Browse > Article
http://dx.doi.org/10.3837/tiis.2015.04.008

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid  

Li, Hongwei (School of Computer Science & Engineering, University of Electronic Schience and Technology of China Chengdu)
Liu, Dongxiao (School of Computer Science & Engineering, University of Electronic Schience and Technology of China Chengdu)
Alharbi, Khalid (Faculty of Business and Information Technology, University of Ontario Institute of Technology)
Zhang, Shenmin (School of Computer Science & Engineering, University of Electronic Schience and Technology of China Chengdu)
Lin, Xiaodong (Faculty of Business and Information Technology, University of Ontario Institute of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.4, 2015 , pp. 1404-1423 More about this Journal
Abstract
In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.
Keywords
Smart grid; attribute-based encryption; attribute revocation; policy updating;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Yu, C. Wang, K. Ren and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. of INFOCOM, pp. 1-9, 2014. Article (CrossRef Link)
2 J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), pp. 145-153, 2013. Article (CrossRef Link)
3 H. Li, Y. Dai, L. Tian, H. Yang, "Identity-Based Authentication for Cloud Computing," Lecture Notes of Computer Science (LNCS), vol. 5931, 157-166, 2009. Article (CrossRef Link)
4 C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. of INFOCOM, pp. 1-9, 2010. Article (CrossRef Link)
5 A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Proc. of EUROCRYPT, pp. 568-588, 2011. Article (CrossRef Link)
6 D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology-CRYPTO, Springer, pp. 213-229, 2001. Article (CrossRef Link)
7 B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Proc. of PKC, Springer, pp. 53-70, 2011. Article (CrossRef Link)
8 K. Yang, X. Jia, K. Ren, R. Xie and L. Huang, “Enabling efficient access control with dynamic policy updating for big data in the cloud,” in Proc. of INFOCOM, pp. 2013-2021, 2014. Article (CrossRef Link)
9 “Miracl cryptographic sdk,” Article (CrossRef Link)
10 A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology–EUROCRYPT, Springer, pp. 457–473, 2005. Article (CrossRef Link)
11 V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. of the 13th ACM conference on Computer and communications security. ACM, pp. 89-98, 2006. Article (CrossRef Link)
12 Z. M. Fadlullah, N. Kato, R. Lu, X. Shen, Y. Nozaki, “Toward secure targeted broadcast in smart grids,” IEEE Communications Magazine, vol. 50, no. 5, pp. 150-156, 2012. Article (CrossRef Link)   DOI
13 S. Ruj and A. Nayak, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196-205, 2013. Article (CrossRef Link)   DOI
14 Y. Yang, H. Li, W. Liu, H. Yang, and M. Wen, “Secure Dynamic Searchable Symmetric Encryption with Constant Document Update Cost,” in Proc. of GLOBECOM, pp. 775-780, 2014. Article (CrossRef Link)
15 H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, “Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, 2015. Article (CrossRef Link)
16 H. Li, D. Liu, Y. Dai,T. H. Luan, and X. S. Shen, “Enabling Efficient Multi-keyword Ranked Search over Encrypted Cloud Data through Blind Storage,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 127-138, 2015. Article (CrossRef Link)   DOI
17 D. Liu, H. Li, Y. Yang, and H. Yang, “Achieving Multi-Authority Access Control with Efficient Attribute Revocation in Smart Grid,” in Proc. of ICC, pp. 634-639, 2014. Article (CrossRef Link)
18 H. Li, X. Lin, H. Hang, X. Liang, R. Lu, X. Shen, “Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no.8, pp. 2053 - 2064, 2014. Article (CrossRef Link)   DOI
19 H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, “EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market,” KSII Transactions on Internet and Information Systems, vol. 8, no. 11, pp. 3937- 3954, 2014. Article (CrossRef Link)   DOI
20 Y. Yang, H. Li, M. Wen, H. Luo, and R. Lu, “Achieving Ranked Range Query in Smart Grid Auction Market,” in Proc. of ICC, Sydney, Australia, pp. 951-956, 2014. Article (CrossRef Link)
21 H. Li, R. Lu, L. Zhou, B. Yang, X. Shen, “An efficient merkle tree based authentication scheme for smart grid,” IEEE Systems Journal, vol. 8, no.2, pp. 655 - 663, 2014. Article (CrossRef Link)   DOI
22 H. Li, X. Liang, R. Lu, X. Lin, X. Shen, “Edr: An efficient demand response scheme for achieving forward secrecy in smart grid,” in Proc. of GLOBECOM, pp. 929-934, 2012. Article (CrossRef Link)
23 H. Liang, B. Choi, W. Zhuang, X. Shen, “Towards optimal energy store-carry-and-deliver for phevs via v2g system,” in Proc. of INFOCOM, pp. 167-1682, 2012. Article (CrossRef Link)
24 J. Liu, Y. Xiao, S. Li, W. Liang, C. Chen, “Cyber security and privacy issues in smart grids,” IEEE Communications Surveys and Tutorials, vol. 14, no. 4, pp. 981-997, 2012. Article (CrossRef Link)   DOI
25 H. Liang, B. Choi, A. Abdrabou, W. Zhuang, X. Shen, “Decentralized economic dispatch in microgrids via heterogeneous wireless networks,” IEEE journal on Selected Areas in communications, vol. 30, no. 6, pp. 1061-1074, 2012. Article (CrossRef Link)   DOI