons, Inc,
Chichester, West Sussex, 2017.
[7] A. Oussous, F.-Z. Benjelloun, A. Ait Lahcen, S. Belfkih, Big data technologies: a survey. J.
King Saud. Univ. Comput. Inf. Sci. 30 (2018) 431–448, https://doi.org/10.1016/j.
jksuci.2017.06.001.
[8] M. Chen, S. Mao, Y. Zhang, V.C.M. Leung, Big data generation and acquisition. in: Big Data,
Springer International Publishing, Cham, 2014, pp. 19–32, https://doi.org/10.1007/978-3-319-
06245-7_3.
[9] I. Yaqoob, I.A.T. Hashem, A. Gani, S. Mokhtar, E. Ahmed, N.B. Anuar, A.V. Vasilakos, Big
data: from beginning to future. Int. J. Inf. Manag. 36 (2016) 1231–1247, https://doi.org/
10.1016/j.ijinfomgt.2016.07.009.