[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid

Published: 01 April 2015 Publication History

Abstract

Modern power systems have been faced with a rising appeal for the upgrade to a highly intelligent generation of electricity networks known as the smart grid. Thus, security for the smart grid has emerged as an important issue. Recently, Hur proposed an attribute based data sharing for smart grid which unfortunately is vulnerable to the denial of service (DoS) attack. Moreover, it does not support the user revocation property and the grid system manager cannot prevent the revoked user of having access to the shared data in the storage center. For these weaknesses, we suggest an efficient revocable data sharing scheme which is immune against DoS attack. In addition, we present the security analyses and comparisons indicating the efficiency and security of the proposed scheme.

References

[1]
(2007). A systems view of the modern grid. In U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL).
[2]
(2008). The smart grid: An introduction. In The U.S. Department of Energy, Tech. Rep.http://energy.gov/oe/downloads/
[3]
(2010). Smart grid cyber security strat egy and requirements. In DRAFT NI-STIR 7628.
[4]
(2012). Application of automated controls for voltage and reactive power management--Initial results. In The U.S. Department of Energy, Tech. Rep.https://www.smartgrid.gov/document/application-reactive-power-management-initial-results
[5]
(2012). Demand reductions from the application of advanced metering infrastructure, pricing programs, and customer-based systems--Initial results. In The U.S. Department of Energy, Tech. Rep.https://www.smartgrid.gov/document/demand-reductions-application-advanced-metering-infrastructure-pricing-programs-and-custom
[6]
(2012). Operations and maintenance savings from advanced metering infrastructure initial results. In The U.S. Department of Energy, Tech. Rep.https://www.smartgrid.gov/document/operations-and-maintenance-savings-advanced-metering-infrastructure-initial-results
[7]
(2012). Reliability improvements from the application of distribution automation technologies--Initial results. In The U.S. Department of Energy, Tech. Rep., https://www.smartgrid.gov/document/reliability-improvements-automation-technologies-initial-results
[8]
Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In C. S. Laih (Ed.), Advances in cryptology-ASIACRYPT 2003 (pp. 452---473). Springer Berlin Heidelberg.
[9]
Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007. SP'07. IEEE, pp. 321---334.
[10]
Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). Pbes: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th international symposium on information, computer, and communications security, ACM, pp. 262---275.
[11]
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in CryptologyCRYPTO 2001. Springer, pp. 213---229.
[12]
Doshi, N., & Jinwala, D. C. (2013). Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Security and Communication Networks.
[13]
Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675---685.
[14]
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp 89---98.
[15]
Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, & I. Walukiewicz (Eds.), Automata, languages and programming (pp. 579---591). Springer Berlin Heidelberg.
[16]
Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171---2180.
[17]
Hur, J., & Noh, D. K. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1214---1221.
[18]
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In H. Y. Youm & M. Yung (Eds.), Information security applications (pp 309---323). Springer Berlin Heidelberg.
[19]
Kapadia, A., Tsang, P. P., & Smith, S. W. (2007). Attribute-based publishing with hidden credentials and hidden policies. NDSS, 7, 179---192.
[20]
Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design principles for power grid cyber-infrastructure authentication protocols. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1---10.
[21]
Kim, Y. J., Thottan, M., Kolesnikov, V., & Lee, W. (2010). A secure decentralized data-centric information infrastructure for smart grid. IEEE Communications Magazine, 48(11), 58---65.
[22]
Li, D., Aung, Z., Williams, J., & Sanchez, A. (2014a). P2dr: Privacy-preserving demand response system in smart grids. In Computing, Networking and Communications (ICNC), 2014 International conference on, IEEE, pp 41---47.
[23]
Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2014b). No peeking: Privacy-preserving demand response system in smart grids. International Journal of Parallel, Emergent and Distributed Systems, 29(3), 290---315.
[24]
Li, F., Luo, B., & Liu, P. (2010). Secure information aggregation for smart grids using homomorphic encryption. In Smart Grid Communications (SmartGridComm), 2010 First IEEE international conference on, IEEE, pp. 327---332.
[25]
Maurer, U. (2009). Unifying zero-knowledge proofs of knowledge. In B. Preneel (Ed.), Progress in cryptology-AFRICACRYPT 2009 (pp. 272---286). Springer Berlin Heidelberg.
[26]
Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In S. M. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (pp. 111---129). Springer Berlin Heidelberg.
[27]
Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309---329.
[28]
Rao, Y.S., & Dutta, R. (2014). Dynamic ciphertext-policy attribute-based encryption for expressive access policy. In R. Natarajan (Ed.), Distributed computing and internet technology (pp. 275---286). Springer Berlin Heidelberg.
[29]
Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604---3629.
[30]
Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In D. Catalano, N. Fazio, R. Gennaro, & A. Nicolosi (Eds.), Public Key Cryptography-PKC 2011 (pp. 53---70). Springer Berlin Heidelberg.
[31]
Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on, IEEE, pp. 39---44.
[32]
Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp. 261---270.

Cited By

View all
  • (2024)Revocable and Efficient Blockchain-Based Fine-Grained Access Control Against EDoS Attacks in Cloud StorageIEEE Transactions on Computers10.1109/TC.2024.339850273:8(2012-2024)Online publication date: 1-Aug-2024
  • (2020)A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storageMultimedia Tools and Applications10.1007/s11042-019-08292-879:3-4(2855-2872)Online publication date: 1-Jan-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Networks
Wireless Networks  Volume 21, Issue 3
April 2015
340 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 April 2015

Author Tags

  1. Data sharing
  2. DoS attacks
  3. Privacy
  4. Revocation
  5. Smart grid

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Revocable and Efficient Blockchain-Based Fine-Grained Access Control Against EDoS Attacks in Cloud StorageIEEE Transactions on Computers10.1109/TC.2024.339850273:8(2012-2024)Online publication date: 1-Aug-2024
  • (2020)A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storageMultimedia Tools and Applications10.1007/s11042-019-08292-879:3-4(2855-2872)Online publication date: 1-Jan-2020

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media