Abstract
The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meter s ) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication with E-meter s and for fraud detection (leakage) in a privacy-preserving manner. Our approach uses a combination of Paillier’s additive homomorphic encryption and additive secret sharing to compute the aggregated energy consumption of a given set of users.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cuijpers, C., Koops, B.-J.: Het wetsvoorstel slimme meters: een privacytoets op basis van art. 8 EVRM. Technical report, Tilburg University, Report (October 2008) (in Dutch)
Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation (November 17, 2009), http://www.ipc.on.ca/images/Resources/pbd-smartpriv-smartgrid.pdf
EPIC. Comments of the Electronic Privacy and Information Center on the NIST Smart Grid Standards (December 1, 2009), http://epic.org/privacy/smartgrid/EPIC_Smart_Grid_Cybersecurity_12-01-09.2.pdf
Hart, G.: Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technology and Society Magazine 8(2), 12–16 (1989)
Jacobs, B., Pieters, W.: Electronic voting in The Netherlands: From early adoption to early abolishment. In: Aldini, A., Barthe, G. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 121–144. Springer, Heidelberg (2009)
Keemink, S., Roos, B.: Security Analysis of Dutch Smart Metering Systems. Technical report, Amsterdam: UvA (July 7, 2008), https://www.os3.nl/2007-2008/students/bart_roos/rp2
LeMay, M., Gross, G., Gunter, C., Garg, S.: Unified architecture for large-scale attested metering. In: HICSS 2007: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, pp. 115–125. IEEE Computer Society, Washington, DC, USA (2007)
NIST. Smart Grid Cyber Security Strategy and Requirements (February 2, 2010), http://www.itl.nist.gov/div893/csrc/publications/drafts/nistir_7628/draft-nistir-7628_2nd-public-draft.pdf .
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes (chapter 16). In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Quinn, E.L.: Privacy and the New Energy Infrastructure (2009), http://ssrn.com/abstract=1370731
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Garcia, F.D., Jacobs, B. (2011). Privacy-Friendly Energy-Metering via Homomorphic Encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds) Security and Trust Management. STM 2010. Lecture Notes in Computer Science, vol 6710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22444-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-22444-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22443-0
Online ISBN: 978-3-642-22444-7
eBook Packages: Computer ScienceComputer Science (R0)