Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain
Abstract
:1. Introduction
- (1)
- A decentralized data aggregation scheme based on blockchain is proposed. Blockchain is a new type of decentralized protocol that does not require a trusted third party or a central authority. Since the proposed scheme does not require the trusted third party or the central authority, this assumption will have a positive impact on reliability, and we can refrain from the malicious attack to the trusted third party or the central authority.
- (2)
- The leader election algorithm is applied to select a smart meter from a residential area as a mining node (MN) to participate in the blockchain network. The MN uses Merkle hash tree to perform security authentication and data aggregation for smart meters in the residential area without any trusted third party.
- (3)
- Paillier encryption, Boneh-Lynn-Shacham short signature, and SHA-256 function are applied to ensure the transparency of the blockchain data while achieving multiple privacy protections, which can effectively resist various security threats (such as replay attacks, tampering).
2. Related Work
3. Preliminaries
3.1. Blockchain
- (1)
- Merkle tree. Merkle tree is a tree that stores hash values, also known as hash tree. The value of the Merkle tree leaf node is the hash value of the data block. The value of a non-leaf node is the hash of its corresponding child node concatenation string. Merkel root is the root value of the hash tree calculated by all transactions in the current block.
- (2)
- SHA-256. SHA-256 is the most widely used cryptographic secure hash algorithm (SHA) in the blockchain, which is used to maintain the data integrity within the block. It provides a unique 256-bit hash code, also called data file signature.
- (3)
- Timestamp. The blockchain uses timestamp to realize that all recorded transaction data are encoded by time information, which ensures the traceability and verifiability of the recorded data in the database. The “timestamp” technology makes the blockchain database non-tamperable and unforgeable, so it is also called proof-of-existence of the block data.
3.2. Bilinear Pairing
- (1)
- Bilinearity: for all , and .
- (2)
- Non-degeneracy: for all , .
- (3)
- Computability: there exists an efficient algorithm to compute for all .
3.3. Boneh-Lynn-Shacham Short Signature
- (1)
- Key generation. The secret key , and compute the public key .
- (2)
- Signature. The plaintext , compute the signature .
- (3)
- Verification. If , then the signature is verified. Otherwise fails.
3.4. Paillier Cryptosystem
- (1)
- Key generation. Randomly select two large primes and , where . Then calculate . Defined a function , where . Choose a generator , and calculate . The public key is , and the corresponding private key is .
- (2)
- Encryption. Given a message , choose a random number , . The ciphertext is calculated as .
- (3)
- Decryption. Given the ciphertext , the corresponding message is decrypted with the private key as .
4. System Model
4.1. Communication Model
- (1)
- Operation center (OC). OC reads the real-time total power consumption data aggregated by the mining nodes of L blocks through the blockchain. OC can also perform billing, power consumption trend analysis, adjustment of power generation plans, and dynamic pricing. OC is vulnerable to attacks by external adversary. Therefore, OC is not assumed to be trusted.
- (2)
- Smart meter (SM). A SM is an electricity meter for each user’s site in the residential area. The smart meter regularly and simultaneously (e.g., every 15 min) collects the power consumption data of each user’s household electrical equipment. Peer-to-peer (P2P) communication is used between all SMs in each residential area. Each residential area uses leader election algorithm to select a smart meter from the smart meters as the mining node (MN), then each residential area constructs a block through a MN. The MN selected by the MN selection algorithm can replace a trusted third party or a trusted authority, it is responsible for generating system parameters, authenticates the legitimacy of the data transmitted by the smart meter, and aggregates the encrypted data. Then, SM encrypts all kinds of collected data and uploads it to the MN after a short period of time. SM is assumed to be honest-but-curious, which executes the operations according the protocol without launching the active attack. However, it perhaps tries to analyze the received data to infer some valuable information.
4.2. Design Goals
- (1)
- Privacy-preservation. Neither OC nor any other user has access to other user’s data in the residential area. An external adversary cannot obtain the user’s power consumption data, even if he knows the ciphertext. Even if the adversary and OC collude with each other, they can’t get the power consumption data of a single user’s smart meter.
- (2)
- Decentralizing. Our scheme does not need a trusted third party or a central authority. The leader election algorithm is used to select a smart meter in the residential area as the mining node, which is responsible for building the Merkle tree of the block and aggregating the power consumption data of the residential area.
- (3)
- Data unforgeability and non-repudiation. Our scheme adopts BLS short signature in blockchain, which is based on bilinear pair to ensure the unforgeability and non-repudiation of data.
- (4)
- Data security. The proposed scheme can defend against various attacks. Even if the aggregate ciphertext of users’ electricity consumption data is intercepted, the individual user’s electricity consumption data cannot be recovered.
- (5)
- Confidentiality. The data of electricity consumption belongs to personal privacy, which can reflect the real-time power consumption of users’ homes. Once the data is leaked, it will be used by criminals to commit crimes. Data confidentiality should be maintained by a secure data aggregation scheme. Even if an attacker steals the ciphertext, it will not be able to obtain the power consumption data of a single user.
5. The Proposed Scheme
5.1. System Initialization
Algorithm 1. MN Election |
1. Set the initial state of SM[i] to Follower,i∈[1,n],n is the number of SMs in RA; |
2. Let the number of terms of SM[i] elected as MN be 0,TN = 0; |
3. Set the number of votes obtained by SM[i] to 0,Nv = 0; |
4. Start the Timer of Follower FT; |
5. Set a random timeout of Follower FRTout; |
6. while FT > FRTout do |
7. The state of SM[i] has changed from Follower to Candidate; |
8. TN = TN + 1; |
9. Start the Timer of Candidate CT; |
10. Set a random timeout of Candidate CRTout; |
11. Nv = Nv + 1; |
12. SM[i] with Candidate state sends a request of voting to other SMs; |
13. SM[i] counts the number k of voting responses received from other SMs; |
14. Nv = Nv + k; |
15. if Nv > n/2 + 1 then |
16. The state of SM[i] has changed from Candidate to MN; |
17. SM[i] sends messages that are selected as MN to other SMs; |
18. end if |
19. if SM[i] receives messages from a SM that is selected as MN then |
20. The state of SM[i] has changed from Candidate to Follower; |
21. end if |
22. while CT > CRTout do |
23. Repeat step 8–11 for a new election |
24. endwhile |
25. endwhile |
5.2. Ciphertext Generation
- Step 1
- selects a random number as the private key and computes the corresponding public key .
- Step 2
- collects electricity consumption data at timestamp T, and computes the Hash value , then selects a random number to generate ciphertext:.
- Step 3
- generates the BLS short signature , is the current timestamp to prevent replay attack.
- Step 4
- sends to MN through the Merkle tree.
5.3. Ciphertext Aggregation
- Step 1
- verifies n signatures after receiving . If validation is successful and fails otherwise. If it holds, the signature is valid and will accept ’s ciphertext.In order to make the verification more efficient, adopts batch verificationThe proof is given as follows.
- Step 2
- aggregates the ciphertext.
5.4. Ciphertext Decryption
5.5. Data Reading
6. Security Analysis
6.1. Privacy-Preservation
6.2. Decentralized
6.3. Data Security
6.4. Confidentiality
6.5. Data Integrity and Non-Repudiation
6.6. Data Unforgeability
7. Performance Evaluation
7.1. Computation Complexity
7.2. Communication Overhead
8. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart Grid—The New and Improved Power Grid: A Survey. IEEE Commun. Surv. Tutor. 2011, 14, 944–980. [Google Scholar] [CrossRef]
- Xue, K.; Li, S.; Hong, J.; Xue, Y.; Yu, N.; Hong, P. Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1596–1608. [Google Scholar] [CrossRef]
- Wu, J.; Dong, M.; Ota, K.; Liang, L.; Zhou, Z. Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Netw. Appl. 2014, 8, 1133–1142. [Google Scholar] [CrossRef]
- Guan, Z.; Si, G.; Du, X.; Liu, P. Protecting User Privacy Based on Secret Sharing with Error Tolerance for Big Data in Smart Grid. arXiv 2018, arXiv:1811.06918. [Google Scholar]
- Chen, J.; Liu, G.; Liu, Y. Lightweight Privacy-preserving Raw Data Publishing Scheme. IEEE Trans. Emerg. Top. Comput. 2020, 1. [Google Scholar] [CrossRef]
- Liu, Y.-N.; Zhao, Q. E-voting scheme using secret sharing and K-anonymity. World Wide Web 2018, 22, 1657–1667. [Google Scholar] [CrossRef]
- Hassan, M.U.; Rehmani, M.H.; Kotagiri, R.; Zhang, J.; Chen, J. Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 2019, 131, 69–80. [Google Scholar] [CrossRef]
- Piao, C.; Shi, Y.; Yan, J.; Zhang, C.; Liu, L. Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach. Future Gener. Comput. Syst. 2019, 90, 158–174. [Google Scholar] [CrossRef]
- Li, S.; Xue, K.; Yang, Q.; Hong, P. PPMA: Privacy-Preserving Multisubset Data Aggregation in Smart Grid. IEEE Trans. Ind. Inf. 2018, 14, 462–471. [Google Scholar] [CrossRef]
- Liu, Y.-N.; Guo, W.; Fan, C.-I.; Chang, L.; Cheng, C. A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid. IEEE Trans. Ind. Inf. 2018, 15, 1767–1774. [Google Scholar] [CrossRef]
- Guan, Z.; Zhang, Y.; Zhu, L.; Wu, L.; Yu, S. EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 2019, 62, 32103. [Google Scholar] [CrossRef] [Green Version]
- Karampour, A.; Ashouri-Talouki, M.; Ladani, B.T. An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid. In Proceedings of the 2019 27th Iranian Conference on Electrical Engineering (ICEE), Yazd, Iran, 30 April–2 May 2019; pp. 1967–1971. [Google Scholar]
- Chen, L.; Lu, R.; Cao, Z. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw. Appl. 2015, 8, 1122–1132. [Google Scholar] [CrossRef]
- Song, J.; Liu, Y.-N.; Shao, J.; Tang, C. A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid. IEEE Syst. J. 2020, 14, 900–908. [Google Scholar] [CrossRef]
- Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
- Lyu, L.; Nandakumar, K.; Rubinstein, B.; Jin, J.; Bedo, J.; Palaniswami, M.; Rubinstein, B. PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid. IEEE Trans. Ind. Inform. 2018, 14, 3733–3744. [Google Scholar] [CrossRef]
- Zhu, L.; Li, M.; Zhang, Z.; Xu, C.; Zhang, R.; Du, X.; Guizani, N. Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid. IEEE Commun. Mag. 2019, 57, 80–85. [Google Scholar] [CrossRef]
- Guan, Z.; Si, G.; Zhang, X.; Wu, L.; Guizani, N.; Du, X.; Ma, Y. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities. IEEE Commun. Mag. 2018, 56, 82–88. [Google Scholar] [CrossRef] [Green Version]
- Fan, M.; Zhang, X. Consortium Blockchain Based Data Aggregation and Regulation Mechanism for Smart Grid. IEEE Access 2019, 7, 35929–35940. [Google Scholar] [CrossRef]
- Fan, H.; Liu, Y.; Zeng, Z. Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. In Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, Hilo, HI, USA, 12–14 March 2020. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; BN Publishing: Hawthorne, CA, USA, 2019. [Google Scholar]
- Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016, 2, 71. [Google Scholar]
- Yuan, Y.; Wang, F.-Y. Parallel blockchain: Concept, methods and issues. Acta Autom. Sin. 2017, 43, 1703–1712. [Google Scholar]
- Xie, Q.H. Research on blockchain technology and financial business innovation. Financ. Dev. Res. 2017, 5, 77–82. [Google Scholar]
- Boneh, D.; Franklin, M. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology—CRYPTO 2001; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2001; Volume 2139, pp. 213–229. [Google Scholar]
- Joux, A. A One Round Protocol for Tripartite Diffie–Hellman. In International Algorithmic Number Theory Symposium; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2000; Volume 1838, pp. 385–393. [Google Scholar]
- Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. In Advances in Cryptology-ASIACRYPT 2001; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2001; Volume 2248, pp. 514–532. [Google Scholar]
- Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology-EUROCRYPT ’99; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2007; Volume 1592, pp. 223–238. [Google Scholar]
- Shi, E.; Chan, T.-H.; Rieffel, E.G.; Chow, R.; Song, D. Privacy-preserving aggregation of time-series data Annual Network & Distributed System Security Symposium (NDSS). Int. Soc. 2011, 2, 1–17. [Google Scholar]
- Bao, F.; Deng, R.H.; Zhu, H. Variations of Diffie-Hellman Problem. In Information and Communications Security; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2003; Volume 2836, pp. 301–312. [Google Scholar]
- Bethencourt, J. Advanced Crypto Software Collection: The CPABE Toolkit. 2018. Available online: http://acsc.cs.utexas.edu/cpabe/ (accessed on 24 March 2018).
Symbol | Quantity |
---|---|
A generator of G | |
the jth residential area | |
Power consumption data of the ith smart meter in | |
Number of smart meters in the jth residential area | |
Hash functions: : {0,1}*→G | |
Number of residential areas | |
Smart meter in jth residential area | |
Mining node of the jth residential area | |
the aggregated electricity consumption data of the jth residential areas | |
‖ | Concatenation operation |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fan, H.; Liu, Y.; Zeng, Z. Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain. Sensors 2020, 20, 5282. https://doi.org/10.3390/s20185282
Fan H, Liu Y, Zeng Z. Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain. Sensors. 2020; 20(18):5282. https://doi.org/10.3390/s20185282
Chicago/Turabian StyleFan, Hongbin, Yining Liu, and Zhixin Zeng. 2020. "Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain" Sensors 20, no. 18: 5282. https://doi.org/10.3390/s20185282
APA StyleFan, H., Liu, Y., & Zeng, Z. (2020). Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain. Sensors, 20(18), 5282. https://doi.org/10.3390/s20185282