A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications

被引:25
作者
Lu, Rongxing [1 ]
Alharbi, Khalid [2 ]
Lin, Xiaodong [2 ]
Huang, Cheng [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, 50 Nanyang Ave, Singapore 639798, Singapore
[2] Univ Ontario Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
关键词
Smart grid; Security; Privacy-preserving aggregation; Set aggregation;
D O I
10.1109/GLOCOM.2015.7417029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a novel privacy-preserving set aggregation scheme for smart grid communications. The proposed scheme is characterized by employing a group G of composite order n = pq to achieve two-subset aggregation from a single aggregated data. With the proposed set aggregation scheme, the control center in smart grid is able to obtain more fine-grained data aggregation results for better monitoring and controlling smart grid. Detailed security analysis shows that the proposed scheme can achieve privacy-preserving property with formal proof in the random oracle model. In addition, extensive experiments are conducted, and the results demonstrate the proposed scheme is also efficient in terms of low computational costs and communication overheads.
引用
收藏
页数:6
相关论文
共 13 条
[1]  
Alharbi K, 2012, INT CONF WIRE COMMUN
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
Bao H., IEEE INTERN IN PRESS
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]  
Chen L., PEER TO PEE IN PRESS
[6]  
Erkin Zekeriya, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P561, DOI 10.1007/978-3-642-31284-7_33
[7]  
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
[8]  
Li C., SECURITY CO IN PRESS
[9]  
Liu Y, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P21
[10]   New (t,n) threshold directed signature scheme with provable security [J].
Lu, Rongxing ;
Lin, Xiaodong ;
Cao, Zhenfu ;
Shao, Jun ;
Liang, Xiaohui .
INFORMATION SCIENCES, 2008, 178 (03) :756-765