A Privacy-Preserving Searchable Encryption Scheme for Data Protection in Smart Grid

  • Conference paper
  • First Online:
Data Science and Information Security (IAIC 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2059))

Included in the following conference series:

  • 100 Accesses

Abstract

As smart grids continue to evolve at a rapid pace, huge amounts of power data have been collected by various devices in different locations. These enormous power data are of significant research and application value in machine learning. In the meanwhile, the privacy of training data is also becoming urgent to be addressed in the smart grid. Searchable encryption (SE) is an essential solution for protecting data privacy, which can achieve retrieval of ciphertext. In this paper, we present a blockchain-based searchable encryption scheme with fine-grained access control in smart grids. This scheme is designed to enable secure search and access to power data. Firstly, we track data uploads and searches using blockchain technology, which grants data access with transparency and traceability. In addition, in our scheme, the blockchain network stores the encrypted index, which protects the index from malicious tampering. Secondly, our proposed scheme can achieve retrieval of ciphertext while supporting fine-grained access control. Furthermore, Our scheme preserves the privacy of data. Users’ attribute information and keyword information are protected in the data access process. Finally, there is an analysis of the security and advantages of our scheme. Experimental results and comparisons with other schemes show that our scheme is both cost-effective and practice-oriented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 64.19
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 80.24
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Massoud Amin, S., Wollenberg, B.: Toward a smart grid: power delivery for the 21st century. IEEE Power Energ. Mag. 3(5), 34–41 (2005). https://doi.org/10.1109/MPAE.2005.1507024

    Article  Google Scholar 

  2. Cai, D., et al.: Electric power big data and its applications. In: Muthuramalingam, T., Kayal, P., Ahmed, K. (eds.) Proceedings of the 2016 International Conference on Energy, Power and Electrical Engineering. AER-Advances in Engineering Research, vol. 56, pp. 181–184 (2016), International Conference on Energy, Power and Electrical Engineering (EPEE), Shenzhen, Peoples R China, OCT 30–31, 2016

    Google Scholar 

  3. Zhang, P., Xu, Y., Luo, F., Dong, Z.Y.: Power big data: new assets of electric power utilities. J. Energy Eng. 145(3) (2019). https://doi.org/10.1061/(ASCE)EY.1943-7897.0000604

  4. **aosheng, P., Diyuan, D., Shijie, C., **yu, W., Zhaohui, L., Lin, N.: Key technologies of electric power big data and its application prospects in smart grid. Proc. Chin. Soc. Electr. Eng. 35, 503–511 (2015)

    Google Scholar 

  5. Pham, C.T., Mnsson, D.: A study on realistic energy storage systems for the privacy of smart meter readings of residential users. IEEE Access 7, 150262–150270 (2019). https://doi.org/10.1109/Access.2019.2946027

  6. Nguyen, T., Wang, S., Alhazmi, M., Nazemi, M., Estebsari, A., Dehghanian, P.: Electric power grid resilience to cyber adversaries: state of the art. IEEE Access 8, 87592–87608 (2020). https://doi.org/10.1109/ACCESS.2020.2993233

    Article  Google Scholar 

  7. Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014). https://doi.org/10.1109/MNET.2014.6863131

    Article  Google Scholar 

  8. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44–55 (2000). https://doi.org/10.1109/SECPRI.2000.848445

  9. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  10. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  11. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Proceedings, pp. 321+. IEEE Symposium on Security and Privacy, IEEE Comp Soc TCSP (2007). https://doi.org/10.1109/sp.2007.11 IEEE Symposium on Security and Privacy (S &P 2007), Berkeley, CA, 20-23 (2007)

  12. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: DiVimercati, S., Syverson, P., Evans, D. (eds.) CCS’07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM SIGSAC (2007), 14th ACM Conference on Computer and Communication Security, Alexandria, VA, OCT 29-NOV 02 (2007)

    Google Scholar 

  13. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S., Keromytis, A., Gennaro, R., Yung, M. (eds.) Applied Cryptography And Network Security, Proceedings. Lecture Notes In Computer Science, vol. 5037, pp. 111–129 (2008), 5th International Conference on Applied Cryptography and Network Security, Columbia University, New York, NY, JUN 03–06 2008

    Google Scholar 

  14. Li, J., Niu, X., Sun, J.S.: A practical searchable symmetric encryption scheme for smart grid data. In: ICC 2019–2019 IEEE International Conference On Communications (ICC). IEEE International Conference on Communications, IEEE; China Mobile; Huawei; ZTE; Qualcomm; Oppo; Natl Instruments (2019), IEEE International Conference on Communications (IEEE ICC), Shanghai, Peoples R China, MAY 20–24 (2019)

    Google Scholar 

  15. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Architect 98, 165–172 (Sep 2019) .https://doi.org/10.1016/j.sysarc.2019.07.005

  16. Zhang, D., Fan, Q., Qiao, H., Luo, M.: A public-key encryption with multi-keyword search scheme for cloud-based smart grids. In: 2021 IEEE Conference On Dependable And Secure Computing (DSC). IEEE (2021). https://doi.org/10.1109/DSC49826.2021.9346254,IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, JAPAN, JAN 30-FEB 02 2021

  17. Wang, D., Wu, P., Li, B., Du, H., Luo, M.: Multi-keyword searchable encryption for smart grid edge computing. Electr. Power Syst. Res. 212. (NOV 2022) https://doi.org/10.1016/j.epsr.2022.108223

  18. Miao, Y., Liu, X., Choo, K.K.R., Deng, R.H., Wu, H., Li, H.: Fair and dynamic data sharing framework in cloud-assisted internet of everything. IEEE Internet Things J. 6(4), 7201–7212 (AUG 2019). https://doi.org/10.1109/JIOT.2019.2915123

  19. Zhang, Y., Zheng, D., Deng, R.H.: Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J. 5(3, SI), 2130–2145 (JUN 2018). https://doi.org/10.1109/JIOT.2018.2825289

  20. Li, C., et al.: Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst. J. 16(4), 5521–5532 (Dec 2022).https://doi.org/10.1109/JSYST.2022.3173538

  21. Xu, G., et al.: A searchable encryption scheme based on lattice for log systems in blockchain. CMC-Comput. Mater. CONTINUA 72(3), 5429–5441 (2022). https://doi.org/10.32604/cmc.2022.028562

  22. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review, p. 21260 (2008)

    Google Scholar 

  23. Chaudhari, P., Das, M.L.: Privacy preserving searchable encryption with fine-grained access control. IEEE Trans. Cloud Comput. 9(2), 753–762 (2021). https://doi.org/10.1109/TCC.2019.2892116

    Article  Google Scholar 

  24. Caro, A.D., Iovino, V.: jPBC: java pairing based cryptography. Comput. Commun. (2011)

    Google Scholar 

  25. Ge, C., Susilo, W., Liu, Z., **a, J., Szalachowski, P., Fang, L.: Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans. Dependable Secure Comput. 18(6), 2787–2800 (2021). https://doi.org/10.1109/TDSC.2020.2963978

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the NSFC (GrantNos.72293583, 62271070,61962009), and the Project (GrantNo.JCKY2021208B036).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeng-Hui Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, X., Zhao, H., Di, L., Yang, ZH. (2024). A Privacy-Preserving Searchable Encryption Scheme for Data Protection in Smart Grid. In: **, H., Pan, Y., Lu, J. (eds) Data Science and Information Security. IAIC 2023. Communications in Computer and Information Science, vol 2059. Springer, Singapore. https://doi.org/10.1007/978-981-97-1280-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-1280-9_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-1279-3

  • Online ISBN: 978-981-97-1280-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation