Abstract
With the rapid development of IoT, smart grids have benefited people’s daily lives. Data in smart grid requires security and privacy. Fine-grained access control provides the possibility for various electricity companies and organizations to access owner data securely and flexibly for transdiscipline billing. However, it is possible for malicious electricity company employees to leak decryption keys. To protect the data security of the customers, the authorized center executes a revocation operation on the authorization of a malicious employee. However, these schemes usually cannot prevent malicious servers and revocation employees from colluding to obtain data. To overcome this problem, this work presents a secure authorized data sharing for the smart grid scenario. The data access for electricity companies in this scheme is fine-grained and revocation against server-user collusion is achieved. The security analysis shows that our solution is privacy-aware and practical for smart grid. And experiment results prove that our algorithm is efficient in authority verification.
Similar content being viewed by others
Data availability
We make sure that all data and materials support their published claims and comply with field standards.
Code availability
We make sure that code supports their published claims and comply with field standards.
References
Kirmani S, Mazid A, Khan IA, Abid M (2023) A survey on iot-enabled smart grids: Technologies, architectures, applications, and challenges. Sustainability 15(1)
Jafari M, Kavousi-Fard A, Chen T, Karimi M (2023) A review on digital twin technology in smart grid, transportation system and smart city: Challenges and future. IEEE Access 11:17471–17484. https://doi.org/10.1109/ACCESS.2023.3241588
Peñuelas-Angulo A, Feregrino-Uribe C, Morales-Sandoval M (2023) Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey. Internet of Things 23:100827
Zhao M, Ding Y, Tang S, Liang H, Wang H (2023) A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer Peer Netw Appl 16(1):142–155
Mehta PJ, Parne BL, Patel SJ (2023) Se-lakaf: Security enhanced lightweight authentication and key agreement framework for smart grid network. Peer Peer Netw Appl 16(3):1513–1535
Cao Y, Li S, Lv C, Wang D, Sun H, Jiang J, Meng F, Xu L, Cheng X (2023) Towards cyber security for low-carbon transportation: Overview, challenges and future directions. Renew Sustain Energy Rev 183:113401
Egide N, Li F (2023) Hap-sg: Heterogeneous authentication protocol for smart grid. Peer Peer Netw Appl 1–15
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. SP 2000, pp. 44–55. https://doi.org/10.1109/SECPRI.2000.848445
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT 2004, pp. 506–522
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International Conference on the Theory and Application of Cryptographic Techniques. https://api.semanticscholar.org/CorpusID:10137076
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. IACR Cryptol ePrint Arch 2006:309
Eltayieb N, Elhabob R, Hassan A, Li F (2019) An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J Syst Architect 98:165–172. https://doi.org/10.1016/j.sysarc.2019.07.005
Zhang X, Mu D, Zhao J (2023) Attribute-based keyword search encryption for power data protection. High-Confid Comput 100115
Zhang J, Ma J, Yang Y, Liu X, Xiong NN (2022) Revocable and privacy-preserving decentralized data sharing framework for fog-assisted internet of things. IEEE Internet Things J 9(13):10446–10463
Ma K, Song G, Zhou Y, Xu R, Yang B (2023) An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system. Comput Stand Interfaces 88:103784
Li J, Zhang T (2023) Power data attribution revocation searchable encrypted cloud storage. In: 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE), pp. 579–582. IEEE
Yang Y, Deng RH, Guo W, Cheng H, Luo X, Zheng X, Rong C (2023) Dual traceable distributed attribute-based searchable encryption and ownership transfer. IEEE Trans Cloud Comput 11(1):247–262
Ge C, Susilo W, Liu Z, Baek J, Luo X, Fang L (2023) Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds. IEEE Trans Dependable Secure Comput 1–12. https://doi.org/10.1109/TDSC.2023.3265979
Wang M, Miao Y, Guo Y, Huang H, Wang C, Jia X (2023) Aesm2 attribute-based encrypted search for multi-owner and multi-user distributed systems. IEEE Trans Parallel Distrib Syst 34(1):92–107. https://doi.org/10.1109/TPDS.2022.3216320
Niu S, Hu Y, Zhou S, Shao H, Wang C (2023) Attribute-based searchable encryption in edge computing for lightweight devices. IEEE Syst J 17(3):3503–3514. https://doi.org/10.1109/JSYST.2023.3283389
Abbou RB, Mrabti F, Ghoubach IE (2019) Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems. Int J Secure Network 14(3):133
Ghopur D, Ma J, Ma X, Hao J, Jiang T, Wang X (2023) Puncturable key-policy attribute-based encryption scheme for efficient user revocation. IEEE Trans Serv Comput 1–12. https://doi.org/10.1109/TSC.2023.3303368
Sultan NH, Kaaniche N, Laurent M, Barbhuiya FA (2022) Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Trans Cloud Comput 10(1):216–233
Yu J, Liu S, Xu M, Guo H, Zhong F, Cheng W (2023) An efficient revocable and searchable ma-abe scheme with blockchain assistance for c-iot. IEEE Internet Things J 10(3):2754–2766. https://doi.org/10.1109/JIOT.2022.3213829
Edemacu K, Jang B, Kim JW (2021) Cescr: Cp-abe for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute. PLoS ONE 16(5):0250992
Austin AJ (2022) Sharing phr data in cloud using sigmoid key and median support signature-based cryptosystem. Wireless Pers Commun 124(4):3549–3565
Wei J, Liu W, Hu X (2016) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J 1–12
Liu X, Lu T, He X, Yang X, Niu S (2020) Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8:52062–52074. https://doi.org/10.1109/ACCESS.2020.2980627
Kim I, Susilo W, Baek J, Kim J (2022) Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption. IEEE Trans Dependable Secure Comput 19(3):1856–1870
Funding
This study was funded by ANatural Science Foundation of Sichuan, China (2023NSFSC1400), Chengdu Science and Technology Program (2021-YF08-00151-GX).
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Yawen Feng and Shengke Zeng. The first draft of the manuscript was written by Yawen Feng and all authors commented on previous versions of the manuscript.
Corresponding author
Ethics declarations
Ethics approval
All authors read and approved the final manuscript.
Consent to participate
All authors consent to participate.
Consent for publication
All authors consent for publication.
Conflict of interest
We confirm that there are no conflicts of interest associated with thsubmission of this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy
Guest Editor: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Feng, Y., Zeng, S. Secure and flexible authorized data sharing for smart grid. Peer-to-Peer Netw. Appl. 17, 1208–1224 (2024). https://doi.org/10.1007/s12083-024-01649-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01649-3