Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Secure and flexible authorized data sharing for smart grid

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of IoT, smart grids have benefited people’s daily lives. Data in smart grid requires security and privacy. Fine-grained access control provides the possibility for various electricity companies and organizations to access owner data securely and flexibly for transdiscipline billing. However, it is possible for malicious electricity company employees to leak decryption keys. To protect the data security of the customers, the authorized center executes a revocation operation on the authorization of a malicious employee. However, these schemes usually cannot prevent malicious servers and revocation employees from colluding to obtain data. To overcome this problem, this work presents a secure authorized data sharing for the smart grid scenario. The data access for electricity companies in this scheme is fine-grained and revocation against server-user collusion is achieved. The security analysis shows that our solution is privacy-aware and practical for smart grid. And experiment results prove that our algorithm is efficient in authority verification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

We make sure that all data and materials support their published claims and comply with field standards.

Code availability

We make sure that code supports their published claims and comply with field standards.

References

  1. Kirmani S, Mazid A, Khan IA, Abid M (2023) A survey on iot-enabled smart grids: Technologies, architectures, applications, and challenges. Sustainability 15(1)

  2. Jafari M, Kavousi-Fard A, Chen T, Karimi M (2023) A review on digital twin technology in smart grid, transportation system and smart city: Challenges and future. IEEE Access 11:17471–17484. https://doi.org/10.1109/ACCESS.2023.3241588

    Article  Google Scholar 

  3. Peñuelas-Angulo A, Feregrino-Uribe C, Morales-Sandoval M (2023) Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey. Internet of Things 23:100827

    Article  Google Scholar 

  4. Zhao M, Ding Y, Tang S, Liang H, Wang H (2023) A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer Peer Netw Appl 16(1):142–155

    Article  Google Scholar 

  5. Mehta PJ, Parne BL, Patel SJ (2023) Se-lakaf: Security enhanced lightweight authentication and key agreement framework for smart grid network. Peer Peer Netw Appl 16(3):1513–1535

    Article  Google Scholar 

  6. Cao Y, Li S, Lv C, Wang D, Sun H, Jiang J, Meng F, Xu L, Cheng X (2023) Towards cyber security for low-carbon transportation: Overview, challenges and future directions. Renew Sustain Energy Rev 183:113401

    Article  Google Scholar 

  7. Egide N, Li F (2023) Hap-sg: Heterogeneous authentication protocol for smart grid. Peer Peer Netw Appl 1–15

  8. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. SP 2000, pp. 44–55. https://doi.org/10.1109/SECPRI.2000.848445

  9. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT 2004, pp. 506–522

  10. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International Conference on the Theory and Application of Cryptographic Techniques. https://api.semanticscholar.org/CorpusID:10137076

  11. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. IACR Cryptol ePrint Arch 2006:309

    Google Scholar 

  12. Eltayieb N, Elhabob R, Hassan A, Li F (2019) An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J Syst Architect 98:165–172. https://doi.org/10.1016/j.sysarc.2019.07.005

    Article  Google Scholar 

  13. Zhang X, Mu D, Zhao J (2023) Attribute-based keyword search encryption for power data protection. High-Confid Comput 100115

  14. Zhang J, Ma J, Yang Y, Liu X, Xiong NN (2022) Revocable and privacy-preserving decentralized data sharing framework for fog-assisted internet of things. IEEE Internet Things J 9(13):10446–10463

    Article  Google Scholar 

  15. Ma K, Song G, Zhou Y, Xu R, Yang B (2023) An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system. Comput Stand Interfaces 88:103784

    Article  Google Scholar 

  16. Li J, Zhang T (2023) Power data attribution revocation searchable encrypted cloud storage. In: 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE), pp. 579–582. IEEE

  17. Yang Y, Deng RH, Guo W, Cheng H, Luo X, Zheng X, Rong C (2023) Dual traceable distributed attribute-based searchable encryption and ownership transfer. IEEE Trans Cloud Comput 11(1):247–262

    Article  Google Scholar 

  18. Ge C, Susilo W, Liu Z, Baek J, Luo X, Fang L (2023) Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds. IEEE Trans Dependable Secure Comput 1–12. https://doi.org/10.1109/TDSC.2023.3265979

  19. Wang M, Miao Y, Guo Y, Huang H, Wang C, Jia X (2023) Aesm2 attribute-based encrypted search for multi-owner and multi-user distributed systems. IEEE Trans Parallel Distrib Syst 34(1):92–107. https://doi.org/10.1109/TPDS.2022.3216320

    Article  Google Scholar 

  20. Niu S, Hu Y, Zhou S, Shao H, Wang C (2023) Attribute-based searchable encryption in edge computing for lightweight devices. IEEE Syst J 17(3):3503–3514. https://doi.org/10.1109/JSYST.2023.3283389

    Article  Google Scholar 

  21. Abbou RB, Mrabti F, Ghoubach IE (2019) Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems. Int J Secure Network 14(3):133

    Article  Google Scholar 

  22. Ghopur D, Ma J, Ma X, Hao J, Jiang T, Wang X (2023) Puncturable key-policy attribute-based encryption scheme for efficient user revocation. IEEE Trans Serv Comput 1–12. https://doi.org/10.1109/TSC.2023.3303368

  23. Sultan NH, Kaaniche N, Laurent M, Barbhuiya FA (2022) Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Trans Cloud Comput 10(1):216–233

    Article  Google Scholar 

  24. Yu J, Liu S, Xu M, Guo H, Zhong F, Cheng W (2023) An efficient revocable and searchable ma-abe scheme with blockchain assistance for c-iot. IEEE Internet Things J 10(3):2754–2766. https://doi.org/10.1109/JIOT.2022.3213829

    Article  Google Scholar 

  25. Edemacu K, Jang B, Kim JW (2021) Cescr: Cp-abe for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute. PLoS ONE 16(5):0250992

    Article  Google Scholar 

  26. Austin AJ (2022) Sharing phr data in cloud using sigmoid key and median support signature-based cryptosystem. Wireless Pers Commun 124(4):3549–3565

    Article  Google Scholar 

  27. Wei J, Liu W, Hu X (2016) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J 1–12

  28. Liu X, Lu T, He X, Yang X, Niu S (2020) Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8:52062–52074. https://doi.org/10.1109/ACCESS.2020.2980627

    Article  Google Scholar 

  29. Kim I, Susilo W, Baek J, Kim J (2022) Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption. IEEE Trans Dependable Secure Comput 19(3):1856–1870

    Article  Google Scholar 

Download references

Funding

This study was funded by ANatural Science Foundation of Sichuan, China (2023NSFSC1400), Chengdu Science and Technology Program (2021-YF08-00151-GX).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Yawen Feng and Shengke Zeng. The first draft of the manuscript was written by Yawen Feng and all authors commented on previous versions of the manuscript.

Corresponding author

Correspondence to Shengke Zeng.

Ethics declarations

Ethics approval

All authors read and approved the final manuscript.

Consent to participate

All authors consent to participate.

Consent for publication

All authors consent for publication.

Conflict of interest

We confirm that there are no conflicts of interest associated with thsubmission of this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy

Guest Editor: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, Y., Zeng, S. Secure and flexible authorized data sharing for smart grid. Peer-to-Peer Netw. Appl. 17, 1208–1224 (2024). https://doi.org/10.1007/s12083-024-01649-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01649-3

Keywords

Navigation