|
|
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid |
Hongyang LI1, Xinghua LI1, Qingfeng CHENG2() |
1. School of Cyber Engineering, Xidian University, Xi’an 710071, China 2. Strategic Support Force Information Engineering University, Zhengzhou 450001, China |
|
|
Abstract Compared with the traditional power grid, smart grid involves many advanced technologies and applications. However, due to the rapid development of various network technologies, smart grid is facing the challenges of balancing privacy, security, efficiency, and functionality. In the proposed scheme, we design a privacy protection scheme for outsourcing smart grid aided by fog computing, which supports fine-grained privacy-protected data aggregation based on user characteristics. The fog server matches the encrypted characteristics in the received message with the encrypted aggregation rules issued by the service provider. Therefore, the service provider can get more fine-grained analysis data based on user characteristics. Different from the existing outsourcing smart grid schemes, the proposed scheme can achieve real-time pricing on the premise of protecting user privacy and achieving system fault tolerance. Finally, experiment analyses demonstrate that the proposed scheme has less computation overhead and lower transmission delay than existing schemes.
|
Keywords
smart grid
data aggregation
fine-grained
privacy preservation
real-time pricing
|
Corresponding Author(s):
Qingfeng CHENG
|
Just Accepted Date: 24 May 2022
Issue Date: 03 November 2022
|
|
1 |
X, Fang S, Misra G, Xue D Yang . Smart grid—The new and improved power grid: a survey. IEEE Communications Surveys & Tutorials, 2012, 14( 4): 944–980
|
2 |
V C, Gungor D, Sahin T, Kocak S, Ergut C, Buccella C, Cecati G P Hancke . Smart grid technologies: communication technologies and standards. IEEE Transactions on Industrial Informatics, 2011, 7( 4): 529–539
|
3 |
G, Wood M Newborough . Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design. Energy and Buildings, 2003, 35( 8): 821–841
|
4 |
P, McDaniel S McLaughlin . Security and privacy challenges in the smart grid. IEEE Security & Privacy, 2009, 7( 3): 75–77
|
5 |
F, Diao F, Zhang X Cheng . A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Transactions on Smart Grid, 2015, 6( 1): 461–467
|
6 |
Okay F Y, Ozdemir S. A secure data aggregation protocol for fog computing based smart grids. In: Proceedings of the 12th IEEE International Conference on Compatibility, Power Electronics and Power Engineering. 2018, 1–6
|
7 |
J N, Liu J, Weng A, Yang Y, Chen X Lin . Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid. IEEE Transactions on Smart Grid, 2020, 11( 1): 247–257
|
8 |
A, Saleem A, Khan S U R, Malik H, Pervaiz H, Malik M, Alam A Jindal . FESDA: fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet of Things Journal, 2020, 7( 7): 6132–6142
|
9 |
K, Xue Q, Yang S, Li D S L, Wei M, Peng I, Memon P Hong . PPSO: a privacy-preserving service outsourcing scheme for real-time pricing demand response in smart grid. IEEE Internet of Things Journal, 2019, 6( 2): 2486–2496
|
10 |
X, Zuo L, Li H, Peng S, Luo Y Yang . Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid. IEEE Systems Journal, 2021, 15( 1): 395–406
|
11 |
Y, Liu T, Feng M, Peng J, Guan Y Wang . DREAM: Online control mechanisms for data aggregation error minimization in privacy-preserving crowdsensing. IEEE Transactions on Dependable and Secure Computing, 2022, 19( 2): 1266–1279
|
12 |
P, Samadi A H, Mohsenian-Rad R, Schober V W S, Wong J Jatskevich . Optimal real-time pricing algorithm based on utility maximization for smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications. 2010, 415–420
|
13 |
O R M, Boudia S M, Senouci M Feham . Elliptic curve-based secure multidimensional aggregation for smart grid communications. IEEE Sensors Journal, 2017, 17( 23): 7750–7757
|
14 |
S, Li K, Xue Q, Yang P Hong . PPMA: privacy-preserving multisubset data aggregation in smart grid. IEEE Transactions on Industrial Informatics, 2018, 14( 2): 462–471
|
15 |
Y, Liu W, Guo C I, Fan L, Chang C Cheng . A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Transactions on Industrial Informatics, 2019, 15( 3): 1767–1774
|
16 |
Y, Chen J F, Martínez-Ortega P, Castillejo L López . An elliptic curve-based scalable data aggregation scheme for smart grid. IEEE Systems Journal, 2020, 14( 2): 2066–2077
|
17 |
P, Gope B Sikdar . Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids. IEEE Transactions on Information Forensics and Security, 2019, 14( 6): 1554–1566
|
18 |
F, Knirsch G, Eibl D Engel . Error-resilient masking approaches for privacy preserving data aggregation. IEEE Transactions on Smart Grid, 2018, 9( 4): 3351–3361
|
19 |
J, Song Y, Liu J, Shao C Tang . A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Systems Journal, 2020, 14( 1): 900–908
|
20 |
S, Han S, Zhao Q, Li C H, Ju W Zhou . PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Transactions on Information Forensics and Security, 2016, 11( 9): 1940–1955
|
21 |
S, Zhao F, Li H, Li R, Lu S, Ren H, Bao J H, Lin S Han . Smart and practical privacy-preserving data aggregation for fog-based smart grids. IEEE Transactions on Information Forensics and Security, 2021, 16: 521–536
|
22 |
A, Mohammadali M S Haghighi . A privacy-preserving homomorphic scheme with multiple dimensions and fault tolerance for metering data aggregation in smart grid. IEEE Transactions on Smart Grid, 2021, 12( 6): 5212–5220
|
23 |
P Paillier . Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of 1999 International Conference on the Theory and Application of Cryptographic Techniques. 1999, 223–238
|
24 |
Abdalla M, Bellare M, Rogaway P. DHAES: an encryption scheme based on the Diffie-Hellman problem. Cryptology ePrint Archive, See Eprint.iacr.org/1999/007 website
|
25 |
P, Faria Z Vale . Demand response in electrical energy supply: an optimal real time pricing approach. Energy, 2011, 36( 8): 5374–5384
|
26 |
H, Wang Z, Wang J Domingo-Ferrer . Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Generation Computer Systems, 2018, 78: 712–719
|
27 |
N, Yang Q, Zhou S Xu . Public-key authenticated encryption with keyword search without pairings. Journal of Computer Research and Development, 2020, 57( 10): 2125–2135
|
28 |
B Lynn . On the implementation of pairing-based cryptosystems. Stanford University, Dissertation, 2007
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|