| Literature DB >> 35746148 |
Feng Zhai1,2, Ting Yang1, Bing Zhao2, Hao Chen2.
Abstract
With the development of the Internet of Things, smart grids have become indispensable in our daily life and can provide people with reliable electricity generation, transmission, distribution and control. Therefore, how to design a privacy-preserving data aggregation protocol has been a research hot-spot in smart grid technology. However, these proposed protocols often contain some complex cryptographic operations, which are not suitable for resource-constrained smart meter devices. In this paper, we combine data aggregation and the outsourcing of computations to design two privacy-preserving outsourcing algorithms for the modular exponentiation operations involved in the multi-dimensional data aggregation, which can allow these smart meter devices to delegate complex computation tasks to nearby servers for computing. By utilizing our proposed outsourcing algorithms, the computational overhead of resource-constrained smart meter devices can be greatly reduced in the process of data encryption and aggregation. In addition, the proposed algorithms can protect the input's privacy of smart meter devices and ensure that the smart meter devices can verify the correctness of results from the server with a very small computational cost. From three aspects, including security, verifiability and efficiency, we give a detailed analysis about our proposed algorithms. Finally, through carrying out some experiments, we prove that our algorithms can improve the efficiency of performing the data encryption and aggregation on the smart meter device side.Entities:
Keywords: data aggregation; modular exponentiation; outsourcing computation; privacy preserving; smart grid
Mesh:
Year: 2022 PMID: 35746148 PMCID: PMC9229731 DOI: 10.3390/s22124365
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Comparison of algorithms.
| Algorithm | Data Type | Technique | Trusted Authority | Lightweight |
|---|---|---|---|---|
| Li [ | One-dimensional | Paillier | Yes | No |
| Lu [ | Multi-dimensional | Paillier | Yes | No |
| Boudia [ | Multi-dimensional | Elliptic curve | Yes | No |
| Our | Multi-dimensional | Paillier | No | Yes |
Figure 1System model.
Comparison of algorithms.
| Wang [ | Ye [ | Kiraz [ | Algorithm 2 | |
|---|---|---|---|---|
|
|
|
|
|
|
|
| 4 | 6 | 1 | 2 |
|
| 6 | 6 | 5 | 6 |
| Verifiability |
|
|
|
|
| Modular Privacy | No | No | No | Yes |
Communication overhead and storage space overhead.
| Communication Overhead | Offline | Online | Storage Space Overhead | |
|---|---|---|---|---|
| Algorithm 1 |
|
|
|
|
| Algorithm 2 |
|
|
|
|
Some simulation parameters.
| Bit Length |
|
|
|
|
|---|---|---|---|---|
| 256 | 597974957066362 | 7783106559391062 | 1086409120439892 | 8269790490761102 |
| 512 | 754387404285988 | 750582098634835 | 861478175873681 | 783792629876206 |
Figure 2Evaluation results for Algorithm 1. (a) The time cost of Algorithm 1 without outsourcing on the SM side; (b) The time cost comparison among phases in Algorithm 1.
Figure 3Evaluation results for Algorithm 2. (a) The time cost of Algorithm 2 without outsourcing on the SM side; (b) The time cost comparison among phases in Algorithm 2.
Figure 4The ratio between the time cost of our proposed algorithms and direct computation.