Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments

被引:9
作者
Wang, Jingyu [1 ,2 ]
Shi, Dongyuan [1 ,2 ]
Chen, Jinfu [1 ,2 ]
Liu, Chen-Ching [3 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Elect Power Secur & High Efficiency Key Lab, State Key Lab Adv Electromagnet Engn & Technol, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Elect & Elect Engn, Wuhan 430074, Peoples R China
[3] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Power systems; State estimation; Privacy; Encryption; Servers; Cloud computing; hierarchical state estimation; privacy preservation; thresholded Paillier cryptosystem; untrustworthy environment;
D O I
10.1109/TSG.2020.3023891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hierarchical state estimation (HSE) is often deployed to evaluate the states of an interconnected power system from telemetered measurements. By HSE, each low-level control center (LCC) takes charge of the estimation of its internal states, whereas a trusted high-level control center (HCC) assumes the coordination of boundary states. However, a trusted HCC may not always exist in practice; a cloud server can take the role of an HCC in case no such facility is available. Since it is prohibited to release sensitive power grid data to untrustworthy cloud environments, considerations need to be given to avoid breaches of LCCs' privacy when outsourcing the coordination tasks to the cloud server. To this end, this article proposes a privacy-preserving HSE framework, which rearranges the regular HSE procedure to integrate a degree-2 variant of the Thresholded Paillier Cryptosystem (D2TPC). Attributed to D2TPC, computations by the cloud-based HCC can be conducted entirely in the ciphertext space. Even if the HCC and some LCCs conspire together to share the information they have, the privacy of non-conspiring LCCs is still assured. Experiments on various scales of test systems demonstrate a high level of accuracy, efficiency, and scalability of the proposed framework.
引用
收藏
页码:1541 / 1551
页数:11
相关论文
共 50 条
  • [21] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11460 - 11472
  • [22] Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3478 - 3493
  • [23] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [24] A Privacy-Preserving Learning Framework for Face Recognition in Edge and Cloud Networks
    Wang, Yitu
    Nakachi, Takayuki
    IEEE ACCESS, 2020, 8 : 136056 - 136070
  • [25] Privacy-preserving identity federations in the cloud: A proof of concept
    Dos Santos, D.R. (danielrs@inf.ufsc.br), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 1 - 11
  • [26] Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes
    Guo, Yu
    Wang, Mingyue
    Wang, Cong
    Yuan, Xingliang
    Jia, Xiaohua
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5359 - 5370
  • [27] A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2198 - 2210
  • [28] On Optimal Privacy-Preserving Transmission Schedule for Remote State Estimation in the Presence of an Eavesdropper
    Wang, Le
    Cao, Xianghui
    2019 1ST INTERNATIONAL CONFERENCE ON INDUSTRIAL ARTIFICIAL INTELLIGENCE (IAI 2019), 2019,
  • [29] Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys
    Rong, Hong
    Wang, Huimei
    Huang, Kun
    Liu, Jian
    Xian, Ming
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016, 2016, 9937 : 248 - 258
  • [30] Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys
    Rong, Hong
    Wang, Hui-Mei
    Liu, Jian
    Xian, Ming
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 635 - 652