A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks

Modern power systems depend on cyber-physical systems to link physical devices and control technologies. A major concern in the implementation of smart power networks is to minimize the risk of data privacy violation (e.g., by adversaries using data poisoning and inference attacks). In this article, we propose a privacy-preserving framework to achieve both privacy and security in smart power networks. The framework includes two main modules: a two-level privacy module and an anomaly detection module. In the two-level privacy module, an enhanced-proof-of-work-technique-based blockchain is designed to verify data integrity and mitigate data poisoning attacks, and a variational autoencoder is simultaneously applied for transforming data into an encoded format for preventing inference attacks. In the anomaly detection module, a long short-term memory deep learning technique is used for training and validating the outputs of the two-level privacy module using two public datasets. The results highlight that the proposed framework can efficiently protect data of smart power networks and discover abnormal behaviors, in comparison to several state-of-the-art techniques.

[1]  Deepak Puthal,et al.  The Blockchain as a Decentralized Security Framework , 2018 .

[2]  N. Nagaveni,et al.  Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario , 2013, Inf. Sci..

[3]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[4]  Osmar R. Zaïane,et al.  Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..

[5]  Zhao Yang Dong,et al.  Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.

[6]  Zahir Tari,et al.  PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..

[7]  Ibrahim Khalil,et al.  Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform , 2019, Knowl. Based Syst..

[8]  Byeong Man Kim,et al.  A layer-wise Perturbation based Privacy Preserving Deep Neural Networks , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[9]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[10]  George J. Pappas,et al.  Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[11]  Biplab Sikdar,et al.  An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication , 2019, IEEE Transactions on Smart Grid.

[12]  Keke Gai,et al.  Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[13]  Zuyi Li,et al.  Impacts of Bad Data on the PMU based Line Outage Detection , 2015, ArXiv.

[14]  Jiankun Hu,et al.  An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems , 2019, IEEE Transactions on Sustainable Computing.

[15]  Raymond K. Wong,et al.  Insider Threat Detection with Long Short-Term Memory , 2019, ACSW.

[16]  Elena Sitnikova,et al.  Privacy preservation intrusion detection technique for SCADA systems , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).

[17]  Beibei Li,et al.  On Reliability Analysis of Smart Grids under Topology Attacks , 2018, ACM Trans. Cyber Phys. Syst..

[18]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[19]  Glenn A. Fink,et al.  Security and Privacy in Cyber-Physical Systems , 2017 .

[20]  Mohsen Guizani,et al.  Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.

[21]  Xue Liu,et al.  Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism , 2019, IEEE Transactions on Industrial Informatics.

[22]  Ruslan Salakhutdinov,et al.  Importance Weighted Autoencoders , 2015, ICLR.

[23]  Sungzoon Cho,et al.  Variational Autoencoder based Anomaly Detection using Reconstruction Probability , 2015 .

[24]  Deepak Puthal,et al.  The Blockchain as a Decentralized Security Framework [Future Directions] , 2018, IEEE Consumer Electronics Magazine.

[25]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[26]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[27]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[28]  Rebecca Petersen Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks , 2015 .