CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data | SpringerLink
Skip to main content

CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data

  • Conference paper
  • First Online:
Data Mining and Big Data (DMBD 2022)

Abstract

Analyzing statistical features of electrical data is an important issue in the field of electrical data research, which often concerns collecting huge amounts of original data from various sources. Evidently, data compression and security issues are two key aspects of such process. However, a proportion of electrical data owners may agree to support electrical data analysis only when their private data are not disclosed to the public or even to the researchers. To address this problem, this paper proposes a secure data processing method named Compressed Sensing Homomorphic Encryption Method (CSHEM), which simultaneously achieves data compression and encryption. CSHEM also could allow researchers to reconstruct statistical analysis results of the original electrical data without requirements to possess these original data. We conduct experiments and simulations using real electrical data from over 100 households. The results show that the proposed method could realize data compression and encryption, and the reconstruction results could express the true statistical information of the original data.

This work is supported in part by the National Key Research and Development Program of China (Grant no. 2020YFB1805402), the National Natural Science Foundation of China (Grant nos. 61972051, 62032002) and BUPT Excellent Ph.D. Students Foundation (CX2022139).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 10295
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 12869
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ni, J., Zhang, K., Lin, X., Shen, X.S.: Balancing security and efficiency for smart metering against misbehaving collectors. IEEE Trans. Smart Grid 10(2), 1225–1236 (2019)

    Google Scholar 

  2. Smith, M.D., Paté-Cornell, M.E.: Cyber risk analysis for a smart grid: how smart is smart enough? a multiarmed bandit approach to cyber security investment. IEEE Trans. Eng. Manag. 65(03), 434–447

    Google Scholar 

  3. Chen, B., Yu, X.: Research on the application and security of cloud computing in smart power grids. In: 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), pp. 784–7842 (2019)

    Google Scholar 

  4. Ma, G., Yang, X., Zhuo, J., Gao, Q.. Zhou, Q.: Research on early warning model of enterprise operational risk based on electric power data. Distrib. Utilization 38(04), 16–21 (2011)

    Google Scholar 

  5. Rawat, D.B., Doku, R., Garuba, M.: Cybersecurity in big data era: from securing big data to data-driven security. IEEE Trans. Serv. Comput. 14(6):2055–2072 (2021)

    Google Scholar 

  6. Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239–258 (2021)

    Google Scholar 

  7. Dang, T.D., Hoang, D.: Nguyen, D.N.: Trust-based scheduling framework for big data processing with mapreduce. IEEE Transa. Serv. Comput. 15(1), 279–293 (2022)

    Google Scholar 

  8. Zouari, .J, Hamdi, M., Kim, T.H.: A Privacy-preserving Homomorphic encryption scheme for the Internet of Things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 2007, pp. 1939–1944 (2007)

    Google Scholar 

  9. Li, C., Liu, Q., Xie, Y., Wang, G.: Privacy protection method in internet of things based on homomorphic encryption. Comput. Eng. Appl. 51(06), 22–26 (2015)

    Google Scholar 

  10. Bringer, J., Chabanne, H.: Patey, A.: Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends. IEEE Signal Process. Mag. 30(2), 42–52 (2013)

    Google Scholar 

  11. You, I., Liang, J.: Research on secure identity authentication based on homomorphic encryption and biometric. Netinfo Secur. 2018(04), 1–8 (2018)

    Google Scholar 

  12. Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen Ciphertext attack. In: Advances in Cryptology-Proceedings of CRYPTO 1998, pp. 13–35 (1998)

    Google Scholar 

  13. Alharbi, K., Lin, X., Shao, J.: A framework for privacy-preserving data sharing in the Smart Grid. In: 2014 IEEE/CIC International Conference on Communications in China (ICCC) , pp. 214–21 (2004)

    Google Scholar 

  14. Li, Z., Zou, Y., Zhang, J., Ma, A.: A Privacy preservation scheme for data exchange of smart grid based on homomorphic encryption. Netinfo Secur. 2016(03), 1–7 (2016)

    Google Scholar 

  15. Candès, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)

    Article  MATH  Google Scholar 

  16. Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)

    Article  MATH  Google Scholar 

  17. Candès, E.J.: The restricted isometry property and its implications for compressed sensing. Comp. Rendus Math. 346, 589–592 (2008)

    Article  MATH  Google Scholar 

  18. Liu, L., Liu, Y., Liu, C., Zheng Z.: Iterative seismic random noise suppression method based on compressive sensing. Chin. J. Geophys. 64(12), 4629–4643 (2022)

    Google Scholar 

  19. Cao, H., Ye, Z.: Theoretical analysis and algorithm design of optimized pilot for downlink channel estimation in massive MIMO systems based on compressed sensing. Acta Physica Sinica 71(05), 7–16 (2022)

    Article  Google Scholar 

  20. Zhao, S., Li, X.: Research on reflection spectrum reconstruction algorithm based on compressed sensing. Spectro. Spect. Anal. 41(04), 1092–1096 (2021)

    Google Scholar 

  21. Wei, C., Yuan, G., Shi-Wei, J.: General image encryption algorithm based on deep learning compressed sensing and compound chaotic system. Acta Phys. Sin. 69(24), 99–111 (2020)

    Google Scholar 

  22. Yang, S., Tan, B.,. Guo, J.: A new data collection method based on compressed sensing for new generation energy internet. Renew. Energy Resour. 40(07), 952–958 (2021)

    Google Scholar 

  23. Wang, L., Li, L., Li, J., Li, J., Gupta, B.B., Liu, X.: Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet Things J. 6(2), 1402–1409 (2019)

    Article  Google Scholar 

  24. Cho, W., Yu, N.Y.: Secure and efficient compressed sensing-based encryption with sparse matrices. IEEE Trans. Inf. Forensics Secur. 15, 1999–2011 (2020)

    Article  Google Scholar 

  25. Candes, E., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inform. Theory 52, 489–509 (2006)

    Google Scholar 

  26. Candes, E.J., Tao, T.: Decoding by linear programming. IEEE Trans. Inform. Theory 51, 4203–4215 (2005)

    Article  MATH  Google Scholar 

  27. Armknecht, F., Boyd, C., Carr, C., et al.: A guide to fully homomorphic encryption. IACR Cryptol ePrint Arch 2015, 1192 (2015)

    Google Scholar 

  28. Muramatsu, J., Yoshimura, K., Davis, P., Uchida, A., Harayama, T.: Secret-key distribution based on bounded observability. Proc. IEEE 103(10), 1762–1780 (2015)

    Article  Google Scholar 

  29. Kiktenko, E.O., et al.: Lightweight authentication for quantum key distribution. IEEE Trans. Inf. Theory 66(10), 6354–6368 (2020)

    Article  MATH  Google Scholar 

  30. Wei-jing, Z., He-chun, Z., Shi-ying, Y., Tong, L.: Decentralized lightweight group key management for dynamic access control in iot environments. IEEE Trans. Netw. Serv. Manage. 17(3), 1742–1757 (2020)

    Article  Google Scholar 

  31. Yu, L., Barbot, J.P., Zheng, G., Sun, H.: Compressive sensing with chaotic sequence. IEEE Signal Process. Lett. 17(8), 731–734 (2010)

    Article  Google Scholar 

  32. Hongping, G., Zhi, L., Jian, L., Xi, W., Cheng, Z:. Compressive sensing using chaotic sequence based on Chebyshev map. Nonlinear Dyn. 278(4), 2429–2438 (2014)

    Google Scholar 

  33. Zhang, Q., Chen, Y., Chen, Y., Chi, Y., Wu. A.: A cognitive signals reconstruction algorithm based on compressed sensing. In: 2015 IEEE 5th Asia-Pacific Conference on Synthetic Aperture Radar (APSAR), pp. 724–727 (2017)

    Google Scholar 

  34. Sun, H., Ni, L.: Compressed sensing data reconstruction using adaptive generalized orthogonal matching pursuit algorithm. In: Proceedings of 2013 3rd International Conference on Computer Science and Network Technology, pp. 1102–1106 (2003)

    Google Scholar 

  35. Takeyama, P.: Ono, S.: Joint Mixed-noise removal and compressed sensing reconstruction of hyperspectral images via convex optimization. In: IGARSS 2020–2020 IEEE International Geoscience and Remote Sensing Symposium, pp. 1492–1495 (2020)

    Google Scholar 

  36. Mallat, S.G., Zhang, Z.: Matching pursuits with time-frequency dictionaries. IEEE Trans. Signal Process. 41, 3397–3415 (1993)

    Article  MATH  Google Scholar 

  37. Li, S., Cao, G. Wei. S.: Improved measurement matrix and reconstruction algorithm for compressed sensing. In: 2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC) 136–139 (2008)

    Google Scholar 

  38. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MATH  Google Scholar 

  39. Bansal R, Gupta S, Sharma G.: An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multim. Tools Appl. 76(15), 16529–16562 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haipeng Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, W., Peng, H., Li, L. (2022). CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data. In: Tan, Y., Shi, Y. (eds) Data Mining and Big Data. DMBD 2022. Communications in Computer and Information Science, vol 1744. Springer, Singapore. https://doi.org/10.1007/978-981-19-9297-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9297-1_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9296-4

  • Online ISBN: 978-981-19-9297-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics