scholarly journals Privacy-preserving energy storage sharing with blockchain and secure multi-party computation

2021 ◽  
Vol 1 (1) ◽  
pp. 32-50
Author(s):  
Nan Wang ◽  
Sid Chi-Kin Chau ◽  
Yue Zhou

Energy storage provides an effective way of shifting temporal energy demands and supplies, which enables significant cost reduction under time-of-use energy pricing plans. Despite its promising benefits, the cost of present energy storage remains expensive, presenting a major obstacle to practical deployment. A more viable solution to improve the cost-effectiveness is by sharing energy storage, such as community sharing, cloud energy storage and peer-to-peer sharing. However, revealing private energy demand data to an external energy storage operator may compromise user privacy, and is susceptible to data misuses and breaches. In this paper, we explore a novel approach to support energy storage sharing with privacy protection, based on privacy-preserving blockchain and secure multi-party computation. We present an integrated solution to enable privacy-preserving energy storage sharing, such that energy storage service scheduling and cost-sharing can be attained without the knowledge of individual users' demands. It also supports auditing and verification by the grid operator via blockchain. Furthermore, our privacy-preserving solution can safeguard against a majority of dishonest users, who may collude in cheating, without requiring a trusted third-party. We implemented our solution as a smart contract on real-world Ethereum blockchain platform, and provided empirical evaluation in this paper 1 .

2021 ◽  
Vol 11 (22) ◽  
pp. 10686
Author(s):  
Syeda Amna Sohail ◽  
Faiza Allah Bukhsh ◽  
Maurice van Keulen

Healthcare providers are legally bound to ensure the privacy preservation of healthcare metadata. Usually, privacy concerning research focuses on providing technical and inter-/intra-organizational solutions in a fragmented manner. In this wake, an overarching evaluation of the fundamental (technical, organizational, and third-party) privacy-preserving measures in healthcare metadata handling is missing. Thus, this research work provides a multilevel privacy assurance evaluation of privacy-preserving measures of the Dutch healthcare metadata landscape. The normative and empirical evaluation comprises the content analysis and process mining discovery and conformance checking techniques using real-world healthcare datasets. For clarity, we illustrate our evaluation findings using conceptual modeling frameworks, namely e3-value modeling and REA ontology. The conceptual modeling frameworks highlight the financial aspect of metadata share with a clear description of vital stakeholders, their mutual interactions, and respective exchange of information resources. The frameworks are further verified using experts’ opinions. Based on our empirical and normative evaluations, we provide the multilevel privacy assurance evaluation with a level of privacy increase and decrease. Furthermore, we verify that the privacy utility trade-off is crucial in shaping privacy increase/decrease because data utility in healthcare is vital for efficient, effective healthcare services and the financial facilitation of healthcare enterprises.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Lu Ou ◽  
Hui Yin ◽  
Zheng Qin ◽  
Sheng Xiao ◽  
Guangyi Yang ◽  
...  

Location-based services (LBSs) are increasingly popular in today’s society. People reveal their location information to LBS providers to obtain personalized services such as map directions, restaurant recommendations, and taxi reservations. Usually, LBS providers offer user privacy protection statement to assure users that their private location information would not be given away. However, many LBSs run on third-party cloud infrastructures. It is challenging to guarantee user location privacy against curious cloud operators while still permitting users to query their own location information data. In this paper, we propose an efficient privacy-preserving cloud-based LBS query scheme for the multiuser setting. We encrypt LBS data and LBS queries with a hybrid encryption mechanism, which can efficiently implement privacy-preserving search over encrypted LBS data and is very suitable for the multiuser setting with secure and effective user enrollment and user revocation. This paper contains security analysis and performance experiments to demonstrate the privacy-preserving properties and efficiency of our proposed scheme.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5282 ◽  
Author(s):  
Hongbin Fan ◽  
Yining Liu ◽  
Zhixin Zeng

As a next-generation power system, the smart grid can implement fine-grained smart metering data collection to optimize energy utilization. Smart meters face serious security challenges, such as a trusted third party or a trusted authority being attacked, which leads to the disclosure of user privacy. Blockchain provides a viable solution that can use its key technologies to solve this problem. Blockchain is a new type of decentralized protocol that does not require a trusted third party or a central authority. Therefore, this paper proposes a decentralized privacy-preserving data aggregation (DPPDA) scheme for smart grid based on blockchain. In this scheme, the leader election algorithm is used to select a smart meter in the residential area as a mining node to build a block. The node adopts Paillier cryptosystem algorithm to aggregate the user’s power consumption data. Boneh-Lynn-Shacham short signature and SHA-256 function are applied to ensure the confidentiality and integrity of user data, which is convenient for billing and power regulation. The scheme protects user privacy data while achieving decentralization, without relying on TTP or CA. Security analysis shows that our scheme meets the security and privacy requirements of smart grid data aggregation. The experimental results show that this scheme is more efficient than existing competing schemes in terms of computation and communication overhead.


Author(s):  
S. G. Ignatiev ◽  
S. V. Kiseleva

Optimization of the autonomous wind-diesel plants composition and of their power for guaranteed energy supply, despite the long history of research, the diversity of approaches and methods, is an urgent problem. In this paper, a detailed analysis of the wind energy characteristics is proposed to shape an autonomous power system for a guaranteed power supply with predominance wind energy. The analysis was carried out on the basis of wind speed measurements in the south of the European part of Russia during 8 months at different heights with a discreteness of 10 minutes. As a result, we have obtained a sequence of average daily wind speeds and the sequences constructed by arbitrary variations in the distribution of average daily wind speeds in this interval. These sequences have been used to calculate energy balances in systems (wind turbines + diesel generator + consumer with constant and limited daily energy demand) and (wind turbines + diesel generator + consumer with constant and limited daily energy demand + energy storage). In order to maximize the use of wind energy, the wind turbine integrally for the period in question is assumed to produce the required amount of energy. For the generality of consideration, we have introduced the relative values of the required energy, relative energy produced by the wind turbine and the diesel generator and relative storage capacity by normalizing them to the swept area of the wind wheel. The paper shows the effect of the average wind speed over the period on the energy characteristics of the system (wind turbine + diesel generator + consumer). It was found that the wind turbine energy produced, wind turbine energy used by the consumer, fuel consumption, and fuel economy depend (close to cubic dependence) upon the specified average wind speed. It was found that, for the same system with a limited amount of required energy and high average wind speed over the period, the wind turbines with lower generator power and smaller wind wheel radius use wind energy more efficiently than the wind turbines with higher generator power and larger wind wheel radius at less average wind speed. For the system (wind turbine + diesel generator + energy storage + consumer) with increasing average speed for a given amount of energy required, which in general is covered by the energy production of wind turbines for the period, the maximum size capacity of the storage device decreases. With decreasing the energy storage capacity, the influence of the random nature of the change in wind speed decreases, and at some values of the relative capacity, it can be neglected.


2021 ◽  
Vol 13 (10) ◽  
pp. 5752
Author(s):  
Reza Sabzehgar ◽  
Diba Zia Amirhosseini ◽  
Saeed D. Manshadi ◽  
Poria Fajri

This work aims to minimize the cost of installing renewable energy resources (photovoltaic systems) as well as energy storage systems (batteries), in addition to the cost of operation over a period of 20 years, which will include the cost of operating the power grid and the charging and discharging of the batteries. To this end, we propose a long-term planning optimization and expansion framework for a smart distribution network. A second order cone programming (SOCP) algorithm is utilized in this work to model the power flow equations. The minimization is computed in accordance to the years (y), seasons (s), days of the week (d), time of the day (t), and different scenarios based on the usage of energy and its production (c). An IEEE 33-bus balanced distribution test bench is utilized to evaluate the performance, effectiveness, and reliability of the proposed optimization and forecasting model. The numerical studies are conducted on two of the highest performing batteries in the current market, i.e., Lithium-ion (Li-ion) and redox flow batteries (RFBs). In addition, the pros and cons of distributed Li-ion batteries are compared with centralized RFBs. The results are presented to showcase the economic profits of utilizing these battery technologies.


RSC Advances ◽  
2021 ◽  
Vol 11 (10) ◽  
pp. 5432-5443
Author(s):  
Shyam K. Pahari ◽  
Tugba Ceren Gokoglan ◽  
Benjoe Rey B. Visayas ◽  
Jennifer Woehl ◽  
James A. Golen ◽  
...  

With the cost of renewable energy near parity with fossil fuels, energy storage is paramount. We report a breakthrough on a bioinspired NRFB active-material, with greatly improved solubility, and place it in a predictive theoretical framework.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2021 ◽  
pp. 1-26
Author(s):  
Yangguang Tian ◽  
Yingjiu Li ◽  
Robert H. Deng ◽  
Binanda Sengupta ◽  
Guomin Yang

In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user’s biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.


Sign in / Sign up

Export Citation Format

Share Document