Skip to main content

Advertisement

Log in

MSDA: multi-subset data aggregation scheme without trusted third party

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Data aggregation has been widely researched to address the privacy concern when data is published, meanwhile, data aggregation only obtains the sum or average in an area. In reality, more fine-grained data brings more value for data consumers, such as more accurate management, dynamic price-adjusting in the grid system, etc. In this paper, a multi-subset data aggregation scheme for the smart grid is proposed without a trusted third party, in which the control center collects the number of users in different subsets, and obtains the sum of electricity consumption in each subset, meantime individual user’s data privacy is still preserved. In addition, the dynamic and flexible user management mechanism is guaranteed with the secret key negotiation process among users. The analysis shows MSDA not only protects users’ privacy to resist various attacks but also achieves more functionality such as multi-subset aggregation, no reliance on any trusted third party, dynamicity. And performance evaluation demonstrates that MSDA is efficient and practical in terms of communication and computation overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Communications Surveys and Tutorials, 2015, 17(4): 2347–2376

    Article  Google Scholar 

  2. Saleem A, Khan A, Malik S U R, Pervaiz H, Malik H, Alam M, Jindal A. Fesda: fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet of Things Journal, 2020, 7(7): 6132–6142

    Article  Google Scholar 

  3. Liu Y, Wang Y, Wang X, Xia Z, Xu J. Privacy-preserving raw data collection without a trusted authority for IoT. Computer Networks, 2019, 148: 340–348

    Article  Google Scholar 

  4. Fang X, Misra S, Xue G, Yang D. Smart grid-the new and improved power grid: a survey. IEEE Communications Surveys and Tutorials, 2012, 14(4): 944–980

    Article  Google Scholar 

  5. Xue K, Zhu B, Yang Q, Wei D S L, Guizani M. An efficient and robust data aggregation scheme without a trusted authority for smart grid. IEEE Internet of Things Journal, 2020, 7(3): 1949–1959

    Article  Google Scholar 

  6. Song J, Liu Y, Shao J, Tang C. A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Systems Journal, 2020, 14(1): 900–908

    Article  Google Scholar 

  7. Xue Q, Zhu Y, Wang J. Joint distribution estimation and naive bayes classification under local differential privacy. IEEE Transactions on Emerging Topics in Computing, 2019, DOI: https://doi.org/10.1109/TETC.2019.2959581

  8. Li X, Zhu Y, Wang J. Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Transactions on Emerging Topics in Computing, 2019, DOI: https://doi.org/10.1109/TETC.2019.2926385

  9. Li S, Xue K, Wei D S L, Yue H, Yu N, Hong P. SecGrid: a secure and efficient SGX-enabled smart grid system with rich functionalities. IEEE Transactions on Information Forensics and Security, 2020, 15:1318–1330

    Article  Google Scholar 

  10. Jia W, Zhu H, Cao Z, Dong X, Xiao C. Human-factor-aware privacy-preserving aggregation in smart grid. IEEE Systems Journal, 2014, 8(2): 598–607

    Article  Google Scholar 

  11. Li X, Liu S, Wu F, Kumari S, Rodrigues J J P C. Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet of Things Journal, 2019, 6(3): 4755–4763

    Article  Google Scholar 

  12. Lu R, Heung K, Lashkari A H, Ghorbani A A. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access, 2017, 5: 3302–3312

    Article  Google Scholar 

  13. Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(9): 1621–1631

    Article  Google Scholar 

  14. Liu Y, Guo W, Fan C I, Chang L, Cheng C. A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Transactions on Industrial Informatics, 2019, 15(3): 1767–1774

    Article  Google Scholar 

  15. Acar A, Aksu H, Uluagac A S, Conti M. A survey on homomorphic encryption schemes: theory and implementation. ACM Computing Surveys (CSUR), 2018, 51(4): 79

    Google Scholar 

  16. Lu R, Alharbi K, Lin X, Huang C. A novel privacy-preserving set aggregation scheme for smart grid communications. In: Proceedings of 2015 IEEE Global Communications Conference. 2015, 1–6

  17. Li S, Xue K, Yang Q, Hong P. PPMA: privacy preserving multisubset data aggregation in smart grid. IEEE Transactions on Industrial Informatics, 2018, 14(2): 462–471

    Article  Google Scholar 

  18. Gong X, Hua Q, Qian L, Yu D, Jin H. Communication efficient and privacy-preserving data aggregation without trusted authority. In: Proceedings of 2018 IEEE Conference on Computer Communications. 2018, 1250–1258

  19. Eibl G, Engel D. Differential privacy for real smart metering data. Computer Science-Research and Development, 2017, 32(1–2): 173–182

    Article  Google Scholar 

  20. Xue Q, Zhu Y, Wang J. Meanestimation over numeric data with personalized local differential privacy, Frontiers of Computer Science, 2020, DOI: https://doi.org/10.1007/s11704-020-0103-0

  21. Jia W, Zhu H, Cao Z, Dong X, Xiao C. Human-factor-aware privacy-preserving aggregation in smart grid. IEEE Systems Journal, 2014, 8(2): 598–607

    Article  Google Scholar 

  22. Liu Y, Liu G, Cheng C, Xia Z, Shen J. A privacy-preserving health data aggregation scheme. KSII Transactions on Internet & Information Systems, 2016, 10(8): 3852–3864

    Google Scholar 

  23. Lyu L, Nandakumar K, Rubinstein B, Jin J, Bedo J, Palaniswami M. PPFA: privacy preserving fog-enabled aggregation in smart grid. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3733–3744

    Article  Google Scholar 

  24. Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of 1999 International Conference on the Theory and Applications of Cryptographic Techniques. 1999, 223–238

  25. Guan Z, Zhang Y, Wu L, Wu J, Li J, Ma Y, Hu J. APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. Journal of Network and Computer Applications, 2019, 125: 82–92

    Article  Google Scholar 

  26. Guan Z, Zhang Y, Zhu L, Wu L, Yu S. Effect: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Science China Information Sciences, 2019, 62(3): 32103

    Article  Google Scholar 

  27. Zhang Y, Zhao J, Dong Z, Deng K, Ren F, Zheng X, Shu J. Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors, 2018, 18(8): 2659

    Article  Google Scholar 

  28. Abdallah A, Shen X S. A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Transactions on Smart Grid, 2016, 9(1): 396–405

    Article  Google Scholar 

  29. Huang D, Xue R, Liu F, Peng J, Zhao Z, Ji D. Formal verification of HMQV using ASM-SPV. In: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2010, 486–489

  30. Krawczyk H. HMQV: a high-performance secure Diffie-Hellman protocol. In: Proceedings of Annual International Cryptology Conference. 2005, 546–566

Download references

Acknowledgements

This work was supported partly by the National Natural Science Foundation of China (Grant Nos. 61162016, 62072133, U1811264, U1711263, 61966009), the Natural Science Foundation of Guangxi Province (2018GXNSFDA281040, 2018GXNSFDA281045), and the Innovation Project of Guangxi Graduate Education (YCBZ2020062).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Chang.

Additional information

Zhixin Zeng received the BE degree in software engineering from Xiamen University of Technology, China in 2017. He is currently a PhD candidate of Guilin University of Electronic Technology, China. His research interests include information security, data privacy and machine learning.

Xiaodi Wang received the BE degree in information security from Guilin University of Electronic Technology, China in 2017. She is currently a master student of Guilin University of Electronic Technology, China. Her research interests include information security and data privacy.

Yining Liu received BS degree in applied mathematics from Information Engineering University, China in 1995, the ME degree in computer software and theory from Huazhong University of Science and Technology, China in 2003, and PhD degree in mathematics from Hubei University, China in 2007. He is currently a professor with school of Computer and Information Security, Guilin University of Electronic Technology, China. His research interests include the information security protocol and data privacy.

Liang Chang received the PhD degree in computer science from the Institute of Computing Technology, Chinese Academy of Sciences, China in 2008. He is currently a Professor with the School of Computer Science and Information Security, Guilin University of Electronic Technology, China. His research interests include trusted software and security protocol.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zeng, Z., Wang, X., Liu, Y. et al. MSDA: multi-subset data aggregation scheme without trusted third party. Front. Comput. Sci. 16, 161808 (2022). https://doi.org/10.1007/s11704-021-0316-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-021-0316-x

Keywords