Look-Up Table based FHE System for Privacy Preserving Anomaly Detection in Smart Grids

被引:5
|
作者
Li, Ruixiao [1 ]
Bhattacharjee, Shameek [2 ]
Das, Sajal K. [3 ]
Yamana, Hayato [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Commun Engn, Tokyo, Japan
[2] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
[3] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO USA
关键词
anomaly (attack) detection; smart grid; privacy-preserving; FHE; look-up table;
D O I
10.1109/SMARTCOMP55677.2022.00030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In advanced metering infrastructure (AMI), the customers' power consumption data is considered private but needs to be revealed to data-driven attack detection frameworks. In this paper, we present a system for privacy-preserving anomaly-based data falsification attack detection over fully homomorphic encrypted (FHE) data, which enables computations required for the attack detection over encrypted individual customer smart meter's data. Specifically, we propose a homomorphic lookup table (LUT) based FHE approach that supports privacy preserving anomaly detection between the utility, customer, and multiple partied providing security services. In the LUTs, the data pairs of input and output values for each function required by the anomaly detection framework are stored to enable arbitrary arithmetic calculations over FHE. Furthermore, we adopt a private information retrieval (PIR) approach with FHE to enable approximate search with LUTs, which reduces the execution time of the attack detection service while protecting private information. Besides, we show that by adjusting the significant digits of inputs and outputs in our LUT, we can control the detection accuracy and execution time of the attack detection, even while using FHE. Our experiments confirmed that our proposed method is able to detect the injection of false power consumption in the range of 11-17 secs of execution time, depending on detection accuracy.
引用
收藏
页码:108 / 115
页数:8
相关论文
共 50 条
  • [31] A novel table look-up scheme based on GFScom and its application
    Shengli Zhang
    Yongming Li
    Soft Computing, 2017, 21 : 6767 - 6781
  • [32] Non-Volatile Look-up Table Based FPGA Implementations
    Xie, Lei
    Du Nguyen, Hoang Anh
    Taouil, Mottaqiallah
    Hamdioui, Said
    Bertels, Koen
    Alfailakawi, Mohammad
    PROCEEDINGS OF 2016 11TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2016, : 165 - 170
  • [33] Uplink Signal Detection via Look-Up Table-Based AMP for Massive MIMO Systems
    Shimamura, Atsunori
    Takahashi, Takumi
    Ibi, Shinsuke
    Sampei, Seiichi
    IEEE ACCESS, 2023, 11 : 13044 - 13057
  • [34] A Blockchain-Based Privacy-Preserving Scheme for Smart Grids
    Chen, Xin
    Shen, Jiachen
    Cao, Zhenfu
    Dong, Xiaolei
    2020 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2020), 2020, : 120 - 124
  • [35] A look-up table method based on unstructured grids and its application to non-ideal compressible fluid dynamic simulations
    Rubino, A.
    Pini, M.
    Kosec, M.
    Vitale, S.
    Colonna, P.
    JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 28 : 70 - 77
  • [36] A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE
    Shaik, Imtiyazuddin
    Singh, Ajeet Kumar
    Narumanchi, Harika
    Emmadi, Nitesh
    Bhattachar, Rajan Mindigal Alasingara
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2020), 2020, 12161 : 193 - 218
  • [37] A New Digit-Reversal Permutation Algorithm Based on Look-up Table
    Yang, Ping
    Zheng, Jianhong
    Huang, Zongzhi
    2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 2, 2011, : 175 - 178
  • [38] Digital predistortion based on multidimensional look-up table storing polynomial coefficients
    He, Z.
    Ye, W.
    Feng, S.
    ELECTRONICS LETTERS, 2012, 48 (22) : 1396 - 1397
  • [39] Memristor-based Pass Gate Targeting FPGA Look-Up Table
    Nguyen Cong Dao
    Koch, Dirk
    2021 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2021,
  • [40] A More Secure Chaotic Cryptographic Scheme Based on the Dynamic Look-Up Table
    Kwok-Wo Wong
    Kwan-Pok Man
    Shujun Li
    Xiaofeng Liao
    Circuits, Systems and Signal Processing, 2005, 24 : 571 - 584