Netinfo Security ›› 2021, Vol. 21 ›› Issue (11): 65-74.doi: 10.3969/j.issn.1671-1122.2021.11.008
Previous Articles Next Articles
LI Kunchang, SHI Runhua(), LI En
Received:
2021-07-14
Online:
2021-11-10
Published:
2021-11-24
Contact:
SHI Runhua
E-mail:rhshi@ncepu.edu.cn
CLC Number:
LI Kunchang, SHI Runhua, LI En. Survey on Data Aggregation and Privacy Protection of User Query in Smart Grid[J]. Netinfo Security, 2021, 21(11): 65-74.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2021.11.008
分类 | 方案 | 技术方法 | 应用 场景 | 安全 特性 | |
---|---|---|---|---|---|
文献[ | 基于Paillier加密的数据聚合 | 基于Paillier加密系统的分层聚合数据 | Paillier加密、分层 聚合 | 智能 电网 | 数据保 密性 |
文献[ | 智能电表本身使用Paillier 密码系统进行聚合的方案 | Paillier 加密 | 智能 电表 | 隐私 保护 | |
文献[ | 基于其他同态加密的数据聚合 | 使用同态加密系统对数据加密值及加密密钥的 聚合 | 同态加密 | 智能电网大数据 | 安全 存储 |
文献[ | 基于同态加密隐私保护的实时电价计费方案 | 加法、混合乘法同态 加密 | 智能 电网 | 隐私 保护 | |
文献[ | 基于同态加密的智能电表数据聚合方案 | 同态加密 | 智能 电网 | 隐私 保护 | |
文献[ | 基于雾计算的数据聚合 | 基于雾计算的智能电网数据聚合研究 | 雾节点、云节点 | 智能 电网 | 细粒度数据共享 |
研究文献 | 分类 | 方案 | 技术方法 | 应用场景 | 安全特性 |
---|---|---|---|---|---|
文献[ | 支持聚合函数的隐私保护数据查询 | PriSense、数据 查询 | PriSense、聚合 | 智能电网 | 隐私保护 |
文献[ | Sum聚合、数据 查询 | 同态加密、密钥 | 智能电网 | 隐私保护 | |
文献[ | 点对点、可验证数据聚合 | 聚合函数 | 智能电网、云存储 | 数据保密性 | |
文献[ | 多功能数据聚合的隐私数据查询 | MuDA、数据查询 | 多种统计 | 智能电网 | 隐私保护 |
文献[ | PPM-HAD、数据 查询 | 多功能数据聚合 | 医疗系统、智能电网 | 隐私保护 | |
文献[ | 轻量级隐私数据查询 | 基于Diffie-Hellman密钥交换协议的隐私保护数据查询方案 | 密钥交换、同态加密 | 智能电网 | 隐私保护、云计算 |
[1] | SI Guanlin. Research and Application of Data Privacy Protection Methods for Energy Internet Users[D]. Beijing:North China Electric Power University, 2018. |
司冠林. 面向能源互联网用户数据隐私保护方法的研究与应用[D]. 北京:华北电力大学, 2018. | |
[2] | CAO Junwei, MENG Kun, WANG Jiye, et al. Energy Internet and Energy Router[J]. Science China Information Science, 2014, 44(6):714-727. |
曹军威, 孟坤, 王继业, 等. 能源互联网与能源路由器[J]. 中国科学:信息科学, 2014, 44(6):714-727. | |
[3] | CHEN Le. Research on Privacy Protection in Smart Grid Communication[D]. Shanghai:Shanghai Jiaotong University, 2015. |
陈乐. 智能电网通信中隐私保护问题的研究[D]. 上海:上海交通大学, 2015. | |
[4] | JAWUREK M, JOHNS M, KERSCHBAUM F. Plug-in Privacy for Smart Metering Billing[C]// Springer. International Symposium on Privacy Enhancing Technologies Symposium, July 27-29, 2011, Berlin. Heidelberg: Springer, 2011: 192-210. |
[5] | ZHAO Yiqiao. Research on Smart Meter Integrity Privacy Protection Based on Ring Signature Encryption[D]. Beijing:North China Electric Power University, 2018. |
赵乙桥. 基于环签密的智能电表完整隐私保护研究[D]. 北京:华北电力大学, 2018. | |
[6] |
ZHANG Liping, ZHAO Lanchao, YIN Shuijun, et al. A Lightweight Authentication Scheme with Privacy Protection for Smart Grid Communications[J]. Future Generation Computer Systems, 2019, 100(1):770-778.
doi: 10.1016/j.future.2019.05.069 URL |
[7] |
KONG Wei, SHEN Jian, VIJAYAKUMAR P, et al. A Practical Group Blind Signature Scheme for Privacy Protection in Smart Grid[J]. Journal of Parallel and Distributed Computing, 2020, 136(1):29-39.
doi: 10.1016/j.jpdc.2019.09.016 URL |
[8] | LEWKO A, OKAMOTO T, SAHAI A, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (hierarchical) Inner Product Encryption[C]// Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, July 23-25, 2010, Berlin, Heidelberg: Springer, 2010: 62-91. |
[9] |
RUJ S, NAYAK A. A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids[J]. IEEE Transactions on Smart Grid, 2013, 4(1):196-205.
doi: 10.1109/TSG.2012.2224389 URL |
[10] |
HUR J. Attribute-based Secure Data Sharing with Hidden Policies in Smart Grid[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(11):2171-2180.
doi: 10.1109/TPDS.2012.61 URL |
[11] | BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF Formulas on Ciphertexts[C]// Springer. Theory of Cryptography Conference, February 10-12, 2005, Cambridge, MA. Heidelberg: Springer, 2005: 325-341. |
[12] |
DING Yong, WANG Bingyao, WANG Yujie, et al. Secure Metering Data Aggregation with Batch Verification in Industrial Smart Grid[J]. IEEE Transactions on Industrial Informatics, 2020, 16(10):6607-6616.
doi: 10.1109/TII.9424 URL |
[13] |
GAI Keke, WU Yulu, ZHU Liehuang, et al. Permissioned Blockchain and Edge Computing Empowered Privacy-preserving Smart Grid Networks[J]. IEEE Internet of Things Journal, 2019, 6(5):7992-8004.
doi: 10.1109/JIOT.2019.2904303 |
[14] |
WANG Jing, WU Libing, CHOO K K R, et al. Blockchain-based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure[J]. IEEE Transactions on Industrial Informatics, 2019, 16(3):1984-1992.
doi: 10.1109/TII.9424 URL |
[15] |
LU Yunlong, HUANG Xiaohong, DAI Yueyue, et al. Blockchain and Federated Learning for Privacy-preserved Data Sharing in Industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2019, 16(6):4177-4186.
doi: 10.1109/TII.9424 URL |
[16] | CHEN Siguang, YANG Yi, HUANG Liming, et al. Data Aggregation for Smart Power Grid Security and Privacy Protection Based on Fog Computing[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2019, 39(6):62-72. |
陈思光, 杨熠, 黄黎明, 等. 基于雾计算的智能电网安全与隐私保护数据聚合研究[J]. 南京邮电大学学报(自然科学版), 2019, 39(6):62-72. | |
[17] | VANDIJK M, GENTRY C, HALEVI S, et al. Fully Homomorphic Encryption over the Integers[C]// Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30- June 3, 2010, Berlin, Heidelberg: Springer, 2010: 24-43. |
[18] |
LI Fengjun, LUO Bo, LIU Peng. Secure and Privacy-preserving Information Aggregation for Smart Grids[J]. International Journal of Security and Networks, 2011, 6(1):28-39.
doi: 10.1504/IJSN.2011.039631 URL |
[19] |
GAI Keke, QIU Meikang. Blend Arithmetic Operations on Tensor-based Fully Homomorphic Encryption over Real Numbers[J]. IEEE Transactions on Industrial Informatics, 2017, 14(8):3590-3598.
doi: 10.1109/TII.9424 URL |
[20] | RIVEST R L, ADLEMAN L, DERTOUZOS M L. On Data Banks and Privacy Homomorphisms[J]. Foundations of Secure Computation, 1978, 4(11):169-180. |
[21] | HE Wei, ZHAO Bo, LIU Yubo. Real-time Electricity Pricing Scheme Based on Privacy Protection[J]. Application Research of Computers, 2019, 36(6):1788-1792. |
何薇, 赵波, 刘育博. 基于隐私保护的实时电价计费方案[J]. 计算机应用研究, 2019, 36(6):1788-1792. | |
[22] | JIAO Zhen, WANG Zhaojun, GUO Hongxia, et al. Data Aggregation Scheme of Smart Electricity Meter Based on Homomorphic Encryption[J]. Information Technology, 2020, 44(5):32-36. |
矫真, 王兆军, 郭红霞, 等. 基于同态加密的智能电表数据聚合方案[J]. 信息技术, 2020, 44(5):32-36. | |
[23] | HUANG Yue. Research and Application of Efficient Data Aggregation Algorithm for Privacy Protection[D]. Shanghai: East China Normal University, 2020. |
黄悦. 高效的隐私保护数据聚合算法的研究与应用[D]. 上海:华东师范大学, 2020. | |
[24] | CHEN Meihuan. Research on Data Aggregation Scheme for Privacy Protection in Smart Grid[D]. Chongqing: Chongqing University of Posts and Telecommunications, 2020. |
陈美欢. 智能电网中面向隐私保护的数据聚合方案研究[D]. 重庆:重庆邮电大学, 2020. | |
[25] | YANG Xuhui. Research on Privacy Protection of Smart Grid Based on Data Aggregation[D]. Beijing:North China Electric Power University, 2019. |
杨旭辉. 基于数据聚合的智能电网隐私保护问题研究[D]. 北京:华北电力大学, 2019. | |
[26] |
ZHAO Shuai, LI Fenghua, LI Hongwei, et al. Smart and Practical Privacy-preserving Data Aggregation for Fog-based Smart Grids[J]. IEEE Transactions on Information Forensics and Security, 2020, 16(11):521-536.
doi: 10.1109/TIFS.2020.3014487 URL |
[27] | SHI Jing, ZHANG Rui, LIU Yunzhong, et al. Prisense: Privacy-preserving Data Aggregation in People-centric Urban Sensing Systems[C]// IEEE. 2010 Proceedings IEEE INFOCOM, March 14-19,2010, San Diego, CA, USA. New York: IEEE, 2010: 1-9. |
[28] |
LI Qinghua, CAO Guohong, PORTA T F. Efficient and Privacy-aware Data Aggregation in Mobile Sensing[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 11(2):115-129.
doi: 10.1109/TDSC.2013.31 URL |
[29] |
ZHANG Rui, SHI Jing, ZHANG Yanchao, et al. Verifiable Privacy-preserving Aggregation in People-centric Urban Sensing Systems[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9):268-278.
doi: 10.1109/JSAC.2013.SUP.0513024 URL |
[30] |
CHEN Le, LU Rongxin, CAO Zhenfu, et al. MuDA: Multifunctional Data Aggregation in Privacy-preserving Smart Grid Communications[J]. Peer-to-peer Networking and Applications, 2015, 8(5):777-792.
doi: 10.1007/s12083-014-0292-0 URL |
[31] |
HAN Song, ZHAO Shuai, LI Qinghua, et al. PPM-HDA: Privacy-preserving and Multifunctional Health Data Aggregation with Fault Tolerance[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(9):1940-1955.
doi: 10.1109/TIFS.2015.2472369 URL |
[32] |
WU Haiqin, WANG Liangmin, XUE Guoliang. Privacy-aware Task Allocation and Data Aggregation in Fog-assisted Spatial Crowdsourcing[J]. IEEE Transactions on Network Science and Engineering, 2019, 7(1):589-602.
doi: 10.1109/TNSE.6488902 URL |
[33] | ZENG Xiaoli. Research on Privacy Protection of Data Transmission and Query in Smart Grid[D]. Harbin: Harbin Institute of Technology, 2017. |
曾晓立. 智能电网中数据传输及查询的隐私保护问题研究[D]. 哈尔滨:哈尔滨工业大学, 2017. |
[1] | SUN Li. Research and Application of Information Protection Mechanism for Online Education Resource Alliance [J]. Netinfo Security, 2021, 21(9): 32-39. |
[2] | TAO Yunting, KONG Fanyu, YU Jia, XU Qiuliang. Survey of Number Theoretic Transform Algorithms for Quantum-resistant Lattice-based Cryptography [J]. Netinfo Security, 2021, 21(9): 46-51. |
[3] | CHEN Kaijie, XIONG Yan, HUANG Wenchao, WU Jianshuang. A Formal Analysis Method of PoS Consensus Protocol Based on Byzantine Fault Tolerance [J]. Netinfo Security, 2021, 21(8): 35-42. |
[4] | JIN Shuting, HE Jingsha, ZHU Nafei, PAN Shijia. Research on Privacy Protection Access Control Mechanism Based on Ontology Reasoning [J]. Netinfo Security, 2021, 21(8): 52-61. |
[5] | REN Tao, JIN Ruochen, LUO Yongmei. Network Intrusion Detection Algorithm Integrating Blockchain and Federated Learning [J]. Netinfo Security, 2021, 21(7): 27-34. |
[6] | WU Yi, ZHONG Sheng. Research on Raft Consensus Algorithm for Blockchain [J]. Netinfo Security, 2021, 21(6): 36-44. |
[7] | LI Peng, ZHENG Tiantian, XU He, ZHU Feng. RFID Security Authentication Protocol Based on Blockchain Technology [J]. Netinfo Security, 2021, 21(5): 1-11. |
[8] | ZHOU Yousheng, ZHONG Tianqi. Blockchain-based Fair Exchange Scheme [J]. Netinfo Security, 2021, 21(5): 19-30. |
[9] | LIU Zi’ang, HUANG Yuanyuan, MA Jiali, ZHOU Rui. Design and Implementation of Monitoring Platform for Medical Data Abuse Based on Blockchain [J]. Netinfo Security, 2021, 21(5): 58-66. |
[10] | REN Hang, CHENG Xiangguo, ZHANG Rui, XIA Hui. A Novel Fraud Prevention Strategy Based on Bargaining Bayesian Game Model [J]. Netinfo Security, 2021, 21(4): 81-88. |
[11] | ZHOU Yousheng, WANG Ming, LIU Yuanni. Privacy Protection Scheme Supporting Interval Query for LBS Outsourced Data [J]. Netinfo Security, 2021, 21(3): 26-36. |
[12] | LU Xiaofeng, FU Songbing. A Trusted Data Access Control Scheme Combining Attribute-based Encryption and Blockchain [J]. Netinfo Security, 2021, 21(3): 7-8. |
[13] | ZHANG Yinghui, ZHU Tian, ZHENG Dong. Multi-keyword Fine-grained Searchable Encryption Scheme Based on Blockchain [J]. Netinfo Security, 2021, 21(2): 34-44. |
[14] | WANG Jian, YU Hang, HAN Zhen, HAN Lei. Access Control Methods of Data Sharing in Cloud Storage Based on Smart Contract [J]. Netinfo Security, 2021, 21(11): 40-47. |
[15] | LI Tong, ZHOU Xiaoming, REN Shuai, XU Jian. Light-weight Mutual Authentication Protocol for Mobile Edge Computing [J]. Netinfo Security, 2021, 21(11): 58-64. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||