Skip to main content

Advertisement

Log in

Re-identification of Smart Meter data

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

The Smart Grid approach enhances the power grid with information technology. Smart Meters are an important part of the Smart Grid. They record the energy consumption of households with a high-resolution and transfer consumption records to the energy provider in real time. Since they allow to infer personal information like the daily routine of the household members, Smart Meters are also a promising source for lifelogging. However, in liberalized energy markets, many different parties have access to these data. This puts the privacy of consumers at risk. In this paper, we analyze to which degree Smart Meter data, as collected by our industry partner, can be linked to its producer, using simple statistical measures. We devise features of the energy consumption, for example, the first peak of demand in the morning, and we describe an analytical framework that quantifies how well these features can identify households. Finally, we conduct a study with 60,480 energy-consumption records from 180 households. Our study shows that 68 % of the records can be re-identified with simple means already. This insight is important for Smart Grids, as it emphasizes the need for research and use of anonymization techniques for the Smart Grid.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. http://blogspot.com.

  2. http://twitter.com.

  3. http://www.facebook.com.

  4. http://www.enel.com.

References

  1. Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. New York Times, New York

  2. Barbu C, Kröner A, Schneider M, Jacobs O (2009) Studying the functions of sharable digital memories. IADIS Int J WWW/Internet (IJWI) 7(1):44–62

    Google Scholar 

  3. Bundesrepublik Deutschland (2003) Bundesdatenschutzgesetz (BDSG). Bundesgesetzblatt I/2003 S.66

  4. Chaudhari J, Cheung SS, Venkatesh MV (2007) Privacy protection for life-log video. In: Proceedings of the workshop on signal processing applications for public security and forensics

  5. Cunningham S, Truta TM (2008) Protecting privacy in recorded conversations. In: Proceedings of the 1st international workshop on privacy and anonymity in the information society (PAIS’08)

  6. Dalenius T (1986) Finding a needle in a haystack or identifying anonymous census record. J Off Stat 2(3):329–336

    Google Scholar 

  7. European parliament and the council of the European Union: (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J L 281, 11/23/1995, p. 31

    Google Scholar 

  8. Gemmell J, Bell G, Lueder R (2006) MyLifeBits: a personal database for everything. Commun ACM (CACM) 49

  9. Golle P (2006) Revisiting the uniqueness of simple demographics in the US population. In: Proceedings of the 5th workshop on privacy in the electronic society (WPES’06)

  10. Greveler U, Justus B, Löhr D (2011) Hintergrund und experimentelle Ergebnisse zum Thema “Smart Meter und Datenschutz”. Available at http://www.daprim.de

  11. Hart GW (1992) Nonintrusive appliance load monitoring. Proc IEEE 80(12):1870–1891

    Google Scholar 

  12. Kim H, Marwah M, Arlitt M, Lyon G, Hand J (2011) Unsupervised disaggregation of low frequency power measurements. In: Proceedings of the 2011 SIAM international conference on data mining (SDM’11)

  13. Kröner A, Schneider M, Mori J (2009) A framework for ubiquitous content sharing. IEEE Perv Comput 8:58–65

    Google Scholar 

  14. Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE’06)

  15. Mann S (1997) Smart clothing: the wearable computer and wearcam. Pers Ubiquit Comput 1(1):21–27

    Google Scholar 

  16. Molina-Markham A, Shenoy P, Fu K, Cecchet E, Irwin D (2010) Private memoirs of a Smart Meter. In: Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building

  17. Nergiz ME, Atzori M, Saygin Y (2008) Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS

  18. Ninghui L, Tiancheng L, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd international conference on data engineering (ICDE’07)

  19. O’Hara K, Tuffield M, Shadbolt N (2009) Lifelogging: privacy and empowerment with memories for life. IDIS 1(2):155–172

    Google Scholar 

  20. Rawassizadeh R, Tjoa A (2010) Securing shareable life-logs. In: Proceedings of the 2nd international conference on social computing (SocialCom’10)

  21. Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Based Syst 10(5):557–570

    Article  MathSciNet  MATH  Google Scholar 

  22. Yonezawa T, Okamoto N, Yamazoe H, Abe S, Hattori F, Hagita N (2011) Privacy protected life-context-aware alert by simplified sound spectrogram from microphone sensor. In: Proceedings of the 5th ACM workshop on context-awareness for self-managing systems

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Erik Buchmann.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Buchmann, E., Böhm, K., Burghardt, T. et al. Re-identification of Smart Meter data. Pers Ubiquit Comput 17, 653–662 (2013). https://doi.org/10.1007/s00779-012-0513-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0513-6

Keywords

Navigation