Skip to main content

Advertisement

Log in

Lightweight privacy-enhanced secure data sharing scheme for smart grid

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Smart grid leverages distribution networks and intelligent transmission techniques to advance the delivery of electricity, with a primary focus on enhancing reliability, security, and efficiency. This advancement is realized through bidirectional data exchange for consumption monitoring and operation optimization within the electrical system. Smart grid infrastructures commonly depend on precise monitoring of electrical system parameters to enhance the reliability and robustness of the grid. It is crucial to underscore the significance of maintaining data integrity while disseminating these measurements across diverse grid stakeholders over expansive network infrastructures. In this paper, we propose a lightweight privacy-enhanced secure data sharing scheme for the smart grid, which not only ensures that only authorized users in the smart grid can efficiently access the smart grid data, but also prevents sensitive information leakage from the access policies revealing about the protected data, data owners, or recipients in smart grid. Besides, we also present strict security proofs to prove the resistance to chosen-ciphertext attacks (CCA). Finally, some efficiency analyses are made to indicate the most prominent energy-efficiency our scheme enables.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Safkhani M, Kumari S et al (2022) An authentication and key agreement scheme for smart grid. Peer Peer Netw Appl 15(3):1595–1616

    Article  Google Scholar 

  2. Zhao M, Ding Y, Tang S et al (2023) A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer Peer Netw Appl 16(1):142–155

    Article  Google Scholar 

  3. Yang H, Liang S, Luo X, Tang D, Li H, Shen X (2022) PIPC: privacy- and integrity-preserving clustering analysis for load profiling in smart grids. IEEE Internet Things J 9(13):10851–10861

    Article  Google Scholar 

  4. Chen J, Yi C, Okegbile SD, Cai J, Shen XS (2023) Networking architecture and key supporting technologies for human digital twin in personalized healthcare: a comprehensive survey. IEEE Communications Surveys & Tutorials, to appear. https://doi.org/10.1109/COMST.2023.3308717

  5. Vahidi S, Ghafouri M, Au M et al (2023) Security of wide-area monitoring, protection, and control (WAMPAC) systems of the smart grid: a survey on challenges and opportunities. IEEE Commun Surv Tutorials 25(2):1294–1335

    Article  Google Scholar 

  6. Nafees MN, Saxena N, Cardenas A et al (2023) Smart grid cyber-physical situational awareness of complex operational technology attacks: a review. ACM Comput Surv 55(10):1–36

    Article  Google Scholar 

  7. Chen D, Zhao Z, Qin X, Luo Y, Cao M, Xu H, Liu A (2020) MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment. IEEE Trans Ind Inf 18(1):467–476

  8. Oprea SV et al (2023) An Edge-Fog-Cloud computing architecture for IoT and smart metering data. Peer Peer Netw Appl 1–28

  9. Choudhary D (2023) Pahuja R A blockchain-based cyber-security for connected networks. Peer Peer Netw Appl 1–16

  10. Aloqaily M, Bouachir O et al (2022) SynergyGrids: blockchain-supported distributed microgrid energy trading. Peer Peer Netw Appl 15(2):884–900

    Article  Google Scholar 

  11. Aghahosseini A, Bogdanov D, Barbosa LS et al (2019) Analysing the feasibility of powering the Americas with renewable energy and inter-regional grid interconnections by 2030. Renew Sustain Energy Rev 105:187–205

    Article  Google Scholar 

  12. Bhattarai B, Paudyal S, Luo Y et al (2019) Big data analytics in smart grids: state-of-the-art, challenges, opportunities, and future directions. IET Smart Grid 2(2):141–154

    Article  Google Scholar 

  13. Zheng X, Cai Z (2020) Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J Sel Areas Commun 38(5):968–979

    Article  Google Scholar 

  14. Rigoev I, Sikora A (2023) Security aspects of smart meter infrastructures. Smart Meters: Artificial Intelligence to Support Proactive Management of Energy Consumption. Springer International Publishing, Cham, pp 77–154

    Chapter  Google Scholar 

  15. Wazan AS, Laborde R, Chadwick DW et al (2020) On the validation of Web X. 509 Certificates by TLS interception products. IEEE Trans Dependable Secure Comput 19(1):227–242

    Article  Google Scholar 

  16. Debnath J, Chau SY, Chowdhury O (2021) On re-engineering the X 509 PKI with executable specification for better implementation guarantees. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp 1388–1404

  17. Chen D, Zhang N, Wu H et al (2022) Audio-based security techniques for secure device-to-device communications. IEEE Network 36(6):54–59

    Article  Google Scholar 

  18. Ghelani D (2022) Cyber security in smart grids, threats, and possible solutions. Authorea Preprints

  19. Jha RK (2023) Cybersecurity and confidentiality in smart grid for enhancing sustainability and reliability. Recent Research Reviews Journal 2(2):215–241

    Article  Google Scholar 

  20. Chen D, Wang H, Zhang N et al (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT. IEEE Internet Things J 9(18):17265–17279

    Article  Google Scholar 

  21. Sun J, Xu G, Zhang T et al (2022) Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds. IEEE Trans Inf Forensics Secur 18:683–698

    Article  Google Scholar 

  22. Deng H, Zhang J, Qin Z et al (2021) Policy-based broadcast access authorization for flexible data sharing in clouds. IEEE Trans Dependable Secure Comput 19(5):3024–3037

    Article  Google Scholar 

  23. Sun J, Xu G, Zhang T et al (2022) A practical fog-based privacy-preserving online car-hailing service system. IEEE Trans Inf Forensics Secur 17:2862–2877

    Article  Google Scholar 

  24. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, pp 321–334

    Chapter  Google Scholar 

  25. Hohenberger S, Lu G, Waters B et al (2023) Registered attribute-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer Nature Switzerland, Cham, pp 511–542

    Google Scholar 

  26. Agrawal S, Chase M (2017) FAME: fast attribute-based message encryption. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp 665–682

  27. Agrawal S, Tomida J, Yadav A (2023) Attribute-based multi-input FE (and More) for attribute-weighted sums. Annual International Cryptology Conference. Springer Nature Switzerland, Cham, pp 464–497

    Google Scholar 

  28. Sun J, Xu G, Zhang T et al (2023) Privacy-aware and security-enhanced efficient matchmaking encryption. IEEE Trans Inf Forensics Secur 18:4345–4360

    Article  Google Scholar 

  29. Chen D, Jiang S, Zhang N, Liu L, Choo KKR (2023) On message authentication channel capacity over a wiretap channel. IEEE Trans Inf Forensics Secur 17:3107–3122

  30. Chaudhari P, Das ML (2020) Keysea: keyword-based search with receiver anonymity in attribute-based searchable encryption. IEEE Trans Serv Comput 15(2):1036–1044

    Article  Google Scholar 

  31. Attrapadung N, Libert B et al (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. PKC 2011, Taormina, Italy, March 6-9, 2011. Proceedings 14. Springer Berlin Heidelberg, pp 90–108

    Google Scholar 

  32. Yu Y, Shi J, Li H et al (2020) Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE J Sel Areas Commun 38(6):1242–1251

    Article  Google Scholar 

  33. Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. CCS 2006:89–98

    Article  Google Scholar 

  34. Kiltz E, Wee H (2015) Quasi-adaptive NIZK for linear subspaces revisited, EUROCRYPTO 2006. Springer, Berlin, Heidelberg, LNCC 9057:101–128

    Google Scholar 

  35. Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. ACNS 2008:111–129

    Google Scholar 

  36. Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput Netw 133:141–156

    Article  Google Scholar 

  37. Phuong TVX, Yang G, Susilo W (2016) Hidden ciphertext pol- icy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Security 11(1):35–45

    Article  Google Scholar 

  38. Xu R, Lang B (2015) A CP-ABE scheme with hidden policy and its application in cloud computing. Int J Cloud Comput 4(4):279–298

    Article  MathSciNet  Google Scholar 

  39. Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Compututer 64(1):126–138

    Article  MathSciNet  Google Scholar 

  40. Hao J, Huang C, Ni J, Rong H, Xian M, Shen XS (2019) Fine-grained data access control with attribute-hiding policy for cloud- based IoT. Comput Netw 153:1–10

    Article  Google Scholar 

  41. Sun J, Xiong H, Liu X et al (2020) Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health. IEEE Internet Things J, 2020 7(7):6566–6575

    Article  Google Scholar 

  42. Kim I, Susilo W, Baek J, Kim J (2022) Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption. EEE TDSC 19(3):1856–1870

    Google Scholar 

Download references

Funding

This work is supported by Demonstration of Scientific and Technology Achievements Transform in Sichuan Province under Grant 2022ZHCG0036.

Author information

Authors and Affiliations

Authors

Contributions

Zheng Yang’s contributions include writing paper (Sections 12 and 4). Hua Zhu’s contributions include writing paper (Sections 3 and 4), implementing source codes. Chunlin Yin’s contributions include writing paper (Section 5), proofreading paper, and arranging and designing experiments. Zhidong Xie’s contributions include writing paper (Sections 6 and 7), and performing time consumption experiments of the works. Wei Chen’s contributions include providing paper idea, writing paper and evaluating the security of our solutions. Cheng Chen’s contributions include writing paper (Abstract and Section 8), providing the real-world security analysis and threat models.

Corresponding author

Correspondence to Zhidong Xie.

Ethics declarations

Ethics approval

Our paper has not involved any ethics issues.

Consent to publish

All authors have read and agreed to the published version of this manuscript.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Affordable and Clean Energy

Guest Editors: Dajiang Chen, Ning Zhang, Omar Sababha and Chunpeng Ge

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Z., Zhu, H., Yin, C. et al. Lightweight privacy-enhanced secure data sharing scheme for smart grid. Peer-to-Peer Netw. Appl. 17, 1322–1334 (2024). https://doi.org/10.1007/s12083-024-01653-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01653-7

Keywords