http://iet.metastore.ingenta.com
1887

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Sensors are gaining a ubiquitous status over many application domains with regard to enabling data-driven decision making and smart functionality. Integration of sensors with cloud-based data storage and analysis has the potential to significantly enhance the efficiencies, resilience and adaptability of managing smart infrastructure management. In this context, a standout application is smart grid, which provides an electricity delivery service with the ability to monitor, protect and optimize various operations of its connected elements from service provider to consumer. An ability to read and manage smart grid measurements remotely using wireless sensors is an important advantage that allows the grid operators to balance loads effectively and enable on-demand services for various entities. However, the adoption of cloud infrastructure to manage sensor data in a smart grid poses significant risks to data security and consumers privacy. The data maybe exposed to malicious or unwarranted parties, with the potential for various security attacks that may impact data integrity, availability and accountability. We propose a secure and practical billing model using homomorphic encryption within a cloud-based data processing framework. Moving billing management into the cloud securely, with on-demand data retrieval and statistical computations is a major strength of the proposed framework.

References

    1. 1)
      • J. Momoh . (2012)
        1. Momoh, J.: ‘Smart grid: fundamentals of design and analysis’, vol. 63 (John Wiley & Sons, 2012).
        .
    2. 2)
      • S. Finster , I. Baumgart .
        2. Finster, S., Baumgart, I.: ‘Privacy-aware smart metering: A survey’, IEEE Commun. Surv. Tutor., 2015, 17, (2), pp. 10881101..
        . IEEE Commun. Surv. Tutor. , 2 , 1088 - 1101
    3. 3)
      • J. Domingo-Ferrer .
        3. Domingo-Ferrer, J.: ‘A provably secure additive and multiplicative privacy homomorphism’. Information Security, 5th Int. Conf., ISC 2002, Sao Paulo, Brazil, 30 September–2 October 2002, pp. 471483..
        . Information Security, 5th Int. Conf., ISC 2002 , 471 - 483
    4. 4)
      • C. Gentry . (2009)
        4. Gentry, C.: ‘A fully homomorphic encryption scheme’ (Stanford University, 2009).
        .
    5. 5)
      • K.G. Boroojeni , M.H. Amini , S.S. Iyengar . (2017)
        5. Boroojeni, K.G., Amini, M.H., Iyengar, S.S.: ‘Overview of the security and privacy issues in smart grids’ (Springer International Publishing, Cham, 2017), pp. 116..
        .
    6. 6)
      • J.M. Bohli , C. Sorge , O. Ugus .
        6. Bohli, J.M., Sorge, C., Ugus, O.: ‘A privacy model for smart metering’. 2010 IEEE Int. Conf. Communications Workshops, 2010, pp. 15.
        . 2010 IEEE Int. Conf. Communications Workshops , 1 - 5
    7. 7)
      • S.E. McLaughlin , P.D. McDaniel , W. Aiello .
        7. McLaughlin, S.E., McDaniel, P.D., Aiello, W.: ‘Protecting consumer privacy from electric load monitoring’. Proc. 18th ACM Conf. Computer and Communications Security, CCS 2011, Chicago, IL, USA, 17–21 October 2011, pp. 8798..
        . Proc. 18th ACM Conf. Computer and Communications Security, CCS 2011 , 87 - 98
    8. 8)
      • G. Kalogridis , C. Efthymiou , S.Z. Denic .
        8. Kalogridis, G., Efthymiou, C., Denic, S.Z., et al: ‘Privacy for smart meters: towards undetectable appliance load signatures’. 2010 First IEEE Int. Conf. Smart Grid Communications, 2010, pp. 232237.
        . 2010 First IEEE Int. Conf. Smart Grid Communications , 232 - 237
    9. 9)
      • K. Kursawe , G. Danezis , M. Kohlweiss .
        9. Kursawe, K., Danezis, G., Kohlweiss, M.: ‘Privacy-friendly aggregation for the smart-grid’. Privacy Enhancing Technologies – 11th Int. Symp., PETS 2011, Waterloo, ON, Canada, 27–29 July 2011, pp. 175191..
        . Privacy Enhancing Technologies – 11th Int. Symp., PETS 2011 , 175 - 191
    10. 10)
      • A. Molina-Markham , P.J. Shenoy , K. Fu .
        10. Molina-Markham, A., Shenoy, P.J., Fu, K., et al: ‘Private memoirs of a smart meter’. BuildSys'10, Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, Zurich, Switzerland, 3–5 November 2010, pp. 6166..
        . BuildSys'10, Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings , 61 - 66
    11. 11)
      • C. Efthymiou , G. Kalogridis .
        11. Efthymiou, C., Kalogridis, G.: ‘Smart grid privacy via anonymization of smart metering data’. 2010 First IEEE Int. Conf. Smart Grid Communications, 2010, pp. 238243.
        . 2010 First IEEE Int. Conf. Smart Grid Communications , 238 - 243
    12. 12)
      • A. Bartoli , J. Hernández-Serrano , M. Soriano .
        12. Bartoli, A., Hernández-Serrano, J., Soriano, M., et al: ‘Secure lossless aggregation over fading and shadowing channels for smart grid M2M networks’, IEEE Trans Smart Grid, 2011, 2, (4), pp. 844864..
        . IEEE Trans Smart Grid , 4 , 844 - 864
    13. 13)
      • F.D. Garcia , B. Jacobs .
        13. Garcia, F.D., Jacobs, B.: ‘Privacy-friendly energy-metering via homomorphic encryption’. Security and Trust Management – 6th Int. Workshop, STM 2010, Athens, Greece, 23–24 September 2010, Revised Selected Papers, pp. 226238..
        . Security and Trust Management – 6th Int. Workshop, STM 2010 , 226 - 238
    14. 14)
      • D. Varodayan , A. Khisti .
        14. Varodayan, D., Khisti, A.: ‘Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage’. 2011 IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 19321935.
        . 2011 IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP) , 1932 - 1935
    15. 15)
      • M. Backes , S. Meiser .
        15. Backes, M., Meiser, S.: ‘Differentially private smart metering with battery recharging’. Data Privacy Management and Autonomous Spontaneous Security – 8th Int. Workshop, DPM 2013, and 6th Int. Workshop, SETOP 2013, Egham, UK, 12–13 September 2013, Revised Selected Papers, pp. 194212..
        . Data Privacy Management and Autonomous Spontaneous Security – 8th Int. Workshop, DPM 2013, and 6th Int. Workshop, SETOP 2013 , 194 - 212
    16. 16)
      • V. Delgado-Gomes , J.F. Martins , C. Lima .
        16. Delgado-Gomes, V., Martins, J.F., Lima, C., et al: ‘Smart grid security issues’. 2015 9th Int. Conf. Compatibility and Power Electronics (CPE), 2015, pp. 534538.
        . 2015 9th Int. Conf. Compatibility and Power Electronics (CPE) , 534 - 538
    17. 17)
      • A.R. Metke , R.L. Ekl .
        17. Metke, A.R., Ekl, R.L.: ‘Security technology for smart grid networks’, IEEE Trans. Smart Grid, 2010, 1, (1), pp. 99107. doi: 10.1109/TSG.2010.2046347.
        . IEEE Trans. Smart Grid , 1 , 99 - 107
    18. 18)
      • P. Jokar , N. Arianpoo , V.C.M. Leung .
        18. Jokar, P., Arianpoo, N., Leung, V.C.M.: ‘A survey on security issues in smart grids’, Security Commun. Netw., 2016, 9, (3), pp. 262273. doi: org/10.1002/sec.559.
        . Security Commun. Netw. , 3 , 262 - 273
    19. 19)
      • F. Li , B. Luo , P. Liu .
        19. Li, F., Luo, B., Liu, P.: ‘Secure information aggregation for smart grids using homomorphic encryption’. 2010 First IEEE Int. Conf. Smart Grid Communications, 2010, pp. 327332.
        . 2010 First IEEE Int. Conf. Smart Grid Communications , 327 - 332
    20. 20)
      • X. He , M.O. Pun , C.C.J. Kuo .
        20. He, X., Pun, M.O., Kuo, C.C.J.: ‘Secure and efficient cryptosystem for smart grid using homomorphic encryption’. 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 2012, pp. 18.
        . 2012 IEEE PES Innovative Smart Grid Technologies (ISGT) , 1 - 8
    21. 21)
      • P. Paillier .
        21. Paillier, P.: ‘Public-key cryptosystems based on composite degree residuosity classes’. Int. Conf. Theory and Application of Cryptographic Techniques Advances in Cryptology – EUROCRYPT ‘99, Prague, Czech Republic, 2–6 May 1999, pp. 223238. doi: 10.1007/3-540–48910-X_16.
        . Int. Conf. Theory and Application of Cryptographic Techniques Advances in Cryptology – EUROCRYPT ‘99 , 223 - 238
    22. 22)
      • T.E. Gamal .
        22. Gamal, T.E.: ‘A public key cryptosystem and a signature scheme based on discrete logarithms’, IEEE Trans. Inf. Theory, 1985, 31, (4), pp. 469472. doi: 10.1109/TIT.1985.1057074.
        . IEEE Trans. Inf. Theory , 4 , 469 - 472
    23. 23)
      • T. Okamoto , S. Uchiyama .
        23. Okamoto, T., Uchiyama, S.: ‘A new public-key cryptosystem as secure as factoring’. Int. Conf. Theory and Application of Cryptographic Techniques Advances in Cryptology – EUROCRYPT ‘98, Espoo, Finland, 31 May–4 June 1998, pp. 308318. doi: 10.1007/BFb0054135.
        . Int. Conf. Theory and Application of Cryptographic Techniques Advances in Cryptology – EUROCRYPT ‘98 , 308 - 318
    24. 24)
      • D. Naccache , J. Stern .
        24. Naccache, D., Stern, J.: ‘A new public key cryptosystem based on higher residues’. CCS ‘98, Proc. 5th ACM Conf. Computer and Communications Security, San Francisco, CA, USA, 3–5 November 1998, pp. 5966. doi: 10.1145/288090.288106.
        . CCS ‘98, Proc. 5th ACM Conf. Computer and Communications Security , 59 - 66
    25. 25)
      • C. Castelluccia , A.C.F. Chan , E. Mykletun .
        25. Castelluccia, C., Chan, A.C.F., Mykletun, E., et al: ‘Efficient and provably secure aggregation of encrypted data in wireless sensor networks’, TOSN, 2009, 5, (3), pp. 20:120:36. doi: 10.1145/1525856.1525858.
        . TOSN , 3 , 20:1 - 20:36
    26. 26)
      • R.L. Rivest , A. Shamir , L.M. Adleman .
        26. Rivest, R.L., Shamir, A., Adleman, L.M.: ‘A method for obtaining digital signatures and public-key cryptosystems (reprint)’, Commun. ACM, 1983, 26, (1), pp. 9699. doi: 10.1145/357980.358017.
        . Commun. ACM , 1 , 96 - 99
    27. 27)
      • D. Hankerson , A.J. Menezes , S. Vanstone . (2006)
        27. Hankerson, D., Menezes, A.J., Vanstone, S.: ‘Guide to elliptic curve cryptography’ (Springer Science & Business Media, 2006).
        .
    28. 28)
      • D. Wagner .
        28. Wagner, D.: ‘Cryptanalysis of an algebraic privacy homomorphism’. 6th Int. Conf. Information Security, ISC 2003, Bristol, UK, 1–3 October 2003, pp. 234239.doi: 10.1007/10958513_18.
        . 6th Int. Conf. Information Security, ISC 2003 , 234 - 239
    29. 29)
      • S. Barker , A. Mishra , D. Irwin .
        29. Barker, S., Mishra, A., Irwin, D., et al: ‘Smart*: an open data set and tools for enabling research in sustainable homes’, SustKDD, August, 2012, 111, p. 112.
        . SustKDD, August , 112
    30. 30)
      • Y.B. Australia . (2008)
        30. Australia, Y.B.: ‘Australian bureau of statistics’ (Canberra, Australia, 2008).
        .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2017.0061
Loading

Related content

content/journals/10.1049/iet-wss.2017.0061
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address