IP2DM: integrated privacy-preserving data management architecture for smart grid V2G networks

With the development of battery vehicles, vehicle-to-grid (V2G) networks are becoming more and more important in smart grid. Although battery vehicles are environmentally friendly and flexible to use two-way communication and two-way electricity flow, they also raise privacy-preservation challenges, such as location and movement privacy. On the one hand, utility companies have to monitor the grid and analyze user data to control the power production, distribution, scheduling, and billing process, while typical users need to access their data later online. On the other hand, users are not willing to provide their personal data because they do not trust the system security of the utility companies where their data stored, and it may potentially expose their privacy. Therefore, in this paper, we study data management of V2G networks in smart grid with privacy-preservation to benefit both the customers and the utility companies. Both data aggregation and data publication of V2G networks are protected in the proposed architecture. To check its security, we analyze this architecture in several typical V2G networks attacks. We conduct several experiments to show that the proposed architecture is effective and efficient, and it can enhance user privacy protection while providing enough information for utility companies to analyze and monitor the grid. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Lixin Xu,et al.  Research of security structure model for web application systems based on the relational database , 2015, Int. J. Secur. Networks.

[2]  Vinod Vaikuntanathan,et al.  Computing Blindfolded: New Developments in Fully Homomorphic Encryption , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[3]  Yang Xiao,et al.  NFD: A practical scheme to detect non-technical loss fraud in smart grid , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Zhenyu Yang,et al.  $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.

[5]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[6]  Chuang Lin,et al.  An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Christoph Sorge,et al.  Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.

[8]  Yang Xiao,et al.  PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks , 2015, Wirel. Commun. Mob. Comput..

[9]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Yang Xiao,et al.  Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.

[12]  Chunqiang Hu,et al.  FPODG: a flexible and private proximity testing based on 'one degree' grid , 2016, Int. J. Sens. Networks.

[13]  Guilin Zheng,et al.  Residential Appliances Identification and Monitoring by a Nonintrusive Method , 2012, IEEE Transactions on Smart Grid.

[14]  Dogan Kesdogan,et al.  V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid , 2012, CSS.

[15]  Yang Xiao,et al.  Accountable Administration and Implementation in Operating Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[16]  Yang Xiao,et al.  FNFD: A Fast Scheme to Detect and Verify Non-Technical Loss Fraud in Smart Grid , 2016 .

[17]  Yang Xiao,et al.  Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.

[18]  Yang Xiao,et al.  Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid , 2016, ICCCS.

[19]  Yang Xiao,et al.  A Survey of Payment Card Industry Data Security Standard , 2010, IEEE Communications Surveys & Tutorials.

[20]  Joseph K. Liu,et al.  Enhancing Location Privacy for Electric Vehicles (at the Right time) , 2012, ESORICS.

[21]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[22]  Robert F. Mills,et al.  Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.

[23]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[24]  Naixue Xiong,et al.  A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[25]  Yang Xiao,et al.  A survey of communication/networking in Smart Grids , 2012, Future Gener. Comput. Syst..

[26]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[27]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[28]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[29]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[30]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[31]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[32]  Huei-Ru Tseng,et al.  A secure and privacy-preserving communication protocol for V2G networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[33]  Yang Xiao,et al.  Accountable administration in operating systems , 2017, Int. J. Inf. Comput. Secur..

[34]  Yang Xiao,et al.  Privacy preservation for V2G networks in smart grid: A survey , 2016, Comput. Commun..

[35]  Yang Xiao,et al.  CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid , 2016, WASA.

[36]  Shengli Xie,et al.  Cognitive machine-to-machine communications: visions and potentials for the smart grid , 2012, IEEE Network.

[37]  David A. Wagner,et al.  Cryptanalysis of an Algebraic Privacy Homomorphism , 2003, ISC.

[38]  Xindong Wu,et al.  Security and privacy protocols for perceptual image hashing , 2015, Int. J. Sens. Networks.

[39]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[40]  Dogan Kesdogan,et al.  Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction , 2011, EuroPKI.

[41]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[42]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[43]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[44]  Jing Liu,et al.  Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.

[45]  Dogan Kesdogan,et al.  Location Privacy for Vehicle-to-Grid Interaction through Battery Management , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[46]  Sonali Kale,et al.  Fuzzy Keyword Search over Encrypted Data in Cloud , 2017 .

[47]  Yang Xiao,et al.  Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.

[48]  Hamid Gharavi Smart Grid: The Electric Energy System of the Future , 2011 .

[49]  Renato J. Orsato,et al.  The emergence of an electric mobility trajectory , 2013 .

[50]  Laurence T. Yang,et al.  Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[51]  Daniele Micciancio,et al.  The Geometry of Lattice Cryptography , 2011, FOSAD.

[52]  Dieter Kopp,et al.  E-mobility in the context of electric energy distribution grids , 2011, Bell Labs Technical Journal.

[53]  Marten van Dijk,et al.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.

[54]  Bo Fu,et al.  SCADA communication and security issues , 2014, Secur. Commun. Networks.

[55]  Hwangnam Kim,et al.  A Secure Framework for Protecting Customer Collaboration in Intelligent Power Grids , 2011, IEEE Transactions on Smart Grid.

[56]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[57]  Yang Lei,et al.  Research of privacy-preserving data aggregation algorithm for wireless sensor network , 2014 .

[58]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[59]  Cyril Guyot,et al.  The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing , 2012, Cryptologia.

[60]  Wenlin Han,et al.  Cybersecurity in Internet of Things (IoT) , 2017 .

[61]  Hamed Mohsenian Rad,et al.  Vehicle-to-Aggregator Interaction Game , 2012, IEEE Transactions on Smart Grid.

[62]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[63]  Yang Xiao,et al.  Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid , 2016, ICCCS.

[64]  Yang Xiao,et al.  IP2DM for V2G networks in Smart Grid , 2015, 2015 IEEE International Conference on Communications (ICC).

[65]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[66]  Cong Wang,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[67]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[68]  Jin Wang,et al.  A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .

[69]  Jussipekka Leiwo,et al.  A Study on the Security of Privacy Homomorphism , 2008 .

[70]  George Gross,et al.  A conceptual framework for the vehicle-to-grid (V2G) implementation , 2009 .

[71]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[72]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..