On Privacy-Preserving Protocols for Smart Metering Systems Defense - - PowerPoint PPT Presentation

on privacy preserving protocols for smart metering systems
SMART_READER_LITE
LIVE PREVIEW

On Privacy-Preserving Protocols for Smart Metering Systems Defense - - PowerPoint PPT Presentation

On Privacy-Preserving Protocols for Smart Metering Systems Defense - Verteidigung - Seminrio de Ps-Graduao Fbio Borges Laboratrio Nacional de Computao Cientfica (LNCC) Coordenao de Sistemas e Redes (CSR) Table of Contents


slide-1
SLIDE 1

On Privacy-Preserving Protocols for Smart Metering Systems

Defense - Verteidigung - Seminário de Pós-Graduação Fábio Borges

Laboratório Nacional de Computação Científica (LNCC) Coordenação de Sistemas e Redes (CSR)

slide-2
SLIDE 2

Table of Contents

Outline

Introduction Privacy-Preserving Protocols (PPPs) PPP1 - Based on SDC-Nets PPP2 - Based on Commitment PPP3 - Based on Asymmetric DC-Net (ADC-Net) PPP4 - Based on Quantum Cryptography ADC-Nets Simulation Using Real-World Data Conclusion and Outlook

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 2/59

slide-3
SLIDE 3

Smart Metering Projects Map

Google Maps

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 3/59

slide-4
SLIDE 4

Non-smart Grid

Supplier Meters . . .

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 4/59

slide-5
SLIDE 5

Non-smart Grid

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 5/59

Supplier Meters . . .

slide-6
SLIDE 6

Non-smart Grid

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 6/59

Supplier Meters . . .

Problems

◮ Cost ◮ Inefficiency ◮ Fraud

slide-7
SLIDE 7

Getting Smart

Collecting on a yearly basis Supplier Meters . . . Year: 2015

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 7/59

slide-8
SLIDE 8

Getting Smart

Collecting on a yearly basis

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 8/59

Supplier Meters . . . Year: 2015

m1,j, 2015 m2,j, 2015 m3,j, 2015 mi,2015 m

˜ ı , j

, 2 1 5

slide-9
SLIDE 9

Getting Smart

Collecting on a yearly basis

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 9/59

Supplier Meters . . . Year: 2016

m1,j, 2016 m2,j, 2016 m3,j, 2016 mi,2016 m

˜ ı , j

, 2 1 6

slide-10
SLIDE 10

Getting Smart

Collecting per round

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 10/59

Supplier Meters . . . Round: 1

m1,1 m2,1 m3,1 mi,1 m

˜ ı , 1

Improvements

◮ Monthly ◮ Weekly ◮ Daily ◮ Real time

slide-11
SLIDE 11

Getting Smart

Collecting per round

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 11/59

Supplier Meters . . . Round: 2

m1,2 m2,2 m3,2 mi,2 m

˜ ı , 2

Improvements

◮ Monthly ◮ Weekly ◮ Daily ◮ Real time

slide-12
SLIDE 12

Getting Smart

Collecting per round

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 12/59

Supplier Meters . . . Round: 3

m1,3 m2,3 m3,3 mi,3 m

˜ ı , 3

Improvements

◮ Monthly ◮ Weekly ◮ Daily ◮ Real time

slide-13
SLIDE 13

Privacy Problem

[NIST] [GJL12] August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 13/59

slide-14
SLIDE 14

Privacy Problem

[NIST] [GJL12]

EU - Official Journal L No.315

80% of households equipped with smart meters by 2020 in EU

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 13/59

slide-15
SLIDE 15

Need for Encryption

Intercepting all measurements per round Supplier Meters . . . Round: j

m1,j m2,j m3,j mi,j m ˜

ı , j August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 14/59

slide-16
SLIDE 16

Need for Encryption

Intercepting all measurements per round Supplier Meters . . . Round: j

m1,j m2,j m3,j mi,j m ˜

ı , j August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 14/59

slide-17
SLIDE 17

Need for Encryption

Intercepting all measurements per round Supplier Meters . . . Round: j

m1,j m2,j m3,j mi,j m ˜

ı , j August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 14/59

slide-18
SLIDE 18

Need for Aggregation

Supplier Meters . . . Round: j

Enc(m1,j) Enc(m2,j) Enc(m3,j) E n c ( mi,j ) Enc(m ˜

ı , j) August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 15/59

slide-19
SLIDE 19

Need for Aggregation

Supplier Meters . . . Round: j

Enc(m1,j) Enc(m2,j) Enc(m3,j) E n c ( mi,j ) Enc(m ˜

ı , j) August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 15/59

slide-20
SLIDE 20

Need for Aggregation

Supplier Meters . . . Round: j

Enc(m1,j) Enc(m2,j) Enc(m3,j) E n c ( mi,j ) Enc(m ˜

ı , j) August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 15/59

slide-21
SLIDE 21

What Does the Supplier Need?

Consolidated Consumption versus Billing

Round 1 2 · · · ˜  Billing Meter 1 m1,1 m1,2 · · · m1,˜

 ˜ 

  • j=1

m1,j Meter 2 m2,1 m2,2 · · · m2,˜

 ˜ 

  • j=1

m2,j . . . . . . . . . ... . . . . . . Meter ˜ ı m˜

ı ,1

ı ,2

· · · m˜

ı ,˜  ˜ 

  • j=1

ı ,j

Consolidated

˜ ı

  • i=1

mi,1

˜ ı

  • i=1

mi,2 · · ·

˜ ı

  • i=1

mi,˜

=

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 16/59

slide-22
SLIDE 22

What Does the Supplier Need?

Consolidated Consumption versus Billing

Round 1 2 · · · ˜  Billing Meter 1 m1,1 m1,2 · · · m1,˜

 ˜ 

  • j=1

m1,j Meter 2 m2,1 m2,2 · · · m2,˜

 ˜ 

  • j=1

m2,j . . . . . . . . . ... . . . . . . Meter ˜ ı m˜

ı ,1

ı ,2

· · · m˜

ı ,˜  ˜ 

  • j=1

ı ,j

Consolidated

˜ ı

  • i=1

mi,1

˜ ı

  • i=1

mi,2 · · ·

˜ ı

  • i=1

mi,˜

=

✗ ✓

PPPs only work with large aggregations

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 16/59

slide-23
SLIDE 23

Aggregation

Additive homomorphic encryption primitives (AHEPs) Cj =

˜ ı

  • i=1

Enc (mi,j) = Enc

˜

ı

  • i=1

mi,j

  • Aggregation

Meters . . . Supplier

Enc(m1,j) E n c ( m2,j ) E n c ( m

3 , j

) E n c ( m

i,j

) Enc(m ˜

ı ,j) August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 17/59

slide-24
SLIDE 24

Aggregation

AHEPs

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 18/59

Cj =

˜ ı

  • i=1

Enc (mi,j) = Enc

˜

ı

  • i=1

mi,j

  • Aggregation

Meters . . . Supplier

Enc(m1,j) E n c ( m2,j ) E n c ( m

3 , j

) E n c ( m

i,j

) Enc(m

˜ ı ,j

)

slide-25
SLIDE 25

Aggregation

AHEPs

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 19/59

Cj =

˜ ı

  • i=1

Enc (mi,j) = Enc

˜

ı

  • i=1

mi,j

  • Aggregation

Meters . . . Supplier

E n c

˜

ı

  • i=1

mi,j

slide-26
SLIDE 26

Requirements

Requirements for Smart Grids

Requirement 1

Recoverability of consolidated consumption

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 20/59

slide-27
SLIDE 27

Requirements

Requirements for Smart Grids

Requirement 1

Recoverability of consolidated consumption

Requirement 2

Recoverability of bill based on dynamic pricing

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 20/59

slide-28
SLIDE 28

Requirements

Requirements for Smart Grids

Requirement 1

Recoverability of consolidated consumption

Requirement 2

Recoverability of bill based on dynamic pricing

Requirement 3

Verification (auditability)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 20/59

slide-29
SLIDE 29

Requirements

Requirements for Smart Grids

Requirement 1

Recoverability of consolidated consumption

Requirement 2

Recoverability of bill based on dynamic pricing

Requirement 3

Verification (auditability)

Requirement 4

Efficiency

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 20/59

slide-30
SLIDE 30

Table of Contents

Introduction Privacy-Preserving Protocols (PPPs) PPP1 - Based on SDC-Nets PPP2 - Based on Commitment PPP3 - Based on Asymmetric DC-Net (ADC-Net) PPP4 - Based on Quantum Cryptography ADC-Nets Simulation Using Real-World Data Conclusion and Outlook

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 21/59

slide-31
SLIDE 31

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-32
SLIDE 32

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

k1 k2 k3

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-33
SLIDE 33

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

E n c ( m1,j )

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-34
SLIDE 34

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

E n c ( m1,j ) Enc(m2,j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-35
SLIDE 35

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

E n c ( m1,j ) Enc(m2,j) Enc(m1,j) + Enc(m2,j) + Enc(m3,j) = Enc(m1,j + m2,j + m3,j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-36
SLIDE 36

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

E n c ( m1,j ) Enc(m2,j) Enc(m1,j) + Enc(m2,j) + Enc(m3,j) = Enc(m1,j + m2,j + m3,j)

Encryption

Enc(mi,j) = mi,j + H(ki||j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-37
SLIDE 37

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

E n c ( m1,j ) Enc(m2,j) Enc(m1,j) + Enc(m2,j) + Enc(m3,j) = Enc(m1,j + m2,j + m3,j)

Encryption

Enc(mi,j) = mi,j + H(ki||j)

Aggregation

C =

N

  • i=1

Enc (mi,j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-38
SLIDE 38

PPP1 -

  • SDC-Nets

SDC-Nets Using In-Network Aggregation [BM14a]

supplier

E n c ( m1,j ) Enc(m2,j) Enc(m1,j) + Enc(m2,j) + Enc(m3,j) = Enc(m1,j + m2,j + m3,j)

Encryption

Enc(mi,j) = mi,j + H(ki||j)

Aggregation

C =

N

  • i=1

Enc (mi,j)

Decryption

Dec (C) = C −

N

  • i=1

H(ki||j) =

N

  • i=1

mi,j

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 22/59

slide-39
SLIDE 39

PPP1

PPP1 meets the following requirements

Requirement 1 - ✓

Recoverability of consolidated consumption

Requirement 2 - ✗

Recoverability of bill based on dynamic pricing

Requirement 3 - ✗

Verification (auditability)

Requirement 4 - ✓

Efficiency

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 23/59

slide-40
SLIDE 40

PPP2 -

  • Commitment

Commitment Based on ECC [BM14a] Supplier Meters . . .

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 24/59

slide-41
SLIDE 41

PPP2 -

  • Commitment

Commitment Based on ECC [BM14a] Supplier Meters . . .

Commit(m

1 , j

)||Sign

1 , j

Commit(m2,j)||Sign2,j Commit(m

3 , j

)||Sign

3 , j

C

  • m

m i t ( mi,j ) | | S i g ni,j Commit(m

˜ ı , j

)||Sign

˜ ı , j August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 24/59

slide-42
SLIDE 42

PPP2 -

  • Commitment

Commitment Based on ECC [BM14a] Supplier Meters . . .

Commit(m

1 , j

)||Sign

1 , j

Commit(m2,j)||Sign2,j Commit(m

3 , j

)||Sign

3 , j

C

  • m

m i t ( mi,j ) | | S i g ni,j Commit(m

˜ ı , j

)||Sign

˜ ı , j

Commitment

Commit(mi,j) = ki · HΩ (j) + mi,j · P

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 24/59

slide-43
SLIDE 43

PPP2

PPP2 meets the following requirements

Requirement 1 - ✗

Recoverability of consolidated consumption

Requirement 2 - ✓

Recoverability of bill based on dynamic pricing

Requirement 3 - ✓

Verification (auditability)

Requirement 4 - ✓

Efficiency

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 25/59

slide-44
SLIDE 44

PPP2 - Verification

[BDBBM14; BM14b; BM14a; BBM14; BVM15] Meter i Supplier

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 26/59

slide-45
SLIDE 45

PPP2 - Verification

[BDBBM14; BM14b; BM14a; BBM14; BVM15] Meter i Supplier

Enc(mi,j), Enc(mi,j+1), . . .

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 26/59

slide-46
SLIDE 46

PPP2 - Verification

[BDBBM14; BM14b; BM14a; BBM14; BVM15] Meter i Supplier

Enc(mi,j), Enc(mi,j+1), . . .

Q =

j Enc(mi,j) = j ki · HΩ (j) + mi,j · P August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 26/59

slide-47
SLIDE 47

PPP2 - Verification

[BDBBM14; BM14b; BM14a; BBM14; BVM15] Meter i Supplier

Enc(mi,j), Enc(mi,j+1), . . .

Q =

j Enc(mi,j) = j ki · HΩ (j) + mi,j · P

v =

j mi,j and V = j ki · HΩ (j) August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 26/59

slide-48
SLIDE 48

PPP2 - Verification

[BDBBM14; BM14b; BM14a; BBM14; BVM15] Meter i Supplier

Enc(mi,j), Enc(mi,j+1), . . .

Q =

j Enc(mi,j) = j ki · HΩ (j) + mi,j · P

v =

j mi,j and V = j ki · HΩ (j)

Verification

v · P

?

= Q − V

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 26/59

slide-49
SLIDE 49

PPP2 - Performance

[BM14b; BM14a; BVM15; BDBBM14; LBPN12]

exp

64

9

1/3

+ O(1)

  • (ln n)1/3(ln ln n)2/3
  • = 2x =

πo

2 ,

100 150 200 250 0.5 1 1.5 ·104 y = 506.526 exp(0.0128886x) y = 2x x gives the level of security by brute force y gives the key bit length Factorization Elliptic Curves

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 27/59

slide-50
SLIDE 50

Table of Contents

Outline

Introduction Privacy-Preserving Protocols (PPPs) PPP1 - Based on SDC-Nets PPP2 - Based on Commitment PPP3 - Based on ADC-Net PPP4 - Based on Quantum Cryptography ADC-Nets Simulation Using Real-World Data Conclusion and Outlook

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 28/59

slide-51
SLIDE 51

PPP3 -

  • New Concept

ADC-Net - [BBM14; BM14b; BVM15] Supplier Meters . . .

Enc(m

1 , j

)||Sign

1 , j

Enc(m2,j)||Sign2,j Enc(m

3 , j

)||Sign

3 , j

. . . Enc(m

˜ ı , j

)||Sign

˜ ı , j August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 29/59

slide-52
SLIDE 52

PPP3 -

  • New Concept

ADC-Net - [BBM14; BM14b; BVM15] Supplier Meters . . .

Enc(m

1 , j

)||Sign

1 , j

Enc(m2,j)||Sign2,j Enc(m

3 , j

)||Sign

3 , j

. . . Enc(m

˜ ı , j

)||Sign

˜ ı , j

Encryption

Enc : Zn × Zn → Zn2 Enci(mi,j) → (1 + n)mi,j · ghj ·ki mod n2

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 29/59

slide-53
SLIDE 53

PPP3 -

  • New Concept

ADC-Net - [BBM14; BM14b; BVM15] Supplier Meters . . .

Enc(m

1 , j

)||Sign

1 , j

Enc(m2,j)||Sign2,j Enc(m

3 , j

)||Sign

3 , j

. . . Enc(m

˜ ı , j

)||Sign

˜ ı , j

Encryption

Enc : Zn × Zn → Zn2 Enci(mi,j) → (1 + n)mi,j · ghj ·ki mod n2

Aggregation

Cj = ˜

ı i=1 Enci(mi,j) August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 29/59

slide-54
SLIDE 54

PPP3 -

  • New Concept

ADC-Net - [BBM14; BM14b; BVM15] Supplier Meters . . .

Enc(m

1 , j

)||Sign

1 , j

Enc(m2,j)||Sign2,j Enc(m

3 , j

)||Sign

3 , j

. . . Enc(m

˜ ı , j

)||Sign

˜ ı , j

Encryption

Enc : Zn × Zn → Zn2 Enci(mi,j) → (1 + n)mi,j · ghj ·ki mod n2

Aggregation

Cj = ˜

ı i=1 Enci(mi,j)

Decryption

Dec : Zn2 → Zn Dec (Cj) → (Cj ·g−ht ·s

mod n2)−1 n August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 29/59

slide-55
SLIDE 55

PPP3

PPP3 meets the following requirements

Requirement 1 - ✓

Recoverability of consolidated consumption

Requirement 2 - ✓

Recoverability of bill based on dynamic pricing

Requirement 3 - ✓

Verification (auditability)

Requirement 4 - ✓

Efficiency

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 30/59

slide-56
SLIDE 56

PPP4 -

  • Quantum Cryptography

No Keys [BSM14; BPP12] Supplier Meters . . .

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 31/59

slide-57
SLIDE 57

PPP4 -

  • Quantum Cryptography

No Keys [BSM14; BPP12] Supplier Meters . . .

| ψ

1

  • U1

|ψ2U2 |ψ ˜

ı U ˜

ı

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 31/59

slide-58
SLIDE 58

PPP4 -

  • Quantum Cryptography

No Keys [BSM14; BPP12] Supplier Meters . . .

| ψ

1

  • U1

|ψ2U2 |ψ ˜

ı U ˜

ı

exp( ı ˆ NU1δ1)|ψ1U1 exp( ı ˆ N

U 2

δ

2

)|ψ

2

  • U

2

exp( ı ˆ NU ˜

ı δ ˜

ı )|ψ ˜ ı U ˜

ı

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 31/59

slide-59
SLIDE 59

PPP4

PPP4 meets the following requirements

Requirement 1 - ✓

Recoverability of consolidated consumption

Requirement 2 - ✗

Recoverability of bill based on dynamic pricing

Requirement 3 - ✗

Verification (auditability)

Requirement 4 - depends on quantum devices

Efficiency

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 32/59

slide-60
SLIDE 60

Table of Contents

Introduction Privacy-Preserving Protocols (PPPs) PPP1 - Based on SDC-Nets PPP2 - Based on Commitment PPP3 - Based on Asymmetric DC-Net (ADC-Net) PPP4 - Based on Quantum Cryptography ADC-Nets Simulation Using Real-World Data Conclusion and Outlook

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 33/59

slide-61
SLIDE 61

Symmetric DC-Nets (SDC-Nets)

[Cha88] - Dining Cryptographers Problem

Agent A B C

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 34/59

slide-62
SLIDE 62

SDC-Nets

[Cha88] - Dining Cryptographers Problem

Agent A B C

KBA KAB

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 34/59

slide-63
SLIDE 63

SDC-Nets

[Cha88] - Dining Cryptographers Problem

Agent A B C

KBA KAB KCB KBC

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 34/59

slide-64
SLIDE 64

SDC-Nets

[Cha88] - Dining Cryptographers Problem

Agent A B C

KBA KAB KCB KBC KAC KCA

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 34/59

slide-65
SLIDE 65

SDC-Nets

Unconditional Secure [Cha88]

Agent A B C

m1,j + kAB + kAC − kBA − kCA

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 35/59

slide-66
SLIDE 66

SDC-Nets

Unconditional Secure [Cha88]

Agent A B C

m1,j + kAB + kAC − kBA − kCA m

2,j

+ k

BA

+ k

BC

− k

AB

− k

CB August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 35/59

slide-67
SLIDE 67

SDC-Nets

Unconditional Secure [Cha88]

Agent A B C

m1,j + kAB + kAC − kBA − kCA m

2,j

+ k

BA

+ k

BC

− k

AB

− k

CB

m

3,j

+ k

CA

+ k

CB

− k

AC

− k

BC August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 35/59

slide-68
SLIDE 68

SDC-Nets

Unconditional Secure [Cha88]

Agent A B C

m1,j +kAB +kAC − kBA − kCA m

2,j

+ k

BA

+ k

BC

− k

AB

− k

CB

m

3,j

+ k

CA

+ k

CB

− k

AC

− k

BC August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 35/59

slide-69
SLIDE 69

SDC-Nets

Unconditional Secure [Cha88]

Agent A B C

m1,j +kAB +kAC − kBA − kCA m

2,j

+ k

BA

+ k

BC

− k

AB

− k

CB

m

3,j

+ k

CA

+ k

CB

− k

AC

− k

BC August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 35/59

slide-70
SLIDE 70

SDC-Nets

Unconditional Secure [Cha88]

Agent A B C

m1,j +kAB +kAC − kBA − kCA m

2,j

+ k

BA

+ k

BC

− k

AB

− k

CB

m

3,j

+ k

CA

+ k

CB

− k

AC

− k

BC August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 35/59

slide-71
SLIDE 71

SDC-Nets

[GJ04]

Agent A B C

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 36/59

slide-72
SLIDE 72

SDC-Nets

[GJ04]

Agent A B C

m1,j +H(kAB||j) +H(kAC||j) − H(kBA||j) − H(kCA||j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 36/59

slide-73
SLIDE 73

SDC-Nets

[GJ04]

Agent A B C

m1,j +H(kAB||j) +H(kAC||j) − H(kBA||j) − H(kCA||j) m

2,j

+ H ( k

BA

| | j ) + H ( k

BC

| | j ) − H ( k

AB

| | j ) − H ( k

CB

| | j )

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 36/59

slide-74
SLIDE 74

SDC-Nets

[GJ04]

Agent A B C

m1,j +H(kAB||j) +H(kAC||j) − H(kBA||j) − H(kCA||j) m

2,j

+ H ( k

BA

| | j ) + H ( k

BC

| | j ) − H ( k

AB

| | j ) − H ( k

CB

| | j ) m

3,j

+ H ( k

CA

| | j ) + H ( k

CB

| | j ) − H ( k

AC

| | j ) − H ( k

BC

| | j )

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 36/59

slide-75
SLIDE 75

SDC-Net

Keys for 10 users

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 37/59

slide-76
SLIDE 76

SDC-Net

Keys for 10 users

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 37/59

slide-77
SLIDE 77

SDC-Net

Keys for 10 users

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 37/59

slide-78
SLIDE 78

SDC-Nets versus AHEPs

Symmetric DC-Nets (SDC-Nets)

Agent A B C

m1,j + H(kAB||j) + H(kAC||j) − H(kBA||j) − H(kCA||j) m2,j + H(kBA||j) + H(kBC||j) − H(kAB||j) − H(kCB||j) m3,j + H(kCA||j) + H(kCB||j) − H(kAC||j) − H(kBC||j)

Additive homomorphic encryption primitives (AHEPs)

Agent

E n c ( m

1 , j

) Enc(m2,j) Enc(m1,j) · Enc(m2,j) · Enc(m3,j) = Enc(m1,j + m2,j + m3,j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 38/59

slide-79
SLIDE 79

ADC-Net

Required Properties [BBM14; BM14b; BVM15]

Properties SDC-Nets AHEPs ADC-Net Collusion of O(˜ ı ) ✓ ✗ Set of trusted users ✓ ✗ Messages to the counting agent ✓ ✗ Minimum number of messages ✓ ✓ Scalable ✗ ✓ Permanent keys ✓ ✓ Based on trapdoors ✓ ✓ Keys stored per user 2(˜ ı − 1) 1 Total of keys O(˜ ı 2) 2 Polynomial time ✓ ✓ One cannot disrupt ✗ ✗ Verification as commitment ✗ ✗

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 39/59

slide-80
SLIDE 80

ADC-Net

Required Properties [BBM14; BM14b; BVM15]

Properties SDC-Nets AHEPs ADC-Net Collusion of O(˜ ı ) ✓ ✗ ✓ Set of trusted users ✓ ✗ ✓ Messages to the counting agent ✓ ✗ ✓ Minimum number of messages ✓ ✓ ✓ Scalable ✗ ✓ ✓ Permanent keys ✓ ✓ ✓ Based on trapdoors ✓ ✓ ✓ Keys stored per user 2(˜ ı − 1) 1 1 Total of keys O(˜ ı 2) 2 O(˜ ı ) Polynomial time ✓ ✓ ✓ One cannot disrupt ✗ ✗ ✓ Verification as commitment ✗ ✗ ✓

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 40/59

slide-81
SLIDE 81

Interesting Results

Beyond the State of the Art

Result:

Asymmetric DC-Nets are abstractions of Symmetric DC-Nets [BBM14]

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 41/59

slide-82
SLIDE 82

Interesting Results

Beyond the State of the Art

Result:

Asymmetric DC-Nets are abstractions of Symmetric DC-Nets [BBM14]

Result:

AHEPs are particular cases of ADC-Nets

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 41/59

slide-83
SLIDE 83

Interesting Results

Beyond the State of the Art

Result:

Asymmetric DC-Nets are abstractions of Symmetric DC-Nets [BBM14]

Result:

AHEPs are particular cases of ADC-Nets

Example

Paillier is a particular case of an ADC-Net

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 41/59

slide-84
SLIDE 84

Table of Contents

Introduction Privacy-Preserving Protocols (PPPs) PPP1 - Based on SDC-Nets PPP2 - Based on Commitment PPP3 - Based on Asymmetric DC-Net (ADC-Net) PPP4 - Based on Quantum Cryptography ADC-Nets Simulation Using Real-World Data Conclusion and Outlook

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 42/59

slide-85
SLIDE 85

Dataset

Raw Dataset ✗

The raw dataset has inconsistencies

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 43/59

slide-86
SLIDE 86

Dataset

Raw Dataset ✗

The raw dataset has inconsistencies

Sanitized Dataset ✓

◮ 6 435 meters ◮ 25 726 rounds ◮ 165 546 810 measurements

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 43/59

slide-87
SLIDE 87

Dataset

Raw Dataset ✗

The raw dataset has inconsistencies

Sanitized Dataset ✓

◮ 6 435 meters ◮ 25 726 rounds ◮ 165 546 810 measurements

Verification

Inconsistencies ⇒ measurements collected without verification

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 43/59

slide-88
SLIDE 88

Comparison of requirements

between Privacy-Preserving Protocol (PPP)

Protocol

Efficiency Enc Agg Dec PPP1 ✓ ✗ ✗ O(1) O(˜ ı ) O(˜ ı ) PPP2 ✗ ✓ ✓ O(log(k)) O(˜ ı ) O(k) PPP3 ✓ ✓ ✓ O(log(k)) O(˜ ı ) O(log(k)) EPPP4SMS ✓ ✓ ✓ 2O(log(k)) O(˜ ı ) O(log(n)) LOP - SDC-Net ✓ ✗ ✗ O(˜ ı ) NA O(˜ ı ) Paillier - AHEP ✓ ✗ ✗ O(log(n)) O(˜ ı ) O(log(n))

IEEE Trans. Smart Grid - Impact Factor: 4.334

“EPPP4SMS: Efficient Privacy-Preserving Protocol for Smart Metering Systems and Its Simulation Using Real-World Data”

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 44/59

slide-89
SLIDE 89

Overall Performance

Race protocols

Telecooperation

Smart Grids Smart Meters

Efficient Protocols

PPP1 PPP2 PPP3 EPPP4SMS LOP Paillier

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 45/59

slide-90
SLIDE 90

Overall Performance

Race protocols

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 46/59

Horst Görtz Foundation

PPP1: the Fastest Efficient Protocols

TK Maxx Darmstadt

PPP1 PPP2 PPP3 EPPP4SMS LOP Paillier

slide-91
SLIDE 91

Overall Performance

Race protocols

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 47/59

PPP3 is the Favorite PPP3: the Complete

One Selected Award 10 Selected Papers

PPP1 PPP2 PPP3 EPPP4SMS LOP Paillier

slide-92
SLIDE 92

Table of Contents

Introduction Privacy-Preserving Protocols (PPPs) PPP1 - Based on SDC-Nets PPP2 - Based on Commitment PPP3 - Based on Asymmetric DC-Net (ADC-Net) PPP4 - Based on Quantum Cryptography ADC-Nets Simulation Using Real-World Data Conclusion and Outlook

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 48/59

slide-93
SLIDE 93

Conclusion

◮ Privacy-Preserving Protocols (PPPs) only work for large

aggregations

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 49/59

slide-94
SLIDE 94

Conclusion

◮ PPPs only work for large aggregations ◮ PPP1 has the fastest Enc (mi,j)

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 49/59

slide-95
SLIDE 95

Conclusion

◮ PPPs only work for large aggregations ◮ PPP1 has the fastest Enc (mi,j) ◮ PPP2 and PPP3 are exponentially faster than others

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 49/59

slide-96
SLIDE 96

Conclusion

◮ PPPs only work for large aggregations ◮ PPP1 has the fastest Enc (mi,j) ◮ PPP2 and PPP3 are exponentially faster than others ◮ PPP4 is resistant against quantum attacks

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 49/59

slide-97
SLIDE 97

Conclusion

◮ PPPs only work for large aggregations ◮ PPP1 has the fastest Enc (mi,j) ◮ PPP2 and PPP3 are exponentially faster than others ◮ PPP4 is resistant against quantum attacks ◮ The concept of ADC-Nets is introduced

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 49/59

slide-98
SLIDE 98

Selected Publications

Journal Papers

[BM14b] Fábio Borges and Max Mühlhäuser. EPPP4SMS: efficient privacy- preserving protocol for smart metering systems and its simulation using real-world data. IEEE trans. smart grid, 5(6):2701–2708, 2014 Impact Factor 4.334 h5-index 54 [BSM14] Fábio Borges, Raqueline A. M. Santos, and Franklin L. Marquezino. Preserving privacy in a smart grid scenario using quantum mechan- ics. Security and communication networks:n/a–n/a, 2014 Impact Factor 0.433 h5-index 19 [LBPN12] Pedro Lara, Fábio Borges, Renato Portugal, and Nadia Nedjah. Par- allel modular exponentiation using load balancing without precom- putation. Journal of computer and system sciences, 78(2):575– 582, 2012 Impact Factor 1.091 h5-index 30

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 50/59

slide-99
SLIDE 99

Selected Publications

Award

[BBM14] Fábio Borges, Johannes Buchmann, and Max Mühlhäuser. Introducing asymmetric dc-nets. In Communications and network security (CNS), 2014 IEEE conference on, 2014, pages 508–509 Best Poster Award - IEEE Communications Society

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 51/59

slide-100
SLIDE 100

Selected Publications

Conference Papers

[BBM14] Fábio Borges, Johannes Buchmann, and Max Mühlhäuser. Introducing asymmetric dc-nets. In Communications and network security (CNS), 2014 IEEE conference on, 2014, pages 508–509 [BM14a] Fábio Borges and Leonardo A. Martucci. iKUP keeps users’ privacy in the smart grid. In Communications and network security (CNS), 2014 IEEE conference on, 2014, pages 310–318 [BDBBM14] Fábio Borges, Denise Demirel, Leon Böck, Johannes Buchmann, and Max Mühlhäuser. A privacy- enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. In Computers and communication (ISCC), 2014 IEEE symposium on, 2014, pages 1–6 [BMBM14] Fábio Borges, Leonardo A. Martucci, Filipe Beato, and Max Mühlhäuser. Secure and privacy- friendly public key generation and certification. In Trust, security and privacy in computing and communications (TrustCom), 2014 IEEE 13th international conference on, 2014, pages 114–121 [BMM12] Fábio Borges, Leonardo A. Martucci, and Max Mühlhäuser. Analysis of privacy-enhancing pro- tocols based on anonymity networks. In Smart grid communications (SmartGridComm), 2012 IEEE third international conference on, 2012, pages 378–383 [BPP12] Fábio Borges, Albrecht Petzoldt, and Renato Portugal. Small private keys for systems of mul- tivariate quadratic equations using symmetric cryptography. In XXXIV CNMAC - congrasso nacional de matemática aplicada e computacional. Águas de Lindóia - SP, 2012, pages 1085– 1091 [BVM15] Fábio Borges, Florian Volk, and Max Mühlhäuser. Efficient, verifiable, secure, and privacy-friendly computations for the smart grid. In Innovative smart grid technologies conference (ISGT), 2015 IEEE power energy society, 2015, pages 1–5 August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 52/59

slide-101
SLIDE 101

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-102
SLIDE 102

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-103
SLIDE 103

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-104
SLIDE 104

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting ◮ reputation systems August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-105
SLIDE 105

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting ◮ reputation systems ◮ sensor networks August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-106
SLIDE 106

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting ◮ reputation systems ◮ sensor networks ◮ electronic money August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-107
SLIDE 107

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting ◮ reputation systems ◮ sensor networks ◮ electronic money ◮ mobile sensing August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-108
SLIDE 108

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting ◮ reputation systems ◮ sensor networks ◮ electronic money ◮ mobile sensing ◮ multi-party computation August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-109
SLIDE 109

Outlook

ADC-Nets can be used in applications that require:

◮ SDC-Nets ◮ AHEPs

◮ electronic voting ◮ reputation systems ◮ sensor networks ◮ electronic money ◮ mobile sensing ◮ multi-party computation ◮ image processing August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 53/59

slide-110
SLIDE 110

Thank You!

All comments and suggestions are welcomed. Contact: borges@lncc.de

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 54/59

slide-111
SLIDE 111

Contributions

  • 1. Detection of profile in

protocols based on noise

  • 2. Reasons for frequent

measurements

◮ Detection of fraud and

energy loss

◮ Virtualization of a

commodity network

◮ Fair Distribution

(challenge)

  • 3. Minimal requirements for

PPPs

  • 4. Limitations for all PPPs

◮ Algebraic properties ◮ Probabilistic properties

  • 5. The concept of ADC-Nets

◮ Abstractions of SDC-Nets ◮ Generalization of AHEPs

  • 6. Four new PPPs

◮ PPP1 is the fastest ◮ PPP2 uses commitment

with elliptic curve

◮ PPP3 is an ADC-Net ◮ PPP4 is resistant against

quantum attacks

  • 7. An SDC-Net that behaves

as AHEPs

  • 8. Detection of inconsistencies

in the dataset

  • 9. Theoretical analysis

validated with simulation

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 55/59

slide-112
SLIDE 112

Bibliography I

Fábio Borges, Johannes Buchmann, and Max Mühlhäuser. Introducing asymmetric dc-nets. In Communications and network security (CNS), 2014 IEEE conference on, 2014, pages 508–509. Fábio Borges, Denise Demirel, Leon Böck, Johannes Buchmann, and Max Mühlhäuser. A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. In Computers and communication (ISCC), 2014 IEEE symposium on, 2014, pages 1–6. Fábio Borges and Leonardo A. Martucci. iKUP keeps users’ privacy in the smart grid. In Communications and network security (CNS), 2014 IEEE conference on, 2014, pages 310–318. Fábio Borges and Max Mühlhäuser. EPPP4SMS: efficient privacy-preserving protocol for smart metering systems and its simulation using real-world data. IEEE trans. smart grid, 5(6):2701–2708, 2014.

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 56/59

slide-113
SLIDE 113

Bibliography II

Fábio Borges, Leonardo A. Martucci, Filipe Beato, and Max Mühlhäuser. Secure and privacy-friendly public key generation and certification. In Trust, security and privacy in computing and communications (TrustCom), 2014 IEEE 13th international conference on, 2014, pages 114–121. Fábio Borges, Leonardo A. Martucci, and Max Mühlhäuser. Analysis of privacy-enhancing protocols based on anonymity

  • networks. In Smart grid communications (SmartGridComm), 2012

IEEE third international conference on, 2012, pages 378–383. Fábio Borges, Albrecht Petzoldt, and Renato Portugal. Small private keys for systems of multivariate quadratic equations using symmetric cryptography. In XXXIV CNMAC - congrasso nacional de matemática aplicada e computacional. Águas de Lindóia - SP, 2012, pages 1085–1091. Fábio Borges, Raqueline A. M. Santos, and Franklin L. Marquezino. Preserving privacy in a smart grid scenario using quantum

  • mechanics. Security and communication networks:n/a–n/a, 2014.

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 57/59

slide-114
SLIDE 114

Bibliography III

Fábio Borges, Florian Volk, and Max Mühlhäuser. Efficient, verifiable, secure, and privacy-friendly computations for the smart

  • grid. In Innovative smart grid technologies conference (ISGT),

2015 IEEE power energy society, 2015, pages 1–5.

  • D. Chaum. The dining cryptographers problem: unconditional

sender and recipient untraceability. J. cryptol., 1(1):65–75, March 1988. Philippe Golle and Ari Juels. Dining cryptographers revisited.

  • English. In Christian Cachin and JanL. Camenisch, editors,

Advances in cryptology - eurocrypt 2004. Volume 3027, in Lecture Notes in Computer Science, pages 456–473. Springer Berlin Heidelberg, 2004. Ulrich Greveler, Benjamin Justus, and Dennis Löhr. Identifikation von videoinhalten über granulare stromverbrauchsdaten. In

  • Sicherheit. Neeraj Suri and Michael Waidner, editors. Volume 195.

In LNI. GI, 2012, pages 35–45.

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 58/59

slide-115
SLIDE 115

Bibliography IV

Pedro Lara, Fábio Borges, Renato Portugal, and Nadia Nedjah. Parallel modular exponentiation using load balancing without

  • precomputation. Journal of computer and system sciences,

78(2):575–582, 2012.

August 31, 2015 – LNCC – CSR – Pós – TU Darmstadt – FB – 59/59