Abstract
Smart grid leverages distribution networks and intelligent transmission techniques to advance the delivery of electricity, with a primary focus on enhancing reliability, security, and efficiency. This advancement is realized through bidirectional data exchange for consumption monitoring and operation optimization within the electrical system. Smart grid infrastructures commonly depend on precise monitoring of electrical system parameters to enhance the reliability and robustness of the grid. It is crucial to underscore the significance of maintaining data integrity while disseminating these measurements across diverse grid stakeholders over expansive network infrastructures. In this paper, we propose a lightweight privacy-enhanced secure data sharing scheme for the smart grid, which not only ensures that only authorized users in the smart grid can efficiently access the smart grid data, but also prevents sensitive information leakage from the access policies revealing about the protected data, data owners, or recipients in smart grid. Besides, we also present strict security proofs to prove the resistance to chosen-ciphertext attacks (CCA). Finally, some efficiency analyses are made to indicate the most prominent energy-efficiency our scheme enables.





Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data availability
The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
Safkhani M, Kumari S et al (2022) An authentication and key agreement scheme for smart grid. Peer Peer Netw Appl 15(3):1595–1616
Zhao M, Ding Y, Tang S et al (2023) A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer Peer Netw Appl 16(1):142–155
Yang H, Liang S, Luo X, Tang D, Li H, Shen X (2022) PIPC: privacy- and integrity-preserving clustering analysis for load profiling in smart grids. IEEE Internet Things J 9(13):10851–10861
Chen J, Yi C, Okegbile SD, Cai J, Shen XS (2023) Networking architecture and key supporting technologies for human digital twin in personalized healthcare: a comprehensive survey. IEEE Communications Surveys & Tutorials, to appear. https://doi.org/10.1109/COMST.2023.3308717
Vahidi S, Ghafouri M, Au M et al (2023) Security of wide-area monitoring, protection, and control (WAMPAC) systems of the smart grid: a survey on challenges and opportunities. IEEE Commun Surv Tutorials 25(2):1294–1335
Nafees MN, Saxena N, Cardenas A et al (2023) Smart grid cyber-physical situational awareness of complex operational technology attacks: a review. ACM Comput Surv 55(10):1–36
Chen D, Zhao Z, Qin X, Luo Y, Cao M, Xu H, Liu A (2020) MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment. IEEE Trans Ind Inf 18(1):467–476
Oprea SV et al (2023) An Edge-Fog-Cloud computing architecture for IoT and smart metering data. Peer Peer Netw Appl 1–28
Choudhary D (2023) Pahuja R A blockchain-based cyber-security for connected networks. Peer Peer Netw Appl 1–16
Aloqaily M, Bouachir O et al (2022) SynergyGrids: blockchain-supported distributed microgrid energy trading. Peer Peer Netw Appl 15(2):884–900
Aghahosseini A, Bogdanov D, Barbosa LS et al (2019) Analysing the feasibility of powering the Americas with renewable energy and inter-regional grid interconnections by 2030. Renew Sustain Energy Rev 105:187–205
Bhattarai B, Paudyal S, Luo Y et al (2019) Big data analytics in smart grids: state-of-the-art, challenges, opportunities, and future directions. IET Smart Grid 2(2):141–154
Zheng X, Cai Z (2020) Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J Sel Areas Commun 38(5):968–979
Rigoev I, Sikora A (2023) Security aspects of smart meter infrastructures. Smart Meters: Artificial Intelligence to Support Proactive Management of Energy Consumption. Springer International Publishing, Cham, pp 77–154
Wazan AS, Laborde R, Chadwick DW et al (2020) On the validation of Web X. 509 Certificates by TLS interception products. IEEE Trans Dependable Secure Comput 19(1):227–242
Debnath J, Chau SY, Chowdhury O (2021) On re-engineering the X 509 PKI with executable specification for better implementation guarantees. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp 1388–1404
Chen D, Zhang N, Wu H et al (2022) Audio-based security techniques for secure device-to-device communications. IEEE Network 36(6):54–59
Ghelani D (2022) Cyber security in smart grids, threats, and possible solutions. Authorea Preprints
Jha RK (2023) Cybersecurity and confidentiality in smart grid for enhancing sustainability and reliability. Recent Research Reviews Journal 2(2):215–241
Chen D, Wang H, Zhang N et al (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT. IEEE Internet Things J 9(18):17265–17279
Sun J, Xu G, Zhang T et al (2022) Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds. IEEE Trans Inf Forensics Secur 18:683–698
Deng H, Zhang J, Qin Z et al (2021) Policy-based broadcast access authorization for flexible data sharing in clouds. IEEE Trans Dependable Secure Comput 19(5):3024–3037
Sun J, Xu G, Zhang T et al (2022) A practical fog-based privacy-preserving online car-hailing service system. IEEE Trans Inf Forensics Secur 17:2862–2877
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, pp 321–334
Hohenberger S, Lu G, Waters B et al (2023) Registered attribute-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer Nature Switzerland, Cham, pp 511–542
Agrawal S, Chase M (2017) FAME: fast attribute-based message encryption. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp 665–682
Agrawal S, Tomida J, Yadav A (2023) Attribute-based multi-input FE (and More) for attribute-weighted sums. Annual International Cryptology Conference. Springer Nature Switzerland, Cham, pp 464–497
Sun J, Xu G, Zhang T et al (2023) Privacy-aware and security-enhanced efficient matchmaking encryption. IEEE Trans Inf Forensics Secur 18:4345–4360
Chen D, Jiang S, Zhang N, Liu L, Choo KKR (2023) On message authentication channel capacity over a wiretap channel. IEEE Trans Inf Forensics Secur 17:3107–3122
Chaudhari P, Das ML (2020) Keysea: keyword-based search with receiver anonymity in attribute-based searchable encryption. IEEE Trans Serv Comput 15(2):1036–1044
Attrapadung N, Libert B et al (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. PKC 2011, Taormina, Italy, March 6-9, 2011. Proceedings 14. Springer Berlin Heidelberg, pp 90–108
Yu Y, Shi J, Li H et al (2020) Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE J Sel Areas Commun 38(6):1242–1251
Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. CCS 2006:89–98
Kiltz E, Wee H (2015) Quasi-adaptive NIZK for linear subspaces revisited, EUROCRYPTO 2006. Springer, Berlin, Heidelberg, LNCC 9057:101–128
Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. ACNS 2008:111–129
Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput Netw 133:141–156
Phuong TVX, Yang G, Susilo W (2016) Hidden ciphertext pol- icy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Security 11(1):35–45
Xu R, Lang B (2015) A CP-ABE scheme with hidden policy and its application in cloud computing. Int J Cloud Comput 4(4):279–298
Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Compututer 64(1):126–138
Hao J, Huang C, Ni J, Rong H, Xian M, Shen XS (2019) Fine-grained data access control with attribute-hiding policy for cloud- based IoT. Comput Netw 153:1–10
Sun J, Xiong H, Liu X et al (2020) Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health. IEEE Internet Things J, 2020 7(7):6566–6575
Kim I, Susilo W, Baek J, Kim J (2022) Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption. EEE TDSC 19(3):1856–1870
Funding
This work is supported by Demonstration of Scientific and Technology Achievements Transform in Sichuan Province under Grant 2022ZHCG0036.
Author information
Authors and Affiliations
Contributions
Zheng Yang’s contributions include writing paper (Sections 1, 2 and 4). Hua Zhu’s contributions include writing paper (Sections 3 and 4), implementing source codes. Chunlin Yin’s contributions include writing paper (Section 5), proofreading paper, and arranging and designing experiments. Zhidong Xie’s contributions include writing paper (Sections 6 and 7), and performing time consumption experiments of the works. Wei Chen’s contributions include providing paper idea, writing paper and evaluating the security of our solutions. Cheng Chen’s contributions include writing paper (Abstract and Section 8), providing the real-world security analysis and threat models.
Corresponding author
Ethics declarations
Ethics approval
Our paper has not involved any ethics issues.
Consent to publish
All authors have read and agreed to the published version of this manuscript.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Affordable and Clean Energy
Guest Editors: Dajiang Chen, Ning Zhang, Omar Sababha and Chunpeng Ge
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yang, Z., Zhu, H., Yin, C. et al. Lightweight privacy-enhanced secure data sharing scheme for smart grid. Peer-to-Peer Netw. Appl. 17, 1322–1334 (2024). https://doi.org/10.1007/s12083-024-01653-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01653-7