Abstract
Smart grid is an advanced electrical grid equipped with communication capability, which are utilized to improve the efficiency, reliability, and sustainability of electricity services. It often integrates itself with cloud computing and data centers, which help smart grid to provide high robustness and load balancing. Countries within Europe, North America, and East Asia are undergoing a transformation from an antiquated infrastructure to a smart grid. However, some of the problems arise due to the security and privacy issues of the smart grid. In this manuscript, we propose a novel privacy preserving billing protocol based on the priced oblivious transfer, which guarantees the grid operator to get the correct amount of money without knowing the current energy consumption of each customer. Additionally, we also implement the proposed protocol and provide a performance analysis of it.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig5_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig6_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig7_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig8_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig9_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig10_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig11_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig12_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig13_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig14_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig15_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig16_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig17_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig18_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig19_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig20_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig21_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-013-0905-z/MediaObjects/11227_2013_905_Fig22_HTML.gif)
Similar content being viewed by others
References
Byun J, Hong I, Kang B, Park S (2011) A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting. IEEE Trans Consum Electron 57(2):436–444
Son YS, Pulkkinen T, Moon KD, Kim C (2010) Home energy management system based on power line communication. IEEE Trans Consum Electron 56(3):1380–1386
Energy Efficiency News (2008) Europe commits to 20-20-20 target but with get Out clause for big polluters. Energy Efficiency News. http://www.energyefficiencynews.com/articles/i/1693/. Accessed December 15, 2008
Zhang Y, Wang L, Sun W, Green RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808
Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658
Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685
Qiu M, Gao W, Chen M, Niu J, Zhang L (2011) Energy efficient security algorithm for power grid wide area monitoring system. IEEE Trans Smart Grid 2(4):715–723
Wei D, Lu Y, Jafari M, Skare PM, Rohde K (2011) Protecting smart grid automation systems against cyber attacks. IEEE Trans Smart Grid 2(4):782–795
Kim YJ, Lee J, Atkinson G, Kim H, Thottan M (2012) SeDAX: a scalable, resilient, and secure platform for Smart grid communications. IEEE J Sel Areas Commun 30(6):1119–1136
Vaidya B, Makrakis D, Mouftah H (2011) Secure communication mechanism for ubiquitous Smart grid infrastructure. J Supercomput. doi:10.1007/s11227-011-0674-5
Hart G (1989) Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technol Soc Mag 8(2):12–16
Cho HS, Yamazaki T, Hahn M (2010) AERO: extraction of user’s activities from electric power consumption data. IEEE Trans Consum Electron 56(3):2011–2018
Steven J, Peterson G, Deborah AF (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85
Rabin MO (1981) How to exchange secrets by oblivious transfer. Technical report TR-81, Aiken Computation Laboratory, Harvard
Even S, Goldreich O, Lempel A (1985) A randomized protocol for signing contracts. Commun ACM 28(6):637–647
Ishai Y, Kushilevitz E (2001) Private simultaneous messages protocols with applications. In: IEEE computer society, ISTCS’97, pp 174–184
Aiello B, Ishai Y, Reingold O (2001) Priced oblivious transfer: how to sell digital goods. In: EUROCRYPT 2001. LNCS, vol 263. Springer, Berlin, pp 186–194
Rial A, Preneel B (2009) Optimistic fair priced oblivious transfer. In: The third international conference on cryptology in Africa (AFRICACRYPT’10). LNCS, vol 6055. Springer, Berlin, pp 131–147
Camenisch J, Dubovitskaya M, Neven G (2010) Unlinkable priced oblivious transfer with rechargeable wallets. In: The 14th international conference on financial cryptography and data security (FC’10). Springer, Berlin, pp 66–81
Wang CH, Lin CS (2005) An efficient priced k-out-of-n oblivious transfer scheme. In: Information security conference 2005 (ISC’05)
Rial A, Kohlweiss M, Preneel B (2009) Universally composable adaptive priced oblivious transfer. In: The 3rd international conference Palo Alto on pairing-based cryptography (Pairing’09). Springer, Berlin, pp 231–247
Angloinfo (2012) Services: electricity, gas, and water in the Netherlands. http://southholland.angloinfo.com/countries/holland/services.asp
Jc001 (2011). http://supply.jc001.cn/detail/1268510.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fan, CI., Huang, SY. & Artan, W. Design and implementation of privacy preserving billing protocol for smart grid. J Supercomput 66, 841–862 (2013). https://doi.org/10.1007/s11227-013-0905-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-0905-z