{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T04:33:55Z","timestamp":1720154035847},"reference-count":40,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,9,24]],"date-time":"2013-09-24T00:00:00Z","timestamp":1379980800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans. Emerging Tel. Tech."],"published-print":{"date-parts":[[2014,1]]},"abstract":"ABSTRACT<\/jats:title>A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, water or gas. While one cannot object to the appealing advantages of smart metering, the privacy risks posed by the submission of frequent, data\u2010rich measurements cannot simply remain overlooked. The objective of this paper is to provide a general perspective on the contrasting issues of privacy and efficient utility management, by surveying the main requirements and tools, and by establishing exploitable connections. Copyright \u00a9 2013 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/ett.2708","type":"journal-article","created":{"date-parts":[[2013,10,12]],"date-time":"2013-10-12T01:00:05Z","timestamp":1381539605000},"page":"94-108","source":"Crossref","is-referenced-by-count":18,"title":["Reconciling privacy and efficient utility management in smart cities"],"prefix":"10.1002","volume":"25","author":[{"given":"David","family":"Rebollo\u2010Monedero","sequence":"first","affiliation":[{"name":"Department of Telematics Engineering Universitat Polit\u00e8cnica de Catalunya (UPC) C. Jordi Girona\u20091\u20103, E\u201008034 Barcelona Spain"}]},{"given":"Andrea","family":"Bartoli","sequence":"additional","affiliation":[{"name":"Centre Tecnol\u00f2gic de Telecomunicacions de Catalunya (CTTC) Av.\u2009Carl Friedrich Gauss\u20097, E\u201008860 Castelldefels Barcelona Spain"}]},{"given":"Juan","family":"Hern\u00e1ndez\u2010Serrano","sequence":"additional","affiliation":[{"name":"Department of Telematics Engineering Universitat Polit\u00e8cnica de Catalunya (UPC) C. Jordi Girona\u20091\u20103, E\u201008034 Barcelona Spain"}]},{"given":"Jordi","family":"Forn\u00e9","sequence":"additional","affiliation":[{"name":"Department of Telematics Engineering Universitat Polit\u00e8cnica de Catalunya (UPC) C. Jordi Girona\u20091\u20103, E\u201008034 Barcelona Spain"}]},{"given":"Miguel","family":"Soriano","sequence":"additional","affiliation":[{"name":"Department of Telematics Engineering Universitat Polit\u00e8cnica de Catalunya (UPC) C. Jordi Girona\u20091\u20103, E\u201008034 Barcelona Spain"},{"name":"Centre Tecnol\u00f2gic de Telecomunicacions de Catalunya (CTTC) Av.\u2009Carl Friedrich Gauss\u20097, E\u201008860 Castelldefels Barcelona Spain"}]}],"member":"311","published-online":{"date-parts":[[2013,9,24]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"crossref","unstructured":"KarnouskosS SilvaPGD IlicD.Energy services for the smart grid city InProceedings IEEE International Conference on Digital Ecosystem Technologies\u2010Complex Environment Engineering (DEST\u2010CEE) Campione d'Italia Italy June2012;1\u20136.","DOI":"10.1109\/DEST.2012.6227925"},{"key":"e_1_2_7_3_1","unstructured":"Smart Grid Interoperability Panel Cyber Security Working Group Guidelines for smart grid cyber security: Vol. 1 smart grid cyber security strategy architecture and high\u2010level requirements and Vol. 2 privacy and the smart grid National Institute of Standards and Technology (NIST).Interagency Rep. 7628 August2010. Available from:http:\/\/csrc.nist.gov\/publications\/nistir\/ir7628\/nistir\u20107628_vol1.pdf[4 September 2013]."},{"key":"e_1_2_7_4_1","unstructured":"QuinnEL.Privacy and the new energy infrastructure.Center for Energy and Environmental Security (CEES) working paper no. 09 \u2010 001 2008 1\u201347. Available from:http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1370731.[4 September 2013]."},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0046-y"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7788(02)00241-4"},{"key":"e_1_2_7_8_1","volume-title":"Understanding PKI: Concepts, Standards, and Deployment Considerations","author":"Adams C","year":"2002"},{"key":"e_1_2_7_9_1","volume-title":"Cryptography and Network Security: Principles and Practices","author":"Stallings W","year":"2005"},{"key":"e_1_2_7_10_1","unstructured":"DanezisG.2007.Introduction to privacy technology Katholieke Universiteit Leuven Computer Security and Industrial Cryptography (COSIC) Res. Talk. Available from:http:\/\/research.microsoft.com\/en\u2010us\/um\/people\/gdane\/talks\/Privacy_Technology_cosic.pdf[4 September 2013]."},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"ChengH DingQ.Overview of the block cipher InProceedings International Conference on Instrumentation Measurement Computer Communication and Control (IMCCC) Hangzhou China October2012;1628\u20131631.","DOI":"10.1109\/IMCCC.2012.379"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"Qing\u2010haiB Wen\u2010boZ PengJ XuL.Research on design principles of elliptic curve public key cryptography and its implementation InProceedings IEEE International Conference on Computer Science and Service System (CSSS) Nanjing China August2012;1224\u20131227.","DOI":"10.1109\/CSSS.2012.310"},{"key":"e_1_2_7_13_1","unstructured":"CostaR PirmezL BoccardoD RustLF MachadoR.TinyObf: code obfuscation framework for wireless sensor networks InProceedings International Conference on Wireless Networks (ICWN) Las Vegas NV July2012;68\u201374."},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257524"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2216237"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"RadmandP DomingoM SinghJ ArnedoJ TalevskiA PetersenS CarlsenS.Zigbee\/Zigbee PRO security assessment based on compromised cryptographic keys InProceedings International Conference on P2P Parallel Grid Cloud and Internet Computing (3PGCIC) Fukuoka Japan November2010;465\u2013470.","DOI":"10.1109\/3PGCIC.2010.79"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","unstructured":"SerjantovA DingledineR SyversonP.From a trickle to a flood: Active attacks on several mix types InProceedings Information Hiding Workshop (IH) Springer\u2010Verlag Berlin Heidelberg 2002;36\u201352.","DOI":"10.1007\/3-540-36415-3_3"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"DingledineR MathewsonN SyversonP.Tor: the second\u2010generation onion router InProceedings Conference USENIX Security Symposium Berkeley CA 2004;21\u201321.","DOI":"10.21236\/ADA465464"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_7_20_1"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239"},{"key":"e_1_2_7_22_1","unstructured":"SweeneyL.Uniqueness of simple demographics in the U.S. population.Tech. Rep. LIDAP\u2010WP4 Carnegie Mellon Univ. Sch. Comput. Sci. Data Priv. Lab. Pittsburgh PA 2000."},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0007-5"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0007-0"},{"key":"e_1_2_7_27_1"},{"key":"e_1_2_7_28_1"},{"key":"e_1_2_7_29_1","unstructured":"DengM.Privacy preserving content protection Ph.D. dissertation Katholieke Univ. Leuven Dept. Elect. Eng. (ESAT) 2010."},{"key":"e_1_2_7_30_1"},{"issue":"2","key":"e_1_2_7_31_1","first-page":"61","article-title":"A privacy\u2010protecting architecture for recommendation systems via the suppression of ratings","volume":"6","author":"Parra\u2010Arnau J","year":"2012","journal-title":"Journal: International Journal of Security and Its Applications (IJSIA), Science & Engineering Research Support Society (SERSS)"},{"key":"e_1_2_7_32_1"},{"key":"e_1_2_7_33_1","volume-title":"Foundations of Secure Computation","author":"DeMillo RA","year":"1978"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0181-6"},{"key":"e_1_2_7_35_1","doi-asserted-by":"crossref","unstructured":"GarciaFD JacobsB.Privacy\u2010friendly energy\u2010metering via homomorphic encryption InProc. Int. Workshop Secur. Trust Mgmt. (STM) Athens Greece 2010;226\u2013238.","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"e_1_2_7_36_1","doi-asserted-by":"crossref","unstructured":"BartoliA Hern\u00e1ndez\u2010SerranoJ SorianoM DohlerM KountourisA BarthelD.Secure lossless aggregation for smart grid M2M networks InProc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm) Gaithersburg MD 2010;333\u2013338.","DOI":"10.1109\/SMARTGRID.2010.5622063"},{"key":"e_1_2_7_37_1"},{"key":"e_1_2_7_38_1","volume-title":"Elements of Information Theory","author":"Cover TM","year":"2006"},{"key":"e_1_2_7_39_1","first-page":"41","volume-title":"Proc. Workshop Priv. Enhanc. Technol. (PET)","author":"Serjantov A","year":"2002"},{"key":"e_1_2_7_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.190"},{"key":"e_1_2_7_41_1"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.2708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.2708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T05:22:23Z","timestamp":1694496143000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.2708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,24]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1002\/ett.2708"],"URL":"https:\/\/doi.org\/10.1002\/ett.2708","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,24]]}}}