{"id":"https://openalex.org/W4414229457","doi":"https://doi.org/10.1109/jiot.2025.3610510","title":"Distributed Security State Estimation Based on Homomorphic Encryption for Privacy-Preserving Consensus in Cloud Environment","display_name":"Distributed Security State Estimation Based on Homomorphic Encryption for Privacy-Preserving Consensus in Cloud Environment","publication_year":2025,"publication_date":"2025-09-16","ids":{"openalex":"https://openalex.org/W4414229457","doi":"https://doi.org/10.1109/jiot.2025.3610510"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3610510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3610510","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113018727","display_name":"Minggao Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Minggao Zhu","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]},{"raw_affiliation_string":"School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100735340","display_name":"Dajun Du","orcid":"https://orcid.org/0000-0003-2979-1507"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajun Du","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]},{"raw_affiliation_string":"School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100372203","display_name":"Xue Li","orcid":"https://orcid.org/0000-0002-4691-0160"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue Li","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]},{"raw_affiliation_string":"School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020070892","display_name":"Qing Sun","orcid":"https://orcid.org/0000-0002-9662-2685"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Sun","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]},{"raw_affiliation_string":"School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051175363","display_name":"Minrui Fei","orcid":"https://orcid.org/0000-0002-7804-077X"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minrui Fei","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]},{"raw_affiliation_string":"School of Mechatronics Engineering and Automation, Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040409657","display_name":"Lei Wu","orcid":"https://orcid.org/0000-0002-0722-5769"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lei Wu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5113018727"],"corresponding_institution_ids":["https://openalex.org/I113940042"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27945014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"23","first_page":"50466","last_page":"50479"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5177000164985657},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5049999952316284},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4781000018119812},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.476500004529953},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4025999903678894},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3813000023365021},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.3635999858379364},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.33410000801086426},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.31610000133514404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7738999724388123},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5177000164985657},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5049999952316284},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4781000018119812},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.476500004529953},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3813000023365021},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37689998745918274},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3635999858379364},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.33410000801086426},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.31610000133514404},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3043999969959259},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.30230000615119934},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30070000886917114},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.29660001397132874},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.2897000014781952},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2872999906539917},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.27090001106262207},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.26750001311302185},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.25609999895095825},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3610510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3610510","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1991376625","display_name":null,"funder_award_id":"62273224","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4609417737","display_name":null,"funder_award_id":"62373240","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7788836414","display_name":null,"funder_award_id":"U24A20259","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2023439666","https://openalex.org/W2127936281","https://openalex.org/W2139191533","https://openalex.org/W2230451675","https://openalex.org/W2510333599","https://openalex.org/W2766003054","https://openalex.org/W2793107922","https://openalex.org/W2920215781","https://openalex.org/W2964899773","https://openalex.org/W2972269167","https://openalex.org/W2982094667","https://openalex.org/W2984195658","https://openalex.org/W3046120162","https://openalex.org/W3087878582","https://openalex.org/W3124774072","https://openalex.org/W3130918512","https://openalex.org/W3167954799","https://openalex.org/W3201079611","https://openalex.org/W4213451424","https://openalex.org/W4311434087","https://openalex.org/W4312983473","https://openalex.org/W4313038909","https://openalex.org/W4315489350","https://openalex.org/W4378628059","https://openalex.org/W4382407475","https://openalex.org/W4383200219","https://openalex.org/W4395083708","https://openalex.org/W4398160743","https://openalex.org/W4402216597","https://openalex.org/W4410203755"],"related_works":[],"abstract_inverted_index":{"As":[0],"data":[1,20,58,70,140,146,178,191],"sharing":[2],"is":[3,28,93,103,109,125,164,173,200,204,249,303],"essential":[4],"in":[5],"applications":[6],"such":[7],"as":[8],"distributed":[9,40,154,281],"state":[10,42,155,197,283],"estimation":[11,43,198,215,284],"of":[12,19,85,144,153,212,256,272,292,309],"cyber-physical":[13],"power":[14],"systems":[15],"(CPPSs),":[16],"the":[17,33,82,86,106,113,117,142,150,187,207,213,233,257,260,268,273,289,307],"issue":[18],"privacy":[21,147],"leakage":[22],"among":[23],"individual":[24,61],"regional":[25,56,62,133],"system":[26,63,134,223,258],"operators":[27,64],"increasingly":[29],"concerned.":[30],"To":[31],"solve":[32],"issue,":[34],"this":[35],"paper":[36],"proposes":[37],"a":[38,74,157,167,194,239],"new":[39,75],"security":[41],"(DSSE)":[44],"method":[45,79,163,285],"based":[46,80],"on":[47,81,253],"homomorphic":[48,158],"encryption":[49,159],"for":[50,247,286],"privacy-preserving":[51,161,243],"consensus.":[52],"First,":[53],"considering":[54,130],"that":[55,105,131,206],"measurement":[57],"managed":[59],"by":[60,68,182],"could":[65],"be":[66],"attacked":[67],"false":[69],"injection":[71],"attacks":[72],"(FDIAs),":[73],"active":[76,277],"attack":[77,278],"detection":[78,97,107,188],"statistical":[83],"characteristics":[84],"watermarking":[87,114],"signal":[88,118],"before":[89],"and":[90,99,101,190,202,209,225,259,270,280,300],"after":[91],"FDIAs":[92],"proposed":[94,274],"to":[95,119,137,148,175,186,222,232,238],"improve":[96],"proactivity":[98],"accuracy,":[100],"it":[102,203],"found":[104],"accuracy":[108],"positively":[110],"correlated":[111],"with":[112],"intensity":[115],"when":[116],"interference":[120],"plus":[121],"noise":[122,227],"ratio":[123],"(SINR)":[124],"greater":[126],"than":[127],"10db.":[128],"Second,":[129],"each":[132],"operator":[135],"needs":[136],"exchang":[138],"intermediate":[139],"under":[141],"premise":[143],"protecting":[145],"guarantee":[149],"consistency":[151,248],"process":[152],"estimation,":[156],"(HE)-based":[160],"consensus":[162],"proposed,":[165,201],"where":[166],"hash":[168],"function-based":[169],"dual":[170],"verification":[171],"mechanism":[172],"presented":[174],"prevent":[176],"ciphertext":[177,298],"from":[179],"being":[180],"tampered":[181],"FDIAs.":[183],"Third,":[184],"according":[185,237],"results":[189,266],"compensation":[192,234],"mechanism,":[193],"local":[195],"secure":[196,282],"model":[199],"proved":[205],"upper":[208],"lower":[210],"bounds":[211],"reconstructed":[214],"error":[216],"covariance":[217],"are":[218],"not":[219],"only":[220],"related":[221,231],"parameters":[224],"external":[226],"but":[228],"also":[229],"negatively":[230],"error.":[235],"Furthermore,":[236],"Lyapunov":[240],"function":[241],"including":[242],"consensus,":[244],"sufficient":[245],"condition":[246],"proven,":[250],"which":[251,305],"depends":[252],"Laplacian":[254],"matrix":[255],"iteration":[261],"step":[262],"size.":[263],"Finally,":[264],"experimental":[265],"demonstrate":[267],"feasibility":[269,308],"effectiveness":[271],"dynamic":[275],"watermarking-based":[276],"detector":[279],"CPPSs.":[287],"Moreover,":[288],"computational":[290],"overhead":[291],"incorporating":[293],"advanced":[294],"IND-CPA":[295],"countermeasures":[296],"(i.e.,":[297],"re-randomization":[299],"branchless":[301],"arithmetic)":[302],"quantified,":[304],"confirms":[306],"practical":[310],"deployment.":[311]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
