privacy-enhanced data aggregation scheme against internal attackers in smart grid
DESCRIPTION
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid. Haiyong Bao Nanyang Technological University [email protected] June 6, 2014. Overview. Introduction Preliminaries Scheme Security proofs Conclusion & Discussion. Reference. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/1.jpg)
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
Haiyong BaoNanyang Technological University
[email protected] 6, 2014
![Page 2: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/2.jpg)
Overview
Introduction Preliminaries Scheme Security proofs Conclusion & Discussion
![Page 3: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/3.jpg)
Reference C.I. Fan, S.Y. Huang, and Y.L. Lai, Privacy-enhanced
data aggregation scheme against internal attackers in smart grid, IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 666-675, 2014.
D. Boneh, B. Lynn, and H. Shacham, “Short signatures from The Weil pairing,” in Proc. Advances in Cryptol. –ASIACRYPT 2001, Berlin, Germany, 2001, pp. 514–532.
J. Camenisch, S. Hohenberger, and M. Pedersen, “Batch verification of short signatures,” in Proc. Advances in Cryptol. – EUROCRYPT 2007, Berlin, 2007, pp. 246–263.
![Page 4: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/4.jpg)
Smart grid power-system architecture
![Page 5: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/5.jpg)
Aims of this scheme
Against external attackers (message authentication, communication system security, and data aggregation)
How to prevent internal attackers (e.g., electricity suppliers)
The first one against internal attackers
Besides, the first one providing a secure batch verification procedure for efficient verification
Blinding factors
![Page 6: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/6.jpg)
Preliminaries Bilinear Pairing Setting
![Page 7: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/7.jpg)
The Subgroup Decision Problem
![Page 8: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/8.jpg)
Gap Diffie–Hellman Problem
![Page 9: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/9.jpg)
Security Definitions
Semantic Security Unforgeability Batch Verification Security
![Page 10: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/10.jpg)
Scheme System model
![Page 11: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/11.jpg)
Construction
![Page 12: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/12.jpg)
Initialization Phase
![Page 13: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/13.jpg)
Initialization Phase
![Page 14: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/14.jpg)
Registration Phase
![Page 15: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/15.jpg)
Aggregation Phase
![Page 16: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/16.jpg)
![Page 17: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/17.jpg)
Security proofs
Against External Attackers
![Page 18: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/18.jpg)
Security proofs Against Internal Attackers
![Page 19: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/19.jpg)
Proof of unforgeability
Sequences of games
![Page 20: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/20.jpg)
Proof of batch verification security
![Page 21: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/21.jpg)
![Page 22: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid](https://reader030.vdocument.in/reader030/viewer/2022032709/5681322c550346895d988adc/html5/thumbnails/22.jpg)
Conclusion & Discussion
User authentication phase of this scheme, possible attacks?
Should the validity of the partial signature be checked? (efficiency, traceable)
Security of batch verification? How to satisfy the security property of message
integrity using digital signature or other crypt methods?