AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (5 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy

School of Electronic, Electrical Engineering and Physics, Fujian University of Technology, Fuzhou 350118, China
Department of Computing Sciences at The College at Brockport, State University of New York, New York, NY 14420, USA
Show Author Information

Abstract

Under the general trend of the rapid development of smart grids, data security and privacy are facing serious challenges; protecting the privacy data of single users under the premise of obtaining user-aggregated data has attracted widespread attention. In this study, we propose an encryption scheme on the basis of differential privacy for the problem of user privacy leakage when aggregating data from multiple smart meters. First, we use an improved homomorphic encryption method to realize the encryption aggregation of users’ data. Second, we propose a double-blind noise addition protocol to generate distributed noise through interaction between users and a cloud platform to prevent semi-honest participants from stealing data by colluding with one another. Finally, the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy mechanism. Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.

References

[1]

M. Jusup, P. Holme, K. Kanazawa, M. Takayasu, I. Romić, Z. Wang, S. Gecek, T. Lipic, B. Podobnik, L. Wang, et al., Social physics, Phys. Rep., vol. 948, pp. 1–148, 2022.

[2]

D. Helbing, D. Brockmann, T. Chadefaux, K. Donnay, U. Blanke, O. Woolley-Meza, M. Moussaid, A. Johansson, J. Krause, S. Schutte, et al., Saving human lives: What complexity science and information systems can contribute, J. Stat. Phys., vol. 158, no. 3, pp. 735–781, 2015.

[3]

P. Kumar, Y. Lin, G. D. Bai, A. Paverd, J. S. Dong, and A. Martin, Smart grid metering networks: A survey on security, privacy and open research issues, IEEE Commun. Surv. Tut., vol. 21, no. 3, pp. 2886–2927, 2019.

[4]

Z. Tari, Security and privacy in cloud computing, IEEE Cloud Comput., vol. 1, no. 1, pp. 54–57, 2014.

[5]

J. Zhou, Z. F. Cao, X. L. Dong, and A. V. Vasilakos, Security and privacy for cloud-based IoT: Challenges, IEEE Commun. Mag., vol. 55, no. 1, pp. 26–33, 2017.

[6]

Z. Tari, X. Yi, U. S. Premarathne, P. Bertok, and I. Khalil, Security and privacy in cloud computing: Vision, trends, and challenges, IEEE Cloud Comput., vol. 2, no. 2, pp. 30–38, 2015.

[7]
S. J. Mohammed and D. B. Taha, Performance evaluation of RSA, ElGamal, and Paillier partial homomorphic encryption algorithms, in 2022 Int. Conf. Computer Science and Software Engineering (CSASE ), Duhok, Iraq, 2022, pp. 89–94.
[8]
C. Dwork, Differential privacy, in Proc. 33rd Int. Colloquium on Automata, Languages, and Programming, Berlin, Germany, 2006, pp. 1–12.
[9]

L. Sweeney, K-anonymity: A model for protecting privacy, Int. J. Uncertain. Fuzz. Knowl. Based Syst., vol. 10, no. 5, pp. 557–570, 2002.

[10]

L. Sweeney, Achieving K-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzz. Knowl. Based Syst., vol. 10, no. 5, pp. 571–588, 2002.

[11]

C. M. Yu, C. Y. Chen, S. Y. Kuo, and H. C. Chao, Privacy-preserving power request in smart grid networks, IEEE Syst. J., vol. 8, no. 2, pp. 441–449, 2014.

[12]

S. Zhang, Y. Zhao, and B. Wang, Certificateless ring signcryption scheme for preserving user privacy in smart grid, Automat. Electr. Power Syst., vol. 42, no. 3, pp. 118–135, 2018.

[13]

L. Chen, R. Lu, and Z. Cao, PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for Smart Grid communications, Peer-to-Peer Netw. Appl., vol. 8, no. 6, pp. 1122–1132, 2015.

[14]
F. D. Garcia and B. Jacobs, Privacy-friendly energy-metering via homomorphic encryption, in Proc. 6 th Int. Workshop on Security and Trust Management, J. Cuellar, J. Lopez, G. Barthe, and A. Pretschner, eds. Athens, Greece: Springer, 2010, pp. 226–238.
[15]
J. Ni, K. Zhang, X. Lin, and X. S. Shen, EDAT: Efficient data aggregation without TTP for privacy-assured smart metering, in Proc. 2016 IEEE Int. Conf. Communications (ICC ), Kuala Lumpur, Malaysia, 2016, pp. 1–6.
[16]

D. He, N. Kumar, S. Zeadally, A. Vinel, and L. T. Yang, Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries, IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2411–2419, 2017.

[17]
G. Ács and C. Castelluccia, I have a dream! (differentially private smart metering), in Proc. 13 th Int. Workshop on Information Hiding, T. Filler, T. Pevný, S. Craver, and A. Ker, eds. Prague, Czech Republic: Springer, 2011, pp. 118–132.
[18]
M. Jawurek and F. Kerschbaum, Fault-tolerant privacy-preserving statistics, in Proc. 12 th Int. Symp. Privacy Enhancing Technologies Symp., S. Fischer-Hübner and M. Wright, eds. Vigo, Spain: Springer, 2012, pp. 221–238.
[19]
T. H. H. Chan, E. Shi, and D. Song, Privacy-preserving stream aggregation with fault tolerance, in Proc. 16 th Int. Conf. Financial Cryptography and Data Security, A. D. Keromytis, ed. Kralendijk, the Netherlands: Springer, 2012, pp. 200–214.
[20]

H. Bao and R. Lu, A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance, Peer-to-Peer Netw. Appl., vol. 10, no. 1, pp. 106–121, 2017.

[21]

H. Liu, J. Chen, L. Lin, A. Ye, and C. Huang, An efficient and privacy-preserving data aggregation scheme supporting arbitrary statistical functions in IoT, China Commun., vol. 19, no. 6, pp. 91–104, 2022.

[22]
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Proc. Int. Conf. Theory and Application of Cryptographic Techniques on Advances in Cryptology-EUROCRYPT’99, Prague, Czech Republic, 1999, pp. 223–238.
[23]
C, Dwork, The promise of differential privacy: A tutorial on algorithmic techniques, in Proc. 52 nd Annual Symp. Foundations of Computer Science, Palm Springs, CA, USA, 2011, pp. 1–2.
[24]

F. Kemp, The Laplace distribution and generalizations: A revisit with applications to communications, economics, engineering, and finance, J. Roy. Stat. Soc. Ser. D Stat., vol. 52, no. 4, pp. 698–699, 2003.

[25]
V. Bindschaedler, S. Rane, A. E. Brito, R. Alejandro, V. Rao, and E. Uzun, Achieving differential privacy in secure multiparty data aggregation protocols on star networks, in Proc. Seventh ACM on Conf. Data and Application Security and Privacy, Scottsdale, AZ, USA, 2017, pp. 115–125.
[26]
D. Engel, Wavelet-based load profile representation for smart meter privacy, in Proc. 2013 IEEE PES Innovative Smart Grid Technologies, Washington, DC, USA, 2013, pp. 1–6.
[27]

Z. Shi, R. Sun, R. Lu, L. Chen, J. Chen, and X. S. Shen, Diverse grouping-based aggregation protocol with error detection for smart grid communications, IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 2856–2868, 2015.

Big Data Mining and Analytics
Pages 131-141
Cite this article:
Yan R, Zheng Y, Yu N, et al. Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy. Big Data Mining and Analytics, 2024, 7(1): 131-141. https://doi.org/10.26599/BDMA.2023.9020008

660

Views

107

Downloads

1

Crossref

1

Web of Science

3

Scopus

0

CSCD

Altmetrics

Received: 31 October 2022
Revised: 25 April 2023
Accepted: 26 April 2023
Published: 25 December 2023
© The author(s) 2023.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return