摘要 随着智能电网和通信技术的发展,智能电表的普及应用受到越来越多的重视.一方面,智能电表为用户合理用电和电力公司有效供电、高效收费带来了便利,而另一方面细粒度的智能电表数据泄露用户用电行为等敏感信息,用户隐私泄露也成为最大的安全威胁.主要从智能电表端的身份隐私保护技术和数据隐私保护技术两个方面来综述国内外相关研究.对比分析了现有隐私保护技术的隐私保护强度、计算开销、传输开销等;提炼了智能电表仍然面临的安全与隐私挑战,并探讨了该领域未来的研究趋势与方向.Abstract:With the development of the smart grid and communication technologies, smart meters have attracted increasing attentions. On the one hand, smart meters brought considerable convenience for users with better electricity consumption management and power companies′ effective power supply and efficient billing; on the other hand, it raised security threat that finegrained smart meter data could reveal users′ private information. This paper conducted a thorough survey on existing solutions mainly from identity privacy protection approach and data privacy protection approach. We deeply compared their privacyrelated factors, such as the strength of privacy protection, computational overhead, transmission overhead. Finally, we investigated the remaining challenges to protect user privacy in smart meter and discussed plausible and promising trends and directions for future research.
References
[1]
GELLINGS C W. The smart grid: enabling energy efficiency and demand response[M]. Lilburn GA: Fairmont Press, 2009.
CHAUMM D. Blind signatures for untraceable payments[C]//Proceedings of CRYPTO′82 Conference on Advances in Cryptology. California USA: Springer Berlin Heidelberg, 1982: 199203.
[4]
YU C M, CHEN C Y, KUO S Y, et al. Privacypreserving power request in smart grid networks [J]. IEEE Systems Journal, 2014, 8(2): 441449.
[5]
LIN X, LU R, ZHU H, et al. ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks[C]//Proceedings of the IEEE ICC. Glasgow, 2007: 12471253.
[6]
CHIM T W, YIU S M, LUCAS C K, et al. PASS: Privacypreserving authentication scheme for smart grid network[C]//Proceedings of the IEEE International Conference on Smart Grid Communications. Brussels, 2011: 196201.
[7]
CHIM T W, YIU S M, HUI L C K, et al. PRGA: Privacypreserving recording & gatewayassisted authentication of power usage information for smart Grid[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 12(1): 8597.
[8]
KALISKI B, STADDON J. RSA Cryptography Specifications Version 2.0[M].[s.l]: The Internet Society, 1998.
[9]
EFTHMIOU C, KALOGRIDIS G. Smart grid privacy via anonymization of smart metering data[C]//Proceedings of the 1st IEEE International Conference on Smart Grid Communications. Gaithersburg, MD, 2010: 238243.
[10]
TIAN X X, SHA C F, WANG X L, et al. Privacy preserving query processing on secret share based data storage[C]//Proceedings of the 16th International Conference on Database Systems for Advanced Applications(DASFAA 2011). Hong Kong China: LNCS6587, 2011: 108122.
TIAN X X, HUANG L, WANG Y, et al. DualAcE: finegrained dual access control enforcement with multiprivacy guarantee in DaaS[J]. Security and Communication Networks, 2014, 8(8): 14941508.
FOUDA M M, FADLULLAH Z M, KATO N, et al. A lightweight message authentication scheme for smart grid communications[J]. IEEE Transactions on Smart Grid, 2011, 2(4): 675685.
[17]
FOUDA M M, FADLULLAH Z M, KATO N, et al. Towards a lightweight message authentication mechanism tailored for smart grid communications[C]//Proceedings of the IEEE International Conferrance on Information Networking. Shanghai, 2011: 10181023.
[18]
ELISA B, KENJI T. Identity management concepts, technologies, and systems[M]. Boston: Artech House, 2011.
LI F, LUO B, LIU P. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption[C]//Proceedings of the 1st IEEE International Conference on Smart Grid Communication. Gaithersburg, MD, 2010: 327332.
[23]
CHEUNG J C L, CHIM T W, YIU S M, et al. Credentialbased privacypreserving power request scheme for smart grid network[C]//Proceedings of the IEEE Global Telecommunications Conference. Houston, 2011: 15.
[24]
LEE S, BONG J, SHIN S, et al. A security mechanism of smart grid AMI network through smart device mutual authentication[C]//Proceedings of 2014 IEEE International Conference on Information Networking. Phuket, 2014: 592595.
[25]
BELLARE M, GOLDREICH O. On defining proofs of knowledge[C]//Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer Berlin Heidelberg, 1992: 390420.
[26]
MARKHAM M M, SHENOY P, FU F, et al. Private memoirs of a smart meter[C]//Proceedings of the 2010 ACM BuildSys International Conference on Embedded Systems for EnergyEfficient Buildings. Zurich: ACM, 2010: 6166.
[27]
RIAL A, DANEZIS G. PrivacyPreserving Smart Metering[C]//Highlights of the Information Security Solutions Europe 2012 Conference. Europe: Springer Berlin Heidelberg, 2012: 105115.
[28]
SCHNORR C. Efficient signature generation for smart cards[J]. Journal of Cryptology, 1991, 4(3):239252.
[29]
CHAUM D, PEDERSEN T. Wallet databases with observers[C]//Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1993:89105.
[30]
OKAMOTO T. An efficient divisible electronic cash scheme[C]//Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1995: 438451.
[31]
BOOUDOT F. Efficient proofs that a committed number lies in an interval[C]//Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques. Bruges, Belgium: Springer Berlin Heidelberg, 2000: 431444.
[32]
CRAMER R, DAMGARD I, SCHOENMAKERS B. Proofs of partial knowledge and simplified design of witness hiding protocols[C]//Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1994: 174187.
[33]
FIAT A, SHAMIR A. How to prove yourself: Practical solutions to identification and signature problems[C]//Proceedings of the Advances in Cryptology. [s.l.]: Springer Berlin Heidelberg, 1987: 186194.
[34]
ERKIN Z, TRONCOSOPPASTORIZA J R, LAGENDIJK R L, et al. Privacypreserving data aggregation in smart metering systems: an overview[J]. IEEE Signal Processing Society, 2013, 30(2): 7586.
[35]
PAILLIER P. Publickey cryptosystems based on composite degree residuosity classes[C]//Proceedings of the 17th International Conference on Theory Application Cryptographic Techniques. Prague, Czech Republic: Springer Berlin Heidelberg, 1999: 223238.
[36]
ERKIN Z, TSUDIK G. Private computation of spatial and temporal power consumption with smart meters[C]//Proceedings of the International Conference on Applied Cryptography and Network Security. Singapore: Springer Berlin Heidelberg, 2012: 561577.
[37]
GARCIA F D, JACOBS B. Privacyfriendly energymetering via homomorphic encryption[C]//Proceedings of the 6th Workshop on Security and Trust Management. Athens, Greece: Springer Berlin Heidelberg, 2010: 226238.
[38]
KURSAWE K, DANEZIS G, KOHLWEISS M. Privacyfriendly aggregation for the smartgrid[C]//Proceedings of the 11th International Symposium on Privacy Enhancing Technologies. Waterloo, Canada: Springer Berlin Heidelberg, 2011: 175191.
[39]
CS G, CASTELLUCCIA C. I have a DREAM! (differentially private smart metering)[C]//Proceedings of the 13th international conference on Information hiding. [s.l.]: Springer Berlin Heidelberg, 2011: 118132.
[40]
DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[C]//Proceedings of the 3rd Theory of Cryptography Conference. New York: Springer Berlin Heidelberg, 2006: 265284.
[41]
DWORK C. Differential privacy: A survey of results[C]//Proceedings of the 3rd International Conference on Theory and Applications of Models of Computation. Xi’an China: Springer Berlin Heidelberg, 2008: 119.
[42]
RASTAGI V, NATH S. Differentially private aggregation of distributed timeseries with transformation and encryption[C]//Proceedings of the 2010 ACM SIGMOD International Conference on Management of data. Indiana: ACM, 2010: 611.
[43]
VARODAYAN D. KHISTI A. Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage[C]//Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Prague: Czech Republic, 2011: 19321935.
[44]
KALOGRIDIS G, EFTHYMIOOU C, DENIC S, et al. Privacy for smart meters: towards undetectable appliance load signatures[C]//Proceedings of the IEEE International Conference on Smart Grid Communications. Gaithersburg, MD, 2010: 232237.
[45]
ARNOLD D M, LOELIGER H A, VONTOBEL P O, et al. Simulationbased computation of information rates for channels with memory[J]. IEEE Transactions on Information Theory, 2006, 52(8): 34983508.