Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments

被引:10
作者
Wang, Jingyu [1 ,2 ]
Shi, Dongyuan [1 ,2 ]
Chen, Jinfu [1 ,2 ]
Liu, Chen-Ching [3 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Elect Power Secur & High Efficiency Key Lab, State Key Lab Adv Electromagnet Engn & Technol, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Elect & Elect Engn, Wuhan 430074, Peoples R China
[3] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Power systems; State estimation; Privacy; Encryption; Servers; Cloud computing; hierarchical state estimation; privacy preservation; thresholded Paillier cryptosystem; untrustworthy environment;
D O I
10.1109/TSG.2020.3023891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hierarchical state estimation (HSE) is often deployed to evaluate the states of an interconnected power system from telemetered measurements. By HSE, each low-level control center (LCC) takes charge of the estimation of its internal states, whereas a trusted high-level control center (HCC) assumes the coordination of boundary states. However, a trusted HCC may not always exist in practice; a cloud server can take the role of an HCC in case no such facility is available. Since it is prohibited to release sensitive power grid data to untrustworthy cloud environments, considerations need to be given to avoid breaches of LCCs' privacy when outsourcing the coordination tasks to the cloud server. To this end, this article proposes a privacy-preserving HSE framework, which rearranges the regular HSE procedure to integrate a degree-2 variant of the Thresholded Paillier Cryptosystem (D2TPC). Attributed to D2TPC, computations by the cloud-based HCC can be conducted entirely in the ciphertext space. Even if the HCC and some LCCs conspire together to share the information they have, the privacy of non-conspiring LCCs is still assured. Experiments on various scales of test systems demonstrate a high level of accuracy, efficiency, and scalability of the proposed framework.
引用
收藏
页码:1541 / 1551
页数:11
相关论文
共 50 条
[41]   Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing [J].
Gai, Keke ;
Qiu, Meikang ;
Zhao, Hui .
IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) :678-688
[42]   Privacy-Preserving Protocol for Data Stored in the Cloud [J].
Hongyi Su Geng Yang Dawei Li (College of Computer Science .
ZTECommunications, 2011, 9 (02) :36-38
[43]   Research on Privacy-Preserving Technology for Cloud Computing [J].
Wang, Xiaolong .
PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 :636-639
[44]   A Privacy-preserving Incentive Framework for the Vehicular Cloud [J].
Alamer, Abdulrahman ;
Basudan, Sultan ;
Lin, Xiaodong .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :435-441
[45]   A privacy-preserving bucket partition mechanism in cloud [J].
Zhang H. ;
Huang T. ;
Liu S.-Y. ;
Wang L.-N. .
Huang, Tao (tmht@mail.ccnu.edu.cn), 1600, Science Press (39) :429-440
[46]   VPPFL: Verifiable Privacy-Preserving Federated Learning in Cloud Environment [J].
Wang, Huiyong ;
Yang, Tengfei ;
Ding, Yong ;
Tang, Shijie ;
Wang, Yujue .
IEEE ACCESS, 2024, 12 :151998-152008
[47]   Efficient and privacy-preserving biometric identification in cloud [J].
Hahn, Changhee ;
Hur, Junbeom .
ICT EXPRESS, 2016, 2 (03) :135-139
[48]   CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud [J].
Wang, Qian ;
Hu, Shengshan ;
Ren, Kui ;
He, Meiqi ;
Du, Minxin ;
Wang, Zhibo .
COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 :186-205
[49]   Privacy-Preserving Access Control Model for Big Data Cloud [J].
Fugkeaw, Somchart ;
Sato, Hiroyuki .
2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, :130-135
[50]   Privacy-Preserving Outsourced Collaborative Frequent Itemset Mining in the Cloud [J].
Samanthula, Bharath K. .
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, :4827-4829