Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks

The blooming trend of smart grid deployment is engaged by the evolution of the network technology, as the connected environment offers various alternatives for electrical data collections. Having diverse data sharing/transfer means is deemed an important aspect in enabling intelligent controls/governance in smart grid. However, security and privacy concerns also are introduced while flexible communication services are provided, such as energy depletion and infrastructure mapping attacks. This paper proposes a model permissioned blockchain edge model for smart grid network (PBEM-SGN) to address the two significant issues in smart grid, privacy protections, and energy security, by means of combining blockchain and edge computing techniques. We use group signatures and covert channel authorization techniques to guarantee users’ validity. An optimal security-aware strategy is constructed by smart contracts running on the blockchain. Our experiments have evaluated the effectiveness of the proposed approach.

[1]  Qian He,et al.  Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.

[2]  Ioannis Psaras,et al.  Decentralised Edge-Computing and IoT through Distributed Trust , 2018, MobiSys.

[3]  Li Lin,et al.  PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments , 2018, IEEE Access.

[4]  Xing Zhang,et al.  A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.

[5]  David K. Y. Yau,et al.  Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.

[6]  Keke Gai,et al.  Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.

[7]  Samiran Chattopadhyay,et al.  On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.

[8]  Robert H. Deng,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  JooSeok Song,et al.  Novel defense mechanism against data flooding attacks in wireless ad hoc networks , 2010, IEEE Transactions on Consumer Electronics.

[10]  Bin Li,et al.  Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing , 2013, IEEE Transactions on Dependable and Secure Computing.

[11]  Hong Liu,et al.  Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.

[12]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[13]  Der-Jiunn Deng,et al.  Wireless Big Data Computing in Smart Grid , 2017, IEEE Wireless Communications.

[14]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[15]  Victor C. M. Leung,et al.  Computation Offloading and Content Caching in Wireless Blockchain Networks With Mobile Edge Computing , 2018, IEEE Transactions on Vehicular Technology.

[16]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[17]  Shengli Xie,et al.  Cognitive machine-to-machine communications: visions and potentials for the smart grid , 2012, IEEE Network.

[18]  Yan Zhang,et al.  Optimal Resource Sharing in 5G-Enabled Vehicular Networks: A Matrix Game Approach , 2016, IEEE Transactions on Vehicular Technology.

[19]  Gaurav Shah,et al.  Keyboards and Covert Channels , 2006, USENIX Security Symposium.

[20]  Yuriy Brun,et al.  Entrusting Private Computation and Data to Untrusted Networks , 2013, IEEE Transactions on Dependable and Secure Computing.

[21]  Ying Wang,et al.  A novel design for content delivery over software defined mobile social networks , 2015, IEEE Network.

[22]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[23]  Tilman Wolf,et al.  Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[24]  Shengli Xie,et al.  Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.

[25]  Keke Gai,et al.  Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[26]  Jian Weng,et al.  Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise , 2017, IEEE Transactions on Smart Grid.

[27]  Yan Zhang,et al.  HERO: Hierarchical Energy Optimization for Data Center Networks , 2015, IEEE Systems Journal.

[28]  Sajad Najafi Ravadanegh,et al.  Optimal Power Dispatch of Multi-Microgrids at Future Smart Distribution Grids , 2015, IEEE Transactions on Smart Grid.

[29]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[30]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[31]  Ke Zhang,et al.  Mobile-Edge Computing for Vehicular Networks: A Promising Network Paradigm with Predictive Off-Loading , 2017, IEEE Veh. Technol. Mag..

[32]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[33]  Ritwik Majumder,et al.  Integration of Distributed Generation in the Volt/VAR Management System for Active Distribution Networks , 2015, IEEE Transactions on Smart Grid.

[34]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[35]  Mamidala Sagar,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing In Cloud Storage , 2017 .

[36]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[37]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing: Challenges and Applications , 2017, ArXiv.

[38]  Yan Zhang,et al.  Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.

[39]  Keke Gai,et al.  Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..

[40]  Dusit Niyato,et al.  Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).

[41]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[42]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.

[43]  Yijia Cao,et al.  Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.

[44]  Doo-Kwon Baik,et al.  Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System , 2018, IEEE Access.

[45]  Kai Wang,et al.  Enabling Collaborative Edge Computing for Software Defined Vehicular Networks , 2018, IEEE Network.

[46]  Liehuang Zhu,et al.  When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).

[47]  Ke Zhang,et al.  Mobile Edge Computing and Networking for Green and Low-Latency Internet of Things , 2018, IEEE Communications Magazine.

[48]  Keke Gai,et al.  Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.

[49]  Xin Chen,et al.  An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.

[50]  Jason Dykes,et al.  Attribute Signatures: Dynamic Visual Summaries for Analyzing Multivariate Geographical Data , 2014, IEEE Transactions on Visualization and Computer Graphics.

[51]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.