Abstract
The concept of Smart Grid gains tremendous attention amongst researchers and utility providers in recent years. One of the challenges is to establish a secure communication architecture among smart meters, utility companies, and third-party service providers, whilst address the prevalent security and privacy concerns. In this paper, we propose a communication architecture for smart grids, and design a scheme to secure the data communications among smart meters, utility companies, and third-party service providers by employing Decentralized Ciphertext-Policy Attribute Based Encryption (CP_ABE) to store the data in ciphertext format, hence ensuring data security. The architecture we proposed is high scalable since the decentralized feature. Also, our architecture achieves an role-based access control by employing an access control LSSS matrix that describes the attributes required to access the data. We analyze the proposed scheme, and argue that it provides message authenticity and collusion resistance, and is efficient and feasible.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, Q., Cao, G.: Multicast authentication in the smart grid with one-time signature. IEEE Trans. Smart Grid 2(4), 686–696 (2011)
Ipakchi, A., Albuyeh, F.: Grid of the future. IEEE Power Energy Magazine 7(2), 52–62 (2009)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13:1–13:33 (2011)
Hu, C., Cheng, X., Tian, Z., Yu, J., Akkaya, K., Sun, L.: An attribute-based signcryption scheme to secure attribute-defined multicast communications. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICSSITE, vol. 164, pp. 418–437. Springer, Cham (2015). doi:10.1007/978-3-319-28865-9_23
Chunqiang, H., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on LFSR sequences. Theoret. Comput. Sci. 445, 52–62 (2012)
Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data (2017). doi:10.1109/TBDATA.2016.2621106
Rongxing, L., Xiaohui Liang, X., Li, X.L., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)
Li, D., Aung, Z., Williams, J.R., Sanchez, A.: Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis. In: 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1–8. IEEE (2012)
Cai, A., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. (2016). doi:10.1109/TDSC.2016.2613521
Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 335–348 (2016)
Ruj, S., Nayak, A., Stojmenovic, I.: A security architecture for data aggregation and access control in smart grids. arxiv preprint arXiv:1111.2619 (2011)
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20465-4_31
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_5
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255–271. Springer, Heidelberg (2003). doi:10.1007/3-540-39200-9_16
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_14
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: INFOCOM. IEEE (2017)
Hu, C., Huo, Y.: Efficient privacy-preserving dot-product computation for mobile big data. IET Commun. 11(5), 704–712 (2017)
Liu, J., Xiao, Y., Li, S., Liang, W., Chen, P.C.L.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor. 14(4), 981–997 (2012)
Zhongwei, S., Sitian, H., Yaning, M., Fengjie, S.: Security mechanism for smart distribution grid using ethernet passive optical network. In: 2010 2nd International Conference on Advanced Computer Control (ICACC), vol. 3, pp. 246–250. IEEE (2010)
Chunqiang, H., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
Chunqiang, H., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-Scale Comput. Syst. 2(2), 94–107 (2016)
Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE (2007)
Acknowledgement
We are very grateful to all reviewers who have helped improve the quality of this paper. This research was partially supported by the National Science Foundation of the US under grants CNS-1624485, and the National Natural Science Foundation of China under grants 61471028 and 61672119, and the Fundamental Research Funds for the Central Universities (Grant No. 2016JBZ003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hu, C., Huo, Y., Ma, L., Liu, H., Deng, S., Feng, L. (2017). An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)