Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid

被引:90
作者
Jia, Weiwei [1 ,2 ]
Zhu, Haojin [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
Xiao, Chengxin [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Hohai Univ, Coll Sci, Nanjing 210098, Jiangsu, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2014年 / 8卷 / 02期
基金
中国国家自然科学基金;
关键词
Aggregation; differential privacy; privacy preserving; smart grid;
D O I
10.1109/JSYST.2013.2260937
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving metering aggregation is regarded as an important research topic in securing a smart grid. In this paper, we first identify and formalize a new attack, in which the attacker could exploit the information about the presence or absence of a specific person to infer his meter readings. This attack, coined as human-factor-aware differential aggregation (HDA) attack, cannot be addressed in existing privacy-preserving aggregation protocols proposed for smart grids. We give a formal definition on it and propose two novel protocols, including basic scheme and advanced scheme, to achieve privacy-preserving smart metering data aggregation and to resist the HDA attack. Our protocol ensures that smart meters periodically upload encrypted measurements to a (electricity) supplier/aggregator such that the aggregator is able to derive the aggregated statistics of all meter measurements but is unable to learn any information about the human activities. We present the formal security analysis for the proposed protocol to guarantee the strong privacy. Moreover, we evaluate the performance of our protocol in a Java-based implementation under different parameters. The performance and utility analysis shows that our protocol is simple, efficient, and practical.
引用
收藏
页码:598 / 607
页数:10
相关论文
共 23 条
[11]  
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
[12]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[13]   Secure Service Provision in Smart Grid Communications [J].
He, Daojing ;
Chen, Chun ;
Bu, Jiajun ;
Chan, Sammy ;
Zhang, Yan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) :53-61
[14]  
Kursawe K, 2011, LECT NOTES COMPUT SC, V6794, P175, DOI 10.1007/978-3-642-22263-4_10
[15]   A novel method to construct taxonomy of electrical appliances based on load signatures [J].
Lam, H. Y. ;
Fung, G. S. K. ;
Lee, W. K. .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2007, 53 (02) :653-660
[16]   Towards Optimal Electric Demand Management for Internet Data Centers [J].
Li, Jie ;
Li, Zuyi ;
Ren, Kui ;
Liu, Xue .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (01) :183-192
[17]   Multicast Authentication in the Smart Grid With One-Time Signature [J].
Li, Qinghua ;
Cao, Guohong .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :686-696
[18]   Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid [J].
Liu, Hong ;
Ning, Huansheng ;
Zhang, Yan ;
Yang, Laurence T. .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (04) :1722-1733
[19]   EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications [J].
Lu, Rongxing ;
Liang, Xiaohui ;
Li, Xu ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (09) :1621-1631
[20]   Accurate and large-scale privacy-preserving data mining using the election paradigm [J].
Magkos, Emmanouil ;
Maragoudakis, Manolis ;
Chrissikopoulos, Vassilis ;
Gritzalis, Stefanos .
DATA & KNOWLEDGE ENGINEERING, 2009, 68 (11) :1224-1236