Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Poster: K-Anonymity Applied To The Energy Grid Of Things Distributed Energy Resource Management System, Mohammed Alsaid, Tylor Slay, Nirupama Bulusu, Robert B. Bass May 2022

Poster: K-Anonymity Applied To The Energy Grid Of Things Distributed Energy Resource Management System, Mohammed Alsaid, Tylor Slay, Nirupama Bulusu, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

The violation of information privacy in Smart Grids can be a significant barrier to customers’ participation. Employing privacy protection models such as K-anonymity in a Smart Grid implementation adds desirable privacy guarantees. This work provides an approach to applying the Mondrian algorithm to ensure data within the system excludes Personally Identifiable Information. Results suggest that a dynamically generated generalization hierarchy minimizes information loss incurred by the anonymization process.


Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua Sep 2013

Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua

Dissertations and Theses

Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for …