Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3594441.3594483acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicieiConference Proceedingsconference-collections
research-article

Masking Sensitive Data in Self-Organized Smart Region Orchestration

Published: 21 August 2023 Publication History

Abstract

Decentralized coordination is widely seen as a promising approach for coping with ever-growing complexity in large-scale cyber-physical systems. Automated controllability in turn is necessary for installing sustainability in smart regions and cities. Ambient algorithmic support for decentralized process coordination will ease collaboration for a better utilization of available resources. Negotiation among software agents in such algorithms inevitably also demand an exchange of information; containing either plain information on local processes, resources or production states, or allow for deriving at least partial information. We analyze two use cases: virtual power plants for future smart grid coordination and automated network formation for smart regions. Based on the requirements of the algorithmic perspective as well as of the domain specific privacy needs, we derive recommendations for a possible solution that brings together these opposing perspectives.

References

[1]
Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2004, June). Order preserving encryption for numeric data. In Proceedings of the 2004 ACM SIGMOD international conference on Management of data (pp. 563-574).
[2]
Bebek, G. (2002). Anti-tamper database research: Inference control techniques. Technical Report EECS 433 Final Report, 433.
[3]
Becker, T., Boschert, S., Hempel, L., Höffken, S., & Obst, B. (2013, September). Complex urban simulations and sustainable urban planning with spatial and social implications. In Int Ann Photogrammetry, Remote Sensing Spat Inf Sci, ISPRS 8th 3DGeoInfo conference and WG II/2 workshop (Vol. 2, p. W1).
[4]
Bogetoft, P., Lund Christensen, D., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Dam Nielsen, J., Buus Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., & Toft, T. (2009). Secure Multiparty Computation Goes Live. In Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers (pp. 325–343). Springer-Verlag.
[5]
Boldyreva, A., Chenette, N., & O'Neill, A. (2011, August). Order-preserving encryption revisited: Improved security analysis and alternative solutions. In Annual Cryptology Conference (pp. 578-595). Springer, Berlin, Heidelberg.
[6]
Boyd, S.; Parikh, N.; Chu, E.; Peleato, B.; Eckstein, J. : Distributed optimization and statistical learning via the alternating direction method ofmultipliers. Foundations and Trends in Machine learning 3/1, S. 1–122, 2011.
[7]
Bremer, J., & Lehnhoff, S. (2019). Encrypted Decentralized Optimization for Data Masking in Energy Scheduling. In Proceedings of the 2019 3rd International Conference on Big Data Research (pp. 103–109). Association for Computing Machinery.
[8]
Bhuiyan, E. A., Hossain, M. Z., Muyeen, S. M., Fahim, S. R., Sarker, S. K., & Das, S. K. (2021). Towards next generation virtual power plant: Technology review and frameworks. Renewable and Sustainable Energy Reviews, 150, 111358.
[9]
Cassandras, C. (2016). Smart cities as cyber-physical social systems. Engineering, 2(2), 156–158.
[10]
Chaib-draa, B., & Müller, J. (2006). Multiagent based Supply Chain Management. Springer, Berlin, Heidelberg.
[11]
Chung, S. S. (2006). Anti-Tamper Databases: Querying Encrypted Databases (Doctoral dissertation, Case Western Reserve University).
[12]
Dabrock, K. (2018). Privacy in der automatisierten prädiktiven Einsatzplanung von Energieanlagen im Smart Grid . Master's thesis, University of Oldenburg, Oldenburg, Germany, 2018.
[13]
Dethlefs, T., Beewen, D., Preisler, T., & Renz, W. (2014). A consumer-orientated Architecture for distributed Demand-Side-Optimization. In EnviroInfo (pp. 349-356).
[14]
Finger, M., & Razaghi, M. (2016). Conceptualizing “Smart Cities”. Informatik-Spektrum, 40(1), 6-13.
[15]
Gentry, C. (2009). A fully homomorphic encryption scheme (Vol. 20, No. 9, pp. 1-209). Stanford: Stanford university.
[16]
Hinrichs, C., Lehnhoff, S., & Sonnenschein, M. (2014). A decentralized heuristic for multiple-choice combinatorial optimization problems. In Operations Research Proceedings 2012 (pp. 297-302). Springer, Cham.
[17]
Hinrichs, C., & Sonnenschein, M. (2016). Design, analysis and evaluation of control algorithms for applications in smart grids. In Advances and New Trends in Environmental and Energy Informatics (pp. 135-155). Springer, Cham.
[18]
Hwang, Y. H., Kim, S., & Seo, J. W. (2015, October). Fast order-preserving encryption from uniform distribution sampling. In Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop (pp. 41-52).
[19]
Kaiser, P., Langer, A., & Gaedke, M. (2019). MPCC: Generic Secure Multi-Party Computation in Centralized Cloud-based Environments. ICBDR 2019.
[20]
Karnouskos, S. (2011, December). Demand side management via prosumer interactions in a smart city energy marketplace. In 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (pp. 1-7). IEEE.
[21]
Kermarrec, A. M., & Van Steen, M. (2007). Gossiping in distributed systems. ACM SIGOPS operating systems review, 41(5), 2-7.
[22]
Kerschbaum, F., Schneider, T., & Schröpfer, A. (2014). Automatic Protocol Selection in Secure Two-Party Computations. In ACNS (pp. 566–584). Springer.
[23]
Khatoun, R., & Zeadally, S. (2016). Smart cities: concepts, architectures, research opportunities. Communications of the ACM, 59(8), 46-57.
[24]
Lacy, P. (2011, January 27). 4 Steps to Build Trust into Sustainability. https://www.greenbiz.com/article/4-steps-build-trust-sustainability
[25]
Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z. A., Shakir, N. S. A., & Deris, M. M. (2017). A survey on the cryptographic encryption algorithms. International Journal of Advanced Computer Science and Applications, 8(11), 333-344.
[26]
Nikonowicz, L. B., & Milewski, J. (2012). Virtual power plants-general review: structure, application and optimization. Journal of power technologies, 92(3), 135.
[27]
Opadiji, T. (2007). Distributed Production Scheduling Using Federated Agent Architecture. In Holonic and Multi-Agent Systems for Manufacturing (pp. 195-204). Springer Berlin Heidelberg.
[28]
Othman, M. M., Hegazy, Y. G., & Abdelaziz, A. Y. (2015). A Review of virtual power plant definitions, components, framework and optimization. International Electrical Engineering Journal, 6(9), 2010-2024.
[29]
Pereira, H. V. L. (2020). Bootstrapping fully homomorphic encryption over the integers in less than one second. IACR Cryptology ePrint Archive, 995.
[30]
Popa, R. A., Li, F. H., & Zeldovich, N. (2013, May). An ideal-security protocol for order-preserving encoding. In 2013 IEEE Symposium on Security and Privacy (pp. 463-477). IEEE.
[31]
Ramchurn, S., Huynh, D., & Jennings, N. (2004). Trust in multi-agent systems. The knowledge engineering review, 19(1), 1–25.
[32]
Ramchurn, S., Vytelingum, P., Rogers, A., & Jennings, N. (2012). Putting the 'Smarts' into the Smart Grid: A Grand Challenge for Artificial Intelligence. Commun. ACM, 55(4), 86-97.
[33]
Rapp, B., Bremer, J., Sonnenschein, M., & Marx Gómez, J. (2010). Ontologiebasierte Kaskadennutzung von Rohstoffen. HMD Praxis der Wirtschaftsinformatik, 47(4), 47-55.
[34]
Rapp, B., Freese, L., & Cremers, L. (2021). Natural Computing zur Identifikation von Verwertungspfaden biogener Rohstoffe. INFORMATIK 2021 - 51. Jahrestagung der GI, Gesellschaft für Informatik e.V. (to be published)
[35]
Saidani, M., Pan, E., Kim, H., Greenlee, A., Wattonville, J., Yannou, B., Leroy, Y., & Cluzel, F. (2020). Assessing the environmental and economic sustainability of autonomous systems: A case study in the agricultural industry. Procedia CIRP, 90, 209-214.
[36]
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. International Journal of Computer Applications, 67(19).
[37]
Tate, A., Dalton, J., Siebra, C., Aitken, S., Bradshaw, J., & Uszok, A. (2004). Intelligent agents for coalition search and rescue task support.
[38]
Tex, C., Schäler, M., & Böhm, K. (2018, July). Towards meaningful distance-preserving encryption. In Proceedings of the 30th International Conference on Scientific and Statistical Database Management (pp. 1-12).
[39]
Thiem, S., Danov, V., Metzger, M., Schäfer, J., & Hamacher, T. (2017). Project-level multi-modal energy system design-Novel approach for considering detailed component models and example case study for airports. Energy, 133, 691-709.
[40]
Tönshoff, H., Herzog, O., Timm, I., & Woelk, P. (2002). Integrated process planning and production control based on the application of intelligent agents. Proc. 3rd CIRP ICME, 135-140.
[41]
Wang, X.; Ishii, H.; Du, L.; Cheng, P.; Chen, J.: Privacy-preserving distributed machine learning via local randomization and ADMM perturbation. IEEE Transactions on Signal Processing 68/, S. 4226–4241, 2020.
[42]
Wehkamp, S., Schmeling, L., Vorspel, L., Roelcke, F., & Windmeier, K. L. (2020). District energy systems: Challenges and new tools for planning and evaluation. Energies, 13(11), 2967.
[43]
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22-32.
[44]
Zhang, C.; Ahmad, M.; Wang, Y.: ADMM Based Privacy-Preserving Decentralized Optimization. IEEE Transactions on Information Forensics and Security 14/3, S. 565–580, 2019.

Index Terms

  1. Masking Sensitive Data in Self-Organized Smart Region Orchestration

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIEI '23: Proceedings of the 2023 8th International Conference on Information and Education Innovations
    April 2023
    243 pages
    ISBN:9798400700613
    DOI:10.1145/3594441
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 August 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Decentralized algorithms
    2. Encrypted optimization
    3. Homomorphic encryption
    4. Order preserving encryption
    5. Self-Organization

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICIEI 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 20
      Total Downloads
    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media