A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment

被引:12
作者
Akguen, Mete [1 ,2 ,3 ]
Soykan, Elif Ustundag [4 ]
Soykan, Gurkan [5 ]
机构
[1] Univ Tubingen, Dept Comp Sci, Med Data Privacy & Privacy Preserving ML Healthca, D-72070 Tubingen, Germany
[2] Univ Tubingen, Inst Bioinformat & Med Informat, D-72070 Tubingen, Germany
[3] Izmir Inst Technol, Comp Engn Dept, TR-35430 Izmir, Turkiye
[4] Ericsson Prod Secur, S-16483 Stockholm, Sweden
[5] Bahcesehir Univ, Energy Syst Engn Dept, TR-34349 Istanbul, Turkiye
关键词
Data privacy; Smart grids; Privacy; Smart meters; Cryptography; Home appliances; Data protection; Smart grid; load monitoring; privacy; security; trusted execution environment; SECURE;
D O I
10.1109/ACCESS.2023.3237643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid functionalities. More granular energy consumption data flows through the grid and enables better smart grid applications. This may also lead to privacy violations since the data can be used to infer the consumer's residential behavior, so-called power signature. Energy utilities mostly aggregate the data, especially if the data is shared with stakeholders for the management of market operations. Although this is a privacy-friendly approach, recent works show that this does not fully protect privacy. On the other hand, some applications, like nonintrusive load monitoring, require disaggregated data. Hence, the challenging problem is to find an efficient way to facilitate smart grid operations without sacrificing privacy. In this paper, we propose a privacy-preserving scheme that leverages consumer privacy without reducing accuracy for smart grid applications like load monitoring. In the proposed scheme, we use a trusted execution environment (TEE) to protect the privacy of the data collected from smart appliances (SAs). The scheme allows customer-oriented smart grid applications as the scheme does not use regular aggregation methods but instead uses customer-oriented aggregation to provide privacy. Hence the accuracy loss stemming from disaggregation is prevented. Our scheme protects the transferred consumption data all the way from SAs to Utility so that possible false data injection attacks on the smart meter that aims to deceive the energy request from the grid are also prevented. We conduct security and game-based privacy analysis under the threat model and provide performance analysis of our implementation. Our results demonstrate that the proposed method overperforms other privacy methods in terms of communication and computation cost. The execution time of aggregation for 10,000 customers, each has 20 SAs is approximately 1 second. The decryption operations performed on the TEE have a linear complexity e.g., 172800 operations take around 1 second while 1728000 operations take around 10 seconds. These results can scale up using cloud or hyper-scalers for real-world applications as our scheme performs offline aggregation.
引用
收藏
页码:9182 / 9196
页数:15
相关论文
共 44 条
[1]   A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) :396-405
[2]  
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[3]  
Anati I, 2013, P 2 INT WORKSH HARDW
[4]  
[Anonymous], 2009, DIRECTIVE 2009/72/EC OF THE EUROPEAN PARLIAMENTAND OF THE COUNCIL concerning common rulesfor the internal market in electricity and repealing Directive 2003/54/EC
[5]  
[Anonymous], 2007, 80038D NIST SP
[6]  
[Anonymous], UCI REPOSITORY INDIV
[7]  
[Anonymous], 2016, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)
[8]  
[Anonymous], 2017, WOOT
[9]  
Bohli JM., Communications Workshops (ICC), 2010 IEEE International Conference on, 2010, P1
[10]  
Boneh D., 2020, A Graduate Course in Applied Cryptography, Version 0.5