A smart grid data privacy-preserving aggregation approach with authentication
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.31Keywords:
Smart Grid, Privacy-Preserving Aggregation, Cryptographic Techniques, Homomorphic Encryption, Cyber-Attacks, Smart Meters, Data PrivacyDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authentication of smart grid privacy-preserving aggregation addresses two of the key privacy and security issues of the smart grids: user data confidentiality and grid node communication safety. The proposed study elaborates on a new approach to data aggregation with authentication in smart grid systems for the safe and efficient exchange of information. The proposed solution would apply techniques, such as homomorphic encryption along with advanced cryptographic techniques, to calculate encrypted data without leaking sensitive information. Data and device integrity are more likely to be maintained when using better authentication techniques like blockchain and quantum key distribution (QKD). This dual layered aggregation with privacy-preserving combined with robust authentication can strengthen the smart grids against unauthorized access and data tampering, along with other cyber-attacks. The results show that the proposed approach for aggregation in smart meters is more accurate and useful in terms of data as compared to the conventional approaches. As far as mean relative error (MRE) is concerned, the MRE of the proposed layer model is 0.0007, which is substantially smaller than the differentially private model (0.0023) and Gaussian model (0.0058). The minimum MRE of the proposed model was achieved in the aggregator layer at 0.0029 compared with the corresponding differentially- private model’s 0.0063 and Gaussian model’s 0.0117. As the privacy parameter ε increases, noise levels drop precipitously from 14.137738 for ε = 0.1 to 0.282786 for ε = 5.0. The proposed methodology improves smart grid data aggregation with a balance between privacy and accuracy.Abstract
How to Cite
Downloads
Similar Articles
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Anita M, Shakila S, Stochastic kernelized discriminant extreme learning machine classifier for big data predictive analytics , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Madhuri Prashant Pant, Jayshri Appaso Patil, Unlocking the potential of big data and analytics significance, applications in diverse domains and implementation of Apache Hadoop map/reduce for citation histogram , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Sahaya Jenitha A, Sinthu J. Prakash, A general stochastic model to handle deduplication challenges using hidden Markov model in big data analytics , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- V Babydeepa, K. Sindhu, A hybrid feature selection and generative adversarial network for lung and uterus cancer prediction with big data , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Prabhu, P. Archana, S. Anusooya, P. Anuradha, Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

