Method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids

Information

  • Patent Grant
  • 11979506
  • Patent Number
    11,979,506
  • Date Filed
    Tuesday, July 14, 2020
    3 years ago
  • Date Issued
    Tuesday, May 7, 2024
    12 days ago
  • Inventors
    • Zhang; Xiaojun
    • Huang; Chao
    • Zhang; Jingwei
    • Gong; Jie
    • Zhou; Ziyu
    • Zheng; Shuang
    • Zhao; Jie
  • Original Assignees
  • Examiners
    • Little; Vance M
    Agents
    • Ma; Zhigang
Abstract
In a method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids, every user area is managed by a fog node which plays the role of data aggregation gateway and data relay. All the users' electricity consumption data sent by smart meters in the same user area are firstly aggregated by the fog node to generate a fog-level aggregate ciphertext. Then the fog node further generates a digital signature for the fog-level aggregate ciphertext and sends these data to a cloud server for long-time storage. The cloud server stores all the aggregate ciphertexts and digital signatures received from different user areas in its database, and provides data query and statistical analysis services for the control center of smart grids. On the premise of without violating users' privacy, the cloud server could provide enough information for the control center, enabling it to compute the sum, arithmetic mean and variance of all users' data in specified areas in a privacy-preserving way.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS





    • The present application is the U.S. national phase of PCT Application No. PCT/CN2020/101889 filed on Jul. 14, 2020, which claims priority to Chinese Patent Application No. 202010399781.1 filed on May 13, 2020, the disclosure of which are incorporated herein by reference in their entireties.





TECHNICAL FIELD

This invention belongs to technical domains of big data analysis for smart grids and information security, specifically it involves a method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids.


BACKGROUND

Smart grid introduces many emerging information technologies, e.g., cloud computing, artificial intelligence, machine learning, on the basis of conventional power grid systems. It builds an advanced metering infrastructure (AMI) on the traditional system framework to bidirectionally transfer user's electricity consumption data and feedback commands, electricity price information from the control center of smart grid. The core of AMI is an embedded device called smart meter which is installed in the house of users to periodically collect users' electricity consumption data and report them to the control center. The control center uses various data analysis techniques to obtain valuable information from the collected fine-grained user data. With the analysis results, the control center could monitor the situation of smart grid system and dynamically adjust and optimize power generation and distribution. On the other hand, the control center could also dispatch some feedback commands, electricity price information and blackout information to the smart meters via the data transmission channel. By interacting with the smart meters, users could obtain these information and further adjust electricity usage plan of the whole household.


While smart grid employs different techniques to collect and transmit users' electricity consumption data, it introduces many security threats at the same time. Since users' electricity consumption data are transmitted by an open wireless network, user privacy, data confidentiality and data integrity are all threatened during transmission. On one hand, there may exist external adversaries who eavesdrops the communication channel and intercepts, replaces and tampers with users' electricity consumption data, which violates user privacy and even cause chaos to smart grid systems. On the other hand, there may also exist internal adversaries who steals private key of the control center, and with which they could successfully decrypt the ciphertext of any single user, violating data confidentiality and user privacy. Apart from these security threats, with the intrinsic characteristics of smart grid systems including massive user amount, high data density, high-frequency data collection and transmission, low data processing latency, it is a critical problem that how to design a method for efficient verifiable data aggregation and statistical analysis.


Besides, to preserve data confidentiality and user privacy users' electricity consumption data are usually encrypted using various methods immediately at smart meter side, this will cause that data lose their applicability to some extent. After the ciphertexts are aggregated by the aggregator gateway, the control center could only obtain limited statistical information from received aggregate results. Thus, a practical method for data aggregation of electricity consumption data for smart grid is supposed to achieve fundamental security requirements including data confidentiality, integrity and user privacy, and provides the control center with stronger data analysis ability. In terms of performance, it is demanded that data aggregation procedure, integrity verification procedure, decryption and data analysis procedure are as efficient as possible.


Recently, researchers propose many data aggregation methods using different techniques. Homomorphic encryption technique is widely used in the construction of data aggregation algorithms. With the homomorphism property of homomorphic encryption algorithms, when user data are encrypted to ciphertexts, they can be efficiently aggregated and the control center could directly decrypt aggregate ciphertext to get some statistical results with no need of decryption to ciphertext of single user, which effectively preserve user privacy and data confidentiality. In 2012, Lu et al. proposed a data aggregation scheme for smart grids using Paillier homomorphic encryption algorithm. In their scheme, a special superincreasing sequence is combined with Paillier encryption algorithm to achieve multi-dimension data encryption and aggregation. However, to preserve data integrity, the aggregate gateway needs to compute several bilinear pairing operations which causes high computational overhead. Chen et al. presented a privacy-preserving multi-functional data aggregation scheme using Boneh-Goh-Nissim (BGN) homomorphic encryption algorithm, their scheme leverages the one-lime multiplicative homomorphism and additive homomorphism properties, enabling the control center to obtain sum and variance of user data by decrypting the aggregate ciphertext.


SUMMARY

The purpose of this invention is overcoming the drawbacks of existing techniques and providing a method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids.


The purpose of this invention is achieved by the following technical scheme: the method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids includes:


S1. System Initialization: A trust center generates the security parameters involved in this method and distributes public-private key pairs to communication entities. The mentioned communication entities include smart meters, fog nodes, a cloud server and the control center. Then the trust center publishes all public parameters and sends private keys to corresponding communication entities via a secure channel.


S2. Data Reporting: Smart meters encrypt collected user's electricity consumption data to generate a ciphertext, generate a digital signature for the ciphertext and send the ciphertext and signature as reported data to corresponding fog node for data aggregation.


S3. Fog-level Aggregation: After the fog node receives all reported data from smart meters in its managed area in the prespecified period, it firstly verifies all the digital signatures of reported data. If the verification passes, fog node aggregates all the data ciphertexts of reported data to generate the fog-level aggregate ciphertext and signs the aggregate value to generate a fog-level signature. Then fog node sends the fog-level aggregate ciphertext and fog-level signature to the cloud server for long-time storage.


S4. Data Analysis Request and Response: The control center sends a challenge message which includes a user area list for data analysis and a random chosen coefficient sequence to the cloud server. The cloud server abstracts fog-level aggregate data from its database according to the received user area list. Then it firstly generates a cloud-level aggregate ciphertext and secondly signs the aggregate value to generate verifiable response information using fog-level signatures and received coefficient sequence. Finally it sends these data to the control center.


S5 Verification and Decryption: The control center firstly verifies the response information returned by the cloud server to confirm the data integrity of cloud-level aggregate ciphertext. If the verification passes, control center decrypts the aggregate ciphertext and further computes the arithmetic mean and variance of all users' electricity consumption data within the specified user area list.


It is priority that the security parameters in step S1 include security parameters of key-leakage resilience homomorphic encryption algorithm and security parameters of linear homomorphic digital signature.


It is priority that in step S2, smart meters combine a random blinding technique with the homomorphic encryption algorithm to encrypt user's electricity consumption data. In step S5, the control center uses privacy-preserving decryption algorithm to decrypt response data received from the cloud server.


It is priority that in step S3, the fog nodes use a batch verification method to check the signatures of ciphertexts from smart meters.


It is priority that step S1 includes:


S11. Given a security parameter k, the trust authority generates parameters of a key-leakage resilient homomorphic encryption algorithm (n, g, G, GT, e), where e:G×G→GT is an admissible bilinear map, G and GT are both cyclic groups with composite order n, and n=p1p2, p1 and p2 are both big prime numbers with k-bit length, g is a generator of group G. The trust authority computes public key of the control center as ξ=gp2.


S12. The trust authority determines an elliptic curve E over the finite field Fp and a bilinear map {tilde over (e)}:G1×G1→G2 based on E, where p is a big prime number, G1 is an additive cyclic group with order q, G2 is a multiplicative cyclic group with order q. The trust authority selects a generator P of group G1, and sets the number of fog nodes in the system to be N and the number of smart meters in each user area to be l. The trust authority sets two secure collision-resistant hash functions: H1:{0,1}*→G1, h1:{0,1}*→Zq*, where {0, 1}* denotes the set of binary strings with arbitrary length, Zq* is the multiplicative cyclic group which is composed of residue systems relatively prime to q.


S13. The trust authority randomly chooses five constants: α, β, γ, δ, ζ satisfying α·β+γ·δ+ζ=n, where α∈Zn, β∈Zn, γ∈Zn, δ∈Zn, ζ∈Zn, computes public parameters f=gα and ε=gγ. Besides, it selects a private key yi∈Zq for digital signature algorithm for each fog node FNi and computes the corresponding public key Yi=yiP for signature verification.


S14. For each smart meter SMij with a unique identifier IDSMij, the trust authority randomly selects a private key yij∈Zq for digital signature for it, where Zq is the ring of residue classes modulo q, SMij is the j-th smart meter in the user area corresponding to the i-th fog node FNi. The trust authority computes the public key Yij=yijP for signature verification for SMij, and selects two random numbers πij and sij for each SMij, where πij∈Zn, sij∈Zn, α·πij+γ·sij=ζ, custom characterπij≤β, custom charactersij≤δ, after that it computes two parameters πi=β−custom characterπij and si=δ−custom charactersij for each fog node FNi.


S15. The trust authority sends the private key p1 to the control center, private key yij, secret parameters πij and sij to smart meter SMij, and private key yi, secret parameters πi and si to the fog node FNi via a secure channel.


It is priority that step S2 includes:


S21. For each smart meter SMij with a unique identifier IDSMij, it randomly selects a number rij∈Zn and generates a ciphertext as cij=fπijεsijgmijξrij∈G, where mij∈[0, MAX] is the electricity consumption data of user, MAX is a prespecified upper bound of all users' electricity consumption data, MAX is far less than p2;


S22. The Smart meter SMij acquires current timestamp tij, and uses the private key yij to compute a digital signature as σij=yijH(IDSMij∥cij∥tij);


S23. The smart meter SMij sends {IDSMij, cij, σij, tij} to the corresponding fog node FNi.


It is priority that step S3 includes:


S31. After the fog node FNi receives data {IDSMij, cij, σij, tij} from all smart meters SMij, J=1, 2, . . . custom character of the user area in the time period, it verifies all the signatures σij sent by all smart meters SMij using the following verification equation:









e
~

(





j
=
1




σ
ij


,
P

)

=








j
=
1





e
~

(



H
1

(


ID

SM
ij






c
ij





t
ij


)

,

Y
ij


)



;




S32. If the verification equation in step S31 passes, then the fog node FNi computes the first intermediate state ciphertext as ci=custom charactercij and the second intermediate state ciphertext as Ci=fπiεsici.


S33. The fog node FNi generates fog-level aggregate ciphertexts, which include the first fog-level aggregate ciphertext as CTi=custom character·ci and the second fog-level aggregate ciphertext as SCTi=custom charactere(cijCi, cijCi).


S34. The fog node FNi computes a fog-level digital signature as σi=(yi+h1(CTi∥SCTi))H1(IDCS), where IDCS is a unique identifier of the cloud server.


S35. The fog node FNi sends all the aggregate data {CTi, SCTi, σi} to cloud server for long-time storage.


It is priority that step S4 includes:


S41. The control center generates a challenge message {L, chal}, and sends it to the cloud server, where L is a list of user areas, L={ϑ1, ϑ2, . . . , ϑθ}⊆{1, 2, . . . , N}, chal={ηϑ1, ηϑ2, . . . , ηϑθ-2, λ, μ} is a sequence of random matching coefficients of length ϑ.


S42. The cloud server generates cloud-level aggregate ciphertexts, which include the first aggregate ciphertext CT=Πϑ∈LCTϑ, the second aggregate ciphertext PCT=Πϑ∈Le(CTϑ, CTϑ) and the third aggregate ciphertext SCT=Πϑ∈LSCTϑ.


S43. The cloud server uses random coefficients λ and μ, the cloud-level aggregate ciphertext to produce two random values ηϑθ-1=h1(CT∥λ) and ηϑθ=h1(PCT∥SCT∥μ). And it gets the signatures {σϑ1, σϑ2, . . . , σϑθ} of fog-level aggregate ciphertexts from database according to list L and computes an aggregate signature σ=Σϑ∈LϑH1(IDCS)+σϑ).


S44. The cloud server computes a combined hash value as h=Σϑ∈Lh1(CTϑ∥SCTϑ) and a combined public key as Y=Σϑ∈LYϑ.


S45. The cloud server sends the response data Agg={σ, h, Y, CT, PCT, SCT} to the control center.


It is priority that step S5 includes:


S51. The control center uses random coefficients λ and μ, and the cloud-level aggregate ciphertext to produce ηϑθ-1=h1(CT∥λ) and ηϑθ=h1(PCT∥SCT∥μ) in the same way, and computes the sum of random matching coefficients as η=ϑ∈Lηϑ, then it verifies the signatures by the following verification equation:

{tilde over (e)}(σ,P)={tilde over (e)}((h+η)H1(IDCS),P{tilde over (e)}(H1(IDCS),Y)


S52. If the verification equation in step S51 passes, the control center uses key-leakage resilient decryption algorithm to compute the discrete logarithm of CTp1 of base ĝ=gp1, and divides the result by custom character+1 to get the sum M of all users' electricity consumption data in the user areas specified in the user area list, namely M=logĝCTp1/(custom character+1).


S53. The control center uses private key p1 to compute discrete logarithms logêSCTp1 and logêPCTp1 respectively, where ê=e(g, g)p1 is a bilinear map value, and computes the sum of squares of all users' electricity consumption data in the user areas specified in the user area list, namely M2ϑ∈LΣj=1lmϑj2=logêSCTp1−(custom character+2)·(logêPCTp1/(custom character+1)2).


S54. The control center computes the arithmetic mean of all users' data as







m
¯

=


M

θ
·



.





S55. The control center computes the variance of all users' data as







var

(
m
)

=



M
2


θ
·



-



m
¯

2

.






The beneficial effects of this invention includes:

    • (1) This invention uses key-leakage resilience homomorphic encryption algorithm to encrypt users' electricity consumption data, smart meters combine with the random blinding technique when generating the ciphertext by public key of the control center. Even though the corresponding private key of control center is accidentally leaked in some special cases, any single ciphertext is still not able to be decrypted, which can effectively preserve user privacy and data confidentiality.


(2) This invention designs a lightweight batch verification technique for checking data integrity, enabling the control center to verify the data integrity of all ciphertexts with constant time complexity which is independent of the number of user areas and smart meters in a single user area.


(3) This invention can provides flexible data statistical analysis and query functionality for the control center such that the control center or a service provider could selectively specify the range of interested user areas, specifically it could specify an arbitrary subset of indexes of user areas for statistical analysis on demand. Besides, the cloud server could provide enough information for the control center without violating privacy of any single user, with which the control center could compute the sum, arithmetic mean and variance of all users' electricity consumption data in specified user areas.


(4) This invention achieves high performance such that the control center could efficiently verify the data integrity of encrypted aggregate data with constant computational costs and conduct fast statistical analysis even though the amount of users and communication data is large.


(5) This invention, i.e., the method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids, s based on fog-computing framework, it takes advantage of the cloud server and fog nodes deployed at the edge of networks to release computational and communication burdens of business systems.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic diagram of a smart grid system.



FIG. 2 is the flow chart of this invention.





DETAILED DESCRIPTION

This section combines with an implementation instance to clearly and completely describe the technical scheme of this invention. Apparently, the described implementation instance is just a partial instance of this invention which does not cover all possibilities. Based on the implementation instance of this invention, all other implementation instances obtained by technicians of this field without any creative efforts fall in the range protected by this invention.


This invention provides a method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids:


As illustrated by FIG. 1 and FIG. 2, the method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids includes:


S1. System Initialization: A trust center generates the security parameters involved in this method and distributes public-private key pairs to communication entities. The mentioned communication entities include smart meters, fog nodes, a cloud server and the control center. Then the trust center publishes all public parameters and sends private keys to corresponding communication entities via a secure channel.


In some implementation instances, the security parameters in step S1 include security parameters of a key-leakage resilient homomorphic encryption algorithm and security parameters of a linear homomorphic digital signature algorithm.


The aforementioned step S1 includes:


S11. Given a security parameter k, the trust authority generates parameters of a key-leakage resilient homomorphic encryption algorithm (n, g, G, GT, e), where e:G×G→GT is an admissible bilinear pairing map, G and GT are both cyclic groups with composite order n, and n=p1p2, p1 and p2 are both big prime numbers with k-bit length, g is a generator of group G. The trust authority computes public key of the control center as ξ=gp2.


S12. The trust authority determines an elliptic curve E over the finite field Fp and another bilinear pairing map {tilde over (e)}: G1×G1→G2 based on E, where p is a big prime number, G1 is an additive cyclic group with order q, G2 is a multiplicative cyclic group with order q. The trust authority selects a generator P of group G1, and sets the number of fog nodes in the system to be N and the number of smart meters in each user area to be custom character. The trust authority sets two secure collision-resistant hash functions: H1:{0,1}*→G1, h1:{0,1}*→Zq*, where {0,1}* denotes the set of binary strings with arbitrary length, Zq* is the multiplicative cyclic group which is composed of residue systems relatively prime to q.


S13. The trust authority randomly chooses five constants: α, β, γ, δ, ζ satisfying α·β+γ·δ+ζ=n, where α∈Zn, β∈Zn, γ∈Zn, δ∈Zn, ζ∈Zn, computes public parameters f=gα and ε=gγ. Besides, the trust authority selects a private key yi∈Zq for digital signature algorithm for each fog node FNi and computes the corresponding public key Yi=yiP for signature verification.


S14. For each smart meter SMij with a unique identifier IDSMij, the trust authority randomly selects a private key yij∈Zq for digital signature, where Zq is the ring of residue classes modulo q, SMij is the j-th smart meter in the user area corresponding to the i-th fog node FNi. The trust authority computes the public key Yij=yijP for signature verification for SMij, and selects two random numbers πij and sij for each SMij, where πij∈Zn, sij∈Zn, α·πij+γ·sij=ζ, custom characterπij≤β, custom charactersij≤δ, after that it computes two parameters πi=β−custom characterπij and si=δ−custom charactersij for each fog node FNi.


S15. The trust authority sends the private key p1 to the control center, sends private key yij, secret parameters πij and sij to corresponding smart meter SMij, and sends private key yi, secret parameters πi and si to corresponding fog node FNi via a secure channel, respectively.


S2. Data Reporting: Smart meters encrypt collected user's electricity consumption data to generate a ciphertext, generate a digital signature for the ciphertext and send the ciphertext and signature as reported data to corresponding fog node for data aggregation.


In the step S2 of some implementation instances, smart meters combine a random blinding technique with the key-leakage resilient homomorphic encryption algorithm to encrypt users' electricity consumption data. In step S5, the control center uses corresponding key-leakage resilient homomorphic decryption algorithm to decrypt the response data.


The aforementioned step S2 includes:


S21. For each smart meter SMij, with a unique identifier IDSMij, it randomly selects a number rij∈Zij, and generates a ciphertext as cij=fπijεsijgmijξrij∈G, where mij∈[0, MAX] is the electricity consumption data of user, MAX is a prespecified upper bound of all users' electricity consumption data, MAX is far less than p2;


S22. The Smart meter SMij, acquires current timestamp tij, and uses the private key yij to compute a digital signature as σij=yijH (IDSMij∥cij∥tij);


S23. The smart meter SMij sends {IDSMij, Cij, σij, tij} to the corresponding fog node FNi.


S3. Fog-level Aggregation: After the fog node receives all reported data from smart meters in its managed area in the prespecified period, it firstly verifies all the digital signatures of reported data. If the verification passes, fog node aggregates all the data ciphertexts of reported data to generate the fog-level aggregate ciphertext and signs the aggregate value to generate a fog-level signature. Then fog node sends the fog-level aggregate ciphertext and fog-level signature to the cloud server for long-time storage.


The aforementioned step S3 includes:


S31. After the fog node FNi receives data {IDSMij, Cij, σij, tij} from all smart meters SMij, j=1, 2, . . . , custom character of the user area in the time period, it verifies all the signatures σij sent by all smart meters SMij using the following verification equation:












e
~

(








j
=
1



σ
ij


,
P

)

=




j
=
1





e
~

(



H
1

(


ID

SM
ij






c
ij






t
ij


)

,

Y
ij


)



;










S32. If the verification equation in step S31 passes, then the fog node FNi computes the first intermediate state ciphertext as ci=custom charactercij and the second intermediate state ciphertext as Ci=fπiεsici.


S33. The fog node FNi generates fog-level aggregate ciphertexts, which include the first fog-level aggregate ciphertext as CTi=custom character·ci and the second fog-level aggregate ciphertext as SCTi=custom charactere(cijCi, cijCi).


S34. The fog node FNi computes a fog-level digital signature as σi=(yi+h1(CTi∥SCTi))H1(IDCS), where IDCS is a unique identifier of the cloud server.


S35. The fog node FNi sends all the aggregate data {CTi, SCTi, σi} to cloud server for long-time storage.


S4. Data Analysis Request and Response: The control center sends a challenge message which includes a user area list for data analysis and a random chosen coefficient sequence to the cloud server. The cloud server abstracts fog-level aggregate data from its database according to the received user area list. Then it firstly generates a cloud-level aggregate ciphertext and secondly signs the aggregate value to generate verifiable response information using fog-level signatures and received coefficient sequence. Finally it sends these data to the control center.


The aforementioned step S4 includes:


S41. The control center generates a challenge message {L, chal}, and sends it to the cloud server, where L is a list of user areas, L={ϑ1, ϑ2, . . . , ϑθ}⊆{1, 2, . . . , N}, chal={ηϑ1, ηϑ2, . . . , ηϑθ-2, λ, μ} is a sequence of random matching coefficients of length ϑ.


S42. The cloud server generates cloud-level aggregate ciphertexts, which include the first aggregate ciphertext CT=Πϑ∈LCTϑ, the second aggregate ciphertext PCT=Πϑ∈Le(CTϑ, CTϑ) and the third aggregate ciphertext SCT=Πϑ∈LSCTϑ.


S43. The cloud server uses random coefficients λ and μ, the cloud-level aggregate ciphertext to produce two random values ηϑθ-1=h1(CT∥λ) and ηϑθ=h1(PCT∥SCT∥μ). And it gets the signatures {σϑ1, σϑ2, . . . , σϑθ} of fog-level aggregate ciphertexts from database according to list L and computes an aggregate signature σ=Σϑ∈LϑH1(IDCS)+σϑ).


S44. The cloud server computes a combined hash value as h=Σϑ∈Lh1(CTϑ∥SCTϑ) and a combined public key as Y=Σϑ∈LYϑ.


S45. The cloud server sends the response data Agg={σ, h, Y, CT, PCT, SCT} to the control center.


S5. Verification and Decryption: The control center firstly verifies the response information returned by the cloud server to confirm the data integrity of cloud-level aggregate ciphertext. If the verification passes, the control center decrypts the aggregate ciphertext and further computes the arithmetic mean and variance of all users' electricity consumption data within the specified user area list.


In the step S5 of some implementation instances, the control center uses the key-leakage resilient homomorphic decryption algorithm to decrypt the response data.


The aforementioned step S5 includes:


S51. The control center uses random coefficients λ and μ, and the cloud-level aggregate ciphertext to produce ηϑθ-1=h1(CT∥λ) and ηϑθ=h1(PCT∥SCT∥μ) in the same way, and computes the sum of random matching coefficients as η=ϑ∈Lηϑ, then it verifies the signatures by the following verification equation:

{tilde over (e)}(σ,P)={tilde over (e)}((h+η)H1(IDCS),P{tilde over (e)}(H1(IDCS),Y)


S52. If the verification equation in step S51 passes, the control center uses key-leakage resilient decryption algorithm to compute the discrete logarithm of CTp1 of base ĝ=gp1, and divides the result by custom character+1 to get the sum M of all users' electricity consumption data in the user areas specified in the user area list, namely M=logĝCTp1/(custom character+1).


S53. The control center uses private key p1 to compute discrete logarithms logêSCTp1 and logêPCTp1 respectively, where ê=e(g, g)p1 is a bilinear map value, and computes the sum of squares of all users' electricity consumption data in the user areas specified in the user area list, namely M2ϑ∈LΣj=1lmϑj2=logêSCTp1−(l+2)·(logêPCTp1/(custom character+1)2).


S54. The control center computes the arithmetic mean of all users' data as







m
¯

=


M

θ
·



.





S55. The control center computes the variance of all users' data as







var


(
m
)


=


M

θ
·



-



m
_

2

.






Each user area in this implementation instance is supervised by a fog node which plays the role of a data aggregate gateway and a data relay. All encrypted data sent by smart meters in the user area are aggregated for the first time by the fog node to generate a fog-level aggregate ciphertext. Then the fog node computes a signature for the fog-level aggregate ciphertext and sends all data to the cloud server for long-time storage. The cloud server stores all fog-level aggregate ciphertexts and signatures of different user areas in the database and provides data query service for the control center of smart grids.


The correctness of this implementation instance is proved as follows:


Let Mϑ=custom charactermϑj, Mϑ2=(custom charactermϑj)2, Rϑ=custom characterrϑj, M=Σϑ∈LMϑ, R=Σϑ∈LRϑ, M2ϑ∈Lcustom charactermϑj2.


The correctness of equation for data integrity verification is proved as follows:











e
~

(

σ
,
P

)

=



e
~

(





ϑ

L



(



η
ϑ




H
1

(

ID
CS

)


+

σ
ϑ


)


,
P

)







=



e
~

(





ϑ

L




(


η
ϑ

+

y
ϑ

+


h
1

(


CT
ϑ





"\[LeftBracketingBar]"



"\[RightBracketingBar]"




SCT
ϑ


)


)




H
1

(

ID

CS



)



,
P

)







=




e
~

(





ϑ

L




(


η
ϑ

+


h
1

(


CT
ϑ





"\[LeftBracketingBar]"



"\[RightBracketingBar]"




SCT
ϑ


)


)




H
1

(

ID
CS

)



,
P

)

·










e
~

(





ϑ

L




y
ϑ




H
1

(

ID
CS

)



,
P

)







=




e
~

(



(

h
+
η

)




H
1

(

ID
CS

)


,
P

)

·


e
~

(



H
1

(

ID
CS

)

,




ϑ

L




y
ϑ


P



)








=




e
~

(



(

h
+
η

)




H
1

(

ID
CS

)


,
P

)

·


e
~

(



H
1

(

ID
CS

)

,
Y

)









The correctness of computing statistical information M by the control center is proved as follows:










CT

p
1


=



(




ϑ

L



CT
ϑ


)


p
1








=



(




ϑ

L




C
ϑ


·

c
ϑ



)


p
1








=



(




ϑ

L





(


f

π
ϑ




ε

s
ϑ




c
ϑ


)



·

c
ϑ



)


p
1








=



(




ϑ

L





(


f
β



ε
δ



g

M
ϑ




ξ

R
ϑ



)



·




j
=
1




c

ϑ

j





)


p
1








=



(




ϑ

L




g


(


+
1

)



M
ϑ





ξ


(


+
1

)



R
ϑ





)


p
1








=



(


g



(


+
1

)

·






ϑ

L





M
ϑ





ξ



(


+
1

)

·






ϑ

L





R
ϑ




)


p
1








=




(

g

p
1


)



(


+
1

)

·
M


=


g
^



(


+
1

)

·
M













So


M

=


log

g
^


CT

p
1



/


(


+
1

)

.






The correctness of computing statistical information M2 by the control center is proved as follows:










PCT

p
1


=



(




ϑ

L



e

(


CT
ϑ

,

CT
ϑ


)


)


p
1








=



(




ϑ

L



e

(



g


(


+
1

)



M
ϑ





ξ


(


+
1

)



R
ϑ




,


g


(


+
1

)



M
ϑ





ξ


(


+
1

)



R
ϑ





)


)


p
1








=


(




ϑ

L



(



e

(

g
,
g

)



(


(


+
1

)



M
ϑ


)

2


·















e

(

g
,
ξ

)



2


(


+
1

)




M
ϑ

·

(


+
1

)




R
ϑ


+



p
2

(


(


+
1

)



R
ϑ


)

2



)

)


p
1







=


(



e

(

g
,
g

)




(


+
1

)

2








ϑ

L




M
ϑ
2



·











e



(

g
,
ξ

)








ϑ

L




(


2


(


+
1

)




M
ϑ

·

(


+
1

)




R
ϑ


+



p
2

(


(


+
1

)



R
ϑ


)

2


)




)


p
1







=



e
^




(


+
1

)

2








ϑ

L




M
ϑ
2
















SCT

p
1


=



(




ϑ

L



SCT
ϑ


)


p
1








=





ϑ

L



SCT
ϑ

p
1









=





ϑ

L




(




j
=
1




e

(



c

ϑ

j




C
ϑ


,


c

ϑ

j




C
ϑ



)


)


p
1









=





ϑ

L




(




j
=
1




e

(



g


m

ϑ

j


+

M
ϑ





ξ


r

ϑ

j


+

R
ϑ




,


g


m

ϑ

j


+

M
ϑ





ξ


r

ϑ

j


+

R
ϑ





)


)


p
1









=





ϑ

L



(




j
=
1




(



e

(

g
,
g

)



(


m

ϑ

j


+

M
ϑ


)

2


·
















e

(

g
,
ξ

)



2


(


m

ϑ

j


+

M
ϑ


)



(


r

ϑ

j


+

R
ϑ


)


+



p
2

(


r

ϑ

j


+

R
ϑ


)

2



)

)


p
1







=





ϑ

L



(



e

(

g
,
g

)





j
=
1





(


m

ϑ

j


+

M
ϑ


)

2



·













e

(

g
,
ξ

)








j
=
1





(


2


(


m

ϑ

j


+

M
ϑ


)



(


r

ϑ

j


+

R

ϑ




)


+



p
2

(


r

ϑ

j


+

R
ϑ


)

2


)



)


p
1







=





ϑ

L




e
^








j
=
1






(


m

ϑ

j


+

M
ϑ


)

2










=



e
^








ϑ

L









j
=
1






(


m

ϑ

j


+

M
ϑ


)

2









=



e
^








ϑ

L









j
=
1





(


m

ϑ

j

2

+

2


M
ϑ


+

M
ϑ
2


)









=



e
^









ϑ

L









j
=
1





m

ϑ

j

2


+

2





ϑ

L



M
ϑ



+




j
=
1




m

ϑ

j



+


·




ϑ

L



M
ϑ
2











=



e
^



M
2

+

2







ϑ

L




M
ϑ
2


+


·




ϑ

L



M
ϑ
2











=



e
^



M
2

+


(


+
2

)

·




ϑ

L



M
ϑ
2















So



M
2


=


log

e
^


SCT

p
1



-


(


+
2

)

·


(


log

e
^


SCT

p
1



/


(


+
1

)

2


)

.







The aforementioned contents are just the prior implementation of this invention. It is to be understood that this invention is not limited to the forms disclosed herein, and is not to be construed as excluding other embodiments, but is capable of use in various other combinations, modifications, and environments and is capable of modifications within the scope of the teachings presented herein or the skill or knowledge of the relevant art. It is intended that the present invention cover the modifications and variations of this invention provided they come within the spirit and scope of the appended claims.

Claims
  • 1. A method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids, comprising: S1. System Initialization: A trust center generates security parameters, and allocates public-private key pairs to each of communication entities; wherein the communication entities comprise smart meters, fog nodes, a cloud server and a control center; then the trust center publishes all public parameters of the security parameters and sends private keys of the public-private key pairs to corresponding communication entities via a secure channel;S2. Data Reporting: Each smart meter encrypts electricity consumption data to generate a ciphertext, generates a digital signature for the ciphertext and sends the ciphertext and the digital signature as reported data to a corresponding fog node for data aggregation; wherein each fog node is assigned to a predefined user area involving a plurality of smart meters;S3. Fog-level Aggregation: After receiving all reported data from the smart meters in the predefined user area in a prespecified period, each fog node firstly verifies all the digital signatures of received reported data to determine whether the digital signatures are valid; i the digital signatures are valid, the fog node aggregates all the ciphertexts of the received reported data to generate fog-level aggregate ciphertext and signs an aggregate value of the fog-level aggregate ciphertext to generate a fog-level signature; then the fog node sends the fog-level aggregate ciphertext and the fog-level signature as fog-level aggregate data of the predefined user area to the cloud server for long-time storage;S4. Data Analysis Request and Response: The control center sends a challenge message which includes a user area list for data analysis and a random chosen coefficient sequence to the cloud server; the cloud server gets fog-level aggregate data corresponding to the user areas listed in the user area list from a database of the cloud server according to the user area list; then the cloud server generates a cloud-level aggregate ciphertext, signs an aggregate value of the cloud-level aggregate ciphertext to generate verifiable response information using the fog-level signatures and the random chosen coefficient sequence; and then sends the cloud-level aggregate ciphertext and the verifiable response information to the control center;S5. Verification and Decryption: The control center verifies the verifiable response information returned by the cloud server to determine whether the cloud-level aggregate ciphertext is complete; if the cloud-level aggregate ciphertext is complete, the control center decrypts the aggregate ciphertext and further computes arithmetic mean and variance of all users' electricity consumption data within the specified user area list.
  • 2. The method according to claim 1, wherein the security parameters comprise security parameters of a key-leakage resilient homomorphic encryption algorithm and security parameters of a linear homomorphic digital signature algorithm.
  • 3. The method according to claim 1, wherein each smart meter combines a random blinding technique with a key-leakage resilient homomorphic algorithm to encrypt users' electricity consumption data in step S2 and uses a privacy-preserving decryption algorithm to decrypt the response data in step S5.
  • 4. The method according to claim 1, wherein each fog node uses a batch verification method to check data integrity of the received data in step S3.
  • 5. The method according to claim 1, wherein the step S1 includes: S11. Given a security parameter k, the trust center generates parameters of a key-leakage resilient homomorphic encryption algorithm (n, g, G, GT, e), where e:G×G→GT is an admissible bilinear pairing map, G and GT are both cyclic groups with composite order n, and n=p1p2, p1 and p2 are both big prime numbers with k-bit length, g is a generator of tag group G; The trust center computes a public key of the control center as ξ=gp2;S12. The trust center determines an elliptic curve E over the finite field Fp and another bilinear pairing map G1×G1→G2 based on E, where p is a big prime number, G1 is an additive cyclic group with order q, G2 is a multiplicative cyclic group with order q; The trust center selects a generator P of the group G1, and sets the number of fog nodes to be N and the number of smart meters in each user area to be 1; The trust center sets two secure collision-resistant hash functions: H1:{0,1}*→G1, h1:{0,1}*→Zq*, where{0,1}* denotes the set of binary strings with arbitrary length, Zq* is the multiplicative cyclic group which is composed of residue systems relatively prime to q;S13. The trust center randomly chooses five constants: α, β, γ, δ, ζ satisfying α·β+γ·δ+ζ=n, where α∈Zn, β∈Zn, γ∈Zn, δ∈Zn, ζ∈Zn, computes public parameters f=gα and ε=gγ; Besides, the trust center selects a private key yi∈Zq for digital signature algorithm for each fog node FNi and computes a corresponding public key Yi=yiP for signature verification;S14. For each smart meter SMij with a unique identifier IDSMij, the trust center randomly selects a private key yij∈Zq for digital signature, where Zq is a ring of residue classes modulo q, SMij is the j-th smart meter in the user area corresponding to the i-th fog node FNi; The trust center computes the public key Yij=yijP for signature verification for SMij, and selects two random numbers πij and sij for each SMij, where πij∈Zn, sij∈Zn, α·πij+γ·sij=ζ, Σj=11πij≤β, Σj=11sij≤δ, and then computes two parameters πi=β−Σj=1lπij and si=δ−Σj=1lsij for each fog node FNi;S15. The trust center sends the private key p1 to the control center, sends private key yij, secret parameters πij and sij to corresponding smart meter SMij, and sends private key yi, secret parameters πi and si to corresponding fog node FNi via the secure channel, respectively.
  • 6. The method according to claim 5, wherein the step S2 includes: S21. each smart meter SMij with a unique identifier IDSMij randomly selects ciphertext as SCTi=Πj=11e(cijCi, cijCi);S34. The fog node FNi computes a fog-level digital signature as σi=(yi+h1(CTi∥SCTi))H1(IDCS), where IDCS is a unique identifier of the cloud server; andS35. The fog node FNi sends all the aggregate data {CTi, SCTi, σi} to the cloud server for long-time storage.
  • 7. The method according to claim 6, wherein the step S3 includes: S31. After receiving data {IDSMij, cij, σij, tij} from all smart meters SMij, j=1, 2, K, 1 of the user area in the prespecified period, the fog node FNi verifies all the signatures σij sent by all smart meters SMij using the following verification equation:
  • 8. The method according to claim 7, wherein the step S4 includes: S41. The control center generates a challenge message {L, chal}, and sends it to the cloud server, where L is a list of user areas, L={ϑ1, ϑ2, K, ϑθ}⊆{1, 2, K, N}, chal={ηϑ1, ηϑ2, K, ηϑθ-2, λ, μ} is a sequence of random matching coefficients of length θ;S42. The cloud server generates cloud-level aggregate ciphertexts, which include the first aggregate ciphertext CT=Πϑ∈LCTϑ, the second aggregate ciphertext PCT=Πϑ∈Le(CTϑ, CTϑ) and the third aggregate ciphertext SCT=Πϑ∈LSCTϑ;S43. The cloud server uses random coefficients λ and μ, and the cloud-level aggregate ciphertext to generate two random values ηϑθ-1=h1(CT∥λ) and ηϑθ=h1(PCT∥SCT∥μ); and gets the signatures {σϑ1, σϑ2, K, σϑθ} of fog-level aggregate ciphertexts from database according to list L and computes an aggregate signature σ=Σϑ∈L(nϑH1(IDCS)+σϑ);S44. The cloud server computes a combined hash value as h=Σϑ∈Lh1(CTϑ∥SCTϑ) a number rij∈Zn and generates a ciphertext as cij=fπijεsijgmijξrij∈G, where mij∈[0, MAX] is the electricity consumption data of user, MAX is a prespecified upper bound of all users' electricity consumption data, MAX is less than p2;S22. The Smart meter SMij acquires current timestamp tij, and uses the private key yij to compute a digital signature as σij=yijH(IDSMij∥cij∥tij); andS23. The smart meter SMij sends {IDSMij, cij, σij, tij} to the corresponding fog node FNi.
  • 9. The method according to claim 8, wherein the step S5 includes: S51. The control center uses random coefficients λ and μ, and the cloud-level aggregate ciphertext to generate ηϑθ-1=h1(CT∥λ) and ηϑθ=h1(PCT∥SCT∥μ), and computes the sum of random matching coefficients as η=Σϑ∈Lηϑ, then verifies the signatures by the following verification equation: (σ,P)=(h+η)H1(IDCS),P)·(H1(IDCS),Y);S52. If the verification equation in step S51 passes, the control center uses key-leakage resilient decryption algorithm to compute the discrete logarithm of CTp1 of base ĝ=gp1, and divides the result by 1+1 to get the sum M of all users' electricity consumption data in the user areas specified in the user area list, namely M=logĝCTp1/(1+1);S53. The control center uses private key p1 to compute discrete logarithms logêSCTp1 and logêPCTp1 respectively, where ê=e(g, g)p1, is a bilinear map value, and computes the sum of squares of all users' electricity consumption data in the user areas specified in the user area list, namely M2=Σϑ∈LΣj=1lmϑj2=logêSCTp1−(1+2)·(logêPCTp1/(1+1)2);S54. The control center computes the arithmetic mean of all users' data as
Priority Claims (1)
Number Date Country Kind
202010399781.1 May 2020 CN national
PCT Information
Filing Document Filing Date Country Kind
PCT/CN2020/101889 7/14/2020 WO
Publishing Document Publishing Date Country Kind
WO2021/227241 11/18/2021 WO A
US Referenced Citations (6)
Number Name Date Kind
20120310860 Kim Dec 2012 A1
20130124850 Gomez Marmol May 2013 A1
20140310524 Yamanaka Oct 2014 A1
20170019248 Mustafa Jan 2017 A1
20180060976 Chu Mar 2018 A1
20200074096 Rao Mar 2020 A1
Non-Patent Literature Citations (5)
Entry
N. Saputro and K. Akkaya, “Performance evaluation of Smart Grid data aggregation via homomorphic encryption,” 2012 IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, 2012, pp. 2945-2950. (Year: 2012).
Wang, Y., Luo, F., Dong, Z., Tong, Z. and Qiao, Y. (2019), Distributed meter data aggregation framework based on Blockchain and homomorphic encryption. IET Cyber-Physical Systems: Theory & Applications, 4: 30-37. (Year: 2019).
F. Li, B. Luo and P. Liu, “Secure Information Aggregation for Smart Grids Using Homomorphic Encryption,” 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 2010, pp. 327-332 (Year: 2010).
Y. Chen, J. -F. Martínez-Ortega, P. Castillejo and L. López, “A Homomorphic-Based Multiple Data Aggregation Scheme for Smart Grid,” in IEEE Sensors Journal, vol. 19, No. 10, pp. 3921-3929, 15 May 15, 2019 (Year: 2019).
L. Zhu et al., “Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid,” in IEEE Communications Magazine, vol. 57, No. 6, pp. 80-85, Jun. 2019 (Year: 2019).
Related Publications (1)
Number Date Country
20220329438 A1 Oct 2022 US