Research article

Blockchain-based multi-authority revocable data sharing scheme in smart grid


  • Received: 26 February 2023 Revised: 09 April 2023 Accepted: 23 April 2023 Published: 12 May 2023
  • In view of the problems of inefficient data encryption, non-support of malicious user revocation and data integrity checking in current smart grid data sharing schemes, this paper proposes a blockchain-based multi-authority revocable data sharing scheme in the smart grid. Using online/offline encryption technology with hybrid encryption technology enhances the encryption performance for the data owner. The use of user binary tree technology enables the traceability and revocability of malicious users. The introduction of multiple attribute authorization authorities eliminates the threat of collusive attacks that exist in traditional data-sharing schemes. In addition, the semi-honest problem of third-party servers is solved by uploading data verification credentials to the blockchain. The security analysis results show that the scheme can resist selective plaintext attacks and collusion attacks. The performance analysis results show that the proposed scheme has lower computational overhead and better functionality than similar schemes, which is suitable for secure data sharing in smart grids.

    Citation: Xiao-Dong Yang, Ze-Fan Liao, Bin Shu, Ai-Jia Chen. Blockchain-based multi-authority revocable data sharing scheme in smart grid[J]. Mathematical Biosciences and Engineering, 2023, 20(7): 11957-11977. doi: 10.3934/mbe.2023531

    Related Papers:

    [1] Giuseppe Maria Coclite, Lorenzo di Ruvo . A singular limit problem for conservation laws related to the Kawahara-Korteweg-de Vries equation. Networks and Heterogeneous Media, 2016, 11(2): 281-300. doi: 10.3934/nhm.2016.11.281
    [2] Hyeontae Jo, Hwijae Son, Hyung Ju Hwang, Eun Heui Kim . Deep neural network approach to forward-inverse problems. Networks and Heterogeneous Media, 2020, 15(2): 247-259. doi: 10.3934/nhm.2020011
    [3] Anya Désilles, Hélène Frankowska . Explicit construction of solutions to the Burgers equation with discontinuous initial-boundary conditions. Networks and Heterogeneous Media, 2013, 8(3): 727-744. doi: 10.3934/nhm.2013.8.727
    [4] Tong Yan . The numerical solutions for the nonhomogeneous Burgers' equation with the generalized Hopf-Cole transformation. Networks and Heterogeneous Media, 2023, 18(1): 359-379. doi: 10.3934/nhm.2023014
    [5] Jinyi Sun, Weining Wang, Dandan Zhao . Global existence of 3D rotating magnetohydrodynamic equations arising from Earth's fluid core. Networks and Heterogeneous Media, 2025, 20(1): 35-51. doi: 10.3934/nhm.2025003
    [6] Guillermo Reyes, Juan-Luis Vázquez . The Cauchy problem for the inhomogeneous porous medium equation. Networks and Heterogeneous Media, 2006, 1(2): 337-351. doi: 10.3934/nhm.2006.1.337
    [7] Caihong Gu, Yanbin Tang . Global solution to the Cauchy problem of fractional drift diffusion system with power-law nonlinearity. Networks and Heterogeneous Media, 2023, 18(1): 109-139. doi: 10.3934/nhm.2023005
    [8] Bendong Lou . Self-similar solutions in a sector for a quasilinear parabolic equation. Networks and Heterogeneous Media, 2012, 7(4): 857-879. doi: 10.3934/nhm.2012.7.857
    [9] Yannick Holle, Michael Herty, Michael Westdickenberg . New coupling conditions for isentropic flow on networks. Networks and Heterogeneous Media, 2020, 15(4): 605-631. doi: 10.3934/nhm.2020016
    [10] Flavia Smarrazzo, Alberto Tesei . Entropy solutions of forward-backward parabolic equations with Devonshire free energy. Networks and Heterogeneous Media, 2012, 7(4): 941-966. doi: 10.3934/nhm.2012.7.941
  • In view of the problems of inefficient data encryption, non-support of malicious user revocation and data integrity checking in current smart grid data sharing schemes, this paper proposes a blockchain-based multi-authority revocable data sharing scheme in the smart grid. Using online/offline encryption technology with hybrid encryption technology enhances the encryption performance for the data owner. The use of user binary tree technology enables the traceability and revocability of malicious users. The introduction of multiple attribute authorization authorities eliminates the threat of collusive attacks that exist in traditional data-sharing schemes. In addition, the semi-honest problem of third-party servers is solved by uploading data verification credentials to the blockchain. The security analysis results show that the scheme can resist selective plaintext attacks and collusion attacks. The performance analysis results show that the proposed scheme has lower computational overhead and better functionality than similar schemes, which is suitable for secure data sharing in smart grids.



    The equation:

    {tu+xf(u)β22xu+δ3xu+κu+γ2|u|u=0,0<t<T,xR,u(0,x)=u0(x),xR, (1.1)

    was originally derived in [14,17] with f(u)=au2 focusing on microbubbles coated by viscoelastic shells. These structures are crucial in ultrasound diagnosis using contrast agents, and the dynamics of individual coated bubbles are explored, taking into account nonlinear competition and dissipation factors such as dispersion, thermal effects, and drag force.

    The coefficients β2, δ, κ, and γ2 are related to the dissipation, the dispersion, the thermal conduction dissipation, and to the drag force, repsctively.

    If κ=γ=0, we obtain the Kudryashov-Sinelshchikov [18] Korteweg-de Vries-Burgers [3,20] equation

    tu+axu2β22xu+δ3xu=0, (1.2)

    that models pressure waves in liquids with gas bubbles, taking into account heat transfer and viscosity. The mathematical results on Eq (1.2) are the following:

    ● analysis of exact solutions in [13],

    ● existence of the traveling waves in [2],

    ● well-posedness and asymptotic behavior in [7,11].

    If β=0, we derive the Korteweg-de Vries equation:

    tu+axu2+δ3xu=0, (1.3)

    which describes surface waves of small amplitude and long wavelength in shallow water. Here, u(t,x) represents the wave height above a flat bottom, x corresponds to the distance in the propagation direction, and t denotes the elapsed time. In [4,6,10,12,15,16], the completele integrability of Eq (1.3) and the existence of solitary wave solutions are proved.

    Through the manuscript, we will assume

    ● on the coefficients

    β,δ,κ,γR,β,δ,γ0; (1.4)

    ● on the flux f, one of the following conditions:

    f(u)=au2+bu3, (1.5)
    fC1(R),|f(u)|C0(1+|u|),uR, (1.6)

    for some positive constant C0;

    ● on the initial value

    u0H1(R). (1.7)

    The main result of this paper is the following theorem.

    Theorem 1.1. Assume Eqs (1.5)–(1.7). For fixed T>0, there exists a unique distributional solution u of Eq (1.1), such that

    uL(0,T;H1(R))L4(0,T;W1,4(R))L6(0,T;W1,6(R))2xuL2((0,T)×R). (1.8)

    Moreover, if u1 and u2 are solutions to Eq (1.1) corresponding to the initial conditions u1,0 and u2,0, respectively, it holds that:

    u1(t,)u2(t,)L2(R)eC(T)tu1,0u2,0L2(R), (1.9)

    for some suitable C(T)>0, and every, 0tT.

    Observe that Theorem 1.1 gives the well-posedness of (1.1), without conditions on the constants. Moreover, the proof of Theorem 1.1 is based on the Aubin-Lions Lemma [5,21]. The analysis of Eq (1.1) is more delicate than the one of Eq (1.2) due to the presence of the nonlinear sources and the very general assumptions on the coefficients.

    The structure of the paper is outlined as follows. Section 2 is dedicated to establishing several a priori estimates for a vanishing viscosity approximation of Eq (1.1). These estimates are crucial for proving our main result, which is presented in Section 3.

    To establish existence, we utilize a vanishing viscosity approximation of equation (1.1), as discussed in [19]. Let 0<ε<1 be a small parameter, and denote by uεC([0,T)×R) the unique classical solution to the following problem [1,9]:

    {tuε+xf(uε)β22xuε+δ3xuε+κu+γ2|u|u=ε4xuε,0<t<T,xR,uε(0,x)=uε,0(x),xR, (2.1)

    where uε,0 is a C approximation of u0, such that

    uε,0H1(R)u0H1(R). (2.2)

    Let us prove some a priori estimates on uε, denoting with C0 constants which depend only on the initial data, and with C(T) the constants which depend also on T.

    We begin by proving the following lemma:

    Lemma 2.1. Let T>0 be fixed. There exists a constant C(T)>0, which does not depend on ε, such that

    uε(t,)2L2(R)+2γ2e|κ|tt0Re|κ|su2ε|uε|dsdx+2β2e|κ|tt0e|κ|sxuε(s,)2L2(R)ds+2εe|κ|tt0e|κ|s2xuε(s,)2L2(R)C(T), (2.3)

    for every 0tT.

    Proof. For 0tT. Multiplying equations (2.1) by 2uε, and integrating over R yields

    ddtuε(t,)2L2(R)=2Ruεtuεdx=2Ruεf(uε)xuεdx=0+2β2Ruε2xuεdx2δRuε3xuεdxκuε(t,)2L2(R)2γ2R|uε|u2εdx2εRuε4xuεdx=2β2xuε(t,)2L2(R)+2δRxuε2xuεdxκuε(t,)2L2(R)2γ2R|uε|u2εdx+2εRxuε3xuεdx=2β2xuε(t,)2L2(R)κuε(t,)2L2(R)2γ2R|uε|u2εdx2ε2xuε(t,)2L2(R).

    Thus, it follows that

    ddtuε(t,)2L2(R)+2β2xuε(t,)2L2(R)+2γ2R|uε|u2εdx+2ε2xuε(t,)2L2(R)=κuε(t,)2L2(R)|κ|uε(t,)2L2(R).

    Therefore, applying the Gronwall's lemma and using Eq (2.2), we obtain

    uε(t,)2L2(R)+2β2e|κ|tt0e|κ|sxuε(s,)2L2(R)ds+2γ2e|κ|tt0Re|κ|t|uε|u2εdsdx+2ε2xuε(t,)2L2(R)+2εe|κ|tt0e|κ|s2xuε(s,)2L2(R)dsC0e|κ|tC(T),

    which gives Eq (2.3).

    Lemma 2.2. Fix T>0 and assume (1.5). There exists a constant C(T)>0, independent of ε, such that

    uεL((0,T)×R)C(T), (2.4)
    xuε(t,)2L2(R)+β2t02xuε(s,)2L2(R)ds (2.5)
    +2εt03xuε(s,)2L2(R)dsC(T),t0xuε(s,)4L4(R)dsC(T), (2.6)

    holds for every 0tT.

    Proof. Let 0tT. Consider A,B as two real constants, which will be specified later. Thanks to Eq (1.5), multiplying Eq (2.1) by

    22xuε+Au2ε+Bu3ε,

    we have that

    (22xuε+Au2ε+Bu3ε)tuε+2a(22xuε+Au2ε+Bu3ε)uεxuε+3b(22xuε+Au2ε+Bu3ε)u2εxuεβ2(22xuε+Au2ε+Bu3ε)2xuε+δ(22xuε+Au2ε+Bu3ε)3xuε+κ(22xuε+Au2ε+Bu3ε)uε+γ2(22xuε+Au2ε+Bu3ε)|uε|uε=ε(22xuε+Au2ε+Bu3ε)4xuε. (2.7)

    Observe that

    R(22xuε+Au2ε+Bu3ε)tuεdx=ddt(xuε(t,)2L2(R)+A3Ru3εdx+B4Ru4εdx),2aR(22xuε+Au2ε+Bu3ε)uεxuεdx=4aRuεxuε2xuεdx,3bR(22xuε+Au2ε+Bu3ε)u2εxuεdx=6bRu2εxuε2xuεdx,β2R(22xuε+Au2ε+Bu3ε)2xuεdx=2β22xuε(t,)2L2(R)+2Aβ2Ruε(xuε)2dx+3Bβ2Ru2ε(xuε)2dx,δR(22xuε+Au2ε+Bu3ε)3xuεdx=2AδRuεxuε2xuεdx3BδRu2εxuε2xuεdx,κR(22xuε+Au2ε+Bu3ε)uεdx=2κxuε(t,)2L2(R)+AκRu3εdx+BκRu4εdx,γ2R(22xuε+Au2ε+Bu3ε)|uε|uεdx=2γ2R|uε|uε2xuεdx+Aγ2R|u|u3εdx+Bγ2R|uε|u4dx,εR(22xuε+Au2ε+Bu3ε)4xuεdx=2ε3xuε(t,)2L2(R)+2AεRuεxuε3xuεdx+3BεRu2εxuε3xuεdx=2ε3xuε(t,)2L2(R)AεR(xuε)3dx6BεRuε(xuε)22xuεdx3Bεuε(t,)2xuε(t,)2L2(R)=2ε3xuε(t,)2L2(R)AεR(xuε)3dx+2BεR(xuε)4dx3Bεuε(t,)2xuε(t,)2L2(R).

    Therefore, an integration on R gives

    ddt(xuε(t,)2L2(R)+A3Ru3εdx+B4Ru4εdx)+β22xuε(t,)2L2(R)+2ε3xuε(t,)2L2(R)=(4a+Aδ)Ruεxuε2xuεdx3(2b+Bδ)Ru2εxuε2xuεdx2Aβ2Ruε(xuε)2dx3Bβ2Ru2ε(xuε)2dxκxuε(t,)2L2(R)Aκ3Ru3εdxBκ4Ru4εdx+2γ2R|uε|uε2xuεdxAγ2R|uε|u3εdxBγ2R|uε|u4εdxAεR(xuε)3dx+2BεR(xuε)4dx3Bεuε(t,)2xuε(t,)2L2(R).

    Taking

    (A,B)=(4aδ,2bδ),

    we get

    ddt(xuε(t,)2L2(R)4a3δRu3εdxbδRu4εdx)+2β22xuε(t,)2L2(R)+2ε3xuε(t,)2L2(R)=8aβ2δRuε(xuε)2dx+6bβ2δRu2ε(xuε)2dxκxuε(t,)2L2(R)+4aκ3δRu3εdx+bκ2Ru4εdx+2γ2R|uε|uε2xuεdx+4aγ2δR|uε|u3εdx+2bγ2δR|uε|u4εdx+4aεδR(xuε)3dx4bεδR(xuε)4dx+6bεδuε(t,)2xuε(t,)2L2(R). (2.8)

    Since 0<ε<1, due to the Young inequality and (2.3),

    8aβ2δR|uε|(xuε)2dx4Ru2ε(xuε)2dx+4a2β4δ2xuε(t,)2L2(R)4uε2L((0,T)×R)xuε(t,)2L2(R)+4a2β4δ2xuε(t,)2L2(R)C0(1+uε2L((0,T)×R))xuε(t,)2L2(R),|6bβ2δ|Ru2ε(xuε)2dx|6bβ2δ|uε2L((0,T)×R)xuε(t,)2L2(R),|4aκ3δ|R|uε|3dx|4aκ3δ|uεL((0,T)×R)uε(t,)2L2(R)C(T)uεL((0,T)×R),|bκ2|Ru4εdx|bκ2|uε2L((0,T)×R)uε(t,)2L2(R)C(T)uε2L((0,T)×R),2γ2R|uε|uε2xuεdx2R|γ2|uε|uεβ||β2xuε|dxγ4β2Ruε4dx+β22xuε(t,)2L2(R)γ4β2uε2L((0.T)×R)uε(t,)2L2(R)+β22xuε(t,)2L2(R)C(T)uε2L((0,T)×R)+β22xuε(t,)2L2(R),|4aγ2δ|R|uε||uε|3dx=|4aγ2δ|Ru4εdx|4aγ2δ|uε2L((0,T)×R)uε(t,)2L2(R)C(T)uε2L((0,T)×R),|2bγ2δ|R|uε|uε4dx|2bγ2δ|uε3L((0,T)×R)uε(t,)2L2(R)C(T)uε3L((0,T)×R),|4aεδ|R|xuε|3dx|4aεδ|xuε(t,)2L2(R)+|4aεδ|R(xuε)4dx|4aδ|xuε(t,)2L2(R)+|4aεδ|R(xuε)4dx.

    It follows from Eq (2.8) that

    ddt(xuε(t,)2L2(R)4a3δRu3εdxbδRu4εdx)+β22xuε(t,)2L2(R)+2ε3xuε(t,)2L2(R)C0(1+uε2L((0,T)×R))xuε(t,)2L2(R)+C(T)uεL((0,T)×R)+C(T)uε2L((0,T)×R)+C(T)uε3L((0,T)×R)+C0εR(xuε)4dx+C0εuε(t,)2xuε(t,)2L2(R)+C0xuε(t,)2L2(R). (2.9)

    [8, Lemma 2.3] says that

    R(xuε)4dx9Ru2ε(2xuε)2dx9uε2L((0,T)×R)2xuε(t,)2L2(R). (2.10)

    Moreover, we have that

    uε(t,)2xuε(t,)2L2(R)=Ru2ε(2xuε)2dxuε2L((0,T)×R)2xuε(t,)2L2(R). (2.11)

    Consequentially, by Eqs (2.9)–(2.11), we have that

    ddt(xuε(t,)2L2(R)4a3δRu3εdxbδRu4εdx)+β22xuε(t,)2L2(R)+2ε3xuε(t,)2L2(R)C0(1+uε2L((0,T)×R))xuε(t,)2L2(R)+C(T)uεL((0,T)×R)+C(T)uε2L((0,T)×R)+C(T)uε3L((0,T)×R)+C0εuε2L((0,T)×R)2xuε(t,)2L2(R)+C0xuε(t,)2L2(R).

    An integration on (0,t) and Eqs (2.2) and (2.3) give

    xuε(t,)2L2(R)4a3δRu3εdxbδRu4εdx+β2t02xuε(s,)2L2(R)ds+2εt03xuε(s,)2L2(R)dsC0(1+uε2L((0,T)×R))t0xuε(s,)2L2(R)ds+C(T)uεL((0,T)×R)t+C(T)uε2L((0,T)×R)t+C(T)uε3L((0,T)×R)t+C0εuε2L((0,T)×R)t02xuε(s,)2L2(R)ds+C0t0xuε(s,)2L2(R)dsC(T)(1+uεL((0,T)×R)+uε2L((0,T)×R)+uε3L((0,T)×R)).

    Therefore, by Eq (2.3),

    xuε(t,)2L2(R)+β2t02xuε(s,)2L2(R)ds+2εt03xuε(s,)2L2(R)dsC(T)(1+uεL((0,T)×R)+uε2L((0,T)×R)+uε3L((0,T)×R))+4a3δRu3εdx+bδRu4εdxC(T)(1+uεL((0,T)×R)+uε2L((0,T)×R)+uε3L((0,T)×R))+|4a3δ|R|uε|3dx+|bδ|Ru4εdxC(T)(1+uεL((0,T)×R)+uε2L((0,T)×R)+uε3L((0,T)×R))+|4a3δ|uεL((0,T)×R)uε(t,)2L2(R)+|bδ|uε2L((0,T)×R)uε(t,)2L2(R)C(T)(1+uεL((0,T)×R)+uε2L((0,T)×R)+uε3L((0,T)×R)). (2.12)

    We prove Eq (2.4). Thanks to the Hölder inequality,

    u2ε(t,x)=2xuεxuεdx2R|uε||xuε|dx2uε(t,)L2(R)xuε(t,)L2(R).

    Hence, we have that

    uε(t,)4L(R)4uε(t,)2L2(R)xuε(t,)2L2(R). (2.13)

    Thanks to Eqs (2.3) and (2.12), we have that

    uε4L((0,T)×R)C(T)(1+uεL((0,T)×R)+uε2L((0,T)×R)+uε3L((0,T)×R)). (2.14)

    Due to the Young inequality,

    C(T)uε3L((0,T)×R)12uε4L((0,T)×R)+C(T)uε2L((0,T)×R),C(T)uεL((0,T)×R)C(T)uε2L((0,T)×R)+C(T).

    By Eq (2.14), we have that

    12uε4L((0,T)×R)C(T)uε2L((0,T)×R)C(T)0,

    which gives Eq (2.4).

    Equation (2.5) follows from Eqs (2.4) and (2.12).

    Finally, we prove Eq (2.6). We begin by observing that, from Eqs (2.4) and (2.10), we have

    xuε(t,)4L4(R)C(T)2xuε(t,)2L2(R).

    An integration on (0,t) and Eqs (2.5) give Eq (2.6).

    Lemma 2.3. Fix T>0 and assume (1.6). There exists a constant C(T)>0, independent of ε, such that Eq (2.4) holds. Moreover, we have Eqs (2.5) and (2.6).

    Proof. Let 0tT. Multiplying Eq (2.1) by 22xuε, an integration on R gives

    ddtxuε(t,)2L2(R)=2R2xuεtuεdx=2Rf(uε)xuε2xuεdx2β22xuε(t,)2L2(R)2δR2xuε3xuεdx2κRuε2xuεdx2γ2R|uε|uε2xuεdx+2εR2xuε4xuεdx=2Rf(uε)xuε2xuεdx2β22xuε(t,)2L2(R)+2κxuε(t,)2L2(R)+2γ2R|uε|uε2xuεdx2ε3xuε(t,)2L2(R).

    Therefore, we have that

    ddtxuε(t,)2L2(R)+2β22xuε(t,)2L2(R)+2ε3xuε(t,)2L2(R)=2Rf(uε)xuε2xuεdx+2κxuε(t,)2L2(R)+2γ2R|uε|uε2xuεdx. (2.15)

    Due Eqs (1.6) and (2.3) and the Young inequality,

    2R|f(uε)||xuε||2xuε|dxC0R|xuε2xuε|dx+C0R|uεxuε||2xuε|dx=2R|C03xuε2β||β2xuε3|dx+2R|C03uεxuε2β||3β2xuε|dxC0xuε(t,)2L2(R)+C0Ru2ε(xuε)2dx+2β232xuε(t,)2L2(R)C0xuε(t,)2L2(R)+C0uε2L((0,T)×R)xuε(t,)2L2(R)+2β232xuε(t,)2L2(R)C0(1+uε2L((0,T)×R))xuε(t,)2L2(R)+2β232xuε(t,)2L2(R),2γ2R|uε|uε2xuεdx2γ2Ru2ε|2xuε|dx=2R|3γ2u2εβ||β2xuε3|dx3γ4β2Ru4εdx+β232xuε(t,)2L2(R)3γ4β2uε2L((0,T)×R)uε(t,)2L2(R)+β232xuε(t,)2L2(R)C(T)uε2L((0,T)×R)+β232xuε(t,)2L2(R).

    It follows from Eq (2.15) that

    ddtxuε(t,)2L2(R)+β22xuε(t,)2L2(R)+2ε3xuε(t,)2L2(R)C0(1+uε2L((0,T)×R))xuε(t,)2L2(R)+C(T)uε2L((0,T)×R).

    Integrating on (0,t), by Eq (2.3), we have that

    xuε(t,)2L2(R)+β2t02xuε(s,)2L2(R)ds+2εt03xuε(s,)2L2(R)C0+C0(1+uε2L((0,T)×R))t0xuε(s,)2L2(R)ds+C(T)uε2L((0,T)×R)tC(T)(1+uε2L((0,T)×R)). (2.16)

    Thanks to Eqs (2.3), (2.13), and (2.16), we have that

    uε4L((0,T)×R)C(T)(1+uε2L((0,T)×R)).

    Therefore,

    uε4L((0,T)×R)C(T)uε2L((0,T)×R)C(T)0,

    which gives (2.4).

    Equation (2.5) follows from (2.4) and (2.16), while, arguing as in Lemma 2.2, we have Eq (2.6).

    Lemma 2.4. Fix T>0. There exists a constant C(T)>0, independent of ε, such that

    t0xuε(s,)6L6(R)dsC(T), (2.17)

    for every 0tT.

    Proof. Let 0tT. We begin by observing that,

    R(xuε)6dxxuε(t,)4L(R)xuε(t,)2L2(R). (2.18)

    Thanks to the Hölder inequality,

    (xuε(t,x))2=2xxuε2xuεdy2R|xuε||2xuε|dx2xuε(t,)L2(R)2xuε(t,)2L2(R).

    Hence,

    u(t,)4L(R)4xuε(t,)2L2(R)2xuε(t,)2L2(R).

    It follows from Eq (2.18) that

    R(xuε)6dx4xuε(t,)4L2(R)2xuε(t,)2L2(R).

    Therefore, by Eq (2.5),

    R(xuε)6dxC(T)2xuε(t,)2L2(R).

    An integration on (0,t) and Eq (2.5) gives (2.17).

    This section is devoted to the proof of Theorem 1.1.

    We begin by proving the following result.

    Lemma 3.1. Fix T>0. Then,

    the family {uε}ε>0 is compact in L2loc((0,T)×R). (3.1)

    Consequently, there exist a subsequence {uεk}kN and uL2loc((0,T)×R) such that

    uεku in L2loc((0,T)×R) and a.e. in (0,T)×R. (3.2)

    Moreover, u is a solution of Eq (1.1), satisfying Eq (1.8).

    Proof. We begin by proving Eq (3.1). To prove Eq (3.1), we rely on the Aubin-Lions Lemma (see [5,21]). We recall that

    H1loc(R)↪↪L2loc(R)H1loc(R),

    where the first inclusion is compact and the second one is continuous. Owing to the Aubin-Lions Lemma [21], to prove Eq (3.1), it suffices to show that

    {uε}ε>0 is uniformly bounded in L2(0,T;H1loc(R)), (3.3)
    {tuε}ε>0 is uniformly bounded in L2(0,T;H1loc(R)). (3.4)

    We prove Eq (3.3). Thanks to Lemmas 2.1–2.3,

    uε(t,)2H1(R)=uε(t,)2L2(R)+xuε(t,)2L2(R)C(T).

    Therefore,

    {uε}ε>0 is uniformly bounded in L(0,T;H1(R)),

    which gives Eq (3.3).

    We prove Eq (3.4). Observe that, by Eq (2.1),

    tuε=x(G(uε))f(uε)xuεκuεγ2|uε|uε,

    where

    G(uε)=β2xuεδ2xuεε3xuε. (3.5)

    Since 0<ε<1, thanks to Eq (2.5), we have that

    β2xuε2L2((0,T)×R),δ22xuε2L2((0,T)×R)C(T),ε23xuε2L2((0,T)×R)C(T). (3.6)

    Therefore, by Eqs (3.5) and (3.6), we have that

    {x(G(uε))}ε>0 is bounded in L2(0,T;H1(R)). (3.7)

    We claim that

    T0R(f(uε))2(xuε)2dtdxC(T). (3.8)

    Thanks to Eqs (2.4) and (2.5),

    T0R(f(uε))2(xuε)2dtdxf2L(C(T),C(T))T0xuε(t,)2L2(R)dtC(T).

    Moreover, thanks to Eq (2.3),

    |κ|T0R(uε)2dxC(T). (3.9)

    We have that

    γ2T0R(|uε|uε)2dsdxC(T). (3.10)

    In fact, thanks to Eqs (2.3) and (2.4),

    γ2T0R(|uε|uε)2dsdxγ2uε2L((0,T)×R)T0R(uε)2dsdxC(T)T0R(uε)2dsdxC(T).

    Therefore, Eq (3.4) follows from Eqs (3.7)–(3.10).

    Thanks to the Aubin-Lions Lemma, Eqs (3.1) and (3.2) hold.

    Consequently, arguing as in [5, Theorem 1.1], u is solution of Eq (1.1) and, thanks to Lemmas 2.1–2.3 and Eqs (2.4), (1.8) holds.

    Proof of Theorem 1.1. Lemma 3.1 gives the existence of a solution of Eq (1.1).

    We prove Eq (1.9). Let u1 and u2 be two solutions of Eq (1.1), which verify Eq (1.8), that is,

    {tui+xf(ui)β22xui+δ3xui+κui+γ2|ui|ui=0,0<t<T,xR,ui(0,x)=ui,0(x),xR,i=1,2.

    Then, the function

    ω(t,x)=u1(t,x)u2(t,x), (3.11)

    is the solution of the following Cauchy problem:

    {tω+x(f(u1)f(u2))β22xω+δ2xω+κω+γ2(|u1|u1|u2|u2)=0,0<t<T,xR,ω(0,x)=u1,0(x)u2,0(x),xR. (3.12)

    Fixed T>0, since u1,u2H1(R), for every 0tT, we have that

    u1L((0,T)×R),u2L((0,T)×R)C(T). (3.13)

    We define

    g=f(u1)f(u2)ω (3.14)

    and observe that, by Eq (3.13), we have that

    |g|fL(C(T),C(T))C(T). (3.15)

    Moreover, by Eq (3.11) we have that

    ||u1||u2|||u1u2|=|ω|. (3.16)

    Observe that thanks to Eq (3.11),

    |u1|u1|u2|u2=|u1|u1|u1|u2+|u1|u2|u2|u2=|u1|ω+u2(|u1||u2|). (3.17)

    Thanks to Eqs (3.14) and (3.17), Equation (3.12) is equivalent to the following one:

    tω+x(gω)β22xω+δ3xω+κω+γ2|u1|ω+γ2u2(|u1||u2|)=0. (3.18)

    Multiplying Eq (3.18) by 2ω, an integration on R gives

    dtdtω(t,)2L2(R)=2Rωtω=2Rωx(gω)dx+2β2Rω2xωdx2δRω3xωdx2κω(t,)2L2(R)2γ2R|u1|ω2dx2γ2Ru2(|u1||u2|)ωdx=2Rgωxωdx2β2xω(t,)2L2(R)+2δRxω2xωdx2κω(t,)2L2(R)2γ2R|u1|ω2dx2γ2Ru2(|u1||u2|)ωdx=2Rgωxωdx2β2xω(t,)2L2(R)2κω(t,)2L2(R)2γ2R|u1|ω2dx2γ2Ru2(|u1||u2|)ωdx.

    Therefore, we have that

    ω(t,)2L2(R)+2β2xω(t,)2L2(R)+2γ2R|u1|ω2dx=2Rgωxωdxκω(t,)2L2(R)2γ2Ru2(|u1||u2|)ωdx. (3.19)

    Due to Eqs (3.13), (3.15) and (3.16) and the Young inequality,

    2R|g||ω||xω|dx2C(T)R|ω||xω|dx=2R|C(T)ωβ||βxω|dxC(T)ω(t,)2L2(R)+β2xω(t,)2L2(R),2γ2R|u2||(|u1||u2|)||ω|dx2γ2u2L((0,T)×R)R|(|u1||u2|)||ω|dxC(T)ω(t,)2L2(R).

    It follows from Eq (3.19) that

    ω(t,)2L2(R)+β2xω(t,)2L2(R)+2γ2R|u1|ω2dxC(T)ω(t,)2L2(R).

    The Gronwall Lemma and Eq (3.12) give

    ω(t,)2L2(R)+β2eC(T)tt0eC(T)sxω(s,)2L2(R)ds+2γ2eC(T)tt0ReC(T)s|u1|ω2dsdxeC(T)tω02L2(R). (3.20)

    Equation (1.9) follows from Eqs (3.11) and (3.20).

    Giuseppe Maria Coclite and Lorenzo Di Ruvo equally contributed to the methodologies, typesetting, and the development of the paper.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    Giuseppe Maria Coclite is an editorial boardmember for [Networks and Heterogeneous Media] and was not involved inthe editorial review or the decision to publish this article.

    GMC is member of the Gruppo Nazionale per l'Analisi Matematica, la Probabilità e le loro Applicazioni (GNAMPA) of the Istituto Nazionale di Alta Matematica (INdAM). GMC has been partially supported by the Project funded under the National Recovery and Resilience Plan (NRRP), Mission 4 Component 2 Investment 1.4 -Call for tender No. 3138 of 16/12/2021 of Italian Ministry of University and Research funded by the European Union -NextGenerationEUoAward Number: CN000023, Concession Decree No. 1033 of 17/06/2022 adopted by the Italian Ministry of University and Research, CUP: D93C22000410001, Centro Nazionale per la Mobilità Sostenibile, the Italian Ministry of Education, University and Research under the Programme Department of Excellence Legge 232/2016 (Grant No. CUP - D93C23000100001), and the Research Project of National Relevance "Evolution problems involving interacting scales" granted by the Italian Ministry of Education, University and Research (MIUR Prin 2022, project code 2022M9BKBC, Grant No. CUP D53D23005880006). GMC expresses its gratitude to the HIAS - Hamburg Institute for Advanced Study for their warm hospitality.

    The authors declare there is no conflict of interest.



    [1] Y. Tang, Q. Wang, M. Ni, Y. Liang, Analysis of cyber attacks in cyber physical power system, Autom. Electr. Power Syst., 40 (2016), 148–151. http://dx.doi.org/10.7500/AEPS20160123101 doi: 10.7500/AEPS20160123101
    [2] H. Gong, S. Cheng, Z. Chen, Q. Li, Data-enabled physics-informed machine learning for reduced-order modeling digital twin: application to nuclear reactor physics, Nucl. Sci. Eng., 196 (2022), 668–693. https://doi.org/10.1080/00295639.2021.2014752 doi: 10.1080/00295639.2021.2014752
    [3] P. T. Baboli, D. Babazadeh, D. R. K. Bowatte, Measurement-based modeling of smart grid dynamics: a digital twin approach, in 2020 10th Smart Grid Conference (SGC), Kashan, (2020), 1–6. https://doi.org/10.1109/SGC52076.2020.9335750
    [4] H. Gong, S. Cheng, Z. Chen, Q. Li, C. Quilodrán-Casas, D. Xiao, et al., An efficient digital twin based on machine learning SVD autoencoder and generalised latent assimilation for nuclear reactor physics, Ann. Nucl. Energy, 179 (2022), 109431. https://doi.org/10.1016/j.anucene.2022.109431 doi: 10.1016/j.anucene.2022.109431
    [5] J. Gao, Y. Xiao, J. Liu, W. Liang, C. L. P. Chen, A survey of communication/networking in smart grids, Future Gener. Comput. Syst., 28 (2012), 391–404. https://doi.org/10.1016/j.future.2011.04.014 doi: 10.1016/j.future.2011.04.014
    [6] B. Lu, Y. Ma, Research on communication system of advanced metering infrastructure for smart grid and its data security measures, Power Syst. Technol., 37 (2013), 2244–2249.
    [7] S. R. Rajagopalan, L. Sankar, S. Mohajer, H. V. Poor, Smart meter privacy: a utility-privacy: framework, in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), (2011), 190–195. https://doi.org/10.1109/SmartGridComm.2011.6102315
    [8] H. Li, X. Liang, R. Lu, X. Lin, X. Shen, EDR: an efficient demand response scheme for achieving forward secrecy in smart grid, in 2012 IEEE Global Communications Conference (GLOBECOM), (2012), 929–934. https://doi.org/10.1109/GLOCOM.2012.6503232
    [9] L. Sankar, S. Kars, R. Tandon, H. V. Poor, Competitive privacy in the smart grid: an information-theoretic approach, in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), (2011), 220–225. https://doi.org/10.1109/SmartGridComm.2011.6102322
    [10] A. Sahai, B. Waters, Fuzzy identity-based encryption, in Advances in Cryptology – EUROCRYPT 2005, Springer, Berlin, Heidelberg, (2005), 457–473. https://doi.org/10.1007/11426639_27
    [11] M. Joshi, K. Joshi, T. Finin, Attribute based encryption for secure access to cloud based EHR systems, in 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), (2018), 932–935. https://doi.org/10.1109/CLOUD.2018.00139
    [12] Z. Liu, L. Jiang, X. Wang, S. M. Yiu, Practical attribute-based encryption: outsourcing decryption, attribute revocation and policy updating, J. Network Comput. Appl., 108 (2018), 112–123. https://doi.org/10.1016/j.jnca.2018.01.016 doi: 10.1016/j.jnca.2018.01.016
    [13] M. Cui, D. Han, J. Wang, An efficient and safe road condition monitoring authentication scheme based on fog computing, IEEE Internet Things J., 6 (2019), 9076–9084. https://doi.org/10.1109/JIOT.2019.2927497 doi: 10.1109/JIOT.2019.2927497
    [14] Y. Rouselakis, B. Waters, Practical constructions and new proof methods for large universe attribute-based encryption, in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, (2013), 463–474. https://doi.org/10.1145/2508859.2516672
    [15] W. Fan, L. Li, X. Chen, H. Jiang, Z. Li, K. C. Li, Deploying parallelized ciphertext policy attributed-based encryption in clouds, Int. J. Comput. Sci. Eng., 16 (2018), 321–333. https://doi.org/10.1504/IJCSE.2018.091784 doi: 10.1504/IJCSE.2018.091784
    [16] X. Li, K. Liang, Z. Liu, D. Wong, Attribute based encryption: traitor tracing, revocation and fully security on prime order groups, in Proceedings of the 7th International Conference on Cloud Computing and Services Science - CLOSER, (2017), 309–320. https://doi.org/10.5220/0006220203090320
    [17] Y. Zhang, D. Zheng, R. H. Deng, Security and privacy in smart health: efficient policy-hiding attribute-based access control, IEEE Internet Things J., 5 (2018), 2130–2145. https://doi.org/10.1109/JIOT.2018.2825289 doi: 10.1109/JIOT.2018.2825289
    [18] H. Cui, R. H. Deng, J. Lai, X. Yi, S. Nepal, An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited, Comput. Networks, 133 (2018), 157–165. https://doi.org/10.1016/j.comnet.2018.01.034 doi: 10.1016/j.comnet.2018.01.034
    [19] Z. Liu, Z. Cao, D. S. Wong, Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay, in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, (2018), 475–486. https://doi.org/10.1145/2508859.2516683
    [20] Z. Liu, X. Wang, L. Cui, Z. L. Jiang, C. Zhang, White-box traceable dynamic attribute-based encryption, in 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), (2017), 526–530. https://doi.org/10.1109/SPAC.2017.8304334
    [21] Y. Shi, Q. Zheng, J. Liu, Z. Han, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Inf. Sci., 295 (2015), 221–231. https://doi.org/10.1016/j.ins.2014.10.020 doi: 10.1016/j.ins.2014.10.020
    [22] V. H. Hoang, E. Lehtihet, Y. Ghamri-Doudane, Forward-secure data outsourcing based on revocable attribute-based encryption, in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), (2019), 1839–1846. https://doi.org/10.1109/IWCMC.2019.8766674
    [23] G. Xiang, B. Li, X. Fu, M. Xia, W. Ke, An attribute revocable CP-ABE scheme, 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD), (2019), 198–203. https://doi.org/10.1109/CBD.2019.00044 doi: 10.1109/CBD.2019.00044
    [24] S. Wang, K. Guo, Y. Zhang, Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage, PLoS One, 13 (2018), e0206952. https://doi.org/10.1371/journal.pone.0206952 doi: 10.1371/journal.pone.0206952
    [25] Z. Liu, S. Duan, P. Zhou, B. Wang, Traceable-then-revocable ciphertext-policy attribute-based encryption scheme, Future Gener. Comput. Syst., 93 (2019), 903–913. https://doi.org/10.1016/j.future.2017.09.045 doi: 10.1016/j.future.2017.09.045
    [26] D. Han, N. Pan, K. Li, A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection, IEEE Trans. Dependable Secure Comput., 19 (2020), 316–327. https://doi.org/10.1109/TDSC.2020.2977646 doi: 10.1109/TDSC.2020.2977646
    [27] Q. Li, B. Xia, H. Huang, Y. Zhang, TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT, IEEE Trans. Ind. Inf., 18 (2022), 3437–3448. https://doi.org/10.1109/TII.2021.3109090 doi: 10.1109/TII.2021.3109090
    [28] M. Chase, Multi-authority attribute based encryption, in Theory of Cryptography, Berlin, Heidelberg, (2007), 515–534. https://doi.org/10.1007/978-3-540-70936-7_28
    [29] S. J. De, S. Ruj, Decentralized access control on data in the cloud with fast encryption and outsourced decryption, in 2015 IEEE Global Communications Conference (GLOBECOM), (2015), 1–6. https://doi.org/10.1109/GLOCOM.2015.7417639
    [30] M. Xiao, Q. Huang, Y. Miao, S. Li, W. Susilo, Blockchain based multi-authority fine-grained access control system with flexible revocation, IEEE Trans. Serv. Comput., 15 (2021), 3143–3155. https://doi.org/10.1109/TSC.2021.3086023 doi: 10.1109/TSC.2021.3086023
    [31] K. Sethi, A. Pradhan, P. Bera, PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems, Cluster Comput., 24 (2021), 1525–1550. https://doi.org/10.1007/s10586-020-03202-2 doi: 10.1007/s10586-020-03202-2
    [32] P. Datta, I. Komargodski, B. Waters, Decentralized multi-authority ABE for NC 1 from BDH, J. Cryptology, 36 (2023), 6. https://doi.org/10.1007/s00145-023-09445-7 doi: 10.1007/s00145-023-09445-7
    [33] S. Hohenberger, B. Waters, Online/offline attribute-based encryption, in Public-Key Cryptography – PKC 2014, Buenos Aires, Argentina, (2014), 293–310. https://doi.org/10.1007/978-3-642-54631-0_17
    [34] A. Mughal, A. Joseph, Blockchain for cloud storage security: a review, in 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), (2020), 1163–1169. https://doi.org/10.1109/ICICCS48265.2020.9120930
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2079) PDF downloads(88) Cited by(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog