Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2017

19-09-2015

A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance

Authors: Haiyong Bao, Rongxing Lu

Published in: Peer-to-Peer Networking and Applications | Issue 1/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To design an efficient and secure data aggregation scheme fitting real applications has been pursued by research communities for a long time. In this paper, we propose a novel secure data aggregation scheme to simultaneously achieve privacy preservation and data integrity with differential privacy and fault tolerance. Specifically, by introducing some auxiliary ciphertext subtly, a novel distributed solution for fault tolerant data aggregation is put forward to be able to aggregate the functioning smart meter measurements flexibly and efficiently for any rational number of malfunctioning smart meters with discretional long failure period. The proposed scheme also achieves a good tradeoff of accuracy and security of differential privacy for arbitrary number of malfunctioning smart meters. In the proposed scheme, a novel efficient authentication mechanism is also proposed to generate and share session keys in a noninteractive way, which is leveraged for AES encryption to achieve source authentication and data integrity of the transmitted data. Furthermore, through decentralizing the computational overhead and the authority of the hub-like entity of the gateway, the security of our proposed scheme is enhanced and the efficiency is improved significantly. Finally, extensive performance evaluations are conducted to illustrate that the proposed data aggregation scheme outperforms the state-of-the-art similar schemes in terms of computation complexity, communication cost, robustness of fault tolerance, and utility of differential privacy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bao H, Lu R (2015) Ddpft: Secure data aggregation scheme with differential privacy and fault tolerance. In: Proceedings ICC 2015. IEEE Bao H, Lu R (2015) Ddpft: Secure data aggregation scheme with differential privacy and fault tolerance. In: Proceedings ICC 2015. IEEE
2.
go back to reference Lu R, Liang X, Li X, Lin X, Shen X (2012) Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef Lu R, Liang X, Li X, Lin X, Shen X (2012) Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef
3.
go back to reference Chen L, Lu R, Cao Z (2014) Pdaft: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications, Peer-to-Peer Networking and Applications, pp. 1–11 Chen L, Lu R, Cao Z (2014) Pdaft: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications, Peer-to-Peer Networking and Applications, pp. 1–11
4.
go back to reference Shi E, Chan T-HH, Rieffel EG, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. NDSS 2(3):4 Shi E, Chan T-HH, Rieffel EG, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. NDSS 2(3):4
5.
go back to reference Won J, Ma CY, Yau D K, Rao N S (2014) Proactive fault-tolerant aggregation protocol for privacy-assured smart metering. In: INFOCOM 2014. IEEE, pp 2804–2812 Won J, Ma CY, Yau D K, Rao N S (2014) Proactive fault-tolerant aggregation protocol for privacy-assured smart metering. In: INFOCOM 2014. IEEE, pp 2804–2812
6.
go back to reference Erkin Z, Tsudik G (2012) Private computation of spatial and temporal power consumption with smart meters. Springer, pp 561–577 Erkin Z, Tsudik G (2012) Private computation of spatial and temporal power consumption with smart meters. Springer, pp 561–577
7.
go back to reference Garcia FD, Jacobs B (2011) Privacy-friendly energy-metering via homomorphic encryption. In: Security and Trust Management. Springer, pp 226–238 Garcia FD, Jacobs B (2011) Privacy-friendly energy-metering via homomorphic encryption. In: Security and Trust Management. Springer, pp 226–238
8.
go back to reference Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD international conference on management of data. ACM, pp 735–746 Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD international conference on management of data. ACM, pp 735–746
9.
go back to reference Acs G, Castelluccia C (2011) I have a dream!(differentially private smart metering). In: Information Hiding. Springer, pp 118–132 Acs G, Castelluccia C (2011) I have a dream!(differentially private smart metering). In: Information Hiding. Springer, pp 118–132
10.
go back to reference Chen L, Lu R, Cao Z, AlHarbi K, Lin X (2014) Muda: Multifunctional data aggregation in privacy-preserving smart grid communications, Peer-to-Peer Networking and Applications:1–16 Chen L, Lu R, Cao Z, AlHarbi K, Lin X (2014) Muda: Multifunctional data aggregation in privacy-preserving smart grid communications, Peer-to-Peer Networking and Applications:1–16
11.
go back to reference Fan C-I, Huang S-Y, Lai Y-L (2014) Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans Industrial Informatics 10(1):666–675CrossRef Fan C-I, Huang S-Y, Lai Y-L (2014) Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans Industrial Informatics 10(1):666–675CrossRef
12.
go back to reference Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology EUROCRYPT99. Springer, pp 223–238 Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology EUROCRYPT99. Springer, pp 223–238
13.
go back to reference Dwork C (2006) Differential privacy. In: Automata, languages and programming. Springer, pp 1–12 Dwork C (2006) Differential privacy. In: Automata, languages and programming. Springer, pp 1–12
14.
go back to reference Dwork C (2008) Differential privacy: A survey of results. In: Theory and Applications of Models of Computation. Springer, pp 1–19 Dwork C (2008) Differential privacy: A survey of results. In: Theory and Applications of Models of Computation. Springer, pp 1–19
15.
16.
go back to reference Perrig A (2001) The biba one-time signature and broadcast authentication protocol. In: Proceedings of the 8th ACM conference on Computer and Communications Security. ACM, pp 28–37 Perrig A (2001) The biba one-time signature and broadcast authentication protocol. In: Proceedings of the 8th ACM conference on Computer and Communications Security. ACM, pp 28–37
17.
go back to reference Neumann WD (2004) Horse: an extension of an r-time signature scheme with fast signing and verification. In: International conference on information technology: Coding and Computing (ITCC 2004), vol 1. IEEE, pp 129–134 Neumann WD (2004) Horse: an extension of an r-time signature scheme with fast signing and verification. In: International conference on information technology: Coding and Computing (ITCC 2004), vol 1. IEEE, pp 129–134
18.
go back to reference Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1): 36–63CrossRef Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1): 36–63CrossRef
19.
go back to reference Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675– 685CrossRef Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675– 685CrossRef
20.
go back to reference Alharbi K, Lin X (2012) Lpda: a lightweight privacy-preserving data aggregation scheme for smart grid. In: 2012 International conference on wireless communications and signal processing (WCSP). IEEE, pp 1–6 Alharbi K, Lin X (2012) Lpda: a lightweight privacy-preserving data aggregation scheme for smart grid. In: 2012 International conference on wireless communications and signal processing (WCSP). IEEE, pp 1–6
21.
go back to reference Knox DA, Kunz T (2008) Rf fingerprints for secure authentication in single-hop wsn. In: IEEE international conference on wireless and mobile computing, networking and communications, 2008. WIMOB’08. IEEE, pp 567–573 Knox DA, Kunz T (2008) Rf fingerprints for secure authentication in single-hop wsn. In: IEEE international conference on wireless and mobile computing, networking and communications, 2008. WIMOB’08. IEEE, pp 567–573
22.
go back to reference Kgwadi M, Kunz T (2011) Securing rds broadcast messages for smart grid applications. Int J Autonomous and Adaptive Commun Syst 4(4):412–426CrossRef Kgwadi M, Kunz T (2011) Securing rds broadcast messages for smart grid applications. Int J Autonomous and Adaptive Commun Syst 4(4):412–426CrossRef
23.
go back to reference Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media
24.
go back to reference Menezes A J, Van Oorschot PC, Vanstone S A (2010) Handbook of applied cryptography. CRC press Menezes A J, Van Oorschot PC, Vanstone S A (2010) Handbook of applied cryptography. CRC press
25.
go back to reference Scott M (2003) Miracl–multiprecision integer and rational arithmetic c/c ++ library, Shamus Software Ltd, Dublin, Ireland Scott M (2003) Miracl–multiprecision integer and rational arithmetic c/c ++ library, Shamus Software Ltd, Dublin, Ireland
26.
go back to reference Failla P (2010) Privacy-preserving processing of biometric templates by homomorphic encryption, Ph.D. dissertation, Ph. D. dissertation, PhD School in Information Engineering, University of Siena, Italy Failla P (2010) Privacy-preserving processing of biometric templates by homomorphic encryption, Ph.D. dissertation, Ph. D. dissertation, PhD School in Information Engineering, University of Siena, Italy
29.
go back to reference Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE international conference on Smart Grid Communications (SmartGridComm). IEEE, pp 327–332 Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE international conference on Smart Grid Communications (SmartGridComm). IEEE, pp 327–332
30.
go back to reference Li F, Luo B (2012) Preserving data integrity for smart grid data aggregation. In: 2012 IEEE Third international conference on Smart Grid Communications (SmartGridComm). IEEE, pp 366–371 Li F, Luo B (2012) Preserving data integrity for smart grid data aggregation. In: 2012 IEEE Third international conference on Smart Grid Communications (SmartGridComm). IEEE, pp 366–371
Metadata
Title
A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance
Authors
Haiyong Bao
Rongxing Lu
Publication date
19-09-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2017
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0410-7

Other articles of this Issue 1/2017

Peer-to-Peer Networking and Applications 1/2017 Go to the issue

Premium Partner