Log in

Design and implementation of privacy preserving billing protocol for smart grid

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Smart grid is an advanced electrical grid equipped with communication capability, which are utilized to improve the efficiency, reliability, and sustainability of electricity services. It often integrates itself with cloud computing and data centers, which help smart grid to provide high robustness and load balancing. Countries within Europe, North America, and East Asia are undergoing a transformation from an antiquated infrastructure to a smart grid. However, some of the problems arise due to the security and privacy issues of the smart grid. In this manuscript, we propose a novel privacy preserving billing protocol based on the priced oblivious transfer, which guarantees the grid operator to get the correct amount of money without knowing the current energy consumption of each customer. Additionally, we also implement the proposed protocol and provide a performance analysis of it.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Byun J, Hong I, Kang B, Park S (2011) A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting. IEEE Trans Consum Electron 57(2):436–444

    Article  Google Scholar 

  2. Son YS, Pulkkinen T, Moon KD, Kim C (2010) Home energy management system based on power line communication. IEEE Trans Consum Electron 56(3):1380–1386

    Article  Google Scholar 

  3. Energy Efficiency News (2008) Europe commits to 20-20-20 target but with get Out clause for big polluters. Energy Efficiency News. http://www.energyefficiencynews.com/articles/i/1693/. Accessed December 15, 2008

  4. Zhang Y, Wang L, Sun W, Green RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808

    Article  Google Scholar 

  5. Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658

    Article  Google Scholar 

  6. Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685

    Article  Google Scholar 

  7. Qiu M, Gao W, Chen M, Niu J, Zhang L (2011) Energy efficient security algorithm for power grid wide area monitoring system. IEEE Trans Smart Grid 2(4):715–723

    Article  Google Scholar 

  8. Wei D, Lu Y, Jafari M, Skare PM, Rohde K (2011) Protecting smart grid automation systems against cyber attacks. IEEE Trans Smart Grid 2(4):782–795

    Article  Google Scholar 

  9. Kim YJ, Lee J, Atkinson G, Kim H, Thottan M (2012) SeDAX: a scalable, resilient, and secure platform for Smart grid communications. IEEE J Sel Areas Commun 30(6):1119–1136

    Article  Google Scholar 

  10. Vaidya B, Makrakis D, Mouftah H (2011) Secure communication mechanism for ubiquitous Smart grid infrastructure. J Supercomput. doi:10.1007/s11227-011-0674-5

    Google Scholar 

  11. Hart G (1989) Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technol Soc Mag 8(2):12–16

    Article  Google Scholar 

  12. Cho HS, Yamazaki T, Hahn M (2010) AERO: extraction of user’s activities from electric power consumption data. IEEE Trans Consum Electron 56(3):2011–2018

    Article  Google Scholar 

  13. Steven J, Peterson G, Deborah AF (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85

    Article  Google Scholar 

  14. Rabin MO (1981) How to exchange secrets by oblivious transfer. Technical report TR-81, Aiken Computation Laboratory, Harvard

  15. Even S, Goldreich O, Lempel A (1985) A randomized protocol for signing contracts. Commun ACM 28(6):637–647

    Article  MathSciNet  Google Scholar 

  16. Ishai Y, Kushilevitz E (2001) Private simultaneous messages protocols with applications. In: IEEE computer society, ISTCS’97, pp 174–184

    Google Scholar 

  17. Aiello B, Ishai Y, Reingold O (2001) Priced oblivious transfer: how to sell digital goods. In: EUROCRYPT 2001. LNCS, vol 263. Springer, Berlin, pp 186–194

    Google Scholar 

  18. Rial A, Preneel B (2009) Optimistic fair priced oblivious transfer. In: The third international conference on cryptology in Africa (AFRICACRYPT’10). LNCS, vol 6055. Springer, Berlin, pp 131–147

    Chapter  Google Scholar 

  19. Camenisch J, Dubovitskaya M, Neven G (2010) Unlinkable priced oblivious transfer with rechargeable wallets. In: The 14th international conference on financial cryptography and data security (FC’10). Springer, Berlin, pp 66–81

    Chapter  Google Scholar 

  20. Wang CH, Lin CS (2005) An efficient priced k-out-of-n oblivious transfer scheme. In: Information security conference 2005 (ISC’05)

    Google Scholar 

  21. Rial A, Kohlweiss M, Preneel B (2009) Universally composable adaptive priced oblivious transfer. In: The 3rd international conference Palo Alto on pairing-based cryptography (Pairing’09). Springer, Berlin, pp 231–247

    Google Scholar 

  22. Angloinfo (2012) Services: electricity, gas, and water in the Netherlands. http://southholland.angloinfo.com/countries/holland/services.asp

  23. Jc001 (2011). http://supply.jc001.cn/detail/1268510.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-I Fan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fan, CI., Huang, SY. & Artan, W. Design and implementation of privacy preserving billing protocol for smart grid. J Supercomput 66, 841–862 (2013). https://doi.org/10.1007/s11227-013-0905-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-0905-z

Keywords

Navigation