Skip to main content

A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment

  • Chapter
  • First Online:
Emerging Trends in Cybersecurity Applications

Abstract

The smart gas grid (SGG) implies to enhance current gas distribution grids by establishing continuous on-request and bidirectional data interchange between metering devices, gas flow instrument’s, utilities, and end clients. SGG integrates IoT in gas distribution system and improves the management in hazard minimization for gas infrastructure. As a result, the security and privacy of this type of vital infrastructure are frequently overlooked during the design process. Cloud reserves are frequently researched to store data from smart meters. Regardless of SGG’s exemplary service, this raises concerns about the unpredictable and long-term connections between cloud data hubs and smart meters. To address this issue, the integration of fog computing with SGG emerges as a promising solution. This chapter proposed a hyperelliptic curve (HYEC)-based proxy signcryption scheme based on identities of data owners and data users in fog computing environment (IBPSC-SGG-FCE). The use of fog computing layer provides excellent response times, reliability, and enhanced privacy. HYEC enhances network computation efficiency. Formal security analysis is used to assess the toughness of security measures. Under OFMC and CL-Atse backend, the simulation study using Automated Validation of Internet Security-sensitive Protocols and Applications (AVISPA) tool shows that the proposed scheme is safe. The computation and communication costs of the proposed scheme have also been compared to those of the relevant existing schemes in the performance analysis. The security and performance evaluations show that the proposed scheme is superior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. M. Sheha, K. Mohammadi, K. Powell, Techno-economic analysis of the impact of dynamic electricity prices on solar penetration in a smart grid environment with distributed energy storage. Appl. Energy 282, 116168 (2021)

    Article  Google Scholar 

  2. O.M. Butt, M. Zulqarnain, T.M. Butt, Recent advancement in smart grid technology: future prospects in the electrical power network. Ain Shams Eng. J. 12(1), 687–695 (2021)

    Article  Google Scholar 

  3. A. Panayiotou, N.P. Stavrou, E. Stergiou, Applying the industry 4.0 in a smart gas grid: the Greek Gas Distribution Network case, in 2021 International Symposium on Electrical, Electronics and Information Engineering, (2021), pp. 180–184

    Chapter  Google Scholar 

  4. A.R. Al-Ali, T. Landolsi, M.H. Hassan, M. Ezzeddine, M. Abdelsalam, M. Baseet, An IoT-based smart utility meter, in 2018 2nd International Conference on Smart Grid and Smart Cities (ICSGSC), (IEEE, 2018), pp. 80–83

    Chapter  Google Scholar 

  5. H. Lund, Renewable heating strategies and their consequences for storage and grid infrastructures comparing a smart grid to a smart energy systems approach. Energy 151, 94–102 (2018)

    Article  Google Scholar 

  6. F. Dababneh, L. Li, Integrated electricity and natural gas demand response for manufacturers in the smart grid. IEEE Trans. Smart Grid 10(4), 4164–4174 (2018)

    Article  Google Scholar 

  7. Kamrani, F., Fattaheian-Dehkordi, Sajjad; Gholami, Mohammad; Abbaspour, Ali; Fotuhi-Firuzabad, Mahmud; Lehtonen, Matti 2021. A Two-Stage Flexibility-Oriented Stochastic Energy Management Strategy for Multi-Microgrids Considering Interaction With Gas Grid

    Google Scholar 

  8. S. Colombo, Y. Lim, F. Casalegno, Deep vision shield: assessing the use of hmd and wearable sensors in a smart safety device, in Proceedings of the 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments, (2019), pp. 402–410

    Chapter  Google Scholar 

  9. A. Elmrini, A.G. Amrani, Wireless sensors network for traffic surveillance and management in smart cities, in 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), (IEEE, 2018), pp. 562–566

    Chapter  Google Scholar 

  10. S. Surnov, I. Bychkovskiy, G. Surnov, S. Krasnov, Smart Monitoring: remote-monitoring technology of power, gas, and water consumption in Smart Cities. arXiv preprint arXiv:1910.08759 (2019)

    Google Scholar 

  11. J. Qiu, J. Zhao, H. Yang, D. Wang, Z.Y. Dong, Planning of solar photovoltaics, battery energy storage system and gas micro turbine for coupled micro energy grids. Appl. Energy 219, 361–369 (2018)

    Article  Google Scholar 

  12. E.A.M. Ceseña, P. Mancarella, Energy systems integration in smart districts: robust optimisation of multi-energy flows in integrated electricity, heat and gas networks. IEEE Trans. Smart Grid 10(1), 1122–1131 (2018)

    Article  Google Scholar 

  13. J. Savickis, L. Zemite, I. Bode, L. Jansons, Natural gas metering and its accuracy in the smart gas supply systems. Latv. J. Phys. Tech. Sci. 57(5), 39–50 (2020)

    Google Scholar 

  14. X. Li, K. Chen, Identity based proxy-signcryption scheme from pairings, in IEEE International Conference on Services Computing, 2004 (SCC 2004). Proceedings, vol. 2004, (IEEE, 2004), pp. 494–497

    Google Scholar 

  15. Q. Wang, Z. Cao, Efficient ID-based proxy signature and proxy signcryption form bilinear pairings, in International Conference on Computational and Information Science, (Springer, Berlin/Heidelberg, 2005), pp. 167–172

    Google Scholar 

  16. M. Wang, H. Li, Z. Liu, Efficient identity based proxy-signcryption schemes with forward security and public verifiability, in International Conference on Networking and Mobile Computing, (Springer, Berlin/Heidelberg, 2005), pp. 982–991

    Chapter  Google Scholar 

  17. H.M. Elkamchouchi, Y. Abouelseoud, A new proxy identity-based signcryption scheme for partial delegation of signing rights. IACR Cryptol. ePrint Arch. 2008, 41 (2008)

    Google Scholar 

  18. X.X. Tian, J.P. Xu, H.J. Li, Y. Peng, A.Q. Zhang, Secure ID-based proxy signcryption scheme with designated proxy signcrypter, in 2009 International Conference on Multimedia Information Networking and Security, vol. 1, (IEEE, 2009), pp. 351–355

    Chapter  Google Scholar 

  19. C.C. Tsai, K.C. Liao, T.H. Chen, W.B. Lee, Security enhancement of a novel proxy key generation protocol, in 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), vol. 2, (IEEE, 2007), pp. 681–688

    Chapter  Google Scholar 

  20. G. Swapna, P.V.S.S.N. Gopal, T. Gowri, P.V. Reddy, An efficient ID-based proxy signcryption scheme. Int. J. Inf. Netw. Secur. 1(3), 200 (2012)

    Google Scholar 

  21. H.M. Elkamchouchi, Y. Abouelseoud, E.F.A. Elkhair, K. Elsheikh, An efficient ID-based proxy signcryption scheme without bilinear pairings. Int. J. Comput. Appl. 975, 8887 (2013)

    Google Scholar 

  22. N.W. Lo, J.L. Tsai, A provably secure proxy signcryption scheme using bilinear pairings. J. Appl. Math., 2014 (2014)

    Google Scholar 

  23. H.Y. Lin, T.S. Wu, S.K. Huang, Y.S. Yeh, Efficient proxy signcryption scheme with provable CCA and CMA security. Comput. Math. Appl. 60(7), 1850–1858 (2010)

    MathSciNet  MATH  Google Scholar 

  24. C. Zhou, Y. Zhang, L. Wang, A provable secure identity-based generalized proxy signcryption scheme. Int. J. Netw. Secur. 20(6), 1183–1193 (2018)

    Google Scholar 

  25. H. Yu, Z. Wang, J. Li, X. Gao, Identity-based proxy signcryption protocol with universal composability. Secur. Commun. Netw. 2018 (2018)

    Google Scholar 

  26. N.W. Hundera, Q. Mei, H. Xiong, D.M. Geressu, A secure and efficient identity-based proxy signcryption in cloud data sharing. KSII Trans. Internet Inf. Syst. (TIIS) 14(1), 455–472 (2020)

    Google Scholar 

  27. H. Guo, L. Deng, An identity based proxy signcryption scheme without pairings. Int. J. Netw. Secur. 22(4), 561–568 (2020)

    Google Scholar 

  28. P.R. Yogesh, Formal verification of secure evidence collection protocol using BAN logic and AVISPA. Proc. Comput. Sci. 167, 1334–1344 (2020)

    Article  Google Scholar 

  29. P.R. Yogesh, Backtracking tool root-tracker to identify true source of cyber crime. Proc. Comput. Sci. 171, 1120–1128 (2020)

    Article  Google Scholar 

  30. R.Y. Patil, S.R. Devane, Network forensic investigation protocol to identify true origin of cyber crime. J. King Saud Univ. Comput. Inf. Sci. (2019)

    Google Scholar 

  31. C. Zhou, Z. Zhao, W. Zhou, Y. Mei, Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Secur. Commun. Netw. 2017 (2017)

    Google Scholar 

  32. Y. Ming, Y. Wang, Proxy signcryption scheme in the standard model. Secur. Commun. Netw. 8(8), 1431–1446 (2015)

    Article  Google Scholar 

  33. H. Yu, Z. Wang, Construction of certificateless proxy signcryption scheme from CMGs. IEEE Access 7, 141910–141919 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachana Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Patil, R., Patil, Y.H., Bannore, A., Karati, A., Kachhoriya, R., Ranjanikar, M. (2023). A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment. In: Daimi, K., Alsadoon, A., Peoples, C., El Madhoun, N. (eds) Emerging Trends in Cybersecurity Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-09640-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-09640-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-09639-6

  • Online ISBN: 978-3-031-09640-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics