Skip to main content

Advertisement

Log in

A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Modern power systems have been faced with a rising appeal for the upgrade to a highly intelligent generation of electricity networks known as the smart grid. Thus, security for the smart grid has emerged as an important issue. Recently, Hur proposed an attribute based data sharing for smart grid which unfortunately is vulnerable to the denial of service (DoS) attack. Moreover, it does not support the user revocation property and the grid system manager cannot prevent the revoked user of having access to the shared data in the storage center. For these weaknesses, we suggest an efficient revocable data sharing scheme which is immune against DoS attack. In addition, we present the security analyses and comparisons indicating the efficiency and security of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. (2007). A systems view of the modern grid. In U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL).

  2. (2008). The smart grid: An introduction. In The U.S. Department of Energy, Tech. Rep. http://energy.gov/oe/downloads/

  3. (2010). Smart grid cyber security strat egy and requirements. In DRAFT NI-STIR 7628.

  4. (2012). Application of automated controls for voltage and reactive power management—Initial results. In The U.S. Department of Energy, Tech. Rep. https://www.smartgrid.gov/document/application-reactive-power-management-initial-results

  5. (2012). Demand reductions from the application of advanced metering infrastructure, pricing programs, and customer-based systems—Initial results. In The U.S. Department of Energy, Tech. Rep. https://www.smartgrid.gov/document/demand-reductions-application-advanced-metering-infrastructure-pricing-programs-and-custom

  6. (2012). Operations and maintenance savings from advanced metering infrastructure initial results. In The U.S. Department of Energy, Tech. Rep. https://www.smartgrid.gov/document/operations-and-maintenance-savings-advanced-metering-infrastructure-initial-results

  7. (2012). Reliability improvements from the application of distribution automation technologies—Initial results. In The U.S. Department of Energy, Tech. Rep., https://www.smartgrid.gov/document/reliability-improvements-automation-technologies-initial-results

  8. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In C. S. Laih (Ed.), Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Springer Berlin Heidelberg.

  9. Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp. 321–334.

  10. Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). Pbes: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th international symposium on information, computer, and communications security, ACM, pp. 262–275.

  11. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in CryptologyCRYPTO 2001. Springer, pp. 213–229.

  12. Doshi, N., & Jinwala, D. C. (2013). Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Security and Communication Networks.

  13. Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.

    Article  Google Scholar 

  14. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp 89–98.

  15. Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, & I. Walukiewicz (Eds.), Automata, languages and programming (pp. 579–591). Springer Berlin Heidelberg.

  16. Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.

    Article  Google Scholar 

  17. Hur, J., & Noh, D. K. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1214–1221.

    Article  Google Scholar 

  18. Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In H. Y. Youm & M. Yung (Eds.), Information security applications (pp 309–323). Springer Berlin Heidelberg.

  19. Kapadia, A., Tsang, P. P., & Smith, S. W. (2007). Attribute-based publishing with hidden credentials and hidden policies. NDSS, 7, 179–192.

    Google Scholar 

  20. Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design principles for power grid cyber-infrastructure authentication protocols. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–10.

  21. Kim, Y. J., Thottan, M., Kolesnikov, V., & Lee, W. (2010). A secure decentralized data-centric information infrastructure for smart grid. IEEE Communications Magazine, 48(11), 58–65.

    Article  Google Scholar 

  22. Li, D., Aung, Z., Williams, J., & Sanchez, A. (2014a). P2dr: Privacy-preserving demand response system in smart grids. In Computing, Networking and Communications (ICNC), 2014 International conference on, IEEE, pp 41–47.

  23. Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2014b). No peeking: Privacy-preserving demand response system in smart grids. International Journal of Parallel, Emergent and Distributed Systems, 29(3), 290–315.

    Article  Google Scholar 

  24. Li, F., Luo, B., & Liu, P. (2010). Secure information aggregation for smart grids using homomorphic encryption. In Smart Grid Communications (SmartGridComm), 2010 First IEEE international conference on, IEEE, pp. 327–332.

  25. Maurer, U. (2009). Unifying zero-knowledge proofs of knowledge. In B. Preneel (Ed.), Progress in cryptology-AFRICACRYPT 2009 (pp. 272–286). Springer Berlin Heidelberg.

  26. Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In S. M. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (pp. 111–129). Springer Berlin Heidelberg.

  27. Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309–329.

    Article  Google Scholar 

  28. Rao, Y.S., & Dutta, R. (2014). Dynamic ciphertext-policy attribute-based encryption for expressive access policy. In R. Natarajan (Ed.), Distributed computing and internet technology (pp. 275–286). Springer Berlin Heidelberg.

  29. Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604–3629.

    Article  Google Scholar 

  30. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In D. Catalano, N. Fazio, R. Gennaro, & A. Nicolosi (Eds.), Public Key Cryptography-PKC 2011 (pp. 53–70). Springer Berlin Heidelberg.

  31. Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on, IEEE, pp. 39–44.

  32. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp. 261–270.

Download references

Acknowledgments

This work was partially supported by Iran NSF under Grant No.92.32575.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Bayat.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bayat, M., Arkian, H.R. & Aref, M.R. A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid. Wireless Netw 21, 871–881 (2015). https://doi.org/10.1007/s11276-014-0824-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0824-9

Keywords

Navigation