Virtual Ring Privacy Preserving Scheme Based on Fog Computing for Smart Meter System

被引:1
|
作者
Xia, Zhuoqun [1 ]
Zhang, Yichao [1 ]
Gu, Ke [1 ]
Zhou, Kaixin [1 ]
Li, Xiong [2 ]
机构
[1] Changsha Univ Sci & Technol, Changsha 410014, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Fog computing; Smart Meter System (SMS); Virtual Ring; AGGREGATION; EFFICIENT; DESIGN;
D O I
10.11999/JEIT220618
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the basic component of smart grid, Smart Meter System (SMS) can regularly report the detailed electricity consumption data of users to power companies. However, SMS also bring some security problems, such as user privacy disclosure. This paper proposes a privacy protection scheme based on virtual ring for SMS based on fog computing. This scheme can provide the privacy of power consumption data and user identity, so that the attacker can not know the relationship between matching power data and user identity. In the proposed scheme, the SMS can use its virtual ring membership to anonymize its real identity, and it can also use asymmetric encryption and Paillier homomorphic system to generate ciphertext data from its power consumption data; Then the SMS sends the ciphertext data to the connected fog node, and the fog node collects regularly the ciphertext data of the SMS it manages. At the same time, the fog node verifies the virtual ring identity of these SMS, and then aggregates the collected ciphertext data and sends it to the control center; Finally, the control center decrypts the aggregated ciphertext to obtain the power consumption data. The experimental results show that the proposed scheme has some advantages in computing and communication costs.
引用
收藏
页码:819 / 827
页数:9
相关论文
共 24 条
  • [1] Communication Technologies for Smart Grid: A Comprehensive Survey
    Abrahamsen, Fredrik Ege
    Ai, Yun
    Cheffena, Michael
    [J]. SENSORS, 2021, 21 (23)
  • [2] [Anonymous], 2021, COMPUT ELECTR ENG, V94, DOI [10.1016/j.compeleceng.2021.107358, DOI 10.1016/J.COMPELECENG.2021.107358]
  • [3] [Anonymous], 2009, DRAFT NISTIR
  • [4] Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy
    Badra, Mohamad
    Zeadally, Sherali
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) : 321 - 329
  • [5] Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
    Boyaci, Osman
    Umunnakwe, Amarachi
    Sahu, Abhijeet
    Narimani, Mohammad Rasoul
    Ismail, Muhammad
    Davis, Katherine R.
    Serpedin, Erchin
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2946 - 2957
  • [6] Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
    Chaudhry, Shehzad Ashraf
    Shon, Taeshik
    Al-Turjman, Fadi
    Alsharif, Mohammed H.
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 527 - 537
  • [7] A Homomorphic-Based Multiple Data Aggregation Scheme for Smart Grid
    Chen, Yuwen
    Martinez-Ortega, Jose-Fernan
    Castillejo, Pedro
    Lopez, Lourdes
    [J]. IEEE SENSORS JOURNAL, 2019, 19 (10) : 3921 - 3929
  • [8] A survey on smart grid technologies and applications
    Dileep, G.
    [J]. RENEWABLE ENERGY, 2020, 146 (146) : 2589 - 2625
  • [9] FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection
    Dong, Siliang
    Zeng, Zhixin
    Liu, Yining
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] An Efficient and Privacy Protection Communication Scheme for Smart Grid
    Guan, Albert
    Guan, D. J.
    [J]. IEEE ACCESS, 2020, 8 : 179047 - 179054