Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources

被引:26
作者
Guan, Zhitao [1 ]
Li, Jing [1 ]
Zhu, Liehuang [2 ]
Zhang, Zijian [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] Beijing Inst Technol, Sch Comp, Beijing 100081, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Univ Idaho, Moscow, ID 83843 USA
基金
中国国家自然科学基金;
关键词
Delay tolerance; key policy attribute-based encryption (KP-ABE); renewable energy resources (RERs); secret-sharing scheme (SSS); smart grid; ATTRIBUTE-BASED ENCRYPTION; SENSOR NETWORKS; BROADCAST; HUB;
D O I
10.1109/TII.2017.2706760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the smart grid with renewable energy resources (RERs), the residential units (RUs) with distributed energy resources are considered to be both power consumers and suppliers. Specifically, RUs with excessive renewable generations can trade with the utility in deficit of power supplies for mutual benefits. It causes two challenging issues. First, the trading data of RUs are quite sensitive, which should be only accessed by authorized users with fine-grained policies. Second, the behaviors of the RUs to generate trading data are spontaneous and unpredictable, and then the problem is how to guarantee system efficiency and delay tolerance simultaneously. In this paper, we propose a delay-tolerant flexible data access control scheme based on key policy attribute-based encryption for smart grid with RERs. We adopt the secret-sharing scheme to realize a flexible access control with encryption delay tolerance. Furthermore, there is no central trusted server to perform the encryption/decryption. We reduce the computation cost on RUs and operators via a semitrusted model. The analysis shows that the proposed scheme can meet the data security requirement of the smart grid with RERs, and it also has less cost compared with other popular models.
引用
收藏
页码:3216 / 3225
页数:10
相关论文
共 29 条
[1]  
[Anonymous], 2010, P ACMCCS
[2]  
[Anonymous], 2002, LBNL50829 CERTS
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]  
Du X., 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), P453, DOI 10.1109/INM.2001.918059
[6]   Defending DoS attacks on broadcast authentication in wireless sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hsiao-Hwa .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1653-+
[7]   Multiclass routing and medium access control for heterogeneous mobile ad hoc networks [J].
Du, XJ ;
Wu, DP ;
Liu, W ;
Fang, YG .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (01) :270-277
[8]  
Du XJ, 2005, IEEE IPCCC, P51
[9]   Toward Secure Targeted Broadcast in Smart Grid [J].
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin Sherman ;
Nozaki, Yousuke .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (05) :150-156
[10]   Smart Grid - The New and Improved Power Grid: A Survey [J].
Fang, Xi ;
Misra, Satyajayant ;
Xue, Guoliang ;
Yang, Dejun .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04) :944-980