Journal on Communications ›› 2023, Vol. 44 ›› Issue (4): 187-200.doi: 10.11959/j.issn.1000-436x.2023081
• Papers • Previous Articles Next Articles
Baiji HU1,2, Xiaojuan ZHANG2, Yuancheng LI1, Rongxin LAI1
Revised:
2023-03-23
Online:
2023-04-25
Published:
2023-04-01
Supported by:
CLC Number:
Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network[J]. Journal on Communications, 2023, 44(4): 187-200.
"
符号 | 描述 |
BGN公钥 | |
p | BGN私钥 |
用户层的电动汽车/充电桩总数 | |
雾计算层的雾节点总数 | |
k+ 1 | (k+1,σ)门限秘密共享的阈值 |
第i个电动汽车 | |
第i个充电桩 | |
EVi 的充/放电数据 | |
第i个BGN密文充/放电数据 | |
EVi 的身份标识 | |
CPi 的身份标识 | |
CPi 对第i个BGN密文数据的BLS签名 | |
EVi 向雾节点上报的数据报告 | |
第i个数据报告被打包成的一个交易 | |
聚合器对所有密文进行均值聚合的结果 | |
聚合器对所有密文进行方差聚合的结果 | |
聚合器对所有密文进行单向方差分析聚合的结果 | |
聚合器随机挑选的k+1个正常工作的第 j 个雾节点 | |
Fog j的身份标识 | |
Fog j 对 Am,m=1,…,6 进行秘密共享计算得到的中间值 | |
Fog j计算得到的聚合密文数据 | |
Fog j对聚合密文数据Cj的BLS签名 | |
M | 每个充/放电数据大小的上限 |
[1] | NIMALSIRI N I , MEDIWATHTHE C P , RATNAM E L ,et al. A survey of algorithms for distributed charging control of electric vehicles in smart grid[J]. IEEE Transactions on Intelligent Transportation Systems, 2020,21(11): 4497-4515. |
[2] | HAN W L , XIAO Y . IP2DM:integrated privacy-preserving data management architecture for smart grid V2G networks[J]. Wireless Communications and Mobile Computing, 2016,16(17): 2956-2974. |
[3] | 赵小敏, 梁学利, 蒋双双 ,等. 安全的WSN数据融合隐私保护方案设计[J]. 通信学报, 2014,35(11): 154-161. |
ZHAO X M , LIANG X L , JIANG S S ,et al. Design of secure privacy-preserving data aggregation scheme for wireless sensor network[J]. Journal on Communications, 2014,35(11): 154-161. | |
[4] | HAN W , XIAO Y . Privacy preservation for V2G networks in smart grid:a survey[J]. Computer Communications, 2016,91/92: 17-28. |
[5] | 张晓莹, 彭辉, 陈红 . 无线传感器网络隐私保护数据聚集技术[J]. 通信学报, 2018,39(10): 130-142. |
ZHANG X Y , PENG H , CHEN H . State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks[J]. Journal on Communications, 2018,39(10): 130-142. | |
[6] | LU W F , REN Z H , XU J ,et al. Edge blockchain assisted lightweight privacy-preserving data aggregation for smart grid[J]. IEEE Transactions on Network and Service Management, 2021,18(2): 1246-1259. |
[7] | CHEN L , LU R X , CAO Z F ,et al. MuDA:multifunctional data aggregation in privacy-preserving smart grid communications[J]. Peer-to-Peer Networking and Applications, 2015,8(5): 777-792. |
[8] | ZHANG X J , HUANG C , XU C X ,et al. Key-leakage resilient encrypted data aggregation with lightweight verification in fog-assisted smart grids[J]. IEEE Internet of Things Journal, 2021,8(10): 8234-8245. |
[9] | ZHANG Z Z , CAO T F , WANG X Y ,et al. VC-PPQ:privacy-preserving Q-learning based video caching optimization in mobile edge networks[J]. IEEE Transactions on Network Science and Engineering, 2022,9(6): 4129-4144. |
[10] | WANG J , WU L B , ZEADALLY S ,et al. Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid[J]. ACM Transactions on Sensor Networks, 2021,17(3): 1-25. |
[11] | JOHNSON D , MENEZES A , VANSTONE S . The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001,1(1): 36-63. |
[12] | BONEH D , LYNN B , SHACHAM H . Short signatures from the Weil pairing[C]// Advances in Cryptology - ASIACRYPT 2001. Berlin:Springer, 2001: 514-532. |
[13] | LIU Y N , GUO W , FAN C N ,et al. A practical privacy-preserving data aggregation (3PDA) scheme for smart grid[J]. IEEE Transactions on Industrial Informatics, 2018,15(3): 1767-1774. |
[14] | DING Y , WANG B Y , WANG Y J ,et al. Secure metering data aggregation with batch verification in industrial smart grid[J]. IEEE Transactions on Industrial Informatics, 2020,16(10): 6607-6616. |
[15] | GUO C , JIANG X , CHOO K K R ,et al. Lightweight privacy preserving data aggregation with batch verification for smart grid[J]. Future Generation Computer Systems, 2020,112: 512-523. |
[16] | PENT G M , DHAINI A R , HO P H . Toward integrated cloud-fog networks for efficient IoT provisioning:key challenges and solutions[J]. Future Generation Computer Systems, 2018,88: 606-613. |
[17] | LI X , LIU S P , WU F ,et al. Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications[J]. IEEE Internet of Things Journal, 2019,6(3): 4755-4763. |
[18] | MERAD B O R , SENOUCI S M . An efficient and secure multidimensional data aggregation for fog-computing-based smart grid[J]. IEEE Internet of Things Journal, 2021,8(8): 6143-6153. |
[19] | CHEN S , YANG L , ZHAO C ,et al. Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid[J]. Engineering, 2022,8: 159-169. |
[20] | NAKAMOTO S . BITCOIN:a peer-to-peer electronic cash system[R]. 2008. |
[21] | WANG Y X , LUO F J , DONG Z Y ,et al. Distributed meter data aggregation framework based on Blockchain and homomorphic encryption[J]. IET Cyber-Physical Systems:Theory & Applications, 2019,4(1): 30-37. |
[22] | FAN H B , LIU Y N , ZENG Z X . Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain[J]. Sensors, 2020,20(18): 5282. |
[23] | WANG X D , GARG S , LIN H ,et al. A secure data aggregation strategy in edge computing and blockchain-empowered Internet of things[J]. IEEE Internet of Things Journal, 2022,9(16): 14237-14246. |
[24] | BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF Formulas on Ciphertexts[C]// Theory of Cryptography Conference. Berlin:Springer, 2005: 325-341. |
[25] | MENEZES A J , OORSCHOT P C V , VANSTONE S A . Handbook of applied cryptography[M]. Boca Raton: CRC Press, 2018. |
[26] | SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613. |
[27] | VAHEDI E , BAYAT M , PAKRAVAN M R ,et al. A secure ECC-based privacy preserving data aggregation scheme for smart grids[J]. Computer Networks, 2017,129: 28-36. |
[28] | SHEN H , ZHANG M W , SHEN J . Efficient privacy-preserving cube-data aggregation scheme for smart grids[J]. IEEE Transactions on Information Forensics and Security, 2017,12(6): 1369-1381. |
[29] | ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger Fabric:a distributed operating system for permissioned blockchains[C]// Proceedings of the Thirteenth EuroSystem Conference. New York:ACM Press, 2018: 1-15. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[4] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[5] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[6] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[7] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[8] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[9] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[10] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[11] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[12] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[13] | Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU. Android application privacy protection mechanism based on virtual machine bytecode injection [J]. Journal on Communications, 2021, 42(6): 171-181. |
[14] | Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG. Survey on privacy protection in non-aggregated data sharing [J]. Journal on Communications, 2021, 42(6): 195-212. |
[15] | Yongming HUANG, Chong ZHENG, Zhengming ZHANG, Xiaohu YOU. Research on mobile edge computing and caching in massive wireless communication network [J]. Journal on Communications, 2021, 42(4): 44-61. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|