Abstract
As smart grids continue to evolve at a rapid pace, huge amounts of power data have been collected by various devices in different locations. These enormous power data are of significant research and application value in machine learning. In the meanwhile, the privacy of training data is also becoming urgent to be addressed in the smart grid. Searchable encryption (SE) is an essential solution for protecting data privacy, which can achieve retrieval of ciphertext. In this paper, we present a blockchain-based searchable encryption scheme with fine-grained access control in smart grids. This scheme is designed to enable secure search and access to power data. Firstly, we track data uploads and searches using blockchain technology, which grants data access with transparency and traceability. In addition, in our scheme, the blockchain network stores the encrypted index, which protects the index from malicious tampering. Secondly, our proposed scheme can achieve retrieval of ciphertext while supporting fine-grained access control. Furthermore, Our scheme preserves the privacy of data. Users’ attribute information and keyword information are protected in the data access process. Finally, there is an analysis of the security and advantages of our scheme. Experimental results and comparisons with other schemes show that our scheme is both cost-effective and practice-oriented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Massoud Amin, S., Wollenberg, B.: Toward a smart grid: power delivery for the 21st century. IEEE Power Energ. Mag. 3(5), 34–41 (2005). https://doi.org/10.1109/MPAE.2005.1507024
Cai, D., et al.: Electric power big data and its applications. In: Muthuramalingam, T., Kayal, P., Ahmed, K. (eds.) Proceedings of the 2016 International Conference on Energy, Power and Electrical Engineering. AER-Advances in Engineering Research, vol. 56, pp. 181–184 (2016), International Conference on Energy, Power and Electrical Engineering (EPEE), Shenzhen, Peoples R China, OCT 30–31, 2016
Zhang, P., Xu, Y., Luo, F., Dong, Z.Y.: Power big data: new assets of electric power utilities. J. Energy Eng. 145(3) (2019). https://doi.org/10.1061/(ASCE)EY.1943-7897.0000604
**aosheng, P., Diyuan, D., Shijie, C., **yu, W., Zhaohui, L., Lin, N.: Key technologies of electric power big data and its application prospects in smart grid. Proc. Chin. Soc. Electr. Eng. 35, 503–511 (2015)
Pham, C.T., Mnsson, D.: A study on realistic energy storage systems for the privacy of smart meter readings of residential users. IEEE Access 7, 150262–150270 (2019). https://doi.org/10.1109/Access.2019.2946027
Nguyen, T., Wang, S., Alhazmi, M., Nazemi, M., Estebsari, A., Dehghanian, P.: Electric power grid resilience to cyber adversaries: state of the art. IEEE Access 8, 87592–87608 (2020). https://doi.org/10.1109/ACCESS.2020.2993233
Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014). https://doi.org/10.1109/MNET.2014.6863131
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44–55 (2000). https://doi.org/10.1109/SECPRI.2000.848445
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Proceedings, pp. 321+. IEEE Symposium on Security and Privacy, IEEE Comp Soc TCSP (2007). https://doi.org/10.1109/sp.2007.11 IEEE Symposium on Security and Privacy (S &P 2007), Berkeley, CA, 20-23 (2007)
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: DiVimercati, S., Syverson, P., Evans, D. (eds.) CCS’07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM SIGSAC (2007), 14th ACM Conference on Computer and Communication Security, Alexandria, VA, OCT 29-NOV 02 (2007)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S., Keromytis, A., Gennaro, R., Yung, M. (eds.) Applied Cryptography And Network Security, Proceedings. Lecture Notes In Computer Science, vol. 5037, pp. 111–129 (2008), 5th International Conference on Applied Cryptography and Network Security, Columbia University, New York, NY, JUN 03–06 2008
Li, J., Niu, X., Sun, J.S.: A practical searchable symmetric encryption scheme for smart grid data. In: ICC 2019–2019 IEEE International Conference On Communications (ICC). IEEE International Conference on Communications, IEEE; China Mobile; Huawei; ZTE; Qualcomm; Oppo; Natl Instruments (2019), IEEE International Conference on Communications (IEEE ICC), Shanghai, Peoples R China, MAY 20–24 (2019)
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Architect 98, 165–172 (Sep 2019) .https://doi.org/10.1016/j.sysarc.2019.07.005
Zhang, D., Fan, Q., Qiao, H., Luo, M.: A public-key encryption with multi-keyword search scheme for cloud-based smart grids. In: 2021 IEEE Conference On Dependable And Secure Computing (DSC). IEEE (2021). https://doi.org/10.1109/DSC49826.2021.9346254,IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, JAPAN, JAN 30-FEB 02 2021
Wang, D., Wu, P., Li, B., Du, H., Luo, M.: Multi-keyword searchable encryption for smart grid edge computing. Electr. Power Syst. Res. 212. (NOV 2022) https://doi.org/10.1016/j.epsr.2022.108223
Miao, Y., Liu, X., Choo, K.K.R., Deng, R.H., Wu, H., Li, H.: Fair and dynamic data sharing framework in cloud-assisted internet of everything. IEEE Internet Things J. 6(4), 7201–7212 (AUG 2019). https://doi.org/10.1109/JIOT.2019.2915123
Zhang, Y., Zheng, D., Deng, R.H.: Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J. 5(3, SI), 2130–2145 (JUN 2018). https://doi.org/10.1109/JIOT.2018.2825289
Li, C., et al.: Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst. J. 16(4), 5521–5532 (Dec 2022).https://doi.org/10.1109/JSYST.2022.3173538
Xu, G., et al.: A searchable encryption scheme based on lattice for log systems in blockchain. CMC-Comput. Mater. CONTINUA 72(3), 5429–5441 (2022). https://doi.org/10.32604/cmc.2022.028562
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review, p. 21260 (2008)
Chaudhari, P., Das, M.L.: Privacy preserving searchable encryption with fine-grained access control. IEEE Trans. Cloud Comput. 9(2), 753–762 (2021). https://doi.org/10.1109/TCC.2019.2892116
Caro, A.D., Iovino, V.: jPBC: java pairing based cryptography. Comput. Commun. (2011)
Ge, C., Susilo, W., Liu, Z., **a, J., Szalachowski, P., Fang, L.: Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans. Dependable Secure Comput. 18(6), 2787–2800 (2021). https://doi.org/10.1109/TDSC.2020.2963978
Acknowledgement
This work was supported by the NSFC (GrantNos.72293583, 62271070,61962009), and the Project (GrantNo.JCKY2021208B036).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, X., Zhao, H., Di, L., Yang, ZH. (2024). A Privacy-Preserving Searchable Encryption Scheme for Data Protection in Smart Grid. In: **, H., Pan, Y., Lu, J. (eds) Data Science and Information Security. IAIC 2023. Communications in Computer and Information Science, vol 2059. Springer, Singapore. https://doi.org/10.1007/978-981-97-1280-9_11
Download citation
DOI: https://doi.org/10.1007/978-981-97-1280-9_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-1279-3
Online ISBN: 978-981-97-1280-9
eBook Packages: Computer ScienceComputer Science (R0)