3.8 Proceedings Paper

Secure Decentralized Access Control Policy for Data Sharing in Smart Grid

Publisher

IEEE
DOI: 10.1109/INFOCOMWKSHPS51825.2021.9484474

Keywords

Attribute based signcryption; Decentralized attribute based encryption; Smart grid

Funding

  1. National Nature Science Foundation of China [61872087]
  2. National Cryptography Development Fund [MMJJ20180209]
  3. International S&T Cooperation Program of Shaanxi Province [2019KW-056]
  4. Key Foundation of National Natural Science Foundation of China [U19B2021]

Ask authors/readers for more resources

Smart grid has enhanced the security and efficiency of the power system through intelligent management, but it may lead to issues such as leakage of user privacy and loss of data control rights. Existing solutions have limitations, and this paper introduces a decentralized attribute-based data sharing scheme to address these problems.
Smart grid has improved the security, efficiency of the power system and balanced the supply and demand by intelligent management, which enhanced stability and reliability of power grid. The key point to achieve them is real-time data and consumption data sharing by using fine-grained policies. But it will bring the leakage of the privacy of the users and the loss of data control rights of the data owner. The reported solutions can not give the best trade-off among the privacy protection, control over the data shared and confidentiality. In addition, they can not solve the problems of large computation overhead and dynamic management such as users' revocation. This paper aims at these problems and proposes a decentralized attribute-based data sharing scheme. The proposed scheme ensures the secure sharing of data while removing the central authority and hiding user's identity information. It uses attribute-based signcryption (ABSC) to achieve data confidentiality and authentication. Under this model, attribute-based encryption gives the access policies for users and keeps the data confidentiality, and the attribute-based signature is used for authentication of the primary ciphertext-integrity. It is more efficient than encrypt and then sign or sign and then encrypt. In addition, the proposed scheme enables user's revocation and public verifiability. tinder the random oracle model, the security and the unforgeability against adaptive chosen message attack are demonstrated.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available