SCIENCE CHINA Information Sciences, Volume 62, Issue 3: 032103(2019) https://doi.org/10.1007/s11432-018-9451-y

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid

More info
  • ReceivedFeb 27, 2018
  • AcceptedMay 14, 2018
  • PublishedJan 11, 2019


Smart grid is considered as a promising approach to solve the problems of carbon emission and energy crisis. In smart grid, the power consumption data are collected to optimize the energy utilization. However, security issues in communications still present practical concerns. To cope with these challenges, we propose EFFECT, an efficient flexible privacy-preserving aggregation scheme with authentication in smart grid. Specifically, in the proposed scheme, we achieve both data source authentication and data aggregation in high efficiency. Besides, in order to adapt to the dynamic smart grid system, the threshold for aggregation is adjusted according to the energy consumption information of each particular residential area and the time period, which can support fault-tolerance while ensuring individual data privacy during aggregation. Detailed security analysis shows that our scheme can satisfy the desired security requirements of smart grid. In addition, we compare our scheme with existing schemes to demonstrate the effectiveness of our proposed scheme in terms of low computational complexity and communication overhead.


This work was partially supported by Beijing Natural Science Foundation (Grant No. 4182060), and Fundamental Research Funds for the Central Universities (Grant No. 2018ZD06).


[1] Wang K, Du M, Maharjan S. Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid. IEEE Trans Smart Grid, 2017, 8: 2474-2482 CrossRef Google Scholar

[2] Guan Z T, Si G L, Zhang X S, et al. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag, 2018, 56: 82--88. Google Scholar

[3] Xue K P, Li S, Hong J, et al. Two-cloud secure database for numeric-related sql range queries with privacy preserving. IEEE T Inf Foren Sec, 2017. Google Scholar

[4] Wu J, Dong M, Ota K. Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Netw Appl, 2015, 8: 1133-1142 CrossRef Google Scholar

[5] Erkin Z, Troncoso-Pastoriza J, Lagendijk R, et al. Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Proc Mag, 2013, 30: 75-86. Google Scholar

[6] Yan Y, Qian Y, Sharif H. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges. IEEE Commun Surv Tutorials, 2013, 15: 5-20 CrossRef Google Scholar

[7] Cho S, Li H, Choi B J. Palda: efficient privacy-preserving authentication for lossless data aggregation in smart grids. In: Proceedings of IEEE International Conference on Smart Grid Communications, 2014. 914--919. Google Scholar

[8] Guan Z T, Li J, Zhu L H, et al. Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources. IEEE T Ind Inform. 2017, 13: 3216-3225. Google Scholar

[9] Zheng J, Tan Y, Zhang Q. Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci, 2018, 61: 048103 CrossRef Google Scholar

[10] Guan Z, Li J, Wu L. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid. IEEE Internet Things J, 2017, 4: 1934-1944 CrossRef Google Scholar

[11] Zhang Z J, Qin Z, Zhu L H, et al. Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE T Smart Grid, 2016, 8: 619-626. Google Scholar

[12] Li S, Xue K, Yang Q. PPMA: Privacy-Preserving Multisubset Data Aggregation in Smart Grid. IEEE Trans Ind Inf, 2018, 14: 462-471 CrossRef Google Scholar

[13] Li S, Zhang X, Xue K. Privacy-preserving prepayment based power request and trading in smart grid. China Commun, 2018, 15: 14-27 CrossRef Google Scholar

[14] Xiao Y, Tan Y A, Sun Z Z, et al. A fault-tolerant and energy-efficient continuous data protection system. J AMB INTEL HUM COMP, 2018, 1: 1-10. Google Scholar

[15] Przydatek B, Song D, Perrig A. Sia: secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003. 255--265. Google Scholar

[16] Shi E, Chan T H, Rieffel E, et al. Privacy-preserving aggregation of time-series data. In: Proceedings of the 18th Annual Network and Distributed System Security Conference, 2011. Google Scholar

[17] Kim Y S, Heo J. Device authentication protocol for smart grid systems using homomorphic Hash. J Commun Netw, 2012, 14: 606-613 CrossRef Google Scholar

[18] Lu R X, Liang X H, Li X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Paral Distrib Syst, 2012, 23: 1621-1631 CrossRef Google Scholar

[19] Chen L, Lu R X, Cao Z F. Pdaft: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer Peer Netw Appl. 2015, 8: 1122-1132. Google Scholar

[20] Shi Z, Sun R, Lu R. Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications. IEEE Trans Smart Grid, 2015, 6: 2856-2868 CrossRef Google Scholar

[21] Wu J, Dong M, Ota K. Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks. IEEE Trans Netw Serv Manage, 2018, 15: 27-38 CrossRef Google Scholar

[22] Zhang X, Tan Y, Xue Y. Cryptographic key protection against FROST for mobile devices. Cluster Comput, 2017, 20: 2393-2402 CrossRef Google Scholar

[23] Gao S, Ma X, Zhu J. APRS: a privacy-preserving location-aware recommender system based on differentially private histogram. Sci China Inf Sci, 2017, 60: 119103 CrossRef Google Scholar

[24] Mustafa M A, Zhang N, Kalogridis G, et al. Dep2sa: A decentralized efficient privacy-preserving and selective aggregation scheme in advanced metering infrastructure. IEEE Access, 2016, 3: 2828-2846. Google Scholar

[25] Wang T, Zeng J, Bhuiyan M Z A. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access, 2017, 5: 7692-7701 CrossRef Google Scholar

[26] Shen H, Zhang M, Shen J. Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. IEEE TransInformForensic Secur, 2017, 12: 1369-1381 CrossRef Google Scholar

[27] Fouda M M, Fadlullah Z M, Kato N. A Lightweight Message Authentication Scheme for Smart Grid Communications. IEEE Trans Smart Grid, 2011, 2: 675-685 CrossRef Google Scholar

[28] Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on Theory and Application of Cryptographic Techniques, 1999. 223--238. Google Scholar

[29] Blakley G R. Safeguarding cryptographic keys. In: Proceeding of International Workshop on Managing Requirements Knowledge, 1979. 313--317. Google Scholar

[30] Yu Y, Xue L, Au M H. Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Generation Comput Syst, 2016, 62: 85-91 CrossRef Google Scholar

[31] Bellare M, Garay J A, Rabin T. Fast batch verification for modular exponentiation and digital signatures. In: Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques, 1998. 236--250. Google Scholar

[32] Li H, Lin X, Yang H. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Trans Parallel Distrib Syst, 2014, 25: 2053-2064 CrossRef Google Scholar

[33] Dan B, Lynn B, Shacham H. Short signatures from the weil pairing. In: Proceeding of International Conference on the Theory and Application of Cryptology and Information Security, 2001. 514--532. Google Scholar

[34] Failla P. Privacy preserving processing of biometric templates by homomorphic encryption. Ph.D. Thesis. Siena: University of Siena. 2011. Google Scholar

[35] Lynn B. PBC: the pairing-based cryptography library. Version 0.5.14, 2013. http://crypto.stanford.edu/pbc/. Google Scholar

  • Figure 1

    (Color online) The conceptual architecture of smart grid.

  • Figure 2

    (Color online) System model of EFFECT scheme.

  • Figure 3

    (Color online) Initialization process.

  • Figure 4

    (Color online) Computational cost considering fault tolerance.

  • Figure 5

    (Color online) Comparison of communication overhead with (a) different user numbers, and (b) different data size.

  • Table 1   Computation complexity
    Entity name Involving operations Computation complexity
    3*SM (1) User's electricity usage data collection
    (2) Data encryption
    (3) Signature $\delta_i$ generation
    3*GW (1) User's data integrity verification and sender authentication
    (2) User's data aggregation
    (3) Signature $\sigma_j$ generation
    2*CC (1) Aggregated data integrity verification and sender authentication
    (2) Data decryption
  • Table 2   Comparison of computation complexity in authentication phrase
    Scheme EPPA EPPDA Shen's scheme EFFECT
    Complexity $(n+1)~\times~C_p$ $2n~\times~C_p$ $(n+2)~\times~C_p$ $n~\times~C_m+C_e$

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号