An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids

The concept of Smart Grid gains tremendous attention amongst researchers and utility providers in recent years. One of the challenges is to establish a secure communication architecture among smart meters, utility companies, and third-party service providers, whilst address the prevalent security and privacy concerns. In this paper, we propose a communication architecture for smart grids, and design a scheme to secure the data communications among smart meters, utility companies, and third-party service providers by employing Decentralized Ciphertext-Policy Attribute Based Encryption (CP_ABE) to store the data in ciphertext format, hence ensuring data security. The architecture we proposed is high scalable since the decentralized feature. Also, our architecture achieves an role-based access control by employing an access control LSSS matrix that describes the attributes required to access the data. We analyze the proposed scheme, and argue that it provides message authenticity and collusion resistance, and is efficient and feasible.

[1]  Ivan Stojmenovic,et al.  A Security Architecture for Data Aggregation and Access Control in Smart Grids , 2011, ArXiv.

[2]  Xiaofeng Liao,et al.  Verifiable multi-secret sharing based on LFSR sequences , 2012, Theor. Comput. Sci..

[3]  Chunqiang Hu,et al.  Efficient privacy-preserving dot-product computation for mobile big data , 2017, IET Commun..

[4]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[5]  Farrokh Albuyeh,et al.  Grid of the future , 2009, IEEE Power and Energy Magazine.

[6]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[12]  Jiguo Yu,et al.  A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.

[13]  Jiguo Yu,et al.  An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications , 2015, SecureComm.

[14]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[15]  Sun Fengjie,et al.  Security mechanism for smart distribution grid using Ethernet Passive Optical Network , 2010, 2010 2nd International Conference on Advanced Computer Control.

[16]  John R. Williams,et al.  Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[17]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[18]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[19]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[20]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[21]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[22]  Ran Canetti,et al.  A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.

[23]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[24]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[25]  Tao Xiang,et al.  Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2016, IEEE Transactions on Multi-Scale Computing Systems.