EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin (Sherman) Shen IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. 23, NO. 9, SEPTEMBER 2012 Presenter : ε¨ζ°ε Date:2014/10/27 1 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 2 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 3 Intorduction 4 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 5 System Model 6 Security Requirements • Confidentiality • Authentication and Data Integrity 7 Design Goal • The secure requirement should be guaranteed in the proposed scheme • The communication effectiveness should be achieved in the proposed scheme 8 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 9 Preliminaries Bilinear Pairing βen(κ) = (q,P,πΎ, πΎT,e) Computational Diffie-Hellman(CDH) Problem Bilinear Diffie-Hellman(BDH) Problem Decisional BDH(DBDH) Problem 10 Preliminaries-----Paillier Cryptosystem(1/3) Key Generation security parameter κ1 large prime p1 , q1 | p1|=|q1|=|κ1| RSA modulus : n=p1 * q1 λ=lcm(p1-1, q1-1) L(u)=(u-1)/n μ=(L(gλmodn2))-1 mod n Public key pk = (n,g) Privite key sk = (λ, μ) 11 Preliminaries-----Paillier Crypyosystem(2/3) Encryption message m ∈ β€π random number r ∈ β€π∗ ciphertext c=E(m)=gm*rn mod n2 12 Preliminaries-----Paillier Crypyosystem(3/3) Decryption ciphertext c ∈ β€∗π2 2 λ πππ π m=D(c)=L(π ) *μ mod n 13 Outline • Introduction • System Model, Security Requirement And Design Model • Preliminaries • EPPA Scheme • Security Analysis • Performance • Conclusions 14 EPPA Scheme---System Initialization(1/3) Security parameters κ, κ1 βen(κ) = (q,P,πΎ, πΎT,e) Calculate public key pk = (n,g) //n=p1q1 privite key sk = (λ, μ) Electricity usage data (T1 ,T2 ,…,Tl ) Superincreasing sequence a = (a1 =1,a2 ,…,al) //a2,…,al are large prime gi=gai , for i=1,2,…,l 15 EPPA Scheme---System Initialization(2/3) 2 random element Q1,Q2 ∈πΎ 2 random number α, π₯∈ β€π∗ Computes e(P,P) α , Y=π₯P 2 secure cryptographic hash function H,H1 H : {0,1}* πΎ H1: {0,1}* β€π∗ 16 EPPA Scheme---System Initialization(3/3) Keep Master keys (λ, μ , π, α, π₯) security While when a HAN user Ui ∈ U of the RA joins in the system , Ui choose a random number π₯ i ∈ β€π∗ as the private key ,and compute the corresponding public key Yi=π₯ iP 17 EPPA Scheme---User Report Generation Step 1. choose a random number r∈β€π∗ and compute Step 2. use private key π₯i to make sinature Step 3. report encrypted electricity usage data Ci β₯ π π΄ β₯ ππ β₯ ππ β₯ σπ to local GW in the RA 18 EPPA Scheme---Privacy-Preserving Report Aggregation After receiving Ci β₯ π π΄ β₯ ππ β₯ ππ β₯ σπ for i = 1,2,…,w Local GW check TS & σπ if hold? Hold, the signature is accept . In order to make verification efficiently GW perform as The time-consuming pairing operation can be reduce from 2w to w+1 time. 19 EPPA Scheme---Privacy-Preserving Report Aggregation After validity checking, the following steps for privacy-preserving report aggregation : 20 EPPA Scheme---Secure Report Reading And Response(1/6) After receiving Cβ₯ π π΄ β₯ π β₯ ππ β₯ σπ , OA check C is implicitly formed by 21 EPPA Scheme---Secure Report Reading And Response(2/6) Taking And the report C=gMRn mod n2 is still ciphertext for Paillier Cryptosystem OA use master key to recover M 22 EPPA Scheme---Secure Report Reading And Response(3/6) By invoking algorithm 1,OA can recover and store the aggregated data 23 EPPA Scheme---Secure Report Reading And Response(4/6) Correctness of algorithm 1,assume Xl=M Since any type of data is less than d, 24 EPPA Scheme---Secure Report Reading And Response(5/6) With the same procedure, we can also prove each Dj= π€ π=1 πππ ,for j = 1,2,…,l-1. After analyzing the near real-time electricity usage data,OA send a message m∈πΎT to inform user in RA step1. OA first choose a random number s ∈ β€∗ , π and compute C=(C1,C2,C3,C4),where Then OA make signature σ =π₯H(C β₯ π π΄ β₯ ππ΄ β₯ ππ ) , and send back C β₯ σ to local GW at RA 25 EPPA Scheme---Secure Report Reading And Response(6/6) step2. upon receivingC β₯ σ GW check e(P, σ)=e(Y,H(C β₯ π π΄ β₯ ππ΄ β₯ ππ ) ) if hold,GW broadcast C in RA step3. authorized key aki =(αP+ti1 Y,ti1 P, ti2 P, ti1 Q1+ti2 Q2) to recover m form C : 26 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 27 Security Analysis(1/2) User’s data (di1,di2,…,dil) sensed by smart meters are formed as C =g di1 β gππ2 β,…,gπππ β π π mod n2 , i 1 2 π π which can be express as Since Paillier Crytosystem is semantic secure against the chosen plaintext attack . Thus the data is secure and privacy-preserving. 28 Security Analysis(2/2) After GW collect all report C1,C2,…,Cw from residential user , GW compute C= π€ 2 to perform report aggregation. C mod n π=1 i After receiving C from GW, the OA recover C as (π·1, π·2, … , π·l),and store the entry in the database. Dj= π€ π=1 πππ 29 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 30 Performance(1/3) 31 Performance(1/3) 32 Performance(2/3) 33 Performance(3/3) 34 Outline • Intorduction • Systrm Model,Security Requirement And Design Model • Preliminaries • EPPA Schmem • Security Analysis • Performance • Conclusions 35 Conclusions In this paper, we have proposed an efficient and privacypreserving aggregation scheme for secure smart grid communications. It realizes a multidimensional data aggregation approach based on the homomorphic Paillier cryptosystem. Compared with the traditional one-dimensional data aggregation methods, EPPA can significantly reduce computational cost and significantly improve communication efficiency, satisfying the real-time high-frequency data collection requirements in smart grid communications. We have also provided security analysis to demonstrate its security strength and privacypreserving ability, and performance analysis to show the efficiency improvement. For the future work, we will study the possible behavior by internal attackers and extend the EPPA scheme to effectively resist such attacks. 36 εΏεΎ 37 Thanks for your listening 38