{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:42:37Z","timestamp":1757544157813,"version":"3.41.0"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319676357"},{"type":"electronic","value":"9783319676364"}],"license":[{"start":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T00:00:00Z","timestamp":1509062400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67636-4_24","type":"book-chapter","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T14:13:20Z","timestamp":1509027200000},"page":"228-242","source":"Crossref","is-referenced-by-count":9,"title":["Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems"],"prefix":"10.1007","author":[{"given":"Eirini","family":"Anthi","sequence":"first","affiliation":[]},{"given":"Amir","family":"Javed","sequence":"additional","affiliation":[]},{"given":"Omer","family":"Rana","sequence":"additional","affiliation":[]},{"given":"George","family":"Theodorakopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,27]]},"reference":[{"issue":"7","key":"24_CR1","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That \u2018internet of things\u2019 thing. RFiD J. 22(7), 97\u2013114 (2009)","journal-title":"RFiD J."},{"key":"24_CR2","unstructured":"Barcena, M.B., Wueest, C.: Insecurity in the internet of things. In: Security Response, Symantec (2015)"},{"issue":"5","key":"24_CR3","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1109\/TPDS.2014.2321378","volume":"26","author":"S Bera","year":"2015","unstructured":"Bera, S., Misra, S., Rodrigues, J.J.: Cloud computing applications for smart grid: a survey. IEEE Trans. Parallel Distrib. Syst. 26(5), 1477\u20131494 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Bhattasali, T., Chaki, R., Sanyal, S.: Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231 (2012)","DOI":"10.5120\/5056-7374"},{"issue":"1","key":"24_CR5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2015.4","volume":"19","author":"J Diaz-Montes","year":"2015","unstructured":"Diaz-Montes, J., AbdelBaky, M., Zou, M., Parashar, M.: CometCloud: enabling software-defined federations for end-to-end application workflows. IEEE Internet Comput. 19(1), 69\u201373 (2015)","journal-title":"IEEE Internet Comput."},{"key":"24_CR6","unstructured":"Diaz-Montes, J., Xie, Y., Rodero, I., Zola, J., Ganapathysubramanian, B., Parashar, M.: Exploring the use of elastic resource federations for enabling large-scale scientific workflows. In: Proceedings of Workshop on Many-Task Computing on Clouds, Grids, and Supercomputers (MTAGS), pp. 1\u201310 (2013)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Dierks, T.: The transport layer security (TLS) protocol version 1.2 (2008)","DOI":"10.17487\/rfc5246"},{"key":"24_CR8","unstructured":"Dlamini, M., Eloff, M., Eloff, J.: Internet of things: emerging and future scenarios from an information security perspective. In: Southern Africa Telecommunication Networks and Applications Conference (2009)"},{"key":"24_CR9","unstructured":"Falk, R., Fries, S.: Managed certificate whitelisting-a basis for internet of things security in industrial automation applications. In: SECURWARE 2014, p. 178 (2014)"},{"issue":"7","key":"24_CR10","first-page":"1","volume":"111","author":"M Farooq","year":"2015","unstructured":"Farooq, M., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of internet of things (IoT). Int. J. Comput. Appl. 111(7), 1\u20136 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Fossati, T., Tschofenig, H.: Transport layer security (TLS)\/datagram transport layer security (DTLS) profiles for the internet of things. Transport (2016)","DOI":"10.17487\/RFC7925"},{"key":"24_CR12","unstructured":"Frier, A., Karlton, P., Kocher, P.: The ssl 3.0 protocol, vol. 18, p.2780. Netscape Communications Corporation (1996)"},{"key":"24_CR13","unstructured":"Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., Hummen, R.: Security considerations in the IP-based internet of things (2013)"},{"issue":"3","key":"24_CR14","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based internet of things. Wirel. Personal Commun. 61(3), 527\u2013542 (2011)","journal-title":"Wirel. Personal Commun."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: 21st IEEE International Conference on Network Protocols (ICNP), pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"24_CR16","unstructured":"Jha, A., Sunil, M.: Security considerations for internet of things. L&T Technology Services (2014)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Ji, L., Lifang, W., Li, Y.: Cloud service based intelligent power monitoring and early-warning system. In: Innovative Smart Grid Technologies-Asia (ISGT Asia), pp. 1\u20134. IEEE (2012)","DOI":"10.1109\/ISGT-Asia.2012.6303140"},{"issue":"8","key":"24_CR18","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481\u20132501 (2014)","journal-title":"Wirel. Netw."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6LoWPAN based internet of things. In: IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600\u2013607. IEEE (2013)","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Kim, H., Kim, Y.-J., Yang, K., Thottan, M.: Cloud-based demand response for smart grid: architecture and distributed algorithms. In: IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 398\u2013403. IEEE (2011)","DOI":"10.1109\/SmartGridComm.2011.6102355"},{"key":"24_CR21","unstructured":"Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. Ph.D. thesis, Virginia Polytechnic Institute and State University (2004)"},{"key":"24_CR22","first-page":"477","volume":"2","author":"J Laustsen","year":"2008","unstructured":"Laustsen, J.: Energy efficiency requirements in building codes, energy efficiency policies for new buildings. Int. Energy Agency (IEA) 2, 477\u2013488 (2008)","journal-title":"Int. Energy Agency (IEA)"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Li, X., Lo, J.-C.: Pricing and peak aware scheduling algorithm for cloud computing. In: Innovative Smart Grid Technologies (ISGT), IEEE PES, pp. 1\u20137. IEEE (2012)","DOI":"10.1109\/ISGT.2012.6175636"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Li, X., Lu, R., Liang, X., Shen, X.: Side channel monitoring: packet drop attack detection in wireless ad hoc networks. In: IEEE International Conference on Communications (ICC), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/icc.2011.5963331"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Li, X., Lu, R., Liang, X., Shen, X., Chen, J., Lin, X.: Smart community: an internet of things application. IEEE Commun. Mag. 49(11) (2011)","DOI":"10.1109\/MCOM.2011.6069711"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Li, Z., Parashar, M.: A computational infrastructure for grid-based asynchronous parallel applications. In: Proceedings of the 16th International Symposium on High Performance Distributed Computing, pp. 229\u2013230. ACM (2007)","DOI":"10.1145\/1272366.1272404"},{"issue":"4","key":"24_CR27","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","volume":"27","author":"X Lin","year":"2009","unstructured":"Lin, X., Lu, R., Shen, X., Nemoto, Y., Kato, N.: SAGE: a strong privacy-preserving scheme against global eavesdropping for eHealth systems. IEEE J. Sel. Areas Commun. 27(4), 365\u2013378 (2009)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Maheshwari, K., Lim, M., Wang, L., Birman, K., van Renesse, R.: Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud. In: Innovative Smart Grid Technologies (ISGT), IEEE PES, pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ISGT.2013.6497831"},{"key":"24_CR29","first-page":"1","volume":"17","author":"CP Mayer","year":"2009","unstructured":"Mayer, C.P.: Security and privacy challenges in the internet of things. Electron. Commun. EASST 17, 1\u201312 (2009)","journal-title":"Electron. Commun. EASST"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Montes, J.D., Zou, M., Singh, R., Tao, S., Parashar, M.: Data-driven workflows in multi-cloud marketplaces. In: IEEE 7th International Conference on Cloud Computing, pp. 168\u2013175. IEEE (2014)","DOI":"10.1109\/CLOUD.2014.32"},{"key":"24_CR31","unstructured":"Moonsamy, V., Batten, L.: Mitigating man-in-the-middle attacks on smartphones-a discussion of SSL pinning and DNSSec. In: Proceedings of the 12th Australian Information Security Management Conference, pp. 5\u201313. Edith Cowan University (2014)"},{"key":"24_CR32","unstructured":"University of Waikato: Weka 3 - data mining with open source machine learning software in Java (2017). http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/ . Accessed 13 Jan 2017"},{"key":"24_CR33","unstructured":"OWASP: Man-in-the-middle attack (2016). https:\/\/www.owasp.org\/index.php\/Man-in-the-middle_attack\/ . Accessed 18 Apr 2016"},{"issue":"3","key":"24_CR34","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.enbuild.2007.03.007","volume":"40","author":"L P\u00e9rez-Lombard","year":"2008","unstructured":"P\u00e9rez-Lombard, L., Ortiz, J., Pout, C.: A review on buildings energy consumption information. Energy Build. 40(3), 394\u2013398 (2008)","journal-title":"Energy Build."},{"issue":"6","key":"24_CR35","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53\u201357 (2004)","journal-title":"Commun. ACM"},{"issue":"3","key":"24_CR36","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1080\/15501320600642718","volume":"2","author":"M Pirretti","year":"2006","unstructured":"Pirretti, M., Zhu, S., Vijaykrishnan, N., McDaniel, P., Kandemir, M., Brooks, R.: The sleep deprivation attack in sensor networks: analysis and methods of defense. Int. J. Distrib. Sens. Netw. 2(3), 267\u2013287 (2006)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Poslad, S., Hamdi, M., Abie, H.: Adaptive security and privacy management for the internet of things (ASPI 2013). In: Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, pp. 373\u2013378. ACM (2013)","DOI":"10.1145\/2494091.2499770"},{"key":"24_CR38","unstructured":"United Nations Environment Programme: Why buildings (2016). http:\/\/www.unep.org\/sbci\/AboutSBCI\/Background.asp . Accessed 11 Jan 2017"},{"key":"24_CR39","doi-asserted-by":"crossref","unstructured":"Rajeev, T., Ashok, S.: A cloud computing approach for power management of microgrids. In: Innovative Smart Grid Technologies-India (ISGT India), IEEE PES, pp. 49\u201352. IEEE (2011)","DOI":"10.1109\/ISET-India.2011.6145354"},{"issue":"1","key":"24_CR40","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","volume":"7","author":"DR Raymond","year":"2008","unstructured":"Raymond, D.R., Midkiff, S.F.: Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput. 7(1), 74\u201381 (2008)","journal-title":"IEEE Pervasive Comput."},{"issue":"8","key":"24_CR41","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"24_CR42","unstructured":"Saxena, M.: Security in wireless sensor networks-a layer based classification. Department of Computer Science, Purdue University (2007)"},{"issue":"4","key":"24_CR43","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MCSE.2013.39","volume":"15","author":"Y Simmhan","year":"2013","unstructured":"Simmhan, Y., Aman, S., Kumbhare, A., Liu, R., Stevens, S., Zhou, Q., Prasanna, V.: Cloud-based software platform for big data analytics in smart grids. Comput. Sci. Eng. 15(4), 38\u201347 (2013)","journal-title":"Comput. Sci. Eng."},{"key":"24_CR44","doi-asserted-by":"crossref","unstructured":"Simmhan, Y., Kumbhare, A.G., Cao, B., Prasanna, V.: An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE International Conference on Cloud Computing (CLOUD), pp. 582\u2013589. IEEE (2011)","DOI":"10.1109\/CLOUD.2011.107"},{"key":"24_CR45","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. Computer 35(4), supl22\u2013supl26 (2002)","DOI":"10.1109\/MC.2002.1012427"},{"key":"24_CR46","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"24_CR47","doi-asserted-by":"crossref","unstructured":"Tang, L., Li, J., Wu, R.: Synergistic model of power system cloud computing based on mobile-agent. In: 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), pp. 222\u2013226. IEEE (2012)","DOI":"10.1109\/ICNIDC.2012.6418748"},{"key":"24_CR48","doi-asserted-by":"crossref","unstructured":"Ugale, B.A., Soni, P., Pema, T., Patil, A.: Role of cloud computing for smart grid of India and its cyber security. In: Nirma University International Conference on Engineering (NUiCONE), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/NUiConE.2011.6153298"},{"key":"24_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks (2006)","DOI":"10.1109\/COMST.2006.315852"},{"key":"24_CR50","doi-asserted-by":"crossref","unstructured":"Wang, Y., Deng, S., Lin, W.-M., Zhang, T., Yu, Y.: Research of electric power information security protection on cloud security. In: International Conference on Power System Technology (POWERCON), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/POWERCON.2010.5666728"},{"issue":"1","key":"24_CR51","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TETC.2013.2273889","volume":"1","author":"M Wen","year":"2013","unstructured":"Wen, M., Lu, R., Zhang, K., Lei, J., Liang, X., Shen, X.: PaRQ: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans. Emerg. Top. Comput. 1(1), 178\u2013191 (2013)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"4","key":"24_CR52","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MDT.2012.2211855","volume":"29","author":"T Weng","year":"2012","unstructured":"Weng, T., Agarwal, Y.: From buildings to smart buildings\u2014sensing and actuation to improve energy efficiency. IEEE Des. Test 29(4), 36\u201344 (2012)","journal-title":"IEEE Des. Test"},{"issue":"3","key":"24_CR53","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1109\/TII.2014.2328291","volume":"10","author":"D Wijayasekara","year":"2014","unstructured":"Wijayasekara, D., Linda, O., Manic, M., Rieger, C.: Mining building energy management system data using fuzzy anomaly detection and linguistic descriptions. IEEE Trans. Ind. Inform. 10(3), 1829\u20131840 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"24_CR54","doi-asserted-by":"crossref","unstructured":"Yang, C.-T., Chen, W.-S., Huang, K.-L., Liu, J.-C., Hsu, W.-H., Hsu, C.-H.: Implementation of smart power management and service system on cloud computing. In: 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC\/ATC), pp. 924\u2013929. IEEE (2012)","DOI":"10.1109\/UIC-ATC.2012.160"},{"issue":"1","key":"24_CR55","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"24_CR56","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/JIOT.2014.2344013","volume":"1","author":"K Zhang","year":"2014","unstructured":"Zhang, K., Liang, X., Lu, R., Shen, X.: Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1(5), 372\u2013383 (2014)","journal-title":"IEEE Internet Things J."},{"key":"24_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, Y.: Technology framework of the internet of things and its application. In: International Conference on Electrical and Control Engineering (ICECE), pp. 4109\u20134112. IEEE (2011)","DOI":"10.1109\/ICECENG.2011.6057290"},{"key":"24_CR58","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: 9th International Conference on Computational Intelligence and Security (CIS), pp. 663\u2013667. IEEE (2013)","DOI":"10.1109\/CIS.2013.145"},{"key":"24_CR59","doi-asserted-by":"crossref","unstructured":"Zia, T., Zomaya, A.: Security issues in wireless sensor networks. In: International Conference on Systems and Networks Communications (ICSNC 2006), p. 40. IEEE (2006)","DOI":"10.1109\/ICSNC.2006.66"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Infrastructures, Services, and IoT Systems for Smart Cities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67636-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:13:29Z","timestamp":1750965209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67636-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,27]]},"ISBN":["9783319676357","9783319676364"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67636-4_24","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,10,27]]}}}