Abstract
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. However, with data no longer being stored locally, how to ensure the integrity of data stored in the cloud in the smart grid has become an urgent problem awaiting solution. Provable data possession has been proposed to solve this problem. With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. The scheme is proved unforgeable under the small integer solution hard assumption in the standard model. Compared with other two efficient lattice-based provable data possession schemes in the standard model, our scheme also shows efficiency.
Introduction
In recent years, the smart grid has gained more and more attention from many countries, and a great number of smart grid projects have been launched around the world. 1 A smart grid is a new type of modern power grid integrating the advanced sensing measurement technology, information and communication technology, automatic control technology, analysis and decision technology, and energy power technology with grid infrastructure. As the next-generation electric power network, it is aimed to achieve reliability, security, economy, efficiency, environment friendliness as well as use safety.
A smart grid relies on the Internet of Things (IoT) technology. The core technologies of IoT cover the awareness of physical state, information representation, information transmission, and information processing, ranging from the sensor network to the upper application systems. In the aspects of communication, security, and the upper application of smart grid information system, IoT plays an important role. The sensor network technology can be used in the data and information acquisition of smart meters; the real-time and security communication technology can be used for the transmission of smart grid operation parameters, so that the operational data and power load data of the smart grid can be transmitted in real-time; the data storage and information representation technology can be used to store, manage, query, and organize huge amounts of data of the smart grid; and the distributed data processing and task scheduling technology can be used for the security and stability analysis of the smart grid and the real-time deployment of energy after new energy integration. In a word, IoT has turned the power system from a relatively closed and self-contained control system into one that is part of a digital environment, which has not only improved the stability of the smart grid, but also made new energy sources such as wind power and nuclear power more easily integrated into the smart grid for unified planning and scheduling.
Nowadays, cloud computing provides users with massive computing and storage resources. Users can use it at a low cost without having to buy local equipment, saving a large amount of hardware, software, and maintenance costs. For cloud computing, the National Institute of Standards and Technology (NIST) defines three types of cloud services, that is, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtual machines or other infrastructure services such as storage resources; PaaS provides development platforms including software development kits, documentation, and testing environment; and SaaS provides application software based on cloud infrastructure, which users can use directly through browsers, and so on. At present, the research hotspots of cloud computing include job scheduling, 2 cloud-based service broker routing policy, 3 and so on.
In a smart grid, there are a large number of sensors deployed, exponentially increasing the collected data and thus greatly enlarging the data storage requirement. To deal with this issue, people combine the smart grid with cloud computing to form cloud-based smart grid data management systems. 4
In terms of the security of cloud-based systems, Gou et al. 5 analyzed various security issues and challenges in the cloud computing environment, which involve security policies, user-oriented security, data storage security, application security, and network security. In this article, we mainly focus on the data storage security.
In a cloud-based smart grid data management system, data are no longer stored locally. But if these data are changed intentionally or unintentionally without being detected in time by users, it will bring serious consequences to the operation of the smart grid. Therefore, ensuring the integrity of the data stored in the cloud in the smart grid has become an urgent problem awaiting solution. Ateniese et al. 6 studied integrity checking for the first time. They put forward the concept of provable data possession (PDP) and proposed two concrete schemes. In their model, users can be ensured that their data are intact in the cloud without having to download the data from the cloud. It is a lightweight integrity probabilistic checking model. In their first scheme, if a file is divided into 10,000 blocks, of which 1% are tampered with, a user will be able to detect the change at a probability of 99% by just randomly selecting 460 blocks (4.6%) as the audit request. Following Ateniese et al.’s pioneering work, many other PDP schemes7,8 were proposed. To address the integrity of cloud-based smart grid data management systems, He et al. 4 proposed a certificateless PDP scheme. However, Zhou 9 later pointed out that He et al.’s scheme is insecure as a malicious cloud can cheat the users. In addition, He et al.’s scheme relies on the random oracle model 10 and cannot withstand the quantum computer attacks. 11
Our contributions
We propose a security model of the PDP scheme and summarize its security requirements.
We propose a quantum attack-resistant PDP scheme based on lattice for cloud-based smart grid data management systems and prove its unforgeable security in the standard model. We also show that the proposed scheme can satisfy other security requirements.
We compare our scheme with other two quantum attack-resistant PDP schemes in the standard model to show that our scheme is also efficient.
The rest of the article is organized as follows. In section “Related works,” we review some related work. In section “Preliminaries,” we describe some preliminaries about lattice. In section “Definition and security requirements of PDP,” we introduce the definition and security requirements of PDP. In section “The scheme,” we propose a concrete PDP scheme based on lattice. In section “Analyses of the scheme,” we analyze the security and efficiency of the proposed scheme. We conclude the article in section “Conclusion.”
Related works
In 2007, Ateniese et al. 6 pioneered the idea of PDP and proposed two concrete schemes. However, their schemes only support private audit, that is, only cloud users can audit the data stored in the cloud, because in the audit process, some private information must be used. Later, Wang et al. 12 put forward a public audit scheme. They removed the private information in the audit process, so that anyone can audit the data stored in the cloud. In this way, users can delegate their audit work to a third-party auditor (TPA) to reduce the burden of their own and the TPA can prove the data corruption to the court when a dispute occurs. Furthermore, Wang et al. 13 pointed out that TPA can reveal users’ data by solving enough linear equations in scheme [12] and proposed a privacy-preserving public PDP scheme by introducing random numbers.
All the above PDP schemes were proposed in the random oracle model, which, however, is just an ideal model. There is no random oracle in reality, and the random oracles are often replaced by some concrete hash functions in the real world. Some studies 10 have shown that schemes secure in the random oracle model will not be still secure when the random oracles are replaced by concrete hash functions. To deal with this issue, Zhang et al. 14 proposed an efficient identity-based public PDP scheme in the standard model (without relying on the random oracle model).
With the rapid development of the quantum computer technology, all schemes based on factoring, discrete log, or bilinear pairings have become insecure under quantum computers, but schemes based on lattice can resist quantum computer attacks. 15 In 2016, NIST initiated a process to solicit, evaluate, and standardize post-quantum cryptographic algorithms around the world, marking the beginning of the post-quantum era. To deal with this issue, Xu et al. 16 proposed a lattice-based public PDP scheme. However, their scheme relies on the random oracle model. Chen et al. 17 proposed an efficient lattice-based PDP scheme in the standard model, which is based on the ideal lattice hard problem. Recently, Yang et al. 18 also proposed an efficient lattice-based PDP scheme in the standard model, which is based on the Ring Learning with Errors (RLWEs) hard problem. However, lattice with special structures such as ideal lattice and RLWE lattice is less secure than that without special structures. 19 Therefore, all the above schemes are not suitable for cloud-based smart grid data management systems.
In 2018, He et al. 4 proposed a certificateless PDP scheme for cloud-based smart grid data management systems. Thereafter, Zhou 9 pointed out that He et al.’s scheme 4 is not secure as a malicious cloud can cheat users. Furthermore, He et al.’s scheme is not quantum attack-resistant and is reliant on the random oracle model.
Preliminaries
In this section, we will give some definitions, theorems, and hard problem of lattice. The definitions will help the readers understand the concept of lattice better. The theorems show the existence of the algorithms TrapGen and SamplePre, which will be used in the design of our scheme. The hard problem will be used in the unforgeable proof of our scheme.
Notation
The lower-case letters denote the column vectors and the upper-case letters denote the matrices.
Lattice
Definition 1
A lattice is a discrete additive subgroup of
Q-ary lattices
Definition 2
Given a matrix
Discrete Gaussian distribution
Definition 3
For a parameter
The discrete Gaussian distribution over
Trapdoor functions
Theorem 1
Let
Theorem 2
On input
Hard lattice problem
The security of our lattice-based PDP scheme relies on the hardness assumption of the small integer solution (SIS) problem.
Definition 4
SIS problem:
20
given
Definition and security requirements of PDP
In this section, we will give the algorithm constitution and design goals of PDP.
Definition of PDP
There are three participants in a PDP scheme, that is, Cloud server, Cloud user, and TPA, as illustrated in Figure 1. The process of PDP is as follows.

System model of PDP.
A user first divides his data to
A PDP scheme consists of the following four algorithms:
Design goals of PDP
The scheme
The scheme includes the following four algorithms. In the Setup algorithm, some common parameters are produced. In the TagSign algorithm, user produces a tag for each file block. Then, he transmits the file blocks along with the tags to the cloud and deletes them locally. In the ProofGen algorithm, TPA sends an audit request to the cloud and then the cloud responds a proof of data being intact to TPA. In the VerifyProof algorithm, TPA verifies the correctness of the proof. If it is correct, TPA can be sure that the data are intact.
Setup: the cloud user runs the
TagSign: the message file is divided into
ProofGen: to confirm the data in the cloud are intact, TPA selects a subset
VerifyProof: TPA verifies whether the equation
Analyses of the scheme
Security model of PDP
In the following, we will give the security model of PDP, which will be used in the unforgeable security proof of our scheme.
The unforgeable security of a PDP scheme is defined through an interactive game between an adversary
Setup: the challenger
Query:
Challenge:
Forge:
If
Definition 5
A PDP scheme is secure if for any PPT adversary
Security theorem
According to the above security model of PDP, we prove that our scheme is unforgeable assuming that the SIS problem is hard.
Theorem 3
In the standard model, if there is an adversary
Proof
Given a random instance
Other design goals
Some common design goals include public auditability and privacy preserving:
Public auditability: the public auditability of our scheme is evident. In our
Privacy preserving: TPA should not deduce the users’ data by solving the linear equations when it audits the cloud. In our
Efficiency
In this section, we will evaluate the efficiency of our scheme. Only efficient scheme has practical value. To the best of our knowledge, there have been only two lattice-based PDP schemes in the standard model till now, that is, schemes [17] and [18]. We compare the costs of computation, storage, and communication of our scheme with those of the other two. The computation cost of the
Computation costs.
Note:
Storage and communication costs.
Note:
To provide more direct comparisons, we take
Computation costs (multiplications in
Note:
Storage and communication costs (bit).
Note:

cloud server’s running time.

TPA’s running time.
From Table 3, we can see that scheme [17] is the most efficient one in the
Conclusion
To resist quantum computer attacks, a lattice-based PDP scheme is proposed for cloud-based smart grid data management systems to ensure the integrity of cloud data. We prove that the scheme is secure under the SIS assumption in the standard model, and performance analysis shows that the scheme is efficient.
Footnotes
Acknowledgements
The authors thank Ms Yan Di for checking the article.
Handling Editor: Miguel Acevedo
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the Scientific and Technological Research Project of Jiangxi Provincial Education Department of China under grant GJJ201807, the National Natural Science Foundation of China under grant 62041603, and the key Project of Jiangxi Provincial Natural Science Foundation of China under grant 20202ACBL202005.
