skip to main content
10.1145/2667190.2667193acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Privacy Enhanced Personal Services for Smart Grids

Published: 07 November 2014 Publication History

Abstract

Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and simplicity make our lives more complicated in terms of management due to several issues like mismatching interfaces and complexity of the micro-management. One approach to manage smart homes is to enable the utility provider, which has direct access to electrical devices via smart meters. It is expected that the data collected for the management can also be utilized for other personalized services using other business partners. In this paper, we address these personalized services and argue that privacy is a serious consideration for the deployment of the new business ideas. We provide a scientific method to provide new services for smart homes while protecting the privacy-sensitive data. To the best of our knowledge, privacy enhanced new services based on the utilization of smart meter data have not been considered by the research community.

References

[1]
S. Amin and B. Wollenberg, "Toward a smart grid: power delivery for the 21st century," Power and Energy Magazine, IEEE, vol. 3, no. 5, pp. 34--41, Sept 2005.
[2]
A. Bleicher, "Privacy on the smart grid," IEEE Spectrum, 2010, http://spectrum.ieee.org/energy/the-smarter-grid/privacy-on-the-smart-grid.
[3]
R. Anderson and S. Fuloria, "On the security economics of electricity metering," in The 9th Workshop on the Economics of Information Security, 2010.
[4]
NA, "The executive summary of the smartregions project," http://www.smartregions.net/default.asp?SivuID=26875.
[5]
C. Hensen, "AFM waarschuwt ING voor gebruik van klantgegevens,"http://www.nrc.nl/nieuws/2014/03/14/afm-waarschuwt-ing-voor-gebruik-van-klantgegevens/, March 14 2014.
[6]
M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in European Symposium on Research in Computer Security, Leuven, Belgium, September 2011.
[7]
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, "Privacy-preserving ecg classification with branching programs and neural networks," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 452--468, 2011.
[8]
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Generating private recommendations efficiently using homomorphic encryption and data packing," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1053--1066, 2012.
[9]
P. Bunn and R. Ostrovsky, "Secure two-party k-means clustering," in Proceedings of the 14th ACM conference on Computer and communications security. ACM New York, NY, USA, 2007, pp. 486--497.
[10]
C. Gentry, S. Halevi, and N. P. Smart, "Fully homomorphic encryption with polylog overhead," in EUROCRYPT, 2012, pp. 465--482.
[11]
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612{613, November 1979. {Online}. Available: http://doi.acm.org/10.1145/359168.359176
[12]
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game," in STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing. New York, NY, USA: ACM, 1987, pp. 218--229.
[13]
J.-M. Bohli, C. Sorge, and O. Ugus, "A privacy model for smart metering," in Communications Workshops (ICC), 2010 IEEE International Conference on, May 2010, pp. 1--5.
[14]
S. Wang, L. Cui, J. Que, D.-H. Choi, X. Jiang, S. Cheng, and L. Xie, "A randomized response model for privacy preserving smart metering." IEEE Trans Smart Grid, vol. 3, pp. 1317--1324, 2012 Sep 2012.
[15]
G. Acs and C. Castelluccia, "I have a DREAM! (Differentially PrivatE smart Metering)," in Information Hiding Conference, ser. LNCS. Springer, May 18-20 2011, pp. {.
[16]
H.-Y. Lin, W.-G. Tzeng, S.-T. Shen, and B.-S. Lin, "A practical smart metering system supporting privacy preserving billing and load monitoring," in Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science, F. Bao, P. Samarati, and J. Zhou, Eds. Springer Berlin Heidelberg, 2012, vol. 7341, pp. 544--560.
[17]
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in PETS, 2011, pp. 175--191.
[18]
F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in 6th Workshop on Security and Trust Management (STM 2010), ser. Lecture Notes in Computer Science, J. C. et al., Ed., vol. 6710. Springer Verlag, 2010, pp. 226--238.
[19]
G. Danezis, C. Fournet, M. Kohlweiss, and S. Z. Béguelin, "Smart meter aggregation via secret-sharing," in SEGS@CCS, 2013, pp. 75--80.
[20]
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in SIGMOD '00: Proceedings of the 2000 ACM SIGMOD international conference on Management of data, vol. 29(2). ACM Press New York, NY, USA, 2000, pp. 439--450.
[21]
H. Polat and W. Du, "SVD-based collaborative filtering with privacy," in SAC '05: Proceedings of the 2005 ACM symposium on Applied computing. New York, NY, USA: ACM Press, 2005, pp. 791--795.
[22]
R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux, "Preserving privacy in collaborative filtering through distributed aggregation of offline profiles," in RecSys '09: Proceedings of the third ACM conference on Recommender systems. New York, NY, USA: ACM, 2009, pp. 157--164.
[23]
F. McSherry and I. Mironov, "Differentially private recommender systems: building privacy into the net," in KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 627--636.
[24]
R. Cissée and S. Albayrak, "An agent-based approach for privacy-preserving recommender systems," in AAMAS '07: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems. New York, NY, USA: ACM, 2007, pp. 1--8.
[25]
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, "Private collaborative forecasting and benchmarking," in WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society. New York, NY, USA: ACM, 2004, pp. 103--114.
[26]
D. Kononchuk, Z. Erkin, J. C. A. van der Lubbe, and R. L. Lagendijk, "Privacy-preserving user data oriented services for groups with dynamic participation," in ESORICS, 2013, pp. 418--442.
[27]
Y. Kim, E. Ngai, and M. Srivastava, "Cooperative state estimation for preserving privacy of user behaviors in smart grid," in Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on, Oct 2011, pp. 178--183.
[28]
C. Efthymiou and G. Kalogridis, "Smart grid privacy via anonymization of smart metering data," in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, Oct 2010, pp. 238--243.
[29]
J. Chinnow, K. Bsufka, A.-D. Schmidt, R. Bye, A. Camtepe, and S. Albayrak, "A simulation framework for smart meter security evaluation," in Smart Measurements for Future Grids (SMFG), 2011 IEEE International Conference on, Nov 2011, pp. 1--9.
[30]
F. Blom, "A performance evaluation of secure comparison protocols in the two-party semi-honest model,"MSc. Thesis VU University Amsterdam, March 2014.
[31]
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology|EUROCRYPT'99, ser. Lecture Notes in Computer Science, vol. 1592. Springer, 1999, pp. 223--238.
[32]
T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," in PKC 2007, ser. LNCS, T. Okamoto and X. Wang, Eds., vol. 4450. Springer, 2007, pp. 343--360.
[33]
B. S. Juan Garay and J. Villegas, "Practical and secure solutions for integer comparison," in Public Key Cryptography - PKC'07, vol. 4450. Springer-Verlag, 2007, pp. 330--342.
[34]
F. Ricci, L. Rokach, B. Shapira, and P. Kantor, Recommender Systems Handbook. Springer, 2011, iSBN 978-0-387-85820-3.

Cited By

View all
  • (2018)An Anonymous Authentication Protocol for the Smart GridSmart Micro-Grid Systems Security and Privacy10.1007/978-3-319-91427-5_3(29-52)Online publication date: 28-Aug-2018
  • (2017)An Anonymous Authentication Protocol for Smart Grid2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)10.1109/WAINA.2017.41(62-67)Online publication date: Mar-2017

Index Terms

  1. Privacy Enhanced Personal Services for Smart Grids
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          SEGS '14: Proceedings of the 2nd Workshop on Smart Energy Grid Security
          November 2014
          60 pages
          ISBN:9781450331548
          DOI:10.1145/2667190
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 07 November 2014

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. cryptography
          2. performance
          3. privacy
          4. secret sharing
          5. smart energy grid

          Qualifiers

          • Research-article

          Conference

          CCS'14
          Sponsor:

          Acceptance Rates

          SEGS '14 Paper Acceptance Rate 7 of 11 submissions, 64%;
          Overall Acceptance Rate 19 of 38 submissions, 50%

          Upcoming Conference

          CCS '25

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)5
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 28 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2018)An Anonymous Authentication Protocol for the Smart GridSmart Micro-Grid Systems Security and Privacy10.1007/978-3-319-91427-5_3(29-52)Online publication date: 28-Aug-2018
          • (2017)An Anonymous Authentication Protocol for Smart Grid2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA)10.1109/WAINA.2017.41(62-67)Online publication date: Mar-2017

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media