A smart grid data privacy-preserving aggregation approach with authentication
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.31Keywords:
Smart Grid, Privacy-Preserving Aggregation, Cryptographic Techniques, Homomorphic Encryption, Cyber-Attacks, Smart Meters, Data PrivacyDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authentication of smart grid privacy-preserving aggregation addresses two of the key privacy and security issues of the smart grids: user data confidentiality and grid node communication safety. The proposed study elaborates on a new approach to data aggregation with authentication in smart grid systems for the safe and efficient exchange of information. The proposed solution would apply techniques, such as homomorphic encryption along with advanced cryptographic techniques, to calculate encrypted data without leaking sensitive information. Data and device integrity are more likely to be maintained when using better authentication techniques like blockchain and quantum key distribution (QKD). This dual layered aggregation with privacy-preserving combined with robust authentication can strengthen the smart grids against unauthorized access and data tampering, along with other cyber-attacks. The results show that the proposed approach for aggregation in smart meters is more accurate and useful in terms of data as compared to the conventional approaches. As far as mean relative error (MRE) is concerned, the MRE of the proposed layer model is 0.0007, which is substantially smaller than the differentially private model (0.0023) and Gaussian model (0.0058). The minimum MRE of the proposed model was achieved in the aggregator layer at 0.0029 compared with the corresponding differentially- private model’s 0.0063 and Gaussian model’s 0.0117. As the privacy parameter ε increases, noise levels drop precipitously from 14.137738 for ε = 0.1 to 0.282786 for ε = 5.0. The proposed methodology improves smart grid data aggregation with a balance between privacy and accuracy.Abstract
How to Cite
Downloads
Similar Articles
- Jayalakshmi K., M. Prabakaran, The role of big data in transforming human resource analytics: A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Archana G, Vijayalakshmi V, Improving classification precision for medical decision systems through big data analytics application , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- S. Dhivya, S. Prakash, Power quality assessment in solar-connected smart grids via hybrid attention-residual network for power quality (HARN-PQ) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Mohamed Azharudheen A, Vijayalakshmi V, Improvement of data analysis and protection using novel privacy-preserving methods for big data application , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Lakshmi Priya, Anil Vasoya, C. Boopathi, Muthukumar Marappan, Evaluating dynamics, security, and performance metrics for smart manufacturing , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.