Skip to main content
Top
Published in: Wireless Networks 3/2015

01-04-2015

A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid

Authors: Majid Bayat, Hamid Reza Arkian, Mohammad Reza Aref

Published in: Wireless Networks | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Modern power systems have been faced with a rising appeal for the upgrade to a highly intelligent generation of electricity networks known as the smart grid. Thus, security for the smart grid has emerged as an important issue. Recently, Hur proposed an attribute based data sharing for smart grid which unfortunately is vulnerable to the denial of service (DoS) attack. Moreover, it does not support the user revocation property and the grid system manager cannot prevent the revoked user of having access to the shared data in the storage center. For these weaknesses, we suggest an efficient revocable data sharing scheme which is immune against DoS attack. In addition, we present the security analyses and comparisons indicating the efficiency and security of the proposed scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference (2007). A systems view of the modern grid. In U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL). (2007). A systems view of the modern grid. In U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL).
3.
go back to reference (2010). Smart grid cyber security strat egy and requirements. In DRAFT NI-STIR 7628. (2010). Smart grid cyber security strat egy and requirements. In DRAFT NI-STIR 7628.
8.
go back to reference Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In C. S. Laih (Ed.), Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Springer Berlin Heidelberg. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In C. S. Laih (Ed.), Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Springer Berlin Heidelberg.
9.
go back to reference Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp. 321–334. Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007. SP’07. IEEE, pp. 321–334.
10.
go back to reference Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). Pbes: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th international symposium on information, computer, and communications security, ACM, pp. 262–275. Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). Pbes: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th international symposium on information, computer, and communications security, ACM, pp. 262–275.
11.
go back to reference Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in CryptologyCRYPTO 2001. Springer, pp. 213–229. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in CryptologyCRYPTO 2001. Springer, pp. 213–229.
12.
go back to reference Doshi, N., & Jinwala, D. C. (2013). Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Security and Communication Networks. Doshi, N., & Jinwala, D. C. (2013). Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Security and Communication Networks.
13.
go back to reference Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.CrossRef Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.CrossRef
14.
go back to reference Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp 89–98. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp 89–98.
15.
go back to reference Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, & I. Walukiewicz (Eds.), Automata, languages and programming (pp. 579–591). Springer Berlin Heidelberg. Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, & I. Walukiewicz (Eds.), Automata, languages and programming (pp. 579–591). Springer Berlin Heidelberg.
16.
go back to reference Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.CrossRef Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.CrossRef
17.
go back to reference Hur, J., & Noh, D. K. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1214–1221.CrossRef Hur, J., & Noh, D. K. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1214–1221.CrossRef
18.
go back to reference Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In H. Y. Youm & M. Yung (Eds.), Information security applications (pp 309–323). Springer Berlin Heidelberg. Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In H. Y. Youm & M. Yung (Eds.), Information security applications (pp 309–323). Springer Berlin Heidelberg.
19.
go back to reference Kapadia, A., Tsang, P. P., & Smith, S. W. (2007). Attribute-based publishing with hidden credentials and hidden policies. NDSS, 7, 179–192. Kapadia, A., Tsang, P. P., & Smith, S. W. (2007). Attribute-based publishing with hidden credentials and hidden policies. NDSS, 7, 179–192.
20.
go back to reference Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design principles for power grid cyber-infrastructure authentication protocols. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–10. Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design principles for power grid cyber-infrastructure authentication protocols. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–10.
21.
go back to reference Kim, Y. J., Thottan, M., Kolesnikov, V., & Lee, W. (2010). A secure decentralized data-centric information infrastructure for smart grid. IEEE Communications Magazine, 48(11), 58–65.CrossRef Kim, Y. J., Thottan, M., Kolesnikov, V., & Lee, W. (2010). A secure decentralized data-centric information infrastructure for smart grid. IEEE Communications Magazine, 48(11), 58–65.CrossRef
22.
go back to reference Li, D., Aung, Z., Williams, J., & Sanchez, A. (2014a). P2dr: Privacy-preserving demand response system in smart grids. In Computing, Networking and Communications (ICNC), 2014 International conference on, IEEE, pp 41–47. Li, D., Aung, Z., Williams, J., & Sanchez, A. (2014a). P2dr: Privacy-preserving demand response system in smart grids. In Computing, Networking and Communications (ICNC), 2014 International conference on, IEEE, pp 41–47.
23.
go back to reference Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2014b). No peeking: Privacy-preserving demand response system in smart grids. International Journal of Parallel, Emergent and Distributed Systems, 29(3), 290–315.CrossRef Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2014b). No peeking: Privacy-preserving demand response system in smart grids. International Journal of Parallel, Emergent and Distributed Systems, 29(3), 290–315.CrossRef
24.
go back to reference Li, F., Luo, B., & Liu, P. (2010). Secure information aggregation for smart grids using homomorphic encryption. In Smart Grid Communications (SmartGridComm), 2010 First IEEE international conference on, IEEE, pp. 327–332. Li, F., Luo, B., & Liu, P. (2010). Secure information aggregation for smart grids using homomorphic encryption. In Smart Grid Communications (SmartGridComm), 2010 First IEEE international conference on, IEEE, pp. 327–332.
25.
go back to reference Maurer, U. (2009). Unifying zero-knowledge proofs of knowledge. In B. Preneel (Ed.), Progress in cryptology-AFRICACRYPT 2009 (pp. 272–286). Springer Berlin Heidelberg. Maurer, U. (2009). Unifying zero-knowledge proofs of knowledge. In B. Preneel (Ed.), Progress in cryptology-AFRICACRYPT 2009 (pp. 272–286). Springer Berlin Heidelberg.
26.
go back to reference Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In S. M. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (pp. 111–129). Springer Berlin Heidelberg. Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In S. M. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (pp. 111–129). Springer Berlin Heidelberg.
27.
go back to reference Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309–329.CrossRef Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309–329.CrossRef
28.
go back to reference Rao, Y.S., & Dutta, R. (2014). Dynamic ciphertext-policy attribute-based encryption for expressive access policy. In R. Natarajan (Ed.), Distributed computing and internet technology (pp. 275–286). Springer Berlin Heidelberg. Rao, Y.S., & Dutta, R. (2014). Dynamic ciphertext-policy attribute-based encryption for expressive access policy. In R. Natarajan (Ed.), Distributed computing and internet technology (pp. 275–286). Springer Berlin Heidelberg.
29.
go back to reference Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604–3629.CrossRef Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604–3629.CrossRef
30.
go back to reference Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In D. Catalano, N. Fazio, R. Gennaro, & A. Nicolosi (Eds.), Public Key Cryptography-PKC 2011 (pp. 53–70). Springer Berlin Heidelberg. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In D. Catalano, N. Fazio, R. Gennaro, & A. Nicolosi (Eds.), Public Key Cryptography-PKC 2011 (pp. 53–70). Springer Berlin Heidelberg.
31.
go back to reference Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on, IEEE, pp. 39–44. Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on, IEEE, pp. 39–44.
32.
go back to reference Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp. 261–270. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp. 261–270.
Metadata
Title
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid
Authors
Majid Bayat
Hamid Reza Arkian
Mohammad Reza Aref
Publication date
01-04-2015
Publisher
Springer US
Published in
Wireless Networks / Issue 3/2015
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-014-0824-9

Other articles of this Issue 3/2015

Wireless Networks 3/2015 Go to the issue