Abstract
Recently, traditional power grid cannot satisfy the today’s fast development trend of the market, and a more intelligent power system named smart grid is developed acting a significant power infrastructure. How to achieve the energy sellers and buyers’ interact efficiently is a challenging problem for smart grid. The auction requires energy buyers to provide their private bid information to the energy auction servers. However, energy buyers usually do not expect the real information of the bid get leaked out, especially known by other competitors. That means the energy sellers need to inquire suitable bids while preserving the privacy of the energy buyers. In this paper, we propose a novel privacy-preserving degree-matching (PPDM) multi-attribute auction scheme which the winner is generated by comparing sorted all of matching degree between sale solution supplied by energy sellers and biddings submitted by energy buyers. Also, the quantitative and qualitative attributes are classified as quantitative assessment finally in energy sellers and buyers’ bid. Security analysis demonstrates that our scheme based on the difficulty of integer factorization assumption can secure auction privacy, multi-attribute matching, personalized search, and ranked search. Furthermore, performance evaluation shows that the PPDM can significantly reduce computation overhead and it also has moderate communication overhead.
Similar content being viewed by others
References
Cisco I (2009) Internet protocol architecture for the smart grid
Liserre M, Sauter T, John Y H (2010) Future energy systems integrating renewable energy sources into the smart power grid through industrial electronics. IEEE Ind Electron Mag 4(1):18–37
Gungor V C, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke G P (2011) Smart grid technologies: communication technologies and standards. IEEE Trans Ind Inf 7(4):529–539
Hart M (2011) China pours money into smart grid technology. Center for American Progress, Washington DC
Fang X, Misra S, Xue G, Yang D (2012) Smart grid—the new and improved power grid: a survey. IEEE Commun Surv Tutorials 14(4):944–980
Locke G, Gallagher P D (2010) Nist framework and roadmap for smart grid interoperability standards, release 1.0. National Institute of Standards and Technology 33
Nguyen D T, Negnevitsky M, De Groot M (2011) Pool-based demand response exchange—concept and modeling. IEEE Trans Power Syst 26(3):1677–1685
Yuen C, Oudalov A, Timbus A (2011) The provision of frequency control reserves from multiple microgrids. IEEE Trans Ind Electron 58(1):173–183
Ramachandran B, Srivastava S K, Edrington C S, Cartes D A (2011) An intelligent auction scheme for smart grid market using a hybrid immune algorithm. IEEE Trans Ind Electron 58(10):4603–4612
Han J, Piette M A (2008) Solutions for summer electric power shortages: demand response and its applications in air conditioning and refrigerating systems. Lawrence Berkeley National Laboratory
Mohagheghi S, Stoupis J, Wang Z, Li Z, Kazemzadeh H (2010) Demand response architecture: integration into the distribution management system. In: First IEEE international conference on smart grid communications (smartgridcomm), 2010. IEEE, pp 501–506
Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166–176
Gu B, Sun X, Sheng VS (2016) Structural minimax probability machine
Shen J, Tan H -W, Wang J, Wang J -W, Lee S -Y (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178
Zheng Y, Jeon B, Xu D, Wu Q M, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy c-means algorithm. J Intell Fuzzy Syst 28(2):961–973
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of lsb matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Xie S, Wang Y (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel Pers Commun 78(1):231–246
Chen B, Shu H, Coatrieux G, Chen G, Sun X, Coatrieux J L (2015) Color image analysis by quaternion-type moments. J Math Imag Vis 51(1):124–144
Wen X, Shao L, Xue Y, Fang W (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forens Secur 10(3):507–518
Guo P, Wang J, Geng X H, Kim C S, Kim J -U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Int Technol 15(6):929–935
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291
Tinghuai MA, Jinjuan Z, Meili T, Yuan T, Abdullah A -D, Mznah A -R, Sungyoung L (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst 98(4):902–910
Lu R, Liang X, Li X, Lin X, Shen X (2012) Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631
He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security
He D, Kumar N, Shen H, Lee J -H (2015) One-to-many authentication for access control in mobile pay-tv systems. Sci Chin Inf Sci 1–14
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement
Zhangjie F, Xingming S, Qi L, Lu Z, Jiangang S (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98 (1):190–200
Ren Y -J, Shen J, Wang J, Han J, Lee S -Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Int Technol 16(2):317–323
Li H, Liang X, Lu R, Lin X, Shen X (2012) Edr: an efficient demand response scheme for achieving forward secrecy in smart grid. In: 2012 IEEE of Global communications conference (GLOBECOM). IEEE, pp 929–934
Li M-J, Juan J S -T, Tsai J H-C (2011) Practical electronic auction scheme with strong anonymity and bidding privacy. Inf Sci 181(12):2576–2586
Shih D -H, Yen D C, Cheng C -H, Shih M -H (2011) A secure multi-item e-auction mechanism with bid privacy. Comput Secur 30(4):273–287
Shi W (2013) A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. Secur Commun Netw 6(10):1281–1289
Wen M, Lu R, Lei J, Liang X, Li H, Shen X (2013) Ecq: an efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: 2013 IEEE Global communications conference (GLOBECOM). IEEE, pp 796–801
Wen M, Lu R, Lei J, Li H, Liang X, Shen X S (2014) Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur Commun Netw 7(1):234–244
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522
Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663
Li H, Yang Y, Wen M, Luo H, Lu R (2014) Emrq: an efficient multi-keyword range query scheme in smart grid auction market. TIIS 8(11):3937–3954
Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. In: 2014 IEEE international conference on communications (ICC). IEEE, pp 951–956
Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) Parq: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Topics Comput 1(1):178– 191
Jiang R, Lu R, Choo K -K R (2016) Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Futur Gener Comput Syst
Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press
Brickell J, Shmatikov V (2005) Privacy-preserving graph algorithms in the semi-honest model. In: International conference on the theory and application of cryptology and information security. Springer, pp 236–252
Hoffstein J, Pipher J, Silverman J H, Silverman J H (2008) An introduction to mathematical cryptography, vol 1. Springer
Shoup V (2009) A computational introduction to number theory and algebra. Cambridge University Press
Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 639–644
Barbulescu R, Gaudry P, Kleinjung T (2014) The tower number field sieve. In: International conference on the theory and application of cryptology and information security. Springer, pp 31–55
Multiprecision integer and rational arithmetic c/c++ library. http://www.certivox.com/miracl/
The pbc (pairing-based cryptography) library. https://crypto.stanford.edu/pbc/
Boran F E, Genç S, Kurt M, Akay D (2009) A multi-criteria intuitionistic fuzzy group decision making for supplier selection with topsis method. Expert Syst Appl 36(8):11363–11368
Acknowledgements
The authors thank the editors and the anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China (Grant Nos. 61472074, 61300237, 61401083, 61601107, 61672295), Hebei Province Top Young Talents, the Natural Science Foundation of Hebei Province of China (Grant Nos. F2015501122, F2014501139);the Doctoral Scientific Research Foundation of Liaoning Province (Grant No. F201501143). Hebei Province Top Young Talents, the Priority Academic Program Development of Jiangsu Higer Education Institutions, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shi, W., Bao, Z., Wang, J. et al. A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers Ubiquit Comput 21, 779–789 (2017). https://doi.org/10.1007/s00779-017-1055-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-017-1055-8