Virtual Ring Privacy Preserving Scheme Based on Fog Computing for Smart Meter System

被引:1
作者
Xia, Zhuoqun [1 ]
Zhang, Yichao [1 ]
Gu, Ke [1 ]
Zhou, Kaixin [1 ]
Li, Xiong [2 ]
机构
[1] Changsha Univ Sci & Technol, Changsha 410014, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Fog computing; Smart Meter System (SMS); Virtual Ring; AGGREGATION; EFFICIENT; DESIGN;
D O I
10.11999/JEIT220618
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the basic component of smart grid, Smart Meter System (SMS) can regularly report the detailed electricity consumption data of users to power companies. However, SMS also bring some security problems, such as user privacy disclosure. This paper proposes a privacy protection scheme based on virtual ring for SMS based on fog computing. This scheme can provide the privacy of power consumption data and user identity, so that the attacker can not know the relationship between matching power data and user identity. In the proposed scheme, the SMS can use its virtual ring membership to anonymize its real identity, and it can also use asymmetric encryption and Paillier homomorphic system to generate ciphertext data from its power consumption data; Then the SMS sends the ciphertext data to the connected fog node, and the fog node collects regularly the ciphertext data of the SMS it manages. At the same time, the fog node verifies the virtual ring identity of these SMS, and then aggregates the collected ciphertext data and sends it to the control center; Finally, the control center decrypts the aggregated ciphertext to obtain the power consumption data. The experimental results show that the proposed scheme has some advantages in computing and communication costs.
引用
收藏
页码:819 / 827
页数:9
相关论文
共 24 条
[1]   Communication Technologies for Smart Grid: A Comprehensive Survey [J].
Abrahamsen, Fredrik Ege ;
Ai, Yun ;
Cheffena, Michael .
SENSORS, 2021, 21 (23)
[2]  
[Anonymous], 2021, COMPUT ELECTR ENG, V94, DOI [10.1016/j.compeleceng.2021.107358, DOI 10.1016/J.COMPELECENG.2021.107358]
[3]  
[Anonymous], 2009, DRAFT NISTIR
[4]   Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy [J].
Badra, Mohamad ;
Zeadally, Sherali .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) :321-329
[5]   Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids [J].
Boyaci, Osman ;
Umunnakwe, Amarachi ;
Sahu, Abhijeet ;
Narimani, Mohammad Rasoul ;
Ismail, Muhammad ;
Davis, Katherine R. ;
Serpedin, Erchin .
IEEE SYSTEMS JOURNAL, 2022, 16 (02) :2946-2957
[6]   Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems [J].
Chaudhry, Shehzad Ashraf ;
Shon, Taeshik ;
Al-Turjman, Fadi ;
Alsharif, Mohammed H. .
COMPUTER COMMUNICATIONS, 2020, 153 :527-537
[7]   A Homomorphic-Based Multiple Data Aggregation Scheme for Smart Grid [J].
Chen, Yuwen ;
Martinez-Ortega, Jose-Fernan ;
Castillejo, Pedro ;
Lopez, Lourdes .
IEEE SENSORS JOURNAL, 2019, 19 (10) :3921-3929
[8]   A survey on smart grid technologies and applications [J].
Dileep, G. .
RENEWABLE ENERGY, 2020, 146 :2589-2625
[9]   FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection [J].
Dong, Siliang ;
Zeng, Zhixin ;
Liu, Yining .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[10]   An Efficient and Privacy Protection Communication Scheme for Smart Grid [J].
Guan, Albert ;
Guan, D. J. .
IEEE ACCESS, 2020, 8 :179047-179054