logo

SCIENCE CHINA Information Sciences, Volume 62 , Issue 3 : 032103(2019) https://doi.org/10.1007/s11432-018-9451-y

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid

More info
  • ReceivedFeb 27, 2018
  • AcceptedMay 14, 2018
  • PublishedJan 11, 2019

Abstract


Acknowledgment

This work was partially supported by Beijing Natural Science Foundation (Grant No. 4182060), and Fundamental Research Funds for the Central Universities (Grant No. 2018ZD06).


References

[1] Wang K, Du M, Maharjan S. Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid. IEEE Trans Smart Grid, 2017, 8: 2474-2482 CrossRef Google Scholar

[2] Guan Z T, Si G L, Zhang X S, et al. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag, 2018, 56: 82--88. Google Scholar

[3] Xue K P, Li S, Hong J, et al. Two-cloud secure database for numeric-related sql range queries with privacy preserving. IEEE T Inf Foren Sec, 2017. Google Scholar

[4] Wu J, Dong M, Ota K. Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Netw Appl, 2015, 8: 1133-1142 CrossRef Google Scholar

[5] Erkin Z, Troncoso-Pastoriza J, Lagendijk R, et al. Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Proc Mag, 2013, 30: 75-86. Google Scholar

[6] Yan Y, Qian Y, Sharif H. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges. IEEE Commun Surv Tutorials, 2013, 15: 5-20 CrossRef Google Scholar

[7] Cho S, Li H, Choi B J. Palda: efficient privacy-preserving authentication for lossless data aggregation in smart grids. In: Proceedings of IEEE International Conference on Smart Grid Communications, 2014. 914--919. Google Scholar

[8] Guan Z T, Li J, Zhu L H, et al. Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources. IEEE T Ind Inform. 2017, 13: 3216-3225. Google Scholar

[9] Zheng J, Tan Y, Zhang Q. Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci, 2018, 61: 048103 CrossRef Google Scholar

[10] Guan Z, Li J, Wu L. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid. IEEE Internet Things J, 2017, 4: 1934-1944 CrossRef Google Scholar

[11] Zhang Z J, Qin Z, Zhu L H, et al. Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE T Smart Grid, 2016, 8: 619-626. Google Scholar

[12] Li S, Xue K, Yang Q. PPMA: Privacy-Preserving Multisubset Data Aggregation in Smart Grid. IEEE Trans Ind Inf, 2018, 14: 462-471 CrossRef Google Scholar

[13] Li S, Zhang X, Xue K. Privacy-preserving prepayment based power request and trading in smart grid. China Commun, 2018, 15: 14-27 CrossRef Google Scholar

[14] Xiao Y, Tan Y A, Sun Z Z, et al. A fault-tolerant and energy-efficient continuous data protection system. J AMB INTEL HUM COMP, 2018, 1: 1-10. Google Scholar

[15] Przydatek B, Song D, Perrig A. Sia: secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003. 255--265. Google Scholar

[16] Shi E, Chan T H, Rieffel E, et al. Privacy-preserving aggregation of time-series data. In: Proceedings of the 18th Annual Network and Distributed System Security Conference, 2011. Google Scholar

[17] Kim Y S, Heo J. Device authentication protocol for smart grid systems using homomorphic Hash. J Commun Netw, 2012, 14: 606-613 CrossRef Google Scholar

[18] Lu R X, Liang X H, Li X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Paral Distrib Syst, 2012, 23: 1621-1631 CrossRef Google Scholar

[19] Chen L, Lu R X, Cao Z F. Pdaft: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer Peer Netw Appl. 2015, 8: 1122-1132. Google Scholar

[20] Shi Z, Sun R, Lu R. Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications. IEEE Trans Smart Grid, 2015, 6: 2856-2868 CrossRef Google Scholar

[21] Wu J, Dong M, Ota K. Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks. IEEE Trans Netw Serv Manage, 2018, 15: 27-38 CrossRef Google Scholar

[22] Zhang X, Tan Y, Xue Y. Cryptographic key protection against FROST for mobile devices. Cluster Comput, 2017, 20: 2393-2402 CrossRef Google Scholar

[23] Gao S, Ma X, Zhu J. APRS: a privacy-preserving location-aware recommender system based on differentially private histogram. Sci China Inf Sci, 2017, 60: 119103 CrossRef Google Scholar

[24] Mustafa M A, Zhang N, Kalogridis G, et al. Dep2sa: A decentralized efficient privacy-preserving and selective aggregation scheme in advanced metering infrastructure. IEEE Access, 2016, 3: 2828-2846. Google Scholar

[25] Wang T, Zeng J, Bhuiyan M Z A. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access, 2017, 5: 7692-7701 CrossRef Google Scholar

[26] Shen H, Zhang M, Shen J. Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. IEEE TransInformForensic Secur, 2017, 12: 1369-1381 CrossRef Google Scholar

[27] Fouda M M, Fadlullah Z M, Kato N. A Lightweight Message Authentication Scheme for Smart Grid Communications. IEEE Trans Smart Grid, 2011, 2: 675-685 CrossRef Google Scholar

[28] Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on Theory and Application of Cryptographic Techniques, 1999. 223--238. Google Scholar

[29] Blakley G R. Safeguarding cryptographic keys. In: Proceeding of International Workshop on Managing Requirements Knowledge, 1979. 313--317. Google Scholar

[30] Yu Y, Xue L, Au M H. Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Generation Comput Syst, 2016, 62: 85-91 CrossRef Google Scholar

[31] Bellare M, Garay J A, Rabin T. Fast batch verification for modular exponentiation and digital signatures. In: Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques, 1998. 236--250. Google Scholar

[32] Li H, Lin X, Yang H. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Trans Parallel Distrib Syst, 2014, 25: 2053-2064 CrossRef Google Scholar

[33] Dan B, Lynn B, Shacham H. Short signatures from the weil pairing. In: Proceeding of International Conference on the Theory and Application of Cryptology and Information Security, 2001. 514--532. Google Scholar

[34] Failla P. Privacy preserving processing of biometric templates by homomorphic encryption. Ph.D. Thesis. Siena: University of Siena. 2011. Google Scholar

[35] Lynn B. PBC: the pairing-based cryptography library. Version 0.5.14, 2013. http://crypto.stanford.edu/pbc/. Google Scholar

  • Figure 1

    (Color online) The conceptual architecture of smart grid.

  • Figure 2

    (Color online) System model of EFFECT scheme.

  • Figure 3

    (Color online) Initialization process.

  • Figure 4

    (Color online) Computational cost considering fault tolerance.

  • Figure 5

    (Color online) Comparison of communication overhead with (a) different user numbers, and (b) different data size.

  • Table 1   Computation complexity
    Entity name Involving operations Computation complexity
    3*SM (1) User's electricity usage data collection
    3*$4~\times~C_e+3~\times~C_m$
    (2) Data encryption
    (3) Signature $\delta_i$ generation
    3*GW (1) User's data integrity verification and sender authentication
    3*$(2n+1)~\times~C_m+3~\times~C_e$
    (2) User's data aggregation
    (3) Signature $\sigma_j$ generation
    2*CC (1) Aggregated data integrity verification and sender authentication
    2*$3~\times~C_e+2~\times~C_m$
    (2) Data decryption
  • Table 2   Comparison of computation complexity in authentication phrase
    Scheme EPPA EPPDA Shen's scheme EFFECT
    Complexity $(n+1)~\times~C_p$ $2n~\times~C_p$ $(n+2)~\times~C_p$ $n~\times~C_m+C_e$