Next Article in Journal
Identification of Motor and Mental Imagery EEG in Two and Multiclass Subject-Dependent Tasks Using Successive Decomposition Index
Previous Article in Journal
CoNTe: A Core Network Temporal Blockchain for 5G
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain

1
College of Software and Communication Engineering, Xiangnan University, Chenzhou 423000, China
2
College of Computer Science and Technology, Hengyang Normal University, Hengyang 421002, China
3
School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(18), 5282; https://doi.org/10.3390/s20185282
Submission received: 13 August 2020 / Revised: 3 September 2020 / Accepted: 10 September 2020 / Published: 15 September 2020
(This article belongs to the Section Internet of Things)

Abstract

:
As a next-generation power system, the smart grid can implement fine-grained smart metering data collection to optimize energy utilization. Smart meters face serious security challenges, such as a trusted third party or a trusted authority being attacked, which leads to the disclosure of user privacy. Blockchain provides a viable solution that can use its key technologies to solve this problem. Blockchain is a new type of decentralized protocol that does not require a trusted third party or a central authority. Therefore, this paper proposes a decentralized privacy-preserving data aggregation (DPPDA) scheme for smart grid based on blockchain. In this scheme, the leader election algorithm is used to select a smart meter in the residential area as a mining node to build a block. The node adopts Paillier cryptosystem algorithm to aggregate the user’s power consumption data. Boneh-Lynn-Shacham short signature and SHA-256 function are applied to ensure the confidentiality and integrity of user data, which is convenient for billing and power regulation. The scheme protects user privacy data while achieving decentralization, without relying on TTP or CA. Security analysis shows that our scheme meets the security and privacy requirements of smart grid data aggregation. The experimental results show that this scheme is more efficient than existing competing schemes in terms of computation and communication overhead.

1. Introduction

With the rapid development of society and economy, people’s demand for electric energy is increasing, which requires that the power supply be more secure and stable. However, the traditional power system cannot keep up with the pace of technological change, the system architecture remains unchanged, which leads to the decline of power system stability and frequent safety accidents. It brings a lot of inconvenience to people’s lives and causes huge economic losses to the government and enterprises. For example, in 2012, a large-scale blackout occurred in India, affecting 670 million people. Due to the low efficiency and security of the traditional power system, it cannot meet the development needs of human society. Therefore, smart grids emerge as the times require a new generation of power networks.
Smart grid is a fully-automated transmission network based on the physical grid system, which combines sensor measurement, computer, information communication, and automatic control technology [1]. The information flow between suppliers and users in smart grid is bidirectional, while the traditional power grid adopts the unidirectional centralized system. Users can control the intelligent use of household appliances and equipment at any time according to the floating situation of electricity price in different time periods. Suppliers can automatically monitor the grid, prevent power outages, optimize grid performance, etc. Although, compared with the traditional power grid, smart grid has many excellent characteristics. However, it is easy to cause the leakage of user electricity consumption data and identity information in the process of smart grid power data collection [2,3]. For example, the blackout notification software of Vector was attacked in 2018, resulting in the disclosure of private information of thousands of customers. With the continuous integration of network, information technology, and power system; network security has become an important part of energy and power security. For example, Ukraine’s power grid suffered the world’s first large-scale blackout due to hacker attacks at the end of 2015, and the leakage of private information brings great security risks to the power grid and users.
In order to deal with the leakage of power consumption data and identity privacy, data aggregation, secret sharing [4,5,6], differential privacy [7,8], and other schemes have been proposed by predecessors. Data aggregation is one of the most common methods to solve the security and privacy problems of smart grid. In [9,10,11,12,13,14,15,16,17,18,19], the scheme used encryption algorithms to aggregate the power consumption data of users, and hides the data of a single user in the data of other users to protect privacy. These schemes rely on a trusted third party or a central authority, but in fact the trusted third party or the central authority is not truly reliable, and the trusted third party or the central authority can be easily knocked down by malicious attackers and leak users’ private data.
Therefore, we propose a decentralized privacy-preserving data aggregation (DPPDA) scheme for smart grid based on blockchain, which is used to collect electricity consumption data without the trusted third party or the central authority in the smart grid.
We have summarized the contributions of our paper as follows:
(1)
A decentralized data aggregation scheme based on blockchain is proposed. Blockchain is a new type of decentralized protocol that does not require a trusted third party or a central authority. Since the proposed scheme does not require the trusted third party or the central authority, this assumption will have a positive impact on reliability, and we can refrain from the malicious attack to the trusted third party or the central authority.
(2)
The leader election algorithm is applied to select a smart meter from a residential area as a mining node (MN) to participate in the blockchain network. The MN uses Merkle hash tree to perform security authentication and data aggregation for smart meters in the residential area without any trusted third party.
(3)
Paillier encryption, Boneh-Lynn-Shacham short signature, and SHA-256 function are applied to ensure the transparency of the blockchain data while achieving multiple privacy protections, which can effectively resist various security threats (such as replay attacks, tampering).
Note that the original idea has been presented in a conference [20]. In the current version, more detailed description is added to make it more easily understandable, for example, the design goals, MN election, and security analysis. Especially through the performance evaluation, it is proved that the proposed scheme is superior to the existing schemes.
The rest of this paper is organized as follows. In Section 2, the previous work in privacy-preserving data aggregation are introduced. In Section 3, blockchain, bilinear pairing, Boneh-Lynn-Shacham short signature, and the Paillier cryptosystem are given. In Section 4, the proposed system model is presented, and our scheme is proposed in Section 5. The security analysis is shown in Section 6. In Section 7, the performance of our scheme is evaluated. The research is concluded in Section 8.

2. Related Work

Privacy-preserving data aggregation in smart grids have attracted extensive attention of researchers. At present, the smart grid data aggregation solutions can be roughly divided into the following three categories.
The first category is data aggregation schemes based on traditional network architecture. Li et al. [9] proposed a privacy-preserving multi-subset data aggregation scheme (PPMA), their scheme based on Paillier cryptosystem, which enables the aggregation of electricity consumption data of different ranges. Liu et al. [10] proposed a privacy-preserving data aggregation without any TTP. This scheme uses EC-ElGamal to encrypt power consumption data and construct a virtual aggregation area for users with a certain degree of trust to shield the data of a single user. Guan et al. [11] proposed a flexible threshold for data aggregation based on the secret sharing scheme. This scheme adjusts the aggregation threshold according to the energy consumption information and time period of each specific residential area to ensure the privacy of personal data during the aggregation process, while supporting fault tolerance. Karampour et al. [12] proposed using Paillier encryption system and AV net mask to realize the aggregation of privacy protection data in smart grid can effectively protect the privacy of user data without any security channel. Chen et al. [13] proposed a data aggregation scheme based on Paillier encryption. The trusted authority generates a key for the meter to encrypt the consumed data of the meter. When a smart meter cannot work normally, the trusted authority provides the pseudo ciphertext related to the meter. The scheme solves the problem of meter failure to some extent, but it cannot completely solve the problem of privacy protection. In [14], a dynamic member data aggregation scheme based on identity signature and homomorphic encryption algorithm is proposed. The operation center obtains the sum of power consumption data in the virtual aggregation area, but knows nothing about the single user’s use data. This scheme reduces the complexity of a new user joining and old user exiting. However, the above research methods do not consider the trusted environment and used a trusted third party or central authority.
The second category is data aggregation mechanism based on fog computing architecture. Lu et al. [15] proposed a privacy protection data aggregation scheme based on fog computing. In this scheme, the fog device is used as the gateway between the internet-of-things device and the control center. Lyu et al. [16] proposed a privacy-preserving aggregation scheme with the aid of fog computing architecture. This solution uses differential privacy to count user data, thereby ensuring data confidentiality. Zhu et al. [17] proposed a privacy-preserving data aggregation scheme for fog-based smart grid. Blind signature and short randomizable signature are used to provide anonymous authentication, and then fog node is used to solve the billing problem after anonymous authentication. All user data in the above solutions are concentrated in the fog layer, which inevitably brings about the problem of centralization.
The emergence of blockchain technology provides a solution to the trusted third party and centralization problems because of its decentralized characteristics. Currently, there are several studies using blockchain as privacy-preserving method for data aggregation. Guan et al. [18] proposed a privacy-preserving data aggregation scheme for power grid communications. The study divided users into different groups and each group has a private blockchain. The study uses multiple pseudonyms to hide users’ identity. In this scheme, a key management center (KMC) is used to generate multiple public and private keys for users, which does not realize decentralization. Fan et al. [19] proposed a smart grid data aggregation based on consortium blockchain, and its signcryption algorithm can be applied to multidimensional data collection in the consortium blockchain. CC is the trusted third party of the scheme, which can realize key user monitoring and data recovery.

3. Preliminaries

In this section, we briefly introduce the necessary background.

3.1. Blockchain

Blockchain technology was first proposed in 2008 by Satoshi Nakamoto for Bitcoin [21]. Blockchain technology has been widely used in payment, internet of things, healthcare, finance, and so on [22]. Blockchain is a decentralized distributed ledger database maintained by network-wide nodes [23], which comprise of a chain of different data blocks in a chronological order. All hash data added to the block is immutable. Blockchain is a new application mode of consensus mechanism, distributed data storage, encryption algorithm, and so on. The miners are responsible for creating blocks, and each block in the blockchain is identified by a hash in the header. The hash is generated by the SHA-256 hash algorithm, which uses plaintext of any size and computes a 256-bit encrypted hash of fixed size. Each header contains the address of the previous block in the chain. The information in the block cannot be deleted or changed. Blockchain has the characteristics of decentralization, anonymity, security, reliability, non-forgery, tamper resistance, and so on. Its key technologies include block structure, Merkle tree, P2P network, hash function, timestamp, asymmetric encryption mechanism, etc. [24].
(1)
Merkle tree. Merkle tree is a tree that stores hash values, also known as hash tree. The value of the Merkle tree leaf node is the hash value of the data block. The value of a non-leaf node is the hash of its corresponding child node concatenation string. Merkel root is the root value of the hash tree calculated by all transactions in the current block.
(2)
SHA-256. SHA-256 is the most widely used cryptographic secure hash algorithm (SHA) in the blockchain, which is used to maintain the data integrity within the block. It provides a unique 256-bit hash code, also called data file signature.
(3)
Timestamp. The blockchain uses timestamp to realize that all recorded transaction data are encoded by time information, which ensures the traceability and verifiability of the recorded data in the database. The “timestamp” technology makes the blockchain database non-tamperable and unforgeable, so it is also called proof-of-existence of the block data.

3.2. Bilinear Pairing

G 1 and G 2 are two q-order prime cyclic additive groups. e : G 1 × G 1 G 2 is a bilinear mapping [25,26] that has the following properties.
(1)
Bilinearity: e ( u a , v b ) = e ( u , v ) a b for all u , v G 1 , and a , b Z q * .
(2)
Non-degeneracy: for all u , v G 1 , e ( u , v ) 1 .
(3)
Computability: there exists an efficient algorithm to compute e ( u , v ) for all u , v G 1 .

3.3. Boneh-Lynn-Shacham Short Signature

Boneh-Lynn-Shacham (BLS) short signature [27] scheme is a typical bilinear pairing scheme, which uses SHA-256 hash function H 1 : { 0 , 1 } * G 1 and g is a random generator of G 1 , and a bilinear map e : G 1 × G 1 G 2 . The BLS signature scheme is divided into three phases: key generation, signature, and verification.
(1)
Key generation. The secret key x Z q * , and compute the public key P K = x g .
(2)
Signature. The plaintext m G 1 , compute the signature σ = x H ( m ) .
(3)
Verification. If e ( σ , g ) = e ( H ( m ) , P K ) , then the signature is verified. Otherwise fails.

3.4. Paillier Cryptosystem

Paillier cryptosystem [28] is a probabilistic public-key cryptosystem that uses asymmetric encryption algorithm, which can effectively implement homomorphic properties. The encryption algorithm satisfies homomorphism of addition and multiplication, and can operate directly on the ciphertext without needing to know the corresponding plaintext. Therefore, it is widely used in many privacy protection applications. It includes three algorithms: key generation, encryption, and decryption.
(1)
Key generation. Randomly select two large primes p and q , where | p | = | q | = | κ | . Then calculate λ = l c m ( p 1 , q 1 ) . Defined a function L ( v ) = v 1 N , where N = p q . Choose a generator g Z N 2 , and calculate μ = ( L ( g λ   mod   N 2 ) ) 1   mod   N . The public key is ( N , g ) , and the corresponding private key is ( λ , μ ) .
(2)
Encryption. Given a message m Z N , choose a random number r Z N * , gcd ( r , N ) = 1 . The ciphertext is calculated as C = E n c ( m ) = g m r N mod   N 2 .
(3)
Decryption. Given the ciphertext C Z N , the corresponding message is decrypted with the private key ( λ , μ ) as m = D e c ( C ) = L ( C λ   mod   N 2 ) μ   mod   N .

4. System Model

4.1. Communication Model

The system model of our scheme consists of operation center (OC) and smart meter (SM) in the residential area (RA), which is demonstrated in Figure 1. The system consists of L residential areas, and each residential area contains several smart meters. In our scheme, we mainly focus on removing the control center and the trusted third party while protecting the data privacy of the user’s smart meter.
(1)
Operation center (OC). OC reads the real-time total power consumption data aggregated by the mining nodes of L blocks through the blockchain. OC can also perform billing, power consumption trend analysis, adjustment of power generation plans, and dynamic pricing. OC is vulnerable to attacks by external adversary. Therefore, OC is not assumed to be trusted.
(2)
Smart meter (SM). A SM is an electricity meter for each user’s site in the residential area. The smart meter regularly and simultaneously (e.g., every 15 min) collects the power consumption data of each user’s household electrical equipment. Peer-to-peer (P2P) communication is used between all SMs in each residential area. Each residential area uses leader election algorithm to select a smart meter from the smart meters as the mining node (MN), then each residential area constructs a block through a MN. The MN selected by the MN selection algorithm can replace a trusted third party or a trusted authority, it is responsible for generating system parameters, authenticates the legitimacy of the data transmitted by the smart meter, and aggregates the encrypted data. Then, SM encrypts all kinds of collected data and uploads it to the MN after a short period of time. SM is assumed to be honest-but-curious, which executes the operations according the protocol without launching the active attack. However, it perhaps tries to analyze the received data to infer some valuable information.

4.2. Design Goals

To solve the issues mentioned above, ensure the integrity and privacy of users’ power consumption data while decentralizing or not relying on the trusted third parties, the design goals include five aspects.
(1)
Privacy-preservation. Neither OC nor any other user has access to other user’s data in the residential area. An external adversary cannot obtain the user’s power consumption data, even if he knows the ciphertext. Even if the adversary and OC collude with each other, they can’t get the power consumption data of a single user’s smart meter.
(2)
Decentralizing. Our scheme does not need a trusted third party or a central authority. The leader election algorithm is used to select a smart meter in the residential area as the mining node, which is responsible for building the Merkle tree of the block and aggregating the power consumption data of the residential area.
(3)
Data unforgeability and non-repudiation. Our scheme adopts BLS short signature in blockchain, which is based on bilinear pair to ensure the unforgeability and non-repudiation of data.
(4)
Data security. The proposed scheme can defend against various attacks. Even if the aggregate ciphertext of users’ electricity consumption data is intercepted, the individual user’s electricity consumption data cannot be recovered.
(5)
Confidentiality. The data of electricity consumption belongs to personal privacy, which can reflect the real-time power consumption of users’ homes. Once the data is leaked, it will be used by criminals to commit crimes. Data confidentiality should be maintained by a secure data aggregation scheme. Even if an attacker steals the ciphertext, it will not be able to obtain the power consumption data of a single user.

5. The Proposed Scheme

In this section, a decentralized smart grid privacy protection data aggregation scheme based on block chain is proposed, which consists of five phases: system initialization, ciphertext generation, ciphertext aggregation, ciphertext decryption, and data reading. The notations are listed in Table 1.
Each smart meter in the system acts as a node, and each node has three states: follower, MN, and candidate. All nodes start from the follower state. Each term begins with an election in which one or more candidates try to become MNs. If a candidate wins the election, it will be a MN for the rest of its term. The state change of MN election algorithm is shown in Figure 2.

5.1. System Initialization

OC collects electricity consumption data of smart meters in L residential areas. There are n smart meters in R A j . Through Algorithm 1, it selects a SM as a mining node from the n SMs in R A j , then constructs the jth block, where M N j is the root of the Merkle tree in the jth block. The consumption data of SMs in R A j is aggregated to M N j through Merkle tree. The structure of blockchain is shown in Figure 3.
Algorithm 1. MN Election
1.  Set the initial state of SM[i] to Follower,i∈[1,n],n is the number of SMs in RA;
2.  Let the number of terms of SM[i] elected as MN be 0,TN = 0;
3.  Set the number of votes obtained by SM[i] to 0,Nv = 0;
4.  Start the Timer of Follower FT;
5.  Set a random timeout of Follower FRTout;
6.  while FT > FRTout do
7.  The state of SM[i] has changed from Follower to Candidate;
8.  TN = TN + 1;
9.  Start the Timer of Candidate CT;
10.  Set a random timeout of Candidate CRTout;
11.  Nv = Nv + 1;
12.  SM[i] with Candidate state sends a request of voting to other SMs;
13.  SM[i] counts the number k of voting responses received from other SMs;
14.  Nv = Nv + k;
15.  if Nv > n/2 + 1 then
16.  The state of SM[i] has changed from Candidate to MN;
17.  SM[i] sends messages that are selected as MN to other SMs;
18.  end if
19.  if SM[i] receives messages from a SM that is selected as MN then
20.  The state of SM[i] has changed from Candidate to Follower;
21.  end if
22.  while CT > CRTout do
23.  Repeat step 8–11 for a new election
24.  endwhile
25.  endwhile
M N j runs Bilinear parameter generator G e n ( κ ) to generate ( q , g 1 , G 1 , G 2 , e ) , and g 1 is a generator of G 1 . M N j calculates Paillier cryptosystem public key ( N , g 2 ) , corresponding private key ( λ , μ ) , g 2 Z N 2 . M N j choose a SHA-256 hash function H 1 and a secure cryptographic hash function H 2 , where H 1 : { 0 , 1 } G 1 , H 2 : { 0 , 1 } { 0 , 1 } κ .
M N j publishes the system public parameter { q , g 1 , g 2 , G 1 , G 2 , e , N , H 1 } .

5.2. Ciphertext Generation

Step 1
S M i selects a random number x i Z q as the private key and computes the corresponding public key P K i = x i g 1 .
Step 2
S M i collects electricity consumption data m i at timestamp T, and computes the Hash value H 2 ( T ) , then selects a random number r i Z N * to generate ciphertext:
C i = g 2 m i × ( r i × H 2 ( T ) ) N mod   N 2 .
Step 3
S M i generates the BLS short signature σ i = x i H 1 ( C i P K i T s i ) , T s i is the current timestamp to prevent replay attack.
Step 4
S M i sends C i P K i T s i σ i to MN through the Merkle tree.

5.3. Ciphertext Aggregation

After M N j receives users’ data C i P K i T s i σ i , it performs the following steps for privacy-preserving data aggregation.
Step 1
M N j verifies n signatures after receiving C i P K i T s i σ i . If e ( σ i , g i ) = e ( H 1 ( C i P K i T s i ) , P K i ) validation is successful and fails otherwise. If it holds, the signature is valid and M N j will accept S M i ’s ciphertext.
In order to make the verification more efficient, M N j adopts batch verification
e ( σ i , g 1 ) ? _ _ e ( H 1 ( C i P K i T s i ) , P K i )
The proof is given as follows.
e ( i = 1 n σ i , g 1 ) = e ( i = 1 n x i H 1 ( C i P K i T s i ) , g 1 ) = i = 1 n e ( x i H 1 ( C i P K i T s i ) , g 1 ) = i = 1 n e ( H 1 ( C i P K i T s i ) , x i g 1 )
Step 2
M N j aggregates the ciphertext.
C = E n c ( m ) = i = 1 n C i   = i = 1 n g 2 ( r i H 2 ( T ) ) N   mod   N 2 = g 2 i = 1 n m i i = 1 n ( r i H 2 ( T ) ) N   mod   N 2

5.4. Ciphertext Decryption

M N j uses the private key ( λ , μ ) to decrypt the aggregated ciphertext to obtain the aggregated electricity consumption data M j of the j th residential district.
M j = D e c ( C ) = L ( C λ   mod   N 2 ) μ   mod   N   = L ( C λ   mod   N 2 ) L ( g 2 λ   mod   N 2 )   mod   N   = L ( g 2 i = 1 n m i λ mod   N 2   ) L ( g 2 λ mod   N 2   ) mod   N

5.5. Data Reading

M N j generates the ( j + 1 ) th block, and adds the j th block to the blockchain after the ( j 1 ) th block. OC obtains the power consumption data through the public key read blockchain.

6. Security Analysis

The security of DPPDA in smart grid is compared with that of schemes [9,11,12,13], as shown in Table 2.

6.1. Privacy-Preservation

To avoid the leakage of the power consumption data m i , we mainly consider the external attack and the internal attack.
First, we assume that the external adversary may eavesdrops the communication between SMs and MN to obtain the electricity consumption data m i . In DPPDA, S M i reports m i to M N j in the form of C i = g 2 m i × ( r i × H 2 ( T ) ) N mod   N 2 . Let r = r i × H 2 ( T ) , then the ciphertext expression will become C i = g 2 m i × r N mod   N 2 . The ciphertext C i is still the legal ciphertext of the Paillier cryptosystem. Because the adversary does not know the decryption key λ of the Paillier encryption algorithm, the adversary cannot decrypt the ciphertext C i to obtain the power consumption data of a single user. The power consumption data of a single smart meter is not disclosed, so as to protect the privacy of users.
Second, we assume that the internal adversary includes S M 1 , S M 2 , ···, S M n 1 , and they collude to obtain the power consumption m n of S M n . The expression of n SMs is expressed as: i = 1 n m i = 0   mod   λ . For (n−1) users, the expression can be rewritten as: m n + i = 1 n 1 m i = 0   mod   λ . This means without having Paillier’s secret key λ , the internal adversary will not be able to obtain m n . We can conclude that, no matter how many SMs are colluded, the internal adversary cannot disclose the power consumption data m i of the other users.

6.2. Decentralized

In our scheme, the blockchain can be implemented without a trusted third party or central authority, the availability and reliability of data is guaranteed by MN election. Any SM is not controlled or operated by other SMs and OC. P2P network is adopted among smart meters to realize decentralization. The whole process does not rely on a trusted third party to make our solution more reliable and convenient.

6.3. Data Security

The electricity consumption data of S M i in R A j is encrypted as C i = g 2 m i × ( r i × H 2 ( T ) ) N mod   N 2 , mi is secure and privacy-preservation. Even if an adversary intercepts C i , he/she cannot recover the power consumption data of a single smart meter. After MN collects all the smart meter power consumption data in the residential area through data aggregation, only the aggregated data can be obtained through decryption, and the plaintext of single smart meter power consumption data cannot be recovered.

6.4. Confidentiality

The power consumption data includes user privacy and business secrets. The usage data of the smart meters are encrypted by Paillier cryptosystem algorithm derived from [29]. After receiving the ciphertext of the smart meters in the residential area, only MN can decrypt the aggregated plaintext data. Since Theorem 1 of [28] represents confidentiality based on the DDH assumption, even if the adversary eavesdrops on the ciphertext of the smart meters in the residential area, the adversary still cannot infer any relevant information about usage data sent by the smart meters. The confidentiality of user power consumption data is guaranteed.

6.5. Data Integrity and Non-Repudiation

SHA is an anti-collision algorithm where different inputs (data information) cannot produce the same output (hash value), so SHA-256 can be used to check whether the data information is the same. The integrity of the data is determined by comparing the calculated “hash value” with the known hash value. Each smart meter in the scheme signs the message to be sent. MN receives the message after verifying the signature to ensure the integrity of the data and prevent tampering. Each smart meter’s private key is kept by itself and cannot be denied the information it sends and signs.

6.6. Data Unforgeability

All SMs use their private keys to sign their messages before sending MN use SM public keys to verify received messages. The proposed scheme uses the BLS signature based on the CDH [30], which makes it impossible for any attacker to forge a new signature by eavesdropping on the original signature. BLS short signature and blockchain are used to verify the source and authenticity of power consumption data. Since all transactions in the blockchain have timestamps and all hash data added to the block cannot be changed, the data in the blockchain has unforgeability.

7. Performance Evaluation

The performance of our scheme is evaluated in this section, including the computation complexity of SM and OC, and the communication overhead.

7.1. Computation Complexity

Compared with multiplication operation and exponentiation operation, leader election and hash operation is negligible. In our scheme, the computations in the data aggregation process mainly include three phases, data encryption, batch verification, and aggregation, decryption. We denote the computational cost of an exponentiation operation and a multiplication operation, by T e x p , T m u l , respectively. The computation complexities of the major entities in the system are as show in Table 3.
We conduct the experiments with the cpabe0.10 [31] library on a 3.0-GHz processor and a 2-GB memory PC. As shown in Figure 4, compared with PPMA, EFFECT, and Karampour’s schemes, our scheme has much less computational overhead. As the number of users increases, the advantages of our scheme become more obvious.

7.2. Communication Overhead

The communication of our proposed scheme is only S M i to M N j , the power consumption data collected by S M i is used to generate the report ( C i P K i T s i σ i ) and is sent to M N j . The size of S M i report is S z = | C i | + | P K i | + | T s i | + | σ i | . The maximum communication overhead is S max = n S z = n ( | C i | + | P K i | + | T s i | + | σ i | ) . Suppose that C i generates a 2048-bit ciphertext and chooses 160-bit Z N , 160-bit G.
In PPMA and EFFECT scheme, the communication cost on SM-to-GW is 2048n bit, the communication cost on GW-to-CC is 2048 bit, the total communication overhead is 2048(n + 1) bit. In Karampour’s scheme, the communication cost on SM-to-SM is n(2048(n − 1)) bit, the communication cost on SM-to-GW is 2048n bit, the communication cost on GW-to-CC is 2048 bit, the total communication overhead is 2048(n2 + 1) bit.
In our scheme, the total communication overhead is 2048n bit. The comparison is shown in Table 4, the total communication cost of our scheme is less than the other schemes.
In Figure 5, we plot the communication cost in PPMA, EFFECT, Karampour’s, and our scheme versus the SM number n. It is shown that our scheme does not bring too much communication overhead.

8. Conclusions

In this paper, a decentralized smart grid privacy-preservation data aggregation scheme based on blockchain is proposed. The smart meters select a mining node through leader election algorithm, which records the data of smart meters into the blockchain. BLS signature and Paillier encryption are based on bilinear pairing, which guarantees the security and integrity of messages during transmission. Security analysis shows that our mechanism meets the requirements of privacy protection and security of smart meters. The performance evaluation shows that our scheme is superior to some popular data aggregation schemes in computational efficiency. Our scheme has low communication overhead and does not require any trusted third party, trusted authority, and secure channels. At present, we have decentralized the aggregation of one-dimensional power consumption data. In the future, we will work on the combination of blockchain and other algorithms to aggregate multidimensional power consumption data.

Author Contributions

Y.L. supervised the study; H.F. and Y.L. designed the study, H.F. wrote the manuscript, performed the experiment research and the theoretical analysis; H.F. and Z.Z. prepared the figures and tables. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Intelligent Information Processing and Application Hunan Provincial Key Laboratory Open Fund Project of Hengyang Normal University (grant no. IIPA20K05), Xiangnan University Information Teaching Application Construction Project in 2016 (grant Xiangnan University xiao fa (2016) no. 60,7).

Acknowledgments

We thank all the editors for their comments on this manuscript.

Conflicts of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart Grid—The New and Improved Power Grid: A Survey. IEEE Commun. Surv. Tutor. 2011, 14, 944–980. [Google Scholar] [CrossRef]
  2. Xue, K.; Li, S.; Hong, J.; Xue, Y.; Yu, N.; Hong, P. Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1596–1608. [Google Scholar] [CrossRef]
  3. Wu, J.; Dong, M.; Ota, K.; Liang, L.; Zhou, Z. Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Netw. Appl. 2014, 8, 1133–1142. [Google Scholar] [CrossRef]
  4. Guan, Z.; Si, G.; Du, X.; Liu, P. Protecting User Privacy Based on Secret Sharing with Error Tolerance for Big Data in Smart Grid. arXiv 2018, arXiv:1811.06918. [Google Scholar]
  5. Chen, J.; Liu, G.; Liu, Y. Lightweight Privacy-preserving Raw Data Publishing Scheme. IEEE Trans. Emerg. Top. Comput. 2020, 1. [Google Scholar] [CrossRef]
  6. Liu, Y.-N.; Zhao, Q. E-voting scheme using secret sharing and K-anonymity. World Wide Web 2018, 22, 1657–1667. [Google Scholar] [CrossRef]
  7. Hassan, M.U.; Rehmani, M.H.; Kotagiri, R.; Zhang, J.; Chen, J. Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 2019, 131, 69–80. [Google Scholar] [CrossRef]
  8. Piao, C.; Shi, Y.; Yan, J.; Zhang, C.; Liu, L. Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach. Future Gener. Comput. Syst. 2019, 90, 158–174. [Google Scholar] [CrossRef]
  9. Li, S.; Xue, K.; Yang, Q.; Hong, P. PPMA: Privacy-Preserving Multisubset Data Aggregation in Smart Grid. IEEE Trans. Ind. Inf. 2018, 14, 462–471. [Google Scholar] [CrossRef]
  10. Liu, Y.-N.; Guo, W.; Fan, C.-I.; Chang, L.; Cheng, C. A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid. IEEE Trans. Ind. Inf. 2018, 15, 1767–1774. [Google Scholar] [CrossRef]
  11. Guan, Z.; Zhang, Y.; Zhu, L.; Wu, L.; Yu, S. EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 2019, 62, 32103. [Google Scholar] [CrossRef] [Green Version]
  12. Karampour, A.; Ashouri-Talouki, M.; Ladani, B.T. An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid. In Proceedings of the 2019 27th Iranian Conference on Electrical Engineering (ICEE), Yazd, Iran, 30 April–2 May 2019; pp. 1967–1971. [Google Scholar]
  13. Chen, L.; Lu, R.; Cao, Z. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw. Appl. 2015, 8, 1122–1132. [Google Scholar] [CrossRef]
  14. Song, J.; Liu, Y.-N.; Shao, J.; Tang, C. A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid. IEEE Syst. J. 2020, 14, 900–908. [Google Scholar] [CrossRef]
  15. Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
  16. Lyu, L.; Nandakumar, K.; Rubinstein, B.; Jin, J.; Bedo, J.; Palaniswami, M.; Rubinstein, B. PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid. IEEE Trans. Ind. Inform. 2018, 14, 3733–3744. [Google Scholar] [CrossRef]
  17. Zhu, L.; Li, M.; Zhang, Z.; Xu, C.; Zhang, R.; Du, X.; Guizani, N. Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid. IEEE Commun. Mag. 2019, 57, 80–85. [Google Scholar] [CrossRef]
  18. Guan, Z.; Si, G.; Zhang, X.; Wu, L.; Guizani, N.; Du, X.; Ma, Y. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities. IEEE Commun. Mag. 2018, 56, 82–88. [Google Scholar] [CrossRef] [Green Version]
  19. Fan, M.; Zhang, X. Consortium Blockchain Based Data Aggregation and Regulation Mechanism for Smart Grid. IEEE Access 2019, 7, 35929–35940. [Google Scholar] [CrossRef]
  20. Fan, H.; Liu, Y.; Zeng, Z. Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. In Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, Hilo, HI, USA, 12–14 March 2020. [Google Scholar]
  21. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; BN Publishing: Hawthorne, CA, USA, 2019. [Google Scholar]
  22. Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016, 2, 71. [Google Scholar]
  23. Yuan, Y.; Wang, F.-Y. Parallel blockchain: Concept, methods and issues. Acta Autom. Sin. 2017, 43, 1703–1712. [Google Scholar]
  24. Xie, Q.H. Research on blockchain technology and financial business innovation. Financ. Dev. Res. 2017, 5, 77–82. [Google Scholar]
  25. Boneh, D.; Franklin, M. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology—CRYPTO 2001; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2001; Volume 2139, pp. 213–229. [Google Scholar]
  26. Joux, A. A One Round Protocol for Tripartite Diffie–Hellman. In International Algorithmic Number Theory Symposium; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2000; Volume 1838, pp. 385–393. [Google Scholar]
  27. Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. In Advances in Cryptology-ASIACRYPT 2001; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2001; Volume 2248, pp. 514–532. [Google Scholar]
  28. Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology-EUROCRYPT ’99; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2007; Volume 1592, pp. 223–238. [Google Scholar]
  29. Shi, E.; Chan, T.-H.; Rieffel, E.G.; Chow, R.; Song, D. Privacy-preserving aggregation of time-series data Annual Network & Distributed System Security Symposium (NDSS). Int. Soc. 2011, 2, 1–17. [Google Scholar]
  30. Bao, F.; Deng, R.H.; Zhu, H. Variations of Diffie-Hellman Problem. In Information and Communications Security; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2003; Volume 2836, pp. 301–312. [Google Scholar]
  31. Bethencourt, J. Advanced Crypto Software Collection: The CPABE Toolkit. 2018. Available online: http://acsc.cs.utexas.edu/cpabe/ (accessed on 24 March 2018).
Figure 1. System model.
Figure 1. System model.
Sensors 20 05282 g001
Figure 2. State transition model of MN election algorithm.
Figure 2. State transition model of MN election algorithm.
Sensors 20 05282 g002
Figure 3. Blockchain structure in our scheme.
Figure 3. Blockchain structure in our scheme.
Sensors 20 05282 g003
Figure 4. Comparison of computational cost.
Figure 4. Comparison of computational cost.
Sensors 20 05282 g004
Figure 5. Comparison of communication cost.
Figure 5. Comparison of communication cost.
Sensors 20 05282 g005
Table 1. Notations.
Table 1. Notations.
SymbolQuantity
g 1 , g 2 A generator of G
R A j the jth residential area
m i Power consumption data of the ith smart meter in R A j
n Number of smart meters in the jth residential area
H 1 Hash functions: H 1 : {0,1}*→G
L Number of residential areas
S M i Smart meter in jth residential area
M N j Mining node of the jth residential area
M j the aggregated electricity consumption data of the jth residential areas
Concatenation operation
Table 2. Comparison between the proposed scheme and other related schemes.
Table 2. Comparison between the proposed scheme and other related schemes.
Security Requirements[9][11][12][13]DPPDA
Blockchain-basedNoNoNoYesYes
DecentralizationNoNoNoNoYes
Non-repudiationNoYesNoYesYes
PrivacyYesYesYesYesYes
ConfidentialityYesYesYesYesYes
Data integrityYesYesYesYesYes
Replay attack resistanceNoYesYesYesYes
Data unforgeabilityNoYesYesYesYes
Table 3. Comparing computation complexity between the proposed scheme and other schemes.
Table 3. Comparing computation complexity between the proposed scheme and other schemes.
Scheme Ref.[9][11][12]DPPDA
Overhead SM 3 T e x p + 4 T m u l 4 T e x p + 3 T m u l 2 T e x p + n T m u l 2 T e x p + 4 T m u l
Overhead GW n T m u l 3 T e x p + ( 2 n + 1 ) T m u l n T m u l -
Overhead CC T e x p + ( 4 n + 3 ) T m u l 3 T e x p + 2 T m u l T e x p + 3 T m u l -
Overhead MN--- T e x p + ( n + 1 ) T m u l
Table 4. Comparing communication cost between the proposed scheme and other schemes.
Table 4. Comparing communication cost between the proposed scheme and other schemes.
Scheme Ref.[9][11][12]DPPDA
SM-to-SM (bit)--n(2048 (n − 1))-
SM-to-GW (bit)2048n2048n2048n-
GW-to-CC (bit)204820482048-
SM-to-MN (bit)---2048n

Share and Cite

MDPI and ACS Style

Fan, H.; Liu, Y.; Zeng, Z. Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain. Sensors 2020, 20, 5282. https://doi.org/10.3390/s20185282

AMA Style

Fan H, Liu Y, Zeng Z. Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain. Sensors. 2020; 20(18):5282. https://doi.org/10.3390/s20185282

Chicago/Turabian Style

Fan, Hongbin, Yining Liu, and Zhixin Zeng. 2020. "Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain" Sensors 20, no. 18: 5282. https://doi.org/10.3390/s20185282

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop