Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey

被引:32
作者
Sultan, Sari [1 ]
机构
[1] Kuwait Univ, Comp Engn Dept, POB 5969, Safat 13060, Kuwait
关键词
Smart grid; Privacy-preserving metering; Incentive-based schemes; IDR; Rewarding schemes; Survey; DATA AGGREGATION; DEMAND RESPONSE; SECURE;
D O I
10.1016/j.cose.2019.03.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We reviewed 53 papers related to privacy-preserving metering in smart grid published in the last 9 years. Attribution is the main cause for privacy issues in smart metering. Hence, we categorized studies based on measurements' type: attributable or not. Utility Providers (UPs) use power measurements for two reasons: billing and maintaining operations. (A) Billing always requires attributable measurements. There are two main research problems for billing. (A-1) using coarse-grained measurements, which have minimal privacy concerns. (A-2) using fine-grained measurements, which have high privacy concerns. (B) Operational metering requires fine-grained measurements to maintain UPs' operations. There are two main research problems for operational metering. (B-1) Protect users' privacy when submitting non-attributable fine-grained measurements. Users might be reluctant to submit this type of measurements due to privacy concerns. Hence, UPs might offer incentive for users to shape their power usage (i.e. Incentive-based demand response (IDR)) or provide the fine-grained measurement (i.e. rewarding schemes). We refer to IDR and rewarding schemes as incentive-based schemes (they are sub-problems of the operational metering problem). They lead to the second research problem that addresses (B-2) protecting attributable fine-grained measurements used for operational metering. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:148 / 165
页数:18
相关论文
共 76 条
[1]   An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market [J].
Abidin, Aysajan ;
Aly, Abdelrahaman ;
Cleemput, Sara ;
Mustafa, Mustafa A. .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 :615-625
[2]  
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[3]   A summary of demand response in electricity markets [J].
Albadi, M. H. ;
El-Saadany, E. F. .
ELECTRIC POWER SYSTEMS RESEARCH, 2008, 78 (11) :1989-1996
[4]  
[Anonymous], 2018, ARXIV180108354
[5]  
[Anonymous], 2010, RES REPORT
[6]  
[Anonymous], INT SEC THREAT REP 2
[7]  
[Anonymous], ANN INCIDENT REPORTS
[8]  
[Anonymous], P IEEE GLOB WORKSH S
[9]  
[Anonymous], 2014, Internet security threat report volume 19
[10]  
[Anonymous], 2010, IEEE INT C COMM WORK