Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Recently, traditional power grid cannot satisfy the today’s fast development trend of the market, and a more intelligent power system named smart grid is developed acting a significant power infrastructure. How to achieve the energy sellers and buyers’ interact efficiently is a challenging problem for smart grid. The auction requires energy buyers to provide their private bid information to the energy auction servers. However, energy buyers usually do not expect the real information of the bid get leaked out, especially known by other competitors. That means the energy sellers need to inquire suitable bids while preserving the privacy of the energy buyers. In this paper, we propose a novel privacy-preserving degree-matching (PPDM) multi-attribute auction scheme which the winner is generated by comparing sorted all of matching degree between sale solution supplied by energy sellers and biddings submitted by energy buyers. Also, the quantitative and qualitative attributes are classified as quantitative assessment finally in energy sellers and buyers’ bid. Security analysis demonstrates that our scheme based on the difficulty of integer factorization assumption can secure auction privacy, multi-attribute matching, personalized search, and ranked search. Furthermore, performance evaluation shows that the PPDM can significantly reduce computation overhead and it also has moderate communication overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Cisco I (2009) Internet protocol architecture for the smart grid

  2. Liserre M, Sauter T, John Y H (2010) Future energy systems integrating renewable energy sources into the smart power grid through industrial electronics. IEEE Ind Electron Mag 4(1):18–37

    Article  Google Scholar 

  3. Gungor V C, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke G P (2011) Smart grid technologies: communication technologies and standards. IEEE Trans Ind Inf 7(4):529–539

    Article  Google Scholar 

  4. Hart M (2011) China pours money into smart grid technology. Center for American Progress, Washington DC

    Google Scholar 

  5. Fang X, Misra S, Xue G, Yang D (2012) Smart grid—the new and improved power grid: a survey. IEEE Commun Surv Tutorials 14(4):944–980

    Article  Google Scholar 

  6. Locke G, Gallagher P D (2010) Nist framework and roadmap for smart grid interoperability standards, release 1.0. National Institute of Standards and Technology 33

  7. Nguyen D T, Negnevitsky M, De Groot M (2011) Pool-based demand response exchange—concept and modeling. IEEE Trans Power Syst 26(3):1677–1685

    Article  Google Scholar 

  8. Yuen C, Oudalov A, Timbus A (2011) The provision of frequency control reserves from multiple microgrids. IEEE Trans Ind Electron 58(1):173–183

    Article  Google Scholar 

  9. Ramachandran B, Srivastava S K, Edrington C S, Cartes D A (2011) An intelligent auction scheme for smart grid market using a hybrid immune algorithm. IEEE Trans Ind Electron 58(10):4603–4612

    Article  Google Scholar 

  10. Han J, Piette M A (2008) Solutions for summer electric power shortages: demand response and its applications in air conditioning and refrigerating systems. Lawrence Berkeley National Laboratory

  11. Mohagheghi S, Stoupis J, Wang Z, Li Z, Kazemzadeh H (2010) Demand response architecture: integration into the distribution management system. In: First IEEE international conference on smart grid communications (smartgridcomm), 2010. IEEE, pp 501–506

  12. Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166–176

    Article  Google Scholar 

  13. Gu B, Sun X, Sheng VS (2016) Structural minimax probability machine

  14. Shen J, Tan H -W, Wang J, Wang J -W, Lee S -Y (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178

    Google Scholar 

  15. Zheng Y, Jeon B, Xu D, Wu Q M, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy c-means algorithm. J Intell Fuzzy Syst 28(2):961–973

    Google Scholar 

  16. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of lsb matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962

    Article  Google Scholar 

  17. Xie S, Wang Y (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel Pers Commun 78(1):231–246

    Article  Google Scholar 

  18. Chen B, Shu H, Coatrieux G, Chen G, Sun X, Coatrieux J L (2015) Color image analysis by quaternion-type moments. J Math Imag Vis 51(1):124–144

    Article  MathSciNet  MATH  Google Scholar 

  19. Wen X, Shao L, Xue Y, Fang W (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406

    Article  Google Scholar 

  20. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518

    Article  Google Scholar 

  21. Guo P, Wang J, Geng X H, Kim C S, Kim J -U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Int Technol 15(6):929–935

    Google Scholar 

  22. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  23. Tinghuai MA, Jinjuan Z, Meili T, Yuan T, Abdullah A -D, Mznah A -R, Sungyoung L (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst 98(4):902–910

    Google Scholar 

  24. Lu R, Liang X, Li X, Lin X, Shen X (2012) Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631

    Article  Google Scholar 

  25. He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security

  26. He D, Kumar N, Shen H, Lee J -H (2015) One-to-many authentication for access control in mobile pay-tv systems. Sci Chin Inf Sci 1–14

  27. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  28. Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement

  29. Zhangjie F, Xingming S, Qi L, Lu Z, Jiangang S (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98 (1):190–200

    Google Scholar 

  30. Ren Y -J, Shen J, Wang J, Han J, Lee S -Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Int Technol 16(2):317–323

    Google Scholar 

  31. Li H, Liang X, Lu R, Lin X, Shen X (2012) Edr: an efficient demand response scheme for achieving forward secrecy in smart grid. In: 2012 IEEE of Global communications conference (GLOBECOM). IEEE, pp 929–934

  32. Li M-J, Juan J S -T, Tsai J H-C (2011) Practical electronic auction scheme with strong anonymity and bidding privacy. Inf Sci 181(12):2576–2586

    Article  MathSciNet  MATH  Google Scholar 

  33. Shih D -H, Yen D C, Cheng C -H, Shih M -H (2011) A secure multi-item e-auction mechanism with bid privacy. Comput Secur 30(4):273–287

    Article  Google Scholar 

  34. Shi W (2013) A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. Secur Commun Netw 6(10):1281–1289

    Google Scholar 

  35. Wen M, Lu R, Lei J, Liang X, Li H, Shen X (2013) Ecq: an efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: 2013 IEEE Global communications conference (GLOBECOM). IEEE, pp 796–801

  36. Wen M, Lu R, Lei J, Li H, Liang X, Shen X S (2014) Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur Commun Netw 7(1):234–244

    Article  Google Scholar 

  37. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522

  38. Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663

    Article  Google Scholar 

  39. Li H, Yang Y, Wen M, Luo H, Lu R (2014) Emrq: an efficient multi-keyword range query scheme in smart grid auction market. TIIS 8(11):3937–3954

    Google Scholar 

  40. Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. In: 2014 IEEE international conference on communications (ICC). IEEE, pp 951–956

  41. Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) Parq: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Topics Comput 1(1):178– 191

    Article  Google Scholar 

  42. Jiang R, Lu R, Choo K -K R (2016) Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Futur Gener Comput Syst

  43. Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press

  44. Brickell J, Shmatikov V (2005) Privacy-preserving graph algorithms in the semi-honest model. In: International conference on the theory and application of cryptology and information security. Springer, pp 236–252

  45. Hoffstein J, Pipher J, Silverman J H, Silverman J H (2008) An introduction to mathematical cryptography, vol 1. Springer

  46. Shoup V (2009) A computational introduction to number theory and algebra. Cambridge University Press

  47. Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 639–644

  48. Barbulescu R, Gaudry P, Kleinjung T (2014) The tower number field sieve. In: International conference on the theory and application of cryptology and information security. Springer, pp 31–55

  49. Multiprecision integer and rational arithmetic c/c++ library. http://www.certivox.com/miracl/

  50. The pbc (pairing-based cryptography) library. https://crypto.stanford.edu/pbc/

  51. Boran F E, Genç S, Kurt M, Akay D (2009) A multi-criteria intuitionistic fuzzy group decision making for supplier selection with topsis method. Expert Syst Appl 36(8):11363–11368

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the editors and the anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China (Grant Nos. 61472074, 61300237, 61401083, 61601107, 61672295), Hebei Province Top Young Talents, the Natural Science Foundation of Hebei Province of China (Grant Nos. F2015501122, F2014501139);the Doctoral Scientific Research Foundation of Liaoning Province (Grant No. F201501143). Hebei Province Top Young Talents, the Priority Academic Program Development of Jiangsu Higer Education Institutions, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, W., Bao, Z., Wang, J. et al. A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers Ubiquit Comput 21, 779–789 (2017). https://doi.org/10.1007/s00779-017-1055-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1055-8

Keywords