Skip to main content

Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT

  • Conference paper
  • First Online:
Intelligent Computing & Optimization (ICO 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 866))

Included in the following conference series:

Abstract

Apropos to communication in conventional computer network or in electronics, in electrical field, the smart grid is the approach to transfer the electricity through distribution of network. It not only improves the security, reliability of electric system but also the communication of it too. Recently J Hur in IEEE Tran. on Smart Grid proposed an approach to provide an efficient and secure scheme in smart grid using attribute based analogy. The author claim that the proposed scheme is also provide the receiver anonymity which is one of the crucial feature of smart grid. However, in this paper, we claim that the scheme presented by Hur, fails to provide receiver anonymity as well as it is susceptible to the key escrow attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11), 2171–2180 (2013)

    Article  Google Scholar 

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334 (2007)

    Google Scholar 

  3. Vijayanand, R., Devaraj, D., Kannapiran, B.: A novel dual euclidean algorithm for secure data transmission in smart grid system. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–5. (2014)

    Google Scholar 

  4. Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-Grid security issues. IEEE Secur. Priv. 8(1), 81–85 (2010)

    Article  Google Scholar 

  5. Kim, Y., Thottan, M., Kolesnikov, V., Lee, W.: A secure decentralized data-centric information infrastructure for smart grid. IEEE Comm. Mag. 48(11), 58–65 (2010)

    Article  Google Scholar 

  6. Bobba, R., Khurana, H., AlTurki, M., Ashraf, F.: PBES: A policy based encryption system with application to data sharing in the power grid. In: Proceedings of the International Symposium on Information, Computer, and Communications Security (ASIACCS 2009) (2009)

    Google Scholar 

  7. The Cyber Security Coordination Task Group: Smart grid cyber security strategy and requirements. NIST Technical Report Draft NISTIR 7628 (2009, Sept)

    Google Scholar 

  8. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456–465 (2007)

    Google Scholar 

  9. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute-based encryption. In: Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP), pp. 579–591 (2008)

    Google Scholar 

  10. Liang, X., Cao, Z., Lin, H., Xing, D.: Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the International Symposium Information, Computer, and Communications Security (ASIACCS), pp. 343–352 (2009)

    Google Scholar 

  11. Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: Proceedings of the Workshop Secure Network Protocols, pp. 39–44 (2008)

    Google Scholar 

  12. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structure. In: Proceedings of the Sixth International Conference on Applied Cryptography and Network Security (ACNS 2008), pp. 111–129 (2008)

    Google Scholar 

  13. Boneh, D., DiCrescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceeding of the Theory and Applications of Cryptographic Techniques Annual International Conference on Advances in Cryptology (Eurocrypt 2004), pp. 506–522 (2004)

    Chapter  Google Scholar 

  14. Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Proceedings of the Annual International Cryptology Conference Advances in Cryptology (CRYPTO 2001), pp. 213–229 (2001)

    Chapter  Google Scholar 

  15. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the Theory of Cryptography Conference (TCC 2007), pp. 535–554 (2007)

    Google Scholar 

  16. Boyen, X.: A tapestry of identity-based encryption: practical frameworks compared. Int. J. Appl. Cryptogr. 1, 3–21 (2008)

    Article  MathSciNet  Google Scholar 

  17. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  18. Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In Proceedings of the Privacy Enhancing Technologies Symposium, pp. 95–112 (2007)

    Google Scholar 

  19. Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology (EUROCRYPT 2008), pp. 146–162 (2008)

    Google Scholar 

  20. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the Theory and Applications of Cryptographic Techniques Annual International Conference on Advances in Cryptology (EUROCRYPT 2010), pp. 62–91 (2010)

    Chapter  Google Scholar 

  21. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the ACM Conference on Computer and Communication Security, pp. 195–203 (2007)

    Google Scholar 

  22. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the Theory and Applications of Cryptographic Techniques Annual International Conferrence Advances in Cryptology (Eurocrypt), pp. 457–473 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nishant Doshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Doshi, N. (2019). Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT. In: Vasant, P., Zelinka, I., Weber, GW. (eds) Intelligent Computing & Optimization. ICO 2018. Advances in Intelligent Systems and Computing, vol 866. Springer, Cham. https://doi.org/10.1007/978-3-030-00979-3_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00979-3_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00978-6

  • Online ISBN: 978-3-030-00979-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics