Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs



Similar documents
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid

End-to-end Secure Data Aggregation in Wireless Sensor Networks

Message Authentication Code

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Secure Computation Martin Beck

Programmable Order-Preserving Secure Index for Encrypted Database Query

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:

Security of smart grid communication protocols

Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Big Data - Security and Privacy

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Secure Aggregation in Hybrid Mesh/Sensor Networks

Efficient Unlinkable Secret Handshakes for Anonymous Communications

The next generation of knowledge and expertise Wireless Security Basics

Cloud Data Storage Security Techniques and Security Issues on Mobile device

Auditing for Distributed Storage Systems

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

1 Construction of CCA-secure encryption

1 Message Authentication

Associate Prof. Dr. Victor Onomza Waziri

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Efficient Data Transmission For Wireless Sensor Networks

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Journal of Electronic Banking Systems

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Monitoring Data Integrity while using TPA in Cloud Environment

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Internet of Things (IoT): A vision, architectural elements, and future directions

Key Agreement from Close Secrets over Unsecured Channels Winter 2010

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

Demand Response Management System Smart systems for Consumer engagement By Vikram Gandotra Siemens Smart Grid

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Improving data integrity on cloud storage services

Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

IoT Security Concerns and Renesas Synergy Solutions

Network Security. Chapter 14. Security Aspects of Mobile Communications

Snow Agent System Pilot Deployment version

CSci 530 Midterm Exam. Fall 2012

Privacy Patterns in Public Clouds

Role Based Encryption with Efficient Access Control in Cloud Storage

Introduction to Computer Security

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Power & Environmental Monitoring

ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo

Computing on Encrypted Data

Replicated Data Integrity Verification in Cloud

Data Security in Unattended Wireless Sensor Network

Verifying Correctness of Trusted data in Clouds

Security Solutions for Wireless Sensor Networks

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

A Road Map on Security Deliverables for Mobile Cloud Application

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

SURVEY ON PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE

Security and Privacy in Big Data, Blessing or Curse?

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Module 1: e- Learning

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

CS558. Network Security. Boston University, Computer Science. Midterm Spring 2014.

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Authentication and Encryption: How to order them? Motivation

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Volume 3, Issue 2, February 2015 International Journal of Advance Research in Computer Science and Management Studies

MACs Message authentication and integrity. Table of contents

A privacy-preserving Concept for Smart Grids

Advanced Authentication

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

A Study on the Security of RFID with Enhancing Privacy Protection

SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

CSC 774 Advanced Network Security. Outline. Related Work

IoT Security Platform

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

Transcription:

Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs Seminar Trustworthy and Energy-Efficient Smart Grids

Overview on Approach Introduced in: [B. Vetter, O. Ugus, D. Westhoff, C. Sorge: Homomorphic Primitives for a Privacy-Friendly Smart Metering Architecture. Proceedings of the International Conference on Security and Cryptography (SECRYPT) 2012.] Protect privacy of customers Allows processing of SQL-queries on encrypted aggregated measurements Flexible to support future thirs party services Can be deployed as a cloud service 2

Basic Idea Store encrypted and authenticated measurements in a database (EMS), allow SQL queries on encrypted measurements supporting various aggregations Encrypted and authenticated measurements Spatial grouping: Measurements of different costumers in a region Temporal grouping: Measurements of single customers over a period of time Homomorphic encryption Homomorphic MACs (Message Authentication Code) Trusted Third Party (TTP) 3

Stakeholders typically involved Energy Provider (EP): sells energy, provides price information to its customers, buy energy, make forecasts, and controls production of energy Gateway (GW): connects the Smart Meters to the Smart Grid, collects Smart Meter data and protects them before sending to the grid Grid Provider (GP): operates the grid, passes aggregated energy consumptions to the EP, need to know accurate energy consumption in a certain region of the grid, operates the meters Smart Meters (SM), customers (C) 4

Suggested Architecture Key authority (KA): trusted third party; responsible for managing certificates and keys for Smart Meters, knows the secret keys of all Smart Meters Set of services S = {s 1, s 2,, s n } representing the GP, the EP, and other services Set of customers C, grouped according to specific aspects, e.g., their location Consumption measured by SM sid for period j: e sid,j Encrypted measurements c sid,j stored in EMS, operated by GP 5

Necessary Keys KA,,, EP SM,,, unique secret encryption key for Smart Meter sid aggregated key for all sid of group G gid for period j MAC key k = (k 1, k 2 ) of EP aggregated MAC keys (k 2 ) for all sid of group G gid for period j 6

Overview SM, enc c sid = enc(k sid, j, e sid ), MAC sid = mac(k mac, c sid ) EMS (GP) EP,,, gid, j, c sid, MAC sid, sid, j sid, zip, city, enc(k,m): encryption of message m using key k mac(k, m): compute MAC for message m using key k 7

Homomorphic Encryption (1) Encrypted measurements of single customers stored in database, services (e.g., EP) are only allowed to decrypt aggregated measurements Additively homomorphic encryption necessary enc(k,m) / dec(k, c) encryption / decryption using key k, ;,, enc(k,m) additively homomorph if there is a and k = f(k 1, k 2 ) such that dec(k, (enc(k 1, m 1 ) enc(k 2, m 2 )) = m 1 + m 2 8

Homomorphic Encryption (2) Suggested approach introduced by Castelluccia et al. [C. Castelluccia, E. Mykletun, G. Tsudik: Efficient Aggregation of Encrypted Sensor Data in Wireless Sensor Networks. Proc. of MobiQuitous, 2005.] enc(k,m) = m + k mod n; dec(k, c) = c k mod n Keys used only once Here: keys for period j computed from SM s unique enc secret key using a one-way hash function h: enc 9

Homomorphic MAC (1) Requesting service must be able to check the validity of the aggregated value (valid if it is composed from the corresponding single measurements only) Additively homomorphic authentication scheme necessary additively homomorphic MAC mac(k, m): compute MAC (t) for message m using key k mac(k,m) additively homomorph (, ) if there is a ( Combine ) such that mac(k, m 1 + m 2 ) = mac(k 1, m 1 ) mac(k 2, m 2 ) 10

Homomorphic MAC (2) Suggested approach introduced by Agrawal and Boneh [S. Agrawal, D. Boneh: Homomorphic MACs: MAC-based Integrity for Network Coding. Proc. Of ACNS, 2009.] Pseudo Random Number Generator G Pseudo Random Function F 0, 1,,, 0, 1 Identifier, 1,, 11

Homomorphic MAC (3) mac(k 1, k 2, m i, id i ):,, Combine((m 1, t 1 ), (m 2, t 2 ),, (m n, t n )): Verify(k 1, k 2, y, t):,,, if output 1, otherwise 0 12