{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:13:48Z","timestamp":1758845628087,"version":"3.40.5"},"reference-count":50,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>In smart grids (SGs), smart meters (SMs) are usually deployed to collect and transmit customers' electricity consumption data in real-time to the control center. Due to the open nature of the SG communication, several privacy-preserving data aggregation schemes have been proposed to protect the privacy of customers. However, most of these schemes cannot protect against internal attackers and they are not efficient, since SMs are constrained in processing, memory, and computing capabilities. To address these problems, the authors propose a privacy-aware lightweight data aggregation scheme against internal attackers based on Elliptic Curve Cryptography (ECC). The scheme satisfies all the security requirements of SG, and supports conditional traceability, strong anonymity and autonomy. The authors demonstrate that the proposed scheme provides confidentiality based on the Computational Diffie-Hellman (CDH) assumption and unforgeability in the security model based on the intractability of the Discrete Logarithm (DL) problem. Extensive performance analysis shows that the proposed scheme is very efficient.<\/jats:p>","DOI":"10.4018\/ijisp.2019100107","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T14:33:27Z","timestamp":1568385207000},"page":"109-138","source":"Crossref","is-referenced-by-count":5,"title":["A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks"],"prefix":"10.4018","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1939-0219","authenticated-orcid":true,"given":"Ismaila Adeniyi","family":"Kamil","sequence":"first","affiliation":[{"name":"University of Ibadan, Ibadan, Nigeria"}]},{"family":"Sunday Oyinlola Ogundoyin","sequence":"additional","affiliation":[{"name":"University of Ibadan, Ibadan, Nigeria"}]}],"member":"2432","reference":[{"key":"IJISP.2019100107-0","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2553647"},{"key":"IJISP.2019100107-1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_20"},{"key":"IJISP.2019100107-2","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2016040101"},{"key":"IJISP.2019100107-3","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2012.6542936"},{"key":"IJISP.2019100107-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.07.005"},{"key":"IJISP.2019100107-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.04.005"},{"key":"IJISP.2019100107-6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"IJISP.2019100107-7","doi-asserted-by":"publisher","DOI":"10.3390\/en11082085"},{"key":"IJISP.2019100107-8","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0255-5"},{"key":"IJISP.2019100107-9","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0292-0"},{"key":"IJISP.2019100107-10","doi-asserted-by":"publisher","DOI":"10.3390\/en11112972"},{"key":"IJISP.2019100107-11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2865937"},{"issue":"3","key":"IJISP.2019100107-12","first-page":"361","article-title":"Security arguments for digital signatures and blind signatures.","volume":"13","author":"P.David","year":"2000","journal-title":"Journal of Cryptography"},{"key":"IJISP.2019100107-13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037553"},{"key":"IJISP.2019100107-14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"journal-title":"Roadmap for smart grid interoperability standards","year":"2010","author":"N.Framework","key":"IJISP.2019100107-15"},{"key":"IJISP.2019100107-16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"IJISP.2019100107-17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2412091"},{"key":"IJISP.2019100107-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.019"},{"key":"IJISP.2019100107-19","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"IJISP.2019100107-20","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017070105"},{"key":"IJISP.2019100107-21","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080114"},{"key":"IJISP.2019100107-22","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0983-3"},{"key":"IJISP.2019100107-23","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3194845"},{"key":"IJISP.2019100107-24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"IJISP.2019100107-25","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2449278"},{"key":"IJISP.2019100107-26","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1385116"},{"key":"IJISP.2019100107-27","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2018.1498268"},{"key":"IJISP.2019100107-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.12.009"},{"key":"IJISP.2019100107-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.008"},{"key":"IJISP.2019100107-30","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1191"},{"key":"IJISP.2019100107-31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2721542"},{"key":"IJISP.2019100107-32","article-title":"On the soundness and security of privacy-preserving SVM for outsourcing data classification.","author":"X.Li","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"IJISP.2019100107-33","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2489258"},{"key":"IJISP.2019100107-34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2809672"},{"key":"IJISP.2019100107-35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32899-7"},{"key":"IJISP.2019100107-36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"IJISP.2019100107-37","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2018.1477320"},{"key":"IJISP.2019100107-38","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.50"},{"key":"IJISP.2019100107-39","doi-asserted-by":"publisher","DOI":"10.1109\/CPE.2018.8372598"},{"issue":"2","key":"IJISP.2019100107-40","first-page":"1","article-title":"Secure and privacy-preserving referral framework for e-Health system","volume":"6","author":"O.Olakanmi","year":"2017","journal-title":"International Journal of Information Security Science"},{"key":"IJISP.2019100107-41","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599856"},{"key":"IJISP.2019100107-42","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2018010104"},{"key":"IJISP.2019100107-43","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224389"},{"year":"2011","author":"Shamus opportunity investigator.","key":"IJISP.2019100107-44"},{"key":"IJISP.2019100107-45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.025"},{"key":"IJISP.2019100107-46","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288161"},{"key":"IJISP.2019100107-47","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997253"},{"key":"IJISP.2019100107-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.013"},{"key":"IJISP.2019100107-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2015.11.004"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=237213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:59:32Z","timestamp":1651831172000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019100107"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":50,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019100107","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}