Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids
Abstract
:1. Introduction
- For the different forms of modular exponentiation operation in some data encryption and aggregation protocols, we respectively propose two different outsourcing algorithms. The first outsourcing algorithm can solve modular exponentiation with a fixed base and a variable exponent. The second outsourcing algorithm can solve modular exponentiation with a variable base and exponent. Both of these two outsourcing algorithms can protect the privacy of user’s data by logic division and the Euler theorem;
- The two outsourcing algorithms ensure that a SM can verify the correctness of the returned results. In the first algorithm, an SM can detect a server’s malicious behavior with a probability of 19/20. In the second algorithm, incorrect results from a malicious server can be detected by an SM with a probability of 59/60;
- The two outsourcing algorithms only need one round of communication between the server and SM. Through systematic analysis, we can prove that the proposed algorithms satisfy all security requirements including privacy, verifiability, and efficiency. In addition, we carry out a comprehensive experiment to demonstrate that the proposed algorithms are efficient.
2. Related Work
2.1. Privacy-Preserving Algorithms for Smart Gird
2.2. Outsourcing Algorithms for Modular Exponentiation
3. System Model and Definition
3.1. System Model and Threat Model
- SM: The main function of SMs is to continuously collect various electricity consumption information and other identity information of users, such as the user’s name and location. The SM periodically encrypts the collected data by the modular exponentiation operations and sends it to the GW;
- GW: The main function of a GW is to verify the legitimacy of the received messages and aggregate data reported by multiple SMs. Then, the GW sends the results after aggregation to the CC;
- CC: The main function of a CC is to generate system parameters. When a new device (SM or GW) is connected to the grid network, it will be authenticated by a CC. In addition, a CC can verify the legitimacy of the received messages from SMs and GWs.
- MS: The main function of a MS is to help a SM complete the corresponding complex computation tasks. The SM sends the time-consuming computation tasks to the MS, and the MS returns a correct result to the SM. The MS only communicates with the SM. There is no communication channel between the MS and the GW (or CC).
3.2. Rand Algorithm
3.3. General Framework
- Pre-computation: The SM computes some static parameters in advance to speed up the execution efficiency of algorithms;
- Problem transformation: At the stage of problem transformation, the SM encrypts the computation input x into a public value and stores a secret value locally, which can be used for decryption and verification of the results. Then, the SM sends the computation task F and the public value to the MS;
- Server computation: Based on the received computation task and the value , the MS solves the transformed problem and returns the corresponding result to the SM;
- Result verification: At the stage of result verification, the SM verifies the validity the result based on the stored ;
- Result recovery: If the result successfully passes the verification, the SM decrypts and obtains the real result y.
3.4. Security Requirements
- is the honest and secret input, which is only known to T;
- is the honest and protected input, which is known to T and E, but not to ;
- is the honest and unprotected input, which is known to T, E and ;
- is the adversarial and protected input, which is known to T and E, but not to ;
- is the adversarial and unprotected input, which is known to T, E and .
- is the secret output, which is only known to T;
- is the protected output, which is known to T and E, but not to ;
- is the unprotected output, which is known to T, E and .
4. Algorithm
4.1. Overview of Zuo’s Algorithm
- System Initialization: CC firstly generates a series of system parameters , where G and are the multiplicative cyclic group of a large secure prime p, g is a generator of G, e is a bilinear map: , H is a one-way hash function: , is the public key of CC, and are the superincreasing sequences, and are the k range values of power consumption.
- Registration: All and GW register with CC. chooses a random number and computes the public key and the signature , where is the identity of the user and is the current timestamp. Then, sends to the CC. The CC verifies if holds. Once the equation is established, it means that the registration is successful. The registration progress of the GW is similar. The GW randomly chooses a number and computes the public key .
- Generation of Common Public Key: Each broadcasts its public key and verifies the validity of other public keys from other SMs. Then, computes the common public key as follows:
- Encryption of User Data: Each collects w dimensions of power consumption . is the total power consumption data of each user. If , chooses a random number and computes the corresponding ciphertext based on the common public key and , where and .computes its own signature as follows:sends to the GW.
- Data Aggregation: The GW firstly checks the timestamp and verifies the validity of n signatures. After successful verification, the GW computes the aggregated ciphertext and its own signature . The GW sends , to the CC.
- Decryption of aggregation Data: The CC firstly checks the timestamp and verifies the signature. Each is required to provide and signature to the CC.
4.2. Description of Outsourcing Algorithms
- 1.
- Pre-computation: The SM chooses and . Then, The SM computes and .
- 2.
- Problem transformation: The SM chooses and . Then, the SM computes and . The SM computes and .
- 3.
- Server computation: The MS computes and .
- 4.
- Result verification: The SM can verify the following equation:
- 5.
- Result recovery: The SM can recover the real result .
Algorithm 1 Secure Outsourcing of Modular Exponentiation with Public Base and Secret Exponent (Fixed Base) |
|
- 1.
- Pre-computation: The SM chooses , , , , , . Then, SM computes , , , , , .
- 2.
- Problem transformation: The SM chooses , and . Then, the SM computes and . The SM computes , , and .
- 3.
- Server computation: The MS computes , , and .
- 4.
- Result verification: The SM can verify the following equation:
- 5.
- Result recovery: The SM can recover the real result .
Algorithm 2 Secure Outsourcing of Modular Exponentiation with Secret Base and Exponent (Variable Base) |
|
5. Security and Complexity Analysis
5.1. Security Analysis
5.2. Verifiability Analysis
5.3. Complexity Analysis
6. Evaluation
6.1. Numeric Analysis
6.2. Performance Evaluation
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart Grid—The New and Improved Power Grid: A Survey. IEEE Commun. Surv. Tutor. 2012, 14, 944–980. [Google Scholar] [CrossRef]
- Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart Grid Technologies: Communication Technologies and Standards. IEEE Trans. Ind. Inform. 2011, 7, 529–539. [Google Scholar] [CrossRef] [Green Version]
- Yu, L.; Jiang, T.; Zou, Y. Distributed Online Energy Management for Data Centers and Electric Vehicles in Smart Grid. IEEE Internet Things J. 2016, 3, 1373–1384. [Google Scholar] [CrossRef]
- Iyer, S. Cyber security for smart grid, cryptography, and privacy. Int. J. Digit. Multimed. Broadcast. 2011, 2011, 1–8. [Google Scholar] [CrossRef] [Green Version]
- Dwivedi, A.D.; Singh, R.; Ghosh, U.; Mukkamala, R.R.; Tolba, A.; Said, O. Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things. J. Ambient. Intell. Humaniz. Comput. 2021, 1–11. [Google Scholar] [CrossRef]
- Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 2022, 22, 1448. [Google Scholar] [CrossRef]
- Gope, P.; Sikdar, B. Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Trans. Smart Grid 2019, 10, 3953–3962. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment. IEEE Trans. Ind. Inform. 2017, 13, 3144–3153. [Google Scholar] [CrossRef]
- Ding, Y.; Wang, B.; Wang, Y.; Zhang, K.; Wang, H. Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid. IEEE Trans. Ind. Inform. 2020, 16, 6607–6616. [Google Scholar] [CrossRef]
- He, D.; Kumar, N.; Zeadally, S.; Vinel, A.; Yang, L.T. Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries. IEEE Trans. Smart Grid 2017, 8, 2411–2419. [Google Scholar] [CrossRef]
- Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Cyber Security for Smart Grid Communications. IEEE Commun. Surv. Tutor. 2012, 14, 998–1010. [Google Scholar] [CrossRef] [Green Version]
- Zuo, X.; Li, L.; Peng, H.; Luo, S.; Yang, Y. Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Syst. J. 2020, 15, 395–406. [Google Scholar] [CrossRef]
- Peng, C.; Luo, M.; Wang, H.; Khan, M.K.; He, D. An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 2021, 9, 589–600. [Google Scholar] [CrossRef]
- Boudia, O.R.M.; Senouci, S.M.; Feham, M. Elliptic curve-based secure multidimensional aggregation for smart grid communications. IEEE Sens. J. 2017, 17, 7750–7757. [Google Scholar] [CrossRef]
- Atallah, M.J.; Frikken, K.B. Securely Outsourcing Linear Algebra Computations. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’10, Beijing, China, 13–16 April 2010; pp. 48–59. [Google Scholar]
- Li, H.; Yu, J.; Yang, M.; Kong, F. Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things. IEEE Internet Things J. 2022, 9, 8737–8748. [Google Scholar] [CrossRef]
- Ren, K.; Wang, C.; Wang, Q. Security Challenges for the Public Cloud. IEEE Internet Comput. 2012, 16, 69–73. [Google Scholar] [CrossRef]
- Munoz, A.; Mafia, A. Software and hardware certification techniques in a combined certification model. In Proceedings of the 2014 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, 28–30 August 2014; pp. 1–6. [Google Scholar]
- Gao, X.; Yu, J.; Chang, Y.; Wang, H.; Fan, J. Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword with Sensitive Information Privacy for Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 2021, 1. [Google Scholar] [CrossRef]
- Ge, X.; Yu, J.; Zhang, H.; Bai, J.; Fan, J.; Xiong, N.N. SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT. IEEE Trans. Syst. Man, Cybern. Syst. 2022, 52, 136–150. [Google Scholar] [CrossRef]
- Li, S.; Xue, K.; Yang, Q.; Hong, P. PPMA: Privacy-preserving multisubset data aggregation in smart grid. IEEE Trans. Ind. Inform. 2017, 14, 462–471. [Google Scholar] [CrossRef]
- Lu, R.; Liang, X.; Li, X.; Lin, X.; Shen, X. EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1621–1631. [Google Scholar]
- Saxena, N.; Choi, B.; Lu, R. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2016, 11, 907–921. [Google Scholar] [CrossRef] [Green Version]
- Sun, R.; Shi, Z.; Lu, R.; Lu, M.; Shen, X.S. APED: An efficient aggregation protocol with error detection for smart grid communications. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 432–437. [Google Scholar]
- Shi, Z.; Sun, R.; Lu, R.; Chen, L.; Chen, J.; Shen, X.S. Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications. IEEE Trans. Smart Grid 2015, 6, 2856–2868. [Google Scholar] [CrossRef]
- Bao, H.; Lu, R. A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications. IEEE Internet Things J. 2015, 2, 248–258. [Google Scholar] [CrossRef]
- Guo, C.; Jiang, X.; Choo, K.; Tang, X.; Zhang, J. Lightweight privacy preserving data aggregation with batch verification for smart grid. Future Gener. Comput. Syst. 2020, 112, 512–523. [Google Scholar] [CrossRef]
- Gai, K.; Wu, Y.; Zhu, L.; Qiu, M.; Shen, M.S. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid. IEEE Trans. Ind. Inform. 2019, 15, 3548–3558. [Google Scholar] [CrossRef]
- Gough, M.; Santos, S.; Alskaif, T.; Javadi, M.; Castro, R.; Catalao, J.P.S. Preserving Privacy of Smart Meter Data in a Smart Grid Environment. IEEE Trans. Ind. Inform. 2022, 18, 707–718. [Google Scholar] [CrossRef]
- Hohenberger, S.; Lysyanskaya, A. How to Securely Outsource Cryptographic Computations. In Proceedings of the International Conference on Theory of Cryptography, Cambridge, MA, USA, 10–12 February 2005; pp. 264–282. [Google Scholar]
- Chen, X.; Li, J.; Ma, J.; Tang, Q.; Lou, W. New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2386–2396. [Google Scholar] [CrossRef] [Green Version]
- Ye, J.; Chen, X.; Ma, J. An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. In Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, Korea, 24–27 March 2015; pp. 73–76. [Google Scholar]
- Wang, Y.; Wu, Q.; Wong, D.S.; Qin, B.; Chow, S.S.M.; Liu, Z.; Tan, X. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. In Proceedings of the European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11 September 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 326–343. [Google Scholar]
- Ren, Y.; Dong, M.; Qian, Z.; Zhang, X.; Feng, G. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. IEEE Trans. Cloud Comput. 2021, 9, 145–154. [Google Scholar] [CrossRef]
- Zhou, K.; Afifi, M.H.; Ren, J. ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2518–2531. [Google Scholar] [CrossRef]
- Li, H.; Yu, J.; Zhang, H.; Yang, M.; Wang, H. Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. IEEE Internet Things J. 2020, 7, 8769–8779. [Google Scholar] [CrossRef]
- Chen, X.; Huang, X.; Li, J.; Ma, J.; Lou, W.; Wong, D.S. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 2015, 10, 69–78. [Google Scholar] [CrossRef]
- Nguyen, P.Q.; Shparlinski, I.E.; Stern, J. Distribution of Modular Sums and the Security of the Server Aided Exponentiation. In Cryptography and Computational Number Theory; Birkhäuser: Basel, Switzerland, 2001; pp. 331–342. [Google Scholar]
- Gennaro, R.; Gentry, C.; Parno, B. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In Advances in Cryptology—CRYPTO 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 465–482. [Google Scholar]
- Muñoz, A.; Maña, A.; Serrano, D. AVISPA in the validation of ambient intelligence scenarios. In Proceedings of the 2009 International Conference on Availability, Reliability and Security, Jukuoka, Japan, 16–19 March 2009; pp. 420–426. [Google Scholar]
- Ye, J.; Wang, J. Secure outsourcing of modular exponentiation with single untrusted server. In Proceedings of the 2015 18th International Conference on Network-Based Information Systems, Taipei, Taiwan, 2–4 September 2015; pp. 643–645. [Google Scholar]
- Kiraz, M.S.; Uzunkol, O. Efficient and verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 2016, 15, 519–537. [Google Scholar] [CrossRef] [Green Version]
Algorithm | Data Type | Technique | Trusted Authority | Lightweight |
---|---|---|---|---|
Li [21] | One-dimensional | Paillier | Yes | No |
Lu [22] | Multi-dimensional | Paillier | Yes | No |
Boudia [14] | Multi-dimensional | Elliptic curve | Yes | No |
Our | Multi-dimensional | Paillier | No | Yes |
Communication Overhead | Offline | Online | Storage Space Overhead | |
---|---|---|---|---|
Algorithm 1 | ||||
Algorithm 2 |
Bit Length | u | a | s | p |
---|---|---|---|---|
256 | 597974957066362 8312108786874212 0805637125244242 2833798526287842 0394720897670892 71 | 7783106559391062 8582374740114662 1029621475861472 9700109390341782 4734058418115822 47 | 1086409120439892 6481456366616012 5750177785808122 7384531935993452 1304955239068542 937 | 8269790490761102 2215644205306412 5187816705842742 7370829104058312 0118723036268882 41 |
512 | 754387404285988 120826742806315 691191408511373 747561289674705 476743950894451 122497539359176 804470461882150 746408475691612 284449585981855 155202044474843 8435 | 750582098634835 192302082996469 078517856339381 182246653167329 120531958754792 548491295132292 354230821822750 054928738939141 913001392109008 976698721435666 8809 | 861478175873681 674678195073537 115352012738288 372116893103864 237840006599576 717793500595767 387060711833362 282500403261748 910719236579350 879254393697362 30279 | 783792629876206 141918443009719 853359141243678 662806276651199 939579569239026 298451825126212 286804347962362 175060120125548 509155767187344 027224581929964 0811 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhai, F.; Yang, T.; Zhao, B.; Chen, H. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids. Sensors 2022, 22, 4365. https://doi.org/10.3390/s22124365
Zhai F, Yang T, Zhao B, Chen H. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids. Sensors. 2022; 22(12):4365. https://doi.org/10.3390/s22124365
Chicago/Turabian StyleZhai, Feng, Ting Yang, Bing Zhao, and Hao Chen. 2022. "Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids" Sensors 22, no. 12: 4365. https://doi.org/10.3390/s22124365
APA StyleZhai, F., Yang, T., Zhao, B., & Chen, H. (2022). Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids. Sensors, 22(12), 4365. https://doi.org/10.3390/s22124365