privacy-enhanced data aggregation scheme against internal attackers in smart grid

22
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological Universi ty [email protected] June 6, 2014

Upload: libby-ramos

Post on 01-Jan-2016

37 views

Category:

Documents


0 download

DESCRIPTION

Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid. Haiyong Bao Nanyang Technological University [email protected] June 6, 2014. Overview. Introduction Preliminaries Scheme Security proofs Conclusion & Discussion. Reference. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Haiyong BaoNanyang Technological University

[email protected] 6, 2014

Page 2: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Overview

Introduction Preliminaries Scheme Security proofs Conclusion & Discussion

Page 3: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Reference C.I. Fan, S.Y. Huang, and Y.L. Lai, Privacy-enhanced

data aggregation scheme against internal attackers in smart grid, IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 666-675, 2014.

D. Boneh, B. Lynn, and H. Shacham, “Short signatures from The Weil pairing,” in Proc. Advances in Cryptol. –ASIACRYPT 2001, Berlin, Germany, 2001, pp. 514–532.

J. Camenisch, S. Hohenberger, and M. Pedersen, “Batch verification of short signatures,” in Proc. Advances in Cryptol. – EUROCRYPT 2007, Berlin, 2007, pp. 246–263.

Page 4: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Smart grid power-system architecture

Page 5: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Aims of this scheme

Against external attackers (message authentication, communication system security, and data aggregation)

How to prevent internal attackers (e.g., electricity suppliers)

The first one against internal attackers

Besides, the first one providing a secure batch verification procedure for efficient verification

Blinding factors

Page 6: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Preliminaries Bilinear Pairing Setting

Page 7: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

The Subgroup Decision Problem

Page 8: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Gap Diffie–Hellman Problem

Page 9: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Security Definitions

Semantic Security Unforgeability Batch Verification Security

Page 10: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Scheme System model

Page 11: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Construction

Page 12: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Initialization Phase

Page 13: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Initialization Phase

Page 14: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Registration Phase

Page 15: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Aggregation Phase

Page 16: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
Page 17: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Security proofs

Against External Attackers

Page 18: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Security proofs Against Internal Attackers

Page 19: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Proof of unforgeability

Sequences of games

Page 20: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Proof of batch verification security

Page 21: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
Page 22: Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Conclusion & Discussion

User authentication phase of this scheme, possible attacks?

Should the validity of the partial signature be checked? (efficiency, traceable)

Security of batch verification? How to satisfy the security property of message

integrity using digital signature or other crypt methods?