A Privacy Protection Scheme for Smart Meter Electricity Consumption Data Based on Certificateless Aggregate Signcryption with Public Verifiability
DOI: 10.23977/jeis.2023.080106 | Downloads: 19 | Views: 232
Baoyi Wang 1, Xindong Liang 1, Shaomin Zhang 1
1 School of Control and Computer Engineering, North China Electric Power University, Baoding Hebei, 071003, China
Corresponding AuthorBaoyi Wang
Smart meters bring convenience to the reasonable use of electricity by smart homes and effective power supply and efficient charging of power companies. Sensitive information such as user power is leaked by fine-grained smart meter data, and existing solutions achieve privacy protection of electricity data through signing passwords, data aggregation, etc. but most of them use bilinear pair operations or exponential operations. Due to the limited storage resources of smart meters in smart homes, they are not suitable for algorithms with high computational power consumption. And verification one by one leads to a low level of computational efficiency. Based on this, this paper proposes a publicly verifiable aggregate signcryption scheme, which only uses elliptic curve point multiplication, which protects privacy while reducing computing overhead and communication overhead, and prevents the intelligent gateway from being decrypted when verifying data.
KEYWORDSPrivacy protection, smart meters, smart home, aggregate signcryption
CITE THIS PAPER
Baoyi Wang, Xindong Liang, Shaomin Zhang, A Privacy Protection Scheme for Smart Meter Electricity Consumption Data Based on Certificateless Aggregate Signcryption with Public Verifiability. Journal of Electronics and Information Science (2023) Vol. 8: 42-47. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2023.080106.
 Zhou Y, Chen X, Chen M. Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid [J]. Security and Communication Networks, 2020, 2020(5):1-14.
 Desai S, Alhadad R, Chilamkurti N, et al. A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure [J]. Cluster Computing, 2019, 22(3).
 Grid N.S., Guidelines for smart grid cyber security: vol. 2, privacy and the smart grid. Guideline (2010)
 Dinesh C., Nettasinghe B.W., Godaliyadda R.I., Ekanayake M.P.B., Ekanayake J., Wijayakulasooriya J.V.: Residential appliance identification based on spectral information of low frequency smart meter measurements. IEEE Trans. Smart Grid 7(6), 2781–2792 (2016)
 Ambrosin M., Hosseini H., Mandal K., Conti M., Poovendran R.: Despicable me (ter): anonymous andfine-grained meteringdata reporting with dishonest meters. In: 2016 IEEE Conferenceon Communications and Network Security (CNS), pp. 163–171(2016)
 Liu Y, Zhong L, Qiu J, et al. Unsupervised Domain Adaptation for Non-Intrusive Load Monitoring Via Adversarial and Joint Adaptation Network [J]. IEEE Transactions on Industrial Informatics, 2021, PP (99):1-1.
 Abouelkheir E, El-sherbiny S. Pairing free identity based aggregate signcryption scheme [J]. IET Information Security, 2020, 14(6): 625-632.
 LI C, QI Z H. Efficient and secure certificateless aggregate signcryption scheme [J]. Computer Technology and Development, 2020, 30(10): 117-122.
 NIU S F, LI Z B, WANG C F. Anonymous heterogeneous aggregation signcryption scheme for vehicular network [J]. Computer Engineering & Science. 2019, 41(1): 80-87.
 Qu Y, Mu Q. An efficient certificateless aggregate signature without pairing [J]. International Journal of Electronic Security and Digital Forensics, 2018, 10(2): 188-203.
 H. Zhou, J. Chen, et al. A multidimensional data aggregation scheme in multilevel network in smart grid [J]. Cryptologic Res, VOL: 4, Pages: 114–132, Sep 2017.