EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.

Slides:



Advertisements
Similar presentations
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.
Advertisements

Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
1 Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network University of Waterloo & University of Ontario Institute.
Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid Rong Jiang
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin Date: March 13, 2007.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Paillier Threshold Encryption WebService by Brett Wilson.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards Computer and Information Security Ming-Hong Shih.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
1/11/2007 bswilson/eVote-PTCWS 1 Enhancing PTC based Secure E-Voting System (note: modification of Brett Wilson’s Paillier Threshold Cryptography Web Service.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
An Efficient Identity-based Cryptosystem for
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological University June.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen, Jiming Chen.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Homework #2 J. H. Wang Oct. 31, 2012.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Security of a Remote Users Authentication Scheme Using Smart Cards
Privacy Preserving Ranked Multi-Keyword
Efficient CRT-Based RSA Cryptosystems
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Presentation transcript:

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin (Sherman) Shen IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. 23, NO. 9, SEPTEMBER 2012 Presenter : 周新偉 Date:2014/10/27 1

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 2

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 3

Intorduction 4

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 5

System Model 6

Security Requirements Confidentiality Authentication and Data Integrity 7

Design Goal The secure requirement should be guaranteed in the proposed scheme The communication effectiveness should be achieved in the proposed scheme 8

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 9

Preliminaries 10

Preliminaries----- Paillier Cryptosystem(1/3) Key Generation security parameter κ 1 large prime p 1, q 1 | p 1 |=|q 1 |=|κ 1 | RSA modulus : n=p 1 * q 1 λ=lcm(p 1 -1, q 1 -1 ) L(u)=(u-1)/n μ=(L(g λ modn 2 )) -1 mod n Public key pk = (n,g) Privite key sk = (λ, μ) 11

Preliminaries----- Paillier Crypyosystem(2/3) 12

Preliminaries----- Paillier Crypyosystem(3/3) 13

Outline Introduction System Model, Security Requirement And Design Model Preliminaries EPPA Scheme Security Analysis Performance Conclusions 14

EPPA Scheme--- System Initialization(1/3) 15

EPPA Scheme--- System Initialization(2/3) 16

EPPA Scheme--- System Initialization(3/3) 17

EPPA Scheme--- User Report Generation 18

EPPA Scheme--- Privacy-Preserving Report Aggregation 19

EPPA Scheme--- Privacy-Preserving Report Aggregation After validity checking, the following steps for privacy-preserving report aggregation : 20

EPPA Scheme--- Secure Report Reading And Response(1/6) 21

EPPA Scheme--- Secure Report Reading And Response(2/6) Taking And the report C=g M R n mod n 2 is still ciphertext for Paillier Cryptosystem OA use master key to recover M 22

EPPA Scheme--- Secure Report Reading And Response(3/6) By invoking algorithm 1,OA can recover and store the aggregated data 23

EPPA Scheme--- Secure Report Reading And Response(4/6) Correctness of algorithm 1,assume X l =M Since any type of data is less than d, 24

EPPA Scheme--- Secure Report Reading And Response(5/6) 25

EPPA Scheme--- Secure Report Reading And Response(6/6) 26

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 27

Security Analysis(1/2) 28

Security Analysis(2/2) 29

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 30

Performance(1/3) 31

Performance(1/3) 32

Performance(2/3) 33

Performance(3/3) 34

Outline Intorduction Systrm Model,Security Requirement And Design Model Preliminaries EPPA Schmem Security Analysis Performance Conclusions 35

Conclusions In this paper, we have proposed an efficient and privacypreserving aggregation scheme for secure smart grid communications. It realizes a multidimensional data aggregation approach based on the homomorphic Paillier cryptosystem. Compared with the traditional one-dimensional data aggregation methods, EPPA can significantly reduce computational cost and significantly improve communication efficiency, satisfying the real-time high-frequency data collection requirements in smart grid communications. We have also provided security analysis to demonstrate its security strength and privacy- preserving ability, and performance analysis to show the efficiency improvement. For the future work, we will study the possible behavior by internal attackers and extend the EPPA scheme to effectively resist such attacks. 36

心得 37

38 Thanks for your listening