Abstract
Apropos to communication in conventional computer network or in electronics, in electrical field, the smart grid is the approach to transfer the electricity through distribution of network. It not only improves the security, reliability of electric system but also the communication of it too. Recently J Hur in IEEE Tran. on Smart Grid proposed an approach to provide an efficient and secure scheme in smart grid using attribute based analogy. The author claim that the proposed scheme is also provide the receiver anonymity which is one of the crucial feature of smart grid. However, in this paper, we claim that the scheme presented by Hur, fails to provide receiver anonymity as well as it is susceptible to the key escrow attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11), 2171–2180 (2013)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334 (2007)
Vijayanand, R., Devaraj, D., Kannapiran, B.: A novel dual euclidean algorithm for secure data transmission in smart grid system. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–5. (2014)
Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-Grid security issues. IEEE Secur. Priv. 8(1), 81–85 (2010)
Kim, Y., Thottan, M., Kolesnikov, V., Lee, W.: A secure decentralized data-centric information infrastructure for smart grid. IEEE Comm. Mag. 48(11), 58–65 (2010)
Bobba, R., Khurana, H., AlTurki, M., Ashraf, F.: PBES: A policy based encryption system with application to data sharing in the power grid. In: Proceedings of the International Symposium on Information, Computer, and Communications Security (ASIACCS 2009) (2009)
The Cyber Security Coordination Task Group: Smart grid cyber security strategy and requirements. NIST Technical Report Draft NISTIR 7628 (2009, Sept)
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456–465 (2007)
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute-based encryption. In: Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP), pp. 579–591 (2008)
Liang, X., Cao, Z., Lin, H., Xing, D.: Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the International Symposium Information, Computer, and Communications Security (ASIACCS), pp. 343–352 (2009)
Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: Proceedings of the Workshop Secure Network Protocols, pp. 39–44 (2008)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structure. In: Proceedings of the Sixth International Conference on Applied Cryptography and Network Security (ACNS 2008), pp. 111–129 (2008)
Boneh, D., DiCrescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceeding of the Theory and Applications of Cryptographic Techniques Annual International Conference on Advances in Cryptology (Eurocrypt 2004), pp. 506–522 (2004)
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Proceedings of the Annual International Cryptology Conference Advances in Cryptology (CRYPTO 2001), pp. 213–229 (2001)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the Theory of Cryptography Conference (TCC 2007), pp. 535–554 (2007)
Boyen, X.: A tapestry of identity-based encryption: practical frameworks compared. Int. J. Appl. Cryptogr. 1, 3–21 (2008)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In Proceedings of the Privacy Enhancing Technologies Symposium, pp. 95–112 (2007)
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology (EUROCRYPT 2008), pp. 146–162 (2008)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the Theory and Applications of Cryptographic Techniques Annual International Conference on Advances in Cryptology (EUROCRYPT 2010), pp. 62–91 (2010)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the ACM Conference on Computer and Communication Security, pp. 195–203 (2007)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the Theory and Applications of Cryptographic Techniques Annual International Conferrence Advances in Cryptology (Eurocrypt), pp. 457–473 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Doshi, N. (2019). Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT. In: Vasant, P., Zelinka, I., Weber, GW. (eds) Intelligent Computing & Optimization. ICO 2018. Advances in Intelligent Systems and Computing, vol 866. Springer, Cham. https://doi.org/10.1007/978-3-030-00979-3_54
Download citation
DOI: https://doi.org/10.1007/978-3-030-00979-3_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00978-6
Online ISBN: 978-3-030-00979-3
eBook Packages: EngineeringEngineering (R0)