Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid

Along with the development of information technology, the traditional electrical grid is moving to smart grid technology. By using the smart grid, the users and utility providers can more efficiently manage and generate power. Along with the advantages, the smart grid is also faced with new security concerns. In the smart grid, the user's citizen identity information should be preserved and the offensive user should be traced. For some low-capacity devices, it is indispensable to perform complicated computation by using outsourcing computation. The authors provide the outsourcing computation through public cloud. Anonymity and traceability are two important security properties in the smart grid. They are the unity of opposites. On the basis of the security requirements, they propose the balanced anonymity and traceability for outsourcing small-scale data linear aggregation (BAT-LA) in the smart grid. The formal definition, system model and security model are presented. Then, a concrete BAT-LA protocol is designed by using the elliptic curve cryptography and proxy re-encryption. Through security analysis and performance analysis, the designed BAT-LA protocol is provably secure and efficient.

References

    1. 1)
      • 1. McDaniel, P., McLaughlin, S.: ‘Security and privacy challenges in the smart grid’, IEEE Secur. Priv., 2009, 7, (3), pp. 7577.
    2. 2)
      • 18. Mambo, M., Usuda, K., Okamoto, E.: ‘Proxy signature for delegating signing operation’. CCS 1996, 1996, pp. 48C57.
    3. 3)
      • 21. Lee, M.Z., Dunn, A.M., Waters, B., et al: ‘Anon-Pass: practical anonymous subscriptions’. IEEE Symp. on Security and Privacy, 2013, pp. 319333.
    4. 4)
      • 27. Bernstein, D.J., Lange, T.: ‘Computing small discrete logarithms faster’. INDOCRYPT 2012, 2012, (LNCS 7668), pp. 317338.
    5. 5)
      • 22. Wang, H., Qin, B., Wu, Q., et al: ‘TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (11), pp. 23402351.
    6. 6)
      • 3. Alharbi, K., Lin, X., Shao, J.: ‘A framework for privacy-preserving data sharing in the smart grid’. ICCC 2014, 2014, pp. 214219.
    7. 7)
      • 7. Rial, A., Danezis, G.: ‘Privacy-preserving smart metering’. WPES, 2011, pp. 4960.
    8. 8)
      • 17. Wang, J., Chen, X., Huang, X., et al: ‘Verifiable auditing for outsourced database in cloud computing’, IEEE Trans. Comput., doi: 10.1109/TC.2015.2401036.
    9. 9)
      • 28. Rottondi, C., Verticale, G., Krauss, C.: ‘Distributed privacy-preserving aggregation of metering data in smart grids’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 13421354.
    10. 10)
      • 24. Shen, J., Tan, H., Wang, J., et al: ‘A novel routing protocol providing good transmission reliability in underwater sensor networks’, J. Internet Technol., 2015, 16, (1), pp. 171178.
    11. 11)
      • 25. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: ‘Handbook of applied cryptography’ (CRC Press, Boca Raton, FL, USA, 1997).
    12. 12)
      • 11. Yu, C.M., Chen, C.Y., Chao, H.C.: ‘Privacy-preserving multi-keyword similarity search over outsourced cloud data’, IEEE Syst. J., doi: 10.1109/JSYST.2015.2402437.
    13. 13)
      • 8. Gennaro, R., Gentry, C., Parno, B.: ‘Non-interactive verifiable computing: Outsourcing computation to untrusted workers’. CRYPTO, 2010, (LNCS 6223), pp. 465482.
    14. 14)
      • 9. Ma, X., Li, J., Zhang, F.: ‘Outsourcing computation of modular exponentiations in cloud computing’, Cluster Comput.., 2013, 16, (4), pp. 787796.
    15. 15)
      • 12. Lai, J., Deng, R.H., Guan, C., et al: ‘Attribute-based encryption with verifiable outsourced decryption’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (8), pp. 13431354.
    16. 16)
      • 6. Erkin, Z., Veugen, T.: ‘Privacy enhanced personal services for smart grids’. SEGS, 2014, pp. 712.
    17. 17)
      • 4. Birman, K., Jelasity, M., Kleinberg, R., et al: ‘Building a secure and privacy-preserving smart grid’, ACM SIGOPS Oper. Syst. Rev., 2015, 49, (1), pp. 131136.
    18. 18)
      • 5. Nicanfar, H., TalebiFard, P., Hosseininezhad, S., , C.M., et al: ‘Security and privacy of electric vehicles in the smart grid context: problem and solution’. DIVANet, 2013, pp. 4554.
    19. 19)
      • 20. Hohenberger, S., Myers, S., Pass, R., et al: ‘ANONIZE: A large-scale anonymous survey system’. IEEE Symp. on Security and Privacy, 2014, pp. 375389.
    20. 20)
      • 26. Boneh, D., Goh, E.J., Nissim, K.: ‘Evaluating 2-DNF formulas on ciphertexts’. Theory of Cryptography, 2015, (LNCS 3378), pp. 325341.
    21. 21)
      • 16. Ren, Y., Shen, J., Wang, J., et al: ‘Mutual verifiable provable data auditing in public cloud storage’, J. Internet Technol., 2015, 16, (2), pp. 317C323.
    22. 22)
      • 2. Nejad, M.F., Saberian, A.M., Hizam, H., et al: ‘Application of smart power grid in developing countries’. PEOCO 2013, 2013, pp. 427431.
    23. 23)
      • 15. Fu, Z., Sun, X., Liu, Q., et al: ‘Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing’, IEICE Trans. Commun., 2015, E98-B, (1), pp. 190200.
    24. 24)
      • 13. Li, L., Lu, R., Huang, C.: ‘EPLQ: Efficient privacy-preserving location-based query over outsourced encrypted data’, IEEE Internet Things J., doi: 10.1109/JIOT.2015.2469605.
    25. 25)
      • 19. Li, K., Wang, J., Zhang, Y., et al: ‘Key policy attribute-based proxy re-encryption and RCCA secure scheme’, J. Internet Serv. Inf. Secur., 2014, 4, (2), pp. 7082.
    26. 26)
      • 10. Li, J., Huang, X., Li, J., et al: ‘Securely outsourcing attribute-based encryption with checkability’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (8), pp. 22012210.
    27. 27)
      • 23. Ma, T., Zhou, J., Tang, M., et al: ‘Social network and tag sources based augmenting collaborative recommender system’, IEICE Trans. Inf. Syst., 2015, E98-D, (4), pp. 902910.
    28. 28)
      • 29. Leontiadis, I., Molva, R., Onen, M.: ‘Privacy preserving statistics in the smart grid’. ICDCSW, 2014, pp. 182187.
    29. 29)
      • 14. Lei, X., Liao, X., Huang, T., et al: ‘Outsourcing large matrix inversion computation to a public cloud’, IEEE Trans. Cloud Comput., 2013, 1, (1), pp. 7887.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0150
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0150
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address