Block Chain Enabled Data Security Using Blowfish Algorithm in Smart Grid Network
Block Chain Enabled Data Security Using Blowfish Algorithm in Smart Grid Network
Abstract – Smart Grid provides a reliable and efficient end-to- In order to guarantee sufficient confidentiality, integrity,
end delivery system. Data on each user's unique electricity and availability, researchers are encouraged to look into
consumption is given in real time. It also enables utilities to viable methods while using such a large-scale network.
control and monitor the electrical system in real-time, helping Users' privacy is a significant issue in addition to the usual
them to reduce power outages. Users' privacy is a significant
issue in addition to the usual security issues. Data about power
security issues [8]. Data about power usage may be used to
usage may be used to infer private information about users by infer private information about users by entities with access
entities with access to the data. To solve these problems, a to the data. Detecting household gadgets and people [9],
Block-Chain-based Secure Smart Grid Network (BCS-SGN) profiling electric vehicles (EVs), and human location and
has been created, utilizing group signatures and covert channel activity patterns [10] are a few examples of this information.
permission to guarantee user validity. Initially, the data from
the smart grid network will be collected and encrypted using Differential privacy is a notable and commonly used
blowfish techniques. After encryption, the encrypted data will concept for formalizing data privacy [11]. It ensures that the
be stored in the block chain network, which also stores the presence or absence of an individual has no effect on the
transmission logs. In order to utilize the security controller, result by adding controlled randomness to the data.
smart contracts are analyzed using smart grid devices. DES, Moreover, "local" differential privacy is widely employed
AES, and BCS-SGN are widely used. Symmetric key algorithms since it doesn't need a trustworthy data curator. Since
are properly compared in this study. Additionally, the metrics blockchain doesn't save information on the identities of ENs
of encryption/decryption time, computational time, and
or group signatures, the model protects privacy from the
throughput are also compared. The percentage of the proposed
method, BCS-SGN, is 20%, AES is 15%, and DES is 12%.
standpoint of the signature.
These outcomes demonstrate that the proposed BCS-SGN These methods have significantly advanced the
outperforms other techniques. protection of the privacy of power usage data [12]. Other
Keywords – Smart grid, Smart contract, Blowfish Algorithm, Block techniques, such as homomorphic encryption and
chain. blockchain-based systems, have been utilized to protect the
anonymity of energy usage [13]. This work makes an effort
1. INTRODUCTION
to offer a comprehensive system that secures and maintains
The recent blooming expansion of the network, in both user privacy in smart grids without relying on a centralized
wired and wireless environments, has been the primary or reliable authority. The following list of contributions
driver of the smart grid as an emerging technology. As a might be used to summarize this work.
result of the interconnection-based environment, there are
• Initially the data from the smart grid network will
many different types of edge infrastructure or devices
available for energy service offers [1–3]. All electrical be collected and encrypted using blowfish
technique.
devices, smart meters, and other embedded systems with an
energy-related focus are connected on the Smart Grid • After Encryption the encrypted data will be stored
Network (SGN) platform [4]. A basic SGN can be set to have in the block chain network, which also stores the
network nodes that are multiple electric sources and different transmission logs. Smart contracts provide the most
user kinds [5–7]. As a result, network characteristics and secure approach because they operate on the
service model usage might result in governance and blockchain.
optimization. • This paper focused on privacy concerns related to
smart grids and offered an alternative that would
enhance data security while maintaining smart grid particular appliance, the study first determine the potential
performance. number of appliances used by a single user.
• Additionally, the metrics of encryption/decryption
In 2021 Xiao, L., et.al [16] suggested a simple identity
time, computational time, and throughput are
authentication technique, which uses elliptic curve
compared in order to evaluate the proposed method.
encryption (ECC) technology, suitable for smart grid
The remaining sections of the paper are arranged as environments. In the suggested protocol, the identity and key
follows. Section 2 offers a review of related work. The model information are encrypted using ECC, and the session's
design and the main suggested algorithms are then presented validity is checked using the timestamp. The cost analysis
in Sections 3 and 4, respectively. Additionally, Section 5 concludes by demonstrating that the suggested protocol is
provides analysis and evaluation outcomes. The profession is appropriate for implementation in large-scale intelligent
concluded in Section 6 lastly. smart grid setups since it has lower communication and
calculation costs than other relevant protocols.
2. LITERATURE SURVEY
In 2021 Zainab et al [17] suggested big data
The literature on privacy-preserving smart grid systems management, in which order to handle the data in the grid. In
has been reviewed. To deal with this problem, scholars have order to comprehend the sources and types of data in the grid,
employed a variety of methods and resources. data management tools and procedures have been used. The
In 2022 S., Jha, et.al [14] proposed a secure technique, report highlights the shortcomings of the current approaches
in which the availability of energy, financial and geared toward using large amounts of data from the smart
environmental security has been interconnected that also grid.
affects the development of people. The electric power 3. BLOCK CHAIN-BASED SECURE SMART GRID
industry should place a strong emphasis on comprehensive NETWORK
energy security, which is based on the security of power
grids. As a result, the conversion of energy for both essential In this study a novel Block Chain based Secure Smart
and end uses is intricately interwoven, necessitating a large- Grid Network (BCS-SGN) has been proposed. Initially the
scale energy plan. data from the smart grid network will be collected and
encrypted using blowfish techniques. After Encryption the
In 2022 Subhash, P., et.al [15] proposed a big data encrypted data will be stored in the block chain network,
framework, in the area of energy usage which has been which also stores the transmission logs. The proposed BCS-
influenced by the smart grid. The end-to-end, two-way SGN protects and upholds user privacy without depending
delivery method offered by Smart Grid is effective and on a centralized authority. The overall planned workflow is
dependable. Real-time data on a user's individual electricity shown in Figure 1.
usage is provided. In order to get the star rating for each
89
R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024
3.1.1 Data Encrypted Algorithm mimic procedures and perform MatLab algorithms on
historical blockchain data. one gigabyte of RAM at minimum
The procedure repeats fifteen times, exchanging the two
and sixty gigabytes of disk space at most for each worker.
32-bit segments (L and R) as the XOR operation is
The assessment of the suggested methods performance is
completed. The ciphertext is generated by performing an
provided in this part. DES is a well-known algorithm, and the
XOR calculation with the remaining P array and computing
performance of AES was compared to the previously
the cipher function following the fifteenth iteration. This
recommended methods, BCS-SGN.
algorithm, which uses S-boxes, is thought to have its most
complicated component in the computation of the cipher
function. The following algorithms are shown Table 1.
Table 1. Data Encrypted Algorithm
Algorithm 1: Data Encryption
Divide 64 bits in to two 32bit
Halves:1to 16
For i=1 to 16
XL=XL XOR Pi
XR=F(XL)XOR XR
Swap XL and XR
Swap XL and XR
XR=XR XOR P17
XL=XL XOR P18 Figure 2. Encryption time
Concatenate XL and XR A graph comparing the encryption times the encryption
part's graphical comparison is shown in Figure. 2. A nearly
proposed approach from the Blowfish algorithm.
3.2 Block chain Smart Contract
The blockchain server where smart contracts are
deployed is called the smart contract. Our model takes into
account the practicality of applying blockchain technology
so that a smart contract will determine the best course of
action for energy allocations. We create dynamic
programming in order to generate the best possible solution
for the distribution of energy resources while taking into
account three factors: communication security, latency time,
and energy consumption. The smart contract is used to
broadcast the operations, allowing each edge node to inform
the node operator about how well it predicts it will handle the
next request.
3.3 Block chain Figure 3. Decryption time
A blockchain system that uses a layer of authorization to Figure 3 displays a graphical comparison of the
establish the scope of users or voters and grant access to the decryption section. The suggested method outperforms the
system to that target group is known as a permissioned Blowfish algorithm.
blockchain. The platform for data storage that our model
chooses is a permissioned blockchain for two main reasons.
A key factor in the development of our approach is the
potential of blockchain to protect privacy. According to our
observations, a permissionless blockchain is not ideal
considering that the user groups in the smart grid energy
trading scenario are mostly internal entities connected via
SGNs with a very constant identification state.
4. RESULT AND DISCUSSION
The performance of the Novel BlockChain-based Secure
Smart Grid Network (BCS-SGN) has been discussed in this
section. Matlab is one program that can be used to simulate
the blockchain process. This can be used to spread the
blockchain and mine blocks with incorrect hashes for testing, Figure 4. Computational time comparison
as multiple nodes can carry out the activity in the simulation.
With Matlab, one gigabyte of RAM at minimum and sixty
gigabytes of disk space at most are available for each worker.
90
R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024
91
R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024
92