Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications

被引:7
作者
Dong, Xiaolei [1 ]
Zhou, Jun [1 ]
Cao, Zhenfu [1 ]
机构
[1] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
privacy preservation; data aggregation; smart grid; SCHEME; SECURE;
D O I
10.1002/cpe.3570
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart grid is ever-increasingly adopted by nations and governments for its grand development with the underlying technologies of power management and information communications. The real-time electricity usage can be monitored and aggregated by the smart meters deployed in the household for further analysis, control, and pricing. However, the existing solutions mainly depend on Paillier's additive homomorphic encryptions taking high computational complexity, and the aggregation mainly focused on the time series data generated by one single user. In this paper, we propose an efficient privacy-preserving temporal and spacial data aggregation from one-way functions in smart grid communications, which also allows spacial data aggregation from multiple users. The proposed construction can guarantee the unconditional security of users' metering power data privacy from the community gateway and the operation center, and the Adaptive Chosen Ciphertext Attack (CCA2) security of the aggregation result that can only be accessed by the authorized operating center. Both temporal and spacial data aggregation only require computing the underlying one-way function once. The formal security proof and performance evaluations demonstrate the efficiency and the practicability of our scheme. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:1145 / 1160
页数:16
相关论文
共 25 条
[1]  
[Anonymous], 2013, P 8 INT C BOD AR NET, P488, DOI DOI 10.4108/ICST.BODYNETS.2013.253731
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]   Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :180-187
[4]  
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[5]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[6]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[7]  
Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
[8]  
Dong XL, 2014, IEEE GLOB COMM CONF, P4720
[9]  
Erkin Zekeriya, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P561, DOI 10.1007/978-3-642-31284-7_33
[10]  
Fee GJ, CRYPTOGRAPHY USING C