Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments

被引:10
|
作者
Wang, Jingyu [1 ,2 ]
Shi, Dongyuan [1 ,2 ]
Chen, Jinfu [1 ,2 ]
Liu, Chen-Ching [3 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Elect Power Secur & High Efficiency Key Lab, State Key Lab Adv Electromagnet Engn & Technol, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Elect & Elect Engn, Wuhan 430074, Peoples R China
[3] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Power systems; State estimation; Privacy; Encryption; Servers; Cloud computing; hierarchical state estimation; privacy preservation; thresholded Paillier cryptosystem; untrustworthy environment;
D O I
10.1109/TSG.2020.3023891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hierarchical state estimation (HSE) is often deployed to evaluate the states of an interconnected power system from telemetered measurements. By HSE, each low-level control center (LCC) takes charge of the estimation of its internal states, whereas a trusted high-level control center (HCC) assumes the coordination of boundary states. However, a trusted HCC may not always exist in practice; a cloud server can take the role of an HCC in case no such facility is available. Since it is prohibited to release sensitive power grid data to untrustworthy cloud environments, considerations need to be given to avoid breaches of LCCs' privacy when outsourcing the coordination tasks to the cloud server. To this end, this article proposes a privacy-preserving HSE framework, which rearranges the regular HSE procedure to integrate a degree-2 variant of the Thresholded Paillier Cryptosystem (D2TPC). Attributed to D2TPC, computations by the cloud-based HCC can be conducted entirely in the ciphertext space. Even if the HCC and some LCCs conspire together to share the information they have, the privacy of non-conspiring LCCs is still assured. Experiments on various scales of test systems demonstrate a high level of accuracy, efficiency, and scalability of the proposed framework.
引用
收藏
页码:1541 / 1551
页数:11
相关论文
共 50 条
  • [41] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [42] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [43] Design of cloud storage framework with privacy-preserving
    Huang, Ruwei
    Gui, Xiaolin
    Yu, Si
    Zhang, Jin
    Qing, Duzheng
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2011, 45 (10): : 1 - 6
  • [44] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Leyou Zhang
    Qing Wu
    Yi Mu
    Jingxia Zhang
    Journal of Medical Systems, 2016, 40
  • [45] Study of Privacy-preserving Framework for Cloud Storage
    Huang RuWei
    Gui XiaoLin
    Yu Si
    Zhuang Wei
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (03) : 801 - 819
  • [46] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Zhang, Leyou
    Wu, Qing
    Mu, Yi
    Zhang, Jingxia
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [47] Privacy-Preserving Recommender Systems in Dynamic Environments
    Erkin, Z.
    Veugen, T.
    Lagendijk, R. L.
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 61 - 66
  • [48] Efficient and privacy-preserving biometric identification in cloud
    Hahn, Changhee
    Hur, Junbeom
    ICT EXPRESS, 2016, 2 (03): : 135 - 139
  • [49] Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments
    Su, Sen
    Teng, Yiping
    Cheng, Xiang
    Xiao, Ke
    Li, Guoliang
    Chen, Junliang
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (05) : 796 - 809
  • [50] Privacy-Preserving Energy Theft Detection in Microgrids: A State Estimation Approach
    Salinas, Sergio A.
    Li, Pan
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2016, 31 (02) : 883 - 894