Skip to main content

Hybrid Encryption Scheme for Secure Storage of Smart Grid Data

  • Conference paper
  • First Online:
Smart Grid and Internet of Things (SGIoT 2020)

Abstract

The wide application of smart grid improves the energy utilization rate and improves the power market, but at the same time, it also introduces many security problems, such as data storage, transmission, theft and other security problems in the process of smart grid data communication. Due to the special position of power system, how to ensure the security of data storage in smart grid is of great significance for the safe and stable operation of power grid system. This paper first analyzes the smart grid and its data characteristics, combined with the relevant technologies of cloud computing, gives a data security storage model of smart grid to strengthen the reliability and storage capacity of smart grid. Then, in order to ensure the security of user data storage in the cloud in smart grid, this paper studies the data encryption algorithm, and proposes a hybrid encryption scheme for smart grid data security storage. Finally, the scheme is compared with the traditional method. The experimental results show that the scheme has the advantages of good encryption and decryption effect, fast execution speed and high security. It is an ideal scheme for smart grid data security storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rajagopalan, S.R., Sankar, L., Mohajer, S., et al.: Smart meter privacy: a utility-privacy framework. In: IEEE International Conference on Smart Grid Communications 2011, Brussels, Belgium, pp. 190–195. IEEE (2011)

    Google Scholar 

  2. Lu, Z., Lu, X., Wang, W., et al.: Review and evaluation of security threats on the communication networks in the smart grid. In: Military Communications Conference 2010, San Jose, pp. 1830–1835. IEEE (2010)

    Google Scholar 

  3. Liu, X.Y., Zhang, Q., Li, Z.M.: A survey on information security for smart grid. Electr. Power Inf. Commun. Technol. 12(4), 56–60 (2014)

    Google Scholar 

  4. Amin, S.M.: Smart grid security, privacy, and resilient architectures: opportunities and challenges. IEEE Power Energy Soc. Gen. Meet. 2012, SanDiego, pp. 1–2. IEEE (2012)

    Google Scholar 

  5. Wang, X., Yi, P.: Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2(4), 809–818 (2011)

    Google Scholar 

  6. Lim, H., Ko, J., Lee, S., et al.: Security architecture model for smart grid communication systems. In: International Conference on IT Convergence and Security 2013, Macao, pp. 327–330. IEEE (2013)

    Google Scholar 

  7. Li, X., Liang, X., Lu, R., et al.: Securing smart grid: cyberattacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8), 38–45 (2012)

    Article  Google Scholar 

  8. Anandhi, A., Kalpana, G.: Securing smart grid communication against false data injection attacks. Wireless Commun. 8(5), 211–215 (2016)

    Google Scholar 

  9. Bitzer, B., Gebretsadik, E.S.: Cloud computing framework for smart grid applications. In: Power Engineering Conference 48th International Universities 2013, pp. 1–5. IEEE (2013)

    Google Scholar 

  10. Nicanfar, H., Jokar, P., Beznosov, K., et al.: Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst. J. 8(2), 629–640 (2014)

    Article  Google Scholar 

  11. Smart Grid Interoperability Panel Cyber Security Working Group: Introduction to NISTIR 7628 guidelines for smart grid cyber security [EB/OL], USA, NIST Special Publication (2010). https://www.nist.gov/smart-grid/upload/nistir-7628_total.pdf

  12. Li, Y.C., Zhang, P., Zheng, S.Q.: Privacy protection of power consumption big data based on empirical mode decomposition and homomorphic encryption. Power Grid Technol. 43(05), 1810–1818 (2019)

    Google Scholar 

  13. Dehalwar, V., Kalam, A., Kolhe, M.L., et al.: Review of IEEE 802. 22 and IEC 61850 for real-time communication in smart grid. In: International Conference on Computing and Network Communications 2015, Trivandrum, India, pp. 571–575. IEEE (2015)

    Google Scholar 

  14. Fu, G., Zhou, N.R., Wen, H.: The study of security issues for the industrial control system communication protocols in smart grid system. Inf. Secur. Technol. 5(1), 36–38 (2014)

    Google Scholar 

  15. Premnath, A.P., Jo, J.Y., Kim, Y.: Application of NTRU cryptographic algorithm for SCADA security. In: 11th International Conference on Information Technology: New Generations 2014, Las Vegas, pp. 341–346, IEEE (2014)

    Google Scholar 

  16. Gao, K.T., Mao, Y.G., Xun, P., et al.: Light-weight key management solution for OSGP. J. Chin. Comput. Syst. 36(10), 166–170 (2015)

    Google Scholar 

  17. Kumar, V., Hussain, M.: Secure communication for advance metering infrastructure in smart grid. In: Annual IEEE India Conference 2014, Pune, India, pp. 1–6. IEEE (2014)

    Google Scholar 

  18. Tuchman, W.: Hellman presents no shortcut solutions to the des. IEEE Spectr. 16(7), 40–41 (1979)

    Google Scholar 

  19. Rivest, R.L., Shamir, A.,Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Google Scholar 

  20. Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)

    Google Scholar 

  21. Yi, Z.D., Duan, Y.Z., Xiao, C.W., et al.: Cloud computing security: concept, status quo and key technologies. Proceedings of the 27th National Conference on Computer Security (2012)

    Google Scholar 

  22. Gao, Y.Z., Li, B.L., Chen, X.Y.: Random detection algorithm of HDFS data theft based on MapReduce. J. Cryptologic Res. 39(10), 15–25 (2018)

    Google Scholar 

  23. Sivapragash, C., Thilaga, S.R., Kumar, S.S.: Advanced cloud computing in smart power grid. In: Sustainable Energy and Intelligent Systems 2012. IET Chennai 3rd International, pp. 1–6 (2012)

    Google Scholar 

  24. Li, Q.L., Zhou, M.T.: Research on cloud computing in smart grid. Comput. Sci. 38(B10), 432–433 (2011)

    Google Scholar 

  25. Cong, W., Qian, W., Kui, R., et al.: Ensuring data storage security in cloud computing. In: 17th International WorkShop 2009. Quality of Service IWQoS, pp. 13–15 (2009)

    Google Scholar 

  26. Hashmi, M., Hanninen, S., Maki, K.: Survey of smart grid concepts, architectures, and technological demonstrations worldwide. In: 2011 IEEE PES Conference 2011 in Innovative Smart Grid Technologies, pp. 19–21 (2011)

    Google Scholar 

  27. Chen, J., Zhang, Y.Y.: Research on application and security of cloud computing in smart grid. ZTE Technol. 18(6), 17–21 (2012)

    Google Scholar 

  28. Huang, J.F., Wang, H.G., Qiang, Y.: Smart grid communications in challenging environments. In: 2012 IEEE Third International Conference 2012 in Smart Grid Communications, pp. 552–557 (2012)

    Google Scholar 

  29. Wright, M.A.: The evolution of the advanced encryption standard. Netw. Secur. 1999(11), 11–14 (1999)

    Google Scholar 

  30. Chen, Q.C.: A hybrid encryption algorithm based on DES and RSA algorithm. Yunnan University, China (2015)

    Google Scholar 

  31. Jain, N., Ajnar, D.S., Jain, P.K.: Optimization of advanced encryption standard algorithm (AES) on field programmable gate array (FPGA). In: International Conference on Communication and Electronics Systems 2019. IEEE (2020)

    Google Scholar 

  32. Gao, N.N., Li, Z.C., Wang, Q.: A reconfigurable architecture for high speed implementation of DES, 3DES and AES. Acta electronica Sinica 34(8), 1386–1390 (2006)

    Google Scholar 

  33. Yu, W.: Research on key extension method and security of DES algorithm. Central China Normal University, China (2019)

    Google Scholar 

  34. Sepahvandi, S., Hosseinza, M., Navi, K., et al.: IEEE 2009 International Conference on Research Challenges in Computer Science (ICRCCS), 28 November 2009–29 November 2009, Shanghai, China, 2009 International Conference on Research Challenges in Computer Science - An Improved Exponentiation Algorithm for RSA Cryptosystem, pp. 128–132 (2009)

    Google Scholar 

  35. Li, D.J., Wang, Y.D., Chen, H.: The research on key generation in RSA public-key cryptosystem. In: Fourth International Conference on Computational & Information Sciences. IEEE (2012)

    Google Scholar 

  36. Zhou, J.Z., Gao, L.: Research on improved RSA algorithm based on multi prime number and parameter replacement. Comput. Appl. Res. 36(02), 495–498 (2019)

    Google Scholar 

  37. Yan, S.Y.: Elliptic Curve Cryptography. Cybercryptography: Applicable Cryptography for Cyberspace Security (2019)

    Google Scholar 

  38. Li, F., Gong, Z.Y., Lei, F.F., et al.: Summary of fast prime generation methods. J. Cryptologic Res. 06(04), 463–476 (2019)

    Google Scholar 

  39. Qin, X.D., Xin, Y.W., Lu, G.Z.: Research and optimization of Miller Rabin algorithm. Comput. Eng. 28(10), 55–57 (2002)

    Google Scholar 

  40. Zhao, Y.W., Liu, F.F., Jiang, L.J., et al.: Multi core parallelization of Sch(o)nhage Strassen algorithm for large integer multiplication. J. Soft. 29(12), 3604–3613 (2018)

    Google Scholar 

  41. Fu, X.Q., Bao, W.S., Zhou, C., et al.: Integer factorization quantum algorithm with high probability. Acta electronica Sinica 39(01), 35–39 (2011)

    Google Scholar 

Download references

Funding

Humanities and social sciences research project of the Ministry of Education (No. 20YJAZH046); National Natural Science Foundation of China (61370139); scientific research level improvement project (2019KYNH219).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hai-Yan Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deng, J., Kang, HY. (2021). Hybrid Encryption Scheme for Secure Storage of Smart Grid Data. In: Lin, YB., Deng, DJ. (eds) Smart Grid and Internet of Things. SGIoT 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 354. Springer, Cham. https://doi.org/10.1007/978-3-030-69514-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69514-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69513-2

  • Online ISBN: 978-3-030-69514-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics