Skip to main content
Log in

Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the advancement of smart power plants, electricity consumers are transitioning from a passive electricity consumption model to an intelligent consumption model. However, distributed power equipment and the vast amounts of electricity consumption data they generate pose significant information security risks. Traditional access control mechanisms cannot meet the security needs of distributed smart power plants. To address this issue, this paper introduces a distributed smart power plant access control mechanism based on blockchain and ciphertext updatable functional encryption. Firstly, the decentralized and tamper-proof features of blockchain technology ensure the integrity, transparency, and security of data transmission, effectively preventing data tampering and leakage. Secondly, by incorporating ciphertext updatable functional encryption, we guarantee data confidentiality and achieve fine-grained access control over electricity consumption data. This allows users to independently and precisely control data sharing and access. Furthermore, by deploying smart contracts with trust mechanisms on the blockchain, automated management of storage and access is achieved. Through a comprehensive evaluation of trust levels, trust values, and honesty, the system not only enhances its efficiency but also ensures that only legitimate entities can access data resources, thus preserving the utility of electricity consumption data. In addition, the adoption of decentralized unique identifiers on the blockchain for user authentication and authorization strengthens user privacy protection and data sovereignty. Lastly, experimental results demonstrate that this mechanism, while ensuring security, maintains a high level of efficiency, meeting the complex security requirements of distributed smart power plants.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The data that has been used is confidential.

References

  1. Zografopoulos I, Hatziargyriou ND, Konstantinou C (2023) Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations. IEEE Syst J

  2. Wang T, Hua H, Wei Z, Cao J (2022) Challenges of blockchain in new generation energy systems and future outlooks. Int J Electr Power Energy Syst 135:107499

    Article  Google Scholar 

  3. Hasankhani A, Hakimi SM, Bisheh-Niasar M, Shafie-khah M, Asadolahi H (2021) Blockchain technology in the future smart grids: A comprehensive review and frameworks. Int J Electr Power Energy Syst 129:106811

    Article  Google Scholar 

  4. Chehri A, Fofana I, Yang X (2021) Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence. Sustainability 13(6):3196

    Article  Google Scholar 

  5. Ghiasi M, Niknam T, Wang Z, Mehrandezh M, Dehghani M, Ghadimi N (2023) A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr Power Syst Res 215:108975

    Article  Google Scholar 

  6. Samant IS, Panda S, Rout PK (2023) Recent advancements on cyber security for smart-grids: A survey. In: 2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT), pp. 572–577. IEEE

  7. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457–473. Springer

  8. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30–June 3, 2010. Proceedings 29, pp. 62–91. Springer

  9. Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Annual Cryptology Conference, pp. 191–208. Springer

  10. Boneh D, Sahai A, Waters B (2011) Functional encryption: Definitions and challenges. In: Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings 8, pp. 253–273. Springer

  11. Cini V, Ramacher S, Slamanig D, Striecks C, Tairi E (2022) (inner-product) functional encryption with updatable ciphertexts. Cryptology ePrint Archive

  12. Arriaga A, Iovino V, Tang Q (2016) Updatable functional encryption. In: International Conference on Cryptology in Malaysia, pp. 347–363. Springer

  13. Ren Y, Leng Y, Cheng Y, Wang J (2019) Secure data storage based on blockchain and coding in edge computing. Math Biosci Eng 16(4):1874–1892

    Article  MathSciNet  Google Scholar 

  14. Han P, Zhang Z, Ji S, Wang X, Liu L, Ren Y (2023) Access control mechanism for the internet of things based on blockchain and inner product encryption. J Inf Secur Appl 74:103446

    Google Scholar 

  15. Wu Q, Han Z, Mohiuddin G, Ren Y (2023) Distributed timestamp mechanism based on verifiable delay functions. Comput Syst Sci Eng 44(2)

  16. Yu X, Zhu S, Ren Y (2023) Continuous trajectory similarity search with result diversification. Futur Gener Comput Syst 143:392–400

    Article  Google Scholar 

  17. Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Almakhadmeh Z, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst 115:304–313

    Article  Google Scholar 

  18. Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial internet of things. Comput Ind Eng 164:107903

    Article  Google Scholar 

  19. Yuan H, Wang Z, Chen Z, Gong Y, Lu J, Hu Y, Li L, Qian F (2023) A fine-grained access control method based on role permission management. In: 2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1–6. IEEE

  20. Patil R, Patil YH (2022) A secure and efficient identity based proxy signcryption scheme for smart grid network. J Eng Sci Technol Rev 15(4)

  21. Abreu V, Santin AO, Viegas EK, Cogo VV (2020) Identity and access management for iot in smart grid. In: Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), pp. 1215–1226. Springer

  22. Babu ES, Dadi AK, Singh KK, Nayak SR, Bhoi AK, Singh A (2022) A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system. Expert Syst 39(10):12941

    Article  Google Scholar 

  23. Bera B, Saha S, Das AK, Vasilakos AV (2020) Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J 8(7):5744–5761

    Article  Google Scholar 

  24. Hu W, Li H (2021) A blockchain-based secure transaction model for distributed energy in industrial internet of things. Alex Eng J 60(1):491–500

    Article  MathSciNet  Google Scholar 

  25. Wang D, Wang H, Fu Y (2021) Blockchain-based iot device identification and management in 5g smart grid. EURASIP J Wirel Commun Netw 2021(1):125

    Article  MathSciNet  Google Scholar 

  26. Guan Z, Lu X, Yang W, Wu L, Wang N, Zhang Z (2021) Achieving efficient and privacy-preserving energy trading based on blockchain and abe in smart grid. J Parallel Distrib Comput 147:34–45

    Article  Google Scholar 

  27. Zhang L, Yang G, Song C, Wu Q (2023) Accountable multi-authority attribute-based data access control in smart grids. J King Saud Univ Comput Inf Sci 101597

  28. Wu Z, Shi R-H, Li K, Yang Y (2022) Attribute-based data access control scheme with secure revocation in fog computing for smart grid. Clust Comput 25(6):3899–3913

    Article  Google Scholar 

  29. Zhang L, Ren J, Mu Y, Wang B (2020) Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access 8:23294–23307

    Article  Google Scholar 

  30. Nakamura S, Enokido T, Takizawa M (2023) Capability-based access control model for fog computing model. In: International Conference on Network-Based Information Systems, pp. 79–85. Springer

  31. Ren Y, Zhu F, Wang J, Sharma PK, Ghosh U (2021) Novel vote scheme for decision-making feedback based on blockchain in internet of vehicles. IEEE Trans Intell Transp Syst 23(2):1639–1648

    Article  Google Scholar 

Download references

Funding

This work was supported by the National Natural Science Foundation of China (Grant No. 62072249).

Author information

Authors and Affiliations

Authors

Contributions

Yizhe Zhou: Conceptualization, Writing - original draft. Xianwei Zhu: Supervision, Resources. Ailin Chen: Software, Figures. Zhouyang Zhang: Methodology, Data curation. Pengchong Han: Supervision, Writing - review & editing. Feng Zhang: Software, Validation. Zhaoyang Han: Formal analysis, Data curation. Jiang Xu: Formal analysis, Validation. Bo Lan: Supervision.

Corresponding author

Correspondence to Bo Lan.

Ethics declarations

Ethics approval

The manuscript is free of any ethical, copyright, or disclosure concerns.

Statement of novelty

The manuscript is an original work of its own merit and has not been previously published, in whole or in part, or considered for publication elsewhere.

Consent for publication

All authors have read the final manuscript, have approved its submission to your journal, and have accepted full responsibility in relation to its delivery and content.

Conflict of interest

There is no conflict of interests regarding the manuscript submitted.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Affordable and Clean Energy

Guest Editors: Dajiang Chen, Ning Zhang, and Chunpeng Ge

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, Y., Zhu, X., Chen, A. et al. Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption. Peer-to-Peer Netw. Appl. 17, 1021–1035 (2024). https://doi.org/10.1007/s12083-024-01622-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01622-0

Keywords