Affiliation:
1. Technische Universität Darmstadt
Abstract
Abstract
The widespread deployment of smart meters that frequently report energy consumption information, is a known threat to consumers’ privacy. Many promising privacy protection mechanisms based on secure aggregation schemes have been proposed. Even though these schemes are cryptographically secure, the energy provider has access to the plaintext aggregated power consumption. A privacy trade-off exists between the size of the aggregation scheme and the personal data that might be leaked, where smaller aggregation sizes leak more personal data. Recently, a UK industrial body has studied this privacy trade-off and identified that two smart meters forming an aggregate, are sufficient to achieve privacy. In this work, we challenge this study and investigate which aggregation sizes are sufficient to achieve privacy in the smart grid. Therefore, we propose a flexible, yet formal privacy metric using a cryptographic game based definition. Studying publicly-available, real world energy consumption datasets with various temporal resolutions, ranging from minutes to hourly intervals, we show that a typical household can be identified with very high probability. For example, we observe a 50% advantage over random guessing in identifying households for an aggregation size of 20 households with a 15-minutes reporting interval. Furthermore, our results indicate that single appliances can be identified with significant probability in aggregation sizes up to 10 households.
Reference42 articles.
1. [1] European Parliament and Council of the European Union, “Directive 2006/32/ec of the european parliament and of the council,” 2006.
2. [2] G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of the IEEE, vol. 80, no. 12, pp. 1870–1891, 1992.10.1109/5.192069
3. [3] H. Lam, G. Fung, and W. Lee, “A novel method to construct taxonomy electrical appliances based on load signatures of,” IEEE Transactions on Consumer Electronics, vol. 53, no. 2, pp. 653–660, 2007.
4. [4] U. Greveler, B. Justus, and D. Loehr, “Forensic content detection through power consumption,” in Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012, pp. 6759–6763, 2012.
5. [5] C. Laughman, K. Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong, “Power signature analysis,” IEEE power and energy magazine, vol. 1, no. 2, pp. 56–63, 2003.10.1109/MPAE.2003.1192027
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献