A Blockchain-Based Method for Power-Related Data Quality Auditing

  • Conference paper
  • First Online:
Computational and Experimental Simulations in Engineering (ICCES 2023)

Part of the book series: Mechanisms and Machine Science ((Mechan. Machine Science,volume 145))

  • 628 Accesses

Abstract

Power big data technology is playing an increasingly important role in the regulation and data analysis of smart grids, which face “data silos” and privacy issues. Federated Learning is a distributed machine learning framework and allows model training to be done without compromising user raw data. To protect private information, the model parameters uploaded by the user are usually trained in cipher text. However, the presence of ciphertext data makes it difficult to audit the quality of data uploaded by users. Smart grid federated analysis tasks are vulnerable to attackers launching attacks such as data poisoning and free-riding, which can have a serious impact on the global model trained. To defend against data poisoning and free-riding attacks, there is a need to audit encrypted grid data uploaded by users. In this paper, we propose a blockchain-based power-related data quality audit method that can ensure the correctness of the smart grid federated analysis model. In particular, we design an efficient noise addition mechanism that makes the aggregation model parameter noise sum to zero, which can protect user data privacy while ensuring the usability of the aggregation model. In addition, we propose a grouped aggregated data quality audit algorithm that can quickly locate users who upload malicious data. We conducted experimental evaluations on both the Real Power dataset and the MNIST dataset, the results showed that our approach is effective against data poisoning and free-riding attacks.

Minjie Fu and Fuqiang Tao are equally contributed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CorrAUC: a malicious Bot-IoT traffic detection method in IoT network using machine learning techniques. IEEE Internet Things J. 8(5), 3242–3254 (2021)

    Article  Google Scholar 

  2. Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  3. Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., Fang, B.: A survey on access control in the age of internet of things. IEEE Internet Things J. 7(6), 4682–4696 (2020)

    Article  Google Scholar 

  4. Tian, Z., Luo, C., Qiu, J., Du, X., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Industr. Inf. 16(3), 1963–1971 (2020)

    Article  Google Scholar 

  5. Shafiq, M., Tian, Z., Sun, Y., Du, X., Guizani, M.: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur. Gener. Comput. Syst. 107, 433–442 (2020)

    Article  Google Scholar 

  6. Konečný, J., McMahan, H.B., Ramage, D., et al.: Federated optimization: Distributed machine learning for on-device intelligence. ar**v preprint ar**v:1610.02527 (2016)

  7. Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322–1333 (2015)

    Google Scholar 

  8. Melis, L., Song, C., De Cristofaro, E., et al.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691–706. IEEE (2019)

    Google Scholar 

  9. Shokri, R., Stronati, M., Song, C., et al.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2017)

    Google Scholar 

  10. Chen, X., Liu, C., Li, B., et al.: Targeted backdoor attacks on deep learning systems using data poisoning. ar**v preprint ar**v:1712.05526 (2017)

  11. Kim, H., Park, J., Bennis, M., et al.: Blockchained on-device federated learning. IEEE Commun. Lett. 24(6), 1279–1283 (2019)

    Article  Google Scholar 

  12. Yin, L., Lin, S., Sun, Z., et al.: A game-theoretic approach for federated learning: a trade-off among privacy, accuracy and energy. Digital Commun Netw. (2023)

    Google Scholar 

  13. Sun, Z., Wan, J., Yin, L., et al.: A blockchain-based audit approach for encrypted data in federated learning. Digit. Commun. Netw. 8(5), 614–624 (2022)

    Article  Google Scholar 

  14. Taïk, A., Cherkaoui, S.: Electrical load forecasting using edge computing and federated learning[C]. In: ICC 2020–2020 IEEE International Conference on Communications (ICC), pp. 1–6 (2020)

    Google Scholar 

  15. Wang, Y., Bennani, I.L., Liu, X., et al.: Electricity consumer characteristics identification: a federated learning approach. IEEE Trans. Smart Grid 12(4), 3637–3647 (2021)

    Article  Google Scholar 

  16. Tun, Y.L., Thar, K., Thwal, C.M., et al.: Federated learning based energy demand prediction with clustered aggregation[C]. In: 2021 IEEE International Conference on Big Data and Smart Computing (BigComp), 164–167. IEEE (2021)

    Google Scholar 

  17. Gholizadeh, N., Musilek, P.: Federated learning with hyperparameter-based clustering for electrical load forecasting. Internet of Things 17, 100470 (2022)

    Article  Google Scholar 

  18. Doku, R., Rawat, D.B., Liu, C.: Towards federated learning approach to determine data relevance in big data. In: 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI), pp. 184–192. IEEE (2019)

    Google Scholar 

  19. Song, T., Tong, Y., Wei, S.: Profit allocation for federated learning. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 2577–2586. IEEE (2019)

    Google Scholar 

  20. Zhan, Y., Li, P., Qu, Z., et al.: A learning-based incentive mechanism for federated learning. IEEE Internet Things J. 7(7), 6360–6368 (2020)

    Article  Google Scholar 

  21. Peng, Z., Xu, J., Chu, X., et al.: Vfchain: Enabling verifiable and auditable federated learning via blockchain systems. IEEE Trans. Netw. Sci. Eng. 9(1), 173–186 (2021)

    Article  Google Scholar 

  22. Xuan, S., **, M., Li, X., et al.: DAM-SE: a blockchain-based optimized solution for the counterattacks in the internet of federated learning systems. Secur. Commun. Netw. 2021, 1–14 (2021)

    Google Scholar 

  23. Mugunthan, V., Rahman, R., Kagal, L.: Blockflow: an accountable and privacy-preserving solution for federated learning. ar** Li, Rundong Shao & Zhe Sun

Authors

Corresponding author

Correspondence to Zhe Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fu, M., Tao, F., Li, W., Shao, R., Sun, Z. (2024). A Blockchain-Based Method for Power-Related Data Quality Auditing. In: Li, S. (eds) Computational and Experimental Simulations in Engineering. ICCES 2023. Mechanisms and Machine Science, vol 145. Springer, Cham. https://doi.org/10.1007/978-3-031-42987-3_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42987-3_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42986-6

  • Online ISBN: 978-3-031-42987-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation