Abstract
The Smart Grid approach enhances the power grid with information technology. Smart Meters are an important part of the Smart Grid. They record the energy consumption of households with a high-resolution and transfer consumption records to the energy provider in real time. Since they allow to infer personal information like the daily routine of the household members, Smart Meters are also a promising source for lifelogging. However, in liberalized energy markets, many different parties have access to these data. This puts the privacy of consumers at risk. In this paper, we analyze to which degree Smart Meter data, as collected by our industry partner, can be linked to its producer, using simple statistical measures. We devise features of the energy consumption, for example, the first peak of demand in the morning, and we describe an analytical framework that quantifies how well these features can identify households. Finally, we conduct a study with 60,480 energy-consumption records from 180 households. Our study shows that 68 % of the records can be re-identified with simple means already. This insight is important for Smart Grids, as it emphasizes the need for research and use of anonymization techniques for the Smart Grid.
Similar content being viewed by others
References
Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. New York Times, New York
Barbu C, Kröner A, Schneider M, Jacobs O (2009) Studying the functions of sharable digital memories. IADIS Int J WWW/Internet (IJWI) 7(1):44–62
Bundesrepublik Deutschland (2003) Bundesdatenschutzgesetz (BDSG). Bundesgesetzblatt I/2003 S.66
Chaudhari J, Cheung SS, Venkatesh MV (2007) Privacy protection for life-log video. In: Proceedings of the workshop on signal processing applications for public security and forensics
Cunningham S, Truta TM (2008) Protecting privacy in recorded conversations. In: Proceedings of the 1st international workshop on privacy and anonymity in the information society (PAIS’08)
Dalenius T (1986) Finding a needle in a haystack or identifying anonymous census record. J Off Stat 2(3):329–336
European parliament and the council of the European Union: (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J L 281, 11/23/1995, p. 31
Gemmell J, Bell G, Lueder R (2006) MyLifeBits: a personal database for everything. Commun ACM (CACM) 49
Golle P (2006) Revisiting the uniqueness of simple demographics in the US population. In: Proceedings of the 5th workshop on privacy in the electronic society (WPES’06)
Greveler U, Justus B, Löhr D (2011) Hintergrund und experimentelle Ergebnisse zum Thema “Smart Meter und Datenschutz”. Available at http://www.daprim.de
Hart GW (1992) Nonintrusive appliance load monitoring. Proc IEEE 80(12):1870–1891
Kim H, Marwah M, Arlitt M, Lyon G, Hand J (2011) Unsupervised disaggregation of low frequency power measurements. In: Proceedings of the 2011 SIAM international conference on data mining (SDM’11)
Kröner A, Schneider M, Mori J (2009) A framework for ubiquitous content sharing. IEEE Perv Comput 8:58–65
Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE’06)
Mann S (1997) Smart clothing: the wearable computer and wearcam. Pers Ubiquit Comput 1(1):21–27
Molina-Markham A, Shenoy P, Fu K, Cecchet E, Irwin D (2010) Private memoirs of a Smart Meter. In: Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building
Nergiz ME, Atzori M, Saygin Y (2008) Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS
Ninghui L, Tiancheng L, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd international conference on data engineering (ICDE’07)
O’Hara K, Tuffield M, Shadbolt N (2009) Lifelogging: privacy and empowerment with memories for life. IDIS 1(2):155–172
Rawassizadeh R, Tjoa A (2010) Securing shareable life-logs. In: Proceedings of the 2nd international conference on social computing (SocialCom’10)
Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Based Syst 10(5):557–570
Yonezawa T, Okamoto N, Yamazoe H, Abe S, Hattori F, Hagita N (2011) Privacy protected life-context-aware alert by simplified sound spectrogram from microphone sensor. In: Proceedings of the 5th ACM workshop on context-awareness for self-managing systems
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Buchmann, E., Böhm, K., Burghardt, T. et al. Re-identification of Smart Meter data. Pers Ubiquit Comput 17, 653–662 (2013). https://doi.org/10.1007/s00779-012-0513-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0513-6