Abstract

Smart grids are a combination of traditional power system engineering as well as information and communications technology. Smart grid terminals provide convenient services to users by aggregating their data in real time. However, terminals can derive user privacy information from real-time data on smart devices. Therefore, security data aggregation has been widely studied in the field of smart grid. Most existing schemes are one-dimensional data aggregation or rely on a trusted third party. In reality, multidimensional data (such as a user’s electricity consumption or user’s main usage time, etc.) makes sense for terminals to flexibly adjust supply and demand strategies. In this paper, we propose an efficient and secure multidimensional data aggregation scheme that supports batch validation without a trusted third party. Firstly, we apply the Chinese remainder theorem to encode the user’s multidimensional data and realize the independence of each dimension in terminal decryption. Secondly, we adopt a secure key negotiation protocol that does not require a trusted third party. Finally, based on paillier homomorphic encryption and bilinear pairing, we construct an encryption scheme that can reuse the key and blind factor and support batch verification. The analysis results show that our scheme is secure for users’ privacy protection. Experimental results show that, compared with existing 1 dimensional aggregation schemes, our scheme has almost no growth in computational overhead for terminal decryption.

1. Introduction

In recent years, as increasing numbers of countries place more emphasis on the next generation of electricity networks, considerable human, material, and financial resources have been invested in the research and development of intelligent electricity networks. As the next generation of grids, smart grids integrate traditional grids with information and communication technologies for the efficient and reliable generation, transmission, distribution, and control of services [13], and these technologies will be used in future work. Smart grids will play an increasingly important role in meeting the needs of users, improving data reliability, and providing power control management [4]. In order to intelligently monitor and control the network in real time, smart grid control centers must continuously collect data on the amount of electricity consumed by users. But smart grid usage data directly reveals where, when, and what people are doing. In the event of a leak, these data can expose individual users’ electricity usage patterns. For example, if a user’s power consumption is almost zero at a fixed time of day, it can be inferred that the user is out at that time of day and no one else is home. If a smart device terminal obtains this data, it can use big data technology to provide personalized service recommendations to users and improve service quality. However, when an external attacker gains access to that user’s electricity data, it can be sold for financial gain or it can be used to commit a crime such as a burglary, while the user is away at a later date. Clearly, exposure to such sensitive information is a threat to the privacy of these users [5]. Thus, it is particularly important to ensure the confidentiality and integrity of the information transmitted in smart grids while protecting the privacy of the users in smart grids from being compromised [6].

Security and privacy are two of the main obstacles to the development of the smart grid. How to monitor regional electricity consumption without divulging the power consumption of a single user has become the direction of scholars. The homomorphic encryption scheme guarantees that the algebraic operation of cryptography is equivalent to the direct operation of plaintext. Therefore, homomorphic encryption schemes are widely used in smart grids to protect users’ privacy.

The idea of combining data aggregation with a homomorphic encryption algorithm is proposed to solve the privacy problem in smart grids. Compared with symmetric encryption algorithms, the use of homomorphic encryption algorithms and data aggregation combine to achieve both efficiency and privacy protection and to detect power leakage and fraud by comparing the aggregated results of smart meters with the total meter readings.

In 2012, Lu et al. [7] first proposed an EPPA scheme based on paillier homomorphic encryption and super-incremental sequences to address privacy concerns in smart grids. However, paillier encryption is not as efficient as BGN encryption in very small plaintext spaces; so in 2015, Chen et al. [8] proposed a BGN homomorphic encryption scheme based on MuDA data aggregation to solve the problem of small plaintext spaces and paillier encryption’s inefficiency. In order to measure the interval distribution of electricity consumption by users, Li et al., (2018) proposed a PPMA scheme for data aggregation across multiple subsets using super-incremental sequences and paillier homomorphic cryptography [9]. It can calculate the amount of electricity used and the number of users at a given time. In 2019, Saleemd et al. [10] proposed a fault-tolerant FESDA scheme to address the failure of unsuccessfully decrypting meter faults. When a user fails, the Control Center (CC) uses the user’s equivalent cipher to decrypt and gain good fault tolerance. However, in 2021 Wu et al. [11] found that the presence of equivalent ciphertext in the FESDA scheme can leak users’ private information, attacked the FESDA scheme, and proposed a secure PDFA aggregation scheme using the extended Shamir secret-sharing scheme.

These schemes require the involvement of a trusted third party, who passes the corresponding decryption key to CC, assists in the management of user registration and deregistration, and so on. However, finding a fully trusted third party in the real world is extremely difficult, and even if such a trusted third party does exist, significant human, material, and financial resources need to be devoted to maintaining its absolute security and credibility in the future. Based on these considerations, some scholars have proposed aggregation schemes without trusting third parties. In 2016 Knirsch et al. [12] proposed a time-series spatiotemporal aggregation shield that utilizes key superposition between users to protect individual privacy while still providing sufficient bug resistance and an efficient data aggregation scheme. In 2018, Li et al. [13] proposed a data aggregation scheme without trusted third parties based on BGN homomorphic encryption. And in the same year, Gong et al. [14] proposed a distribution method that does not rely on any trusted third party to generate security parameters that tolerate conspiratorial attacks between n-2 users. In 2019, Liu et al. [15] proposed an EC-Elgamal data aggregation scheme without a trusted third party, which protects the privacy of individual users by constructing a virtual aggregation region based on the level of trust between users. However, these schemes are functionally single and do not allow for the aggregation of multidimensional data.

In the above scheme, the signature of each cryptographic text needs to be verified, but it is less efficient. Several other proposals have been floated. In 2020, Ding et al. [16] proposed a homogenous encrypted data aggregation scheme based on user identity that allows only collectors authorized by electricity service providers to decrypt, thereby protecting the privacy of the user. In 2021, Chen et al. [17] proposed a data aggregation scheme based on dynamic member groups that enables dynamic user management. In 2022, Liu et al. [18] proposed a data aggregation scheme that supports the rapid detection of deceptive users.

These solutions address the different needs of smart grids, but none of them is fully functional. In real life, we expect a scheme that can achieve multidimensional data aggregation without the involvement of a trusted third party while protecting the privacy and integrity of users’ electricity data. Our scheme can solve this problem.

Our contributions are as follows:(i)We apply the Chinese remainder theorem [19] to construct a multidimensional data aggregation scheme. The Chinese remainder theorem makes each dimension independent of the other when the terminal is decrypted, which ensures the correctness of our scheme.(ii)We design a data aggregation scheme supporting key, blind factor reuses, and batch authentication based on paillier homomorphic encryption [20] scheme and bilinear pairing [21]. In addition, an example of fast detection of incorrectly signed users when bulk verification fails is given using combinatorial mathematical principles [22].(iii)We apply a secure key negotiation protocol [23] that does not require the participation of trusted third parties. All devices are semi-honest throughout the process, and we prove the privacy of user information at every step.

In Section 1, we introduce the basic situation of smart grids. In Section 2, we introduce related work to the paper. In Section 3, we introduce the basic blocks as the preliminaries of our scheme. In Section 4, we introduced our system model. In Section 5, we describe the construction of our scheme in detail. In Section 6, we analyze our scheme. In Section 7, we conducted the experiment evaluation. Finally, we draw our conclusion in Section 8.

In this section, we provide an overview of traditional solutions for smart grids as well as some of the latest research findings. In 2010, Li et al. [24] first proposed a distributed incremental data aggregation method, which covers the entire local neighborhood or any specified node set with minimal overhead through carefully constructed aggregation trees. At the same time, homomorphic encryption was used to ensure the security of data during transmission. This approach guarantees that all devices participate in aggregation and that no intermediate or final result is obtained by any device, so this approach is mainly used in privacy-preserving data aggregation schemes in smart grids.

Compared with the privacy-preserving one-dimensional data aggregation scheme, the multidimensional data aggregation scheme contains multiple detailed pieces of information of the user, which can not only extend the application of data aggregation but also meet the needs of the terminal for fine-grained analysis of multidimensional data and facilitate strategy adjustment. In 2012, Lu et al. [7] constructed a multidimensional data aggregation scheme by using a super-increasing sequence and homomorphic encryption scheme to obtain more electricity information of users. However, this scheme needs to encrypt the data of each dimension, which leads to excessive computational overhead and low efficiency during encryption. In 2017, Merad Boudia et al. [25] proposed an ElGamal homomorphic encryption multidimensional data aggregation scheme based on an elliptic curve, which does not require complex encryption operations on the way. However, the smart meter needs to encrypt the data for each dimension, which will greatly reduce the calculation efficiency with the increase of the dimension. In 2018, Li et al. [9] used two super-increasing sequences and paillier homomorphic encryption algorithm to construct a multisubset data aggregation scheme, which could count the electricity consumption and the number of users in a certain period of time. However, when the number of electricity consumption intervals is too large, the smart meter needs to encrypt each electricity consumption interval, which leads to excessive computational overhead and low efficiency. In 2019, Ming et al. [26] proposed to construct a multidimensional data aggregation scheme through an elliptic curve encryption method and a super-increasing sequence. The super-increasing sequence ensures that messages of each dimension will not affect each other when the terminal is decrypted, but the terminal needs to solve the discrete logarithm problem to recover data, so the scheme is not efficient. In 2020, Zuo et al. [27] proposed a privacy-preserving multidimensional data aggregation scheme based on the ElGamal homomorphic cryptosystem with distributed decryption, which can resist joint attacks from the gateway and the control center. However, the ciphertext of each user in this scheme is composed of two parts, which leads to an increase in computation cost, communication cost, and storage cost.

In recent years, with the development of fog computing, many scholars have proposed many solutions in the context of fog computing. In 2018, Lyu et al. [28] proposed a privacy-preserving fog computing aggregation scheme using one-time padded homomorphic encryption, which uses a fog node to collect the transmitted data for efficient processing and calculation. However, in this scheme, the integrity of the user’s encrypted data is not guaranteed. In 2019, Liu et al. [29] proposed an aggregation scheme supporting fog computing, which used the double trapdoor encryption scheme to construct a homomorphic encryption scheme supporting service organization query and self-query query. However, encrypting each dimension in this scheme incurs an additional heavy computational cost. In 2020, Merad-Boudia et al. [30] proposed a method of using coding to aggregate multidimensional data, which gives each dimension data a certain space according to certain rules so that each dimension data does not affect each other during aggregation and decryption. However, in this method, the length of the coding used is fixed, which is easy to cause space waste and increase storage overhead.

Compared with the above schemes, our scheme uses the Chinese Remainder Theorem to encode the user’s multidimensional data, which overcomes the shortcomings of increasing computational overhead with the increase in data dimension and does not cause a waste of storage space. Therefore, our scheme is more practical.

3. Preliminaries

3.1. Chinese Remainder Theorem

Let be pairwise co-prime primes, denotes integers, then the following congruence equations have a unique solution:

The form of the solution can be expressed as , where , , , . By we can easily calculate . In our scheme, we make full use of the properties of the Chinese remainder theorem to obtain the aggregation value of multidimensional data.

3.2. Paillier Homomorphic Encryption

The paillier public key encryption algorithm is a popular homomorphic encryption which supports homomorphic addition.

3.2.1. Key Generation

Given security parameters , random generation of two large primes and , calculates , . Defining functions , and randomly selecting the raw elements , make and calculate . Then, the public key of the encryption algorithm is , the private key is .

3.2.2. Encryption

For any plaintext , select a random integer , where . That is, has a multiplication inverse in the remainder of . Calculate ciphertext .

3.2.3. Decryption

For a given ciphertext , calculate the plaintext .

3.3. Bilinear Pairing

Let be a cyclic group that satisfies the order of large prime number , in which a pairing relation is defined to meet the following conditions.

3.3.1. Bilinear

For any , there is a .

3.3.2. Computability

For any , there is an efficient polynomial time algorithm to calculate the value of .

3.3.3. Nondegeneracy

For any , there is a .

3.4. Uniform of a Finite Set

threshold set is a technique in combinatorial mathematics that plays an important role in the rapid detection of error signatures, as defined below.

Let set , the subsets is called a uniform of () if the following three conditions are satisfied:(i).(ii)For any subsets , there is .(iii)For any subsets , there is .

Figure 1 shows an example of a (3,5) threshold set for .

4. System Design

4.1. System Model

In our scheme, we focus on how to securely aggregate user electricity consumption data and forward user electricity consumption data to the control center (CC) of the smart grid in a privacy-preserving way. Figure 2 shows the system model of the smart grid. There are three main players in the system model: a large number of smart meters (SM), fog nodes (FN), and CC. Their role in smart grid systems is as follows.

4.1.1. Smart Meter (SM)

A smart meter is a smart device installed by a utility company on a user’s premises. It collects specific real-time data from its surroundings and regularly reports it to the nearest fog node (FN). Obviously, we can easily connect smart meters to the users involved.

4.1.2. Fog Node (FN)

FN is the intermediate node between the control center and the smart meter, with a high level of storage and calculative power. It performs three main functions: (1) verifying the authenticity of the message received; (2) data aggregation of incoming messages; and (3) transferring the aggregated messages to CC.

4.1.3. Control Center (CC)

After receiving the FN report, CC first verifies the authenticity and integrity of the message, then decrypts the data. By decrypting the data, CC can learn the status of the entire smart grid in real-time, which can be used to conduct data analysis and make timely strategic adjustments.

4.2. Threat Model

In our scheme, all participants (including CC and FN) were curious but honest. In general, CC and FN will interact exactly as defined, not tampering with calculations but trying to learn sensitive information from uploaded messages. In our threat model, we assume that an attacker has the following capabilities:(i)Attackers can intercept the communication information between SM, FN, and CC. In addition, the attacker can break into some users in a residential area, which means that the attacker will obtain all the consumption data and the corresponding security parameters of these users and attempt to infer the privacy information of other users through these data.(ii)Attackers can invade FN and CC databases, steal personal data and security parameters, and even damage FN and CC. Although the CC is powerful in reality, the data stored in it is not completely safe from the risk of being compromised because the attacker is powerful enough under our assumptions. Therefore, CC can also be considered a formidable opponent because of its curiosity about user privacy.(iii)Attackers inject fake data into the system by intercepting messages and forging the identities of authorized users or tampering with data transmitted over a public communication channel to send fake power consumption data to the CC. In addition, attackers could launch attacks that compromise the data integrity of the smart grid.

4.3. Design Goals

Our goal is to design an efficient and stable multidimensional data aggregation solution without a trusted third party, which can protect the privacy of the user while achieving the required functionality. Specifically, our design objectives include the following design goals.

4.3.1. Security

To avoid the leakage of users’ privacy, the privacy of users’ electricity data should be ensured. Specifically, the electricity consumption data of users should be kept private during the whole communication process from SM to FN and then to CC. External adversaries do not have access to restore the plaintext of individual user data, ensuring that any changes to messages can be checked. The authenticity and integrity of the data transmitted and the identity of illegal users can be checked by FN and CC.

4.3.2. Privacy-Preserving

User’s privacy is a key issue in smart grid applications. No one, including CC, has access to a single user’s privacy information from real-time energy consumption data.

4.3.3. Functionality

The scheme can achieve the aggregation of user multidimensional data and support the integrity authentication of batch data without the participation of a trusted third party and the reuse of keys and blind factors.

4.3.4. Computing and Communication Efficiency

User meters have limited computing power. Therefore, the high efficiency of computing and communication needs to be considered in smart grids.

4.3.5. Dynamic User Management

Schemes should provide flexible equipment management mechanisms to support users in joining and exiting smart grid systems dynamically.

5. Our SEMDA Scheme

In this section, we introduce our SEMDA scheme in detail. The scheme consists of five stages: system initialization, multidimensional data coding and encryption, batch verification and data aggregation, data decryption, and dynamic user management. The symbols used in SEMDA and their descriptions are shown in Table 1.

5.1. Initialization Phase
Step 1: Given the security parameter , system users set , the system randomly selects two large primes and to generate the parameters . The group satisfies the bilinear relation and is the generator of the group .Step 2: First of all, CC calculates , ; and for ease of calculation choose , choose prime numbers , where , , is the upper bound of a single dimension of a user’s electricity data, is the number of users; and two Hash functions , . Secondly, CC calculates , , . Then, CC randomly selects blind factors and assigns to users. Finally, CC public parameters , and set the private key as .Step 3: User randomly selects as his private key and calculates as his public key. Then, FN randomly select as his private key and calculate as his public key.Step 4: User randomly selects , where . form the user’s shared key set. Through the secure channel, users send to user . User receives the shared key of other users, which forms the key set of users . The user’s key set is recorded , and these user uses his key set to calculate the encrypt key , clearly . To illustrate this, three user examples are given, as shown in Figure 3.
5.2. Reporting Phase

When a user needs to send smart meter data to FN at the interval , he will implement two steps. Step one: the user collects his multidimensional data and uses the Chinese remainder theorem to compute multidimensional messages . Step two: the user encrypts message by and generates the signature value with his private key , where is the current time, which can used to defend against a replay attacks. After that, the user sends the data to the nearest FN.

5.3. Reading Phase

Firstly, FN verifies the legitimacy and integrity of the message received from the users. FN verifies that the following formula :

If the verification fails, FN asks the user to resend the data.

Secondly, after the batch verification is passed, FN aggregates the data. Due to , we havewhere represents the value of all users’ message aggregations. Then, FN signs the aggregated value with its private key and generates the signature value . Finally, FN sends to CC.

5.4. Decryption Phase

After receiving the report from FN, CC first verifies that the following formula is true for . Then, CC calculates that satisfies to decrypt the cipher using its private key .

Finally, the Chinese remainder theorem is used to calculate , and of each dimension of all users, which can be used for statistical analysis and strategy adjustment.

5.5. Dynamic User Management

Our scheme supports dynamic user join and revoke. User failure can be considered as user revocation.

5.5.1. User Revoke

When user revokes, FN broadcasts to revoke user . Each user removes the shared key of the revocation user and the shared key sent to the user in its own key set. Then, others reupdate their set of shared keys, calculating the private key at this point in encryption. CC calculates the update decryption blind factor .

5.5.2. User Join

When user joins, FN broadcast adds user identity information . Then, other users update their key sets as initialized. CC randomly generates a blind factor , sends it to the user, and updates CC’s decryption blind factor according to .

6. Systems Analysis

6.1. Semantic Security of Encrypted Data

In our scheme, each user encrypts the user’s electricity consumption at time and submits it to FN for data aggregation, which we demonstrate to be semantically secure with the following theorem.

Lemma 1. For given message and , encrypted ciphers are indistinguishable.

Proof. First, we randomly select a message in messages and with to encrypt it. For the attacker, the advantage is because the calculated and are indistinguishable. Therefore, for the attacker, the indistinguishable ciphers and are also indistinguishable. So, the attacker’s advantage is , the attacker cannot distinguish between encrypted messages or . Thus, the encryption scheme is semantically secure. End proof.

6.2. Privacy-Preserving

To prevent user privacy from being compromised, our proposal requires that neither FN nor CC restore user data for individual users.

Lemma 2. Even if an external attacker steals the communication channel between the user and FN and obtains the relevant data. The attacker cannot get any information about the user’s message.

Proof. External attackers stole messages between users and FN, obtaining . As our encrypted messages are semantically secure, therefore, the attacker cannot recover messages from users without knowing the secret key and blind factor . End proof.

Lemma 3. Even if an attacker breaks FN, no private data can be inferred from the crypto uploaded by the user.

Proof. The message uploaded by the user is an encrypted cipher. FN can’t decrypt without the key can only aggregate. The aggregated information is as follows:Without CC’s and the private key, the attacker still cannot get any information about the user from the aggregated message. End proof.

Lemma 4. The attacker destroys CC to obtain CC’s private key and aggregated data. The attacker cannot access any of the user’s private information.

Proof. The attacker destroyed CC and obtained CC’s private key. By decrypting the data, the attacker can obtain aggregated plaintext information. But decryption messages are private to a single user’s message and cannot analyze specific information about a single user. End proof.

6.3. Data Integrity

Our scheme has the functions of authentication and data completeness check, using bilinear pairing to sign and send the signature value to FN. The attacker cannot deduce the secret key of the user’s signature and forge the signature value. If forged successfully, the difficult problem of bilinear pairing is solved. However, it is impossible, so our scheme can protect the integrity of the data.

To better illustrate how to detect errors quickly, as shown in Figure 4, an example of a quick detection error signature is given. In our example, , , assuming that the wrong signature is randomly distributed and the wrong signature is . We construct a (3, 5) threshold set. Depending on the nature of the threshold set, we can easily identify the wrong signature . Compared to the 10 times it takes to detect an error signature by detecting it one by one, we only need to count up to five times to find the wrong signature , which improves the efficiency of the calculation. For other details, please refer to [18].

6.4. Functional Analysis

In our scheme, according to the property of paillier homomorphic encryption scheme, the ciphertext of the same plaintext is indistinguishable, so our key and blind factor can be reused. As is shown in Table 2, we compare the functionality of our scheme with that of other schemes. Our scheme is functionally superior.

7. Performance Evaluation

In this section, we evaluate our scheme in terms of computational overhead and communication overhead. Considering the computing power of smart meters and fog nodes. In literature [7, 911, 2935], paillier homomorphic encryption scheme has been widely applied in data aggregation schemes of the smart grid. In literature [10, 11, 13, 29, 30, 32, 33, 3538], fog nodes are used as intermediate nodes to process data transmitted by smart meters. Therefore, our scheme is feasible in reality. Our experiment is based on the JPBC library and uses a computer configured with an AMD R7-580H CPU@ 3.2 GHz and 16 GB of RAM with the Windows 11 operating system. We assume that there are FNs in a smart grid system and users in each FN. The relative parameters of the bilinear pairing are shown in Table 3, and the size of the experimental selection parameters is shown in Table 4. In order to improve the accuracy of the test, we took an average of 30 times as the test result. As is shown in Table 5, we present the computational overhead for each stage; the encryption overhead is the computational overhead of a user. As is shown in Figure 5, we tested the computational overhead of a different number of users in the same dimension in an FN. In addition, as is shown in Figure 6, we tested the computational overhead of different dimensions for the same number of users. Since the cost of FN signature verification is primarily linear to the number of users, we will not show the cost of signature verification in Figure 6.

7.1. Computation Overhead

First of all, we mainly consider the cost of the data operation, because the cost of the system initialization stage does not affect the delay of our system. In addition, to represent the computational cost of bilinear pairing. to represent the multiplication of elements in group . to represent the multiplication of elements in group . to represent the multiplication of elements in group . to represent the cost of adding elements in group . to represent the cost of adding elements in group . to represent the cost of adding elements in group . represents the cost of mapping elements to group through Hash. represents the cost of mapping elements to group through Hash. to represent the cost of exponential operations in group . to represent the cost of exponential operations in group . to represent the cost of exponential operations in group .

In our scheme, each user needs to spend to encrypt message, spend to generate his signature. So, the total computing cost of user is . For FN, it needs to verify user’s signature in bulk, the computation cost is , the computation cost of data aggregation is , and the computation cost of signatures is , so the total computing cost of FN is . The experimental results show that dimensions have negligible impact on decryption costs. For CC, it spends to authenticate the signature and spends to decrypt ciphertext, so the total computing cost of CC is .

In the MSDA scheme [31], each user needs to spend to encrypt message. In the scheme, there is no signature process. Therefore, FN aggregation costs is . CC decryption cost is .

In the EPMDA-FED scheme [18], each user needs to spend to encrypt message, spend to generate his signature, so the total computing cost of user is . For FN, it needs to verify user’s signature in bulk, the computation cost is , the computation cost of data aggregation is , and the computation cost of signatures is , so the total computing cost of FN is . For CC, it spends to authenticate the signature and to decrypt ciphertext, so the total computing cost of CC is .

In the FPDA scheme [11], each user needs to spend to encrypt message. In the scheme, there is no signature process. Therefore, FN aggregation costs is . CC decryption cost is .

As shown in Table 6, we compared the calculation costs of different schemes. It can be seen that the computation is still efficient because we include signature authentication in our scheme. But batch verification is done mainly in FN and does not impose an additional computational burden on CC decryption.

7.2. Communication Overhead

Communication overhead is calculated based on the size of the messages that the smart device sends to the fog node () and the fog node sends to the control center ().

In our scheme, each SM reports the message to FN at each interval of time, so ’s communication cost is . Before FN communicates with CC, FN aggregates the user’s data and sends aggregated data to CC. So ’s communication cost is .

In the MSDA scheme [31], each SM reports the message to FN at each interval of time, so ’s communication cost is . Before FN communicates with CC, FN aggregates the user’s data and sends the aggregated data to CC. So ’s communication cost is .

In the EPMDA-FED scheme [18], each SM reports the message to FN at each interval of time, so ’s communication cost is . Before FN communicates with CC, FN aggregates the user’s data and sends aggregated data to CC. So ’s communication cost is .

In the FPDA scheme [11], each SM reports the message to FN at each interval of time, so ’s communication cost is . Before FN communicates with CC, FN aggregates the user’s data and sends aggregated data to CC. So ’s communication cost is .

As is shown in Table 7, we compared the communication costs of other schemes. As can be seen from the table, the increase in communication cost of our scheme compared with the MSDA scheme and the FPDA scheme is mainly the communication cost of signature authentication. However, for the sake of the authenticity and integrity of the data. Therefore, our scheme’s increased communication costs are necessary.

8. Conclusion

In this paper, we propose an efficient privacy-protecting multidimensional data aggregation scheme that does not require a trusted third party. The multidimensional data is encapsulated by the Chinese residual theorem and then encrypted securely, which can effectively resist the collusive attack. In addition, the scheme also supports blind factor reusability and batch data validation, so it can better adapt to the requirements of multidimensional data aggregation in complex scenarios. Experimental results show that the scheme is feasible and efficient.

Data Availability

The JPBC database used in this article is from https://gas.dia.unisa.it/projects/jpbc/#.Y4NA5DFMQ7d.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Authors’ Contributions

Weidong Zhong and Zichao Song contributed equally to this work.

Acknowledgments

This work was supported by the Innovative Research Team in Engineering University of PAP (KYTD201805), National Natural Science Foundation of China (Grant nos. 62172436 and 62102452).