Item type |
Symposium(1) |
公開日 |
2024-06-19 |
タイトル |
|
|
タイトル |
Enhancing Data Security in a Collaborative Control Platform through Dual-layer Encryption |
タイトル |
|
|
言語 |
en |
|
タイトル |
Enhancing Data Security in a Collaborative Control Platform through Dual-layer Encryption |
言語 |
|
|
言語 |
eng |
資源タイプ |
|
|
資源タイプ識別子 |
http://purl.org/coar/resource_type/c_5794 |
|
資源タイプ |
conference paper |
著者所属 |
|
|
|
Hitachi, Ltd. |
著者所属 |
|
|
|
Hitachi, Ltd. |
著者所属 |
|
|
|
Hitachi, Ltd. |
著者所属(英) |
|
|
|
en |
|
|
Hitachi, Ltd. |
著者所属(英) |
|
|
|
en |
|
|
Hitachi, Ltd. |
著者所属(英) |
|
|
|
en |
|
|
Hitachi, Ltd. |
著者名 |
Shourya, Rajulapati
Yoko, Kumagai
Tomomichi, Ito
|
著者名(英) |
Shourya, Rajulapati
Yoko, Kumagai
Tomomichi, Ito
|
論文抄録 |
|
|
内容記述タイプ |
Other |
|
内容記述 |
This paper presents an innovative approach to enhancing data security within Green Energy as a Service (EaaS) platforms. It introduces a dual-layer encryption strategy, integrating deterministic pseudonymization and probabilistic encryption within a Trusted Execution Environment (TEE). This method addresses critical security concerns while ensuring that consumer data remains protected during both storage and analysis. By applying these advanced cryptographic techniques, the system protects against both external threats and potential internal vulnerabilities, notably those posed by system administrators. The results demonstrate the effectiveness of this approach in preventing unauthorized access and maintaining data integrity without compromising the analytical utility of the data. |
論文抄録(英) |
|
|
内容記述タイプ |
Other |
|
内容記述 |
This paper presents an innovative approach to enhancing data security within Green Energy as a Service (EaaS) platforms. It introduces a dual-layer encryption strategy, integrating deterministic pseudonymization and probabilistic encryption within a Trusted Execution Environment (TEE). This method addresses critical security concerns while ensuring that consumer data remains protected during both storage and analysis. By applying these advanced cryptographic techniques, the system protects against both external threats and potential internal vulnerabilities, notably those posed by system administrators. The results demonstrate the effectiveness of this approach in preventing unauthorized access and maintaining data integrity without compromising the analytical utility of the data. |
書誌情報 |
マルチメディア,分散,協調とモバイルシンポジウム2024論文集
巻 2024,
p. 1669-1674,
発行日 2024-06-19
|
出版者 |
|
|
言語 |
ja |
|
出版者 |
情報処理学会 |