A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid
Introduction
With the deepening of the application of information technology in power companies, as the development direction of the next-generation power grid in smart grids, smart pricing is a critical component in the future (Wu and Jin, 2009). Through real-time monitoring of various types of equipment in the power grid and real-time collection of power supply and demand information, the user’s electricity consumption can be priced, thereby ensuring the stable operation of the smart grid. A large amount of power grid business data is generated at the edge of the power network and needs to be transmitted to the data center through the Internet (Thones, 2015, Wu, Jin, 2009). Among them, the use of smart meters allows power users’ power consumption information to be collected in real-time, providing accurate power demand for smart grid pricing functions. However, the collection of electricity consumption data of smart meters also brings the risk of privacy exposure to users. The electricity consumption data can be used to analyze the user’s living habits, causing troubles for the user’s privacy, property security, etc (Thones, 2015). Tampered electrical data can pose a threat to the stability of the smart grid. The emergence of blockchain technology provides a new solution to the security problems faced by traditional centralized management systems. Its decentralized, anti-tampering and traceability features have useful application prospects in the secure collection and storage of privacy protection for electricity consumption data of smart meters.
Although there has been a lot of works to solve the privacy protection of smart grids, there are still some challenges to be addressed. This paper focuses on the following three issues. First, the associated management of pseudonyms and real identities. Pseudonyms can well protect the identity of users, but their association management with real identities is a challenge. Second, lightweight signature authentication. Because edge devices are resource-constrained devices with limited computing and storage capabilities, a lightweight signature authentication strategy is necessary. Third, safe and efficient data transmission and sharing. Existing data transmission schemes are to encrypt and transmit a large amount of local data to the control center, which consumes a lot of communication resources and costs and does not consider sharing with participants outside the system.
In order to solve the above problems, this paper proposes a lightweight privacy protection scheme. This scheme is based on dual-blockchain, using secure signature authentication and identity-based proxy re-encryption strategy to improve data security and a dual-blockchain strategy to reduce storage costs and improve query efficiency so that it can meet growing business needs. This scheme is designed for the power supply side and is oriented to the pricing center of the control center. The purpose of this scheme is to efficiently transmit the user’s electricity data to the control center under the premise of satisfying security, to facilitate the dynamic pricing of the pricing center. Combined with simulation, various performance indicators were analyzed and extensively evaluated to highlight the advantages of the proposed framework over current data privacy protection. The evaluation results by comparison with other schemes (Fan, Huang, Lai, 2014, Ni, Alharbi, Lin, Shen, Zhang, Zhao, Wu, Chen) show that the method can meet the design requirements of low latency, low response time and small storage cost. The main innovations of this scheme are as follows: Privacy protection On the one hand, for the privacy protection of smart grid systems, a smart grid data architecture based on dual blockchain is proposed. The architecture can not only realize the security management between users and anonymity but also realize the interaction with foreign participants. On the other hand, identity-based proxy re-encryption is designed to share the users private information with foreign participants. Efficient performanceOn the one hand, a signature verification scheme based on bilinear mapping is designed. The theoretical basis of the scheme is based on the difficult problem of the discrete logarithm, which can complete the signature verification of each participant safely and efficiently. On the other hand, based on the homomorphic encryption scheme, the user’s data will be encrypted before going out locally, efficiently aggregated at the aggregator, and sent to the control center.
The rest of the paper is organized as follows. The Section 2 introduces related work. The Section 3 introduces the preliminaries: bilinear pair mapping, homomorphic encryption system and identity-based proxy re-encryption algorithm. The Section 4 introduces the model and security requirements that this article will use. In the Section 5, we propose a lightweight data privacy protection and sharing scheme based on dual blockchain for smart grid. Next, we analyze the security of this model in Section 6. The 7th section combines the simulation to evaluate the various performance indexes extensively. Finally, a summary of this paper is given in Section 8.
Section snippets
Related work
Various protocols have been proposed for privacy protection in smart grids (Efthymiou, Kalogridis, 2010, Fan, Huang, Lai, 2014, Gai, Wu, Zhu, Xu, Zhang, 2019, Gope, Sikdar, 2019, He, Pan, Lin, 2018, Knirsch, Engel, Frincu, Prasanna, 2015, Li, Choi, Chae, 2013, Liang, Li, Lu, Lin, Shen, 2013, Niu, Tan, Zhou, Zheng, Zhu, 2013, Shuo, Weimin, Zhiwei, Hua, Yan, 2017, Wang, Qin, Wu, Xu, Domingo-Ferrer, 2015, Yang, Xue, Li, 2014, Yao, Wen, Liang, Fu, Zhang, Yang, 2019, Yuanpeng, Yixin, Runfa, Hong,
Bilinear pairing setting
Let and be two multiplicative cyclic groups of prime order and be a generator of (Boneh and Franklin, 2001). Consider a bilinear map satisfies the following properties:
- (1)
Bilinear: For all and , we have and .
- (2)
Nondegenerate: should satisfy .
- (3)
Computable: should be computable.
Identity-based proxy re-encryption
The identity-based proxy re-encryption algorithm is used in this paper to perform the encryption and decryption operations of the
System model
In our system model, as shown in Fig. 1, it includes entities such as users, smart meters, aggregators, control center, private clouds, trusted centers, salesmen, private blockchain, and public blockchain. Among them, smart meters and aggregators are the sub-control units of the control center. Considering a more practical situation, each user has a smart meter and a power account. The power account mainly stores the user’s identity, smart meter serial number and account balance. The smart
The proposed scheme
This scheme is designed for the power supply’s pricing center. The purpose of this solution is to transmit the user’s electricity data to the control center safely and efficiently, to facilitate the dynamic pricing of the control center and to share it with foreign users while protecting user privacy. This scheme is divided into three processes: initialization process, data generation and aggregation process, and sharing process. The parameters and explanations involved in this paper are shown
Security analysis
The security analysis in this paper considers the correctness and security based on the following theorem. We first consider the correctness of encryption and signature algorithms, as described in Theorem 1–3. Theorem 1 If the user the aggregator and CC are honest and follow the procedures, the aggregated electricity data can be decrypted by CC, that is, the bilinear encryption algorithm meets the correctness. Proof In the scheme of this article, the smart meter at user encrypts the electricity
Experiment and performance analysis
We combine the experimental data to analyze the performance of the proposed scheme, which mainly includes experimental setup, computational complexity and communication load. In this part, we evaluate the performance of our scheme, as shown in Table 2. In addition, the basic settings of simulation experiment are shown in Table 3. In order to better evaluate the scheme designed in this paper, we first simulate the real-time performance of the system. To evaluate the real-time system, we need to
Conclusion
In this paper, we propose a lightweight dual-blockchain privacy protection and sharing solution for smart grid intelligent pricing systems. We combine blockchain, novel encryption and decryption algorithm and signature algorithm to adequately protect the confidentiality, privacy and integrity of electricity data. This solution uses the good properties of blockchain to improve data security. The evaluation results show that the scheme has the advantages of low latency, low response time and
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgment
This work was supported by National Natural Science Foundation of China (No. 61772001).
Kun-Chang Li received the Master degree from Beijing University of Posts and Telecommunications in 2019. He is currently studying for a PhD degree at North China Electric Power University. His current research interest includes privacy protection and sharing in Energy Internet.
References (33)
- et al.
Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection
Int. J. Crit. Infrastruct.Prot.
(2018) - et al.
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems
Fut. Gener. Comput. Syst.
(2018) - et al.
A realistic performance evaluation of privacy-preserving protocols for smart grid ami networks
J. Netw. Comput. Appl.
(2018) - et al.
Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams
IEEE Trans. Dependable Secure Comput.
(2016) - et al.
A secure privacy-preserving data aggregation scheme based on bilinear elgamal cryptosystem for remote health monitoring systems
IEEE Access
(2017) - et al.
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Trans. Inf. System Secur.(TISSEC)
(2006) - et al.
Identity-based encryption from the weil pairing
- et al.
Smart grid privacy via anonymization of smart metering data
2010 First IEEE International Conference on Smart Grid Communications
(2010) - et al.
Privacy-enhanced data aggregation scheme against internal attackers in smart grid
IEEE Trans. Ind. Inf.
(2014) - et al.
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
IEEE Internet Things J.
(2019)
An efficient privacy-friendly multi-hop data aggregation scheme for smart grids
2019 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT)
Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities
IEEE Commun. Mag.
Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries
IEEE Trans. Smart Grid
PMDA: privacy-preserving multi-functional data aggregation without TTP in smart grid
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid
2015 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT)
Cited by (30)
Blockchain from the information systems perspective: Literature review, synthesis, and directions for future research
2023, Information and ManagementHow to decentralize the internet: A focus on data consolidation and user privacy
2023, Computer Networks2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids
2023, Journal of Information Security and ApplicationsBlockchain-empowered security and privacy protection technologies for smart grid
2023, Computer Standards and InterfacesCitation Excerpt :However, even though the blockchain-based overhead is small, it has a fixed cost and is related to the number of stakeholders, and the overhead is still nonnegligible. Li et al. [65] proposed a cloud storage architecture based on dual blockchains to realize the privacy protection and data sharing of smart grid pricing systems. The architecture adopts a private blockchain to manage the mapping between users and pseudonyms and adopts a public blockchain to share information on the blockchain with other users to achieve on-demand access to resources.
When blockchain meets smart grids: A comprehensive survey
2022, High-Confidence ComputingCitation Excerpt :It establishes private blockchains to record the data of each group, and uses multiple pseudonyms to further protect the privacy of users (shown in Figure 6). Li et al. [81] develop a privacy protection scheme in the process of price optimization, which is based on the secure signature authentication mechanism and identity-based proxy re-encryption strategies. In response to the privacy challenge of data aggregation, Singh et.al [156] present a scheme called BHDA, which combines deep learning and homomorphic encryption to improve the performance of data aggregation and privacy protection with minimal computational overhead.
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing
2022, Journal of Information Security and ApplicationsCitation Excerpt :In the same year, Liu et al. devised a threshold privacy-preserving data aggregation scheme without any online trusted entity by combining the Shamir’s secret sharing and the BGN cryptosystem [12]. Li et al. proposed a decentralization Smart Grid data aggregation scheme based on dual blockchain [13]. Shen et al. investigated a privacy-preserving and collusion-resistant data aggregation scheme for dynamic groups in Smart Grid with fog computing [14].
Kun-Chang Li received the Master degree from Beijing University of Posts and Telecommunications in 2019. He is currently studying for a PhD degree at North China Electric Power University. His current research interest includes privacy protection and sharing in Energy Internet.
Yi-Fan Yang received the Bachelor degree from Taiyuan University in 2018. She is currently studying for a Master degree at North China Electric Power University. Her current research interest includes privacy protection and sharing in E-health.
Shu-Hao Wang received the Bachelor degree from Liaocheng University in 2018. He is currently studying for a Master degree at North China Electric Power University. His current research interest includes Location privacy protection in vehicle networks.
Run-Hua Shi received the PhD degree from University of Science and Technology of China in 2011. He is currently a Professor with North China Electric Power University. His current research interest includes classical and quantum cryptography, in particular, privacy-preserving multi-party computations.
Jian-Bin Li received the Bachelor degree from Tsinghua University in 1992, received the Master degree from Analysis and Forecast Center of State Seismological Bureau from 1995. He worked at Central South University from January 2015 to December 2017 as the dean of the Institute of Information Security and Big Data. He is currently a Professor with North China Electric Power University. His current research interest includes information security, big data security and big data governance.