Smart grid application is the most concerned application in the real world environment which will generate different power readings in different time periods. These readings are to be gathered and sent to the centralized server for further processing. The single node failure in the smart grid system might lead to entire system failure where the aggregation can't be performed well. During data aggregation user privacy, fault tolerance and data integrity are to be considered as the important factors by the smart grid system. The technique DPAFT (Differentially Private data aggregation with Fault Tolerance) provides efficient differential privacy with fault tolerance for smart metering. And also DPAFT uses Honest but curious model to maintain data integrity against internal/external attack and End to end signature to accidental attack. Performance evaluation illustrate that DPAFT is efficient in terms of differentially privacy storage cost, computational complexity and robustness of fault tolerance.
Saranya. A, Anantha Prabha. P
Data integrity, Privacy Preserving, Data aggregation, Differential privacy
- S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive overview,” Comput. Netw., vol. 53, no. 12, pp. 2022–2037, Aug. 2009.
- L. Wasserman, All of statistics : a concise course in statistical inference. New York: Springer.
- C. T. Chou, A. Ignatovic, and W. Hu, “Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 8, pp. 1525–1534, Aug 2013.
- R. Lu, X. Liang, X. Li, X. Lin, and X. Shen,“EPPA: An efficient andprivacy-preserving aggregation scheme for secure smart grid communications,”IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621–1631,Sep. 2012.
- M. Hashmi, S. Hanninen, and K. Maki, “Survey of smart grid concepts,architectures, and technological demonstrations worldwide,” in IEEE PES Conference on Innovative Smart Grid Technologies, 2011.
- X. Li et al., “Securing smart grid: Cyber attacks, countermeasures, andchallenges,” IEEE Commun. Mag., vol. 50, no. 8, pp. 38–45, Aug. 2012
- L. Chen, R. Lu, and Z. Cao, “PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications,”Peer-to-Peer Netw. Appl., to be published.
- F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart gridsusing homomorphic encryption,” in Proc. 1st IEEE Int. Conf. Smart GridCommun. (SmartGridComm), 2010, pp. 327–332.
- A. Metke and R. Ekl, “Smart grid security technology,” in Innovative Smart Grid Technologies, Jan. 2010, pp. 1–7.
- Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: SmartGridComm, pp 238–243.
- P. Paillier, “Public-Key Cryptosystems Based on Composite Degree Residuosity Classes,” Proc. 17th Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 223-238, 1999.
- P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” Security Privacy, IEEE, vol. 7, no. 3, pp. 75 –77, 2009.
- J. Lu, D. Xie, and Q. Ai, “Research on smart grid in China,” in Transmission Distribution Conference Exposition: Asia and Pacific, 2009, Oct. 2009, pp. 1 – 4.
- K. B. Frikken and J. A. Dougherty, IV, “An efficient integrity-preserving scheme for hierarchical sensor aggregation,” in Proceedings of the first ACM conference on Wireless network security, 2008, pp. 68–76.
- T. E. Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Proceedings of CRYPTO 84 on Advances in cryptology. Springer-Verlag New York, Inc., 1985, pp. 10–18.
|Published in :
||Volume 2 | Issue 2 | March-April - 2016
|Date of Publication
Cite This Article
Saranya. A, Anantha Prabha. P, "Privacy Preserved Secured Data Aggregation Technique for Smart Grid Communication System", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.1302-1312, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622434.php