Next Article in Journal
Drone Detection and Defense Systems: Survey and a Software-Defined Radio-Based Solution
Next Article in Special Issue
High Precision Sea Surface Temperature Prediction of Long Period and Large Area in the Indian Ocean Based on the Temporal Convolutional Network and Internet of Things
Previous Article in Journal
Keypoint-Aware Single-Stage 3D Object Detector for Autonomous Driving
Previous Article in Special Issue
Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data

1
School of Information Sciences and Technology, North China University of Technology, Beijing 100043, China
2
Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(4), 1452; https://doi.org/10.3390/s22041452
Submission received: 11 January 2022 / Revised: 2 February 2022 / Accepted: 10 February 2022 / Published: 14 February 2022

Abstract

:
Abnormal electricity data, caused by electricity theft or meter failure, leads to the inaccuracy of aggregation results. These inaccurate results not only harm the interests of users but also affect the decision-making of the power system. However, the existing data aggregation schemes do not consider the impact of abnormal data. How to filter out abnormal data is a challenge. To solve this problem, in this study, we propose a lightweight and privacy-friendly data aggregation scheme against abnormal data, in which the valid data can correctly be aggregated but abnormal data will be filtered out during the aggregation process. This is more suitable for resource-limited smart meters, due to the adoption of lightweight matrix encryption. The automatic filtering of abnormal data without additional processes and the detection of abnormal data sources are where our protocol outperforms other schemes. Finally, a detailed security analysis shows that the proposed scheme can protect the privacy of users’ data. In addition, the results of extensive simulations demonstrate that the additional computation cost to filter the abnormal data is within the acceptable range, which shows that our proposed scheme is still very effective.

1. Introduction

With the application of electricity in our daily life becoming increasingly extensive, more factors need to be considered in the production decisions of the cloud server [1,2], such as how to maintain a balance between supply and demand when electricity usage changes dramatically [3]. Thus, it is critical to obtain the electricity usage data of all users. In addition the smart grid, as a key infrastructure, adds upstream information feedback based on the traditional grid, which can help us collect the electricity usage data of users in various regions [4,5]. The prominent advantage of smart meters is to make sure that electricity supply matches the demand of users within a short period, which is of great significance for the rational distribution of power resources and the reduction of economic losses [6,7]. To obtain the real-time electricity demand of users, their electricity usage data should be measured, aggregated, and analyzed through advanced metering infrastructure [8,9].
However, it is a noteworthy problem of the smart grid that the abnormal electricity data, caused by electricity theft or meter failure, can lead to inaccurate aggregation results. This not only harms the personal interests of users, but also interferes with the production decisions of the cloud center. To the best of our knowledge, none of the existing schemes consider the impact of abnormal data. In the extant schemes, the aggregation center is responsible for aggregating all the reported electricity usage data of smart meters but cannot detect whether the reported data is abnormal, let alone find the source of the abnormal data.
Therefore, it is an important challenge to filter out the abnormal data and find the source of the abnormal data when the data is encrypted. To address this issue, we propose a lightweight and privacy-friendly data aggregation scheme against abnormal data, in which the valid data is correctly aggregated, but the abnormal data is automatically filtered out during the aggregation process. Notably, the filtration of the abnormal data does not need additional procedures, which is the highlight of this work. Besides, compared with other methods in other schemes, the encryption method used in our scheme is more suitable for smart meters with limited computing capacity. Specifically, the main contributions of this paper are summarized as follows:
  • We propose a lightweight and privacy-friendly data aggregation scheme against abnormal data by using lightweight matrix encryption. It is suitable for smart meters with limited computing power, since no time-consuming computation operators are involved.
  • Abnormal data can automatically be filtered out without additional procedures. In addition, the source of the abnormal data can also be found out in this process. Thereby, accurate aggregation results can be obtained through the proposed scheme, and abnormal meters can also be identified for maintenance, even if the data is encrypted.
  • Finally, a detailed security analysis is provided to prove that our scheme can fully ensure the privacy and security of users’ data. Experiments and performance evaluations demonstrate that our scheme has a low computation cost and high practicality.
The rest of the paper is outlined as follows. In Section 2, some related works are provided. The preliminary is provided in Section 3. Section 4 illustrates the system model and adversary model. We propose the details of our scheme in Section 5, followed by the security analysis of our scheme in Section 6. A performance analysis is conducted in Section 7. Finally, the conclusion of our scheme is summarized in Section 8.

2. Related Work

There exist extensive data aggregation schemes on the topic of protecting users’ privacy in smart grids [10,11,12,13,14,15,16,17,18,19,20,21,22,23]. Homomorphic encryption has been applied in several works to achieve privacy-preserving data aggregation [10,11,12,13,14,15,16,17,18,19]. Shen et al. [10] proposed a Paillier-based data aggregation scheme against malicious data mining attacks, which can prevent the adversary from inferring a target user’s electricity usage data and obtain accurate aggregated results of electricity usage data. Xue et al. [11] proposed a privacy-preserving service-outsourcing scheme for a real-time pricing demand response in a smart grid, which solves the privacy issues by modifying the Paillier cryptosystem to hold two different decryption keys and achieves the flexible enrollment and revocation of smart meters. In addition, Saleem et al. [12] proposed a scheme to resist the malfunctioning of smart meters for data aggregation based on a modified Paillier cryptosystem. Their system can resist false data injection attacks by filtering out the inserted values from external attackers. For achieving secure data aggregation, the ElGamal-based algorithm has been taken into account [13,14]. Liu et al. [14] proposed a lifted elliptic ElGamal-based privacy-preserving data aggregation scheme, in which the trusted third party is removed and the users, with some measure of trust, construct a virtual aggregation area to mask the single user’s data against the denial of service attack. In order to resist quantum attacks and improve the efficiency of the algorithm, the lattice-based homomorphic approach has been applied to achieve secure data aggregation for smart grids [15,16]. Abdallah et al. [16] proposed a lattice-based privacy-preserving data aggregation scheme for a smart grid, which can further reduce the computation burden for smart appliances, because it depends on simple arithmetic operations. In [17], a privacy-friendly data aggregation scheme is proposed by Vahedi et al. They use elliptic curve digital signature algorithms (ECDSA) in smart grids to protect users’ privacy from the grid operators. Besides, to meet the higher data analysis requirements of the cloud server, multidimensional data is aggregated in some schemes [18,19,20]. Although the schemes based on homomorphic encryption can obtain accurate aggregation results, a heavy computational and communication burden will also be imposed on smart meters with limited computing power.
As another major encryption technology, masking-value-based schemes also have been proposed to achieve secure and efficient data aggregation in smart grids. As for masking-based data aggregation schemes [21,22,23,24], Gope et al. [21] first proposed a lightweight and privacy-friendly masking-based spatial data aggregation scheme for secure forecasting of power demands in smart grids. Their scheme only uses lightweight cryptographic primitives, such as exclusive OR operations and hash functions, thus it has a significantly lower computational cost as compared with other approaches. The LCEDA scheme proposed by Su et al. [22] achieves an efficient update of masking the value share to ensure forward security of individual data, dynamic enrollment, and revocation of smart meters. Moreover, Huang et al. [23] propose a lightweight and fault-tolerable data aggregation scheme that can determine the smart meters which fail to upload data on time with the idea of flag bit, and correct aggregation results can be obtained even if the data is not reported by the smart meters. However, the existing masking-based aggregation schemes cannot screen abnormal electricity consumption data either.
In addition, accurate aggregation results can be obtained by utilizing zero-knowledge proof [24], but heavy communication and the computational burden will also be imposed on the smart meters with limited computing power. Thus, the solution using zero-knowledge proof is not practical.
Therefore, we propose a lightweight and privacy-friendly data aggregation scheme against abnormal data by using matrix encryption, which can effectively filter abnormal data and find out the source of abnormal data. To more intuitively show the advantages of the proposed scheme compared with other schemes, the security feature comparisons are shown in Table 1.

3. Preliminaries

In this section, the preliminaries of the proposed scheme are presented, in which we describe the basic idea of filtering abnormal data.
Filtering abnormal data: Suppose that a is the data to be determined and b is the upper limit of the normal value, and they are in the range of [ 0 , N 2 1 ] . Then, whether the data a is abnormal can be determined as follows [25]:
1.
Construct an N × N matrix containing all possible values in [ 0 , N 2 1 ] , as shown in Figure 1. Each value has a row coordinate and a column coordinate in this matrix.
The value in the matrix can be represented by iN + j, the corresponding row coordinate and the column coordinate of this value are (i + 1) and (j + 1), respectively. Based on these values, a and b can be represented as two-dimensional coordinates ( i a , j a ) and ( i b , j b ), where i a , j a is the row and column coordinate of a, and i b , j b is the row and column coordinate of b. ( i a , j a ) and ( i b , j b ) can be computed from the following formulae:
i a = a N + 1 ; j a = a mod N + 1 .
i b = b N + 1 ; j b = b mod N + 1 .
2.
Based on ( i a , j a ), we can construct three N-dimensional column vectors for a as
a ˜ = 0 i a 1 N i a , a ¯ = e i a , a ^ = 0 j a 1 1 N j a + 1 ,
where 0 i a denotes an i a -dimensional zero vector, 1 N i a denotes an 1 N i a -dimensional vector, and all elements are 1; e i a denotes an N-dimensional unit vector, and the i a -th element is 1. In this way, we can obtain the following transformation relation:
a b a ˜ [ i b ] + a ¯ [ i b ] * a ^ [ i b ] = 1 a > b a ˜ [ i b ] + a ¯ [ i b ] * a ^ [ i b ] = 0
3.
Construct X = [ a ˜ T a ¯ T ] , X = [ 1 a ^ T ] and a 2 N × ( N + 1 ) matrix Q satisfying
Q [ i b , 1 ] = Q [ N + i b , j b + 1 ] = 1 ,
and the other elements in Q are 0. We have
a ˜ [ i b ] + a ¯ [ i b ] * a ^ [ i b ] = [ a ˜ T a ¯ T ] Q 1 a ^ = X Q X T .
So we have the conclusion that
a b a ˜ [ i b ] + a ¯ [ i b ] * a ^ [ i b ] = 1 X Q X T = 1 a > b a ˜ [ i b ] + a ¯ [ i b ] * a ^ [ i b ] = 0 X Q X T = 0 .
As we describe above, the judgment on whether data a is abnormal can be transformed to the equality test of X Q X T = 1 or 0. To be specific, if X Q X T = 1, it is equivalent to the fact that a is less than or equal to b, where b is the upper limit of the normal value we set. Therefore it means that the data a is normal. The opposite is also true.
To help readers better understand the principle, we add a numerical example here. Supposed that N = 10 , a = 55 , b = 60 . We have i a = 55 10 + 1 = 6 ; j a = 55 mod 10 + 1 = 6 , and i b = 60 10 + 1 = 7 ; j b = 60 mod 10 + 1 = 1 . Therefore, a ˜ = [ 0000001111 ] T , a ¯ = [ 0000010000 ] T , and a ^ = [ 0000011111 ] . Further, we can obtain a ˜ [ 7 ] + a ¯ [ 7 ] * a ^ [ 7 ] = 1 . Next we construct the matrix X , X a n d   Q as described above. Finally, we can obtain that X Q X T = 1 , which is also equivalent to a b .

4. System Model

In this section, we will introduce the system model and the adversary model of the proposed scheme.

4.1. System Model

The system model of our scheme is shown in Figure 2, which consists of three entities: smart meters(SM), the aggregation center (AC), and the cloud server(CS).
  • Smart Meters (SM): Smart meters are intelligent devices installed at users’ premises with limited computing resources. Each smart meter encrypts the electricity usage data and reports it to the aggregation center.
  • Aggregation Center (AC): The aggregation center has sufficient computing power to collect and aggregate the electricity usage data reported by the smart meters.
  • Cloud Server (CS): The cloud server receives and analyzes the aggregated results sent by the AC, thus making appropriate production decisions and reasonable electricity distribution.

4.2. Adversary Model

In this scheme, we assume that:
  • Users may not only try to steal electricity by compromising smart meters, but also be interested in the privacy of other users’ electricity usage data. In addition, there may be cases where the meter fails and reports abnormal electricity consumption data.
  • AC and CS are semi-honest. This means that the two entities will honestly execute the proposed protocol and do not tamper with the computational results, but they may attempt to learn individual electricity usage data as much as possible. Besides, AC and CS will not collude with each other.
  • Any probabilistic polynomial-time adversary can intercept the channels between SMs and AC and the channels between AC and CS to obtain the reported data.
Other security issues are beyond the scope of our scheme.

4.3. Security Goals and Functionality

On the basis of the system model and adversary model above, our system should satisfy the following security goals and functionality requirements.
  • Data privacy: Because the data reported by the electricity meters is closely linked to the users’ daily habits and household situations, the proposed scheme should ensure that the privacy of users’ electricity usage data is not compromised by curious internal entities, as well as by external attackers.
  • Filter abnormal data: In order to prevent the abnormal electricity usage data reported by the electricity meters from affecting the accuracy of the aggregation results, the abnormal electricity usage data should be filtered out during the aggregation process.
  • Trace abnormal source: The proposed scheme should track the source of abnormal data to further repair and maintain abnormal meters.

5. The Proposed Scheme

Our scheme is mainly composed of five stages: system initialization, registration, data encryption, aggregation and filtering, and decryption. In addition, the work flow of our scheme is presented in Figure 3.

5.1. System Initialization

At this stage, the cloud server generates two random non-singular matrices, M 1 ˜ R ( 2 N + 4 ) × ( 2 N + 4 ) and M 2 ˜ R ( N + 5 ) × ( N + 5 ) , and computes their inverse matrices, M 3 ˜ , M 4 ˜ . After that, the public parameters of the system can be denoted as M 1 ˜ , M 2 ˜ , M 3 ˜ , M 4 ˜ , and H 0 . Here, the symbol H 0 is a collision-resistant one-way hash function.

5.2. Registration

When the smart meter S M i registers with the cloud server, the cloud server generates a random number r i and a pseudo-identity P I D i for it. Then, the cloud server sends, {PIDI,ri} to it over a secure channel.

5.3. User: Data Encryption

(1) For electricity usage data x i , the smart meter S M i generates two random numbers, μ x , i and μ x , i , and constructs the following matrices X i ˜ , X ˜ i as
x i ˜ = 0 i x 1 N i x , x i ¯ = e i x , x i ^ = 0 j x 1 1 N j x + 1 ,
where x i ˜ , x i ¯ , and x i ^ are constructed as in Section 3, i.e.:
X i = [ x ˜ i T x ¯ i T ] , X i = [ 1 x ^ i T ]
X ˜ i = [ ( x i + r i ) X i R x , i 1 0 ]
X ˜ i = X i T R x , i 0 1 ,
where R x , i = [ μ x , i μ x , i ] , R x , i = [ μ x , i μ x , i ] .
(2) The smart meter S M i encrypts X i ˜ , X ˜ i into the ciphertext H T i , 1 , H T i , 2 as follows:
H T i , 1 = X ˜ i M ˜ 1 , H T i , 2 = M ˜ 2 X ˜ i .
(3) Finally, the smart meter S M i reports the ciphertext { H T i , 1 , H T i , 2 , P I D i } to the aggregation center.

5.4. The Aggregation Center: Aggregation and Filtering

(1) The aggregation center generates the matrix Q ˜ according to the upper limit of normal data, q:
Q ˜ = Q 0 0 0 0 R Q 0 0 0 0 μ Q , 1 0 0 0 0 μ Q , 2 ,
where μ Q , 1 and μ Q , 2 are random numbers, and Q is a 2 N × ( N + 1 ) matrix constructed as in Section 3:
R Q = r Q , 1 r Q , 2 r Q , 3 ( r Q , 1 + r Q , 2 + r Q , 3 ) ,
where r Q , 1 , r Q , 1 , and r Q , 1 are random numbers.
Then, the aggregation center constructs matrix TT according to the matrix Q ˜ and the matrix M ˜ 3 , M ˜ 4 as in the following equation:
T T = M ˜ 3 Q ˜ M ˜ 4 .
(2) The aggregation center aggregates the reported data to obtain the aggregation result R according to the following equation:
R = i = 1 n H T i , 1 T T H T i , 2 = i = 1 n ( x i + r i ) X ˜ i M ˜ 1 M ˜ 3 Q ˜ i M ˜ 4 M ˜ 2 X ˜ i = i = 1 n ( x i + r i ) X ˜ i Q ˜ i X ˜ i = i = 1 n ( x i + r i ) ( X Q X T + R x , i R Q R x , i ) = i = 1 n ( x i + r i ) X Q X T .
For abnormal data, the result of X Q X T is 0, therefore the result of the formula H T i , 1 T T H T i , 2 is 0. While, for normal data, X Q X T = 1 , the result of the formula H T i , 1 T T H T i , 2 is still ( x i + r i ) . In this way, the abnormal data is automatically filtered in the process of aggregation, that is, the aggregation result R is ( x m + r m ) , where x m represents the normal electricity usage data, and r m represents its corresponding masking value. Besides, if reported data are judged to be abnormal, the aggregation center will record their source, P I D a b , and send it to the cloud server.
( x i + r i ) X Q X T = ( x i + r i ) , i f d a t a x i i s n o r m a l 0 , o t h e r w i s e
(3) Lastly, the aggregation center sends the aggregated result, R = ( x m + r m ) , and the pseudo identities, { P I D a b } , of the abnormal smart meters to the cloud server.

5.5. The Cloud Server: Decryption

After receiving the aggregated result, R = ( x m + r m ) , and the pseudo identities, { P I D a b } , of the abnormal smart meters from the aggregation center, the cloud server decrypts the data to obtain the real aggregated result R as in the following equation:
R = ( x m + r m ) ( r m ) = ( x m + r m ) ( r i r a b ) = x m ,
where r a b represents the masking value corresponding to the smart meter which reports abnormal data.
Therefore, the cloud server can obtain the accurate aggregated result R that does not include abnormal data and the pseudo identities P I D a b of abnormal meters, so that it can make appropriate production decisions and check for abnormal smart meters.
As the range of electricity usage data expands, the constructed matrix will become larger, which greatly increases the communication cost. For example, the bit length of the report data will be at least 1000 bits when the electricity usage data reaches 1000.
To solve this problem, a mapping function f : S S * is proposed to map the original data to a smaller set, where S and S * are the original data set and the mapped set, respectively. For any x i S , there exists a unique x i * S * corresponding to it and x i * = x i / b , where b is determined by the filtering accuracy. By sacrificing some accuracy within an acceptable range, communication overheads can be greatly reduced.

6. Security Analysis

In this section, we present the security proof of the proposed scheme to solve the problem of adversarial models.
Theorem 2.
(Resistant to the middle-man attack) The proposed scheme can ensure that the privacy of users’ data is not compromised by the external adversaries.
Proof. 
The confidentiality of users’ electricity data x i ( i = 1 , 2 , , n ) and the aggregation result x m will be proved below.
If the PPT adversary tries to obtain x i from { H T i , 1 , H T i , 2 } , (s)he must know r i since H T i , 1 = ( x i + r i ) X ˜ i M ˜ 1 and H T i , 2 = M ˜ 2 X ˜ i . However, r i is a random number only available to registered users and the cloud server. Consequently, the external adversaries cannot infer the individual electricity data x i from { H T i , 1 , H T i , 2 } .
If the external adversary tries to derive x m from R, (s)he needs to know the sum of random numbers r m since R = ( x m + r m ) . However, r m is only available to the cloud server. Thus, adversaries cannot infer the normal total electricity usage data x m .
To sum up, any adversary cannot recover individual electricity usage data x i or total electricity usage data x m that excludes abnormal data. □
Theorem 2.
Our proposed scheme can achieve the privacy of data transmitted by a smart meter.
Proof. 
In our scheme, the attackers of data privacy can be divided into two categories: internal attackers and external attackers. For external attacks, they can be resisted, since an encryption algorithm is adopted in our scheme. For internal attackers, we discuss it in the following three cases. □
1.
When the internal attacker is the aggregation center, although it can obtain the encrypted users’ electricity usage data, it cannot gain the users’ real electricity usage data. Specifically, the aggregation center can get { H T i , 1 , H T i , 2 } reported by smart meters, where H T i , 1 = ( x i + r i ) X ˜ i M ˜ 1 , and H T i , 2 = M ˜ 2 X ˜ i . If the aggregation center tries to recover x i from { H T i , 1 , H T i , 2 } , it must know r i . However, r i is only available to the user i and the cloud server. Therefore, the proposed scheme can resist privacy attacks on the transmitted data from the aggregation center.
2.
When the internal attacker is the cloud server, although it can obtain the aggregated result of normal electricity usage data, it cannot gain the electricity usage data of a single user. Concretely, the cloud server can only obtain ( x m + r m ) from the aggregation center, that is, it can only obtain the aggregated result of normal electricity usage data x m , which is computed by ( x m + r m ) r m . Therefore, the proposed scheme can resist privacy attacks on the transmitted data from the cloud server.
3.
When the internal attacker is a valid smart meter. Although it can intercept electricity usage data reported by other smart meters, it cannot obtain that the corresponding user’s true electricity usage information x i , because the masking value r i is known only to the corresponding user and the cloud server. Hence, any smart meter cannot recover the electricity usage data of other smart meters.
To sum up, our scheme can achieve data privacy.
Theorem 3.
It is infeasible to learn users’ electricity usage data information according to the reported data in different rounds.
Proof. 
In each round of data aggregation, the smart meter S M i updates the masking value r i as r i = H 0 ( r i ) . Even if the adversary gets the reported data in two different rounds, ( x i + r i ) and ( x i + r i ) , (s)he can only obtain ( x i + r i ) ( x i + r i ) , which does not reveal the changes in electricity usage data in the two aggregation rounds. Therefore, it is still infeasible to obtain information related to users’ electricity usage data according to the reported data in different rounds. □
Finally, we compare the security features of our proposed approach with homomorphic encryption schemes [10] and masking-value-based schemes [22,26,27,28]. As shown in Table 2, our scheme has the most comprehensive security functions and features.

7. Performance Analysis

In this section, we evaluate the performance of our scheme and compare our scheme with two representative and related schemes, the LCEDA scheme by Su et al. [20] and the DMDA scheme by Song et al. [25]. All of these schemes involve the use of masking values to encrypt the electricity usage data, and our scheme uses matrix encryption to filter abnormal data beyond that. Hence, we primarily evaluate the performance of the proposed scheme with LCEDA and DMDA in terms of communication and computation costs. Table 3 lists some notations for the performance comparisons.

7.1. Communication Costs

The communication costs of the LCEDA, the DMDA, and our scheme in the enrollment stage are shown in Table 4. The highest communication costs are mainly concentrated between the cloud server and the smart meters in these schemes.
It costs Z p + I D communication overheads for the aggregation center to register at the cloud server in LCEDA. In addition, each smart meter spends t Z p + I D and Z p on registering at the cloud server and the aggregation center, respectively. Hence, in the enrollment stage, the complexity of communication times in LCEDA is O ( 1 ) , and the total costs are ( t + 2 ) Z p + 2 I D . In DMDA, the complexity of communication times is O ( 1 ) , and the aggregation center spends G communication overheads on registering at the cloud server to obtain the mask values, while the smarts register spends ( t + 2 ) Z p + G + 2 I D communication overheads. Therefore, the total length of a communication message is constant in the enrollment stage of DMDA. In our scheme, the complexity of communication times is O ( 1 ) , and it costs M 1 + M 2 + Z p + I D communication overheads for the smart meters to register at the cloud server.
To sum up, in the enrollment stage, the total length of the communication message of LCEDA in the enrollment stage is linear with t, hence, it has the highest communication costs among these schemes. Although both the DMDA and our scheme are constant, our scheme is less efficient than DMDA, comprehensively considering communication times and message length.

7.2. Computation Costs

To evaluate performance, we conducted some experiments on a computer running Windows 10 with a 3.00 GHz Intel Core i5-8500 CPU and 8 GB memory. These experiments were run separately 50 times to obtain the mean results using the GNU Multiple Precision Arithmetic (GMP) Library and Pairing-Based Cryptography (PBC) Library.
The system initialization stage consists of two stages: the system setup stage and the enrollment stage. We set the number of users as 1000 in the implementation. The system setup stage in LCEDA, DMDA, and our scheme costed 8.74 ms, 29.9 ms, and 4.90 ms, respectively. The comparison of computation costs related to LCEDA, DMDA, and our scheme in the enrollment stage is shown in Figure 4, where we set the number of users to vary from 100 to 1000 at an increasing interval of 100. In LCEDA, the smart meters spent ( t + 1 ) T ( t 1 ) p o l y on registering at the cloud server and the aggregation center without negotiating with each other. As shown in Figure 4, the computation time of LCEDA ranged from 502.2 ms to 5895.2 ms when the number of users varied from 100 to 1000. The computation costs of DMDA are 2 ( T p m + T h + T a ) . In our scheme, the smart meters and the aggregation center register at the cloud server, which costs 4 M m , and the computation time of the proposed protocol ranges from 465.3 ms to 4897.6 ms.
The data collection stage consists of three stages: the data encryption stage, the aggregation stage, and the decryption stage. The encryption times of LCEDA, DMDA, and our scheme are shown in Table 5. Each smart meter in LCEDA needed 0.001 ms to encrypt the electricity usage data, while our scheme needed 0.3 ms to encrypt. The aggregation of the encrypted electricity usage data costs 28.3 ms, 28.3, and 33.2 ms in LCEDA, DMDA, and our scheme, respectively, when the number of users is 1000. In LCEDA and DMDA, the cloud center needs 0.53 ms to decrypt the aggregation result, whereas our scheme only needs 0.13 ms. Finally, the time to encrypt data and to aggregate data in our scheme are shown in Figure 5 and Figure 6, respectively. Therefore, LECDA and DMDA have lower computation costs ( 2 ( T p m + T h ) + ( n + 1 ) T a + T s ) and ( ( n + t ) T ( t 1 ) p l o y + 2 ( n 1 ) T m + ( 2 n + 1 ) T a + T s ) , respectively, compared to our scheme, which is because they do not involve filtering abnormal electricity usage data and do not support finding out the source of abnormal electricity usage data.
To sum up, our scheme needs to pay more computation costs for filtering abnormal users and finding out the source of abnormal users, but the increase is not significant, that is, our scheme is indeed efficient.

8. Conclusions

In this paper, we propose a lightweight and privacy-friendly data aggregation scheme against abnormal data to solve the problem that the abnormal electricity usage data cannot be filtered out when it is encrypted. Besides, our scheme can find out the smart meters which reported the abnormal data. Compared with other complex schemes, our scheme only uses a lightweight matrix encryption, which has lower computational costs and is more suitable for smart meters with limited computing capacity. Finally, a security analysis of our proposed scheme is presented to prove that our scheme can fully protect the privacy of users’ electricity usage data. In addition, the performance evaluations and experiments validate the effectiveness and practicability of our scheme. Consequently, our scheme can be implemented in smart grids to effectively filter abnormal data and find out its source.
It is hard to say that our scheme has no drawbacks. We mainly focus on filtering abnormal data during aggregation and finding the source of the abnormal data. We use lightweight matrix encryption to process real-time electricity usage data. However, as the range of electricity usage data expands, the constructed matrix will become larger, which will gradually increase the computational and communication overheads. To overcome this problem, we mapped the original data onto a smaller data set to reduce the size of the construction matrix, and the mapping function was determined by the filtering accuracy. By sacrificing some accuracy within an acceptable range, communication overheads can be greatly reduced. In future work, we will focus on reducing computing and communication overheads while ensuring better filtering accuracy.

Author Contributions

Conceptualization, H.H. and J.Z.; methodology, H.H.; software, H.H.; validation, H.H. and J.Z.; formal analysis, H.H.; investigation, H.H.; resources, J.Z.; data curation, J.Z.; writing–original draft preparation, H.H.; writing–review and editing, H.H.; visualization, J.Z.; supervision, J.Z.; project administration, J.Z.; funding acquisition, J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The research was funded by the Natural Science Foundation of Beijing (no. 4212019, M22002), the National Natural Science Foundation of China (no. 62172005), the Guangxi Key Laboratory of Cryptography and Information Security (no. GCIS201808), and the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (no. 2019BDKF JJ012).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SMsmart meter
ACaggregation center
CScloud server

References

  1. Tian, Y.; Zhang, Z.; Xiong, J.; Chen, L.; Ma, J.; Peng, C. Achieving Graph Clustering Privacy Preservation based on Structure Entropy in Social IoT. IEEE Internet Things J. 2021, 9, 2761–2777. [Google Scholar] [CrossRef]
  2. Xiong, J.; Ma, R.; Chen, L.; Tian, Y.; Li, Q.; Liu, X.; Yao, Z. A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT. IEEE Trans. Ind. Inform. 2020, 16, 4231–4241. [Google Scholar] [CrossRef]
  3. Dominicis, S.D.; Sokoloski, R.; Jaeger, C.M.; Schultz, P.W.; Communications, P. Making the smart meter social promotes long-term energy conservation. Palgrave Commun. 2019, 5, 51. [Google Scholar] [CrossRef] [Green Version]
  4. Onen, A.; Broadwater, R. Is the smart grid a good investment? In Proceedings of the 2015 3rd International Istanbul Smart Grid Congress and Fair (ICSG), Istanbul, Turkey, 29–30 April 2015; pp. 1–5. [Google Scholar] [CrossRef]
  5. Bansal, P.; Singh, A. Smart metering in smart grid framework: A review. In Proceedings of the 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, 22–24 December 2016. [Google Scholar]
  6. Xiong, J.; Ren, J.; Chen, L.; Yao, Z.; Lin, M.; Wu, D.; Niu, B. Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT. IEEE Internet Things J. 2019, 6, 1530–1540. [Google Scholar] [CrossRef]
  7. Xiong, J.; Bi, R.; Zhao, M.; Guo, J.; Yang, Q. Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles. IEEE Wirel. Commun. 2020, 27, 24–30. [Google Scholar] [CrossRef]
  8. Shinde, S.B.; Katti, P.K. Smart measurement techniques for efficient operation of smart grid. In Proceedings of the International Conference on Circuit, Nagercoil, India, 19–20 March 2015; pp. 1–6. [Google Scholar]
  9. Vilas, V.G.; Pujara, A.; Bakre, S.M.; Muralidhara, V. Implementation of metering practices in smart grid. In Proceedings of the International Conference on Smart Technologies & Management for Computing, Chennai, India, 6–8 May 2015. [Google Scholar]
  10. Hua, S.A.; Yl, A.; Zhe, X.D.; Mzab, C. An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf. Sci. 2020, 526, 289–300. [Google Scholar]
  11. Xue, K.; Yang, Q.; Li, S.; Wei, D.; Peng, M.; Memon, I.; Hong, P. PPSO: A Privacy-Preserving Service Outsourcing Scheme for Real-Time Pricing Demand Response in Smart Grid. IEEE Internet Things J. 2019, 6, 2486–2496. [Google Scholar] [CrossRef]
  12. Saleem, A.; Khan, A.; Malik, S.; Pervaiz, H.; Malik, H.; Alam, M.; Jindal, A. FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet Things J. 2020, 7, 6132–6142. [Google Scholar] [CrossRef] [Green Version]
  13. Ara, A.; Al-Rodhaan, M.; Tian, Y.; Al-Dhelaan, A. A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems. IEEE Access 2017, 5, 12601–12617. [Google Scholar] [CrossRef]
  14. Liu, Y.; Guo, W.; Fan, C.I.; Chang, L.; Cheng, C. A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid. IEEE Trans. Ind. Inform. 2019, 15, 1767–1774. [Google Scholar] [CrossRef]
  15. Romdhane, R.B.; Hammami, H.; Hamdi, M.; Kim, T.H. At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid. In Proceedings of the 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1067–1072. [Google Scholar] [CrossRef]
  16. Abdallah, A.; Shen, X.S. A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid. IEEE Trans. Smart Grid 2018, 9, 396–405. [Google Scholar] [CrossRef]
  17. Kaur, K.; Garg, S.; Kaddoum, G.; Gagnon, F.; Guizani, M. A Secure, Lightweight, and Privacy-Preserving Authentication Scheme for V2G Connections in Smart Grid. In Proceedings of the International Workshop on Hot Topics in Social and Mobile Connected Smart Objects (HotSALSA’19) in Conjunction with IEEE INFOCOM 2019, Paris, France, 29 April–2 May 2019. [Google Scholar]
  18. Zuo, X.; Li, L.; Peng, H.; Luo, S.; Yang, Y. Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Syst. J. 2021, 15, 395–406. [Google Scholar] [CrossRef]
  19. Ming, Y.; Zhang, X.; Shen, X. Efficient Privacy-Preserving Multi-Dimensional Data Aggregation Scheme in Smart Grid. IEEE Access 2019, 7, 32907–32921. [Google Scholar] [CrossRef]
  20. Chen, Y.; Martínez-Ortega, J.F.; Castillejo, P.; López, L. A Homomorphic-Based Multiple Data Aggregation Scheme for Smart Grid. IEEE Sens. J. 2019, 19, 3921–3929. [Google Scholar] [CrossRef] [Green Version]
  21. Gope, P.; Sikdar, B. Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1554–1566. [Google Scholar] [CrossRef]
  22. Su, Y.; Li, Y.; Li, J.; Zhang, K. LCEDA: Lightweight and Communication-Efficient Data Aggregation Scheme for Smart Grid. IEEE Internet Things J. 2021, 8, 15639–15648. [Google Scholar] [CrossRef]
  23. Huang, C.; Wang, X.; Gan, Q.; Huang, D.; Yao, M.; Lin, Y. A lightweight and fault-tolerable data aggregation scheme for privacy-friendly smart grids environment. Cluster Comput. 2021, 24, 3495–3514. [Google Scholar] [CrossRef]
  24. Ni, J.; Zhang, K.; Alharbi, K.; Lin, X.; Zhang, N.; Shen, X.S. Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering. IEEE Trans. Smart Grid 2017, 8, 2483–2493. [Google Scholar] [CrossRef]
  25. Zheng, Y.; Lu, R.; Guan, Y.; Shao, J.; Zhu, H. Towards Practical and Privacy-Preserving Multi-dimensional Range Query over Cloud. IEEE Trans. Dependable Secur. Comput. 2021. [Google Scholar] [CrossRef]
  26. Song, J.; Liu, Y.; Shao, J.; Tang, C. A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid. IEEE Syst. J. 2020, 14, 900–908. [Google Scholar] [CrossRef]
  27. Sui, Z.; Meer, H.d. An Efficient Signcryption Protocol for Hop-by-Hop Data Aggregations in Smart Grids. IEEE J. Sel. Areas Commun. 2020, 38, 132–140. [Google Scholar] [CrossRef]
  28. Xue, K.; Zhu, B.; Yang, Q.; Wei, D.S.L.; Guizani, M. An Efficient and Robust Data Aggregation Scheme Without a Trusted Authority for Smart Grid. IEEE Internet Things J. 2020, 7, 1949–1959. [Google Scholar] [CrossRef]
Figure 1. Representation of the constructed matrix.
Figure 1. Representation of the constructed matrix.
Sensors 22 01452 g001
Figure 2. System model.
Figure 2. System model.
Sensors 22 01452 g002
Figure 3. The work flow of our scheme.
Figure 3. The work flow of our scheme.
Sensors 22 01452 g003
Figure 4. Computation Time of Enrollment Stage. The figure shows how the time required for LCEDA, DMDA, and the proposed scheme in the enrollment stage changes as the number of users increases. In addition, the figure reflects that the proposed scheme requires relatively little time compared to the other two.
Figure 4. Computation Time of Enrollment Stage. The figure shows how the time required for LCEDA, DMDA, and the proposed scheme in the enrollment stage changes as the number of users increases. In addition, the figure reflects that the proposed scheme requires relatively little time compared to the other two.
Sensors 22 01452 g004
Figure 5. Time to encrypt data in the proposed protocol.
Figure 5. Time to encrypt data in the proposed protocol.
Sensors 22 01452 g005
Figure 6. Time to aggregate data in the proposed protocol.
Figure 6. Time to aggregate data in the proposed protocol.
Sensors 22 01452 g006
Table 1. Security feature comparisons.
Table 1. Security feature comparisons.
SchemeData ConfidentialityResistance to Middle-Man AttacksFiltering of Abnormal DataTracing the Source of Abnormal DataComputational Cost
 [10,11,12]×× H i g h
 [13,14]×× H i g h
 [15,16]×× L o w
 [17]×× H i g h
 [18,19,20]×× H i g h
 [21,22]×× L o w
 [23]×× L o w
 [24] H i g h
The proposed protocol L o w
Table 2. Security feature comparisons.
Table 2. Security feature comparisons.
SchemeData ConfidentialityResistance against Man-in-the-Middle AttacksForward/Backward SecreciesFiltering of Abnormal DataFinding the Source of Abnormal Data
AMDA [10]××××
DMDA [26]×××
LPSDA [21]××××
ESPDA [27]×××
ERDA [28]×××
LCEDA [22]××
The proposed protocol
Table 3. Notations.
Table 3. Notations.
NotationSemanticsNotationSemantics
T ( t 1 ) p o l y Time of evaluation operation of a ( t 1 ) -polynomial Z p Element size in Z p
I D Bit length of the identifier G Element size in G
M 1 ( 2 N + 4 ) × ( 2 N + 4 ) Matrix size M 3 1 × ( 2 N + 4 ) Matrix size
M 2 ( N + 5 ) × ( N + 5 ) Matrix size M 4 ( N + 5 ) × 1 Matrix size
T a Time of an addition operation in Z p T h Time of a hash operation
T s Time of a subtraction operation in Z p T p m Time of a point multiplication operation
M m Time of a multiplication operation in matrix M a Time of an addition operation in matrix
Table 4. Comparisons of communication costs in the enrollment stage.
Table 4. Comparisons of communication costs in the enrollment stage.
SchemeCS↔SMAC↔SMCS↔ACTotal Costs
LCEDA t Z p + I D Z p Z p + I D ( t + 2 ) Z p + 2 I D
DMDA 2 Z p + G + 2 I D G 2 ( Z p + G + I D )
The proposed protocol M 1 + M 2 + Z p + I D M 3 + M 4 M 1 + M 2 + Z p + I D + M 3 + M 4
Table 5. Comparisons of computation costs.
Table 5. Comparisons of computation costs.
Scheme (n = 1000)EncryptionAggregationDecryption
Times (ms)CostsTimes (ms)CostsTimes (ms)Costs
LCEDA T a 0.001 ( n 1 ) T a 28.3 T s 0.53
DMDA T a 0.001 ( n 1 ) T a 28.3 T s 0.53
The proposed protocol T a + 2 M m 0.1 2 n M m + ( n 1 ) T a 33.2 T s 0.13
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, J.; Han, H. A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data. Sensors 2022, 22, 1452. https://doi.org/10.3390/s22041452

AMA Style

Zhang J, Han H. A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data. Sensors. 2022; 22(4):1452. https://doi.org/10.3390/s22041452

Chicago/Turabian Style

Zhang, Jianhong, and Haoting Han. 2022. "A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data" Sensors 22, no. 4: 1452. https://doi.org/10.3390/s22041452

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop