Abstract
Analyzing statistical features of electrical data is an important issue in the field of electrical data research, which often concerns collecting huge amounts of original data from various sources. Evidently, data compression and security issues are two key aspects of such process. However, a proportion of electrical data owners may agree to support electrical data analysis only when their private data are not disclosed to the public or even to the researchers. To address this problem, this paper proposes a secure data processing method named Compressed Sensing Homomorphic Encryption Method (CSHEM), which simultaneously achieves data compression and encryption. CSHEM also could allow researchers to reconstruct statistical analysis results of the original electrical data without requirements to possess these original data. We conduct experiments and simulations using real electrical data from over 100 households. The results show that the proposed method could realize data compression and encryption, and the reconstruction results could express the true statistical information of the original data.
This work is supported in part by the National Key Research and Development Program of China (Grant no. 2020YFB1805402), the National Natural Science Foundation of China (Grant nos. 61972051, 62032002) and BUPT Excellent Ph.D. Students Foundation (CX2022139).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ni, J., Zhang, K., Lin, X., Shen, X.S.: Balancing security and efficiency for smart metering against misbehaving collectors. IEEE Trans. Smart Grid 10(2), 1225–1236 (2019)
Smith, M.D., Paté-Cornell, M.E.: Cyber risk analysis for a smart grid: how smart is smart enough? a multiarmed bandit approach to cyber security investment. IEEE Trans. Eng. Manag. 65(03), 434–447
Chen, B., Yu, X.: Research on the application and security of cloud computing in smart power grids. In: 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), pp. 784–7842 (2019)
Ma, G., Yang, X., Zhuo, J., Gao, Q.. Zhou, Q.: Research on early warning model of enterprise operational risk based on electric power data. Distrib. Utilization 38(04), 16–21 (2011)
Rawat, D.B., Doku, R., Garuba, M.: Cybersecurity in big data era: from securing big data to data-driven security. IEEE Trans. Serv. Comput. 14(6):2055–2072 (2021)
Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239–258 (2021)
Dang, T.D., Hoang, D.: Nguyen, D.N.: Trust-based scheduling framework for big data processing with mapreduce. IEEE Transa. Serv. Comput. 15(1), 279–293 (2022)
Zouari, .J, Hamdi, M., Kim, T.H.: A Privacy-preserving Homomorphic encryption scheme for the Internet of Things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 2007, pp. 1939–1944 (2007)
Li, C., Liu, Q., Xie, Y., Wang, G.: Privacy protection method in internet of things based on homomorphic encryption. Comput. Eng. Appl. 51(06), 22–26 (2015)
Bringer, J., Chabanne, H.: Patey, A.: Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends. IEEE Signal Process. Mag. 30(2), 42–52 (2013)
You, I., Liang, J.: Research on secure identity authentication based on homomorphic encryption and biometric. Netinfo Secur. 2018(04), 1–8 (2018)
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen Ciphertext attack. In: Advances in Cryptology-Proceedings of CRYPTO 1998, pp. 13–35 (1998)
Alharbi, K., Lin, X., Shao, J.: A framework for privacy-preserving data sharing in the Smart Grid. In: 2014 IEEE/CIC International Conference on Communications in China (ICCC) , pp. 214–21 (2004)
Li, Z., Zou, Y., Zhang, J., Ma, A.: A Privacy preservation scheme for data exchange of smart grid based on homomorphic encryption. Netinfo Secur. 2016(03), 1–7 (2016)
Candès, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)
Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)
Candès, E.J.: The restricted isometry property and its implications for compressed sensing. Comp. Rendus Math. 346, 589–592 (2008)
Liu, L., Liu, Y., Liu, C., Zheng Z.: Iterative seismic random noise suppression method based on compressive sensing. Chin. J. Geophys. 64(12), 4629–4643 (2022)
Cao, H., Ye, Z.: Theoretical analysis and algorithm design of optimized pilot for downlink channel estimation in massive MIMO systems based on compressed sensing. Acta Physica Sinica 71(05), 7–16 (2022)
Zhao, S., Li, X.: Research on reflection spectrum reconstruction algorithm based on compressed sensing. Spectro. Spect. Anal. 41(04), 1092–1096 (2021)
Wei, C., Yuan, G., Shi-Wei, J.: General image encryption algorithm based on deep learning compressed sensing and compound chaotic system. Acta Phys. Sin. 69(24), 99–111 (2020)
Yang, S., Tan, B.,. Guo, J.: A new data collection method based on compressed sensing for new generation energy internet. Renew. Energy Resour. 40(07), 952–958 (2021)
Wang, L., Li, L., Li, J., Li, J., Gupta, B.B., Liu, X.: Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet Things J. 6(2), 1402–1409 (2019)
Cho, W., Yu, N.Y.: Secure and efficient compressed sensing-based encryption with sparse matrices. IEEE Trans. Inf. Forensics Secur. 15, 1999–2011 (2020)
Candes, E., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theory 52, 489–509 (2006)
Candes, E.J., Tao, T.: Decoding by linear programming. IEEE Trans. Inform. Theory 51, 4203–4215 (2005)
Armknecht, F., Boyd, C., Carr, C., et al.: A guide to fully homomorphic encryption. IACR Cryptol ePrint Arch 2015, 1192 (2015)
Muramatsu, J., Yoshimura, K., Davis, P., Uchida, A., Harayama, T.: Secret-key distribution based on bounded observability. Proc. IEEE 103(10), 1762–1780 (2015)
Kiktenko, E.O., et al.: Lightweight authentication for quantum key distribution. IEEE Trans. Inf. Theory 66(10), 6354–6368 (2020)
Wei-jing, Z., He-chun, Z., Shi-ying, Y., Tong, L.: Decentralized lightweight group key management for dynamic access control in iot environments. IEEE Trans. Netw. Serv. Manage. 17(3), 1742–1757 (2020)
Yu, L., Barbot, J.P., Zheng, G., Sun, H.: Compressive sensing with chaotic sequence. IEEE Signal Process. Lett. 17(8), 731–734 (2010)
Hongping, G., Zhi, L., Jian, L., Xi, W., Cheng, Z:. Compressive sensing using chaotic sequence based on Chebyshev map. Nonlinear Dyn. 278(4), 2429–2438 (2014)
Zhang, Q., Chen, Y., Chen, Y., Chi, Y., Wu. A.: A cognitive signals reconstruction algorithm based on compressed sensing. In: 2015 IEEE 5th Asia-Pacific Conference on Synthetic Aperture Radar (APSAR), pp. 724–727 (2017)
Sun, H., Ni, L.: Compressed sensing data reconstruction using adaptive generalized orthogonal matching pursuit algorithm. In: Proceedings of 2013 3rd International Conference on Computer Science and Network Technology, pp. 1102–1106 (2003)
Takeyama, P.: Ono, S.: Joint Mixed-noise removal and compressed sensing reconstruction of hyperspectral images via convex optimization. In: IGARSS 2020–2020 IEEE International Geoscience and Remote Sensing Symposium, pp. 1492–1495 (2020)
Mallat, S.G., Zhang, Z.: Matching pursuits with time-frequency dictionaries. IEEE Trans. Signal Process. 41, 3397–3415 (1993)
Li, S., Cao, G. Wei. S.: Improved measurement matrix and reconstruction algorithm for compressed sensing. In: 2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC) 136–139 (2008)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Bansal R, Gupta S, Sharma G.: An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multim. Tools Appl. 76(15), 16529–16562 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, W., Peng, H., Li, L. (2022). CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data. In: Tan, Y., Shi, Y. (eds) Data Mining and Big Data. DMBD 2022. Communications in Computer and Information Science, vol 1744. Springer, Singapore. https://doi.org/10.1007/978-981-19-9297-1_19
Download citation
DOI: https://doi.org/10.1007/978-981-19-9297-1_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9296-4
Online ISBN: 978-981-19-9297-1
eBook Packages: Computer ScienceComputer Science (R0)