Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System

被引:11
作者
Wen, Mi [1 ]
Chen, Shan [1 ]
Lu, Rongxing [2 ]
Li, Beibei [3 ]
Chen, Sijia [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 200090, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Sichuan, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
CP-ABE scheme; fog computing; revocation; smart grid; IDENTITY-BASED ENCRYPTION; INTERNET;
D O I
10.1109/ACCESS.2019.2942414
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of smart grids, plentiful of smart devices have been put into use, such as smart meters and power assets. Due to limited computation capabilities and storage spaces of these devices, the collected data need to be "outsourced" towards the data server for processing and storage. The data owners, therefore, lose direct control over these "outsourced" data, leading to significant security issues of the users' data. In this paper, aiming at solving this problem, we propose a multi-authority Ciphertext Policy Attribute-based Encryption (CP-ABE) scheme with revocation for the fog-based smart grid system. Specifically, in order to achieve attribute revocation without requiring users to be always online, we use the DH (Diffie-Hellman) tree to distribute the group key statelessly, which also solves the problem of collusion attack initiated by revoked user and valid user. To improve security of our proposed scheme, we remove the trusted key authority (KA) by using a secure two-party computation (2PC) protocol between the KA and the cloud service provider to generate user private key. To improve efficiency of our proposed scheme, we combine user and attribute revocation, and outsource complex calculations to fog nodes. Furthermore, our proposed scheme uses attribute group key and leaf private key together to protect user proxy key, which reduces the storage overhead of the system and improves the security. Both security analysis and experimental results demonstrate that our proposed scheme can balance the security objectives with the efficiency.
引用
收藏
页码:137968 / 137981
页数:14
相关论文
共 50 条
[21]   Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid [J].
Sonker, Sanjay Kumar ;
Raina, Vibha Kaw ;
Sagar, Bharat Bhushan ;
Bansal, Ramesh C. .
ELECTRICAL ENGINEERING, 2024, 106 (02) :1339-1355
[22]   A Fog-Based Recommender System [J].
Wang, Xiaodong ;
Gu, Bruce ;
Ren, Yongli ;
Ye, Wenjie ;
Yu, Shui ;
Xiang, Yong ;
Gao, Longxiang .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02) :1048-1060
[23]   Fog-Based Internet of Things: A Security Scheme [J].
Alhazmi, Omar H. ;
Aloufi, Khalid S. .
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
[24]   A fog-based hybrid intelligent system for energy saving in smart buildings [J].
Alessandra De Paola ;
Pierluca Ferraro ;
Giuseppe Lo Re ;
Marco Morana ;
Marco Ortolani .
Journal of Ambient Intelligence and Humanized Computing, 2020, 11 :2793-2807
[25]   Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing [J].
Shruti ;
Rani, Shalli ;
Shabaz, Mohammad ;
Dutta, Ashit Kumar ;
Ahmed, Emad A. .
ALEXANDRIA ENGINEERING JOURNAL, 2024, 102 :66-74
[26]   Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications [J].
Yu, Yong ;
Xue, Liang ;
Li, Yannan ;
Du, Xiaojiang ;
Guizani, Mohsen ;
Yang, Bo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4538-4547
[27]   FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities [J].
Alrashdi, Ibrahim ;
Alqazzaz, Ali ;
Alharthi, Raed ;
Aloufi, Esam ;
Zohdy, Mohamed A. ;
Ming, Hua .
2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, :515-522
[28]   Design of Fog-Based Warehouse Environment Monitoring System [J].
Wei, Xuejiang ;
Wang, Meng .
ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION III, 2020, 1126 :451-460
[29]   Smart Grid Borderless Access Control Technology based on network security situational awareness [J].
Xie, Ming .
ENERGY REPORTS, 2022, 8 :415-423
[30]   A Fog Computing Based Smart Grid Model [J].
Okay, Feyza Yildirim ;
Ozdemir, Suat .
2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,