http://iet.metastore.ingenta.com
1887

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Along with the development of information technology, the traditional electrical grid is moving to smart grid technology. By using the smart grid, the users and utility providers can more efficiently manage and generate power. Along with the advantages, the smart grid is also faced with new security concerns. In the smart grid, the user's citizen identity information should be preserved and the offensive user should be traced. For some low-capacity devices, it is indispensable to perform complicated computation by using outsourcing computation. The authors provide the outsourcing computation through public cloud. Anonymity and traceability are two important security properties in the smart grid. They are the unity of opposites. On the basis of the security requirements, they propose the balanced anonymity and traceability for outsourcing small-scale data linear aggregation (BAT-LA) in the smart grid. The formal definition, system model and security model are presented. Then, a concrete BAT-LA protocol is designed by using the elliptic curve cryptography and proxy re-encryption. Through security analysis and performance analysis, the designed BAT-LA protocol is provably secure and efficient.

References

    1. 1)
      • P. McDaniel , S. McLaughlin .
        1. McDaniel, P., McLaughlin, S.: ‘Security and privacy challenges in the smart grid’, IEEE Secur. Priv., 2009, 7, (3), pp. 7577.
        . IEEE Secur. Priv. , 3 , 75 - 77
    2. 2)
      • M.F. Nejad , A.M. Saberian , H. Hizam .
        2. Nejad, M.F., Saberian, A.M., Hizam, H., et al: ‘Application of smart power grid in developing countries’. PEOCO 2013, 2013, pp. 427431.
        . PEOCO 2013 , 427 - 431
    3. 3)
      • K. Alharbi , X. Lin , J. Shao .
        3. Alharbi, K., Lin, X., Shao, J.: ‘A framework for privacy-preserving data sharing in the smart grid’. ICCC 2014, 2014, pp. 214219.
        . ICCC 2014 , 214 - 219
    4. 4)
      • K. Birman , M. Jelasity , R. Kleinberg .
        4. Birman, K., Jelasity, M., Kleinberg, R., et al: ‘Building a secure and privacy-preserving smart grid’, ACM SIGOPS Oper. Syst. Rev., 2015, 49, (1), pp. 131136.
        . ACM SIGOPS Oper. Syst. Rev. , 1 , 131 - 136
    5. 5)
      • H. Nicanfar , P. TalebiFard , S. Hosseininezhad , C.M. .
        5. Nicanfar, H., TalebiFard, P., Hosseininezhad, S., , C.M., et al: ‘Security and privacy of electric vehicles in the smart grid context: problem and solution’. DIVANet, 2013, pp. 4554.
        . DIVANet , 45 - 54
    6. 6)
      • Z. Erkin , T. Veugen .
        6. Erkin, Z., Veugen, T.: ‘Privacy enhanced personal services for smart grids’. SEGS, 2014, pp. 712.
        . SEGS , 7 - 12
    7. 7)
      • A. Rial , G. Danezis .
        7. Rial, A., Danezis, G.: ‘Privacy-preserving smart metering’. WPES, 2011, pp. 4960.
        . WPES , 49 - 60
    8. 8)
      • R. Gennaro , C. Gentry , B. Parno .
        8. Gennaro, R., Gentry, C., Parno, B.: ‘Non-interactive verifiable computing: Outsourcing computation to untrusted workers’. CRYPTO, 2010, (LNCS 6223), pp. 465482.
        . CRYPTO , 465 - 482
    9. 9)
      • X. Ma , J. Li , F. Zhang .
        9. Ma, X., Li, J., Zhang, F.: ‘Outsourcing computation of modular exponentiations in cloud computing’, Cluster Comput.., 2013, 16, (4), pp. 787796.
        . Cluster Comput.. , 4 , 787 - 796
    10. 10)
      • J. Li , X. Huang , J. Li .
        10. Li, J., Huang, X., Li, J., et al: ‘Securely outsourcing attribute-based encryption with checkability’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (8), pp. 22012210.
        . IEEE Trans. Parallel Distrib. Syst. , 8 , 2201 - 2210
    11. 11)
      • C.M. Yu , C.Y. Chen , H.C. Chao .
        11. Yu, C.M., Chen, C.Y., Chao, H.C.: ‘Privacy-preserving multi-keyword similarity search over outsourced cloud data’, IEEE Syst. J., doi: 10.1109/JSYST.2015.2402437.
        . IEEE Syst. J.
    12. 12)
      • J. Lai , R.H. Deng , C. Guan .
        12. Lai, J., Deng, R.H., Guan, C., et al: ‘Attribute-based encryption with verifiable outsourced decryption’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (8), pp. 13431354.
        . IEEE Trans. Inf. Forensics Sec. , 8 , 1343 - 1354
    13. 13)
      • L. Li , R. Lu , C. Huang .
        13. Li, L., Lu, R., Huang, C.: ‘EPLQ: Efficient privacy-preserving location-based query over outsourced encrypted data’, IEEE Internet Things J., doi: 10.1109/JIOT.2015.2469605.
        . IEEE Internet Things J.
    14. 14)
      • X. Lei , X. Liao , T. Huang .
        14. Lei, X., Liao, X., Huang, T., et al: ‘Outsourcing large matrix inversion computation to a public cloud’, IEEE Trans. Cloud Comput., 2013, 1, (1), pp. 7887.
        . IEEE Trans. Cloud Comput. , 1 , 78 - 87
    15. 15)
      • Z. Fu , X. Sun , Q. Liu .
        15. Fu, Z., Sun, X., Liu, Q., et al: ‘Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing’, IEICE Trans. Commun., 2015, E98-B, (1), pp. 190200.
        . IEICE Trans. Commun. , 1 , 190 - 200
    16. 16)
      • Y. Ren , J. Shen , J. Wang .
        16. Ren, Y., Shen, J., Wang, J., et al: ‘Mutual verifiable provable data auditing in public cloud storage’, J. Internet Technol., 2015, 16, (2), pp. 317C323.
        . J. Internet Technol. , 2 , 317 - C323
    17. 17)
      • J. Wang , X. Chen , X. Huang .
        17. Wang, J., Chen, X., Huang, X., et al: ‘Verifiable auditing for outsourced database in cloud computing’, IEEE Trans. Comput., doi: 10.1109/TC.2015.2401036.
        . IEEE Trans. Comput.
    18. 18)
      • M. Mambo , K. Usuda , E. Okamoto .
        18. Mambo, M., Usuda, K., Okamoto, E.: ‘Proxy signature for delegating signing operation’. CCS 1996, 1996, pp. 48C57.
        . CCS 1996 , 48 - C57
    19. 19)
      • K. Li , J. Wang , Y. Zhang .
        19. Li, K., Wang, J., Zhang, Y., et al: ‘Key policy attribute-based proxy re-encryption and RCCA secure scheme’, J. Internet Serv. Inf. Secur., 2014, 4, (2), pp. 7082.
        . J. Internet Serv. Inf. Secur. , 2 , 70 - 82
    20. 20)
      • S. Hohenberger , S. Myers , R. Pass .
        20. Hohenberger, S., Myers, S., Pass, R., et al: ‘ANONIZE: A large-scale anonymous survey system’. IEEE Symp. on Security and Privacy, 2014, pp. 375389.
        . IEEE Symp. on Security and Privacy , 375 - 389
    21. 21)
      • M.Z. Lee , A.M. Dunn , B. Waters .
        21. Lee, M.Z., Dunn, A.M., Waters, B., et al: ‘Anon-Pass: practical anonymous subscriptions’. IEEE Symp. on Security and Privacy, 2013, pp. 319333.
        . IEEE Symp. on Security and Privacy , 319 - 333
    22. 22)
      • H. Wang , B. Qin , Q. Wu .
        22. Wang, H., Qin, B., Wu, Q., et al: ‘TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (11), pp. 23402351.
        . IEEE Trans. Inf. Forensics Sec. , 11 , 2340 - 2351
    23. 23)
      • T. Ma , J. Zhou , M. Tang .
        23. Ma, T., Zhou, J., Tang, M., et al: ‘Social network and tag sources based augmenting collaborative recommender system’, IEICE Trans. Inf. Syst., 2015, E98-D, (4), pp. 902910.
        . IEICE Trans. Inf. Syst. , 4 , 902 - 910
    24. 24)
      • J. Shen , H. Tan , J. Wang .
        24. Shen, J., Tan, H., Wang, J., et al: ‘A novel routing protocol providing good transmission reliability in underwater sensor networks’, J. Internet Technol., 2015, 16, (1), pp. 171178.
        . J. Internet Technol. , 1 , 171 - 178
    25. 25)
      • A.J. Menezes , P.C. Van Oorschot , S.A. Vanstone . (1997)
        25. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: ‘Handbook of applied cryptography’ (CRC Press, Boca Raton, FL, USA, 1997).
        .
    26. 26)
      • D. Boneh , E.J. Goh , K. Nissim .
        26. Boneh, D., Goh, E.J., Nissim, K.: ‘Evaluating 2-DNF formulas on ciphertexts’. Theory of Cryptography, 2015, (LNCS 3378), pp. 325341.
        . Theory of Cryptography , 325 - 341
    27. 27)
      • D.J. Bernstein , T. Lange .
        27. Bernstein, D.J., Lange, T.: ‘Computing small discrete logarithms faster’. INDOCRYPT 2012, 2012, (LNCS 7668), pp. 317338.
        . INDOCRYPT 2012 , 317 - 338
    28. 28)
      • C. Rottondi , G. Verticale , C. Krauss .
        28. Rottondi, C., Verticale, G., Krauss, C.: ‘Distributed privacy-preserving aggregation of metering data in smart grids’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 13421354.
        . IEEE J. Sel. Areas Commun. , 7 , 1342 - 1354
    29. 29)
      • I. Leontiadis , R. Molva , M. Onen .
        29. Leontiadis, I., Molva, R., Onen, M.: ‘Privacy preserving statistics in the smart grid’. ICDCSW, 2014, pp. 182187.
        . ICDCSW , 182 - 187
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0150
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0150
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address