Abstract
With the advancement of smart power plants, electricity consumers are transitioning from a passive electricity consumption model to an intelligent consumption model. However, distributed power equipment and the vast amounts of electricity consumption data they generate pose significant information security risks. Traditional access control mechanisms cannot meet the security needs of distributed smart power plants. To address this issue, this paper introduces a distributed smart power plant access control mechanism based on blockchain and ciphertext updatable functional encryption. Firstly, the decentralized and tamper-proof features of blockchain technology ensure the integrity, transparency, and security of data transmission, effectively preventing data tampering and leakage. Secondly, by incorporating ciphertext updatable functional encryption, we guarantee data confidentiality and achieve fine-grained access control over electricity consumption data. This allows users to independently and precisely control data sharing and access. Furthermore, by deploying smart contracts with trust mechanisms on the blockchain, automated management of storage and access is achieved. Through a comprehensive evaluation of trust levels, trust values, and honesty, the system not only enhances its efficiency but also ensures that only legitimate entities can access data resources, thus preserving the utility of electricity consumption data. In addition, the adoption of decentralized unique identifiers on the blockchain for user authentication and authorization strengthens user privacy protection and data sovereignty. Lastly, experimental results demonstrate that this mechanism, while ensuring security, maintains a high level of efficiency, meeting the complex security requirements of distributed smart power plants.








Similar content being viewed by others
Data availability
The data that has been used is confidential.
References
Zografopoulos I, Hatziargyriou ND, Konstantinou C (2023) Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations. IEEE Syst J
Wang T, Hua H, Wei Z, Cao J (2022) Challenges of blockchain in new generation energy systems and future outlooks. Int J Electr Power Energy Syst 135:107499
Hasankhani A, Hakimi SM, Bisheh-Niasar M, Shafie-khah M, Asadolahi H (2021) Blockchain technology in the future smart grids: A comprehensive review and frameworks. Int J Electr Power Energy Syst 129:106811
Chehri A, Fofana I, Yang X (2021) Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence. Sustainability 13(6):3196
Ghiasi M, Niknam T, Wang Z, Mehrandezh M, Dehghani M, Ghadimi N (2023) A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr Power Syst Res 215:108975
Samant IS, Panda S, Rout PK (2023) Recent advancements on cyber security for smart-grids: A survey. In: 2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT), pp. 572–577. IEEE
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457–473. Springer
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30–June 3, 2010. Proceedings 29, pp. 62–91. Springer
Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Annual Cryptology Conference, pp. 191–208. Springer
Boneh D, Sahai A, Waters B (2011) Functional encryption: Definitions and challenges. In: Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings 8, pp. 253–273. Springer
Cini V, Ramacher S, Slamanig D, Striecks C, Tairi E (2022) (inner-product) functional encryption with updatable ciphertexts. Cryptology ePrint Archive
Arriaga A, Iovino V, Tang Q (2016) Updatable functional encryption. In: International Conference on Cryptology in Malaysia, pp. 347–363. Springer
Ren Y, Leng Y, Cheng Y, Wang J (2019) Secure data storage based on blockchain and coding in edge computing. Math Biosci Eng 16(4):1874–1892
Han P, Zhang Z, Ji S, Wang X, Liu L, Ren Y (2023) Access control mechanism for the internet of things based on blockchain and inner product encryption. J Inf Secur Appl 74:103446
Wu Q, Han Z, Mohiuddin G, Ren Y (2023) Distributed timestamp mechanism based on verifiable delay functions. Comput Syst Sci Eng 44(2)
Yu X, Zhu S, Ren Y (2023) Continuous trajectory similarity search with result diversification. Futur Gener Comput Syst 143:392–400
Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Almakhadmeh Z, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst 115:304–313
Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial internet of things. Comput Ind Eng 164:107903
Yuan H, Wang Z, Chen Z, Gong Y, Lu J, Hu Y, Li L, Qian F (2023) A fine-grained access control method based on role permission management. In: 2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1–6. IEEE
Patil R, Patil YH (2022) A secure and efficient identity based proxy signcryption scheme for smart grid network. J Eng Sci Technol Rev 15(4)
Abreu V, Santin AO, Viegas EK, Cogo VV (2020) Identity and access management for iot in smart grid. In: Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), pp. 1215–1226. Springer
Babu ES, Dadi AK, Singh KK, Nayak SR, Bhoi AK, Singh A (2022) A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system. Expert Syst 39(10):12941
Bera B, Saha S, Das AK, Vasilakos AV (2020) Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J 8(7):5744–5761
Hu W, Li H (2021) A blockchain-based secure transaction model for distributed energy in industrial internet of things. Alex Eng J 60(1):491–500
Wang D, Wang H, Fu Y (2021) Blockchain-based iot device identification and management in 5g smart grid. EURASIP J Wirel Commun Netw 2021(1):125
Guan Z, Lu X, Yang W, Wu L, Wang N, Zhang Z (2021) Achieving efficient and privacy-preserving energy trading based on blockchain and abe in smart grid. J Parallel Distrib Comput 147:34–45
Zhang L, Yang G, Song C, Wu Q (2023) Accountable multi-authority attribute-based data access control in smart grids. J King Saud Univ Comput Inf Sci 101597
Wu Z, Shi R-H, Li K, Yang Y (2022) Attribute-based data access control scheme with secure revocation in fog computing for smart grid. Clust Comput 25(6):3899–3913
Zhang L, Ren J, Mu Y, Wang B (2020) Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access 8:23294–23307
Nakamura S, Enokido T, Takizawa M (2023) Capability-based access control model for fog computing model. In: International Conference on Network-Based Information Systems, pp. 79–85. Springer
Ren Y, Zhu F, Wang J, Sharma PK, Ghosh U (2021) Novel vote scheme for decision-making feedback based on blockchain in internet of vehicles. IEEE Trans Intell Transp Syst 23(2):1639–1648
Funding
This work was supported by the National Natural Science Foundation of China (Grant No. 62072249).
Author information
Authors and Affiliations
Contributions
Yizhe Zhou: Conceptualization, Writing - original draft. Xianwei Zhu: Supervision, Resources. Ailin Chen: Software, Figures. Zhouyang Zhang: Methodology, Data curation. Pengchong Han: Supervision, Writing - review & editing. Feng Zhang: Software, Validation. Zhaoyang Han: Formal analysis, Data curation. Jiang Xu: Formal analysis, Validation. Bo Lan: Supervision.
Corresponding author
Ethics declarations
Ethics approval
The manuscript is free of any ethical, copyright, or disclosure concerns.
Statement of novelty
The manuscript is an original work of its own merit and has not been previously published, in whole or in part, or considered for publication elsewhere.
Consent for publication
All authors have read the final manuscript, have approved its submission to your journal, and have accepted full responsibility in relation to its delivery and content.
Conflict of interest
There is no conflict of interests regarding the manuscript submitted.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Affordable and Clean Energy
Guest Editors: Dajiang Chen, Ning Zhang, and Chunpeng Ge
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhou, Y., Zhu, X., Chen, A. et al. Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption. Peer-to-Peer Netw. Appl. 17, 1021–1035 (2024). https://doi.org/10.1007/s12083-024-01622-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01622-0