EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
read more
Citations
Mobile Edge Computing: A Survey
A Survey of Fog Computing: Concepts, Applications and Issues
The Fog computing paradigm: Scenarios and security issues
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
Security and Privacy Issues of Fog Computing: A Survey
References
Identity-Based Encryption from the Weil Pairing
Public-key cryptosystems based on composite degree residuosity classes
Random oracles are practical: a paradigm for designing efficient protocols
Identity-Based Encryption from the Weil Pairing
Short Signatures from the Weil Pairing
Related Papers (5)
Frequently Asked Questions (17)
Q2. What are the future works mentioned in the paper "Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications" ?
For the future work, the authors will study the possible behavior by internal attackers and extend the EPPA scheme to effectively resist such attacks.
Q3. What is the purpose of the aggregation process?
In the aggregation process, a super-increasing sequence is initialized and usedto integrate multi-dimensional data as one single piece in the plaintext space.
Q4. What is the cost of multiplication in Zn2?
Since the multiplication in Zn2 is considered negligible compared to exponentiation and pairing operations, the computational cost of aggregation is negligible, and the generation of the signature only includes 1 multiplication operation in G.
Q5. What is the importance of aggregating data at intermediate nodes?
Since large volumes of data from users are to be reported to the OA, it is essential to aggregate individual users’ data at intermediate nodes for reducing communication overhead.
Q6. What is the purpose of this paper?
In this paper, the authors have proposed an efficient and privacypreserving aggregation scheme (EPPA) for secure smart grid communications.
Q7. What is the way to encrypt multidimensional data?
After receiving the aggregated data, the receiver performs a single decryption and takes several multiplications to recovery the data from the plaintext.
Q8. What is the maximum number of households in a residential area?
Assume that the maximum number of households in a residential area is no more than a constant w, and there are total l types of electricity usage data (T1, T2, · · · , Tl) to be reported in smart grid communications, the value of each type T i is less than a constant d.
Q9. How much time does a single multiplication operation take?
The experimental results indicate that a single exponentiation operation in Zn2 (|n2| = 2048) almost costs 12.4 ms, a single multiplication operation in G with 160 bits costs 6.4 ms and the corresponding pairing operation costs 20 ms.
Q10. What is the security of the Paillier Cryptosystem?
Note that, the Paillier Cryptosystem is provably secure against chosen plaintext attack, and the correctness and security can be referred to [14].
Q11. What is the process of the aggregation and relaying?
In the process of the aggregation and relaying, the GW will also perform some authentication operations to guarantee the data’s authenticity and integrity.
Q12. What is the simplest example of a bilinear map?
Let G, GT be two cyclic groups of the same prime order q, and P be a generator of group G. Suppose G and GT are equipped with a pairing, i.e., a non-degenerated and efficiently computable bilinear map e : G × G → GT such that e(P, P ) = 1GT and e(aP1, bQ1) = e(P1, Q1)ab ∈ GT for all a, b ∈ Z∗q and any P1, Q1 ∈ G.
Q13. What is the GW’s method for aggregating the data?
After the validity checking, the GW performs the following steps for privacy-preserving report aggregation: • Step-1: Compute the aggregated and encrypted data C on C1, C2, · · · , Cw asC = w∏ i=1 Ci mod n 2 (8)•
Q14. What is the simplest way to encrypt a smart grid?
In this section, the authors propose the efficient and privacy-preserving aggregation scheme (EPPA) for secure smart grid communications, which mainly consists of the following four parts: system initialization, user report generation, privacy-preserving report aggregation, and secure report reading and response.
Q15. What is the result of the proposed EPPA scheme?
As a result, the ciphertext C = (C1, C2, C3, C4) is semantic secure under the chosen plaintext attack, i.e., the OA’s response also achieves the confidentiality in the proposed EPPA scheme.
Q16. What is the DBDH problem in (G,GT)?
The DBDH problem in (G,GT ) is stated as follows: Given the elements (P, aP, bP, cP ) ∈ G for unknown a, b, c ∈ Z∗q and W ∈ GT , decide whether W = e(P, P )abc ∈ GT or a random element R drawn from GT .
Q17. What are the computational costs of an exponentiation operation in Zn2?
Denote the computational costs of an exponentiation operation in Zn2 , a multiplication operation in G, an exponentiation operation in GT and a pairing operation by Ce, Cm, Cet and Cp, respectively.