Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 10, Pages 8632-8643Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3047640
Keywords
Blockchain; Smart grids; Access control; Microgrids; Distributed databases; Cloud computing; Distributed power generation; Ciphertext policy attribute-based encryption (CP-ABE); data sharing; distributed energy resources (DERs); edge blockchain (EB); fair accountability
Categories
Funding
- National Natural Science Foundation of China [61972148]
- Fundamental Research Funds for the Central Universities [2019MS020]
Ask authors/readers for more resources
This article proposes a secure data access control scheme in smart grid using edge blockchain technology, by outsourcing the computation workloads of end user devices to edge nodes in a consortium blockchain system, adopting an on-chain/off-chain approach for flexible data sharing, and utilizing a threshold secret sharing scheme to establish distributed authority.
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can efficiently control and manage the distributed energy resources (DERs). In smart grid, IoT devices generate huge amounts of data, which are collected and shared among DERs, microgrids, and the main grid. To protect the shared data, it is necessary to implement the secure and efficient data access control. Ciphertext policy attribute-based encryption (CP-ABE) is a promising solution for the distributed system. However, lightweight IoT devices with limited computing capability cannot handle the computationally intensive ABE algorithms. To overcome this constraint, the decryption phase of CP-ABE is usually outsourced to the cloud, but this is inefficient and not safe enough in the distributed environment. In this article, we propose an edge blockchain empowered secure data access control scheme with fair accountability for the smart grid. The computation workloads of end user devices are outsourced to the edge nodes in a consortium blockchain system We adopt an on-chain/off-chain approach to ensure the flexible data sharing. Additionally, we adopt the threshold secret sharing scheme to establish a distributed authority. The security analysis and performance evaluation are conducted to prove the security and efficiency of our scheme. We use the Raspberry Pi to simulate lightweight IoT devices in the Hyperledger fabric platform to prove the usability of our scheme.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available